Three men hijack a commercial airliner and threaten to crash it into a nuclear plant, and authorities also fear they might crash it into President Richard Nixon’s winter home in Florida. [Graff, 2011, pp. 43-47] The hijacking occurs on Southern Airways Flight 49, a DC-9 bound from Memphis, Tennessee, to Miami, Florida, with scheduled stops in Birmingham, Alabama, Montgomery, Alabama, and Orlando, Florida. [Slate, 6/19/2013] The plane has 27 passengers and four crew members on board. The hijackers—three men with criminal records—are Lewis Moore, Henry Jackson, and Melvin Cale. The aim of the hijacking, Moore will later say, is to bring attention to the brutality and racism of the Detroit Police Department. The ordeal, which lasts 29 hours, is, at the current time, “the most chilling domestic hijacking in US history,” according to national security historian Timothy Naftali. [Naftali, 2005, pp. 61; Detroit Free Press, 6/6/2016]
Hijackers Demand a $10 Million Ransom – The hijackers manage to smuggle guns and grenades onto Flight 49 in a raincoat. [Slate, 6/19/2013] The plane takes off from Memphis at 5:05 p.m. on November 10. The hijackers seize control of it at 7:22 p.m., during the second leg of the flight. One of them enters the cockpit carrying a revolver and with an arm around the neck of a flight attendant. He tells the pilot, William Haas, “Head north, Captain, this is a hijacking.” [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43] The hijackers demand $10 million to release the plane. [Naftali, 2005, pp. 61] Haas transmits a hijack code to air traffic controllers who, in response, begin the well-known and widely used procedures for dealing with a hijacking. They notify the FBI in Washington, DC, and the Federal Aviation Administration’s special hijacking command post.
Airline Is Told of the Hijackers’ Ransom Demand – The plane lands in Jackson, Mississippi, at 8:10 p.m. to be refueled and then takes off at 8:36 p.m., heading for Detroit, Michigan, where the hijackers intend to settle their complaints with city officials. At around 10:30 p.m., while the plane is circling over Detroit, the FBI notifies the city’s mayor and Southern Airways of the hijackers’ ransom demand. At 12:05 a.m. on November 11, the plane leaves the Detroit area due to bad weather and heads for Cleveland, Ohio, where it lands and is refueled. It takes off from Cleveland at 1:38 a.m. and heads for Toronto, Canada.
Hijackers Threaten to Crash the Plane into a Nuclear Facility – While it is on the ground in Toronto, the hijackers learn that Southern Airways has only gathered $500,000 in ransom money. They refuse to take this and release the passengers. Consequently, after being refueled, the plane takes off at 6:15 a.m. and flies back to the US. It heads for Knoxville, Tennessee. As it is ascending, the hijackers tell controllers that unless their demands are met, they will crash Flight 49 into the Oak Ridge nuclear facility, near Knoxville. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43-45] Jackson says: “We’re tired of all this bull. No more foolin’ around. We’re taking this f_cker to Oak Ridge and dive it into a nuclear reactor.” [Burleson, 2007, pp. 66] By this time, the White House, the Pentagon, and the Atomic Energy Commission are all involved in dealing with the crisis. [Graff, 2011, pp. 45] Meanwhile, key personnel at Oak Ridge discuss the possible outcomes of Flight 49 crashing into their facility. At the bare minimum, they all agree, the impact could rupture the protective shell and result in a massive release of radioactivity; the worst possibility is a core meltdown. [Burleson, 2007, pp. 66-67]
White House Official Talks to the Hijackers – The plane diverts to Lexington, Kentucky, to be refueled and, by 11:00 a.m., is again over Oak Ridge. The hijackers are then connected to the White House. John Ehrlichman, the president’s top domestic aide, comes on the radio and Jackson tells him, “I’m up over Oak Ridge, where I’ll either throw a grenade or I’ll put this plane down nose first.” He says he and the other hijackers want a letter signed by the president stating that their ransom money is a grant from the government and they won’t be prosecuted. Ehrlichman says it will take some time to fulfil their request.
Hijackers Receive the Ransom Money – The hijackers then direct the plane to Chattanooga, Tennessee, where it lands at 1:30 p.m. It is refueled and the hijackers are given the ransom money, along with food and other supplies. Southern Airways has only been able to put together $2 million, but the airline is assuming—correctly, as it turns out—that the hijackers will lack the time to count the money and realize it is much less than the amount they demanded. The plane leaves Chattanooga at 2:35 p.m. and heads to Cuba, where many hijackers fled during the 1960s and early 1970s.
