Interview of FBI Counterterrorism Analyst

Total Page:16

File Type:pdf, Size:1020Kb

Interview of FBI Counterterrorism Analyst Withheld from public release E.O. 13526, section 1.4(c)(d) by National Archives and * Records Administration under 36 C.F.R. § 1256.58 MEMORANDUMFORTHERECORD DECLASSIFIED UNDER AUTHORITY OF THE Event: Interview o fl~....____.::*.:....__ ____J INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL, Date: February 11, 2004 E.O. 13526, SECTION 5.3(b)(3) Special Access Issues: ~SCI Prepared by: Sarah Webb Linden ISCAP APPEAL NO. 2012-048, document no. 6 DECLASSIFICATION DATE: July 8, 2015 Reviewed by: Yoel Tobin Team Numbers : One Location: FBI Headquarters Participants: 9-11 Comm ission: Yoel Tobin, Thomas Dowling, Sarah Linden Federal Bureau of Investigation: Robert Sinton Interviewee Background (U) ~has worked for the FBI for 17 years. He has been an analyst within the Counterterrorism Division since 1992. Initially he worked Iran and Hezbollah matters; in 1993, . after the first World Trade Center bombing, he transferred to the Sunni Islamic Extremist unit. In 1996 he was temporarily assigned to the Khobar Towers bombing investigation . With the exception of the year he spent working on Khobar Towers, ~has focuseld primjrily on Southeast Asia fundamentalists such as Ramzi Yousef and the Bojinka plot. * is currently assigned to the FBI's Counterterrorism Division, International Terrorism Operations Section, Extraterritorial Investigations Unit. Khobar Towers (U) ~did not recall many details ofthe Khobar Towers bombing investigation. He left the investigative team prior to the U.S. indictment of subjects. On the specific subject of Al Qaeda involvement with the plot, []LJcommented that they investigated all available Al Qaeda sources and connections and realized that the facts did not support Al Qaeda involvement. '---'-----"*.:......~had never been part of an investigation as heavily compartmentalized as Khobar. Case information was highly restricted, with as few as 20 people initially allowed access. Because the FBI agents on-scene were not allowed to conduct any unilateral interviews or investi ations on Saudi soil I E.O. 13526, section 1.4(c)(d) I Khalid Sheikh Mohammed ~~worked on matters concerning Khalid Sheikh Mohammed (KSM) from 1995 through 2003. He read some, though not all, ofKSM's post-capture interrogation reports. ~ ~stated that in 1996 KSM was in Doha, Qatar. He had been there since at least 1993 , working for the Ministry of Water and Electricity. After the U.S. indicted KSM for his involvement in the Manila Air case, the FBI sent a rendition team to the Gulf. Part ofthe team I E.O. 13526, section 1.4(c)(d) TOPSECRET~I--------~ Withheld from public release by National Archives and 2 * Records Administration under 36 C.F.R. § 1256.58 dvanced to Doha, Qatar in preparation for his capture. The remainder of the team waited in with a plane, ready to travel to Qatar and pick up KSM and his captors. After L-----:--:----:-' several days the Qatari government informed the U.S . that KSM had been under surveillance and had somehow escaped . .k8} ~did not know exactly who funded KSM's travel while he was working for the Qatar Ministry of Water and Electricity. He speculated that Qatar's Ministry for Religious Endowment paid KSM to travel around and distribute c.ash to organizations and Islamic charities. [i]did not feel that UBL was the likely source ofKSM's travel monies . .k8} c:::!J believed that KSM did not join AI Qaeda until after the 1998 East Africa bombings . As late as 1997, KSM was aligned with Abdul Rasul Sayef, who was one ofUBL 's adversaries . Even after he joined AI Qaeda, KSM was not considered a significant player in the organization until after 09/ 11 /2001. Immediately following the attacks, a variety of U.S . intelligence sources pointed to KSM (or "Ramzi Yousefs cousin") as the source of the operation. E.O. 13526, section 1.4(c)(d) Bojinka 2 Withheld from public release by National Archives and 3 * Records Administration under 36 C.F.R. § 1256.58 TOP SECRETj______.ll E.0. 13526, section 1.4(c)(d) I who had trained in Al Qaeda camps but were not Al Qaeda operatives. As for Khalifa, there was no evidence he funded or knew of the plot, despite his close association with Wali Khan. Ramzi Yousefwas brought in by Wali Khan, and had no prior affiliation with Khalifa or UBL. -tSJ[I]did not see thousands ofdollars moving to support Bojinka and considered it a fairly low-cost operation. There was no requirement for casing flights, since flight schedules could be obtained from the airlines. ~was certain the operatives had little funding because Wali Khan onl ot bailed out of prison I I E.O. 13526, section 1.4(c)( d) I 1-----------'Khan in the Philippines. CDstated that no money came from Riduan Isomuddin's/Hambali's Malaysian company Konsijoya, which had at that point only conducted one (failed) business transaction. ~knew of only five operatives involved in Bojinka: KSM, Abdul Hakim Murad, Ramzi Y ousef, Wali Khan and with the rest because the FBI had on the .-1r-p-er-:i-p1he_r_y_o-;f;-;t-;-h-e-;:B:-o-:-0i:-nk~a-g-ro_u_p_:_l"'ik'e"""VK"h-a"'li7fa-,'h-e'k_n_e_w~th:;-e-p'la_y_e-rs-,bu-t:-n-o-:t-:t'e-p,.o"7t-._ ___J TOP SECitET~ E.O. 13526, section 1.4(c)(d) 13 TJ~If trl Withheld from public release ,.- ~ t - .( 0 i~f·:-.. f by Na tional Archives and ~ I (Y ~ ~ I Records Administration (..U ~ Ul under 36 C.F.R. § 1256.58 - ~ ~ ~ f' r­ N >-· '>.: ~~ ).. 0 ~ t~ ....» -# C""-..~~- 1 - I§ F - :p ~ f ? ~ ~, ~ r rs- 1.$\ { f t. ~ ~f ~ ~ ;;;-- ' r - L_ ~ ~ ~ 1" I'~!': - r r r t ~ ~ ~ ~ ; ; r t l_~ ~ -t l !~~- ~ ~ ~ t, -\ ~ . ~ ~ '"'1 r I ~ ~ ~ ........... ).' ~ ~ C)­ t ~ ~ (\ "'- ~ s l r 1 ~ U ~ ~ i ~ ~ ~ I:· ; ¥ ~ ~ a ........... t { -· ~ r ~ ~ 1 ~ r ~ ~~ t> ~ ~ ! ~ ~ ~ F [; 3 f ~ - j \ i ~ i . ~ . !-j ~ ~ f .... ~rt;.. ~ 'r~~ ~- t· ~cf ~¢" r. '~ 7' • ~ t 't :t I .t'i' ....,_ t f ~· f -f ~ t ~ . ~ f !-- ~ t ~ .f f ' vr (1-. ~· ~ p f. t - ..r ! f ~ " pt c:> ~· tT ~ ~ -t= ~ "' ~ ~ t r.lh r r 0 " . T, t ~ :;t ~ t ~! "" l> <- j j: { f ~ ~= a . x il' :t- ;- ..f ! . l f ~ ~ }, \ ~ · l ; f · ~[ t: r ~ 1 f ~ +~ f ~ . ~ . t~I ~ t I . =+ ~ J f :s . ~ t ~ ~r l . r. 1 1 t t ~ R ~ ~ ~ ~ · ~ f. ~ =+ ~ F ';: t { } ! f ~ ~ ~ ' ~· 1 ~ ~ ~ · ~· f ;­ ~· ...../ c:. .j>. f' I! i! 5 ! l Ij :l i I Wt>k­ e flY -5-!.J~:i + w~·fj av/l ~¥-k-.L ki? ~--~""'l . r ~; r. A , ~ , • , ~ ..