Three men hijack a commercial airliner and threaten to crash it into a nuclear plant, and authorities also fear they might crash it into President Richard Nixon’s winter home in Florida. [Graff, 2011, pp. 43-47] The hijacking occurs on Southern Airways Flight 49, a DC-9 bound from Memphis, Tennessee, to Miami, Florida, with scheduled stops in Birmingham, Alabama, Montgomery, Alabama, and Orlando, Florida. [Slate, 6/19/2013] The plane has 27 passengers and four crew members on board. The hijackers—three men with criminal records—are Lewis Moore, Henry Jackson, and Melvin Cale. The aim of the hijacking, Moore will later say, is to bring attention to the brutality and racism of the Detroit Police Department. The ordeal, which lasts 29 hours, is, at the current time, “the most chilling domestic hijacking in US history,” according to national security historian Timothy Naftali. [Naftali, 2005, pp. 61; Detroit Free Press, 6/6/2016]
Hijackers Demand a $10 Million Ransom – The hijackers manage to smuggle guns and grenades onto Flight 49 in a raincoat. [Slate, 6/19/2013] The plane takes off from Memphis at 5:05 p.m. on November 10. The hijackers seize control of it at 7:22 p.m., during the second leg of the flight. One of them enters the cockpit carrying a revolver and with an arm around the neck of a flight attendant. He tells the pilot, William Haas, “Head north, Captain, this is a hijacking.” [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43] The hijackers demand $10 million to release the plane. [Naftali, 2005, pp. 61] Haas transmits a hijack code to air traffic controllers who, in response, begin the well-known and widely used procedures for dealing with a hijacking. They notify the FBI in Washington, DC, and the Federal Aviation Administration’s special hijacking command post.
Airline Is Told of the Hijackers’ Ransom Demand – The plane lands in Jackson, Mississippi, at 8:10 p.m. to be refueled and then takes off at 8:36 p.m., heading for Detroit, Michigan, where the hijackers intend to settle their complaints with city officials. At around 10:30 p.m., while the plane is circling over Detroit, the FBI notifies the city’s mayor and Southern Airways of the hijackers’ ransom demand. At 12:05 a.m. on November 11, the plane leaves the Detroit area due to bad weather and heads for Cleveland, Ohio, where it lands and is refueled. It takes off from Cleveland at 1:38 a.m. and heads for Toronto, Canada.
Hijackers Threaten to Crash the Plane into a Nuclear Facility – While it is on the ground in Toronto, the hijackers learn that Southern Airways has only gathered $500,000 in ransom money. They refuse to take this and release the passengers. Consequently, after being refueled, the plane takes off at 6:15 a.m. and flies back to the US. It heads for Knoxville, Tennessee. As it is ascending, the hijackers tell controllers that unless their demands are met, they will crash Flight 49 into the Oak Ridge nuclear facility, near Knoxville. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43-45] Jackson says: “We’re tired of all this bull. No more foolin’ around. We’re taking this f_cker to Oak Ridge and dive it into a nuclear reactor.” [Burleson, 2007, pp. 66] By this time, the White House, the Pentagon, and the Atomic Energy Commission are all involved in dealing with the crisis. [Graff, 2011, pp. 45] Meanwhile, key personnel at Oak Ridge discuss the possible outcomes of Flight 49 crashing into their facility. At the bare minimum, they all agree, the impact could rupture the protective shell and result in a massive release of radioactivity; the worst possibility is a core meltdown. [Burleson, 2007, pp. 66-67]
White House Official Talks to the Hijackers – The plane diverts to Lexington, Kentucky, to be refueled and, by 11:00 a.m., is again over Oak Ridge. The hijackers are then connected to the White House. John Ehrlichman, the president’s top domestic aide, comes on the radio and Jackson tells him, “I’m up over Oak Ridge, where I’ll either throw a grenade or I’ll put this plane down nose first.” He says he and the other hijackers want a letter signed by the president stating that their ransom money is a grant from the government and they won’t be prosecuted. Ehrlichman says it will take some time to fulfil their request.
