SlideShare a Scribd company logo
PROBLEM 14-6AProblem 14-6A: Norwoods Borrowings1.
Total amount of each installment payment.Present value of an
ordinary annuity$200,000Interest per period(i)0.08Number of
periods(n)5Total amount of each installment
payment($50,091.29)Therefore the total amount of each
installment payment is $ 50,091.292.Norwoods Amortization
TablePeriod Ending DateBeginning balance Interest
expenseNotes PayableCash paymentEnding
Balance10/31/15$200,000.00$16,000.00$34,091.29$50,091.29$
165,908.7110/31/16$165,909.00$13,272.72$36,818.57$50,091.2
9$129,090.4310/31/17$129,090.43$10,327.23$39,764.06$50,09
1.29$89,326.3710/31/18$89,326.37$7,146.11$42,945.18$50,091
.29$46,381.1910/31/19$46,381.19$3,710.50$46,380.79$50,091.
29$0.403.a) Accrued interest as December 31st 2015Accrued
interest expense = $200,000*8%*2/12= $2,666.67. Thus the
journal entry is as shown below:DescriptionDr($)Cr($)interest
expense $2,666.67 Interest
payable $2,666.67b) The first annual payment
on the note.Ten more months of interest has accrued
$200,000*8%*10/12 =$13,333.33 accrued interest .Therefore
the journal entry is as shown below:DescriptionDr($)Cr($)Notes
payable$34,091.29interest expense$13,333.33interest
payable$2,666.67 Cash$50,091.29
PROBLEM 14-7AProblem 14-7AQuestion 1a) Debt to equity
ratiosPulaski CompanyScott Company Total
liabilities$360,000.00$240,000.00Total
Equity$500,000.00$200,000.00Debt-Equity
Ratio0.721.2Question 2The debt to equity ratio measures the
amount of debt a company uses has to finance its business for
every dollar of equity it has. A higher debt to equity ratio
implies that a company uses more debt than equity for
financing. In this case, the debt to equity ratio for Pulaski
Company is 0.72 which is less than 1 implying that the
stockholder's equity exceeds the amount of debt borrowed. Thus
Pulaski Company may not likely suffer from risks brought about
by huge amount of debts in the capital structure. On the other
hand, the debt to equity ratio of Scott Company is 1.2 which is
greater than 1 implying that the debt exceeds the totalamount
stockholders equity. Huge debts is associated with a lot of risks.
First, there is the risk of defaulting whereby the company may
be unable to repay its debt and therefore leading to bankruptcy.
Second, a company may find it difficult to obtain additional
funding from creditors.This is because the creditors prefer
companies with low debt to equity ratio. Finally, there is the
risks of violating the debt covenants. A covenant is an
agreement that requires a company to maintain adequate
financial ratio levels. Too much borrowings may violate this
covenant. Since ScottCompany has a higher debt to equity ratio,
it may experience these risks which may eventually lead to the
company being declared bankrupt .
PROBLEM 14-6BProblem 14-6B: Gordon Enterprises
Borrowings1. Total amount of each installment payment.Present
value of an ordinary annuity$150,000Interest per
period(i)0.1Number of periods(n)3Total amount of each
installment payment($60,317.22)Therefore the total amount of
each installment payment is $ 60,317.222.Gordons Enterprises
Amortization TablePeriod Ending DateBeginning balance
Interest expenseNotes PayableCash paymentEnding
Balance9/30/15$150,000.00$15,000.00$45,317.22$60,317.22$1
04,682.789/30/16$104,682.78$10,468.28$49,848.94$60,317.22$
54,833.849/30/17$54,833.84$5,483.38$54,833.84$60,317.22$0.
003.a) Accrued interest as December 31st 2015Accrued interest
expense = $150,000*10%*3/12= $3,750. The journal entry is as
shown below:DescriptionDr($)Cr($)Interest expense
$3,750.00 Interest payable
$3,750.00b) The first annual payment on the note.Nine more
months of interest has accrued $150,000*10%*9/12 =$11,250
accrued interest. Thus the journal entry is as shown below:
DescriptionDr($)Cr($)Notes payable$45,317.22interest
expense$11,250.00interest payable$3,750.00
Cash$60,317.22
PROBLEM 14-7BProblem 14-7BQuestion 1a) Debt to equity
ratiosAtlas CompanyBryan Company Total
liabilities$80,000.00$562,500.00Total
Equity$100,000.00$187,500.00Debt-Equity Ratio0.83Question
2The debt to equity ratio measures the amount of debt a
company uses has to finance its business for every dollar of
equity it has. A higher debt to equity ratio implies that a
company uses more debt than equity for financing. In this case,
the debt to equity ratio for Atlas Company is 0.80 which is less
than 1 implying that the stockholder's equity exceeds the
amount of debt. Thus Atlas Company may not likely suffer from
risks brought about by huge amount of debts in the capital
structure. On the other hand, the debt to equity ratio of Bryan
Company is 3.0 which is more than 1 implying that the debt
exceeds the totalamount stockholders equity. Huge debts is
associated with a lot of risks. First, there is the risk of
defaulting whereby the company may be unable to repay its debt
and therefore leading to bankruptcy. Second, a company may
find it difficult to obtain additional funding from creditors.This
is because the creditors companies prefer with low debt to
equity ratio. Finally, there is the risks of violating the debt
covenants. A covenant is an agreement that requires a company
to maintain adequate financial ratio levels. Too much
borrowings may violate this covenant. Since BryanCompany has
a higher debt to equity ratio, it may experience these risks.
CHAPTER 1
1
The Era of Homeland
Security
Our nation has been put on notice: We are not immune from
attack. We
will take defensive measures against terrorism to protect
Americans.
Today, dozens of federal departments and agencies, as well as
state and
local governments, have responsibilities affecting homeland
security.
President George W. Bush, September 20, 2001
(See Appendix B for full speech)
INTRODUCTION
On September 11, 2001, policing entered the era of homeland
security. Prior to the attack
on America by Osama bin Laden and his terrorist group, Al
Qaeda, on that fateful day,
policing in America recognized that various crime problems had
international implications,
but there was little acknowledgment of how these crimes would
impact state and local po-
lice directly. Issues such as international and transnational
crimes, particularly organized
and white-collar crime, and both drug and human trafficking,
were issues of concern, but
generally concerns for either the federal government and their
criminal justice assets or for
the international community. The realization that global
concerns, such as terrorism, were
indeed a state and local concern changed on September 11,
2001. That day policing in
America moved out of the community policing era and into the
era of homeland security.
To understand how this came about, it is important to first
review the threat that
Osama bin Laden and his terrorist organization, Al Qaeda,
posed to America prior to
September 11th. In addition, reviewing the actual events of the
attack helps place the
significance of that day in better context. Perhaps more
importantly, reviewing how the
local police responded to the attacks provides us some insight
into what the era of
Homeland Security means for policing. Therefore, this chapter
will review the threat, the
attack, and the response to better understand the significance of
the threat, see how that
attack moved American policing into the era of Homeland
Security, and provide the context
for understanding the role state and local police will play in this
new era.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
2 CHAPTER 1 The Era of Homeland Security
BOX 1-1
TERRORISM TIME LINE (ABBREVIATED)
PRIOR TO FIRST WORLD TRADE CENTER (1993)
Kidnappings of U.S. Citizens in Colombia, January 31, 1993:
Revolutionary Armed Forces of Colombia (FARC) terrorists
kidnapped three U.S.
missionaries.
Kidnapping of U.S. Businessmen in the Philippines, January
17–21, 1992:
A senior official of the corporation Philippine Geothermal was
kidnapped in Manila by
the Red Scorpion Group, and two U.S. businessmen were seized
independently by the
National Liberation Army and by Revolutionary Armed Forces
of Colombia (FARC).
Sniper Attack on the U.S. Embassy in Bonn, February 13, 1991:
Three Red Army Faction members fired automatic rifles from
across the Rhine River at
the U.S. Embassy Chancery. No one was hurt.
Attempted Iraqi Attacks on U.S. Posts, January 18–19, 1991:
Iraqi agents planted bombs at the U.S. ambassador to
Indonesia’s residence and at the
USIS library in Manila.
U.S. Soldiers Assassinated in the Philippines, May 13, 1990:
The New People’s Army (NPA) killed two U.S.Air Force
personnel near Clark Air Force
Base in the Philippines.
U.S. Embassy Bombed in Peru, January 15, 1990:
The Tupac Amaru Revolutionary Movement bombed the U.S.
Embassy in Lima, Peru.
Assassination of U.S.Army Officer, April 21, 1989:
The New People’s Army (NPA) assassinated Colonel James
Rowe in Manila.The NPA also
assassinated two U.S. government defense contractors in
September.
Pan Am 103 Bombing, December 21, 1988:
Pan American Airlines Flight 103 was blown up over Lockerbie,
Scotland, by a bomb believed
to have been placed on the aircraft by Libyan terrorists in
Frankfurt,West Germany. All 259
people on board were killed.
Attack on U.S. Diplomat in Greece, June 28, 1988:
The defense attaché of the U.S. Embassy in Greece was killed
when a car bomb was
detonated outside his home in Athens.
Naples USO Attack, April 14, 1988:
The Organization of Jihad Brigades exploded a car bomb
outside a USO club in Naples,
Italy, killing one U.S. sailor.
Kidnapping of William Higgins, February 17, 1988:
U.S. Marine Corps Lieutenant Colonel W. Higgins was
kidnapped and murdered by the
Iranian-backed Hizballah group while serving with the United
Nations Truce Supervisory
Organization (UNTSO) in southern Lebanon.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
INTRODUCTION 3
Servicemen’s Bar Attack, December 26, 1987:
Catalan separatists bombed a Barcelona bar frequented by U.S.
servicemen, resulting in
the death of one U.S. citizen.
Bus Attack, April 24, 1987:
Sixteen U.S. servicemen riding in a Greek Air Force bus near
Athens were injured in
an apparent bombing attack, carried out by the revolutionary
organization known as
November 17.
Berlin Discothèque Bombing, April 5, 1986:
Two U.S. soldiers were killed and 79 American servicemen
were injured in a Libyan bomb
attack on a nightclub in West Berlin, West Germany. In
retaliation U.S. military jets
bombed targets in and around Tripoli and Benghazi.
Aircraft Bombing in Greece, March 30, 1986:
A Palestinian splinter group detonated a bomb as TWA Flight
840 approached Athens air-
port, killing four U.S. citizens.
Airport Attacks in Rome and Vienna, December 27, 1985:
Four gunmen belonging to the Abu Nidal Organization attacked
the El Al and Trans
World Airlines ticket counters at Rome’s Leonardo da Vinci
Airport with grenades and
automatic rifles.Thirteen persons were killed and 75 were
wounded before Italian police
and Israeli security guards killed three of the gunmen and
captured the fourth. Three
more Abu Nidal gunmen attacked the El Al ticket counter at
Vienna’s Schwechat Airport,
killing three persons and wounding 30. Austrian police killed
one of the gunmen and
captured the others.
Egyptian Airliner Hijacking, November 23, 1985:
An EgyptAir airplane bound from Athens to Malta and carrying
several U.S. citizens was
hijacked by the Abu Nidal Group.
Achille Lauro Hijacking, October 7, 1985:
Four Palestinian Liberation Front terrorists seized the Italian
cruise liner in the eastern
Mediterranean Sea, taking more than 700 hostages. One U.S.
passenger was murdered
before the Egyptian government offered the terrorists safe
haven in return for the
hostages’ freedom.
Attack on a Restaurant in El Salvador, June 19, 1985:
Members of the FMLN (Farabundo Marti National Liberation
Front) fired on a restau-
rant in the Zona Rosa district of San Salvador, killing four
Marine security guards assigned
to the U.S. Embassy and nine Salvadorean civilians.
TWA Hijacking, June 14, 1985:
A Trans-World Airlines flight was hijacked en route to Rome
from Athens by two
Lebanese Hizballah terrorists and forced to fly to Beirut.The
eight crew members and
145 passengers were held for seventeen days, during which one
American hostage, a
U.S. Navy sailor, was murdered.After being flown twice to
Algiers, the aircraft was returned
to Beirut after Israel released 435 Lebanese and Palestinian
prisoners.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
4 CHAPTER 1 The Era of Homeland Security
Kidnapping of U.S. Officials in Mexico, February 7, 1985:
Under the orders of narcotrafficker Rafael Caro Quintero, Drug
Enforcement Adminis-
tration agent Enrique Camarena Salazar and his pilot were
kidnapped, tortured, and
executed.
Restaurant Bombing in Spain, April 12, 1984:
Eighteen U.S. servicemen were killed and 83 people were
injured in a bomb attack on a
restaurant near a U.S. Air Force base in Torrejon, Spain.
Kidnapping of Embassy Official, March 16, 1984:
The Islamic Jihad kidnapped and later murdered Political
Officer William Buckley in
Beirut, Lebanon. Other U.S. citizens not connected to the U.S.
government were seized
over a succeeding two-year period.
Naval Officer Assassinated in Greece, November 15, 1983:
A U.S. Navy officer was shot by the November 17 terrorist
group in Athens, Greece,
while his car was stopped at a traffic light.
Bombing of Marine Barracks, Beirut, October 23, 1983:
Simultaneous suicide truck-bomb attacks were made on
American and French com-
pounds in Beirut, Lebanon. A 12,000-pound bomb destroyed the
U.S. compound, killing
242 Americans, while 58 French troops were killed when a 400-
pound device destroyed
a French base. Islamic Jihad claimed responsibility.
Naval Officer Assassinated in El Salvador, May 25, 1983:
A U.S. Navy officer was assassinated by the Farabundo Marti
National Liberation Front.
Bombing of U.S. Embassy in Beirut, April 18, 1983:
Sixty-three people, including the CIA’s Middle East director,
were killed and 120 were in-
jured in a 400-pound suicide truck-bomb attack on the U.S.
Embassy in Beirut, Lebanon.
The Islamic Jihad claimed responsibility.
Colombian Hostage-taking, April 8, 1983:
A U.S. citizen was seized by the Revolutionary Armed Forces of
Colombia (FARC) and
held for ransom.
Murder of Missionaries, December 4, 1981:
Three American nuns and one lay missionary were found
murdered outside San Salvador,
El Salvador.They were killed by members of the National
Guard, and the killers are cur-
rently in prison.
Assassination of Egyptian President, October 6, 1981:
Soldiers who were secretly members of the Takfir Wal-Hajira
sect attacked and killed
Egyptian President Anwar Sadat during a troop review.
U.S. Installation Bombing, August 31, 1981:
The Red Army exploded a bomb at the U.S. Air Force Base at
Ramstein, West Germany.
Grand Mosque Seizure, November 20, 1979:
200 Islamic terrorists seized the Grand Mosque in Mecca, Saudi
Arabia, taking hundreds
of pilgrims hostage. Saudi and French security forces retook the
shrine after an intense
battle in which some 250 people were killed and 600 wounded.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
INTRODUCTION 5
Iran Hostage Crisis, November 4, 1979:
After President Carter agreed to admit the Shah of Iran into the
United States, Iranian
radicals seized the U.S. Embassy in Tehran and took 66
American diplomats hostage.Thir-
teen hostages were soon released, but the remaining 53 were
held until their release on
January 20, 1981.
Ambassador to Afghanistan Assassinated, February 14, 1979:
Four Afghans kidnapped U.S. Ambassador Adolph Dubs in
Kabul and demanded the re-
lease of various “religious figures.” Dubs was killed, along with
four alleged terrorists,
when Afghan police stormed the hotel room where he was being
held.
Assassination of Former Chilean Diplomat, September 21, 1976:
Exiled Chilean Foreign Minister Orlando Letelier was killed by
a car bomb in Washington.
Domestic Terrorism, January 27–29, 1975:
Puerto Rican nationalists bombed a Wall Street bar, killing four
and injuring 60; two days
later, the Weather Underground claims responsibility for an
explosion in a bathroom at
the U.S. Department of State in Washington.
Ambassador to Cyprus Assassinated, August 19, 1974:
U.S. Ambassador to Cyprus Rodger P. Davies and his Greek
Cypriot secretary were shot
and killed by snipers during a demonstration outside the U.S.
Embassy in Nicosia.
Attack and Hijacking at the Rome Airport, December 17, 1973:
Five terrorists pulled weapons from their luggage in the
terminal lounge at the Rome
airport, killing two persons. They then attacked a Pan American
707 bound for Beirut
and Tehran, destroying it with incendiary grenades and killing
29 persons, including 4
senior Moroccan officials and 14 American employees of
ARAMCO.They then herded
5 Italian hostages into a Lufthansa airliner and killed an Italian
customs agent as he tried
to escape, after which they forced the pilot to fly to Beirut.
After Lebanese authorities
refused to let the plane land, it landed in Athens, where the
terrorists demanded the
release of 2 Arab terrorists. In order to make Greek authorities
comply with their de-
mands, the terrorists killed a hostage and threw his body onto
the tarmac.The plane then
flew to Damascus, where it stopped for two hours to obtain fuel
and food. It then flew
to Kuwait, where the terrorists released their hostages in return
for passage to an un-
known destination. The Palestine Liberation Organization
disavowed the attack, and no
group claimed responsibility for it.
Consul General in Mexico Kidnapped, May 4, 1973:
U.S. Consul General in Guadalajara,Terrence Leonhardy, was
kidnapped by members of
the People’s Revolutionary Armed Forces.
Ambassador to Sudan Assassinated, March 2, 1973:
U.S. Ambassador to Sudan, Cleo A. Noel, and other diplomats
were assassinated at the
Saudi Arabian Embassy in Khartoum by members of the Black
September organization.
Munich Olympic Massacre, September 5, 1972:
Eight Palestinian “Black September” terrorists seized eleven
Israeli athletes in the
Olympic Village in Munich,West Germany. In a bungled rescue
attempt by West German
authorities, nine of the hostages and five terrorists were killed.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
6 CHAPTER 1 The Era of Homeland Security
“Bloody Friday,” July 21, 1972:
An Irish Republican Army (IRA) bomb attack killed eleven
people and injured 130 in
Belfast, Northern Ireland. Ten days later, three IRA car bomb
attacks in the village of
Claudy left six dead.
U.S. Agency for International Development Adviser Kidnapped,
July 31, 1970:
In Montevideo, Uruguay, the Tupamaros terrorist group
kidnapped AID Police adviser Dan
Mitrione; his body was found on August 10.
Ambassador to Brazil Kidnapped, September 3, 1969:
U.S. Ambassador to Brazil Charles Burke Elbrick was
kidnapped by the Marxist revolu-
tionary group MR-8.
Ambassador to Japan Attacked, July 30, 1969:
U.S. Ambassador to Japan, A. H. Meyer, was attacked by a
knife-wielding Japanese citizen.
Ambassador to Guatemala Assassinated, August 28, 1968:
U.S. Ambassador to Guatemala, John Gordon Mein, was
murdered by a rebel faction
when gunmen forced his official car off the road in Guatemala
City and raked the vehi-
cle with gunfire.
First U.S. Aircraft Hijacked, May 1, 1961:
Puerto Rican born Antuilo Ramierez Ortiz forced at gunpoint a
National Airlines plane
to fly to Havana, Cuba, where he was given asylum.
Source: U.S. Army—Timeline of Terrorism,Available online at
http://www.army.mil/terrorism
THE THREAT—AL QAEDA
Thomas Friedman, a columnist for the New York Times, argued
in an op-ed piece that
America in the 1990s experienced the growth of three bubbles,
all of which burst at the
beginning of the twenty-first century.1 The three bubbles
included the stock market,
corporate governance, and terrorism. The first bubble burst
when the various dot-com
organizations became greatly inflated in the 1990s, and the
stock market simply adjusted
their values downward in 2000. The second bubble burst at
about the same time, when
a number of ethical lapses were allowed to go unchecked
throughout the 1990s until the
illegal activities of corporate firms Enron and Arthur Andersen
were revealed. The third
bubble burst on September 11, 2001, and resulted from the
terrorism bubble that was
allowed to grow during the 1990s.
The terrorism bubble, Friedman asserted, “started with the
suicide bombings
against U.S. troops in Saudi Arabia, was followed by attacks on
the U.S. Embassies in
East Africa and on the USS Cole, then ballooned with the rise
of Palestinian suicide ter-
rorism in Israel and finally peaked with Al Qaeda’s attack on
9/11.”2 Friedman traced
most of what led up to the third bubble as being the result of
Osama bin Laden and the
terrorist organization Al Qaeda’s ability to grow in power
unchecked during the 1990s.
He explained that like the other two bubbles, “the terrorism
bubble was the product of
a kind of temporary insanity, in which basic norms were ignored
and excessive behavior IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE THREAT—AL QAEDA 7
was justified by new theories.”3 The threat of Al Qaeda was
ultimately what led to the
bubble bursting and ushering in the post–September 11th world,
or as Friedman calls it,
the “post-bubble world.”4 Understanding the origin of this
threat, namely Osama bin
Laden and his terrorist network Al Qaeda, and how this threat
developed is important to
understanding what led us into the era of Homeland Security.
The Bubble Forms
Al Qaeda was founded by Osama bin Laden in Afghanistan in
1988.5 Osama bin Laden
was born in July 1957, the seventeenth of twenty sons of a
Saudi construction magnate
of Yemeni origin. Many Saudis were conservative Sunni
Muslims, and bin Laden adopted
militant Islamist views while studying at King Abdul Aziz
University in Jeddah, Saudi
Arabia. There he studied Islam under Muhammad Qutb, brother
of Sayyid Qutb, the key
idealogue of a major Sunni Islamist movement, the Muslim
Brotherhood.6 Another of
bin Laden’s instructors was a major figure in the Jordanian
branch of the Muslim Brother-
hood, Dr. Abdullah Azzam. Azzam has been identified by some
experts as the intellectual
architect of the jihad against the 1979–1989 Soviet occupation
of Afghanistan and ultimately
of Al Qaeda itself;7 he cast the Soviet invasion as an attempted
conquest by a non-Muslim
power of sacred Muslim territory and people.
Bin Laden went to Afghanistan shortly after the December 1979
Soviet invasion and
joined Azzam there. He reportedly used some of his personal
funds8 to establish himself
as a donor to the Afghan mujahedin and a recruiter of Arab and
other Islamic volunteers
for the war. In 1984 Azzam and bin Laden structured this
assistance by establishing a net-
work of recruiting and fund-raising offices in the Arab world,
Europe, and the United
States. That network was called the Maktab al-Khidamat
(Services Office), also known as
Al Khifah; many experts consider the Maktab network to be the
organizational forerun-
ner of Al Qaeda. Another major figure who utilized the Maktab
network to recruit for the
anti-Soviet jihad was Umar Abd al-Rahman (also known as “the
blind shaykh”), the spir-
itual leader of radical Egyptian Islamist group Al Jihad. Bin
Laden also fought in the anti-
Soviet war, participating in a 1986 battle in Jalalabad and, more
notably, a 1987 frontal
assault by foreign volunteers against Soviet armor. Bin Laden
has said he was exposed to
a Soviet chemical attack and slightly injured in that battle.9
During this period, most U.S. officials perceived the volunteers
as positive contrib-
utors to the effort to expel Soviet forces from Afghanistan, and
U.S. officials made no ap-
parent effort to stop the recruitment of non-Afghan volunteers
for the war. U.S. officials