& (' · t. f-.. , rz,· \c~c(. W-~ ~.4..::U?'.C IN~ I ~-v...V\.'-' ~.... ~ <JL ''\.f ~~ wov; k,!f..iA"t v"""pt.vl~~~ -; {- 0..,~ J.icJ,~~o. ·+ c.~""'--v- 1:­ , .i ; . _[ _ ,.,{} '" . !j'"'A. kst>..t,.~ />'to . !lC($/y,;; "'!'!:· 1'1-fC -­ ~ ~\II:V) ~t ~~ I._______, \ ni r)~/l ~ lliv£ 5 {)]¥-,~.,;..~-:; Av--.d j \ i . I J I' ; ' ~ : ® Fe'lHq +- ;...JYO ! ; k vJG.;..;J Y".V.r.C&_ (.JA..f. &At ~ C~"-f !.U f;,6 l-4-.+ Co,..~{d,.. 7..f ~k£ .....~4'1 ) ' ~ /wo.-<JW - ~..SA ~ Jl- s- p~tL ;" ~k, OM ~ ~+ d.tl4t\ ~ f"'of;Jrt' 4 ~~ ~ ~-w 1- J~ ·'-"'~ ~6: <~~<>M~ ~~"C.. ~~\Q~ ~{p M~'i-..~~J £~'$I ~1-i'~ _ ,S.Y..(4.'0 1-.JW) ~\,..._.;-feo{ ~ pu\.t·f)(.)>- 1~~"\.1 '- W~ ._1 c/.W~ ~ ;--1- l.vtd ~4 (;,-,. pro~, vs.. ~.(;,;~ fs lA..S. ~-..f.ttt~ (f'+ ~~+<:-v~+>'~"W ..,.. ~-t-> - .-frJo fc ~ ~ ~ ~ t.{(A. Se-\cccl ~ ~~ ~ ~SA M&c ;t'J J.J~r~ f{l!'f- f:S~ ci)J,...·t- -k-lL US4 .:.)?&.vvf ~;~ Cp..... ft:~rplo7t'-v.:.~;; t;V' prn',JV"'" P.~~ k~ '-''* ~~~1 ~~-h'o wv+i / ~JJ.. aj~-A-W ~~ d. fttl;r4: pw-P ~· .A !(~h rltt{4...- sa,J,...· .~.M~~+~JWJ +.-~---....., ....., . 1 ~ ~- Jw< J. ~<-+... - ~ '.Jy~;.H ~t~".. E.O. 13526, section 1.4(c)(d) 6 .: ft:..J.i.- ~~t.k. b-hN AQ + Uc:z'-6tl~ ~~ ~~ ht~M~ ~ M/;) ~ "-1 ""fr!4-i ~ ..f&.t .fb.cb -~ked- Aq ~ ~- ~ .v<sPA - ~~ct h.wt. q5,. zoos tW-ci. ltM l'ed J:.M-t .tttt¢.'1r.u rf 6 ·41f' WM M i?rJt'<A - bU#\.. ~ ~ ,v.u-~<Yl eJ ~ - $-.~~ ~ ,J ·~+- "l~ ~~ \6- ~ ;1.-t~::.~ of IVP ..,.. f..&;,,.:f-"'&.... -h.; ~--<- ~., ~t'C >t~.f- .I &6o -h \t(5'i,~ .~ tnY p ~ (l.U..r£"f!~- ~ . ,w;t.- ad - ~rvJ. .fc44-<,. k. 1 1 ~~~ ·6'5 -h !Jr~ ; ( .... pla---'4 (ft>'l 2 -3 hr.- ' I #';~.,... ~ ~~ ~.l"lwa...{. ~ ~) re~1 ~~<......_ .i .; E.O. 13526, section 1.4(c)(d) .; KSM ;. ~~ ~cJ. W'{ ~W ~ ~~ ,~ h\M .M;t ~~~ ~~ ~ ~ ~ q5"-1(, - tt7 >~~~... ~+~~ 7 ~ qA.-\-cv. ( M.M.:~ ~--U~W\,') ~~-~) ~ c.r~~~k Jl m~j; 1- Lsi~:..·, c.~ - ff"\, M-\- ~1..- j[ \'.ltC l ~~Of- \l~ t*' ~~-h. NY~~ !: !: (~s~.&.lj.) ~ -t; ~) ~+ ~ -o \-J~ ~ ~~f @ tM-0~ j\ ~'- V" ( tlc..-- <"e:.&v..\~cl '»'L dt ~ '{ ~ll"\> 8 \JTt. \ rl'AII\~ - SQ..41} {:(~ C(Jr{ecr c~ "+ ~~')i ~ ~ ~c... tl.. ~t- ~ ~f(> ~.,;-J i'lf- ~ - ~~ ~1·~}~ ., b/e.. ~~ i'; ~~.. f'~ ~~ Cbw'f-:~ . : ~ ]tn~ At."\ - + 18" EA{)\~ ~~~ .;; I -~ F\ . Nr>t ... ·.fie~ ~ ~ ~i fill /lYJo~ - 01-\. ~; vaGW ~rlt'-"t·; ~~ ~.. IW. +n I E.O. 13526, section 1.4(c)(d) I Cc.tcr~ ~ ::>f- CS)-'1) ib .h~ ;,.~~ - b,~ 3'*'-f' '""' J~ k.'$ k~ ~-h-J ll\<" ~ ~ . t4J4 ua~A '1/tl .tw4~ ':, ~ r~~d ff ;:;jJA. titfi ti.A~ (ti~Q'~~ '> ~~~ ') ,; Withheld from public release 9 ·, by National Archives and Records Administration under 36 C.F.R. § 1256.58 :t::.. I i; j i ! ' ! ! . · ~ ( ... ., /7 ....,~ ""-1,4~~. ~~ '"" ~V/' J. ~~ · I~~- Lvt~,..._ /qc1 :?- ~ ~ - &?. · ~ ::; ..... ......-~ ,' . I ' ' ~l"-iw4 ! 1 :! Wi~hheld from public release by N;ational Archives and Re~drds Administration und d ~ 36 C.F.R.
Recommended publications
  • Staff Statement No
    Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Honorable Kevin Thomas Duffy
