Leading radical imam Abu Hamza al-Masri edits the Al Ansar newsletter published for the Groupe Islamique Armé (GIA), a radical faction engaged in a bitter civil war with the Algerian government. It is unclear when Abu Hamza starts editing the publication, but it was previously edited by Abu Qatada, another leading radical London imam who broke with the GIA in the summer of 1996, so Abu Hamza may have started editing it then (see January 5, 1996 and Mid 1996-October 1997). It was also previously edited by Rachid Ramda, a suspect in bombings in France, and was reportedly financed by Osama bin Laden (see 1994). In the mid-1990s, the GIA commits a series of massacres of the civilian population in Algeria, apparently due to a change of the organization’s direction initiated by an Algerian government mole (see October 27, 1994-July 16, 1996). Abu Hamza, himself an informer for the British security services (see Early 1997), initially supports the GIA despite the massacres, although other senior Islamists such as bin Laden and Abu Qatada break with the group over the issue (see Mid-1996 and Mid 1996-October 1997). However, by the fall of 1997 worshippers at Finsbury park mosque in London, where Abu Hamza preaches, are so angry that he is forced to stop editing Al Ansar and sever his ties with the organization. What happens to Al Ansar after this is not known, but it presumably fades in importance as the GIA declines in importance as well. [O’Neill and McGrory, 2006, pp. 43]
October 1997: Brzezinski Highlights the Importance of Central Asia to Achieving World Domination
Former National Security Adviser Zbigniew Brzezinski publishes a book, The Grand Chessboard: American Primacy and Its Geostrategic Imperatives, in which he portrays the Eurasian landmass as the key to world power, and Central Asia with its vast oil reserves as the key to domination of Eurasia. He states that for the US to maintain its global primacy, it must prevent any possible adversary from controlling that region. He notes: “The attitude of the American public toward the external projection of American power has been much more ambivalent. The public supported America’s engagement in World War II largely because of the shock effect of the Japanese attack on Pearl Harbor.” He predicts that because of popular resistance to US military expansionism, his ambitious Central Asian strategy can not be implemented, “except in the circumstance of a truly massive and widely perceived direct external threat.” [Brzezinski, 1997, pp. 24-25, 210-11] The book also theorizes that the US could be attacked by Afghan terrorists, precipitating a US invasion of Afghanistan, and that the US may eventually seek control of Iran as a key strategic element in the US’s attempt to exert its influence in Central Asia and the Middle East. [Brzezinski, 1997]
October 1997: Ali Mohamed Details His Extensive Al-Qaeda Ties to US Officials But Still Is Not Arrested
US prosecutor Patrick Fitzgerald and FBI agents Jack Cloonan and Harlan Bell, all members of the I-49 squad, take Ali Mohamed out for dinner at a restaurant in Sacramento, California (he has recently moved there from Santa Clara, California). Fitzgerald pays for Mohamed’s meal. Cloonan will later recall, “The purpose in us going to meet Ali at that point in time is that we wanted to gain his cooperation. We knew of his long history having been connected to al-Qaeda, and what we desperately wanted was to convince Ali Mohamed to cooperate with us that night.” During the several-hour-long meeting, Mohamed says the following:
He “loved” bin Laden and “believes in him.” [San Francisco Chronicle, 11/4/2001; Lance, 2006, pp. 274-276]
He organized bin Laden’s move from Afghanistan to Sudan in 1991 (see Summer 1991).
He was in Somalia training militants to fight US soldiers in 1993. He claims “bin Laden’s people were responsible” for the killing of 18 US soldiers there (see 1993).
He trained bin Laden’s personal bodyguards in 1994 and he lived in bin Laden’s house while doing so (see Shortly After February 1994). [Lance, 2006, pp. 274-276]
He says he trained people in “war zones, and… war zones can be anywhere.” [Wall Street Journal, 11/26/2001]
He asserts he doesn’t need a religious edict to make war on the US since it is “obvious” that the US is “the enemy.” Author Peter Lance will later note these words clearly “amounted to treason.”
Cloonan will recall, “He said that he was in touch with hundreds of people he could call on in a moment’s notice that could be, quote, ‘operational,’ and wage jihad against the United States. Very brazenly, he said, ‘I can get out anytime and you’ll never find me. I’ve got a whole network. You’ll never find me.”
