Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Able Danger Mystery Solved: How They Linked Atta

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Editorials & Other Articles Donate to DU
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 06:38 AM
Original message
Able Danger Mystery Solved: How They Linked Atta
Edited on Thu Sep-29-05 07:38 AM by leveymg
WashPost: Able Danger project accessed classified NSA/DIA files -- not just "Open Source" data -- to link Atta with other al-Qaeda months before 9/11. But, what happened to these source files?


Washington Post national security writer, William M. Arkin, downplays the Able Danger story in his column yesterday. His anonymous Pentagon sources are saying, in effect, "There's nothing to see here, move along."

Don't believe them. Their version of the story makes no sense, as is explained below. It depends on the widespread misimpression that the Able Danger project relied on "open source" data, such as Internet files and drivers license records. Arkin's story, however, references a little-reported Pentagon news conference which reveals that the project, in fact, had access to CLASSIFIED DoD data banks. As will be explained below, that means the DIA could have, and should have, connected the dots between Atta and the other principal 9/11 hijackers in early 2000 based on classified NSA intercepts outside the US.

This removes one of the central mysteries -- and much of the confusion -- about the Able Danger story: How did AD link Atta to the others before he entered the US?

Arkin's column, nonetheless, obscures what the Pentagon actually knew months in advance about the al-Qaeda cells planning to attack the United States. It appears to advance the cover story now being offered the public that AD was closed down by Pentagon brass because it didn't really discover anything important. The column is on-line and has a open string that follows.

Here's the column and my response at the WashPost's on-line site. In response to that post, another reader informs us that the project DID NOT merely work with "open source" data. ( http://www.defenselink.mil/transcripts/2005/tr20050901-3844.html ),


This confirms that the AD analysts had access to classified DoD files, and they could have, and should have, been able to connect the dots between Atta and the other 9/11 hijackers in early 2000.

---MORE BELOW --

Washington Post on-line

William M. Arkin on National and Homeland Security

Disabling Able Danger
http://blogs.washingtonpost.com/earlywarning/2005/09/disabling_able_.html#comment-9821751

In April 2000, Able Danger, only months old, was abruptly shut down. Caught violating Reagan administration Executive Orders and Defense Department and Army regulations restricting intelligence agencies from collecting information on United States "persons," the highly compartmented cell within the Army's Land Information Warfare Activity (LIWA) was halted in its effort to use data mining and link analysis to characterize the worldwide nature of the al Qaeda terrorist network.

Anthony Shaffer, the whistle blower who went public in August, claims lawyers shut down the operation just at the point that it named and identified 9/11 hijacker Mohamed Atta.
As I wrote yesterday, Shaffer is pretty lonely in his recollections. Of some 80 people interviewed by the Defense Department as part of its Able Danger internal investigation, the Pentagon says that three additional workers remember seeing either a chart with a photo or a reference to Mohamed Atta.

The general in charge of the Special Operations Command, Gen. Bryan "Doug" Brown, also went on the record this weekend telling the St. Petersburg Times that he was "pretty sure" Able Danger did not identify Mohamed Atta before 9/11. Two Defense Department lawyers familiar with the case told me that there is no evidence that lawyers directed the destruction of information nor restricted any sharing of useful intelligence with the FBI, as Shaffer claims.

SNIP

"What began as a force protection mission for DOD organizations, evolved, through mission creep, lack of clear rules, and the lack of meaningful oversight, into an abuse of ... Constitutional rights...," William Dugan, Pentagon chief of intelligence oversight, said last week. He was describing the experiences of the 1960s and 1970s.

SNIP

When Able Danger approached LIWA in 1999 to help with the al Qaeda campaign plan, the organization was already involved in a number of highly classified counter-terrorism data mining efforts. LIWA's al Qaeda project collected 2.5 terabytes of "open source" information, Shaffer says, a ridiculously immense amount of data equivalent to 500 million pages of text or a pile of paper 30,000 miles high if it were all printed out -- court records, news databases, credit card and telephone records. "Anything we could get our hands on," says Shaffer.

