Analysis of the Hamburg Network Over Time(Davis-Worth)

download Analysis of the Hamburg Network Over Time(Davis-Worth)

of 26

Transcript of Analysis of the Hamburg Network Over Time(Davis-Worth)

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    1/26

    NAVALPOSTGRADUATE

    SCHOOLMONTEREY, CALIFORNIA

    DA 4610Final Project

    Hamburg Network Analysis Over Time

    By

    MAJ Ian DavisMAJ Carrie Worth

    1

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    2/26

    OVERVIEW

    The Hamburg Network was a group of 24 radical Islamists operating in

    five cells and responsible for the 9/11 terrorist attacks. The origins of the network

    lay with a study group at al-Quds Mosque in Hamburg, led by Mohammad

    Belfas.1 The group originally consisted of Mohamed Atta, Mounir Motassadeq,

    and Abdelghani Mzoudi who were all studying at the Technical University of

    Hamburg-Harburg (TUHH). Over time, the study group grew to include Ramzi

    bin al-Shibh, Said Bahaji, Zaid Amir Jarrah, Zakarya Essabar and Marwan al-

    Shehhi. The actual Hamburg Cell2 began out of this study group when

    Mohammed Atta, Ramzi bin al-Shibh, and Said Bahaji moved into an apartment

    together on 53 Marienstrasse, which they named Bait al-Ansar or the House of

    the Supporters (of the Prophet). It was there that the three held meetings to

    discuss their anti-American and anti-Israeli views and began trying to find ways

    to further their cause.3 With all eight associated through the study group led by

    Belfas and their increased social interaction through school, meetings, and

    weddings, their discussions grew more virulent and ultimately led to the friends

    looking to join the jihad and go to Chechnya to fight the Russians. It was not until

    they met Mohamadou Ould Slahi that they were encouraged to travel toAfghanistan for training.4

    Prior to and completely independent of the forming of the Hamburg

    Network, the plan for the planes operation was developing in the mind of Khalid

    Sheikh Mohammed (KSM). Equally comfortable in a government office or a

    terrorist safehouse, Khalid Sheikh Mohammed used his imaginative mind along

    1 Marc Sageman, Understanding Terror Networks, Philadelphia: University ofPhiladelphia Press, 2004, 103-104.

    2 The individuals that met in the study group in Hamburg are widely known as theHamburg Cell. This paper will use the 9/11 commission report identifying them as the HamburgContingent who became the larger Hamburg Network. See National Commission on TerroristAttacks Upon the United States, The 9/11 Commission Report,http://www.gpoaccess.gov/911/index.html (accessed on November 17, 2010).

    3 Sageman, Understanding Terror Networks, 105.

    4 Sageman, Understanding Terror Networks, 106.

    2

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    3/26

    with technical and managerial skills to develop plans for a variety of terrorist

    acts.5 KSM knew that his plan for using airplanes in a terrorist attack on the

    United States required personnel, money, and logistical support that he did not

    have, but Usama bin Ladin did. Although KSM had previously fought alongside

    Usama bin Ladin in 1987, they did not have a close working relationship. But

    Sheikh Mohammed knew he had to meet with bin Ladin because of he could

    provided the personnel, money, and logistical support required. Mohammed met

    with bin Ladin in mid 1996, but the two did not formally reach a deal to begin the

    final planning until late 1998. Sheikh Mohammed formally joined Usama bin

    Ladin and al-Qaida in 1998 after being given the green light for his planes

    operation.6

    With the arrival of the first three members of the Hamburg Network in

    Afghanistan, Usama bin Ladin was about to find the perfect group to lead the

    attack: the members of the Hamburg Network spoke fluent English, were

    educated and knowledgeable of the western lifestyle, and were radical Islamists.

    In November of 1999, Mohamed Atta and his Hamburg Network were selected

    for the 9/11 operation.7

    5 National Commission on Terrorist Attacks Upon the United States, Al-Qaida Aims AtThe American Homeland, http://www.9-11commission.gov/report/911Report_Ch5.htm (accessedon August 30, 2010).

    6

    Khalid Sheikh Mohammed did not join Usama bin Ladin and Al-Qaida when originallyinvited in 1996 because he wanted to remain independent. This allowed him to remain free towork with other organizations, such as the mujahideen led by Sayyaf, Sheikh Mohammedsmentor, who was loyal to Massoud, the leader of the Northern Alliance. Since bin Ladin wasforging ties with the Taliban, the opposition of the Northern Alliance, allying with Al-Qaida wouldhave proven troublesome for Sheikh Mohammed. See National Commission on Terrorist AttacksUpon the United States, Al-Qaida Aims At The American Homeland, http://www.9-11commission.gov/report/911Report_Ch5.htm (accessed on August 30, 2010).

    7 Sageman, Understanding Terror Networks, 106-107.

    3

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    4/26

    Figure 1 Photos of 911 Hijackers8

    Background and Purpose of Our Study

    Networks are dynamic. This paper focuses on Dynamic Network Analysis

    and Geospatial measures over time. Our objective is to employ Dynamic

    Network Analysis in order to identify the timeline in which the Hamburg Networkbecame viable to carry out its purpose and also to highlight potential areas of

    vulnerability within the network. The specific question we intend to answer is: at

    what point in time did the network have the capacity to attack the World Trade

    Center? This study assumes that the minimum criteria for mission

    accomplishment was the network required 2 aircraft, each with one simulator

    trained commercial pilot and 3 additional personnel for security. Using the ORA

    Dynamic Network Analysis software package, we analyze the Hamburg Network

    over time to determine when the network met the minimum criteria to conduct the

    Planes Operation.

    Focus of our Study

    8 Source: https://www.cia.gov/news-information/speeches-testimony/2002/DCI_18_June_testimony_new.pdf.

    4

    https://www.cia.gov/news-information/speeches-testimony/2002/DCI_18_June_testimony_new.pdfhttps://www.cia.gov/news-information/speeches-testimony/2002/DCI_18_June_testimony_new.pdfhttps://www.cia.gov/news-information/speeches-testimony/2002/DCI_18_June_testimony_new.pdfhttps://www.cia.gov/news-information/speeches-testimony/2002/DCI_18_June_testimony_new.pdf
  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    5/26

    For the purpose of this study, our initial data set for the Hamburg Meta

    Network consists of 45 agents. This data was derived using open source data

    from both U.S. Government reports and academic research on the 911 attacks. 9

    Figure 2 Hamburg Network Initial Data

    From the above data, we narrowed our focus down to the primary agent in

    the 9/11 attacks consisting of 24 actors configured into five cells. Four of the

    cells were comprised of the 19 hijackers and the remaining fifth cell was the

    9 Primary sources used to generate data was: National Commission on Terrorist AttacksUpon the United States, Al-Qaida Aims At The American Homeland, Vladis E. Krebs,Mapping Networks of Terrorist Cells, Connections: 2001, Vol 23, 43-52, and ProsecutionExhibits from United States v. Zacarias Moussaoui, Criminal No. 01-455-A, available athttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution.html.

    5

    http://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution.html
  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    6/26

    active support component located in Hamburg.

    Figure 3 Hamburg Network Agents and Locations

    The legend for Figure 3 is as follows:

    Color Target/Flight

    Pink WTC North Tower (AA Flight 11)

    Blue WTC South Tower (UA Flight 175)

    Green Pentagon (AA Flight 77)

    6

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    7/26

    Teal Capitol (UA Flight 93)

    Red Hamburg Cell (Hamburg, Germany)

    Yellow Target Name

    Table 1. Color Legend

    The following table illustrates the agent, the target he was associated with,

    and his primary task:

    Name Target Primary Task

    Abdul Aziz Al-Omari* WTC N Tower Security

    Ahmed Al Haznawi Capitol Security

    Ahmed Alghamdi WTC S Tower Security

    Ahmed Alnami Capitol Security

    Fayez Ahmed WTC S Tower Security

    Hamza Alghamdi WTC S Tower Security

    Hani Hanjour Pentagon Pilot

    Khalid Al-Mihdhar Pentagon Security

    Majed Moqed Pentagon Security

    Marwan Al-Shehhi WTC S Tower Pilot

    Mohamed Atta WTC N Tower Pilot

    Mohand Alshehri* WTC S Tower Security

    Nawaf Alhazmi Pentagon Security

    Saeed Alghamdi* Capitol Security

    Salem Alhazmi* Pentagon Security

    Satam Suqami WTC N Tower Security

    Wail Alshehri WTC N Tower Security

    Waleed Alshehri WTC N Tower Security

    Ziad Jarrah Capitol Pilot

    7

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    8/26

    Table 2. Agent, Target, and Primary Task

    Figure 4 Planes Operation Locations (Hamburg not Shown)

    Relationships

    The first relationship, agent to target, was selected because it provided a

    clear and defining method for dividing the Hamburg Network into its five cells.