Authorities Fear the Plane May Be Crashed into the President’s Winter Home – As Flight 49 is flying south over Florida, authorities become concerned that the hijackers might crash it into the president’s retreat in Key Biscayne, where Nixon is currently staying. Military officials contact Florida’s Homestead Air Reserve Base and fighter jets there are placed on alert as a precaution. Fortunately, no incident occurs and Flight 49 lands in Havana at 4:49 p.m. However, to the surprise of the hijackers, the Cubans are unhappy about the plane’s arrival and soldiers surround the aircraft after it touches down. José Abrantes, President Fidel Castro’s head of security, explains to the hijackers the nation’s discomfort about the situation. Therefore, after being refueled, Flight 49 leaves Havana and heads back to the US.
FBI Agents Shoot the Plane’s Tires – It lands at McCoy Air Force Base in Orlando at 9:17 p.m. By now, Robert Gebhardt, assistant director of the FBI’s investigative division, has given the order to disable the plane when it is next on the ground. Consequently, after it lands, FBI agents start shooting at its tires. The hijackers, realizing what is happening, order Haas to start the plane’s engines. In the panic that follows, Jackson threatens Harold Johnson, the co-pilot, and shoots him in the arm in front of the terrified passengers. The hijackers give the order to take off and, despite now having two flat tires, the plane is able to get off the ground. Jackson then orders Haas to fly to Cuba again. The damaged plane makes an emergency landing in Havana at 12:32 a.m. on November 12. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 45-52] Cuban soldiers then arrest the hijackers and seize the ransom money, so it can be returned to Southern Airways. [Slate, 6/19/2013]
New Security Measures Will Be Introduced in response to the Hijacking – The catastrophic incident will lead to increased security in the aviation industry. Within two months, mandatory screening of all passengers and carry-on luggage will be introduced. The Justice Department will sign an agreement with the Department of Defense, making military assistance available to the FBI in the event of a terrorist emergency. Other measures will be considered but not introduced, such as armoring cockpit doors, allowing pilots to carry weapons, and centralizing airport security nationwide under a single agency. [Naftali, 2005, pp. 66-67; Graff, 2011, pp. 53] “No one understands the impact that this flight and this 30-hour ordeal had on the nation, and transforming everyone, from the White House to the FBI, to the way that we board an airplane every day,” Brendan Koerner, author of a book about aircraft hijackings, will comment in 2016. [Detroit Free Press, 6/6/2016] As a result of the hijacking of Flight 49, “the American public for the first time began to take the question of terrorism seriously and began to accept trade-offs of civil liberties in exchange for greater security,” journalist and author Garrett Graff will write. [Graff, 2011, pp. 53-54]
August 1985-October 1990: White House Defies Congress and Allows Pakistan’s Nuclear Weapons Program to Progress
In 1985, US Congress passes legislation requiring US economic sanctions on Pakistan unless the White House can certify that Pakistan has not embarked on a nuclear weapons program (see August 1985 and August 1985). The White House certifies this every year until 1990 (see 1987-1989). However, it is known all the time that Pakistan does have a continuing nuclear program. For instance, in 1983 a State Department memo said Pakistan clearly has a nuclear weapons program that relies on stolen European technology. Pakistan successfully builds a nuclear bomb in 1987 but does not test it to keep it a secret (see 1987). With the Soviet-Afghan war ending in 1989, the US no longer relies on Pakistan to contain the Soviet Union. So in 1990 the Pakistani nuclear program is finally recognized and sweeping sanctions are applied (see June 1989). [Gannon, 2005] Journalist Seymour Hersh will comment, “The certification process became farcical in the last years of the Reagan Administration, whose yearly certification—despite explicit American intelligence about Pakistan’s nuclear-weapons program—was seen as little more than a payoff to the Pakistani leadership for its support in Afghanistan.” [New Yorker, 3/29/1993] The government of Pakistan will keep their nuclear program a secret until they successfully test a nuclear weapon in 1998 (see May 28, 1998).
