The FBI installs a wiretap in double agent Ali Mohamed’s computer (the FBI has been monitoring his phone since 1993 (see Autumn 1993 and Late 1994)). According to FBI agent Jack Cloonan, “The Sacramento [FBI] office did a wonderful job of getting into his apartment, wiring it up, and exploiting his computer. So we were able to download a lot of stuff.” [Lance, 2006, pp. 276] Not much is known about what is on his computer, but a 2001 trial will mention that Wadih El-Hage, head of the cell in Kenya planning the African embassy bombings (see Between October 1997 and August 7, 1998), sent Mohamed a computer file about the death of al-Qaeda leader Abu Ubaidah al-Banshiri by drowning in Kenya in May 1996 (see May 21, 1996). [Lance, 2006, pp. 297-298] Journalist Peter Lance believes that, given Mohamed’s apparent foreknowledge of the embassy bombings, the computer probably contained references to that operation. In his book Triple Cross, he asks, “If [US agents] now had access to Mohamed’s phone and hard disk, why didn’t they come to understand his role as a key player in the embassy bombing plot?… If their motive was to lie in wait—to monitor his phone calls and e-mail traffic—why didn’t that surveillance put them right in the middle of the embassy plot?” [Lance, 2006, pp. 276]