have repeatedly denied that the United States directly supported
the volunteers, al-
though the United States did covertly finance (about $3 billion
during 1981–1991) and
arm (via Pakistan) the Afghan mujahedin factions, particularly
the Islamic fundamentalist
Afghan factions, fighting Soviet forces. At this time, neither bin
Laden, Azzam, nor
Abd al-Rahman was known to have openly advocated,
undertaken, or planned any di-
rect attacks against the United States, although they were
critical of U.S. support for
Israel in the Middle East.
In 1988, toward the end of the Soviet occupation, bin Laden and
Azzam began
contemplating how, and to what end, to utilize the Islamist
volunteer network they
had organized. U.S. intelligence estimates of the size of that
network was about 10,000
to 20,000, although not all of these necessarily supported or
joined Al Qaeda terrorist
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
8 CHAPTER 1 The Era of Homeland Security
activities.10 Azzam reportedly wanted this “Al Qaeda” (Arabic
for “the base”) organiza-
tion to become an Islamic “rapid reaction force,” available to
intervene wherever Mus-
lims were perceived to be threatened. Bin Laden differed with
Azzam, hoping instead to
dispatch the Al Qaeda activists to their home countries to try to
topple secular, pro-Western
Arab leaders, such as President Hosni Mubarak of Egypt and
Saudi Arabia’s royal family.
Some attribute their differences to the growing influence on bin
Laden by the Egyptians
in his inner circle, such as Abd al-Rahman, who wanted to use
Al Qaeda’s resources to
install an Islamic state in Egypt. Another close Egyptian
confidant was Dr. Ayman al-
Zawahiri, operational leader of Al Jihad in Egypt. Like Abd al-
Rahman, Zawahiri had
been imprisoned but ultimately acquitted for the October 1981
assassination of Egypt-
ian President Anwar Sadat, and he permanently left Egypt for
Afghanistan in 1985.
There, he used his medical training to tend to wounded fighters
in the anti-Soviet war. In
November 1989, Azzam was assassinated, and some allege that
bin Laden might have
been responsible for the killing to resolve this power struggle.
Following Azzam’s
death, bin Laden gained control of the Maktab’s funds and
organizational mechanisms.
Abd al-Rahman later came to the United States and was
convicted in October 1995 for
terrorist plots related to the February 1993 bombing of the
World Trade Center. Zawahiri
stayed with bin Laden to serve as bin Laden’s main strategist;
he is believed to still be
serving in that role today.
The Bubble Grows
The August 2, 1990, Iraqi invasion of Kuwait apparently turned
bin Laden from a de facto
U.S. ally against the Soviet Union into one of its most active
adversaries.11 Bin Laden had
returned home to Saudi Arabia in 1989 after the completion of
the Soviet withdrawal
from Afghanistan that February. While back home, he lobbied
Saudi officials not to host
the 500,000 U.S. combat troops that defended Saudi Arabia
from the Iraqi invasion and
ultimately expelled Iraq from Kuwait in Operation Desert Storm
(January 17–February
28, 1991). He argued instead for the raising of a “mujahedin”
army to oust Iraq from
Kuwait, but his idea was rebuffed as impractical, causing a
falling out with Saudi leaders.
He relocated to Sudan in 1991, buying property there that he
used to host and train Al
Qaeda militants—this time, for use against the United States
and its interests, as well as
for jihad operations in the Balkans, Chechnya, Kashmir, and the
Phillipines. He re-
mained there until the Sudanese government, under U.S. and
Egyptian pressure, ex-
pelled him in May 1996; he then returned to Afghanistan and
helped the Taliban gain
and maintain control of Afghanistan. The Taliban would capture
the capital, Kabul, in
September of 1996.
Bin Laden and Zawahiri apparently believed that the only way
to bring Islamic
regimes to power was to oust from the region the perceived
backer of secular regional
regimes, the United States. During the 1990s, bin Laden and
Zawahiri transformed Al
Qaeda into a global threat to U.S. national security by engaging
in a number of attacks
against the United States and its interests. In 1992, Al Qaeda
claimed responsibility for
bombing a hotel in Yemen where 100 U.S. military personnel
were awaiting deployment
to Somalia for Operation Restore Hope. No one was killed.
However, Al Qaeda was re-
sponsible for the tragedy that subsequently followed during this
operation in Somalia. Al
Qaeda claimed responsibility for arming Somali factions, who
battled U.S. forces there
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE THREAT—AL QAEDA 9
BOX 1-2
TERRORISM TIME LINE (ABBREVIATED)
FIRST WORLD TRADE CENTER (1993) TO SEPTEMBER 11,
2001
Philippines Hostage Incident, May 27, 2001:
Muslim Abu Sayyaf guerrillas seized 13 tourists and 3 staff
members at a resort on Palawan
Island and took their captives to Basilan Island.The captives
included three U.S. citizens:
Guellermo Sobero and missionaries Martin and Gracia
Burnham. Philippine troops fought
a series of battles with the guerrillas between June 1 and June 3,
during which nine
hostages escaped and two were found dead.The guerrillas took
additional hostages when
they seized the hospital in the town of Lamitan. On June 12,
Abu Sayyaf spokesman Abu
Sabaya claimed that Sobero had been killed and beheaded; his
body was found in Octo-
ber.The Burnhams remained in captivity until June 2002.
Manila Bombing, December 30, 2000:
A bomb exploded in a plaza across the street from the U.S.
Embassy in Manila, injuring
nine persons. The Moro Islamic Liberation Front was likely
responsible.
Helicopter Hijacking, October 12, 2000:
In Sucumbios Province, Ecuador, a group of armed kidnappers
led by former members of
defunct Colombian terrorist organization the Popular Liberation
Army (EPL) took
hostage 10 employees of Spanish energy consortium
REPSOL.Those kidnapped included
five U.S. citizens, one Argentine, one Chilean, one New
Zealander, and two French pilots,
who escaped four days later. On January 30, 2001, the
kidnappers murdered American
hostage Ronald Sander.The remaining hostages were released on
February 23 following
the payment of $13 million in ransom by the oil companies.
Attack on USS Cole, October 12, 2000:
In Aden,Yemen, a small dinghy carrying explosives rammed the
destroyer USS Cole, killing
seventeen sailors and injuring 39 others. Supporters of Osama
bin Laden were suspected.
Church Bombing in Tajikistan, October 1, 2000:
Unidentified militants detonated two bombs in a Christian
church in Dushanbe, killing seven
persons and injuring 70 others.The church was founded by a
Korean-born U.S. citizen, and
most of those killed and wounded were Korean. No one claimed
responsibility.
Kidnappings in Kyrgyzstan, August 12, 2000:
In the Kara-Su Valley, the Islamic Movement of Uzbekistan
took four U.S. citizens hostage.
The Americans escaped on August 12.
ELN Kidnapping, June 27, 2000:
In Bogota, Colombia, ELN militants kidnapped a five-year-old
U.S. citizen and his Colombian
mother, demanding an undisclosed ransom.
RUF Attacks on U.N. Mission Personnel, May 1, 2000:
On May 1 in Makeni, Sierra Leone, Revolutionary United Front
(RUF) militants kidnapped
at least 20 members of the United Nations Assistance Mission in
Sierra Leone (UNAMSIL)
and surrounded and opened fire on a UNAMSIL facility,
according to press reports.The
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
10 CHAPTER 1 The Era of Homeland Security
militants killed five UN soldiers in the attack. RUF militants
kidnapped 300 UNAMSIL
peacekeepers throughout the country, according to press reports.
On May 15 in Foya,
Liberia, the kidnappers released 139 hostages. On May 28 on
the Liberia and Sierra Leone
border, armed militants released unharmed the last of the UN
peacekeepers.
PLA Kidnapping, December 23, 1999:
Colombian People’s Liberation Army (PLA) forces kidnapped a
U.S. citizen in an unsuc-
cessful ransoming effort.
Burmese Embassy Seizure, October 1, 1999:
Burmese dissidents seized the Burmese Embassy in
Bangkok,Thailand, taking 89 persons
hostage, including one U.S. citizen.
AFRC Kidnappings,August 4, 1999:
An Armed Forces Revolutionary Council (AFRC) faction
kidnapped 33 UN representa-
tives near Occra Hills, Sierra Leone. The hostages included one
U.S. citizen, five British
soldiers, one Canadian citizen, one representative from Ghana,
one military officer from
Russia, one officer from Kyrgystan, one officer from Zambia,
one officer from Malaysia, a
local bishop, two UN officials, two local journalists, and 16
Sierra Leonean nationals.
Shell Platform Bombing, June 27, 1999:
In Port Harcourt, Nigeria, armed youths stormed a Shell oil
platform, kidnapping one U.S.
citizen, one Nigerian national, and one Australian citizen and
causing undetermined dam-
age. A group calling itself “Enough is Enough in the Niger
River” claimed responsibility.
Further seizures of oil facilities followed.
ELN Hostage-taking, May 30, 1999:
In Cali, Colombia, armed ELN militants attacked a church in the
neighborhood of Ciudad
Jardin, kidnapping 160 persons, including six U.S. citizens and
one French national. The
rebels released approximately 80 persons, including three U.S.
citizens, later that day.
ELN Hostage-taking, March 23, 1999:
Armed guerrillas kidnapped a U.S. citizen in Boyaca, Colombia.
The National Liberation
Army (ELN) claimed responsibility and demanded $400,000
ransom. On 20 July, ELN
rebels released the hostage unharmed following a ransom
payment of $48,000.
Hutu Abductions, March 1, 1999:
150 armed Hutu rebels attacked three tourist camps in Uganda,
killed four Ugandans, and
abducted three U.S. citizens, six Britons, three New Zealanders,
two Danish citizens, one
Australian, and one Canadian national. Two of the U.S. citizens
and six of the other
hostages were subsequently killed by their abductors.
FARC Kidnappings, February 25, 1999:
FARC kidnapped three U.S. citizens working for the Hawaii-
based Pacific Cultural Con-
servancy International. On March 4, the bodies of the three
victims were found in
Venezuela.
Ugandan Rebel Attack, February 14, 1999:
A pipe bomb exploded inside a bar, killing five persons and
injuring 35 others. One
Ethiopian and four Ugandan nationals died in the blast, and one
U.S. citizen working for
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE THREAT—AL QAEDA 11
USAID, two Swiss nationals, one Pakistani, one Ethiopian, and
27 Ugandans were injured.
Ugandan authorities blamed the attack on the Allied Democratic
Forces (ADF).
Angolan Aircraft Downing, January 2, 1999:
A UN plane carrying one U.S. citizen, four Angolans, two
Philippine nationals, and one
Namibian was shot down, according to a UN official. No deaths
or injuries were reported.
Angolan authorities blamed the attack on National Union for the
Total Independence of
Angola (UNITA) rebels. UNITA officials denied shooting down
the plane.
Armed Kidnapping in Colombia, November 15, 1998:
Armed assailants followed a U.S. businessman and his family
home in Cundinamarca De-
partment and kidnapped his 11-year-old son after stealing
money, jewelry, one automo-
bile, and two cell phones.The kidnappers demanded $1 million
in ransom. On January 21,
1999, the kidnappers released the boy.
Colombian Pipeline Bombing, October 18, 1998:
A National Liberation Army (ELN) planted bomb exploded on
the Ocensa pipeline in An-
tioquia Department, killing approximately 71 persons and
injuring at least 100 others.The
pipeline is jointly owned by the Colombia State Oil Company
Ecopetrol and a consor-
tium including U.S., French, British, and Canadian companies.
U.S. Embassy Bombings in East Africa, August 7, 1998:
A bomb exploded at the rear entrance of the U.S. Embassy in
Nairobi, Kenya, killing
12 U.S. citizens, 32 Foreign Service Nationals (FSNs), and 247
Kenyan citizens. Ap-
proximately 5,000 Kenyans, 6 U.S. citizens, and 13 FSNs were
injured.The U.S. Embassy
building sustained extensive structural damage. Almost
simultaneously, a bomb deto-
nated outside the U.S. Embassy in Dar es Salaam,Tanzania,
killing 7 FSNs and 3 Tanzanian
citizens, and injuring 1 U.S. citizen and 76 Tanzanians. The
explosion caused major
structural damage to the U.S. Embassy facility. The U.S.
Government held Osama bin
Laden responsible.
Somali Hostage-takings, April 15, 1998:
Somali militiamen abducted nine Red Cross and Red Crescent
workers at an airstrip
north of Mogadishu.The hostages included a U.S. citizen, a
German, a Belgian, a French, a
Norwegian, two Swiss, and one Somali.The gunmen were
members of a subclan loyal to
Ali Mahdi Mohammed, who controlled the northern section of
the capital.
FARC Abduction, March 21–23, 1998:
FARC rebels kidnapped a U.S. citizen in Sabaneta, Colombia.
FARC members also killed
3 persons, wounded 14, and kidnapped at least 27 others at a
roadblock near Bogota.
Four U.S. citizens and one Italian were among those kidnapped,
as well as the acting pres-
ident of the National Electoral Council (CNE) and his wife.
Murder of U.S. Businessmen in Pakistan, November 12, 1997:
Two unidentified gunmen shot to death four U.S. auditors from
Union Texas Petroleum
Corporation and their Pakistani driver after they drove away
from the Sheraton Hotel in
Karachi.The Islami Inqilabi Council, or Islamic Revolutionary
Council, claimed responsi-
bility in a call to the U.S. Consulate in Karachi. In a letter to
Pakistani newspapers, the
Aimal Khufia Action Committee also claimed responsibility.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
12 CHAPTER 1 The Era of Homeland Security
Yemeni Kidnappings, October 30, 1997:
Al-Sha’if tribesmen kidnapped a U.S. businessman near
Sanaa.The tribesmen sought the
release of two fellow tribesmen who were arrested on smuggling
charges and several
public works projects they claim the government promised
them. They released the
hostage on November 27.
Israeli Shopping Mall Bombing, September 4, 1997:
Three suicide bombers of HAMAS detonated bombs in the Ben
Yehuda shopping mall in
Jerusalem, killing eight persons, including the bombers, and
wounding nearly 200 others.
A dual U.S./Israeli citizen was among the dead, and 7 U.S.
citizens were wounded.
Hotel Nacional Bombing, July 12, 1997:
A bomb exploded at the Hotel Nacional in Havana, injuring
three persons and causing
minor damage. A previously unknown group calling itself the
Military Liberation Union
claimed responsibility.
FARC Kidnapping, March 7, 1997:
FARC guerrillas kidnapped a U.S. mining employee and his
Colombian colleague, who
were searching for gold in Colombia. On November 16, the
rebels released the two
hostages after receiving a $50,000 ransom.
ELN Kidnapping, February 24, 1997:
National Liberation Army (ELN) guerrillas kidnapped a U.S.
citizen employed by a Las Ve-
gas gold corporation, who was scouting a gold mining operation
in Colombia. The ELN
demanded a ransom of $2.5 million.
Empire State Building Sniper Attack, February 23, 1997:
A Palestinian gunman opened fire on tourists at an observation
deck atop the Empire
State Building in New York City, killing a Danish national and
wounding visitors from the
United States, Argentina, Switzerland, and France before
turning the gun on himself. A
handwritten note carried by the gunman claimed this was a
punishment attack against
the “enemies of Palestine.”
Venezuelan Abduction, February 14, 1997:
Six armed Colombian guerrillas kidnapped a U.S. oil engineer
and his Venezuelan pilot in
Apure,Venezuela.The kidnappers released the Venezuelan pilot
on February 22. Accord-
ing to authorities, the FARC is responsible for the kidnapping.
Egyptian Letter Bombs, January 2–13, 1997:
A series of letter bombs with Alexandria, Egypt, postmarks
were discovered at Al-Hayat
newspaper bureaus in Washington, New York City, London, and
Riyadh, Saudi Arabia.
Three similar devices, also postmarked in Egypt, were found at
a prison facility in Leav-
enworth, Kansas. Bomb disposal experts defused all the devices,
but one detonated at the
Al-Hayat office in London, injuring two security guards and
causing minor damage.
Tupac Amaru Seizure of Diplomats, December 17, 1996:
Twenty-three members of the Tupac Amaru Revolutionary
Movement (MRTA) took sev-
eral hundred people hostage at a party given at the Japanese
Ambassador’s residence in
Lima, Peru. Among the hostages were several U.S. officials,
foreign ambassadors, and other
diplomats, Peruvian Government officials, and Japanese
businessmen.The group demanded
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE THREAT—AL QAEDA 13
the release of all MRTA members in prison and safe passage for
them and the hostage
takers.The terrorists released most of the hostages in December
but held 81 Peruvians
and Japanese citizens for several months.
Abduction of US. Citizen by FARC, December 11, 1996:
Five armed men claiming to be members of the Revolutionary
Armed Forces of Colom-
bia (FARC) kidnapped and later killed a U.S. geologist at a
methane gas exploration site
in La Guajira Department.
Paris Subway Explosion, December 3, 1996:
A bomb exploded aboard a Paris subway train as it arrived at
the Port Royal station, killing
two French nationals, a Moroccan, and a Canadian and injuring
86 persons.Among those
injured were one U.S. citizen and a Canadian. No one claimed
responsibility for the at-
tack, but Algerian extremists are suspected.
Red Cross Worker Kidnappings, November 1, 1996:
In Sudan a breakaway group from the Sudanese People’s
Liberation Army (SPLA) kid-
napped three International Committee of the Red Cross (ICRC)
workers, including a U.S.
citizen, an Australian, and a Kenyan. On December 9 the rebels
released the hostages in
exchange for ICRC supplies and a health survey for their camp.
PUK Kidnapping, September 13, 1996:
In Iraq, Patriotic Union of Kurdistan (PUK) militants kidnapped
four French workers for
Pharmaciens Sans Frontieres, a Canadian United Nations High
Commissioner for
Refugees (UNHCR) official, and two Iraqis.
Sudanese Rebel Kidnapping, August 17, 1996:
Sudan People’s Liberation Army (SPLA) rebels kidnapped six
missionaries in Mapourdit,
including a U.S. citizen, an Italian, three Australians, and a
Sudanese.The SPLA released the
hostages 11 days later.
Khobar Towers Bombing, June 25, 1996:
A fuel truck carrying a bomb exploded outside the U.S.
military’s Khobar Towers hous-
ing facility in Dhahran, killing 19 U.S. military personnel and
wounding 515 persons, in-
cluding 240 U.S. personnel. Several groups claimed
responsibility for the attack.
Zekharya Attack, June 9, 1996:
Unidentified gunmen opened fire on a car near Zekharya, killing
a dual U.S./Israeli citizen
and an Israeli.The Popular Front for the Liberation of Palestine
(PFLP) was suspected.
AID Worker Abduction, May 31, 1996:
A gang of former Contra guerrillas kidnapped a U.S. employee
of the Agency for Inter-
national Development (AID) who was assisting with election
preparations in rural north-
ern Nicaragua. She was released unharmed the next day after
members of the
international commission overseeing the preparations
intervened.
West Bank Attack, May 13, 1996:
Arab gunmen opened fire on a bus and a group of Yeshiva
students near the Bet El set-
tlement, killing a dual U.S./Israeli citizen and wounding three
Israelis. No one claimed re-
sponsibility for the attack, but HAMAS was suspected.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
14 CHAPTER 1 The Era of Homeland Security
Dizengoff Center Bombing, March 4, 1996:
HAMAS and the Palestine Islamic Jihad (PIJ) both claimed
responsibility for a bombing
outside Tel Aviv’s largest shopping mall that killed 20 persons
and injured 75 others, in-
cluding 2 U.S. citizens.
HAMAS Bus Attack, February 26, 1996:
In Jerusalem, a suicide bomber blew up a bus, killing 26
persons, including three U.S. citi-
zens, and injuring some 80 persons, including three other U.S.
citizens.
ELN Kidnapping, February 16, 1996:
Six alleged National Liberation Army (ELN) guerrillas
kidnapped a U.S. citizen in Colombia.
After nine months, the hostage was released.
Athens Embassy Attack, February 15, 1996:
Unidentified assailants fired a rocket at the U.S. Embassy
compound in Athens, causing mi-
nor damage to three diplomatic vehicles and some surrounding
buildings. Circumstances
of the attack suggested it was an operation carried out by the 17
November group.
IRA Bombing, February 9, 1996:
An Irish Republican Army (IRA) bomb detonated in London,
killing 2 persons and wound-
ing more than 100 others, including 2 U.S. citizens.
Tamil Tigers Attack, January 31, 1996:
Members of the Liberation Tigers of Tamil Eelam (LTTE)
rammed an explosives-laden
truck into the Central Bank in the heart of downtown Colombo,
Sri Lanka, killing 90 civil-
ians and injuring more than 1,400 others, including 2 U.S.
citizens.
Kidnapping in Colombia, January 19, 1996:
Revolutionary Armed Forces of Colombia (FARC) guerrillas
kidnapped a U.S. citizen and
demanded a $1 million ransom.The hostage was released on
May 22.
Saudi Military Installation Attack, November 13, 1995:
The Islamic Movement of Change planted a bomb in a Riyadh
military compound that
killed one U.S. citizen, several foreign national employees of
the U.S. government, and over
40 others.
Attack on U.S. Embassy in Moscow, September 13, 1995:
A rocket-propelled grenade was fired through the window of the
U.S. Embassy in
Moscow, ostensibly in retaliation for U.S. strikes on Serb
positions in Bosnia.
Jerusalem Bus Attack, August 21, 1995:
HAMAS claimed responsibility for the detonation of a bomb
that killed 6 and injured over
100 persons, including several U.S. citizens.
Kashmiri Hostage-taking, July 4, 1995:
In India six foreigners, including two U.S. citizens, were taken
hostage by Al-Faran, a Kash-
miri separatist group. One non–U.S. hostage was later found
beheaded.
Bombing of the Federal Building in Oklahoma City, April 19,
1995:
Right-wing extremists Timothy McVeigh and Terry Nichols
destroyed the Federal Build-
ing in Oklahoma City with a massive truck bomb that killed 166
and injured hundreds
more in what was up to then the largest terrorist attack on
American soil.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE THREAT—AL QAEDA 15
Attack on U.S. Diplomats in Pakistan, March 8, 1995:
Two unidentified gunmen killed two U.S. diplomats and
wounded a third in Karachi, Pakistan.
FARC Hostage-taking, September 23, 1994:
FARC rebels kidnapped U.S. citizen Thomas Hargrove in
Colombia.
Hebron Massacre, February 25, 1994:
Jewish right-wing extremist and U.S. citizen Baruch Goldstein
machine-gunned Moslem
worshippers at a mosque in the West Bank town of Hebron,
killing 29 and wounding
about 150.
Attempted Assassination of President Bush by Iraqi Agents,
April 14, 1993:
The Iraqi intelligence service attempted to assassinate former
U.S. President George
Bush during a visit to Kuwait. In retaliation, the U.S. launched
a cruise missile attack two
months later on the Iraqi capital Baghdad.
World Trade Center Bombing, February 26, 1993:
The World Trade Center in New York City was badly damaged
when a car bomb planted
by Islamic terrorists exploded in an underground garage. The
bomb left 6 people dead
and 1,000 injured.The men carrying out the attack were
followers of Umar Abd al-Rah-
man, an Egyptian cleric who preached in the New York City
area.
Source: U.S.Army—Timeline of Terrorism, Available on-line at
http://www.army.mil/terrorism
in October 1993 and who killed 18 U.S. special operation forces
in Mogadishu in October
1993, as depicted in the book and movie by the same title,
Black Hawk Down.
Earlier that same year, Al Qaeda was involved in a more direct
attack on the United
States and its first on American soil. A growing body of
information about central figures
in the February 1993 bombing of the World Trade Center in
New York City, particularly
the reputed key bomb maker Ramzi Ahmad Yusef, suggests
possible Al Qaeda involve-
ment. As noted earlier, Abd Al-Rahman was convicted for plots
related to this attack.
The next attack by Al Qaeda came in June of 1995, in Ethiopia,
when operatives of
Al Qaeda allegedly aided the Egyptian militant Islamic Group in
a nearly successful as-
sassination attempt against the visiting Egyptian President
Hosni Mubarak. That fall, Al
Qaeda would strike America in Saudi Arabia. The four Saudi
nationals who confessed to
a November 1995 bombing of a U.S. military advisory facility
in Riyadh, Saudi Arabia,
claimed on Saudi television to have been inspired by bin Laden.
Five Americans were
killed in that attack. In addition, it is commonly believed that
another attack on Ameri-
cans in Saudi Arabia that occurred the next year was also by Al
Qaeda. Specifically, the
9/11 Commission report indicates that Al Qaeda might have had
a hand in the June 1996
bombing of the Khobar Towers complex near Dhahran, Saudi
Arabia, although FBI of-
ficials have attributed the attack primarily to Shiite Saudi
dissidents working with Iran-
ian agents. Nineteen U.S. airmen were killed.
The next attack that Al Qaeda is alleged to have been
responsible for was the August
1998 bombings of U.S. embassies in Kenya and Tanzania, which
killed about 300. On Au-
gust 20, 1998, two weeks after the attacks, the United States
launched a cruise missile
strike against bin Laden’s training camps in Afghanistan,
reportedly missing him by a few
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
16 CHAPTER 1 The Era of Homeland Security
hours. In July 1999 President Clinton imposed a ban on U.S.
trade with Taliban-controlled
Afghanistan and froze Taliban assets in the United States. Then,
in December 1999, U.S.
and Jordanian authorities separately thwarted related Al Qaeda
plots against religious
sites in Jordan and apparently against the Los Angeles
International Airport. This
prompted the issuance of UN Security Council Resolution 1333,
on December 19, 2000,
which banned any arms shipments or provision of military
advice to the Taliban. The
Clinton administration also pursued a number of covert
operations against bin Laden
during this same time frame of 1999–2000. Later, after
President Bush entered the
White House in January of 2001, nine months before the attacks
of September 11th,
his administration considered some new options, which included
arming anti-Taliban
opposition groups.12
The last significant attack by Al Qaeda before September 11th
occurred in October
2000, when Al Qaeda activists attacked the USS Cole in a ship-
borne suicide bombing
while the Cole was docked at the harbor in Aden, Yemen. The
ship was damaged, and
17 sailors were killed. The next attack and the bursting of the
terrorism bubble came
with the September 11, 2001, attacks. By this time, Al Qaeda
had become a coalition
of factions of radical Islamic groups operating throughout the
Muslim world, mostly
groups opposing their governments. Cells and associates have
been located in over 70
countries, according to U.S. officials. Among the groups in the
Al Qaeda coalition, vir-
tually all of which are still active today, are the Islamic Group
and Al Jihad (Egypt), the
Armed Islamic Group and the Salafist Group for Call and
Combat (Algeria), the Is-
lamic Movement of Uzbekistan (IMU), the Jemaah Islamiyah
(Indonesia), the Libyan
Islamic Fighting Group (Libyan opposition), and Harakat ul-
Majahedin (Pakistan,
Kashmiri).
THE ATTACK: SEPTEMBER 11, 2001
Tuesday September 11 dawned temperate and nearly cloudless
in the eastern United
States.13 Millions of men and women readied themselves for
work. Some made their way
to the Twin Towers, the signature structures of the World Trade
Center complex in New
York City. Others went to Arlington, Virginia, to the Pentagon.
Across the Potomac River,
the U.S. Congress was back in session. At the other end of
Pennsylvania Avenue, people
began to line up for a White House tour. In Sarasota, Florida,
President George W. Bush
went for an early morning run.
For those heading to an airport, weather conditions could not
have been better for
a safe and pleasant journey. Among the travelers were Mohamed
Atta and Abdul Aziz al
Omari, who arrived at the airport in Portland, Maine.
Boston: American 11 and United 175
Atta and Omari boarded a 6:00 a.m. flight from Portland to
Boston’s Logan International
Airport.
When he checked in for his flight to Boston, Atta was selected
by a computerized
prescreening system known as CAPPS (Computer Assisted
Passenger Prescreening Sys-
tem), created to identify passengers who should be subject to
special security measures.
Under security rules in place at the time, the only consequence
of Atta’s selection by
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 17
CAPPS was that his checked bags were held off the plane until
it was confirmed that he
had boarded the aircraft. This did not hinder Atta’s plans.
Atta and Omari arrived in Boston at 6:45 a.m. Seven minutes
later, Atta apparently
took a call from Marwan al Shehhi, a longtime colleague, who
was at another terminal at
Logan Airport. They spoke for three minutes. It would be their
final conversation.
Between 6:45 and 7:40, Atta and Omari, along with Satam al
Suqami, Wail al Sherhi,
and Waleed al Shehri, checked in and boarded American
Airlines Flight 11, bound for
Los Angeles. The flight was scheduled to depart at 7:45 a.m.
In another Logan terminal, Shehhi, joined by Fayez
Banihammad, Mohand al
Shehri, Ahmed al Ghamdi, and Hamza al Ghamdi, checked in
for United Airlines Flight
175, also bound for Los Angeles. A couple of Shehhi’s
colleagues were obviously unused
to travel; according to the United ticket agent, they had trouble
understanding the stan-
dard security questions, and she had to go over them slowly
until they gave the routine,
reassuring answers. Their flight was scheduled to depart at 8:00
a.m.
The security checkpoints through which passengers, including
Atta and his col-
leagues, gained access to the American 11 gate were operated
by Globe Security under
a contract with American Airlines. In a different terminal, the
single checkpoint through
The Collapse of the World Trade Center Building, September
11, 2001.
(Source: AP Wide World Photos.)
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
18 CHAPTER 1 The Era of Homeland Security
which passengers for United 175 passed was controlled by
United Airlines, which had
contracted with Huntleigh USA to perform the screening.
In passing through these checkpoints, each of the hijackers
would have been
screened by a walk-through metal detector calibrated to detect
items with at least the
mental content of a .22 caliber handgun. Anyone who might
have set off that detector
would have been screened with a hand wand—a procedure
requiring the screener to
identify the metal item or items that caused the alarm. In
addition, an X-ray machine
would have screened the hijackers’ carry-on belongings. The
screening was in place to
identify and confiscate weapons and other items prohibited from
being carried onto a
commercial flight. None of the checkpoint supervisors recalled
the hijackers or reported
anything suspicious regarding their screening.
As Atta had been selected by CAPPS in Portland, three
members of his hijacking
team—Suqami, Wail al Shehri, and Waleed al Shehri—were
selected in Boston. Their
selection affected only the handling of their checked bags, not
their screening at the
checkpoint. All five men cleared the checkpoint and made their
way to the gate for Amer-
ican 11. Atta, Omari, and Suqami took their seats in business
class. The Shehri brothers
had adjacent seats in row 2, in the first-class cabin. They
boarded American 11 between
7:31 and 7:40. The aircraft pushed back from the gate at 7:40.
Shehi and his team, none of whom had been selected by CAPPS,
boarded United
175 between 7:23 and 7:28. Their aircraft pushed back from the
gate just before 8:00.
Washington Dulles: America 77
Hundreds of miles southwest of Boston, at Dulles International
Airport in the Virginia
suburbs of Washington, D.C., five more men were preparing to
take their early morning
flight. At 7:15, a pair of them, Khalid al Mihdhar and Majed
Moqed, checked in at the
American Airlines ticket counter for Flight 77, bound for Los
Angeles. Within the next
20 minutes, they would be followed by Hani Hanjour and two
brothers, Nawaf al Hazmi
and Salem al Hazmi.
Hani Hanjour, Khalid al Mihdhar, and Majed Moqed were
flagged by CAPPS. The
Hazmi brothers were also selected for extra scrutiny by the
airline’s customer service repre-
sentative at the check-in counter. He did so because one of the
brothers did not have photo
identification nor could he understand English, and because the
agent found both of the pas-
sengers to be suspicious. The only consequence of their
selection was that their checked bags
were held off the plane until it was confirmed that they had
boarded the aircraft.
All five hijackers passed through the main terminal’s west
security screening check-
point; United Airlines, which was the responsible air carrier,
had contracted out the work
to Argenbright Security. The checkpoint featured closed-circuit
television that recorded
all passengers, including the hijackers, as they were screened.
At 7:18, Mihdhar and Mo-
qed entered the security checkpoint.
Midhar and Moqed placed their carry-on bags on the belt of the
X-ray machine and
proceeded through the first metal detector. Both set off the
alarm, and they were directed
to a second metal detector. Mihdhar did not trigger the alarm
and was permitted through
the checkpoint. After Moqed set it off, a screener wanded him.
He passed this inspection.
About 20 minutes later, at 7:35, another passenger for Flight 77,
Hani Hanjour, placed
two carry-on bags on the X-ray belt in the main terminal’s west
checkpoint and proceeded, IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 19
without alarm, through the metal detector. A short time later,
Nawaf and Salem al Hazmi
entered the same checkpoint. Salem al Hazmi cleared the metal
detector and was permit-
ted through; Nawaf al Hazmi set off the alarms for both the first
and second metal detectors
and was then hand-wanded before being passed. In addition, his
over-the-shoulder carry-on
bag was swiped by an explosive trace detector and then passed.
The video footage indicated
that he was carrying an unidentified item in his back pocket,
clipped to its rim.
When the local civil aviation security office of the Federal
Aviation Administration
(FAA) later investigated these security screening operations, the
screeners recalled noth-
ing out of the ordinary. They could not recall that any of the
passengers they screened
were CAPPS selectees. The 9/11 Commission asked a screening
expert to review the
videotape of the hand-wanding, and he found the quality of the
screener’s work to have
been “marginal at best.” The screener should have “resolved”
what set off the alarm; and
in the case of both Moqed and Hazmi, it was clear that he did
not.
At 7:50, Majed Moqed and Khalid al Mihdhar boarded the flight
and were seated in
12A and 12B coach. Hani Hanjour, assigned to seat 1B (first
class), soon followed. The
Hazmi brothers, sitting in 5E and 5F, joined Hanjour in the
first-class cabin.
Newark: United 93
Between 7:03 and 7:39, Saeed al Ghamdi, Ahmed al Nami,
Ahmad al Haznawi, and Ziad
Jarrah checked in at the United Airlines ticket counter for Flight
93, going to Los Angeles.
Two checked bags; two did not. Haznawi was selected by
CAPPS. His checked bag was
screened for explosives and then loaded on the plane.
The four men passed through the security checkpoint, owned by
United Airlines and
operated under contract by Argenbright Security. Like the
checkpoints in Boston, it
lacked closed-circuit television surveillance, so there is no
documentary evidence to in-
dicate when the hijackers passed through the checkpoint, what
alarms may have been
triggered, or what security procedures were administered. The
FAA interviewed the
screeners later; none recalled anything unusual or suspicious.
The four men boarded the plane between 7:39 and 7:48. All four
had seats in the
first-class cabin; their plane had no business-class section.
Jarrah was in seat 1B, closest
to the cockpit; Nami was in 3C, Ghamdi in 3D, and Haznawi in
6B.
The 19 men were aboard four transcontinental flights. They
were planning to hijack
these planes and turn them into large guided missiles, loaded
with up to 11,400 gallons of
jet fuel. By 8:00 a.m. on the morning of Tuesday, September 11,
2001, they had defeated
all the security layers that America’s civil aviation security
system then had in place to
prevent a hijacking.
The Hijacking of American 11
American Airlines Flight 11 provided nonstop service from
Boston to Los Angeles. On
September 11, Captain John Ogonowski and First Officer
Thomas McGuinness piloted
the Boeing 767. It carried its full capacity of nine flight
attendants. Eighty-one passen-
gers boarded the flight with them (including the five terrorists).
The plane took off at 7:59. Just before 8:14, it had climbed to
26,000 feet, not quite
its initial assigned cruising altitude of 29,000 feet. All
communications and flight profile
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
20 CHAPTER 1 The Era of Homeland Security
data were normal. About this time the Fasten Seatbelt sign
would usually have been
turned off, and the flight attendants would have begun preparing
for cabin service.
At that same time, American 11 had its last routine
communication with the ground
when it acknowledged navigational instructions from the FAA’s
air traffic control (ATC)
center in Boston. Sixteen seconds after that transmission, ATC
instructed the aircraft’s
pilots to climb to 35,000 feet. That message and all subsequent
attempts to contact the
flight were not acknowledged. From this and other evidence, the
9/11 Commission be-
lieves the hijacking began at 8:14 or shortly thereafter.
Reports from two flight attendants in the coach cabin, Betty
Ong and Madeline
“Amy” Sweeney, tell us most of what we know about how the
hijacking happened. As it
began, some of the hijackers—most likely Wail al Shehri and
Waleed al Shehri, who were
seated in row 2 in first class—stabbed the two unarmed flight
attendants who would have
been preparing for cabin services.
The 9/11 Commission does not know exactly how the hijackers
gained access to the cock-
pit; FAA rules required that the doors remained closed and
locked during flight. Ong specu-
lated that they had “jammed their way” in. Perhaps the terrorists
stabbed the flight attendants
to get a cockpit key, to force one of them to open the cockpit
door, or to lure the captain or
first officer out of the cockpit. Or the flight attendants may just
have been in their way.
At the same time or shortly thereafter, Atta—the only terrorist
on board trained to
fly a jet—would have moved to the cockpit from his business-
class seat, possibly accom-
panied by Omari. As this was happening, passenger Daniel
Lewin, who was seated in the
row just behind Atta and Omari, was stabbed by one of the
hijackers—probably Satam al
Suqami, who was seated directly behind Lewin. Lewin had
served four years as an offi-
cer in the Israeli military. He may have made an attempt to stop
the hijackers in front of
him, not realizing that another was sitting behind him.
The hijackers quickly gained control and sprayed Mace, pepper
spray, or some other
irritant in the first-class cabin to force the passengers and flight
attendants toward the
rear of the plane. They claimed they had a bomb.
About five minutes after the hijacking began, Betty Ong
contacted the American Air-
lines Southeastern Reservations Office in Cary, North Carolina,
via an AT&T airphone to
report an emergency aboard the flight. This was the first of
several occasions on 9/11
when flight attendants took action outside the scope of their
training, which emphasized
that in a hijacking they were to communicate with the cockpit
crew. The emergency call
lasted approximately 25 minutes, as Ong calmly and
professionally relayed information
about events taking place aboard the airplane to authorities on
the ground.
At 8:19, Ong reported: “The cockpit is not answering,
somebody’s stabbed in busi-
ness class—and I think there’s Mace—that we can’t breathe—I
don’t know, I think we’re
getting hijacked.” She then told of the stabbings of the two
flight attendants.
At 8:21, one of the American employees receiving Ong’s call in
North Carolina, Nydia
Gonzalez, alerted the American Airlines operations center in
Fort Worth, Texas, reaching
Craig Marquis, the manager on duty. Marquis soon realized this
was an emergency and in-
structed the airline’s dispatcher responsible for the flight to
contact the cockpit. At 8:23,
the dispatcher tried unsuccessfully to contact the aircraft. Six
minutes later, the air traffic
control specialist in American’s operation center contacted the
FAA’s Boston Air Traffic
Control Center about the flight. The center was already aware of
the problem.
Boston Center knew of a problem on the flight in part because
just before 8:25
the hijackers had attempted to communicate with the
passengers. The microphone ISB
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 21
was keyed, and immediately one of the hijackers said, “Nobody
move. Everything will be
okay. If you try to make any moves, you’ll endanger yourself
and the airplane. Just stay
quiet.” Air traffic controllers heard the transmission; Ong did
not. The hijackers proba-
bly did not know how to operate the cockpit radio
communication system correctly and
thus inadvertently broadcast their message over the air traffic
control channel instead of the
cabin public-address channel. Also at 8:25, and again at 8:29,
Amy Sweeney got through to
the American Flight Services Office in Boston but was cut off
after she reported someone
was hurt aboard the flight. Three minutes later, Sweeney was
reconnected to the office
and began relaying updates to the manager, Michael Woodward.
At 8:26, Ong reported that the plane was “flying erratically.” A
minute later, Flight 11
turned south. American also began getting identifications of the
hijackers, as Ong and
then Sweeney passed on some of the seat numbers of those who
had gained unauthorized
access to the cockpit.
Sweeney calmly reported on her line that the plane had been
hijacked; a man in first
class had his throat slashed; two flight attendants had been
stabbed—one was seriously
hurt and was on oxygen whereas the other’s wounds seemed
minor; a doctor had been re-
quested; the flight attendants were unable to contact the
cockpit; and there was a bomb
in the cockpit. Sweeney told Woodward that she and Ong were
trying to relay as much
information as they could to people on the ground.
At 8:38, Ong told Gonzalez that the plane was flying erratically
again. Around this
time Sweeney told Woodward that the hijackers were Middle
Easterners, naming three
of their seat numbers. One spoke very little English, and one
spoke excellent English.
The hijackers had gained entry to the cockpit, and she did not
know how. The aircraft was
in a rapid descent.
At 8:41, Sweeney told Woodward that passengers in coach were
under the impres-
sion that there was a routine medical emergency in first class.
Other flight attendants
were busy at duties such as getting medical supplies while Ong
and Sweeney were re-
porting the events.
At 8:41, in America’s operations center, a colleague told
Marquis that the air traffic
controllers declared Flight 11 a hijacking and “think he’s
[American 11] headed toward
Kennedy [airport in New York City]. They’re moving everybody
out of the way. They
seem to have him on a primary radar. They seem to think that he
is descending.”
At 8:44, Gonzalez reported losing phone contact with Ong.
About this same time
Sweeney reported to Woodward, “Something is wrong. We are
in a rapid descent . . . we
are all over the place.” Woodward asked Sweeney to look out
the window to see if she
could determine where they were. Sweeney responded: “We are
flying low. We are fly-
ing very, very low. We are flying way too low.” Seconds later
she said, “Oh my God we are
way too low.” The phone call ended.
At 8:46:40, American 11 crashed into the North Tower of the
World Trade Center in
New York City. All on board, along with an unknown number of
people in the tower, were
killed instantly.
The Hijacking of United 175
United Airlines Flight 175 was scheduled to depart for Los
Angeles at 8:00. Captain Victor
Saracini and First Officer Michael Horrocks piloted the Boeing
767, which had seven
flight attendants. Fifty-six passengers boarded the flight.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
22 CHAPTER 1 The Era of Homeland Security
United 175 pushed back from its gate at 7:58 and departed
Logan Airport at 8:14.
By 8:33, it had reached its assigned cruising altitude of 31,000
feet. The flight attendants
would have begun their cabin service.
The flight had taken off just as American 11 was being
hijacked, and at 8:42 the
United 175 flight crew completed their report on a “suspicious
transmission” overheard
from another plane (which turned out to have been Flight 11)
just after takeoff. This was
United 175’s last communication with the ground.
The hijackers attacked sometime between 8:42 and 8:46. They
used knives (as re-
ported by two passengers and a flight attendant), Mace
(reported by one passenger),
and the threat of a bomb (reported by the same passenger). They
stabbed members
of the flight crew (reported by a flight attendant and one
passenger). Both pilots had
been killed (reported by one flight attendant). The eyewitness
accounts came from
calls made from the rear of the plane, from passengers
originally seated further for-
ward in the cabin, a sign that passengers and perhaps crew had
been moved to the
back of the aircraft. Given similarities to American 11 in
hijacker seating and in eye-
witness reports of tactics and weapons, as well as the contact
between the presumed
team leaders, Atta and Shehhi, the 9/11 Commission believes
the tactics were similar
on both flights.
The first operational evidence that something was abnormal on
United 175 came at
8:47, when the aircraft changed beacon codes twice within a
minute. At 8:51, the flight
deviated from its assigned altitude, and a minute later New
York air traffic controllers be-
gan repeatedly and unsuccessfully trying to contact it.
At 8:52, in Easton, Connecticut, a man named Lee Hanson
received a phone call
from his son Peter, a passenger on United 175. His son told
him: “I think they’ve taken
over the cockpit—An attendant has been stabbed—and someone
else up front may have
been killed. The plane is making strange moves. Call United
Airlines—Tell them it’s
Flight 175, Boston to LA.” Lee Hanson then called the Easton
Police Department and
relayed what he had heard.
Also at 8:52, a male flight attendant called a United office in
San Francisco, reaching
Marc Policastro. The flight attendant reported that the flight had
been hijacked, both pilots
had been killed, a flight attendant had been stabbed, and the
hijackers were probably flying
the plane. The call lasted about two minutes, after which
Policastro and a colleague tried
unsucessfully to contact the flight.
At 8:58, the flight took a heading toward New York City.
At 8:59, Flight 175 passenger David Sweeney tried to call his
wife, Julie. He left a
message on their home answering machine that the plane had
been hijacked. He then
called his mother, Louise Sweeney, told her the flight had been
hijacked, and added that
the passengers were thinking about storming the cockpit to take
control of the plane away
from the hijackers.
At 9:00, Lee Hanson received a second call from his son Peter:
It’s getting bad, Dad—A stewardess was stabbed—They seem to