1996-1997: Ptech Begins to Get US Government Contracts
Ptech is a Boston computer company connected to a number of individuals suspected of ties to officially designated terrorist organizations (see 1994). These alleged ties will be of particular concern because of Ptech’s potential access to classified government secrets. Ptech specializes in what is called enterprise architecture. It is the design and layout for an organization’s computer networks. John Zachman, considered the father of enterprise architecture, later will say that Ptech could collect crucial information from the organizations and agencies with which it works. “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.” Another computer expert will say, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures.” [WBZ 4 (Boston), 12/9/2002] In late 1996, an article notes that Ptech is doing work for DARPA, a Defense Department agency responsible for developing new military technology. [Government Executive, 9/1/1996] In 1997, Ptech gains government approval to market its services to “all legislative, judicial, and executive branches of the federal government.” Beginning that year, Ptech will begin working for many government agencies, eventually including the White House, Congress, Army, Navy, Air Force, NATO, FAA, FBI, US Postal Service, Secret Service, the Naval Air Systems Command, IRS, and the nuclear-weapons program of the Department of Energy. For instance, Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.” Ptech will be raided by US investigators in December 2002 (see December 5, 2002), but not shut down. [Wall Street Journal, 12/6/2002; CNN, 12/6/2002; Newsweek, 12/6/2002; Boston Globe, 12/7/2002] A former director of intelligence at the Department of Energy later will say he would not be surprised if an al-Qaeda front company managed to infiltrate the department’s nuclear programs. [Unlimited (Auckland), 12/9/2002] Ptech will continue to work with many of these agencies even after 9/11. After a Customs Department raid of Ptech’s offices in late 2002, their software will be declared safe of malicious code. But one article will note, “What no one knows at this point is how much sensitive government information Ptech gained access to while it worked in several government agencies.” [WBZ 4 (Boston), 12/9/2002]
1999: US Government Ignores ‘Who’s Who’ Book of Al-Qaeda Figures
Rita Katz, a researcher at The Investigative Project on Terrorism, discovers a book called The Arab Volunteers in Afghanistan. Published in Arabic in 1991, the book is very obscure. The 9/11 Commission will later say the book contains “a particularly useful insight into the evolution of al-Qaeda—written by an early bin Laden associate, Adel Batterjee, under a pseudonym.” [9/11 Commission, 7/24/2004, pp. 467] Katz discovers that Batterjee was close acquaintances with Osama bin Laden and that the book describes bin Laden’s career and that of many others during the 1980s war in Afghanistan in great detail. She will later call the book “practically the ‘Who’s Who of al-Qaeda’” because so many people described in it went on to become important al-Qaeda figures. The book discusses: Adel Batterjee, the author of the book and a Saudi millionaire. He helped found the Benevolence International Foundation (BIF). The US will declare him a terrorism financier in 2004.
Wael Hamza Julaidan, a Saudi multimillionaire. The US will designate him a terrorism financier in 2002 (see September 6, 2002).
Enaam Arnaout. He runs the US headquarters of BIF from 1993 until late 2001, when the US will shut BIF down.
Mohammed Loay Bayazid, a US citizen. He is a founding member of al-Qaeda and worked in the US for BIF until 1998.
Mohammed Jamal Khalifa, bin Laden’s brother-in-law. He is tied to the Bojinka plot and numerous militant charity fronts.
Mohammed Galeb Kalaje Zouaydi (the book mentions him by his alias, Abu Talha). Considered al-Qaeda’s main financier of cells in Europe, he will be arrested a few months after 9/11 (see April 23, 2002).
Wali Khan Amin Shah, one of the Bojinka plotters. [9/11 Commission, 7/24/2004, pp. 468]
Mamdouh Mahmud Salim, an al-Qaeda leader involved in the 1998 African embassy bombings who will be arrested in Germany in 1998 (see September 16, 1998). [National Review, 10/28/2002]
Katz says that “many, many others” are mentioned. “Many others mentioned in the book decorate the FBI’s ‘most wanted’ lists.… There was nothing like [the] book to put everything in order, organize loose bits of information, and clear parts that were obscure to me (and to everyone else.)” Katz has connections in the US government, so she calls the White House and tries to convey the importance of the book’s information. She repeatedly sends them translations of important sections. However, she sees very little interest in the book. After 9/11, she will get a call from the Justice Department, finally expressing interest. Katz will later comment, “The government took interest in the book only after 9/11, two years after I’d first discovered it and offered it to them. No wonder that government agents told me I knew more about al-Qaeda than they did.”