    U N I T E D S T A T E S D I S T R I C T C O U R T S O U T H E R N DISTRICT OF NEW YORK Office of the District Court Executive COLLEEN MCMAHON EDWARD A. FRIEDLAND Chief Judge District Court Executive Hon. Kevin Thomas Duffy (1933 - 2020) The Court is saddened to note the passing of Honorable Kevin Thomas Duffy, our former colleague who served this Court for 44 years (1972-2016), making him the third longest serving judge in the Court’s 230 history. A young Kevin Duffy arrived at the federal courthouse at Foley Square 65 years ago as bailiff to Circuit Judge J. Edward Lumbard. He later served as an Assistant United States Attorney in this the SDNY and Regional Administrator for the SEC. He will be remembered for his acts of kindness and compassion towards others around him and for his smile and wry sense of humor. For his work on terrorism cases, Judge Duffy and his wife were under United States Marshal protection for 10 years. Judge Duffy presided over difficult and important trials, including the following: • Two trials of those involved in the 1993 bombing of the World Trade Center, a terrorist act that resulted in 6 deaths and more than a thousand injured. The first trial last six months and the second three months. All tried defendants were convicted and the principal defendants received sentences of 140 years each. • The three-month Bojinka Plot trial in which defendant Ramzi Yousef was tried and convicted of conspiring to hijack and fly 12 US-bound planes on a coordinated schedule into the Pacific Ocean.
    [Show full text]
  • Military Commissions: a Place Outside the Law’S Reach
    MILITARY COMMISSIONS: A PLACE OUTSIDE THE LAW’S REACH JANET COOPER ALEXANDER* “We have turned our backs on the law and created what we believed was a place outside the law’s reach.” Colonel Morris D. Davis, former chief prosecutor of the Guantánamo military commissions1 Ten years after 9/11, it is hard to remember that the decision to treat the attacks as the trigger for taking the country to a state of war was not inevitable. Previous acts of terrorism had been investigated and prosecuted as crimes, even when they were carried out or planned by al Qaeda.2 But on September 12, 2001, President Bush pronounced the attacks “acts of war,”3 and he repeatedly defined himself as a “war president.”4 The war * Frederick I. Richman Professor of Law, Stanford Law School. I would like to thank participants at the 2011 Childress Lecture at Saint Louis University School of Law and a Stanford Law School faculty workshop for their comments, and Nicolas Martinez for invaluable research assistance. 1 Ed Vulliamy, Ten Years On, Former Chief Prosecutor at Guantanamo Slams ‘Camp of Torture,’ OBSERVER, Oct. 30, 2011, at 29. 2 Previous al Qaeda attacks that were prosecuted as crimes include the 1993 bombing of the World Trade Center, the Manila Air (or Bojinka) plot to blow up a dozen jumbo jets, and the 1998 embassy bombings in East Africa. Mary Jo White, Prosecuting Terrorism in New York, MIDDLE E.Q., Spring 2001, at 11, 11–14; see also Christopher S. Wren, U.S. Jury Convicts 3 in a Conspiracy to Bomb Airliners, N.Y.