SNIP


Tracked on Sep 28, 2005 10:38:26 AM


XXXXXX

(MY RESPONSE AT OPEN THREAD BELOW)

In numerous reports, Able Danger has been portrayed as being an open-source project. Thank you for the cite that states that it, in fact, operated with both classified and open sources. That only reinforces the bigger point that is being made here:


NSA intercepts led US intelligence to the Kuala Lumpur planning summit in early January 2000. That meeting was monitored by the CIA and other agencies, and the attendees were then followed as they departed. Ramzi bin al Shehb, Atta's roommate, returned to Hamburg.


Think about the timeframe here. Why does everyone profess such puzzlement about how AD could have linked Atta and the others in early 2000?

Posted by: leveymg | Sep 28, 2005 12:20:49 PM


SNIP


Posted by: topdog08 | Sep 28, 2005 11:35:28 AM


Re leveymg's comment " Why would an Above Top-Secret DoD program, such as Able Danger (AD), be restricted to gathering and analyzing non-classified "open source" data " --------


WHO said Able Danger was restricted to unclassified material?


In the DOD press conference cited by Arkin

( http://www.defenselink.mil/transcripts/2005/tr20050901-3844.html ),



Cmdr. Christopher Chope, Center for Special Operations, U.S. Special Operations Command, explicitly says the opposite:


" Chope: In Able Danger it was mixed, both open source and classified. "


Posted by: Don Williams | Sep 28, 2005 11:16:23 AM

leveymg posted

Has anyone explained -- and, has anyone even asked -- the obvious question here? Why would an Above Top-Secret DoD program, such as Able Danger (AD), be restricted to gathering and analyzing non-classified "open source" data, such as Internet postings and purchased private surveillance archives? That makes absolutely no sense, for several good reasons:


the DIA analysts attached to the project, including Col. Shaffer, would most certainly have had access to a wide variety of classified files. That would include the finished intelligence derived from the NSA's SIGINT intercepts and other classified sources, such as US intelligence counter-terrorism files.


the reported scale of the AD databank, 2.5 terabytes (TB), is far too small to store and analyze wide swaths of the open web, which in 2003 was an estimated 167 TB. Closed internet sites --the "deep web" -- is some 100 times that size. Anthony Bamford's "Body of Secrets" (2001) states that the NSA's internal data banks (exclusive of SIGINT intercepts) amounted to some 12TB, much more in scale with the AD project computers.


by early 2000, the NSA and DIA had acquired extensive data on all four of the principal 9/11 hijackers. The classified data potentially available to AD analysts about the UBL cell consisted of the following -


Mohamed Atta was linked to the others through the Kuala Lumpur meeting in January 2000. That Al-Qaeda planning summit was attended by the flight 77 (Pentagon) hijackers -- Nawaf al-Hazmi and Khalid al-Midhar -- and Atta's roommate, Ramzi bin al Shehb. The 9/11 and Cole attacks were planned there, afterwards the Flt. 77 hijackers entered the US and Atta's roommate went back to Hamburg.


the NSA tracked al-Hazmi and al-Midhar to the Kuala Lumpur planning summit (US and British intelligence had known about the al-Hazmi family's operation of an al Qaeda communications center in Yemen since 1995). Once they got there, the CIA and half a dozen American and allied intel agencies monitored the meeting, and followed everyone as they left.


All the information above came out during the September 2002 Congressional Joint Intelligence hearings into 9/11. That's no secret. For more info, see,

http://www.scoop.co.nz/stories/HL0302/S00079.htm

It is thus clear that the public story about AD doesn't really make much sense in light of the information that was available to DOD from its own files. What DoD actually knew about al-Qaeda -- and what the picture that it had put together of al-Qaeda plans to attack the US -- is being obscured by the central myth that AD was strictly an open source collection tool.

I don't buy that, nor should anyone else until we get a plausible explanation as to why the AD program was entirely cut-off from the DIA and NSA's files. Even if the AD computers exclusively scanned open sources (and why should that restriction be in place), the project's analysts would have had access to sufficient information from the Kuala Lumpur intercepts to put together the "Brooklyn cell" matrix.