    Additionally, the question we want to answer on network viability is based on

    being able to strike the two World Trade Center (WTC) towers. By identifying

    agent to target, we are able to identify the point in time the network was able to

    strike those two targets. The second relationship, agent to primary task, was

    selected because it identifies role played by each Hamburg Network member. In

    order to have a viable network to strike the two WTC towers, a simulator trained

    pilot and three additional members were needed per aircraft (i.e. 1 pilot and 2

    security).

    Finally, the two relationships were examined by utilizing ORA to first draw

    the network and then analyze it based on established time periods from 3 Sep 91

    to 11 Sep 01. We have also provided screenshots from geospatial analysis

    performed with the same dataset.

    Analysis Over Time

    8

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    9/26

    We utilized ORA to analyze the Hamburg Network over time. For this

    study, we used 13 distinct time intervals based on arrival of agents into the

    United States.

    Time Period Inclusive Dates

    1 3 Sep 91 27 Apr 99

    2 28 Apr 99 28 May 00

    3 29 May 00 2 Jun 00

    4 3 Jun 00 26 Jun 00

    5 27 Jun 00 7 Dec 00

    6 8 Dec 00 22 Apr 01

    7 23 Apr 01 1 May 01

    8 2 May 01 27 May 01

    9 28 May 01 7 Jun 01

    10 8 Jun 01 26 Jun 01

    11 27 Jun 01 28 Jun 01

    12 29 Jun 01 3 Jul 01

    13 4 Jul 01 11 Sep 01

    Table 3. Definitions of Time Periods

    9

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    10/26

    Figure 5 Hamburg Network at Time Period 1

    10

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    11/26

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    12/26

    arrive in the United States and set up residence in San Diego, CA. They each

    take flight lessons at the Sorbi Flying Club but do not obtain licenses. The

    Hamburg Cell is still being educated and radicalized in Hamburg, Germany.

    Figure 7 Hamburg Network Time Period 3

    In time period 3, Al-Shehhi arrives in Newark, NJ where he takes English

    language classes. He remains tied to the Hamburg Cell. Al-Midhar and Al-

    Hamzi set-up a safe house in Lemon Grove, CA.

    12

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    13/26

    Figure 8 Hamburg Network Time Period 4

    Time period 4 brings Mohammed Atta to New Jersey where he activates a

    cell phone listing 1950 Goddard Ave in Norman, OK as his address. This is the

    address of the Airman Flight School. Atta and Al-Shehhi rent a car with a

    Brooklyn, NY address listed.

    13

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    14/26

    Figure 9 Hamburg Network Time Period 5

    The network is beginning to branch out further in Time period 5. Ziad

    Zarrah arrives in Atlanta and arranges flight training at the Florida Flight Training

    Center in Venice, FL. Atta and Al-Shehhi check-in to a Norman, OK hotel and

    they enroll at Huffman Aviation which is in Venice, FL. Meanwhile, Jarrah takes

    up residence in Venice, FL. Although they are in Oklahoma, he and al-Shehhi

    also begin residence in Venice, FL. On 9/18/2000, Atta and al-Shehhi receive

    their Private Pilots License from Huffman Aviation and enroll in training at Jones

    Aviation (Sarasota, FL). They eventually take a test for their instrument rating

    with Huffman Aviation. At this point (not including the Commercial Pilot ratedHanjour) the Network has two trained pilots and 3 additional personnel residing in

    the United States.

    14

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    15/26

    Figure 10 Hamburg Network Time Period 6

    Time period 6 brings Hanjour back to the United States. Atta and Al-

    Shehhi obtain their Commercial Pilot rating and begin simulator training in Opa-

    Locka, FL. Meanwhile, Ziad Jarrah completes 737 simulator training in Miami,

    FL. With Hanjour and Jarrah simulator trained pilots and Atta, al-Shehhi, al-

    Mihdar, al-Hamzi also residing in the United States, the network is nearly viable.

    All the the members currently in the United States continue to change addresses,

    obtain flight training (to include flying the Hudson Tour in New York), and make

    phone calls (presumably to coordinate), and obtain documents such as drivers

    licenses. At this point, they could conduct the planes operation, but the lack ofsecurity personnel is noted.

    15

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    16/26

    Figure 11 Hamburg Network Time Period 7

    Time period 7 brings al-Shehri and al-Suqami to Orlando, FL where they

    move into a safe house. This marks the presence of enough Hamburg Network

    personnel in the United States to conduct the operation as presented in our

    research question. However, there is no indication that they personnel are

    coordinated to do so at this point. It is proposed that a covert network sacrifices

    efficiency for security.10 This applies to the Hamburg Network.

    10 McCormick, G. H., and G. Owen. "Security and Coordination in a ClandestineOrganization." Mathematical and Computer Modeling, no. 31 (2000): 175-192.