    [Show full text]
  • A Noted Irregular Warfare Expert Reveals the Terrorist Organization’S Way of War and the Strategy of Jihad
    SPECIAL FEATURE A NOTED IRREGULAR WARFARE EXPERT REVEALS THE TERRORIST ORGANIZATION’S WAY OF WAR AND THE STRATEGY OF JIHAD . BY S EBASTIAN G ORKA SEPTEMBER 2011 marked the 10th anniversary of America’s longest ever war, the war against al- S E G A M Qaeda and its affiliates. Four months earlier, on May 2 , 2011 , the founder and head of al-Qaeda, Osama bin I Y T T E G / E Laden , was killed in Pakistan by members of U.S. Seal Team VI. The war is far from over ; but given these two I R E U G I V E historical markers, we should pause to examine the way of war that brought us September 11 , 2001 (9/11), D E U Q I N O R E and the strategy behind the deadliest terrorist organization in the modern history of irregular warfare . V 44 * ARMCHAIR GENERAL * MAY 2012 December 22, 2009. A new recruit from Lashkar-e-Taiba Islamist militant group waits to shoot during a training exercise somewhere in Pakistan’s North-West Frontier Province. Members of Lashkar- e-Taiba are among the best trained and most hardened fighters battling against NATO forces in the region. MAY 2012 * ARMCHAIR GENERAL * 45 The CIA initiated its largest ever covert mission, providing TOP ROW, FAR LEFT: Abdullah Azzam, a Pales - tinian ideologue and mentor to Osama bin Laden, heavily recruited young Muslims from around the world to take up arms against the Soviet Union following its invasion of Afghanistan. LEFT: Osama bin Laden, re - cruited and mentored by Abdullah Azzam, used his wealth and influence to aid the Mu - jahedeen in their struggle against the Rus - sians during the Soviet War in Afghanistan.
    [Show full text]
  • Aviation Security
    HOMELAND SECURITY AND DEFENSE CENTER CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security and Defense Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occa- sional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • Timeline and Attachments
    9/11 FAMILIES UNITED TO BANKRUPT TERRORISM POSITION PAPER 1: Foreseeability of the 9-11-01 Attacks on the U.S. Homeland Overview In its work to root out and bankrupt the logistical and funding sources of terrorism, Ness, Motley, on behalf of the 9/11 Families United To Bankrupt Terrorism, has compiled significant evidence and information that illustrates a requisite knowledge, years in advance of September 11, 2001, by industry, government, and financiers of terrorism of a likely plot whereby suicidal hijackers would use civilian aircraft as a weapon of mass destruction against high profile domestic landmarks. We believe the below analysis regarding pre-September 11th terrorist activities and the failure of government and industry to protect the public from these threats may be of value to the Commission as it attempts to identify the systemic deficiencies in government and industry leading up to the attacks. Specifically, the compilation of the referenced information illustrates: · A decades-long pattern of increased violence and lethality of terrorist attacks against commercial aircraft; · A number of earlier plots by Al-Qaeda and other terrorist groups to use airplanes as guided missiles against high-profile landmarks; · An inability by government and industry to prevent such an attack from taking place; · An understanding and acknowledgement of these terrorist activities by financial supporters of Saudi Arabian based charities. We hope the Commission will utilize this information in its broader effort to enhance our nation’s understanding of the events leading up to the 9/11 attacks. Historical Trends It is instructive to examine the history of terrorist acts against civilian aircraft in order to better understand the overarching trends of terrorism and challenges in aviation security.