After dinner, Cloonan will recall that Fitzgerald turned to him and said, “This is the most dangerous man I have ever met. We cannot let this man out on the street.” But Lance will later note, “But that’s just what he did. Patrick Fitzgerald allowed Ali Mohamed to go free”—even though Mohamed firmly rejected the offer to cooperate. During the dinner, other agents break into Mohamed’s house and bug his computer (his phone is already tapped (see Late 1994). Mohamed will continue to live in California for nearly a year and won’t be arrested until after the August 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). The FBI apparently makes a report based on Mohamed’s comments at this meeting (see After October 1997). But no evidence has come to light that Mohamed’s confession is shared with top US officials or spread widely within US intelligence before 9/11. [Lance, 2006, pp. 274-276] In 2003, Fitzgerald will testify before a Senate committee and claim that when he had to make the decision after the embassy bombings whether or not to arrest Mohamed (see September 10, 1998), the “decision to arrest was made partly in the dark” because prosecutors could “not learn what information [the FBI] had gathered” on Mohamed. Fitzgerald will fail to mention that he was sitting with FBI agents when Mohamed gave this startling confession. [US Congress, 10/21/2003]
October 1997-May 1999: Economic Security Exercises Are Held in New York; Participants Contemplate a Terrorist Attack on Wall Street
The Naval War College in Newport, Rhode Island, and Wall Street bond firm Cantor Fitzgerald hold three “economic security exercises,” in which the participants consider, among other scenarios, terrorists attacking the US financial community with bombings using aircraft. The exercises are intended to explore the link between national security and economic issues. [Cantor Fitzgerald, 4/29/1999; Barnett and Hayes, 5/18/2001; Foreign Policy, 9/12/2011] They bring together “key figures from the national security, governmental, and financial communities to explore and test the relationships between international events, national security, and financial markets,” according to a report prepared by the Naval War College. [Hayes, 6/1998, pp. 1
] The exercises are all held in New York. [Barnett and Hayes, 5/18/2001] The first one takes place on the top floor of one of the Twin Towers of the World Trade Center, where Cantor Fitzgerald has its main offices. [Washington Post, 3/6/2002; Associated Press, 1/19/2011] Whether the second and third exercises also take place at the WTC is unstated.
1997 Exercise Considers Attacks on the US Financial Community – The first exercise, held in October 1997, is based around two related scenarios that would take place in February and March 2000, in the middle of the US presidential primary season. [Journal of Commerce, 12/22/1997; Hayes, 6/1998, pp. 1
] The first scenario involves a crisis “spilling out of conflict in the oil fields of the Middle East,” which is “followed by terrorist assaults against oil fields in the Persian Gulf and US military installations,” according to Fortune magazine. America’s access to Persian Gulf oil supplies is threatened and there is a disruption of the “sea lines of communication.” The second scenario involves a cyber-terrorist attack on Wall Street, in which information warfare attacks are launched against the critical infrastructures underpinning America’s business and financial communities. The computer networks of US financial institutions and power grids in the New York area are targeted, with the intention of inflicting psychological and economic damage on the US. [Journal of Commerce, 12/22/1997; Barnett and Hayes, 5/18/2001; Fortune, 10/8/2001] Furthermore, according to David Rothkopf, managing director of Kissinger Associates, who attends the exercise, participants consider “a variety of potential ways terrorists might target the US financial community, including bombings using trucks or aircraft.” [Foreign Policy, 9/12/2011]
Senior Government Officials Attend the 1997 Exercise – The exercise addresses the potential vulnerability of the US to “asymmetric warfare,” which one participant will later describe as warfare in which “a little guy with the right technology can confront the big giant in a devastating way.” [Journal of Commerce, 12/22/1997] In the simulated scenarios, according to Fortune, “the terrorists succeeded spectacularly.” [Fortune, 10/8/2001] Those attending the exercise include Richard Clarke, President Clinton’s special assistant for global affairs, Rand Beers, special assistant to the president and senior director for intelligence programs, and Anthony Lake, the former national security adviser. [Journal of Commerce, 12/22/1997; Rothkopf, 2014, pp. 266]