Between February 2001 and August 2001: White House Prohibits Staff from Using BlackBerrys, Thereby Hindering Communications on 9/11
White House staffers are prohibited from using BlackBerry e-mail pagers, but this rule will hinder them on September 11, when phone systems suffer serious problems but BlackBerrys work normally. At some point after George W. Bush takes over as president (see January 20, 2001) but before September 11, the new administration makes “a judgment call… that people in the White House could not use a BlackBerry,” according to Joseph Hagin, the White House deputy chief of staff for operations. The BlackBerry is a handheld device used mainly for sending and receiving short e-mail messages. [New York Times, 9/20/2001; PC World, 12/9/2008] The decision against using BlackBerrys is reportedly made for security reasons. “The security agencies had decided they were too vulnerable,” Hagin will later say. [IT Business Edge, 2/12/2009]
White House Staffers Have Trouble Communicating on 9/11 – However, on September 11, while BlackBerrys continue to work normally, many people will have difficulty making phone calls. [New York Times, 9/20/2001] White House staffers will be badly affected by the communication problems. Hagin will describe: “On September 11, 2001, when we had so much trouble in the executive branch communicating during the emergency, when commercial phones and cell phones went down to a large extent because the system overloaded, there was a lot of difficulty at the White House because the president was in Florida, I was in New York City, and everyone else was in Washington. With everyone spread so thinly, we had trouble figuring out who was okay, the status of things, and so on.” [Computerworld, 2/3/2009]
Rove Is the Only White House Staff Member with a BlackBerry – Karl Rove, the president’s senior adviser, will be the only member of the White House staff with a BlackBerry on September 11. Rove will write that, while he is traveling with the president on Air Force One that day, because all the phones are tied up, several other White House staff members “took turns using my BlackBerry to queue up e-mails to their families that would be sent when we passed over a cell network.” [Rove, 2010, pp. 257-258; Hill, 3/17/2010]
BlackBerrys Permitted after 9/11 – The White House will reverse its decision to prohibit BlackBerrys after September 11. According to Hagin, “In the weeks that followed [9/11], when talking to some of our friends on [Capitol Hill], we found that they had stayed in pretty good touch through BlackBerry technology.” Therefore, Hagin will say: “I made the decision that we couldn’t operate without [BlackBerrys]. We bought 200, then 400, and finally about 600.” [PC World, 12/9/2008; Computerworld, 2/3/2009]
BlackBerry Works Well on 9/11 due to Simplicity of Its Network – The reason why, unlike phones, BlackBerrys work as usual on September 11, according to the New York Times, is that instead of relying on “cellular telephone systems or the local telephone network, which were damaged and inundated with traffic, the BlackBerry functions on a data system that held up remarkably well. The network not only escaped damage but also avoided bottlenecks because of its relative simplicity.” The BlackBerry network “in a way resembles the on-ramp of a freeway. It transmits data in small packets of information that can simply wait for a small amount of space on the system to be freed up to be sent or received.” [New York Times, 9/20/2001]
February 6, 2001: White House Told of New Rise in Terrorist Threats
A Senior Executive Intelligence Brief (SEIB), entitled “Sunni Terrorist Threat Growing,” is sent to top White House officials. It indicates a heightened threat of Sunni extremist attacks, particularly in the Middle East and Europe, against US facilities and personnel. (Bin Laden is the most wanted Sunni extremist by this time.) The briefing states this is considered the most significant spike in threat reporting since the Millennium. The SEIB is usually released one day after the corresponding President Daily Briefing is given to the president and contains similar content (see January 20-September 10, 2001), so it is probable Bush is given this warning. Based on this warning, a terrorist threat advisory will be shared throughout the US intelligence community on March 30, and the FBI will send out a warning to its field offices in April (see April 13, 2001). [US District Court of Eastern Virginia, 5/4/2006, pp. 1 ]
Spring 2001: President Tells White House Staffer to Fix Problem with Phone System, but Staffer Will Not Have Done So by September 11