    [Show full text]
  • Pair of Lone Wolves
    Case 6: Khan and the Parachas 1 Case 6: Khan and the Parachas John Mueller April 12, 2015 In his book, Mastermind: The Many Faces of the 9/11 Architect, Khalid Shaikh Mohammed, journalist Richard Miniter begins by listing his subject’s admitted (or claimed) involvement with terrorist efforts in addition to 9/11. These include the 1993 World Trade Center and 2002 Bali bombings; plots on Heathrow airport, Big Ben, and the Panama Canal; plans to assassinate Bill Clinton, the Pope, and several prime ministers of Pakistan; two efforts to infiltrate agents into the United States; and the plan for a “second wave” of attacks by hijacked airliners on major U.S. landmarks to include the U.S. Bank Tower in Los Angeles, the Sears Tower in Chicago, the Plaza Bank Building in Seattle.1 Actually, Miniter does not do full service to his subject’s bloviating. In addition, to the plots on Miniter’s list, KSM declared himself to be the power behind the shoe bomber operation of 2001; an October 2002 attack in Kuwait; plots to attack oil tankers and U.S. naval ships in the Straits of Hormuz, the Straits of Gibraltar and the port of Singapore; plans to assassinate Jimmy Carter; a plot to blow up suspension bridges in New York City; a plan to destroy the Sears Tower in Chicago with burning fuel trucks; plans to “destroy” Canary Wharf in London; a planned attack on “many” nightclubs in Thailand; Barot’s plot of 2004 targeting U.S. financial targets; a plan to destroy buildings in Eilat, Israel; plans to destroy U.S.
    [Show full text]
  • Transnational Jihadism & Civil Wars
    Transnational Jihadism & Civil Wars Martha Crenshaw Abstract: When rebels also employ terrorism, civil wars can become more intractable. Since the 1980s, jihadism, a form of violent transnational activism, has mobilized civil war rebels, outside entrepreneurs, foreign fighters, and organizers of transnational as well as domestic terrorism. These activities are inte- Downloaded from http://direct.mit.edu/daed/article-pdf/146/4/59/1831094/daed_a_00459.pdf by guest on 01 October 2021 gral to the jihadist trend, representing overlapping and conjoined strands of the same ideological current, which in turn reflects internal division and dissatisfaction within the Arab world and within Islam. Jihad- ism, however, is neither unitary nor monolithic. It contains competing power centers and divergent ideo- logical orthodoxies. Different jihadist actors emphasize different priorities and strategies. They disagree, for example, on whether the “near” or the “far” enemy should take precedence. The relationship between jihadist terrorism and civil war is far from uniform or constant. This essay traces the trajectory of this evo- lution, beginning in the 1980s in the context of the Soviet invasion of Afghanistan. Transnational violence in the name of jihadist ide- ology is intermingled with civil conflict in the Mid- dle East, Asia, and Africa. Jihadists are civil war ac- tors as well as transnational terrorists.1 According to James Fearon, in 1990, only 5 percent of civil conflicts featured jihadist rebels; by 2014, the proportion had increased to 40 percent.2 Since the 1980s, jihadism has incorporated a medley of civil war rebels, out- side entrepreneurs, trainers, funders, recruiters of foreign fighters, and organizers of transnational as well as domestic terrorism.