Hijackers Receive the Ransom Money – The hijackers then direct the plane to Chattanooga, Tennessee, where it lands at 1:30 p.m. It is refueled and the hijackers are given the ransom money, along with food and other supplies. Southern Airways has only been able to put together $2 million, but the airline is assuming—correctly, as it turns out—that the hijackers will lack the time to count the money and realize it is much less than the amount they demanded. The plane leaves Chattanooga at 2:35 p.m. and heads to Cuba, where many hijackers fled during the 1960s and early 1970s.
Authorities Fear the Plane May Be Crashed into the President’s Winter Home – As Flight 49 is flying south over Florida, authorities become concerned that the hijackers might crash it into the president’s retreat in Key Biscayne, where Nixon is currently staying. Military officials contact Florida’s Homestead Air Reserve Base and fighter jets there are placed on alert as a precaution. Fortunately, no incident occurs and Flight 49 lands in Havana at 4:49 p.m. However, to the surprise of the hijackers, the Cubans are unhappy about the plane’s arrival and soldiers surround the aircraft after it touches down. José Abrantes, President Fidel Castro’s head of security, explains to the hijackers the nation’s discomfort about the situation. Therefore, after being refueled, Flight 49 leaves Havana and heads back to the US.
FBI Agents Shoot the Plane’s Tires – It lands at McCoy Air Force Base in Orlando at 9:17 p.m. By now, Robert Gebhardt, assistant director of the FBI’s investigative division, has given the order to disable the plane when it is next on the ground. Consequently, after it lands, FBI agents start shooting at its tires. The hijackers, realizing what is happening, order Haas to start the plane’s engines. In the panic that follows, Jackson threatens Harold Johnson, the co-pilot, and shoots him in the arm in front of the terrified passengers. The hijackers give the order to take off and, despite now having two flat tires, the plane is able to get off the ground. Jackson then orders Haas to fly to Cuba again. The damaged plane makes an emergency landing in Havana at 12:32 a.m. on November 12. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 45-52] Cuban soldiers then arrest the hijackers and seize the ransom money, so it can be returned to Southern Airways. [Slate, 6/19/2013]
New Security Measures Will Be Introduced in response to the Hijacking – The catastrophic incident will lead to increased security in the aviation industry. Within two months, mandatory screening of all passengers and carry-on luggage will be introduced. The Justice Department will sign an agreement with the Department of Defense, making military assistance available to the FBI in the event of a terrorist emergency. Other measures will be considered but not introduced, such as armoring cockpit doors, allowing pilots to carry weapons, and centralizing airport security nationwide under a single agency. [Naftali, 2005, pp. 66-67; Graff, 2011, pp. 53] “No one understands the impact that this flight and this 30-hour ordeal had on the nation, and transforming everyone, from the White House to the FBI, to the way that we board an airplane every day,” Brendan Koerner, author of a book about aircraft hijackings, will comment in 2016. [Detroit Free Press, 6/6/2016] As a result of the hijacking of Flight 49, “the American public for the first time began to take the question of terrorism seriously and began to accept trade-offs of civil liberties in exchange for greater security,” journalist and author Garrett Graff will write. [Graff, 2011, pp. 53-54]
Early-Mid 1986: Salem Bin Laden Asks Pentagon to Supply Missiles to Arab Afghans, Receives No Reply
Bin Laden family head Salem bin Laden asks the Pentagon to supply anti-aircraft missiles to Arab volunteers fighting in the Soviet-Afghan War. The request is made on behalf of Salem’s brother Osama, who is establishing a semi-autonomous group of Arab volunteers outside the direct control of local Afghan commanders and will set up a camp just for Arabs later this year (see Late 1986). The Pentagon is asked because the US is already supplying anti-aircraft Stinger missiles to the Afghans. However, it does not reply to Salem, and the reason for the failure to reply is not known. According to a business partner involved in Salem’s efforts to secure the missiles, he makes several attempts to contact the Pentagon, but is unable to locate the right person in the defense bureaucracy. Later research will indicate that there is no formal decision by the Reagan administration not to supply the missiles or other equipment to the Arab volunteers. Pentagon official Michael Pillsbury will later say he was not aware of any such decision, but if such a decision had been taken, he would have been aware of it. [Coll, 2008, pp. 287]
September 18, 1987: Lebanese Hijacker Is First Known Islamist Terrorist to Be Rendered by US
A group of US agencies, comprising the CIA, FBI, DEA, and Defense Department, cooperates on the capture and rendition of Fawaz Younis, an Islamic militant linked to Lebanon’s Amal militia who was previously involved in two airplane hijackings.
Arrested, Transferred to US – Younis is captured after being lured to a boat in international waters off Cyprus. He is then arrested and transferred to an aircraft carrier, from where he is flown directly to the US. The operation, which costs US$20 million, is so complicated because of rules set by the Justice Department. [Trento and Trento, 2006, pp. 78-94] Author Stephen Grey will call the rules “very tight.” CIA manager Duane Clarridge will say, “This meant that Yunis had to be apprehended by the FBI in international waters or airspace, remain in constant custody of the feds, and remain clear of the turf of any sovereign nation—for the entire duration of his 4,000-mile journey to the United States.” [Grey, 2007, pp. 133-134]
Details of Hijackings – In the first hijacking, Younis seized a plane in Beirut and attempted to fly it to Tunis, where the Arab League was meeting. The aim was to pressure the League into urging the Palestine Liberation Organization to leave Lebanon, as relations between it and local people had deteriorated. In the second hijacking, which took place five days later, the plane was seized by a team from Islamic Jihad and Hezbollah, who beat the passengers and shot one of them, US Navy diver Robert Stethem. Posing as a crewman during a stopover in Beirut, Younis entered the plane and took control of the hijacking. The passengers were removed from the plane in groups, and dispersed through Beirut. They were later released in return for safe passage for the hijackers (see June 14-30, 1985).
Lured by Informant – The man who lured Younis to the boat is Jamal Hamdan, who had previously worked with the CIA on a false flag operation in Germany (see After Mid-April 1986). Authors Joe and Susan Trento will describe Hamdan as “a street hustler, murderer and drug dealer,” adding, “Hamdan’s Beirut police file is impressive.” Thanks to his connection to Amal, Hamdan was able to operate for a time despite his killings, but in 1985 he murdered a senior Druze official and then his sister-in-law, leading to his imprisonment. Amal leader and US intelligence asset Nabih Berri informed the US that Hamdan could help them with some drug cases, and he began providing the DEA and CIA with information about US-based drug dealers, which got him released from prison.
Deal for Asylum – In return for helping the operation to capture Younis, dubbed operation Goldenrod, Hamdan insisted on “huge cash payments” and asylum for himself and his family in the US. The Trentos will comment, “In other words, the FBI arranged to bring into our country a murderer and terrorist in return for the capture of an airplane hijacker who had never killed any Americans.” [Trento and Trento, 2006, pp. 78-94]
1991-Late 2003: Radical Islamists Train and Select Muslim Chaplains for US Military
In 1991, there is a surge in the number of US soldiers adhering to Islam, due to a conversion program sponsored by the Saudi government (see March-September 1991). Islamic activist Abdurahman Alamoudi approaches the US military and suggests they create a program for Muslim chaplains, similar to a longstanding program for Christian chaplains. His proposal is accepted and in 1991 he creates the American Muslim Armed Forces and Veterans Affairs Council (AMAFVAC) with the stated purpose to “certify Muslim chaplains hired by the military.” In 1993, the Defense Department certifies it as one of two organizations to select and endorse Muslim chaplains. The other is the Graduate School of Islamic and Social Sciences (GSISS). [US Congress, Senate, Committee on the Judiciary, 10/14/2003; Wall Street Journal, 12/3/2003] That group is run by prominent Islamic scholar Taha Jabir Al-Alwani. Most of the roughly one dozen Muslim chaplains in the US military are educated there. In 2002, the US government searches the school and Al-Alwani’s home as part of a raid on the SAAR network (see March 20, 2002). He appears to also be named as an unindicted coconspirator in the Sami al-Arian trial. Counterterrorism expert Rita Katz says Al-Alwani is a “person who supports and funnels money to terrorist organizations,” but Al-Alwani denies all terrorism ties and has not been charged with any crime. [St. Petersburg Times, 3/27/2003] Most Muslim chaplains trained at GSISS then receive an official endorsement from Alamoudi’s AMAFVAC organization. US intelligence will learn in early 1994 that Alamoudi has ties to bin Laden (see Shortly After March 1994). [US Congress, Senate, Committee on the Judiciary, 10/14/2003] In 1996, counterterrorism expert Steven Emerson will warn in a Wall Street Journal editorial that Alamoudi openly supports Hamas, even after the US government officially designated it a terrorist organization (see March 13, 1996). [Wall Street Journal, 3/13/1996] But Alamoudi will work for the Defense Department until 1998 on an unpaid basis to nominate and to vet Muslim chaplain candidates. After that, he will give the task to others in his AMAFVAC organization. [US Congress, Senate, Committee on the Judiciary, 10/14/2003] Furthermore, Senator Charles Schumer (D-NY) will later allege the US the military allowed Muslim chaplains to travel to the Middle East on funds provided by the Muslim World League, which has been linked to al-Qaeda (see October 12, 2001). Senator Jon Kyl (R-AZ) will later comment, “It is remarkable that people who have known connections to terrorism are the only people to approve these chaplains.” [US News and World Report, 10/27/2003] In late 2003, Alamoudi will be arrested and later sentenced to 23 years in prison for terrorism-related crimes. The US military will announce around the same time that it is reviewing and overhauling its Muslim chaplain program. [US News and World Report, 10/27/2003]
1992-2000: Secret Continuity of Government Exercises Prepare for Terrorist Threat
During the 1980s, Dick Cheney and Donald Rumsfeld were regular participants in top-secret exercises, designed to test a program called Continuity of Government (COG) that would keep the federal government functioning during and after a nuclear war with the Soviet Union (see 1981-1992). Despite the fall of the Berlin Wall and the collapse of the Soviet Union, the COG exercises continue into the 1990s, being budgeted still at over $200 million per year.
Exercises Prepare for Terrorist Attacks – Now, terrorists replace the Soviet Union as the imagined threat in the exercises. The terrorism envisaged is almost always state-sponsored, with the imagined terrorists acting on behalf of a government. According to journalist James Mann, the COG exercises are abandoned fairly early in the Clinton era, as the scenario is considered farfetched and outdated. However another journalist, Andrew Cockburn, suggests they continue for longer.
Exercise Participants Are Republican Hawks – Cockburn adds that, while the “shadow government” created in the exercises had previously been drawn from across the political spectrum, now the players are almost exclusively Republican hawks. A former Pentagon official with direct knowledge of the program will later say: “It was one way for these people to stay in touch. They’d meet, do the exercise, but also sit around and castigate the Clinton administration in the most extreme way. You could say this was a secret government-in-waiting. The Clinton administration was extraordinarily inattentive, [they had] no idea what was going on.” [Atlantic Monthly, 3/2004; Cockburn, 2007, pp. 88]
Richard Clarke Participates – A regular participant in these COG exercises is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). [Washington Post, 4/7/2004; ABC News, 4/25/2004] Although he will later come to prominence for his criticisms of the administration of President George W. Bush, some who have known him will say they consider Clarke to be hawkish and conservative (see May 22, 1998). [Boston Globe, 3/29/2004; US News and World Report, 4/5/2004] The Continuity of Government plan will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002]
Shortly After May 1993: Ali Mohamed Describes Al-Qaeda Training Camps, Possibly More, to US Military
Double agent Ali Mohamed is interviewed by the US military about al-Qaeda, but what exactly is said is uncertain because the interview files are supposedly lost. When Mohamed’s FBI handler John Zent interviewed him in May 1993 (see May 1993), he mentioned al-Qaeda training camps. FBI agent Jack Cloonan, who will later investigate Mohamed, will recall, “John realizes that Ali is talking about all these training camps in Afghanistan. And starts talking about this guy named bin Laden. So John calls the local rep from army intelligence” and arranges for them to interview him. A special team of army investigators shows up from Fort Meade, Virginia, which is the home of the NSA. “They bring maps with them and they bring evidence.… And so they debrief Ali, and he lays out all these training camps.” What else he may reveal is not known. Cloonan is not sure why Mohamed volunteered all this vital al-Qaeda information. Earlier in the year, FBI investigators discovered that Mohamed stole many top secret US military documents and gave them to Islamic militants (see Spring 1993). However, Mohamed faces no trouble from the Defense Department about that. FBI agent Joseph O’Brien will later ask, “Who in the government was running this show? Why didn’t the Bureau bring the hammer down on this guy Mohamed then and there?” Whatever Mohamed says in this interview is not shared with US intelligence agencies, even though it would have obvious relevance for the worldwide manhunt for Ramzi Yousef going on at the time since Yousef trained in some of the camps Mohamed is describing. Several years later, Cloonan will attempt to find the report of Mohamed’s interview with army intelligence but “we were never able to find it. We were told that the report was probably destroyed in a reorganization of intelligence components” in the Defense Department. [Lance, 2006, pp. 130-131]
June 24, 1994: Pentagon Report Predicts New Age of Religiously Inspired ‘Superterrorism’
The Pentagon privately publishes a report called Terror 2000. It is designed to help US intelligence prepare for new terrorism threats. Peter Probst in the Pentagon’s Office of the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict supervises the report. The panel consults with 40 experts, including a top Russian intelligence official and a senior Israeli intelligence official. The report concludes that the world is witnessing the dawn of a new age of “superterrorism.” It predicts chemical and biological attacks and says that terrorists will soon try to conduct simultaneous bombings and attacks. [Reeve, 1999, pp. 259-260] Also, in contrast to the state-sponsored terrorism familiar to most Americans at the time, the report says tomorrow’s “most dangerous” terrorists would be “motivated not by political ideology but by fierce ethnic and religious hatreds.… Their goal will not be political control but utter destruction of their chosen enemies.” [Washington Post, 10/2/2001 ] The report further states: “We appear to be entering an era in which few, if any, restraints will remain.… Unlike politically motivated terrorists, [religiously motivated terrorists] do not shrink from mass murder.… Mass casualties are not to be shunned… but sought because they demonstrate to unbelievers the cataclysmic nature of divine retribution.” [United Press International, 5/17/2002] It also postulates the use of planes as weapons, but this is not put in the report, partly for fear of giving potential terrorists ideas (see 1993-1994). The study is presented to officials in Congress, FEMA, the CIA, FBI, NSA, DIA, Justice Department, State Department, and senior executives from the telecommunications, banking and computer industries. State Department officials consider publicly releasing the report but ultimately decide not to. “That was a mistake,” Probst will later say. [Washington Post, 10/2/2001
; United Press International, 5/17/2002] Marvin Cetron, an expert who wrote the report, will later say, “Some of the people thought it was right on—but most of them thought it was too far out.” [Reeve, 1999, pp. 259-260]