President Bush, after having trouble making a telephone call, instructs Joseph Hagin, the White House deputy chief of staff for operations, to fix the problem and ensure that he is able to make calls at any time, but the issue will not have resolved by September 11, when Bush experiences significant communication problems. While he is being driven through Washington, DC, in his limousine, Bush tries to make a phone call but is unable to get a signal and hears only static. When he arrives at the White House, he calls Hagin over to discuss the problem. [National Journal, 4/11/2011] Hagin is a little known but influential member of the White House staff who, according to Politico, “manages everything around the president and the presidency except politics and policy.” [Politico, 7/3/2008; Washington Post, 7/4/2008] Bush tells him the president should be able to call anyone at any time. “He essentially said to me, ‘We need to fix this and fix it quickly,’” Hagin will later recall. Bush adds, “What would we do if something really serious happened and this didn’t work?” [National Journal, 4/11/2011] Presumably as part of Hagin’s effort to resolve the problem, in the spring of 2001, the White House commissions the Department of Defense to study a communications upgrade. [ABC News, 12/20/2006] However, Hagin’s task will not have been completed by September 11. On that day, Bush and other senior government officials will experience serious communication problems (see (After 8:55 a.m.) September 11, 2001; (9:04 a.m.-9:45 a.m.) September 11, 2001; and (9:34 a.m.-9:43 a.m.) September 11, 2001). [National Journal, 4/11/2011] But the 9/11 attacks, according to the Associated Press, “spurred on the effort to modernize White House communications.” Hagin subsequently “took the White House’s cell phone technology digital, upgraded the systems in the president’s cars, and moved staffers to the BlackBerry wireless communicator, while not freeing them from carrying pagers as well.” [Associated Press, 8/22/2003] According to Thomas Kean, the chairman of the 9/11 Commission, “[T]he fix to the presidential communications was one of the first things that was done after 9/11.” [9/11 Commission, 6/17/2004]
April 19-20, 2001: President Bush Warned ‘Bin Laden Planning Multiple Operations’
On April 19, 2001, the interagency Counterterrorism Security Group (CSG) chaired by counterterrorism “tsar” Richard Clarke discusses recent reports that al-Qaeda leader Abu Zubaida is planning an attack. The next day, a Senior Executive Intelligence Brief (SEIB) with the title “Bin Laden Planning Multiple Operations” is sent to top White House officials. The New York Times will later report that President Bush and Vice President Cheney were among those who received this warning. Since SEIBs are usually based on previous days’ President Daily Briefings, President Bush probably learned about this report on April 19 (see January 20-September 10, 2001). [New York Times, 4/18/2004; 9/11 Commission, 7/24/2004, pp. 255; US District Court of Eastern Virginia, 5/4/2006, pp. 2 ]
May 2-3, 2001: President Bush Told Bin Laden’s Public Comments Suggest New Attack
A Senior Executive Intelligence Brief (SEIB) about Osama bin Laden sent to top White House officials on May 3, 2001, is entitled, “Bin Laden Public Profile May Presage Attack.” Apparently it suggests that recent public comments by bin Laden could be hinting at future attacks, but details of what exactly he said or did to cause this warning have not be made public. The New York Times will later report that President Bush and Vice President Cheney were among those who received this warning. Since SEIBs are typically based on the previous day’s President Daily Briefings (see January 20-September 10, 2001), President Bush was probably informed about this warning on May 2. [9/11 Commission, 7/24/2004, pp. 255; US District Court of Eastern Virginia, 5/4/2006, pp. 2 ]
May 16-17, 2001: US Warned Bin Laden Supporters Are Inside US and Planning an Attack
On May 16, an anonymous person calls the US embassy in the United Arab Emirates and warns that bin Laden supporters have been in the US and are planning an attack in the US using “high explosives.” The caller mentions that operatives are infiltrating the US from Canada, but there is no mention of when or where the attack might occur. The next day, based on this warning, the first item on the agenda for counterterrorism “tsar” Richard Clarke’s interagency Counterterrorism Security Group (CSG) is entitled: “[Osama bin Laden]: Operation Planned in US.” The anonymous caller’s tip cannot be later corroborated. In July, the CIA will share the warning with the FBI, the INS, the US Customs Service, and the State Department. It will also be mentioned in the August 6, 2001 Presidential Daily Briefing given to President Bush (see August 6, 2001) and Bush will be told that the CIA and FBI are investigating it. But eventually, neither the CIA nor FBI is able to corraborate the information in the call. [US Congress, 9/18/2002; Washington Post, 9/19/2002; 9/11 Commission, 7/24/2004, pp. 255, 262, 535] There are some other possibly interlinked warnings this month also warning of an al-Qaeda plot to attack the US from Canada using explosives (see May 30, 2001, May 2001, and May 2001).