have knives and
Mace—They said they have a bomb—It’s getting very bad on
the plane—Passengers are
throwing up and getting sick—The plane is making jerky
movements—I don’t think the
pilot is flying the plane—I think we are going down—I think
they intend to go to
Chicago or someplace and fly into a building—Don’t worry,
Dad—If it happens, it’ll be
very fast—My God, my God.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 23
The call ended abruptly. Lee Hanson had heard a woman scream
just before it cut
off. He turned on a television, and in her home so did Louise
Sweeney. Both then saw
the second aircraft hit the World Trade Center.
At 9:03:11, United Airlines Flight 175 struck the South Tower
of the World Trade
Center. All on board, along with an unknown number of people
in the tower, were killed
instantly.
The Hijacking of American 77
American Airlines Flight 77 was scheduled to depart from
Washington Dulles for Los
Angeles at 8:10. The aircraft was a Boeing 757 piloted by
Captain Charles F. Burlingame
and First Officer David Charlebois. There were four flight
attendants. On September 11,
the flight carried 58 passengers.
American 77 pushed back from its gate at 8:09 and took off at
8:20. At 8:46, the flight
reached its assigned cruising altitude of 35,000 feet. Cabin
service would have begun. At
8:51, American 77 transmitted its last routine radio
communication. The hijacking began
between 8:51 and 8:54. As on American 11 and United 175, the
hijackers used knives (re-
ported by one passenger) and moved all the passengers (and
possibly crew) to the rear of
the aircraft (reported by one flight attendant and one
passenger). Unlike the earlier flights,
the Flight 77 hijackers were reported by a passenger to have box
cutters. Finally, a passen-
ger reported that an announcement had been made by the “pilot”
that the plane had been
hijacked. Neither of the firsthand accounts mentioned any
stabbings or the threat or use of
either a bomb or Mace, though both witnesses began the flight
in the first-class cabin.
At 8:54, the aircraft deviated from its assigned course, turning
south. Two minutes
later the transponder was turned off, and even primary radar
contact with the aircraft was
lost. The Indianapolis Air Traffic Control Center repeatedly
tried and failed to contact
the aircraft. American Airlines dispatchers also tried, without
success.
At 9:00, American Airlines Executive Vice President Gerald
Arpey learned that
communications had been lost with American 77. This was now
the second American air-
craft in trouble. He ordered all American Airlines flights in the
Northeast that had not
taken off to remain on the ground. Shortly before 9:10,
suspecting that American 77 had
been hijacked, American headquarters concluded that the second
aircraft to hit the
World Trade Center might have been Flight 77. After learning
that United Airlines was
missing a plane, American Airlines headquarters extended the
ground stop nationwide.
At 9:12, Renee May called her mother, Nancy May, in Las
Vegas. She said her flight
was being hijacked by six individuals who had moved them to
the rear of the plane. She
asked her mother to alert American Airlines. Nancy May and
her husband promptly did so.
At some point between 9:16 and 9:26, Barbara Olson called her
husband, Ted Olson,
the Solicitor General of the United States. She reported that the
flight had been hijacked,
and the hijackers had knives and box cutters. She further
indicated that the hijackers
were not aware of her phone call, and that they had put all the
passengers in the back of
the plane. About a minute into the conversation, the call was cut
off. Solicitor General
Olson tried unsuccessfully to reach Attorney General John
Ashcroft.
Shortly after the first call, Barbara Olson reached her husband
again. She reported
that the pilot had announced that the flight had been hijacked,
and she asked her hus-
band what she should tell the captain to do. Ted Olson asked for
her location and she
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
24 CHAPTER 1 The Era of Homeland Security
replied that the aircraft was then flying over houses. Another
passenger told her they
were traveling northeast. The Solicitor General then informed
his wife of the two previ-
ous hijackings and crashes. She did not display signs of panic
and did not indicate any
awareness of an impending crash. At that point, the second call
was cut off.
At 9:29, the autopilot on American 77 was disengaged; the
aircraft was at 7,000 feet
and approximately 38 miles west of the Pentagon. At 9:32,
controllers at the Dulles Ter-
minal Radar Approach Control “observed a primary radar target
tracking eastbound at a
high rate of speed.” This was later determined to have been
Flight 77.
At 9:34, Ronald Reagan Washington National Airport advised
the Secret Service of
an unknown aircraft heading in the direction of the White
House. American 77 was then
5 miles west-southwest of the Pentagon and began a 330-degree
turn. At the end of the
turn, it was descending through 2,200 feet, pointed toward the
Pentagon and downtown
Washington. The hijacker pilot then advanced the throttles to
maximum power and dove
toward the Pentagon.
At 9:37:46, American Airlines Flight 77 crashed into the
Pentagon, traveling at ap-
proximately 530 miles per hour. All on board, as well as many
civilian and military per-
sonnel in the building, were killed.
The Battle for United 93
At 8:42, United Airlines Flight 93 took off from Newark (New
Jersey) Liberty International
Airport bound for San Francisco. The aircraft was piloted by
Captain Jason Dahl and First
Officer Leroy Homer, and there were five flight attendants.
Thirty-seven passengers,
BOX 1-3
REMARKS BY THE PRESIDENT AFTER TWO PLANES
CRASH INTO WORLD TRADE
CENTER EMMA BOOKER ELEMENTARY SCHOOL
SARASOTA, FLORIDA
SEPTEMBER 11, 2001, 9:30 A.M.
THE PRESIDENT: Ladies and gentlemen, this is a difficult
moment for America. I, unfortunately,
will be going back to Washington after my remarks. Secretary
Rod Paige and the Lt. Gover-
nor will take the podium and discuss education. I do want to
thank the folks here at Booker
Elementary School for their hospitality.
Today we’ve had a national tragedy.Two airplanes have crashed
into the World Trade Cen-
ter in an apparent terrorist attack on our country. I have spoken
to the Vice President, to the
Governor of New York, to the Director of the FBI, and have
ordered that the full resources
of the federal government go to help the victims and their
families, and to conduct a full-scale
investigation to hunt down and to find those folks who
committed this act.
Terrorism against our nation will not stand.
And now if you would join me in a moment of silence. May God
bless the victims, their
families, and America.Thank you very much.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 25
including the hijackers, boarded the plane. Scheduled to depart
the gate at 8:00, the Boe-
ing 757’s takeoff was delayed because of the airport’s typically
heavy morning traffic.
The hijackers had planned to take flights scheduled to depart at
7:45 (American 11),
8:00 (United 175 and United 93), and 8:10 (American 77).
Three of the flights had actu-
ally taken off within 10 to 15 minutes of their planned departure
times. United 93 would
ordinarily have taken off about 15 minutes after pulling away
from the gate. When it left
the ground at 8:42, the flight was running more than 25 minutes
late.
As United 93 left Newark, the flight’s crew members were
unaware of the hijackings
of American 11. Around 9:00, the FAA, American, and United
were facing the stagger-
ing realization of apparent multiple hijackings. At 9:03, they
would see another aircraft
strike the World Trade Center. Crisis managers at the FAA and
the airlines did not yet
act to warn other aircraft. At the same time, Boston Center
realized that a message
transmitted just before 8:25 by the hijacker pilot of American
11 included the phrase,
“We have some planes.”
No one at the FAA or the airlines that day had ever dealt with
multiple hijackings.
Such a plot had not been carried out anywhere in the world in
more than 30 years, and
never in the United States. As news of the hijackings filtered
through the FAA and the
airlines, it does not seem to have occurred to their leadership
that they needed to alert
other aircraft in the air that they too might be at risk.
United 175 was hijacked between 8:42 and 8:46, and awareness
of that hijacking be-
gan to spread after 8:51. American 77 was hijacked between
8:51 and 8:54. By 9:00, the
FAA and airline officials began to comprehend that attackers
were going after multiple
aircraft. American Airlines’ nationwide ground stop between
9:05 and 9:10 was followed
by a United Airlines ground stop. FAA controllers at Boston
Center, which had tracked
the first two hijackings, requested at 9:07 that Herndon
Command Center “get messages
to airborne aircraft to increase security for the cockpit.” There
is no evidence that Hern-
don took such action. Boston Center immediately began
speculating about other aircraft
that might be in danger, leading them to worry about a
transcontinental flight—Delta
1989—that in fact was not hijacked. At 9:19, the FAA’s New
England regional office called
Herndon and asked that Cleveland Center advise Delta 1989 to
use extra cockpit security.
Several FAA air traffic control officials told the 9/11
Commission that it was the air
carrier’s responsibility to notify their planes of security
problems. One senior FAA air traf-
fic control manager said that it was simply not the FAA’s place
to order the airlines what
to tell their pilots. The Commission believes that such
statements did not reflect an ade-
quate appreciation of the FAA’s responsibility for the safety
and security of civil aviation.
The airlines bore responsibility, too. They were facing an
escalating number of con-
flicting and, for the most part, erroneous reports about other
flights, as well as a contin-
uing lack of vital information from the FAA about the hijacked
flights. The 9/11
Commission found no evidence, however, that American
Airlines sent any cockpit warn-
ings to its aircraft that day. United’s first decisive action to
notify its airborne aircraft to
take defensive action did not come until 9:19, when a United
flight dispatcher, Ed
Ballinger, took the initiative to begin transmitting warnings to
his 16 transcontinental
flights: “Beware any cockpit intrusions—Two a/c (aircraft) hit
World Trade Center.” One
of the flights that received the warning was United 93. Because
Ballinger was still re-
sponsible for his other flights as well as Flight 175, his warning
message was not transmitted
to Flight 93 until 9:23.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
26 CHAPTER 1 The Era of Homeland Security
By all accounts, the first 46 minutes of Flight 93’s cross-
country trip proceeded rou-
tinely. Radio communications from the plane were normal.
Heading, speed, and altitude
ran according to plan. At 9:24, Ballinger’s warning to United 93
was received in the cockpit.
Within two minutes, at 9:26, the pilot, Jason Dahl, responded
with a note of puzzlement:
“Ed, confirm latest mssg plz—Jason.”
The hijackers attacked at 9:28. While traveling 35,000 feet
above eastern Ohio,
United 93 suddenly dropped 700 feet. Eleven seconds into the
descent, the FAA’s air traf-
fic control center in Cleveland received the first of two radio
transmissions from the air-
craft. During the first broadcast, the captain or first officer
could be heard declaring
“Mayday” amid the sounds of a physical struggle in the cockpit.
The second radio trans-
mission, 35 seconds later, indicated that the fight was
continuing. The captain or first of-
ficer could be heard shouting: “Hey get out of here—get out of
here—get out of here.”
On the morning of 9/11, there were only 37 passengers on
United 93—33 in addition
to the 4 hijackers. This was below the norm for Tuesday
mornings during the summer of
2001. But there is no evidence that the hijackers manipulated
passenger levels or purchased
additional seats to facilitate their operation.
The terrorists who hijacked three other commercial flights on
9/11 operated in five-
man teams. They initiated their cockpit takeover within 30
minutes of takeoff. On Flight
93, however, the takeover took place 46 minutes after takeoff,
and there were only four
hijackers. The operative likely intended to round out the team
for this flight, Mohamed
al Kahtani, had been refused entry by a suspicious immigration
inspector at Florida’s Or-
lando International Airport in August.
Because several passengers on United 93 described three
hijackers on the plane, not
four, some have wondered whether one of the hijackers had
been able to use the cockpit
jump seat from the outset of the flight. FAA rules allow use of
this seat by documented
and approved individuals, usually air carrier or FAA personnel.
The 9/11 Commission
found no evidence indicating that one of the hijackers, or
anyone else, sat there on this
flight. All the hijackers had assigned seats in first class, and
they seem to have used them.
It is more likely that Jarrah, the crucial pilot-trained member of
their team, remained
seated and inconspicuous until after the cockpit was seized; and
once inside, he would
not have been visible to the passengers.
At 9:32, a hijacker, probably Jarrah, made or attempted to make
the following an-
nouncement to the passengers of Flight 93: “Ladies and
Gentlemen: Here the captain,
please sit down keep remaining sitting. We have a bomb on
board. So, sit.” The flight data
recorder (also recovered) indicates that Jarrah then instructed
the plane’s autopilot to
turn the aircraft around and head east.
The cockpit voice recorder data indicate that a woman, most
likely a flight attendant,
was being held captive in the cockpit. She struggled with one of
the hijackers who killed
or otherwise silenced her.
Shortly thereafter, the passengers and flight crew began a series
of calls from GTE
airphones and cellular phones. These calls between family,
friends, and colleagues took
place until the end of the flight and provided those on the
ground with firsthand ac-
counts. They enabled the passengers to gain critical
information, including the news that
two aircraft had slammed into the World Trade Center.
At 9:39, the FAA’s Cleveland Air Route Traffic Control Center
overheard a second
announcement indicating that there was a bomb on board, that
the plane was returning
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE ATTACK: SEPTEMBER 11, 2001 27
to the airport, and that passengers should remain seated.
Although it apparently was not
heard by the passengers, this announcement, like those on Flight
11 and Flight 77, was
intended to deceive them. Jarrah, like Atta earlier, may have
inadvertently broadcast the
message because he did not know how to operate the radio and
the intercom. To the 9/11
Commission’s knowledge, none of them had ever flown an
actual airliner before.
At least two callers from the flight reported that the hijackers
knew that passengers were
making calls but did not seem to care. It is quite possible Jarrah
knew of the success of the
assault on the World Trade Center. He could have learned of
this from messages being sent
by United Airlines to the cockpits of its transcontinental flights,
including Flight 93, warn-
ing of cockpit intrusion and telling of the New York attacks.
But even without them, he would
have certainly understood that the attacks on the World Trade
Center would already have
unfolded, given Flight 93’s tardy departure from Newark. If
Jarrah did know that the pas-
sengers were making calls, it might not have occurred to him
that they were certain to learn
what had happened in New York, thereby defeating his attempts
at deception.
At least 10 passengers and 2 crew members shared vital
information with family,
friends, colleagues, or others on the ground. All understood the
plane had been hijacked.
They said the hijackers wielded knives and claimed to have a
bomb. The hijackers were
wearing red bandanas, and they forced the passengers to the
back of the aircraft.
Callers reported that a passenger had been stabbed and that two
people were lying
on the floor of the cabin, injured or dead—possibly the captain
and first officer. One
caller reported that a flight attendant had been killed.
One of the callers from United 93 also reported that he thought
the hijackers might
possess a gun. But none of the other callers reported the
presence of a firearm. One re-
cipient of a call from the aircraft recounted specifically asking
her caller whether the hi-
jackers had guns. The passenger replied that he did not see one.
No evidence of firearms
or of their identifiable remains were found at the aircraft’s
crash site, and the cockpit
voice recorder gives no indication of a gun being fired or
mentioned at any time. The 9/11
Commission believes that if the hijackers had possessed a gun,
they would have used it
in the flight’s last minutes as the passengers fought back.
Passengers on three flights reported the hijackers’ claim of
having a bomb. The FBI
told the 9/11 Commission they found no trace of explosives at
the crash sites. One of the
passengers who mentioned a bomb expressed his belief that it
was not real. Lacking any
evidence that the hijackers attempted to smuggle such illegal
items past the security
screening checkpoints, the 9/11 Commission believes the bombs
were probably fake.
During at least five of the passengers’ phone calls, information
was shared about the
attacks that had occurred earlier that morning at the World
Trade Center. Five calls de-
scribed the intent of passengers and surviving crew members to
revolt against the hi-
jackers. According to one call, they voted on whether to rush
the terrorists in an attempt
to retake the plane. They decided and acted.
At 9:57, the passenger assault began. Several passengers had
terminated phone calls
with loved ones to join the revolt. One of the callers ended her
message as follows:
“Everyone’s running up to first class, I’ve got to go. Bye.”
The cockpit voice recorder captured the sounds of the passenger
assault muffled by
the intervening cockpit door. Some family members who
listened to the recording report
that they could hear the voice of a loved one among the din. The
9/11 Commission could
not identify whose voices can be heard. But the assault was
sustained.
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
28 CHAPTER 1 The Era of Homeland Security
BOX 1-4
REMARKS BY THE PRESIDENT UPON ARRIVAL AT
BARKSDALE AIR
FORCE BASE, LOUISIANA
THE PRESIDENT: I want to reassure the American people that
the full resources of the fed-
eral government are working to assist local authorities to save
lives and to help the victims of
these attacks. Make no mistake:The United States will hunt
down and punish those responsible
for these cowardly acts.
I’ve been in regular contact with the Vice President, the
Secretary of Defense, the na-
tional security team and my Cabinet.We have taken all
appropriate security precautions to
protect the American people. Our military at home and around
the world is on high alert
status, and we have taken the necessary security precautions to
continue the functions of
your government.
We have been in touch with the leaders of Congress and with
world leaders to assure
them that we will do whatever is necessary to protect America
and Americans.
I ask the American people to join me in saying a thanks for all
the folks who have been
fighting hard to rescue our fellow citizens and to join me in
saying a prayer for the victims and
their families.
The resolve of our great nation is being tested. But make no
mistake:We will show the
world that we will pass this test. God bless.
In response, Jarrah immediately began to roll the airplane to the
left and right, at-
tempting to knock the passengers off balance. At 9:58:57, Jarrah
told another hijacker in
the cockpit to block the door. Jarrah continued to roll the
airplane sharply left and right,
but the assault continued. At 9:59:52, Jarrah changed tactics and
pitched the nose of the
airplane up and down to disrupt the assault. The recorder
captured the sounds of loud
thumps, crashes, shouts, and breaking glasses and plates. At
10:00:03, Jarrah stabilized
the airplane.
Five seconds later, Jarrah asked, “Is that it? Shall we finish it
off?” A hijacker re-
sponded, “No. Not yet. When they all come, we finish it off.”
The sounds of fighting con-
tinued outside the cockpit. Again, Jarrah pitched the nose of the
aircraft up and down.
At 10:00:26, a passenger in the background said, “In the
cockpit. If we don’t we’ll die!”
Sixteen seconds later, a passenger yelled, “Roll it.” Jarrah
stopped the violent maneuvers
at about 10:01:00 and said, “Allah is the greatest! Allah is the
greatest!” He then asked
another hijacker in the cockpit, “Is that it? I mean, shall we put
it down?” to which the
other replied, “Yes, put it in it, and pull it down.”
The passengers continued their assault and at 10:02:03, a
hijacker said, “Pull it down!
Pull it down!” The hijackers remained at the controls but must
have judged that the pas-
sengers were only seconds from overcoming them. The airplane
headed down; the control
wheel was turned hard to the right. The airplane rolled onto its
back, and one of the hijack-
ers began shouting, “Allah is the greatest! Allah is the
greatest!” With the sounds of the
IS
B
N
0
-5
5
8
-3
7
2
7
5
-9
Homeland Security for Policing, by Willard M. Oliver.
Published by Prentice Hall. Copyright © 2007 by Pearson
Education, Inc.
THE RESPONSE: SEPTEMBER 11, 2001 29
passenger counterattack continuing, the aircraft plowed into an
empty field in Shanksville,
Pennsylvania, at 580 miles per hour, about 20 minutes’ flying
time from Washington, D.C.
Jarrah’s objective was to crash his airliner into symbols of the
American Republic, the
Capitol or the White House. He was defeated by the alerted
unarmed passengers of
United 93.
THE RESPONSE: SEPTEMBER 11, 2001
New York, NY
The World Trade Center (WTC) complex was built for the Port
Authority of New York
and New Jersey.14 Construction began in 1966, and tenants
began to occupy its space in
1970. The Twin Towers came to occupy a unique and symbolic
place in the culture of
New York City and America.
The WTC actually consisted of seven buildings, including one
hotel, spread across
16 acres of land. The buildings were connected by an
underground mall (the concourse).
The Twin Towers (1 WTC, or the North Tower, and 2 WTC, or
the South Tower) were
the signature structures, containing 10.4 million square feet of
office space. Both towers
had 110 stories, were about 1,350 feet high, and were square;
each wall measured 208
feet in length. On any given workday, up to 50,000 office
workers occupied the towers,
and 40,000 people passed through the complex.
In New York City, the city government had ready at their
disposal a number of plans
for critical incidents that may have potentially occurred in the
city, with the Office of
Emergency Management and Interagency Preparedness (OEM)
established to coordi-
nate the workings of such agencies as the New York Police
Department (NYPD), the Port
Authority Police Department (PAPD), and the Fire Department
of New York (FDNY).
In 1996 Mayor Rudolph Giuliani created the Mayor’s Office of
Emergency Management,
which had three basic functions. First, OEM’s Watch Command
was to monitor the city’s
key communications channels—including radio frequencies of
FDNY dispatch and the
NYPD—and other data. A second purpose of the OEM was to
improve New York City’s
response to major incidents, including terrorist attacks, by
planning and conducting ex-
ercises and drills that would involve multiple city agencies,
particularly the NYPD and
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx

More Related Content

Similar to PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx

How To Write A Good Conclusion Utaheducationf
How To Write A Good Conclusion UtaheducationfHow To Write A Good Conclusion Utaheducationf
How To Write A Good Conclusion Utaheducationf
Kim Tagtow
 
Is There Websites That
Is There Websites ThatIs There Websites That
Is There Websites That
Jennifer Jones
 
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
Lisa Graves
 
Michael Durante Western Reserve 1Q029 review
Michael Durante Western Reserve  1Q029 reviewMichael Durante Western Reserve  1Q029 review
Michael Durante Western Reserve 1Q029 review
Michael Durante
 
The Cheapest Essay Writing Service
The Cheapest Essay Writing ServiceThe Cheapest Essay Writing Service
The Cheapest Essay Writing Service
Shannon Wright
 
Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000s
Ayesha Majid
 
Confessions of a risk manager
Confessions of a risk managerConfessions of a risk manager
Confessions of a risk manager
Davidkerrkelly
 
Crisis And Bailout
Crisis And BailoutCrisis And Bailout
Crisis And BailoutHiroshi Ono
 
The Financial Crisis- paper
The Financial Crisis- paperThe Financial Crisis- paper
The Financial Crisis- paper
Philippe De Smit
 
Eden Roc - SWOT AnalysisCreated By SARA BITZER on Monday, Marc.docx
Eden Roc - SWOT AnalysisCreated By   SARA BITZER on Monday, Marc.docxEden Roc - SWOT AnalysisCreated By   SARA BITZER on Monday, Marc.docx
Eden Roc - SWOT AnalysisCreated By SARA BITZER on Monday, Marc.docx
jack60216
 
Final Days Of Dollar
Final Days Of DollarFinal Days Of Dollar
Final Days Of Dollar
bartonp
 
Credit Crisis - Past, Present, and Future
Credit Crisis - Past, Present, and FutureCredit Crisis - Past, Present, and Future
Credit Crisis - Past, Present, and Future
JLHealy
 
Bond Markets
Bond MarketsBond Markets
Bond Markets
Kolmhofer Martin
 

Similar to PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx (15)

How To Write A Good Conclusion Utaheducationf
How To Write A Good Conclusion UtaheducationfHow To Write A Good Conclusion Utaheducationf
How To Write A Good Conclusion Utaheducationf
 
Is There Websites That
Is There Websites ThatIs There Websites That
Is There Websites That
 
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
Opinion Essay Tips. 100 Best Opinion Essay Topics. 202
 
Michael Durante Western Reserve 1Q029 review
Michael Durante Western Reserve  1Q029 reviewMichael Durante Western Reserve  1Q029 review
Michael Durante Western Reserve 1Q029 review
 
The Cheapest Essay Writing Service
The Cheapest Essay Writing ServiceThe Cheapest Essay Writing Service
The Cheapest Essay Writing Service
 
Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000s
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Confessions of a risk manager
Confessions of a risk managerConfessions of a risk manager
Confessions of a risk manager
 
Crisis And Bailout
Crisis And BailoutCrisis And Bailout
Crisis And Bailout
 
The Financial Crisis- paper
The Financial Crisis- paperThe Financial Crisis- paper
The Financial Crisis- paper
 
Eden Roc - SWOT AnalysisCreated By SARA BITZER on Monday, Marc.docx
Eden Roc - SWOT AnalysisCreated By   SARA BITZER on Monday, Marc.docxEden Roc - SWOT AnalysisCreated By   SARA BITZER on Monday, Marc.docx
Eden Roc - SWOT AnalysisCreated By SARA BITZER on Monday, Marc.docx
 
Final Days Of Dollar
Final Days Of DollarFinal Days Of Dollar
Final Days Of Dollar
 
Chapter6
Chapter6Chapter6
Chapter6
 
Credit Crisis - Past, Present, and Future
Credit Crisis - Past, Present, and FutureCredit Crisis - Past, Present, and Future
Credit Crisis - Past, Present, and Future
 
Bond Markets
Bond MarketsBond Markets
Bond Markets
 

More from ChantellPantoja184

Problem 1Problem 2.docx
Problem 1Problem 2.docxProblem 1Problem 2.docx
Problem 1Problem 2.docx
ChantellPantoja184
 
Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docx
ChantellPantoja184
 
Problem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxProblem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docx
ChantellPantoja184
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
ChantellPantoja184
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
ChantellPantoja184
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
ChantellPantoja184
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
ChantellPantoja184
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docx
ChantellPantoja184
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
ChantellPantoja184
 
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxProblem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
ChantellPantoja184
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
ChantellPantoja184
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docx
ChantellPantoja184
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
ChantellPantoja184
 
Problem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxProblem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docx
ChantellPantoja184
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docx
ChantellPantoja184
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
ChantellPantoja184
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docx
ChantellPantoja184
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
ChantellPantoja184
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docx
ChantellPantoja184
 
Problem #1 JET Copies Case ProblemRead the JET Copies C.docx
Problem #1 JET Copies Case ProblemRead the JET Copies C.docxProblem #1 JET Copies Case ProblemRead the JET Copies C.docx
Problem #1 JET Copies Case ProblemRead the JET Copies C.docx
ChantellPantoja184
 

More from ChantellPantoja184 (20)

Problem 1Problem 2.docx
Problem 1Problem 2.docxProblem 1Problem 2.docx
Problem 1Problem 2.docx
 
Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docx
 
Problem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxProblem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docx
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docx
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
 
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxProblem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docx
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
 
Problem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxProblem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docx
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docx
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docx
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docx
 
Problem #1 JET Copies Case ProblemRead the JET Copies C.docx
Problem #1 JET Copies Case ProblemRead the JET Copies C.docxProblem #1 JET Copies Case ProblemRead the JET Copies C.docx
Problem #1 JET Copies Case ProblemRead the JET Copies C.docx
 

Recently uploaded

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx

  • 1. PROBLEM 14-6AProblem 14-6A: Norwoods Borrowings1. Total amount of each installment payment.Present value of an ordinary annuity$200,000Interest per period(i)0.08Number of periods(n)5Total amount of each installment payment($50,091.29)Therefore the total amount of each installment payment is $ 50,091.292.Norwoods Amortization TablePeriod Ending DateBeginning balance Interest expenseNotes PayableCash paymentEnding Balance10/31/15$200,000.00$16,000.00$34,091.29$50,091.29$ 165,908.7110/31/16$165,909.00$13,272.72$36,818.57$50,091.2 9$129,090.4310/31/17$129,090.43$10,327.23$39,764.06$50,09 1.29$89,326.3710/31/18$89,326.37$7,146.11$42,945.18$50,091 .29$46,381.1910/31/19$46,381.19$3,710.50$46,380.79$50,091. 29$0.403.a) Accrued interest as December 31st 2015Accrued interest expense = $200,000*8%*2/12= $2,666.67. Thus the journal entry is as shown below:DescriptionDr($)Cr($)interest expense $2,666.67 Interest payable $2,666.67b) The first annual payment on the note.Ten more months of interest has accrued $200,000*8%*10/12 =$13,333.33 accrued interest .Therefore the journal entry is as shown below:DescriptionDr($)Cr($)Notes payable$34,091.29interest expense$13,333.33interest payable$2,666.67 Cash$50,091.29 PROBLEM 14-7AProblem 14-7AQuestion 1a) Debt to equity ratiosPulaski CompanyScott Company Total liabilities$360,000.00$240,000.00Total Equity$500,000.00$200,000.00Debt-Equity Ratio0.721.2Question 2The debt to equity ratio measures the amount of debt a company uses has to finance its business for every dollar of equity it has. A higher debt to equity ratio implies that a company uses more debt than equity for financing. In this case, the debt to equity ratio for Pulaski Company is 0.72 which is less than 1 implying that the stockholder's equity exceeds the amount of debt borrowed. Thus
  • 2. Pulaski Company may not likely suffer from risks brought about by huge amount of debts in the capital structure. On the other hand, the debt to equity ratio of Scott Company is 1.2 which is greater than 1 implying that the debt exceeds the totalamount stockholders equity. Huge debts is associated with a lot of risks. First, there is the risk of defaulting whereby the company may be unable to repay its debt and therefore leading to bankruptcy. Second, a company may find it difficult to obtain additional funding from creditors.This is because the creditors prefer companies with low debt to equity ratio. Finally, there is the risks of violating the debt covenants. A covenant is an agreement that requires a company to maintain adequate financial ratio levels. Too much borrowings may violate this covenant. Since ScottCompany has a higher debt to equity ratio, it may experience these risks which may eventually lead to the company being declared bankrupt . PROBLEM 14-6BProblem 14-6B: Gordon Enterprises Borrowings1. Total amount of each installment payment.Present value of an ordinary annuity$150,000Interest per period(i)0.1Number of periods(n)3Total amount of each installment payment($60,317.22)Therefore the total amount of each installment payment is $ 60,317.222.Gordons Enterprises Amortization TablePeriod Ending DateBeginning balance Interest expenseNotes PayableCash paymentEnding Balance9/30/15$150,000.00$15,000.00$45,317.22$60,317.22$1 04,682.789/30/16$104,682.78$10,468.28$49,848.94$60,317.22$ 54,833.849/30/17$54,833.84$5,483.38$54,833.84$60,317.22$0. 003.a) Accrued interest as December 31st 2015Accrued interest expense = $150,000*10%*3/12= $3,750. The journal entry is as shown below:DescriptionDr($)Cr($)Interest expense $3,750.00 Interest payable $3,750.00b) The first annual payment on the note.Nine more months of interest has accrued $150,000*10%*9/12 =$11,250 accrued interest. Thus the journal entry is as shown below: DescriptionDr($)Cr($)Notes payable$45,317.22interest expense$11,250.00interest payable$3,750.00
  • 3. Cash$60,317.22 PROBLEM 14-7BProblem 14-7BQuestion 1a) Debt to equity ratiosAtlas CompanyBryan Company Total liabilities$80,000.00$562,500.00Total Equity$100,000.00$187,500.00Debt-Equity Ratio0.83Question 2The debt to equity ratio measures the amount of debt a company uses has to finance its business for every dollar of equity it has. A higher debt to equity ratio implies that a company uses more debt than equity for financing. In this case, the debt to equity ratio for Atlas Company is 0.80 which is less than 1 implying that the stockholder's equity exceeds the amount of debt. Thus Atlas Company may not likely suffer from risks brought about by huge amount of debts in the capital structure. On the other hand, the debt to equity ratio of Bryan Company is 3.0 which is more than 1 implying that the debt exceeds the totalamount stockholders equity. Huge debts is associated with a lot of risks. First, there is the risk of defaulting whereby the company may be unable to repay its debt and therefore leading to bankruptcy. Second, a company may find it difficult to obtain additional funding from creditors.This is because the creditors companies prefer with low debt to equity ratio. Finally, there is the risks of violating the debt covenants. A covenant is an agreement that requires a company to maintain adequate financial ratio levels. Too much borrowings may violate this covenant. Since BryanCompany has a higher debt to equity ratio, it may experience these risks. CHAPTER 1 1 The Era of Homeland Security
  • 4. Our nation has been put on notice: We are not immune from attack. We will take defensive measures against terrorism to protect Americans. Today, dozens of federal departments and agencies, as well as state and local governments, have responsibilities affecting homeland security. President George W. Bush, September 20, 2001 (See Appendix B for full speech) INTRODUCTION On September 11, 2001, policing entered the era of homeland security. Prior to the attack on America by Osama bin Laden and his terrorist group, Al Qaeda, on that fateful day, policing in America recognized that various crime problems had international implications, but there was little acknowledgment of how these crimes would impact state and local po- lice directly. Issues such as international and transnational crimes, particularly organized and white-collar crime, and both drug and human trafficking, were issues of concern, but generally concerns for either the federal government and their criminal justice assets or for the international community. The realization that global concerns, such as terrorism, were indeed a state and local concern changed on September 11, 2001. That day policing in America moved out of the community policing era and into the era of homeland security. To understand how this came about, it is important to first
  • 5. review the threat that Osama bin Laden and his terrorist organization, Al Qaeda, posed to America prior to September 11th. In addition, reviewing the actual events of the attack helps place the significance of that day in better context. Perhaps more importantly, reviewing how the local police responded to the attacks provides us some insight into what the era of Homeland Security means for policing. Therefore, this chapter will review the threat, the attack, and the response to better understand the significance of the threat, see how that attack moved American policing into the era of Homeland Security, and provide the context for understanding the role state and local police will play in this new era. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver.
  • 6. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 2 CHAPTER 1 The Era of Homeland Security BOX 1-1 TERRORISM TIME LINE (ABBREVIATED) PRIOR TO FIRST WORLD TRADE CENTER (1993) Kidnappings of U.S. Citizens in Colombia, January 31, 1993: Revolutionary Armed Forces of Colombia (FARC) terrorists kidnapped three U.S. missionaries. Kidnapping of U.S. Businessmen in the Philippines, January 17–21, 1992: A senior official of the corporation Philippine Geothermal was kidnapped in Manila by the Red Scorpion Group, and two U.S. businessmen were seized independently by the National Liberation Army and by Revolutionary Armed Forces of Colombia (FARC). Sniper Attack on the U.S. Embassy in Bonn, February 13, 1991: Three Red Army Faction members fired automatic rifles from across the Rhine River at the U.S. Embassy Chancery. No one was hurt. Attempted Iraqi Attacks on U.S. Posts, January 18–19, 1991: Iraqi agents planted bombs at the U.S. ambassador to Indonesia’s residence and at the USIS library in Manila.
  • 7. U.S. Soldiers Assassinated in the Philippines, May 13, 1990: The New People’s Army (NPA) killed two U.S.Air Force personnel near Clark Air Force Base in the Philippines. U.S. Embassy Bombed in Peru, January 15, 1990: The Tupac Amaru Revolutionary Movement bombed the U.S. Embassy in Lima, Peru. Assassination of U.S.Army Officer, April 21, 1989: The New People’s Army (NPA) assassinated Colonel James Rowe in Manila.The NPA also assassinated two U.S. government defense contractors in September. Pan Am 103 Bombing, December 21, 1988: Pan American Airlines Flight 103 was blown up over Lockerbie, Scotland, by a bomb believed to have been placed on the aircraft by Libyan terrorists in Frankfurt,West Germany. All 259 people on board were killed. Attack on U.S. Diplomat in Greece, June 28, 1988: The defense attaché of the U.S. Embassy in Greece was killed when a car bomb was detonated outside his home in Athens. Naples USO Attack, April 14, 1988: The Organization of Jihad Brigades exploded a car bomb outside a USO club in Naples, Italy, killing one U.S. sailor. Kidnapping of William Higgins, February 17, 1988: U.S. Marine Corps Lieutenant Colonel W. Higgins was kidnapped and murdered by the Iranian-backed Hizballah group while serving with the United
  • 8. Nations Truce Supervisory Organization (UNTSO) in southern Lebanon. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. INTRODUCTION 3 Servicemen’s Bar Attack, December 26, 1987: Catalan separatists bombed a Barcelona bar frequented by U.S. servicemen, resulting in the death of one U.S. citizen.
  • 9. Bus Attack, April 24, 1987: Sixteen U.S. servicemen riding in a Greek Air Force bus near Athens were injured in an apparent bombing attack, carried out by the revolutionary organization known as November 17. Berlin Discothèque Bombing, April 5, 1986: Two U.S. soldiers were killed and 79 American servicemen were injured in a Libyan bomb attack on a nightclub in West Berlin, West Germany. In retaliation U.S. military jets bombed targets in and around Tripoli and Benghazi. Aircraft Bombing in Greece, March 30, 1986: A Palestinian splinter group detonated a bomb as TWA Flight 840 approached Athens air- port, killing four U.S. citizens. Airport Attacks in Rome and Vienna, December 27, 1985: Four gunmen belonging to the Abu Nidal Organization attacked the El Al and Trans World Airlines ticket counters at Rome’s Leonardo da Vinci Airport with grenades and automatic rifles.Thirteen persons were killed and 75 were wounded before Italian police and Israeli security guards killed three of the gunmen and captured the fourth. Three more Abu Nidal gunmen attacked the El Al ticket counter at Vienna’s Schwechat Airport, killing three persons and wounding 30. Austrian police killed one of the gunmen and captured the others. Egyptian Airliner Hijacking, November 23, 1985: An EgyptAir airplane bound from Athens to Malta and carrying
  • 10. several U.S. citizens was hijacked by the Abu Nidal Group. Achille Lauro Hijacking, October 7, 1985: Four Palestinian Liberation Front terrorists seized the Italian cruise liner in the eastern Mediterranean Sea, taking more than 700 hostages. One U.S. passenger was murdered before the Egyptian government offered the terrorists safe haven in return for the hostages’ freedom. Attack on a Restaurant in El Salvador, June 19, 1985: Members of the FMLN (Farabundo Marti National Liberation Front) fired on a restau- rant in the Zona Rosa district of San Salvador, killing four Marine security guards assigned to the U.S. Embassy and nine Salvadorean civilians. TWA Hijacking, June 14, 1985: A Trans-World Airlines flight was hijacked en route to Rome from Athens by two Lebanese Hizballah terrorists and forced to fly to Beirut.The eight crew members and 145 passengers were held for seventeen days, during which one American hostage, a U.S. Navy sailor, was murdered.After being flown twice to Algiers, the aircraft was returned to Beirut after Israel released 435 Lebanese and Palestinian prisoners. IS B N 0
  • 11. -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 4 CHAPTER 1 The Era of Homeland Security Kidnapping of U.S. Officials in Mexico, February 7, 1985: Under the orders of narcotrafficker Rafael Caro Quintero, Drug Enforcement Adminis- tration agent Enrique Camarena Salazar and his pilot were kidnapped, tortured, and executed. Restaurant Bombing in Spain, April 12, 1984: Eighteen U.S. servicemen were killed and 83 people were injured in a bomb attack on a restaurant near a U.S. Air Force base in Torrejon, Spain. Kidnapping of Embassy Official, March 16, 1984: The Islamic Jihad kidnapped and later murdered Political Officer William Buckley in Beirut, Lebanon. Other U.S. citizens not connected to the U.S.
  • 12. government were seized over a succeeding two-year period. Naval Officer Assassinated in Greece, November 15, 1983: A U.S. Navy officer was shot by the November 17 terrorist group in Athens, Greece, while his car was stopped at a traffic light. Bombing of Marine Barracks, Beirut, October 23, 1983: Simultaneous suicide truck-bomb attacks were made on American and French com- pounds in Beirut, Lebanon. A 12,000-pound bomb destroyed the U.S. compound, killing 242 Americans, while 58 French troops were killed when a 400- pound device destroyed a French base. Islamic Jihad claimed responsibility. Naval Officer Assassinated in El Salvador, May 25, 1983: A U.S. Navy officer was assassinated by the Farabundo Marti National Liberation Front. Bombing of U.S. Embassy in Beirut, April 18, 1983: Sixty-three people, including the CIA’s Middle East director, were killed and 120 were in- jured in a 400-pound suicide truck-bomb attack on the U.S. Embassy in Beirut, Lebanon. The Islamic Jihad claimed responsibility. Colombian Hostage-taking, April 8, 1983: A U.S. citizen was seized by the Revolutionary Armed Forces of Colombia (FARC) and held for ransom. Murder of Missionaries, December 4, 1981: Three American nuns and one lay missionary were found murdered outside San Salvador,
  • 13. El Salvador.They were killed by members of the National Guard, and the killers are cur- rently in prison. Assassination of Egyptian President, October 6, 1981: Soldiers who were secretly members of the Takfir Wal-Hajira sect attacked and killed Egyptian President Anwar Sadat during a troop review. U.S. Installation Bombing, August 31, 1981: The Red Army exploded a bomb at the U.S. Air Force Base at Ramstein, West Germany. Grand Mosque Seizure, November 20, 1979: 200 Islamic terrorists seized the Grand Mosque in Mecca, Saudi Arabia, taking hundreds of pilgrims hostage. Saudi and French security forces retook the shrine after an intense battle in which some 250 people were killed and 600 wounded. IS B N 0 -5 5 8 -3 7 2 7
  • 14. 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. INTRODUCTION 5 Iran Hostage Crisis, November 4, 1979: After President Carter agreed to admit the Shah of Iran into the United States, Iranian radicals seized the U.S. Embassy in Tehran and took 66 American diplomats hostage.Thir- teen hostages were soon released, but the remaining 53 were held until their release on January 20, 1981. Ambassador to Afghanistan Assassinated, February 14, 1979: Four Afghans kidnapped U.S. Ambassador Adolph Dubs in Kabul and demanded the re- lease of various “religious figures.” Dubs was killed, along with four alleged terrorists, when Afghan police stormed the hotel room where he was being held. Assassination of Former Chilean Diplomat, September 21, 1976: Exiled Chilean Foreign Minister Orlando Letelier was killed by a car bomb in Washington. Domestic Terrorism, January 27–29, 1975: Puerto Rican nationalists bombed a Wall Street bar, killing four and injuring 60; two days
  • 15. later, the Weather Underground claims responsibility for an explosion in a bathroom at the U.S. Department of State in Washington. Ambassador to Cyprus Assassinated, August 19, 1974: U.S. Ambassador to Cyprus Rodger P. Davies and his Greek Cypriot secretary were shot and killed by snipers during a demonstration outside the U.S. Embassy in Nicosia. Attack and Hijacking at the Rome Airport, December 17, 1973: Five terrorists pulled weapons from their luggage in the terminal lounge at the Rome airport, killing two persons. They then attacked a Pan American 707 bound for Beirut and Tehran, destroying it with incendiary grenades and killing 29 persons, including 4 senior Moroccan officials and 14 American employees of ARAMCO.They then herded 5 Italian hostages into a Lufthansa airliner and killed an Italian customs agent as he tried to escape, after which they forced the pilot to fly to Beirut. After Lebanese authorities refused to let the plane land, it landed in Athens, where the terrorists demanded the release of 2 Arab terrorists. In order to make Greek authorities comply with their de- mands, the terrorists killed a hostage and threw his body onto the tarmac.The plane then flew to Damascus, where it stopped for two hours to obtain fuel and food. It then flew to Kuwait, where the terrorists released their hostages in return for passage to an un- known destination. The Palestine Liberation Organization disavowed the attack, and no group claimed responsibility for it.
  • 16. Consul General in Mexico Kidnapped, May 4, 1973: U.S. Consul General in Guadalajara,Terrence Leonhardy, was kidnapped by members of the People’s Revolutionary Armed Forces. Ambassador to Sudan Assassinated, March 2, 1973: U.S. Ambassador to Sudan, Cleo A. Noel, and other diplomats were assassinated at the Saudi Arabian Embassy in Khartoum by members of the Black September organization. Munich Olympic Massacre, September 5, 1972: Eight Palestinian “Black September” terrorists seized eleven Israeli athletes in the Olympic Village in Munich,West Germany. In a bungled rescue attempt by West German authorities, nine of the hostages and five terrorists were killed. IS B N 0 -5 5 8 -3 7 2 7 5 -9
  • 17. Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 6 CHAPTER 1 The Era of Homeland Security “Bloody Friday,” July 21, 1972: An Irish Republican Army (IRA) bomb attack killed eleven people and injured 130 in Belfast, Northern Ireland. Ten days later, three IRA car bomb attacks in the village of Claudy left six dead. U.S. Agency for International Development Adviser Kidnapped, July 31, 1970: In Montevideo, Uruguay, the Tupamaros terrorist group kidnapped AID Police adviser Dan Mitrione; his body was found on August 10. Ambassador to Brazil Kidnapped, September 3, 1969: U.S. Ambassador to Brazil Charles Burke Elbrick was kidnapped by the Marxist revolu- tionary group MR-8. Ambassador to Japan Attacked, July 30, 1969: U.S. Ambassador to Japan, A. H. Meyer, was attacked by a knife-wielding Japanese citizen. Ambassador to Guatemala Assassinated, August 28, 1968: U.S. Ambassador to Guatemala, John Gordon Mein, was murdered by a rebel faction when gunmen forced his official car off the road in Guatemala City and raked the vehi- cle with gunfire.
  • 18. First U.S. Aircraft Hijacked, May 1, 1961: Puerto Rican born Antuilo Ramierez Ortiz forced at gunpoint a National Airlines plane to fly to Havana, Cuba, where he was given asylum. Source: U.S. Army—Timeline of Terrorism,Available online at http://www.army.mil/terrorism THE THREAT—AL QAEDA Thomas Friedman, a columnist for the New York Times, argued in an op-ed piece that America in the 1990s experienced the growth of three bubbles, all of which burst at the beginning of the twenty-first century.1 The three bubbles included the stock market, corporate governance, and terrorism. The first bubble burst when the various dot-com organizations became greatly inflated in the 1990s, and the stock market simply adjusted their values downward in 2000. The second bubble burst at about the same time, when a number of ethical lapses were allowed to go unchecked throughout the 1990s until the illegal activities of corporate firms Enron and Arthur Andersen were revealed. The third bubble burst on September 11, 2001, and resulted from the terrorism bubble that was allowed to grow during the 1990s. The terrorism bubble, Friedman asserted, “started with the suicide bombings against U.S. troops in Saudi Arabia, was followed by attacks on the U.S. Embassies in East Africa and on the USS Cole, then ballooned with the rise of Palestinian suicide ter-
  • 19. rorism in Israel and finally peaked with Al Qaeda’s attack on 9/11.”2 Friedman traced most of what led up to the third bubble as being the result of Osama bin Laden and the terrorist organization Al Qaeda’s ability to grow in power unchecked during the 1990s. He explained that like the other two bubbles, “the terrorism bubble was the product of a kind of temporary insanity, in which basic norms were ignored and excessive behavior IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE THREAT—AL QAEDA 7
  • 20. was justified by new theories.”3 The threat of Al Qaeda was ultimately what led to the bubble bursting and ushering in the post–September 11th world, or as Friedman calls it, the “post-bubble world.”4 Understanding the origin of this threat, namely Osama bin Laden and his terrorist network Al Qaeda, and how this threat developed is important to understanding what led us into the era of Homeland Security. The Bubble Forms Al Qaeda was founded by Osama bin Laden in Afghanistan in 1988.5 Osama bin Laden was born in July 1957, the seventeenth of twenty sons of a Saudi construction magnate of Yemeni origin. Many Saudis were conservative Sunni Muslims, and bin Laden adopted militant Islamist views while studying at King Abdul Aziz University in Jeddah, Saudi Arabia. There he studied Islam under Muhammad Qutb, brother of Sayyid Qutb, the key idealogue of a major Sunni Islamist movement, the Muslim Brotherhood.6 Another of bin Laden’s instructors was a major figure in the Jordanian branch of the Muslim Brother- hood, Dr. Abdullah Azzam. Azzam has been identified by some experts as the intellectual architect of the jihad against the 1979–1989 Soviet occupation of Afghanistan and ultimately of Al Qaeda itself;7 he cast the Soviet invasion as an attempted conquest by a non-Muslim power of sacred Muslim territory and people. Bin Laden went to Afghanistan shortly after the December 1979 Soviet invasion and
  • 21. joined Azzam there. He reportedly used some of his personal funds8 to establish himself as a donor to the Afghan mujahedin and a recruiter of Arab and other Islamic volunteers for the war. In 1984 Azzam and bin Laden structured this assistance by establishing a net- work of recruiting and fund-raising offices in the Arab world, Europe, and the United States. That network was called the Maktab al-Khidamat (Services Office), also known as Al Khifah; many experts consider the Maktab network to be the organizational forerun- ner of Al Qaeda. Another major figure who utilized the Maktab network to recruit for the anti-Soviet jihad was Umar Abd al-Rahman (also known as “the blind shaykh”), the spir- itual leader of radical Egyptian Islamist group Al Jihad. Bin Laden also fought in the anti- Soviet war, participating in a 1986 battle in Jalalabad and, more notably, a 1987 frontal assault by foreign volunteers against Soviet armor. Bin Laden has said he was exposed to a Soviet chemical attack and slightly injured in that battle.9 During this period, most U.S. officials perceived the volunteers as positive contrib- utors to the effort to expel Soviet forces from Afghanistan, and U.S. officials made no ap- parent effort to stop the recruitment of non-Afghan volunteers for the war. U.S. officials have repeatedly denied that the United States directly supported the volunteers, al- though the United States did covertly finance (about $3 billion during 1981–1991) and arm (via Pakistan) the Afghan mujahedin factions, particularly the Islamic fundamentalist
  • 22. Afghan factions, fighting Soviet forces. At this time, neither bin Laden, Azzam, nor Abd al-Rahman was known to have openly advocated, undertaken, or planned any di- rect attacks against the United States, although they were critical of U.S. support for Israel in the Middle East. In 1988, toward the end of the Soviet occupation, bin Laden and Azzam began contemplating how, and to what end, to utilize the Islamist volunteer network they had organized. U.S. intelligence estimates of the size of that network was about 10,000 to 20,000, although not all of these necessarily supported or joined Al Qaeda terrorist IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson
  • 23. Education, Inc. 8 CHAPTER 1 The Era of Homeland Security activities.10 Azzam reportedly wanted this “Al Qaeda” (Arabic for “the base”) organiza- tion to become an Islamic “rapid reaction force,” available to intervene wherever Mus- lims were perceived to be threatened. Bin Laden differed with Azzam, hoping instead to dispatch the Al Qaeda activists to their home countries to try to topple secular, pro-Western Arab leaders, such as President Hosni Mubarak of Egypt and Saudi Arabia’s royal family. Some attribute their differences to the growing influence on bin Laden by the Egyptians in his inner circle, such as Abd al-Rahman, who wanted to use Al Qaeda’s resources to install an Islamic state in Egypt. Another close Egyptian confidant was Dr. Ayman al- Zawahiri, operational leader of Al Jihad in Egypt. Like Abd al- Rahman, Zawahiri had been imprisoned but ultimately acquitted for the October 1981 assassination of Egypt- ian President Anwar Sadat, and he permanently left Egypt for Afghanistan in 1985. There, he used his medical training to tend to wounded fighters in the anti-Soviet war. In November 1989, Azzam was assassinated, and some allege that bin Laden might have been responsible for the killing to resolve this power struggle. Following Azzam’s death, bin Laden gained control of the Maktab’s funds and organizational mechanisms.
  • 24. Abd al-Rahman later came to the United States and was convicted in October 1995 for terrorist plots related to the February 1993 bombing of the World Trade Center. Zawahiri stayed with bin Laden to serve as bin Laden’s main strategist; he is believed to still be serving in that role today. The Bubble Grows The August 2, 1990, Iraqi invasion of Kuwait apparently turned bin Laden from a de facto U.S. ally against the Soviet Union into one of its most active adversaries.11 Bin Laden had returned home to Saudi Arabia in 1989 after the completion of the Soviet withdrawal from Afghanistan that February. While back home, he lobbied Saudi officials not to host the 500,000 U.S. combat troops that defended Saudi Arabia from the Iraqi invasion and ultimately expelled Iraq from Kuwait in Operation Desert Storm (January 17–February 28, 1991). He argued instead for the raising of a “mujahedin” army to oust Iraq from Kuwait, but his idea was rebuffed as impractical, causing a falling out with Saudi leaders. He relocated to Sudan in 1991, buying property there that he used to host and train Al Qaeda militants—this time, for use against the United States and its interests, as well as for jihad operations in the Balkans, Chechnya, Kashmir, and the Phillipines. He re- mained there until the Sudanese government, under U.S. and Egyptian pressure, ex- pelled him in May 1996; he then returned to Afghanistan and helped the Taliban gain and maintain control of Afghanistan. The Taliban would capture
  • 25. the capital, Kabul, in September of 1996. Bin Laden and Zawahiri apparently believed that the only way to bring Islamic regimes to power was to oust from the region the perceived backer of secular regional regimes, the United States. During the 1990s, bin Laden and Zawahiri transformed Al Qaeda into a global threat to U.S. national security by engaging in a number of attacks against the United States and its interests. In 1992, Al Qaeda claimed responsibility for bombing a hotel in Yemen where 100 U.S. military personnel were awaiting deployment to Somalia for Operation Restore Hope. No one was killed. However, Al Qaeda was re- sponsible for the tragedy that subsequently followed during this operation in Somalia. Al Qaeda claimed responsibility for arming Somali factions, who battled U.S. forces there IS B N 0 -5 5 8 -3 7 2
  • 26. 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE THREAT—AL QAEDA 9 BOX 1-2 TERRORISM TIME LINE (ABBREVIATED) FIRST WORLD TRADE CENTER (1993) TO SEPTEMBER 11, 2001 Philippines Hostage Incident, May 27, 2001: Muslim Abu Sayyaf guerrillas seized 13 tourists and 3 staff members at a resort on Palawan Island and took their captives to Basilan Island.The captives included three U.S. citizens: Guellermo Sobero and missionaries Martin and Gracia Burnham. Philippine troops fought a series of battles with the guerrillas between June 1 and June 3, during which nine hostages escaped and two were found dead.The guerrillas took additional hostages when they seized the hospital in the town of Lamitan. On June 12, Abu Sayyaf spokesman Abu Sabaya claimed that Sobero had been killed and beheaded; his body was found in Octo- ber.The Burnhams remained in captivity until June 2002.
  • 27. Manila Bombing, December 30, 2000: A bomb exploded in a plaza across the street from the U.S. Embassy in Manila, injuring nine persons. The Moro Islamic Liberation Front was likely responsible. Helicopter Hijacking, October 12, 2000: In Sucumbios Province, Ecuador, a group of armed kidnappers led by former members of defunct Colombian terrorist organization the Popular Liberation Army (EPL) took hostage 10 employees of Spanish energy consortium REPSOL.Those kidnapped included five U.S. citizens, one Argentine, one Chilean, one New Zealander, and two French pilots, who escaped four days later. On January 30, 2001, the kidnappers murdered American hostage Ronald Sander.The remaining hostages were released on February 23 following the payment of $13 million in ransom by the oil companies. Attack on USS Cole, October 12, 2000: In Aden,Yemen, a small dinghy carrying explosives rammed the destroyer USS Cole, killing seventeen sailors and injuring 39 others. Supporters of Osama bin Laden were suspected. Church Bombing in Tajikistan, October 1, 2000: Unidentified militants detonated two bombs in a Christian church in Dushanbe, killing seven persons and injuring 70 others.The church was founded by a Korean-born U.S. citizen, and most of those killed and wounded were Korean. No one claimed responsibility.
  • 28. Kidnappings in Kyrgyzstan, August 12, 2000: In the Kara-Su Valley, the Islamic Movement of Uzbekistan took four U.S. citizens hostage. The Americans escaped on August 12. ELN Kidnapping, June 27, 2000: In Bogota, Colombia, ELN militants kidnapped a five-year-old U.S. citizen and his Colombian mother, demanding an undisclosed ransom. RUF Attacks on U.N. Mission Personnel, May 1, 2000: On May 1 in Makeni, Sierra Leone, Revolutionary United Front (RUF) militants kidnapped at least 20 members of the United Nations Assistance Mission in Sierra Leone (UNAMSIL) and surrounded and opened fire on a UNAMSIL facility, according to press reports.The IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver.
  • 29. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 10 CHAPTER 1 The Era of Homeland Security militants killed five UN soldiers in the attack. RUF militants kidnapped 300 UNAMSIL peacekeepers throughout the country, according to press reports. On May 15 in Foya, Liberia, the kidnappers released 139 hostages. On May 28 on the Liberia and Sierra Leone border, armed militants released unharmed the last of the UN peacekeepers. PLA Kidnapping, December 23, 1999: Colombian People’s Liberation Army (PLA) forces kidnapped a U.S. citizen in an unsuc- cessful ransoming effort. Burmese Embassy Seizure, October 1, 1999: Burmese dissidents seized the Burmese Embassy in Bangkok,Thailand, taking 89 persons hostage, including one U.S. citizen. AFRC Kidnappings,August 4, 1999: An Armed Forces Revolutionary Council (AFRC) faction kidnapped 33 UN representa- tives near Occra Hills, Sierra Leone. The hostages included one U.S. citizen, five British soldiers, one Canadian citizen, one representative from Ghana, one military officer from Russia, one officer from Kyrgystan, one officer from Zambia, one officer from Malaysia, a local bishop, two UN officials, two local journalists, and 16
  • 30. Sierra Leonean nationals. Shell Platform Bombing, June 27, 1999: In Port Harcourt, Nigeria, armed youths stormed a Shell oil platform, kidnapping one U.S. citizen, one Nigerian national, and one Australian citizen and causing undetermined dam- age. A group calling itself “Enough is Enough in the Niger River” claimed responsibility. Further seizures of oil facilities followed. ELN Hostage-taking, May 30, 1999: In Cali, Colombia, armed ELN militants attacked a church in the neighborhood of Ciudad Jardin, kidnapping 160 persons, including six U.S. citizens and one French national. The rebels released approximately 80 persons, including three U.S. citizens, later that day. ELN Hostage-taking, March 23, 1999: Armed guerrillas kidnapped a U.S. citizen in Boyaca, Colombia. The National Liberation Army (ELN) claimed responsibility and demanded $400,000 ransom. On 20 July, ELN rebels released the hostage unharmed following a ransom payment of $48,000. Hutu Abductions, March 1, 1999: 150 armed Hutu rebels attacked three tourist camps in Uganda, killed four Ugandans, and abducted three U.S. citizens, six Britons, three New Zealanders, two Danish citizens, one Australian, and one Canadian national. Two of the U.S. citizens and six of the other hostages were subsequently killed by their abductors.
  • 31. FARC Kidnappings, February 25, 1999: FARC kidnapped three U.S. citizens working for the Hawaii- based Pacific Cultural Con- servancy International. On March 4, the bodies of the three victims were found in Venezuela. Ugandan Rebel Attack, February 14, 1999: A pipe bomb exploded inside a bar, killing five persons and injuring 35 others. One Ethiopian and four Ugandan nationals died in the blast, and one U.S. citizen working for IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc.
  • 32. THE THREAT—AL QAEDA 11 USAID, two Swiss nationals, one Pakistani, one Ethiopian, and 27 Ugandans were injured. Ugandan authorities blamed the attack on the Allied Democratic Forces (ADF). Angolan Aircraft Downing, January 2, 1999: A UN plane carrying one U.S. citizen, four Angolans, two Philippine nationals, and one Namibian was shot down, according to a UN official. No deaths or injuries were reported. Angolan authorities blamed the attack on National Union for the Total Independence of Angola (UNITA) rebels. UNITA officials denied shooting down the plane. Armed Kidnapping in Colombia, November 15, 1998: Armed assailants followed a U.S. businessman and his family home in Cundinamarca De- partment and kidnapped his 11-year-old son after stealing money, jewelry, one automo- bile, and two cell phones.The kidnappers demanded $1 million in ransom. On January 21, 1999, the kidnappers released the boy. Colombian Pipeline Bombing, October 18, 1998: A National Liberation Army (ELN) planted bomb exploded on the Ocensa pipeline in An- tioquia Department, killing approximately 71 persons and injuring at least 100 others.The pipeline is jointly owned by the Colombia State Oil Company Ecopetrol and a consor-
  • 33. tium including U.S., French, British, and Canadian companies. U.S. Embassy Bombings in East Africa, August 7, 1998: A bomb exploded at the rear entrance of the U.S. Embassy in Nairobi, Kenya, killing 12 U.S. citizens, 32 Foreign Service Nationals (FSNs), and 247 Kenyan citizens. Ap- proximately 5,000 Kenyans, 6 U.S. citizens, and 13 FSNs were injured.The U.S. Embassy building sustained extensive structural damage. Almost simultaneously, a bomb deto- nated outside the U.S. Embassy in Dar es Salaam,Tanzania, killing 7 FSNs and 3 Tanzanian citizens, and injuring 1 U.S. citizen and 76 Tanzanians. The explosion caused major structural damage to the U.S. Embassy facility. The U.S. Government held Osama bin Laden responsible. Somali Hostage-takings, April 15, 1998: Somali militiamen abducted nine Red Cross and Red Crescent workers at an airstrip north of Mogadishu.The hostages included a U.S. citizen, a German, a Belgian, a French, a Norwegian, two Swiss, and one Somali.The gunmen were members of a subclan loyal to Ali Mahdi Mohammed, who controlled the northern section of the capital. FARC Abduction, March 21–23, 1998: FARC rebels kidnapped a U.S. citizen in Sabaneta, Colombia. FARC members also killed 3 persons, wounded 14, and kidnapped at least 27 others at a roadblock near Bogota. Four U.S. citizens and one Italian were among those kidnapped, as well as the acting pres-
  • 34. ident of the National Electoral Council (CNE) and his wife. Murder of U.S. Businessmen in Pakistan, November 12, 1997: Two unidentified gunmen shot to death four U.S. auditors from Union Texas Petroleum Corporation and their Pakistani driver after they drove away from the Sheraton Hotel in Karachi.The Islami Inqilabi Council, or Islamic Revolutionary Council, claimed responsi- bility in a call to the U.S. Consulate in Karachi. In a letter to Pakistani newspapers, the Aimal Khufia Action Committee also claimed responsibility. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc.
  • 35. 12 CHAPTER 1 The Era of Homeland Security Yemeni Kidnappings, October 30, 1997: Al-Sha’if tribesmen kidnapped a U.S. businessman near Sanaa.The tribesmen sought the release of two fellow tribesmen who were arrested on smuggling charges and several public works projects they claim the government promised them. They released the hostage on November 27. Israeli Shopping Mall Bombing, September 4, 1997: Three suicide bombers of HAMAS detonated bombs in the Ben Yehuda shopping mall in Jerusalem, killing eight persons, including the bombers, and wounding nearly 200 others. A dual U.S./Israeli citizen was among the dead, and 7 U.S. citizens were wounded. Hotel Nacional Bombing, July 12, 1997: A bomb exploded at the Hotel Nacional in Havana, injuring three persons and causing minor damage. A previously unknown group calling itself the Military Liberation Union claimed responsibility. FARC Kidnapping, March 7, 1997: FARC guerrillas kidnapped a U.S. mining employee and his Colombian colleague, who were searching for gold in Colombia. On November 16, the rebels released the two hostages after receiving a $50,000 ransom. ELN Kidnapping, February 24, 1997: National Liberation Army (ELN) guerrillas kidnapped a U.S. citizen employed by a Las Ve-
  • 36. gas gold corporation, who was scouting a gold mining operation in Colombia. The ELN demanded a ransom of $2.5 million. Empire State Building Sniper Attack, February 23, 1997: A Palestinian gunman opened fire on tourists at an observation deck atop the Empire State Building in New York City, killing a Danish national and wounding visitors from the United States, Argentina, Switzerland, and France before turning the gun on himself. A handwritten note carried by the gunman claimed this was a punishment attack against the “enemies of Palestine.” Venezuelan Abduction, February 14, 1997: Six armed Colombian guerrillas kidnapped a U.S. oil engineer and his Venezuelan pilot in Apure,Venezuela.The kidnappers released the Venezuelan pilot on February 22. Accord- ing to authorities, the FARC is responsible for the kidnapping. Egyptian Letter Bombs, January 2–13, 1997: A series of letter bombs with Alexandria, Egypt, postmarks were discovered at Al-Hayat newspaper bureaus in Washington, New York City, London, and Riyadh, Saudi Arabia. Three similar devices, also postmarked in Egypt, were found at a prison facility in Leav- enworth, Kansas. Bomb disposal experts defused all the devices, but one detonated at the Al-Hayat office in London, injuring two security guards and causing minor damage. Tupac Amaru Seizure of Diplomats, December 17, 1996: Twenty-three members of the Tupac Amaru Revolutionary
  • 37. Movement (MRTA) took sev- eral hundred people hostage at a party given at the Japanese Ambassador’s residence in Lima, Peru. Among the hostages were several U.S. officials, foreign ambassadors, and other diplomats, Peruvian Government officials, and Japanese businessmen.The group demanded IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE THREAT—AL QAEDA 13
  • 38. the release of all MRTA members in prison and safe passage for them and the hostage takers.The terrorists released most of the hostages in December but held 81 Peruvians and Japanese citizens for several months. Abduction of US. Citizen by FARC, December 11, 1996: Five armed men claiming to be members of the Revolutionary Armed Forces of Colom- bia (FARC) kidnapped and later killed a U.S. geologist at a methane gas exploration site in La Guajira Department. Paris Subway Explosion, December 3, 1996: A bomb exploded aboard a Paris subway train as it arrived at the Port Royal station, killing two French nationals, a Moroccan, and a Canadian and injuring 86 persons.Among those injured were one U.S. citizen and a Canadian. No one claimed responsibility for the at- tack, but Algerian extremists are suspected. Red Cross Worker Kidnappings, November 1, 1996: In Sudan a breakaway group from the Sudanese People’s Liberation Army (SPLA) kid- napped three International Committee of the Red Cross (ICRC) workers, including a U.S. citizen, an Australian, and a Kenyan. On December 9 the rebels released the hostages in exchange for ICRC supplies and a health survey for their camp. PUK Kidnapping, September 13, 1996: In Iraq, Patriotic Union of Kurdistan (PUK) militants kidnapped four French workers for Pharmaciens Sans Frontieres, a Canadian United Nations High Commissioner for
  • 39. Refugees (UNHCR) official, and two Iraqis. Sudanese Rebel Kidnapping, August 17, 1996: Sudan People’s Liberation Army (SPLA) rebels kidnapped six missionaries in Mapourdit, including a U.S. citizen, an Italian, three Australians, and a Sudanese.The SPLA released the hostages 11 days later. Khobar Towers Bombing, June 25, 1996: A fuel truck carrying a bomb exploded outside the U.S. military’s Khobar Towers hous- ing facility in Dhahran, killing 19 U.S. military personnel and wounding 515 persons, in- cluding 240 U.S. personnel. Several groups claimed responsibility for the attack. Zekharya Attack, June 9, 1996: Unidentified gunmen opened fire on a car near Zekharya, killing a dual U.S./Israeli citizen and an Israeli.The Popular Front for the Liberation of Palestine (PFLP) was suspected. AID Worker Abduction, May 31, 1996: A gang of former Contra guerrillas kidnapped a U.S. employee of the Agency for Inter- national Development (AID) who was assisting with election preparations in rural north- ern Nicaragua. She was released unharmed the next day after members of the international commission overseeing the preparations intervened. West Bank Attack, May 13, 1996: Arab gunmen opened fire on a bus and a group of Yeshiva students near the Bet El set-
  • 40. tlement, killing a dual U.S./Israeli citizen and wounding three Israelis. No one claimed re- sponsibility for the attack, but HAMAS was suspected. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 14 CHAPTER 1 The Era of Homeland Security Dizengoff Center Bombing, March 4, 1996: HAMAS and the Palestine Islamic Jihad (PIJ) both claimed responsibility for a bombing outside Tel Aviv’s largest shopping mall that killed 20 persons and injured 75 others, in- cluding 2 U.S. citizens.
  • 41. HAMAS Bus Attack, February 26, 1996: In Jerusalem, a suicide bomber blew up a bus, killing 26 persons, including three U.S. citi- zens, and injuring some 80 persons, including three other U.S. citizens. ELN Kidnapping, February 16, 1996: Six alleged National Liberation Army (ELN) guerrillas kidnapped a U.S. citizen in Colombia. After nine months, the hostage was released. Athens Embassy Attack, February 15, 1996: Unidentified assailants fired a rocket at the U.S. Embassy compound in Athens, causing mi- nor damage to three diplomatic vehicles and some surrounding buildings. Circumstances of the attack suggested it was an operation carried out by the 17 November group. IRA Bombing, February 9, 1996: An Irish Republican Army (IRA) bomb detonated in London, killing 2 persons and wound- ing more than 100 others, including 2 U.S. citizens. Tamil Tigers Attack, January 31, 1996: Members of the Liberation Tigers of Tamil Eelam (LTTE) rammed an explosives-laden truck into the Central Bank in the heart of downtown Colombo, Sri Lanka, killing 90 civil- ians and injuring more than 1,400 others, including 2 U.S. citizens. Kidnapping in Colombia, January 19, 1996: Revolutionary Armed Forces of Colombia (FARC) guerrillas kidnapped a U.S. citizen and demanded a $1 million ransom.The hostage was released on
  • 42. May 22. Saudi Military Installation Attack, November 13, 1995: The Islamic Movement of Change planted a bomb in a Riyadh military compound that killed one U.S. citizen, several foreign national employees of the U.S. government, and over 40 others. Attack on U.S. Embassy in Moscow, September 13, 1995: A rocket-propelled grenade was fired through the window of the U.S. Embassy in Moscow, ostensibly in retaliation for U.S. strikes on Serb positions in Bosnia. Jerusalem Bus Attack, August 21, 1995: HAMAS claimed responsibility for the detonation of a bomb that killed 6 and injured over 100 persons, including several U.S. citizens. Kashmiri Hostage-taking, July 4, 1995: In India six foreigners, including two U.S. citizens, were taken hostage by Al-Faran, a Kash- miri separatist group. One non–U.S. hostage was later found beheaded. Bombing of the Federal Building in Oklahoma City, April 19, 1995: Right-wing extremists Timothy McVeigh and Terry Nichols destroyed the Federal Build- ing in Oklahoma City with a massive truck bomb that killed 166 and injured hundreds more in what was up to then the largest terrorist attack on American soil. IS
  • 43. B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE THREAT—AL QAEDA 15 Attack on U.S. Diplomats in Pakistan, March 8, 1995: Two unidentified gunmen killed two U.S. diplomats and wounded a third in Karachi, Pakistan. FARC Hostage-taking, September 23, 1994: FARC rebels kidnapped U.S. citizen Thomas Hargrove in Colombia. Hebron Massacre, February 25, 1994:
  • 44. Jewish right-wing extremist and U.S. citizen Baruch Goldstein machine-gunned Moslem worshippers at a mosque in the West Bank town of Hebron, killing 29 and wounding about 150. Attempted Assassination of President Bush by Iraqi Agents, April 14, 1993: The Iraqi intelligence service attempted to assassinate former U.S. President George Bush during a visit to Kuwait. In retaliation, the U.S. launched a cruise missile attack two months later on the Iraqi capital Baghdad. World Trade Center Bombing, February 26, 1993: The World Trade Center in New York City was badly damaged when a car bomb planted by Islamic terrorists exploded in an underground garage. The bomb left 6 people dead and 1,000 injured.The men carrying out the attack were followers of Umar Abd al-Rah- man, an Egyptian cleric who preached in the New York City area. Source: U.S.Army—Timeline of Terrorism, Available on-line at http://www.army.mil/terrorism in October 1993 and who killed 18 U.S. special operation forces in Mogadishu in October 1993, as depicted in the book and movie by the same title, Black Hawk Down. Earlier that same year, Al Qaeda was involved in a more direct attack on the United States and its first on American soil. A growing body of information about central figures
  • 45. in the February 1993 bombing of the World Trade Center in New York City, particularly the reputed key bomb maker Ramzi Ahmad Yusef, suggests possible Al Qaeda involve- ment. As noted earlier, Abd Al-Rahman was convicted for plots related to this attack. The next attack by Al Qaeda came in June of 1995, in Ethiopia, when operatives of Al Qaeda allegedly aided the Egyptian militant Islamic Group in a nearly successful as- sassination attempt against the visiting Egyptian President Hosni Mubarak. That fall, Al Qaeda would strike America in Saudi Arabia. The four Saudi nationals who confessed to a November 1995 bombing of a U.S. military advisory facility in Riyadh, Saudi Arabia, claimed on Saudi television to have been inspired by bin Laden. Five Americans were killed in that attack. In addition, it is commonly believed that another attack on Ameri- cans in Saudi Arabia that occurred the next year was also by Al Qaeda. Specifically, the 9/11 Commission report indicates that Al Qaeda might have had a hand in the June 1996 bombing of the Khobar Towers complex near Dhahran, Saudi Arabia, although FBI of- ficials have attributed the attack primarily to Shiite Saudi dissidents working with Iran- ian agents. Nineteen U.S. airmen were killed. The next attack that Al Qaeda is alleged to have been responsible for was the August 1998 bombings of U.S. embassies in Kenya and Tanzania, which killed about 300. On Au- gust 20, 1998, two weeks after the attacks, the United States
  • 46. launched a cruise missile strike against bin Laden’s training camps in Afghanistan, reportedly missing him by a few IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 16 CHAPTER 1 The Era of Homeland Security hours. In July 1999 President Clinton imposed a ban on U.S. trade with Taliban-controlled Afghanistan and froze Taliban assets in the United States. Then, in December 1999, U.S. and Jordanian authorities separately thwarted related Al Qaeda plots against religious sites in Jordan and apparently against the Los Angeles
  • 47. International Airport. This prompted the issuance of UN Security Council Resolution 1333, on December 19, 2000, which banned any arms shipments or provision of military advice to the Taliban. The Clinton administration also pursued a number of covert operations against bin Laden during this same time frame of 1999–2000. Later, after President Bush entered the White House in January of 2001, nine months before the attacks of September 11th, his administration considered some new options, which included arming anti-Taliban opposition groups.12 The last significant attack by Al Qaeda before September 11th occurred in October 2000, when Al Qaeda activists attacked the USS Cole in a ship- borne suicide bombing while the Cole was docked at the harbor in Aden, Yemen. The ship was damaged, and 17 sailors were killed. The next attack and the bursting of the terrorism bubble came with the September 11, 2001, attacks. By this time, Al Qaeda had become a coalition of factions of radical Islamic groups operating throughout the Muslim world, mostly groups opposing their governments. Cells and associates have been located in over 70 countries, according to U.S. officials. Among the groups in the Al Qaeda coalition, vir- tually all of which are still active today, are the Islamic Group and Al Jihad (Egypt), the Armed Islamic Group and the Salafist Group for Call and Combat (Algeria), the Is- lamic Movement of Uzbekistan (IMU), the Jemaah Islamiyah
  • 48. (Indonesia), the Libyan Islamic Fighting Group (Libyan opposition), and Harakat ul- Majahedin (Pakistan, Kashmiri). THE ATTACK: SEPTEMBER 11, 2001 Tuesday September 11 dawned temperate and nearly cloudless in the eastern United States.13 Millions of men and women readied themselves for work. Some made their way to the Twin Towers, the signature structures of the World Trade Center complex in New York City. Others went to Arlington, Virginia, to the Pentagon. Across the Potomac River, the U.S. Congress was back in session. At the other end of Pennsylvania Avenue, people began to line up for a White House tour. In Sarasota, Florida, President George W. Bush went for an early morning run. For those heading to an airport, weather conditions could not have been better for a safe and pleasant journey. Among the travelers were Mohamed Atta and Abdul Aziz al Omari, who arrived at the airport in Portland, Maine. Boston: American 11 and United 175 Atta and Omari boarded a 6:00 a.m. flight from Portland to Boston’s Logan International Airport. When he checked in for his flight to Boston, Atta was selected by a computerized prescreening system known as CAPPS (Computer Assisted Passenger Prescreening Sys- tem), created to identify passengers who should be subject to
  • 49. special security measures. Under security rules in place at the time, the only consequence of Atta’s selection by IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE ATTACK: SEPTEMBER 11, 2001 17 CAPPS was that his checked bags were held off the plane until it was confirmed that he had boarded the aircraft. This did not hinder Atta’s plans.
  • 50. Atta and Omari arrived in Boston at 6:45 a.m. Seven minutes later, Atta apparently took a call from Marwan al Shehhi, a longtime colleague, who was at another terminal at Logan Airport. They spoke for three minutes. It would be their final conversation. Between 6:45 and 7:40, Atta and Omari, along with Satam al Suqami, Wail al Sherhi, and Waleed al Shehri, checked in and boarded American Airlines Flight 11, bound for Los Angeles. The flight was scheduled to depart at 7:45 a.m. In another Logan terminal, Shehhi, joined by Fayez Banihammad, Mohand al Shehri, Ahmed al Ghamdi, and Hamza al Ghamdi, checked in for United Airlines Flight 175, also bound for Los Angeles. A couple of Shehhi’s colleagues were obviously unused to travel; according to the United ticket agent, they had trouble understanding the stan- dard security questions, and she had to go over them slowly until they gave the routine, reassuring answers. Their flight was scheduled to depart at 8:00 a.m. The security checkpoints through which passengers, including Atta and his col- leagues, gained access to the American 11 gate were operated by Globe Security under a contract with American Airlines. In a different terminal, the single checkpoint through The Collapse of the World Trade Center Building, September 11, 2001. (Source: AP Wide World Photos.)
  • 51. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 18 CHAPTER 1 The Era of Homeland Security which passengers for United 175 passed was controlled by United Airlines, which had contracted with Huntleigh USA to perform the screening. In passing through these checkpoints, each of the hijackers would have been screened by a walk-through metal detector calibrated to detect items with at least the mental content of a .22 caliber handgun. Anyone who might have set off that detector
  • 52. would have been screened with a hand wand—a procedure requiring the screener to identify the metal item or items that caused the alarm. In addition, an X-ray machine would have screened the hijackers’ carry-on belongings. The screening was in place to identify and confiscate weapons and other items prohibited from being carried onto a commercial flight. None of the checkpoint supervisors recalled the hijackers or reported anything suspicious regarding their screening. As Atta had been selected by CAPPS in Portland, three members of his hijacking team—Suqami, Wail al Shehri, and Waleed al Shehri—were selected in Boston. Their selection affected only the handling of their checked bags, not their screening at the checkpoint. All five men cleared the checkpoint and made their way to the gate for Amer- ican 11. Atta, Omari, and Suqami took their seats in business class. The Shehri brothers had adjacent seats in row 2, in the first-class cabin. They boarded American 11 between 7:31 and 7:40. The aircraft pushed back from the gate at 7:40. Shehi and his team, none of whom had been selected by CAPPS, boarded United 175 between 7:23 and 7:28. Their aircraft pushed back from the gate just before 8:00. Washington Dulles: America 77 Hundreds of miles southwest of Boston, at Dulles International Airport in the Virginia suburbs of Washington, D.C., five more men were preparing to take their early morning
  • 53. flight. At 7:15, a pair of them, Khalid al Mihdhar and Majed Moqed, checked in at the American Airlines ticket counter for Flight 77, bound for Los Angeles. Within the next 20 minutes, they would be followed by Hani Hanjour and two brothers, Nawaf al Hazmi and Salem al Hazmi. Hani Hanjour, Khalid al Mihdhar, and Majed Moqed were flagged by CAPPS. The Hazmi brothers were also selected for extra scrutiny by the airline’s customer service repre- sentative at the check-in counter. He did so because one of the brothers did not have photo identification nor could he understand English, and because the agent found both of the pas- sengers to be suspicious. The only consequence of their selection was that their checked bags were held off the plane until it was confirmed that they had boarded the aircraft. All five hijackers passed through the main terminal’s west security screening check- point; United Airlines, which was the responsible air carrier, had contracted out the work to Argenbright Security. The checkpoint featured closed-circuit television that recorded all passengers, including the hijackers, as they were screened. At 7:18, Mihdhar and Mo- qed entered the security checkpoint. Midhar and Moqed placed their carry-on bags on the belt of the X-ray machine and proceeded through the first metal detector. Both set off the alarm, and they were directed to a second metal detector. Mihdhar did not trigger the alarm
  • 54. and was permitted through the checkpoint. After Moqed set it off, a screener wanded him. He passed this inspection. About 20 minutes later, at 7:35, another passenger for Flight 77, Hani Hanjour, placed two carry-on bags on the X-ray belt in the main terminal’s west checkpoint and proceeded, IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE ATTACK: SEPTEMBER 11, 2001 19 without alarm, through the metal detector. A short time later,
  • 55. Nawaf and Salem al Hazmi entered the same checkpoint. Salem al Hazmi cleared the metal detector and was permit- ted through; Nawaf al Hazmi set off the alarms for both the first and second metal detectors and was then hand-wanded before being passed. In addition, his over-the-shoulder carry-on bag was swiped by an explosive trace detector and then passed. The video footage indicated that he was carrying an unidentified item in his back pocket, clipped to its rim. When the local civil aviation security office of the Federal Aviation Administration (FAA) later investigated these security screening operations, the screeners recalled noth- ing out of the ordinary. They could not recall that any of the passengers they screened were CAPPS selectees. The 9/11 Commission asked a screening expert to review the videotape of the hand-wanding, and he found the quality of the screener’s work to have been “marginal at best.” The screener should have “resolved” what set off the alarm; and in the case of both Moqed and Hazmi, it was clear that he did not. At 7:50, Majed Moqed and Khalid al Mihdhar boarded the flight and were seated in 12A and 12B coach. Hani Hanjour, assigned to seat 1B (first class), soon followed. The Hazmi brothers, sitting in 5E and 5F, joined Hanjour in the first-class cabin. Newark: United 93 Between 7:03 and 7:39, Saeed al Ghamdi, Ahmed al Nami,
  • 56. Ahmad al Haznawi, and Ziad Jarrah checked in at the United Airlines ticket counter for Flight 93, going to Los Angeles. Two checked bags; two did not. Haznawi was selected by CAPPS. His checked bag was screened for explosives and then loaded on the plane. The four men passed through the security checkpoint, owned by United Airlines and operated under contract by Argenbright Security. Like the checkpoints in Boston, it lacked closed-circuit television surveillance, so there is no documentary evidence to in- dicate when the hijackers passed through the checkpoint, what alarms may have been triggered, or what security procedures were administered. The FAA interviewed the screeners later; none recalled anything unusual or suspicious. The four men boarded the plane between 7:39 and 7:48. All four had seats in the first-class cabin; their plane had no business-class section. Jarrah was in seat 1B, closest to the cockpit; Nami was in 3C, Ghamdi in 3D, and Haznawi in 6B. The 19 men were aboard four transcontinental flights. They were planning to hijack these planes and turn them into large guided missiles, loaded with up to 11,400 gallons of jet fuel. By 8:00 a.m. on the morning of Tuesday, September 11, 2001, they had defeated all the security layers that America’s civil aviation security system then had in place to prevent a hijacking.
  • 57. The Hijacking of American 11 American Airlines Flight 11 provided nonstop service from Boston to Los Angeles. On September 11, Captain John Ogonowski and First Officer Thomas McGuinness piloted the Boeing 767. It carried its full capacity of nine flight attendants. Eighty-one passen- gers boarded the flight with them (including the five terrorists). The plane took off at 7:59. Just before 8:14, it had climbed to 26,000 feet, not quite its initial assigned cruising altitude of 29,000 feet. All communications and flight profile IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc.
  • 58. 20 CHAPTER 1 The Era of Homeland Security data were normal. About this time the Fasten Seatbelt sign would usually have been turned off, and the flight attendants would have begun preparing for cabin service. At that same time, American 11 had its last routine communication with the ground when it acknowledged navigational instructions from the FAA’s air traffic control (ATC) center in Boston. Sixteen seconds after that transmission, ATC instructed the aircraft’s pilots to climb to 35,000 feet. That message and all subsequent attempts to contact the flight were not acknowledged. From this and other evidence, the 9/11 Commission be- lieves the hijacking began at 8:14 or shortly thereafter. Reports from two flight attendants in the coach cabin, Betty Ong and Madeline “Amy” Sweeney, tell us most of what we know about how the hijacking happened. As it began, some of the hijackers—most likely Wail al Shehri and Waleed al Shehri, who were seated in row 2 in first class—stabbed the two unarmed flight attendants who would have been preparing for cabin services. The 9/11 Commission does not know exactly how the hijackers gained access to the cock- pit; FAA rules required that the doors remained closed and locked during flight. Ong specu- lated that they had “jammed their way” in. Perhaps the terrorists stabbed the flight attendants
  • 59. to get a cockpit key, to force one of them to open the cockpit door, or to lure the captain or first officer out of the cockpit. Or the flight attendants may just have been in their way. At the same time or shortly thereafter, Atta—the only terrorist on board trained to fly a jet—would have moved to the cockpit from his business- class seat, possibly accom- panied by Omari. As this was happening, passenger Daniel Lewin, who was seated in the row just behind Atta and Omari, was stabbed by one of the hijackers—probably Satam al Suqami, who was seated directly behind Lewin. Lewin had served four years as an offi- cer in the Israeli military. He may have made an attempt to stop the hijackers in front of him, not realizing that another was sitting behind him. The hijackers quickly gained control and sprayed Mace, pepper spray, or some other irritant in the first-class cabin to force the passengers and flight attendants toward the rear of the plane. They claimed they had a bomb. About five minutes after the hijacking began, Betty Ong contacted the American Air- lines Southeastern Reservations Office in Cary, North Carolina, via an AT&T airphone to report an emergency aboard the flight. This was the first of several occasions on 9/11 when flight attendants took action outside the scope of their training, which emphasized that in a hijacking they were to communicate with the cockpit crew. The emergency call lasted approximately 25 minutes, as Ong calmly and