    [Show full text]
  • The 9/11 Commission Report
    Final 5-7.5pp 7/17/04 11:46 AM Page 145 5 AL QAEDA AIMS AT THE AMERICAN HOMELAND 5.1 TERRORIST ENTREPRENEURS By early 1999, al Qaeda was already a potent adversary of the United States. Bin Ladin and his chief of operations, Abu Hafs al Masri, also known as Mohammed Atef, occupied undisputed leadership positions atop al Qaeda’s organizational structure. Within this structure, al Qaeda’s worldwide terrorist operations relied heavily on the ideas and work of enterprising and strong- willed field commanders who enjoyed considerable autonomy.To understand how the organization actually worked and to introduce the origins of the 9/11 plot,we briefly examine three of these subordinate commanders:Khalid Sheikh Mohammed (KSM), Riduan Isamuddin (better known as Hambali), and Abd al Rahim al Nashiri. We will devote the most attention to Khalid Sheikh Mohammed, the chief manager of the “planes operation.” Khalid Sheikh Mohammed No one exemplifies the model of the terrorist entrepreneur more clearly than Khalid Sheikh Mohammed, the principal architect of the 9/11 attacks. KSM followed a rather tortuous path to his eventual membership in al Qaeda.1 Highly educated and equally comfortable in a government office or a terror- ist safehouse, KSM applied his imagination, technical aptitude, and managerial skills to hatching and planning an extraordinary array of terrorist schemes. These ideas included conventional car bombing, political assassination, aircraft bombing, hijacking, reservoir poisoning, and, ultimately, the use of aircraft as missiles guided by suicide operatives. Like his nephew Ramzi Yousef (three years KSM’s junior), KSM grew up in Kuwait but traces his ethnic lineage to the Baluchistan region straddling Iran and Pakistan.Raised in a religious family,KSM claims to have joined the Mus- lim Brotherhood at age 16 and to have become enamored of violent jihad at youth camps in the desert.
    [Show full text]
  • Political Violence in South Asia, 1995-2020
    6 POLITICAL VIOLENCE IN SOUTH ASIA, 1995-2020 Shyam Tekwani Years before Osama bin Laden and al-Qaeda became household names, South Asia had been in the grip of diverse forms of terrorism prevalent since the 1940s. With the assassinations of the former Prime Minister of India1 and the President of Sri Lanka2 in the first half of the 1990s, Sri Lanka’s Liberation Tigers of Tamil Eelam (LTTE),3 a group that represented the deprived Tamil minority, burst into the international limelight with their pioneering methods of suicide bombings, captivating a global audience. Three terrorist events in 1995, one with far-reaching consequences in the subregion, presaged the future of terrorism that continues to preoccupy counterterrorism practitioners across the globe today. The first was the To- kyo subway sarin attack4 by the religious cult Aum Shinrikyo in March 1995, which killed 12 and injured thousands, flagging the threat of chemical, bio- logical, radiological, and nuclear (CBRN) attacks. A month later, in the Unit- ed States, a U.S. Army veteran parked a rental truck packed full of explosives outside a federal office building in Oklahoma City, detonating his bomb just as the workday was starting.5 The attack, carried out by a homegrown ter- rorist motivated by extremist ideologies, killed 168 people and left hundreds more injured.6 Among the first messages of condolence after the bombing was one from the Tamil Tigers, offering “the American Government and the American people their sympathy and sense of distress over the senseless bombing incident
    [Show full text]
  • Notes on the Future of Terrorism
    D. Benjamin / Notes on the Future of Terrorism Notes on the Future of Terrorism By Daniel Benjamin * the countless prophecies, analyses and clichés spawned by the Of events of September 11, 2001, few have been spread as widely or accepted as uncritically as the expression, “Everything has changed.” In fact, a great deal did not change, including many of the fundamental patterns of behavior among nations. The one thing that did change dramatically, of course, was terrorism. This tactic, which involves the use of violence against non- combatants in order to advance a program that is typically political, has, depending on your perspective, either been around forever or perhaps since gunpowder became widely used or perhaps since the invention of dynamite. For roughly a century and a half, the practice of terror has shown remarkable continuities. Weaponry was virtually always the bullet or the bomb, and so assassinations, massacres, hostage-taking, hijackings, and bombings accounted for the overwhelming majority of attacks. Terrorists have historically been conservative about their trade: they did not want to try things that might not work, so they have stuck to the tried and true, sacrificing potential greater effects to reliability. That is not to say there have been no innovations: suicide bombings, which have been used to great effect first by such disparate actors as the Tamil Tigers of Sri Lanka and the Lebanese Shiites in the early 1980s have now been taken up by Sunni Muslims—the transmission appears to have occurred through the Palestinians, who were impressed by the accomplishments of Hezbollah. But by and large the tools had remained the same.
    [Show full text]