    16

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    17/26

    Figure 12 Hamburg Network Time Period 8

    In time period 8, al-Ghamdi and Moqed arrive in Washington, D.C.

    Hanjour, al-Hamzi, Moqed, and al-Ghamdi check into the Fairfield Inn in Fairfield,

    CT. They eventually move to a safe house in Paterson, NJ.

    17

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    18/26

    Figure 13 Hamburg Network Time Period 9

    With time period 9 and the arrival of al-Nami, al-Shehri, and al-Ghamdi in

    Miami, the network now appears to be coming together for the planes operation.

    Hanjour flies the Hudson Tour and the others continue their tradecraft by

    opening mailboxes and joining gyms (presumably, non-attention getting meeting

    locations).

    18

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    19/26

    Figure 14 Hamburg Network Time Period 10

    In time period 10, al-Haznawi and al-Sheri enter the United States (Miami,

    FL). Members of the network open bank accounts and continue to move around

    to various safe houses.

    19

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    20/26

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    21/26

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    22/26

    Figure 17 Hamburg Network Time Period 13

    Finally, in time period 13, the network has separated into 5 distinct cells,

    each with their target and roles. Although the network was viable in time period 7

    (with the minimum personnel in the United States trained and capable of

    performing the operation) the network was not coordinated for the attack until

    time period 13.

    22

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    23/26

    Figure 18 Geospatial Time Period 13 Hamburg not shown (Google Earth)

    As you can see by examining the network visualized in ORA over the 13

    time intervals, the Hamburg Network grows and becomes more organized and

    tied together over time. By time interval 7 it has the basic requirements to be

    viable and strike the WTC towers. By time interval 13, the network has reached

    its maximum potential and becomes capable of making an attempt on all four

    targets. By examining the last time interval visualization, you can see that not all

    members of each cell are aware of or known to each other. This high degree of

    compartmentalization allows for the secure coordination of work by ensuring that

    the kill or capture of one member cannot take out the entire network nor

    compromise its plan.

    Conclusion:

    The analysis of the Hamburg Network over time provides more than

    network growth and geospatial disposition, it also highlights the key points in time

    where the network had the operational capacity to conduct the planes operation.

    Based on our given criteria, the analysis shows that the Hamburg Network had

    the capacity to attack the World Trade Center with two aircraft by time period 7.

    23

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    24/26

    If the attacks were executed during that time period (Time Period X), the

    operational cells may have used the following configuration:

    WTC North Tower: Mohammed Atta (pilot); Ziad Jarrah (alternate

    pilot/security); Satam Suqami (security); and Waleed Alsheri (security).

    WTC South Tower: Marwan Al-Shehhi (Pilot); Hani Hanjour (alternate

    pilot/security); Nawaf Alhamzi (security); and Khalid Al-Mihdar (security).

    Figure 19 Hamburg Network Time Period X

    Key to the success of the operation was the proper training of the pilots.

    Without the proper training, the hijackers would not have been able to hit theirintended targets because of the level of technical difficulty associated with

    delivering a commercial aircraft to a pinpoint location. While the addition of other

    hijackers after time period 7 increased the magnitude of the 911 attacks, it

    actually increased the chance of compromise of illumination. While it is unlikely

    24

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    25/26

    that the removal of the Atta and the other pilots would have prevented the attacks

    from ever occurring, tougher scrutany of the hijackers indicators of clandestine

    and covert behaviorsuch as multiple addresses, mail boxes, pre-paid cellular

    phones, etc.could have set the conditions to force the terrorists to abort the

    operation due to increased hostiliy of the environment.

    25

  • 8/8/2019 Analysis of the Hamburg Network Over Time(Davis-Worth)

    26/26

    BIBLIOGRAPHY

    McCormick, G. H., and G. Owen. "Security and Coordination in a ClandestineOrganization." Mathematical and Computer Modeling, no. 31 (2000): 175-192.

    National Commission on Terrorist Attacks Upon the United States. The 9/11Commission Report, http://www.gpoaccess.gov/911/index.html (accessedon November 17, 2010).

    Prosecution Exhibits from United States v. Zacarias Moussaoui, Criminal No. 01-455-A, available athttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecution.html accessed on November 11, 2010).

    Sageman, Marc. Understanding Terror Networks, Philadelphia: University ofPhiladelphia Press, 2004, 103-104.

    Valdis E. Mapping Networks of Terrorist Cells, Connections: 2001, Vol 23, 43-

    52.

    26

    http://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio%09n.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio%09n.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio%09n.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio%09n.htmlhttp://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio%09n.html