  • 60. professionally relayed information about events taking place aboard the airplane to authorities on the ground. At 8:19, Ong reported: “The cockpit is not answering, somebody’s stabbed in busi- ness class—and I think there’s Mace—that we can’t breathe—I don’t know, I think we’re getting hijacked.” She then told of the stabbings of the two flight attendants. At 8:21, one of the American employees receiving Ong’s call in North Carolina, Nydia Gonzalez, alerted the American Airlines operations center in Fort Worth, Texas, reaching Craig Marquis, the manager on duty. Marquis soon realized this was an emergency and in- structed the airline’s dispatcher responsible for the flight to contact the cockpit. At 8:23, the dispatcher tried unsuccessfully to contact the aircraft. Six minutes later, the air traffic control specialist in American’s operation center contacted the FAA’s Boston Air Traffic Control Center about the flight. The center was already aware of the problem. Boston Center knew of a problem on the flight in part because just before 8:25 the hijackers had attempted to communicate with the passengers. The microphone ISB N 0 -5 5
  • 61. 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE ATTACK: SEPTEMBER 11, 2001 21 was keyed, and immediately one of the hijackers said, “Nobody move. Everything will be okay. If you try to make any moves, you’ll endanger yourself and the airplane. Just stay quiet.” Air traffic controllers heard the transmission; Ong did not. The hijackers proba- bly did not know how to operate the cockpit radio communication system correctly and thus inadvertently broadcast their message over the air traffic control channel instead of the cabin public-address channel. Also at 8:25, and again at 8:29, Amy Sweeney got through to the American Flight Services Office in Boston but was cut off after she reported someone was hurt aboard the flight. Three minutes later, Sweeney was reconnected to the office
  • 62. and began relaying updates to the manager, Michael Woodward. At 8:26, Ong reported that the plane was “flying erratically.” A minute later, Flight 11 turned south. American also began getting identifications of the hijackers, as Ong and then Sweeney passed on some of the seat numbers of those who had gained unauthorized access to the cockpit. Sweeney calmly reported on her line that the plane had been hijacked; a man in first class had his throat slashed; two flight attendants had been stabbed—one was seriously hurt and was on oxygen whereas the other’s wounds seemed minor; a doctor had been re- quested; the flight attendants were unable to contact the cockpit; and there was a bomb in the cockpit. Sweeney told Woodward that she and Ong were trying to relay as much information as they could to people on the ground. At 8:38, Ong told Gonzalez that the plane was flying erratically again. Around this time Sweeney told Woodward that the hijackers were Middle Easterners, naming three of their seat numbers. One spoke very little English, and one spoke excellent English. The hijackers had gained entry to the cockpit, and she did not know how. The aircraft was in a rapid descent. At 8:41, Sweeney told Woodward that passengers in coach were under the impres- sion that there was a routine medical emergency in first class. Other flight attendants
  • 63. were busy at duties such as getting medical supplies while Ong and Sweeney were re- porting the events. At 8:41, in America’s operations center, a colleague told Marquis that the air traffic controllers declared Flight 11 a hijacking and “think he’s [American 11] headed toward Kennedy [airport in New York City]. They’re moving everybody out of the way. They seem to have him on a primary radar. They seem to think that he is descending.” At 8:44, Gonzalez reported losing phone contact with Ong. About this same time Sweeney reported to Woodward, “Something is wrong. We are in a rapid descent . . . we are all over the place.” Woodward asked Sweeney to look out the window to see if she could determine where they were. Sweeney responded: “We are flying low. We are fly- ing very, very low. We are flying way too low.” Seconds later she said, “Oh my God we are way too low.” The phone call ended. At 8:46:40, American 11 crashed into the North Tower of the World Trade Center in New York City. All on board, along with an unknown number of people in the tower, were killed instantly. The Hijacking of United 175 United Airlines Flight 175 was scheduled to depart for Los Angeles at 8:00. Captain Victor Saracini and First Officer Michael Horrocks piloted the Boeing 767, which had seven
  • 64. flight attendants. Fifty-six passengers boarded the flight. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 22 CHAPTER 1 The Era of Homeland Security United 175 pushed back from its gate at 7:58 and departed Logan Airport at 8:14. By 8:33, it had reached its assigned cruising altitude of 31,000 feet. The flight attendants would have begun their cabin service. The flight had taken off just as American 11 was being hijacked, and at 8:42 the United 175 flight crew completed their report on a “suspicious
  • 65. transmission” overheard from another plane (which turned out to have been Flight 11) just after takeoff. This was United 175’s last communication with the ground. The hijackers attacked sometime between 8:42 and 8:46. They used knives (as re- ported by two passengers and a flight attendant), Mace (reported by one passenger), and the threat of a bomb (reported by the same passenger). They stabbed members of the flight crew (reported by a flight attendant and one passenger). Both pilots had been killed (reported by one flight attendant). The eyewitness accounts came from calls made from the rear of the plane, from passengers originally seated further for- ward in the cabin, a sign that passengers and perhaps crew had been moved to the back of the aircraft. Given similarities to American 11 in hijacker seating and in eye- witness reports of tactics and weapons, as well as the contact between the presumed team leaders, Atta and Shehhi, the 9/11 Commission believes the tactics were similar on both flights. The first operational evidence that something was abnormal on United 175 came at 8:47, when the aircraft changed beacon codes twice within a minute. At 8:51, the flight deviated from its assigned altitude, and a minute later New York air traffic controllers be- gan repeatedly and unsuccessfully trying to contact it. At 8:52, in Easton, Connecticut, a man named Lee Hanson
  • 66. received a phone call from his son Peter, a passenger on United 175. His son told him: “I think they’ve taken over the cockpit—An attendant has been stabbed—and someone else up front may have been killed. The plane is making strange moves. Call United Airlines—Tell them it’s Flight 175, Boston to LA.” Lee Hanson then called the Easton Police Department and relayed what he had heard. Also at 8:52, a male flight attendant called a United office in San Francisco, reaching Marc Policastro. The flight attendant reported that the flight had been hijacked, both pilots had been killed, a flight attendant had been stabbed, and the hijackers were probably flying the plane. The call lasted about two minutes, after which Policastro and a colleague tried unsucessfully to contact the flight. At 8:58, the flight took a heading toward New York City. At 8:59, Flight 175 passenger David Sweeney tried to call his wife, Julie. He left a message on their home answering machine that the plane had been hijacked. He then called his mother, Louise Sweeney, told her the flight had been hijacked, and added that the passengers were thinking about storming the cockpit to take control of the plane away from the hijackers. At 9:00, Lee Hanson received a second call from his son Peter: It’s getting bad, Dad—A stewardess was stabbed—They seem to
  • 67. have knives and Mace—They said they have a bomb—It’s getting very bad on the plane—Passengers are throwing up and getting sick—The plane is making jerky movements—I don’t think the pilot is flying the plane—I think we are going down—I think they intend to go to Chicago or someplace and fly into a building—Don’t worry, Dad—If it happens, it’ll be very fast—My God, my God. IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc.
  • 68. THE ATTACK: SEPTEMBER 11, 2001 23 The call ended abruptly. Lee Hanson had heard a woman scream just before it cut off. He turned on a television, and in her home so did Louise Sweeney. Both then saw the second aircraft hit the World Trade Center. At 9:03:11, United Airlines Flight 175 struck the South Tower of the World Trade Center. All on board, along with an unknown number of people in the tower, were killed instantly. The Hijacking of American 77 American Airlines Flight 77 was scheduled to depart from Washington Dulles for Los Angeles at 8:10. The aircraft was a Boeing 757 piloted by Captain Charles F. Burlingame and First Officer David Charlebois. There were four flight attendants. On September 11, the flight carried 58 passengers. American 77 pushed back from its gate at 8:09 and took off at 8:20. At 8:46, the flight reached its assigned cruising altitude of 35,000 feet. Cabin service would have begun. At 8:51, American 77 transmitted its last routine radio communication. The hijacking began between 8:51 and 8:54. As on American 11 and United 175, the hijackers used knives (re- ported by one passenger) and moved all the passengers (and possibly crew) to the rear of the aircraft (reported by one flight attendant and one passenger). Unlike the earlier flights,
  • 69. the Flight 77 hijackers were reported by a passenger to have box cutters. Finally, a passen- ger reported that an announcement had been made by the “pilot” that the plane had been hijacked. Neither of the firsthand accounts mentioned any stabbings or the threat or use of either a bomb or Mace, though both witnesses began the flight in the first-class cabin. At 8:54, the aircraft deviated from its assigned course, turning south. Two minutes later the transponder was turned off, and even primary radar contact with the aircraft was lost. The Indianapolis Air Traffic Control Center repeatedly tried and failed to contact the aircraft. American Airlines dispatchers also tried, without success. At 9:00, American Airlines Executive Vice President Gerald Arpey learned that communications had been lost with American 77. This was now the second American air- craft in trouble. He ordered all American Airlines flights in the Northeast that had not taken off to remain on the ground. Shortly before 9:10, suspecting that American 77 had been hijacked, American headquarters concluded that the second aircraft to hit the World Trade Center might have been Flight 77. After learning that United Airlines was missing a plane, American Airlines headquarters extended the ground stop nationwide. At 9:12, Renee May called her mother, Nancy May, in Las Vegas. She said her flight was being hijacked by six individuals who had moved them to
  • 70. the rear of the plane. She asked her mother to alert American Airlines. Nancy May and her husband promptly did so. At some point between 9:16 and 9:26, Barbara Olson called her husband, Ted Olson, the Solicitor General of the United States. She reported that the flight had been hijacked, and the hijackers had knives and box cutters. She further indicated that the hijackers were not aware of her phone call, and that they had put all the passengers in the back of the plane. About a minute into the conversation, the call was cut off. Solicitor General Olson tried unsuccessfully to reach Attorney General John Ashcroft. Shortly after the first call, Barbara Olson reached her husband again. She reported that the pilot had announced that the flight had been hijacked, and she asked her hus- band what she should tell the captain to do. Ted Olson asked for her location and she IS B N 0 -5 5 8 -3 7
  • 71. 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 24 CHAPTER 1 The Era of Homeland Security replied that the aircraft was then flying over houses. Another passenger told her they were traveling northeast. The Solicitor General then informed his wife of the two previ- ous hijackings and crashes. She did not display signs of panic and did not indicate any awareness of an impending crash. At that point, the second call was cut off. At 9:29, the autopilot on American 77 was disengaged; the aircraft was at 7,000 feet and approximately 38 miles west of the Pentagon. At 9:32, controllers at the Dulles Ter- minal Radar Approach Control “observed a primary radar target tracking eastbound at a high rate of speed.” This was later determined to have been Flight 77. At 9:34, Ronald Reagan Washington National Airport advised the Secret Service of an unknown aircraft heading in the direction of the White House. American 77 was then 5 miles west-southwest of the Pentagon and began a 330-degree
  • 72. turn. At the end of the turn, it was descending through 2,200 feet, pointed toward the Pentagon and downtown Washington. The hijacker pilot then advanced the throttles to maximum power and dove toward the Pentagon. At 9:37:46, American Airlines Flight 77 crashed into the Pentagon, traveling at ap- proximately 530 miles per hour. All on board, as well as many civilian and military per- sonnel in the building, were killed. The Battle for United 93 At 8:42, United Airlines Flight 93 took off from Newark (New Jersey) Liberty International Airport bound for San Francisco. The aircraft was piloted by Captain Jason Dahl and First Officer Leroy Homer, and there were five flight attendants. Thirty-seven passengers, BOX 1-3 REMARKS BY THE PRESIDENT AFTER TWO PLANES CRASH INTO WORLD TRADE CENTER EMMA BOOKER ELEMENTARY SCHOOL SARASOTA, FLORIDA SEPTEMBER 11, 2001, 9:30 A.M. THE PRESIDENT: Ladies and gentlemen, this is a difficult moment for America. I, unfortunately, will be going back to Washington after my remarks. Secretary Rod Paige and the Lt. Gover- nor will take the podium and discuss education. I do want to thank the folks here at Booker Elementary School for their hospitality.
  • 73. Today we’ve had a national tragedy.Two airplanes have crashed into the World Trade Cen- ter in an apparent terrorist attack on our country. I have spoken to the Vice President, to the Governor of New York, to the Director of the FBI, and have ordered that the full resources of the federal government go to help the victims and their families, and to conduct a full-scale investigation to hunt down and to find those folks who committed this act. Terrorism against our nation will not stand. And now if you would join me in a moment of silence. May God bless the victims, their families, and America.Thank you very much. IS B N 0 -5 5 8 -3 7 2 7 5
  • 74. -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE ATTACK: SEPTEMBER 11, 2001 25 including the hijackers, boarded the plane. Scheduled to depart the gate at 8:00, the Boe- ing 757’s takeoff was delayed because of the airport’s typically heavy morning traffic. The hijackers had planned to take flights scheduled to depart at 7:45 (American 11), 8:00 (United 175 and United 93), and 8:10 (American 77). Three of the flights had actu- ally taken off within 10 to 15 minutes of their planned departure times. United 93 would ordinarily have taken off about 15 minutes after pulling away from the gate. When it left the ground at 8:42, the flight was running more than 25 minutes late. As United 93 left Newark, the flight’s crew members were unaware of the hijackings of American 11. Around 9:00, the FAA, American, and United were facing the stagger- ing realization of apparent multiple hijackings. At 9:03, they would see another aircraft strike the World Trade Center. Crisis managers at the FAA and the airlines did not yet act to warn other aircraft. At the same time, Boston Center realized that a message
  • 75. transmitted just before 8:25 by the hijacker pilot of American 11 included the phrase, “We have some planes.” No one at the FAA or the airlines that day had ever dealt with multiple hijackings. Such a plot had not been carried out anywhere in the world in more than 30 years, and never in the United States. As news of the hijackings filtered through the FAA and the airlines, it does not seem to have occurred to their leadership that they needed to alert other aircraft in the air that they too might be at risk. United 175 was hijacked between 8:42 and 8:46, and awareness of that hijacking be- gan to spread after 8:51. American 77 was hijacked between 8:51 and 8:54. By 9:00, the FAA and airline officials began to comprehend that attackers were going after multiple aircraft. American Airlines’ nationwide ground stop between 9:05 and 9:10 was followed by a United Airlines ground stop. FAA controllers at Boston Center, which had tracked the first two hijackings, requested at 9:07 that Herndon Command Center “get messages to airborne aircraft to increase security for the cockpit.” There is no evidence that Hern- don took such action. Boston Center immediately began speculating about other aircraft that might be in danger, leading them to worry about a transcontinental flight—Delta 1989—that in fact was not hijacked. At 9:19, the FAA’s New England regional office called Herndon and asked that Cleveland Center advise Delta 1989 to use extra cockpit security.
  • 76. Several FAA air traffic control officials told the 9/11 Commission that it was the air carrier’s responsibility to notify their planes of security problems. One senior FAA air traf- fic control manager said that it was simply not the FAA’s place to order the airlines what to tell their pilots. The Commission believes that such statements did not reflect an ade- quate appreciation of the FAA’s responsibility for the safety and security of civil aviation. The airlines bore responsibility, too. They were facing an escalating number of con- flicting and, for the most part, erroneous reports about other flights, as well as a contin- uing lack of vital information from the FAA about the hijacked flights. The 9/11 Commission found no evidence, however, that American Airlines sent any cockpit warn- ings to its aircraft that day. United’s first decisive action to notify its airborne aircraft to take defensive action did not come until 9:19, when a United flight dispatcher, Ed Ballinger, took the initiative to begin transmitting warnings to his 16 transcontinental flights: “Beware any cockpit intrusions—Two a/c (aircraft) hit World Trade Center.” One of the flights that received the warning was United 93. Because Ballinger was still re- sponsible for his other flights as well as Flight 175, his warning message was not transmitted to Flight 93 until 9:23. IS B
  • 77. N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 26 CHAPTER 1 The Era of Homeland Security By all accounts, the first 46 minutes of Flight 93’s cross- country trip proceeded rou- tinely. Radio communications from the plane were normal. Heading, speed, and altitude ran according to plan. At 9:24, Ballinger’s warning to United 93 was received in the cockpit. Within two minutes, at 9:26, the pilot, Jason Dahl, responded with a note of puzzlement: “Ed, confirm latest mssg plz—Jason.” The hijackers attacked at 9:28. While traveling 35,000 feet above eastern Ohio, United 93 suddenly dropped 700 feet. Eleven seconds into the
  • 78. descent, the FAA’s air traf- fic control center in Cleveland received the first of two radio transmissions from the air- craft. During the first broadcast, the captain or first officer could be heard declaring “Mayday” amid the sounds of a physical struggle in the cockpit. The second radio trans- mission, 35 seconds later, indicated that the fight was continuing. The captain or first of- ficer could be heard shouting: “Hey get out of here—get out of here—get out of here.” On the morning of 9/11, there were only 37 passengers on United 93—33 in addition to the 4 hijackers. This was below the norm for Tuesday mornings during the summer of 2001. But there is no evidence that the hijackers manipulated passenger levels or purchased additional seats to facilitate their operation. The terrorists who hijacked three other commercial flights on 9/11 operated in five- man teams. They initiated their cockpit takeover within 30 minutes of takeoff. On Flight 93, however, the takeover took place 46 minutes after takeoff, and there were only four hijackers. The operative likely intended to round out the team for this flight, Mohamed al Kahtani, had been refused entry by a suspicious immigration inspector at Florida’s Or- lando International Airport in August. Because several passengers on United 93 described three hijackers on the plane, not four, some have wondered whether one of the hijackers had been able to use the cockpit
  • 79. jump seat from the outset of the flight. FAA rules allow use of this seat by documented and approved individuals, usually air carrier or FAA personnel. The 9/11 Commission found no evidence indicating that one of the hijackers, or anyone else, sat there on this flight. All the hijackers had assigned seats in first class, and they seem to have used them. It is more likely that Jarrah, the crucial pilot-trained member of their team, remained seated and inconspicuous until after the cockpit was seized; and once inside, he would not have been visible to the passengers. At 9:32, a hijacker, probably Jarrah, made or attempted to make the following an- nouncement to the passengers of Flight 93: “Ladies and Gentlemen: Here the captain, please sit down keep remaining sitting. We have a bomb on board. So, sit.” The flight data recorder (also recovered) indicates that Jarrah then instructed the plane’s autopilot to turn the aircraft around and head east. The cockpit voice recorder data indicate that a woman, most likely a flight attendant, was being held captive in the cockpit. She struggled with one of the hijackers who killed or otherwise silenced her. Shortly thereafter, the passengers and flight crew began a series of calls from GTE airphones and cellular phones. These calls between family, friends, and colleagues took place until the end of the flight and provided those on the ground with firsthand ac-
  • 80. counts. They enabled the passengers to gain critical information, including the news that two aircraft had slammed into the World Trade Center. At 9:39, the FAA’s Cleveland Air Route Traffic Control Center overheard a second announcement indicating that there was a bomb on board, that the plane was returning IS B N 0 -5 5 8 -3 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE ATTACK: SEPTEMBER 11, 2001 27
  • 81. to the airport, and that passengers should remain seated. Although it apparently was not heard by the passengers, this announcement, like those on Flight 11 and Flight 77, was intended to deceive them. Jarrah, like Atta earlier, may have inadvertently broadcast the message because he did not know how to operate the radio and the intercom. To the 9/11 Commission’s knowledge, none of them had ever flown an actual airliner before. At least two callers from the flight reported that the hijackers knew that passengers were making calls but did not seem to care. It is quite possible Jarrah knew of the success of the assault on the World Trade Center. He could have learned of this from messages being sent by United Airlines to the cockpits of its transcontinental flights, including Flight 93, warn- ing of cockpit intrusion and telling of the New York attacks. But even without them, he would have certainly understood that the attacks on the World Trade Center would already have unfolded, given Flight 93’s tardy departure from Newark. If Jarrah did know that the pas- sengers were making calls, it might not have occurred to him that they were certain to learn what had happened in New York, thereby defeating his attempts at deception. At least 10 passengers and 2 crew members shared vital information with family, friends, colleagues, or others on the ground. All understood the plane had been hijacked. They said the hijackers wielded knives and claimed to have a
  • 82. bomb. The hijackers were wearing red bandanas, and they forced the passengers to the back of the aircraft. Callers reported that a passenger had been stabbed and that two people were lying on the floor of the cabin, injured or dead—possibly the captain and first officer. One caller reported that a flight attendant had been killed. One of the callers from United 93 also reported that he thought the hijackers might possess a gun. But none of the other callers reported the presence of a firearm. One re- cipient of a call from the aircraft recounted specifically asking her caller whether the hi- jackers had guns. The passenger replied that he did not see one. No evidence of firearms or of their identifiable remains were found at the aircraft’s crash site, and the cockpit voice recorder gives no indication of a gun being fired or mentioned at any time. The 9/11 Commission believes that if the hijackers had possessed a gun, they would have used it in the flight’s last minutes as the passengers fought back. Passengers on three flights reported the hijackers’ claim of having a bomb. The FBI told the 9/11 Commission they found no trace of explosives at the crash sites. One of the passengers who mentioned a bomb expressed his belief that it was not real. Lacking any evidence that the hijackers attempted to smuggle such illegal items past the security screening checkpoints, the 9/11 Commission believes the bombs were probably fake.
  • 83. During at least five of the passengers’ phone calls, information was shared about the attacks that had occurred earlier that morning at the World Trade Center. Five calls de- scribed the intent of passengers and surviving crew members to revolt against the hi- jackers. According to one call, they voted on whether to rush the terrorists in an attempt to retake the plane. They decided and acted. At 9:57, the passenger assault began. Several passengers had terminated phone calls with loved ones to join the revolt. One of the callers ended her message as follows: “Everyone’s running up to first class, I’ve got to go. Bye.” The cockpit voice recorder captured the sounds of the passenger assault muffled by the intervening cockpit door. Some family members who listened to the recording report that they could hear the voice of a loved one among the din. The 9/11 Commission could not identify whose voices can be heard. But the assault was sustained. IS B N 0 -5 5 8 -3
  • 84. 7 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. 28 CHAPTER 1 The Era of Homeland Security BOX 1-4 REMARKS BY THE PRESIDENT UPON ARRIVAL AT BARKSDALE AIR FORCE BASE, LOUISIANA THE PRESIDENT: I want to reassure the American people that the full resources of the fed- eral government are working to assist local authorities to save lives and to help the victims of these attacks. Make no mistake:The United States will hunt down and punish those responsible for these cowardly acts. I’ve been in regular contact with the Vice President, the Secretary of Defense, the na- tional security team and my Cabinet.We have taken all appropriate security precautions to protect the American people. Our military at home and around the world is on high alert status, and we have taken the necessary security precautions to
  • 85. continue the functions of your government. We have been in touch with the leaders of Congress and with world leaders to assure them that we will do whatever is necessary to protect America and Americans. I ask the American people to join me in saying a thanks for all the folks who have been fighting hard to rescue our fellow citizens and to join me in saying a prayer for the victims and their families. The resolve of our great nation is being tested. But make no mistake:We will show the world that we will pass this test. God bless. In response, Jarrah immediately began to roll the airplane to the left and right, at- tempting to knock the passengers off balance. At 9:58:57, Jarrah told another hijacker in the cockpit to block the door. Jarrah continued to roll the airplane sharply left and right, but the assault continued. At 9:59:52, Jarrah changed tactics and pitched the nose of the airplane up and down to disrupt the assault. The recorder captured the sounds of loud thumps, crashes, shouts, and breaking glasses and plates. At 10:00:03, Jarrah stabilized the airplane. Five seconds later, Jarrah asked, “Is that it? Shall we finish it off?” A hijacker re- sponded, “No. Not yet. When they all come, we finish it off.” The sounds of fighting con-
  • 86. tinued outside the cockpit. Again, Jarrah pitched the nose of the aircraft up and down. At 10:00:26, a passenger in the background said, “In the cockpit. If we don’t we’ll die!” Sixteen seconds later, a passenger yelled, “Roll it.” Jarrah stopped the violent maneuvers at about 10:01:00 and said, “Allah is the greatest! Allah is the greatest!” He then asked another hijacker in the cockpit, “Is that it? I mean, shall we put it down?” to which the other replied, “Yes, put it in it, and pull it down.” The passengers continued their assault and at 10:02:03, a hijacker said, “Pull it down! Pull it down!” The hijackers remained at the controls but must have judged that the pas- sengers were only seconds from overcoming them. The airplane headed down; the control wheel was turned hard to the right. The airplane rolled onto its back, and one of the hijack- ers began shouting, “Allah is the greatest! Allah is the greatest!” With the sounds of the IS B N 0 -5 5 8 -3 7
  • 87. 2 7 5 -9 Homeland Security for Policing, by Willard M. Oliver. Published by Prentice Hall. Copyright © 2007 by Pearson Education, Inc. THE RESPONSE: SEPTEMBER 11, 2001 29 passenger counterattack continuing, the aircraft plowed into an empty field in Shanksville, Pennsylvania, at 580 miles per hour, about 20 minutes’ flying time from Washington, D.C. Jarrah’s objective was to crash his airliner into symbols of the American Republic, the Capitol or the White House. He was defeated by the alerted unarmed passengers of United 93. THE RESPONSE: SEPTEMBER 11, 2001 New York, NY The World Trade Center (WTC) complex was built for the Port Authority of New York and New Jersey.14 Construction began in 1966, and tenants began to occupy its space in 1970. The Twin Towers came to occupy a unique and symbolic place in the culture of New York City and America.
  • 88. The WTC actually consisted of seven buildings, including one hotel, spread across 16 acres of land. The buildings were connected by an underground mall (the concourse). The Twin Towers (1 WTC, or the North Tower, and 2 WTC, or the South Tower) were the signature structures, containing 10.4 million square feet of office space. Both towers had 110 stories, were about 1,350 feet high, and were square; each wall measured 208 feet in length. On any given workday, up to 50,000 office workers occupied the towers, and 40,000 people passed through the complex. In New York City, the city government had ready at their disposal a number of plans for critical incidents that may have potentially occurred in the city, with the Office of Emergency Management and Interagency Preparedness (OEM) established to coordi- nate the workings of such agencies as the New York Police Department (NYPD), the Port Authority Police Department (PAPD), and the Fire Department of New York (FDNY). In 1996 Mayor Rudolph Giuliani created the Mayor’s Office of Emergency Management, which had three basic functions. First, OEM’s Watch Command was to monitor the city’s key communications channels—including radio frequencies of FDNY dispatch and the NYPD—and other data. A second purpose of the OEM was to improve New York City’s response to major incidents, including terrorist attacks, by planning and conducting ex- ercises and drills that would involve multiple city agencies, particularly the NYPD and