January 1995: Ali Mohamed Gets Defense Contractor Job without Proper Security Clearance
Ali Mohamed applies for a US security clearance, so he can become a security guard with a Santa Clara defense contractor. His application fails to mention ever traveling to Pakistan or Afghanistan. Defense Department officials conduct a background check on him and interview him three times. Mohamed claims, “I have never belonged to a terrorist organization, but I have been approached by organizations that could be called terrorist.” These kinds of comments contradict what he has already told the FBI in interviews. [San Francisco Chronicle, 11/4/2001] He never gets the required clearance, but somehow gets the job anyway. He works with Burns Security as a guard protecting a Northrop-Grumman factory in Sunnyvale, California. The factory makes triggers for the Trident missile. He has access to a computer inside the factory, but the computer is protected with a password so it is unknown if he gained access to the sensitive, classified information on it. [Lance, 2006, pp. 207-208]
June 1995-June 1998: Number of Counterterrorism Exercises Increases Dramatically, but Most Practice Unlikely WMD Scenarios
After Presidential Decision Directive 39 (PDD-39), issued in June 1995 (see June 21, 1995), requires key federal agencies to maintain well-exercised counterterrorist capabilities, the number of counterterrorism exercises being conducted increases significantly. According to a 1999 report by the General Accounting Office, whereas 32 counterterrorist exercises are held between June 1995 and June 1996, from June 1997 to June 1998, 116 such exercises are conducted. Some of the exercises held between June 1995 and June 1998 are “tabletop exercises,” where participants work through a scenario around a table or in a classroom and discuss how their agency might react; others are “field exercises,” where an agency’s leadership and operational units practice their skills in a realistic field setting. Four exercises during this period are “no-notice” exercises, where participants have no advance notice of the exercise. These four exercises are conducted by either the Department of Defense (DoD) or the Department of Energy. DoD leads 97 of the exercises—almost half of the total—held between June 1995 and June 1998. The Secret Service leads 46, the FBI 24, and the Federal Emergency Management Agency (FEMA) leads 16. Most of the exercises are conducted in the US and are based around the scenario of a domestic terrorist attack. Although intelligence agencies have determined that conventional explosives and firearms continue to be the weapons of choice for terrorists, the majority of exercises are based around scenarios involving weapons of mass destruction (WMD)—chemical, biological, or nuclear weapons or agents. More than two-thirds of the exercises have WMD scenarios, with the most common WMD being chemical agents, such as sarin. The other exercises have more traditional and more likely scenarios involving conventional weapons and explosives. [United States General Accounting Office, 6/25/1999 ; Washington Post, 10/2/2001
]
1996-1997: Ptech Begins to Get US Government Contracts
Ptech is a Boston computer company connected to a number of individuals suspected of ties to officially designated terrorist organizations (see 1994). These alleged ties will be of particular concern because of Ptech’s potential access to classified government secrets. Ptech specializes in what is called enterprise architecture. It is the design and layout for an organization’s computer networks. John Zachman, considered the father of enterprise architecture, later will say that Ptech could collect crucial information from the organizations and agencies with which it works. “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.” Another computer expert will say, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures.” [WBZ 4 (Boston), 12/9/2002] In late 1996, an article notes that Ptech is doing work for DARPA, a Defense Department agency responsible for developing new military technology. [Government Executive, 9/1/1996] In 1997, Ptech gains government approval to market its services to “all legislative, judicial, and executive branches of the federal government.” Beginning that year, Ptech will begin working for many government agencies, eventually including the White House, Congress, Army, Navy, Air Force, NATO, FAA, FBI, US Postal Service, Secret Service, the Naval Air Systems Command, IRS, and the nuclear-weapons program of the Department of Energy. For instance, Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.” Ptech will be raided by US investigators in December 2002 (see December 5, 2002), but not shut down. [Wall Street Journal, 12/6/2002; CNN, 12/6/2002; Newsweek, 12/6/2002; Boston Globe, 12/7/2002] A former director of intelligence at the Department of Energy later will say he would not be surprised if an al-Qaeda front company managed to infiltrate the department’s nuclear programs. [Unlimited (Auckland), 12/9/2002] Ptech will continue to work with many of these agencies even after 9/11. After a Customs Department raid of Ptech’s offices in late 2002, their software will be declared safe of malicious code. But one article will note, “What no one knows at this point is how much sensitive government information Ptech gained access to while it worked in several government agencies.” [WBZ 4 (Boston), 12/9/2002]