1998 Exercise Involves a Rebellion in Indonesia – The second exercise, held on June 1, 1998, focuses on a hypothetical financial crisis combined with a sea lines of communication disruption in Asia, involving Indonesia. The scenario, which would take place around late 1998 to early 1999, involves opposition forces mounting successful rebellions in parts of Indonesia and leaders of the opposition movement declaring themselves Indonesia’s legitimate government. The US military intervenes in response to the crisis. Subsequently, “malevolent insiders” launch coordinated attacks against selected financial institutions in Singapore. These are followed by cyberattacks against some financial institutions in Japan. [Hayes, 6/1998
; Barnett and Hayes, 5/18/2001]
1999 Exercise Is Based around the Y2K Computer Problem – The third exercise, held on May 3, 1999, focuses on the possible global financial consequences of a serious Year 2000 computer problem, caused by computers being unable to properly read dates at the start of the new millennium, as well as “related events surrounding the millennial date change event.” [New York Times, 2/9/1999; Cantor Fitzgerald, 4/29/1999; Barnett and Hayes, 5/18/2001]
Cantor Fitzgerald Requested the ‘War Games’ in the Mid-1990s – The three economic security exercises are the “brainchild” of retired Admiral William Flanagan, former commander in chief of the Navy’s Atlantic Fleet, who is now the senior managing director of Cantor Fitzgerald. [Wall Street Journal, 5/5/1997; Proceedings, 10/2001; Virginian-Pilot, 9/11/2006] According to Thomas Barnett, a senior strategic researcher at the Naval War College, they have come about because Cantor Fitzgerald went to the Naval War College in the mid-1990s and said it would like to run “economic-oriented war games” with the college. [Institute of International Studies, 3/8/2005] Several senior members of Cantor Fitzgerald have close professional ties with the US Navy, so the collaboration between the company and the Naval War College is a “natural partnership,” according to a report prepared by the college. [Hayes, 6/1998, pp. 1
]
Exercise Scenarios Are ‘Amazingly Prescient’ – The fact that the exercises explore “such real-world scenarios as a terrorist strike on Wall Street, war in the Persian Gulf, and a financial crisis in Asia,” Barnett will comment after 9/11, “proved amazingly prescient.” [Barnett, 2004, pp. 197] “September 11 was crystallizing,” he will say. “We all just went, ‘This is what we were talking about: a peacetime, war-like event that’s so profound it forces us to rethink everything.’” [Esquire, 12/2002] The exercises will evolve into something called the “New Rule Sets Project,” which is a research partnership between the Naval War College and Cantor Fitzgerald that aims to explore how globalization is altering America’s definitions of national security (see May 1, 2000-June 4, 2001). [Barnett, 2004, pp. 46; Institute of International Studies, 3/8/2005] Cantor Fitzgerald will suffer the greatest single loss by any company on 9/11, with 658 of its employees dying in the North Tower of the WTC. [Business Week, 9/10/2006]
October 1997: US Intelligence Stops Monitoring Al-Qaeda Cell in Kenya Despite Evidence It Is Planning an Attack
Shortly after the US raid on Wadih El-Hage’s house in Nairobi, Kenya (see August 21, 1997), US investigators discover a letter in the house that mentions a cache of incriminating files had been moved from the house and hidden elsewhere. Investigators suspect the files could contain evidence of a coming attack by El-Hage’s Nairobi cell. A law enforcement official later says US investigators begin a “somewhat frantic, concerted effort” to locate the missing files. “The concern was high enough about something being out there to go right away.” A search for the files is conducted at another location in Kenya in September 1997, but the files are not found. [New York Times, 1/9/1999] But despite this search, and even though other documents found in the raid refer to other unknown members of the cell and the imminent arrival of more operatives (see Shortly After August 21, 1997), the wiretaps on five phone numbers connected to El-Hage are discontinued in October 1997, one month after El-Hage moved to the US (see September 24, 1997). Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who had been living with El-Hage and using the same phones as him, takes over running the cell. US intelligence will resume monitoring the phones in May 1998 and continue to monitor them through August 1998 (see May 1998), when the cell will successfully attack US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). It will be stated in the 2002 book The Cell, “The hardest thing to understand in retrospect is why US law enforcement did nothing else to disrupt the activities of the Nairobi cell” after the raid on El-Hage’s house. [New York Times, 1/13/2001; Miller, Stone, and Mitchell, 2002, pp. 203-205] The files will be found only after the African embassy bombings, when the offices of the charity Mercy International are searched on August 20, 1998. They will contain incriminating information, including numerous phone calls from bin Laden to Nairobi. [United States of America v. Usama Bin Laden, et al, 3/20/2001] It is not clear why the charity was not searched before the attacks, since two of the five phones monitored since 1996 were to Mercy’s Kenya offices (see Late 1996-August 20, 1998).
October 1, 1997: MI5 Not Concerned that Leading Asset Abu Hamza Intends to Fund Terrorism Overseas
The British domestic counterintelligence service MI5 meets with Abu Hamza al-Masri, a leading British imam and informer (see Early 1997). After the exchange of “pleasantries,” Abu Hamza and his handler discuss his recent breach with the Groupe Islamique Armé (GIA), an Algerian militant group, which has been indiscriminately killing civilians (see Mid 1996-October 1997). The handler notes that “[Abu] Hamza is bowed but not broken,” and adds, “For him the jihad goes on, if not in Algeria then somewhere else.” Abu Hamza tells the MI5 officer that Britain “is seen as a place to fundraise and to propagate Islam.” Authors Daniel O’Neill and Sean McGrory will later comment, “The admission that Abu Hamza and his followers were using [Britain] to raise funds to finance terrorism overseas did not seem to cause a blip on the MI5 agent’s radar.” [O’Neill and McGrory, 2006, pp. 145]
October 7, 1997: US Declares Abu Sayyaf and GIA Foreign Terrorist Organizations, But Not Al-Qaeda
The State Department officially designates the Abu Sayyaf a foreign terrorist organization. The Abu Sayyaf is a militant group in the Philippines with reported connections to bin Laden. Thirty groups are newly listed, including other groups associated with bin Laden, such as the Groupe Islamique Armé (GIA) in Algeria. [New York Times, 10/7/1997] However, al-Qaeda will not be so listed until 1999 (see October 8, 1999). Al-Qaeda is still relatively unknown; the name was first mentioned in the media in 1996 (see August 14, 1996).
Between October 1997 and August 7, 1998: Ali Mohamed Gives FBI Hint of Upcoming Al-Qaeda Attack in East Africa
Double agent Ali Mohamed gives a hint about the upcoming African embassy bombings to an FBI agent. Harlan Bell, one of the FBI agents who met with Mohamed at an October 1997 dinner where Mohamed detailed his al-Qaeda ties (see October 1997), is apparently continuing to regularly talk to him on the phone (though it is not known what they discuss). Bell begins recording these phone calls (which are presumably being recorded by others as well since all of Mohamed’s communications are being monitored by this time (see October 1997-September 10, 1998)). FBI agent Jack Cloonan, who works with Bell in the I-49 bin Laden squad, will later recall that after the embassy bombings Bell will replay one of these taped conversations. “It became apparent from listening to one of those tapes that Ali was talking about a possible target in East Africa. He never specifically said the embassy or that he knew an attack was imminent, but he was giving this up in a sense before the attack took place.” [Lance, 2006, pp. 207-208]
October 1997-September 10, 1998: Ali Mohamed’s California Computer Is Continually Bugged
The FBI installs a wiretap in double agent Ali Mohamed’s computer (the FBI has been monitoring his phone since 1993 (see Autumn 1993 and Late 1994)). According to FBI agent Jack Cloonan, “The Sacramento [FBI] office did a wonderful job of getting into his apartment, wiring it up, and exploiting his computer. So we were able to download a lot of stuff.” [Lance, 2006, pp. 276] Not much is known about what is on his computer, but a 2001 trial will mention that Wadih El-Hage, head of the cell in Kenya planning the African embassy bombings (see Between October 1997 and August 7, 1998), sent Mohamed a computer file about the death of al-Qaeda leader Abu Ubaidah al-Banshiri by drowning in Kenya in May 1996 (see May 21, 1996). [Lance, 2006, pp. 297-298] Journalist Peter Lance believes that, given Mohamed’s apparent foreknowledge of the embassy bombings, the computer probably contained references to that operation. In his book Triple Cross, he asks, “If [US agents] now had access to Mohamed’s phone and hard disk, why didn’t they come to understand his role as a key player in the embassy bombing plot?… If their motive was to lie in wait—to monitor his phone calls and e-mail traffic—why didn’t that surveillance put them right in the middle of the embassy plot?” [Lance, 2006, pp. 276]
October 27, 1997: Halliburton Announces Turkmenistan Project; Unocal and Delta Oil Form Consortium
Halliburton, a company headed by future Vice President Dick Cheney, announces a new agreement to provide technical services and drilling for Turkmenistan. The press release mentions, “Halliburton has been providing a variety of services in Turkmenistan for the past five years.” On the same day, a consortium to build a pipeline through Afghanistan is formed. It is called CentGas, and the two main partners are Unocal and Delta Oil of Saudi Arabia. [Halliburton, 10/27/1997; CentGas, 10/27/1997]