Finally, since the Flt. 77 hijackers were planning to crash into the Pentagon, and the Kuala Lumpur plotters were planning to attack US Navy ships, the "force protection" justification was well-founded and, in fact, more than justifiable. (It was obliously a great mistake to terminate AD on the pretext. The "force protection" exception allows NSA/DIA to comingle data about US persons with data from foreign sources if it is used to protect U.S. military personnel, installations, and vessels.)

We still haven't heard any good reason why Able Danger was shut down by the Bush Administration in April or May 2001.

Posted by: leveymg | Sep 28, 2005 11:05:55 AM


Printer Friendly | Permalink |  | Top
NMDemDist2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 06:45 AM
Response to Original message
1. leveymg-please note DU's copyright rules
4. Copyrights: Do not copy-and-paste entire articles onto this discussion forum. When referencing copyrighted work, post a short excerpt (not exceeding 4 paragraphs) with a link back to the original.

Please edit your post, if the editing period has expired, the Administrators will edit it for you in the near future.

Thank you.

AZDD6, DU Moderator
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 07:12 AM
Response to Reply #1
2. OK
Printer Friendly | Permalink |  | Top
 
Moderator DU Moderator Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 07:26 AM
Response to Reply #1
3. leveymg
4. Copyrights: Do not copy-and-paste entire articles onto this discussion forum. When referencing copyrighted work, post a short excerpt (not exceeding 4 paragraphs) with a link back to the original.

Per DU rules, please limit your post to 4 paragraphs

Thank you
DU Moderator
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 07:40 AM
Response to Reply #3
4. Trimmed to order
Arkin's article now down to 4 paras. The section that follows is almost enetirely my post - I believe that is exempt from the copyright length rule.

My apologies for initially going over-length. Thank you for what you do.

- Mark
Printer Friendly | Permalink |  | Top
 
emad Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 08:43 AM
Response to Original message
5. Kick and nominate...
emad
Printer Friendly | Permalink |  | Top
 
bahrbearian Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 08:53 AM
Response to Original message
6. Very good.. Nominated.
Printer Friendly | Permalink |  | Top
 
sabra Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 08:54 AM
Response to Original message
7. kick for excellent analysis
:kick:
Printer Friendly | Permalink |  | Top
 
BurtWorm Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 09:15 AM
Response to Original message
8. kick
:kick:
Printer Friendly | Permalink |  | Top
 
Im with Rosey Donating Member (619 posts) Send PM | Profile | Ignore Thu Sep-29-05 10:01 AM
Response to Original message
9. Thank you
This is very co-hesive, we will do ourselves a great disservice if we don't become educated with the facts about this issue. We can't let this get lost in the daily latest outrages.
Printer Friendly | Permalink |  | Top
 
understandinglife Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-29-05 10:16 AM
Response to Original message
10. Excellent. Thank you.
Edited on Thu Sep-29-05 10:16 AM by understandinglife
I did not, for one second, believe that a deep intelligence program like Able Danger operated on only 'publicly available' data - not one second.


Peace.
Printer Friendly | Permalink |  | Top
 
emad Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-02-05 10:01 AM
Response to Original message
11. Clarke wants terrorists treated like victims of cult brainwashing
Clarke wants terrorists treated like victims of cult brainwashing
(Filed: 02/10/2005)

Charles Clarke is studying proposals to combat Islamic terrorist groups by treating them as religious cults.

The Home Secretary has told colleagues that anti-brainwashing techniques used to "deprogramme" cult members could be employed to fight the sort of fanaticism behind the July 7 bombings.

"What we know about other religious cults may offer some insight into how these men ended up behaving in this appalling way," he said last night.

He believes that there is no point in seeing extreme Islamists in the "classic" mould of revolutionaries fighting for a political cause. A closer parallel is with recruits to cults, who often come from educated backgrounds and are "brainwashed" into renouncing society.

One example, he said, was Mohammed Atta, the leader of the September 11 hijackers, who was an architecture graduate. Mohammed Sidique Khan, one of the London bombers, was a classroom assistant in Leeds and was married with a baby daughter.

The Home Secretary cited the work of Inform, an organisation specialising in cults, which emphasises the need to perceive how victims of brainwashing see their circumstances.

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/10/02/ncult02.xml&sSheet=/news/2005/10/02/ixhome.html
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Dec 26th 2024, 08:07 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Editorials & Other Articles Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC