FBI agents, having held Operation Bojinka plotter Abdul Hakim Murad for about a month, write a memo containing what they have learned from interrogating him. The memo contains many interesting revelations, including that Ramzi Yousef, a mastermind of the 1993 World Trade Center bombing, “wanted to return to the United States in the future to bomb the World Trade Center a second time.” However, this memo does not contain a word about the second wave of Operation Bojinka—to fly about 12 hijacked airplanes into prominent US buildings—even though Murad had recently fully confessed this plot to Philippines investigators, who claim they turned over tapes, transcripts, and reports with Murad’s confessions of the plot to the US when they handed over Murad. It has not been explained why this plot is not mentioned in the FBI’s summary of Murad’s interrogation. [Lance, 2003, pp. 280-82] If the US does not learn of the second wave plot from Murad’s interrogation, it appears the US get the same information from a different source at about the same time (see Spring 1995). After 9/11, a Philippine investigator will refer to this third plot when he says of the 9/11 attacks, “It’s Bojinka. We told the Americans everything about Bojinka. Why didn’t they pay attention?” [Washington Post, 9/23/2001] In an interview after 9/11, Khalid Shaikh Mohammed will claim that the 9/11 attacks were a refinement and resurrection of this plot. [Australian, 9/9/2002]
June 1995-June 1998: Number of Counterterrorism Exercises Increases Dramatically, but Most Practice Unlikely WMD Scenarios
After Presidential Decision Directive 39 (PDD-39), issued in June 1995 (see June 21, 1995), requires key federal agencies to maintain well-exercised counterterrorist capabilities, the number of counterterrorism exercises being conducted increases significantly. According to a 1999 report by the General Accounting Office, whereas 32 counterterrorist exercises are held between June 1995 and June 1996, from June 1997 to June 1998, 116 such exercises are conducted. Some of the exercises held between June 1995 and June 1998 are “tabletop exercises,” where participants work through a scenario around a table or in a classroom and discuss how their agency might react; others are “field exercises,” where an agency’s leadership and operational units practice their skills in a realistic field setting. Four exercises during this period are “no-notice” exercises, where participants have no advance notice of the exercise. These four exercises are conducted by either the Department of Defense (DoD) or the Department of Energy. DoD leads 97 of the exercises—almost half of the total—held between June 1995 and June 1998. The Secret Service leads 46, the FBI 24, and the Federal Emergency Management Agency (FEMA) leads 16. Most of the exercises are conducted in the US and are based around the scenario of a domestic terrorist attack. Although intelligence agencies have determined that conventional explosives and firearms continue to be the weapons of choice for terrorists, the majority of exercises are based around scenarios involving weapons of mass destruction (WMD)—chemical, biological, or nuclear weapons or agents. More than two-thirds of the exercises have WMD scenarios, with the most common WMD being chemical agents, such as sarin. The other exercises have more traditional and more likely scenarios involving conventional weapons and explosives. [United States General Accounting Office, 6/25/1999 ; Washington Post, 10/2/2001
]
July 19, 1995: ’Wall’ Memo Cuts Criminal Investigators Off from Intelligence Information
The Justice Department issues the “wall” memo, a later heavily criticized memo that establishes procedures to regulate the flow of information from FBI intelligence investigations to criminal investigators and prosecutors. Such procedures already exist, but this “wall” is now formalized and extended. The memo is signed by Attorney General Janet Reno, but is based on a similar one recently issued by Deputy Attorney General Jamie Gorelick governing the 1993 WTC bombing cases (see March 4, 1995). The wall exists to prevent defendants from successfully arguing in court that information gathered under a warrant issued under the Foreign Intelligence Surveillance Act (FISA) should not be used in a criminal prosecution, as the standard for obtaining a FISA warrant is considered to be lower than that for obtaining a criminal search warrant (see Early 1980s). Such arguments are usually unsuccessful, according to the Justice Department’s Office of Legal Counsel, which believes that courts are showing “great deference” to the government when such challenges are made. The procedures, which now apply to all intelligence investigations regardless of whether or not a FISA warrant has been issued, state that the FBI must consult the Justice Department’s Criminal Division, not local United States Attorneys’ offices, about intelligence investigations when it is considering starting a parallel criminal investigation, and that it must do so when there is reasonable indication of a significant federal crime. This means that FBI headquarters has veto power over whether a field office can contact a local prosecutor about an intelligence investigation. However, Criminal Division prosecutors should only be consulted and cannot control an investigation. [Office of the Attorney General, 7/19/1995; US Department of Justice, 11/2004, pp. 25-30 ] These procedures will be implemented in such a way that even greater restrictions are placed on information sharing (see (Late 1995-1997)), although a partial exception will be created for the Southern District of New York, which handles a lot of terrorism work (see August 29, 1997). The procedures will also be much criticized for the way they are implemented in the FBI (see July 1999). The increased barriers to information sharing often mean that the FBI monitors terrorists as before, but the information does not get passed to criminal investigators, so the cells carry on operating in the US and the FBI carries on monitoring them. For example, the FBI monitors a Florida-based cell that funds and recruits for jihad throughout the world for nearly a decade before it is rolled up (see (October 1993-November 2001)). Some money raised by terrorism financiers in the US goes to Bosnia, where the US has a policy of enabling covert support for the Muslim side in the civil war (see April 27, 1994). Prosecutor Andrew McCarthy will later call the wall a “rudimentary blunder,” and say that it “was not only a deliberate and unnecessary impediment to information sharing; it bred a culture of intelligence dysfunction.” [National Review, 4/13/2004] John Ashcroft, Attorney General in the Bush Administration (see April 13, 2004), will say that “Government buttressed this ‘wall’,” and will call it the “single greatest structural cause for September 11.” [9/11 Commission, 4/13/2004]
Shortly Before October 1995: FBI Learns KSM Traveling to Sudan and Qatar
Khalid Shaikh Mohammed (KSM) goes to Sudan, but he is soon discovered there by the Sudanese intelligence agency. Sudan is facing increasing trouble with Western countries due to its reputation as a terrorist haven, so KSM is told to leave and given a few weeks to move on. Later in the year, Sudanese intelligence tells an FBI agent about KSM’s recent visit and also reveals that he was headed to Qatar (where he has already been based for several years 1992-1996). By October 1995, the FBI tracks KSM to a certain apartment building in Qatar, but he will escape capture (see October 1995). [Miniter, 2003, pp. 85-86]
October 1995: FBI Begins Investigating Bin Laden; CIA Already Monitoring Him
The FBI opens a case on Osama bin Laden. Dan Coleman and John Ligouri, members of the FBI’s Joint Terrorism Task Force (JTTF), are sent to the CIA Counterterrorist Center (CTC) to see what the CIA knows about bin Laden. “They were amazed by the amount of material – some forty thick files’ worth – that they found.… Most of the information consisted of raw, unfocused data: itineraries, phone records, associates lists, investment holdings, bank transfers.” The vast majority of the data comes from NSA electronic eavesdropping and most of it has not been properly analyzed (see Early 1990s). They find that the CTC has been conducting a vigorous investigation on Wadih El-Hage, bin Laden’s personal secretary. [Miller, Stone, and Mitchell, 2002, pp. 148-149] Coleman will go on to become the FBI’s biggest expert on bin Laden and will help start the bureau’s bin Laden unit. [Suskind, 2006, pp. 90] It is not known when the CIA or NSA began monitoring bin Laden or El-Hage.
October 1995: FBI and CIA Investigating Bin Laden’s Personal Secretary
In 1995, the FBI is given the CIA’s files on bin Laden, and they discover that the CIA has been conducting a vigorous investigation on Wadih El-Hage, bin Laden’s personal secretary and a US citizen (see October 1995). The FBI had already started investigating El-Hage in 1991 (see March 1991), and in 1993 they found out he had bought weapons for one of the 1993 WTC bombers (see Summer 1993). Thanks to the CIA files, the FBI learns that in early 1992 El-Hage moved to Sudan and worked there as bin Laden’s personal secretary. [PBS Frontline, 4/1999; Miller, Stone, and Mitchell, 2002, pp. 148-149] Then, in 1994, he moved to Nairobi, Kenya, and officially started running a bogus charity there called “Help Africa People.” [PBS Frontline, 4/1999; CNN, 10/16/2001] In fact, El-Hage is running an al-Qaeda cell that will later carry out the 1998 African embassy bombings. He stays in close contact with top al-Qaeda leaders. [PBS Frontline, 4/1999] Apparently El-Hage is under US surveillance in Kenya, or at least people he is calling are under surveillance. For instance, a phone call between El-Hage in Kenya and Ali Mohamed in California is recorded in late 1994 (see Late 1994).and there are many calls recorded between El-Hage and bin Laden in Sudan. FBI agent Dan Coleman will analyze all this information about El-Hage and eventually supervise a raid on his Kenya house in 1997 (see August 21, 1997). [Wright, 2006, pp. 242-244]
October 20, 1995: KSM Possibly Helps with Revenge Bombing in Croatia
A suicide bombing destroys the police station in the town of Rijeka, Croatia, wounding 29 people. The Egyptian militant group Al-Gama’a al-Islamiyya takes credit for the bombing, saying it is revenge for the abduction of Al-Gama’a al-Islamiyya leader Talaat Fouad Qassem in Croatia the month before (see September 13, 1995). The Croatians will later determine that the mastermind, Hassan al-Sharif Mahmud Saad, and the suicide bomber were both tied to Al-Gama’a al-Islamiyya. They also were tied to the Islamic Cultural Institute in Milan, Italy, which in turn has ties to many militant attacks, some committed Ramzi Yousef (see 1995-1997). CIA soon discovers that the suicide bomber also worked for the Third World Refugee Center charity front (see January 1996). [Kohlmann, 2004, pp. 153-155] In 1999, the FBI’s Bojinka investigation will notice that Khalid Shaikh Mohammed (KSM) was believed to be in neighboring Bosnia at the time and that the timing device of the bomb (a modified Casio watch) closely resembled those used by KSM and his nephew Yousef in the Bojinka plot (see January 6, 1995). Presumably, this would have increased the importance of catching KSM. [9/11 Commission, 7/24/2004, pp. 489]
Late 1995-1997: Additional Restrictions Placed on Sharing of Intelligence inside FBI
Following the issuance of the “wall” memo, which established procedures to regulate the flow of information from intelligence investigations by the FBI to local criminal prosecutors (see July 19, 1995), an additional information sharing “wall” is erected inside the FBI. After 9/11, the Justice Department’s Office of Inspector General will find, “Although it is unclear exactly when this ‘wall’ within the FBI began, [it was] sometime between 1995 and 1997.” This additional wall segregates FBI intelligence investigations from FBI criminal investigations and restricts the flow of information from agents on intelligence investigations to agents on criminal investigations, because of problems that may occur if the flow is not regulated (see Early 1980s). If an intelligence agent wants to “pass information over the wall” to a criminal agent, he should get approval from one of his superiors, either locally or at FBI headquarters. A description of wall procedures comes to be commonplace in all warrant requests filed under the Foreign Intelligence Surveillance Act (FISA). [US Department of Justice, 11/2004, pp. 30-32 ] However, FBI agents often ignore these restrictions and over a hundred cases where information is shared without permission between intelligence and criminal FBI agents will later be uncovered (see Summer-October 2000 and March 2001).
Late 1995-May 2000: Al-Qaeda Leader Connected to British Intelligence Lives Openly in Britain
Anas al-Liby, member of a Libyan al-Qaeda affiliate group called Al-Muqatila, lives in Britain during this time. He had stayed with bin Laden in Sudan (see May 18, 1996). In late 1995, he moves to Britain and applies for political asylum, claiming to be a political enemy of the Libyan government (see (Late 1995)). He is involved in an al-Qaeda plot (see Late 1993-Late 1994) that will result in the bombing of two US embassies in Africa in 1998 (see 10:35-10:39 a.m., August 7, 1998). The British government suspects he is a high-level al-Qaeda operative, and Egypt tells Britain that he is wanted for an assassination attempt of Egyptian President Hosni Mubarak (see (Late 1995)). In 1996, he is involved in a plot with the British intelligence agency to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi (see 1996), and presumably his ability to live in Britain is connected to cooperation with that plot. [Observer, 11/10/2002; Times (London), 1/16/2003] After the failed assassination attempt in 1996, the British allegedly continues to support Al-Muqatila—for instance, the group openly publishes a newsletter from a London office. [Brisard and Dasquie, 2002, pp. 97-98] Whistleblower David Shayler, a British intelligence agent, gives British authorities details of this Libya plot in 1998 and again in 1999, and later will serve a short prison sentence for revealing this information to the public (see November 5, 2002). [Observer, 8/27/2000] In late 1998, al-Liby is monitored calling an al-Qaeda operative in the US and discussing their ties to one of the African embassy bombers, but this results in no action against al-Liby (see Shortly After August 12, 1998). He lives in Manchester until May of 2000. In 2002, it will be reported that he eluded a police raid on his house and fled abroad. [Observer, 11/10/2002] However, in a 2011 book, FBI agent Ali Soufan will claim that al-Liby actually was arrested and then let go (see May 2000). His asylum application will still be under review at the time of his arrest. [Times (London), 1/16/2003] An important al-Qaeda training manual is discovered in the raid on his Manchester residence (see May 2000). The US will later post a $25 million reward for al-Liby’s capture. [Federal Bureau of Investigation, 2002; Observer, 11/10/2002]
December 9-12, 1995: Bojinka Plotter Arrested in Malaysia, Rendered to US
Bojinka plotter Wali Khan Amin Shah is arrested in Malaysia and rendered to the US.
Shah had been on the run in Asia for almost a year, since escaping a Philippine jail (see January 13, 1995). He is missing three fingers on his left hand, and someone notices this and alerts the authorities. [Ressa, 2003, pp. 43] The FBI had hunted him through around half a dozen countries. After his arrest by Malaysian authorities, at the FBI’s request, he is rendered to the US. He will later be given a long prison sentence for his role in the Bojinka plot. [New York Times, 12/13/1995; Lance, 2004, pp. 326-7; Grey, 2007, pp. 245] Before his arrest, leading Southeast Asian militant Hambali had supplied Khan with a new identity and cover in Malaysia, where he lived on the resort island of Langkawi using the alias Osama Turkestani. However, a 2002 article will say that officials claim they only learn this “years later.” [Los Angeles Times, 2/7/2002]