Professional Documents
Culture Documents
POSTGRADUATE
SCHOOL
MONTEREY, CALIFORNIA
DA 4610
Final Project
By
1
OVERVIEW
With the arrival of the first three members of the Hamburg Network in
Afghanistan, Usama bin Ladin was about to find the perfect group to lead the
attack: the members of the Hamburg Network spoke fluent English, were
educated and knowledgeable of the western lifestyle, and were radical Islamists.
In November of 1999, Mohamed Atta and his Hamburg Network were selected
for the 9/11 operation.7
5 National Commission on Terrorist Attacks Upon the United States, “Al-Qa’ida Aims At
The American Homeland”, http://www.9-11commission.gov/report/911Report_Ch5.htm (accessed
on August 30, 2010).
6 Khalid Sheikh Mohammed did not join Usama bin Ladin and Al-Qa’ida when originally
invited in 1996 because he wanted to remain independent. This allowed him to remain free to
work with other organizations, such as the mujahideen led by Sayyaf, Sheikh Mohammed’s
mentor, who was loyal to Massoud, the leader of the Northern Alliance. Since bin Ladin was
forging ties with the Taliban, the opposition of the Northern Alliance, allying with Al-Qa’ida would
have proven troublesome for Sheikh Mohammed. See National Commission on Terrorist Attacks
Upon the United States, “Al-Qa’ida Aims At The American Homeland”, http://www.9-
11commission.gov/report/911Report_Ch5.htm (accessed on August 30, 2010).
7 Sageman, Understanding Terror Networks, 106-107.
3
Figure 1 Photos of 911 Hijackers8
From the above data, we narrowed our focus down to the primary agent in
the 9/11 attacks consisting of 24 actors configured into five cells. Four of the
cells were comprised of the 19 hijackers and the remaining fifth cell was the
9 Primary sources used to generate data was: National Commission on Terrorist Attacks
Upon the United States, “Al-Qa’ida Aims At The American Homeland, ” Vladis E. Krebs,
“Mapping Networks of Terrorist Cells,” Connections: 2001, Vol 23, 43-52, and Prosecution
Exhibits from United States v. Zacarias Moussaoui, Criminal No. 01-455-A, available at
http://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/prosecution.html.
5
active support component located in Hamburg.
Color Target/Flight
Pink WTC North Tower (AA Flight 11)
Blue WTC South Tower (UA Flight 175)
Green Pentagon (AA Flight 77)
6
Teal Capitol (UA Flight 93)
Red Hamburg Cell (Hamburg, Germany)
Yellow Target Name
Table 1. Color Legend
The following table illustrates the agent, the target he was associated with,
and his primary task:
7
Table 2. Agent, Target, and Primary Task
Relationships
Finally, the two relationships were examined by utilizing ORA to first draw
the network and then analyze it based on established time periods from 3 Sep 91
to 11 Sep 01. We have also provided screenshots from geospatial analysis
performed with the same dataset.
8
We utilized ORA to analyze the Hamburg Network over time. For this
study, we used 13 distinct time intervals based on arrival of agents into the
United States.
9
Figure 5 Hamburg Network at Time Period 1
10
In time period 1, Hani Hanjour arrives in New York from Saudi Arabia. He
proceeded to Tucson where he took English language classes at the University
of Arizona and set up a safe house in Tucson. He visits Darul Masjid who is
living in Hollywood FL. By April 15, 1999 Hanjour has his Commercial Pilot
Certificate (obtained from Arizona Aviation). Also in the Spring of 1999, the
“Hamburg Cell” forms at the Dar el Ansar Safe House (Marienstrasse 54) in
Hamburg, Germany. This is shown above with the two distinct groups: (1) Hani
Hanjour and his ties to the schools and safe houses he establishes in Arizona as
well as the locations of his English language and flight training in Arizona and
California; (2) the Hamburg Cell in Hamburg, Germany. At this point in time, the
two “cells” are completely separate and unknown to each other.
In time period 2, Hanjour leaves the United States from JFK airport to
Amman, Jordan. He is believed to be in Saudi Arabia. Al-Midhar and Al-Hamzi
11
arrive in the United States and set up residence in San Diego, CA. They each
take flight lessons at the Sorbi Flying Club but do not obtain licenses. The
“Hamburg Cell” is still being educated and radicalized in Hamburg, Germany.
12
Figure 8 Hamburg Network Time Period 4
13
Figure 9 Hamburg Network Time Period 5
14
Figure 10 Hamburg Network Time Period 6
Time period 6 brings Hanjour back to the United States. Atta and Al-
Shehhi obtain their Commercial Pilot rating and begin simulator training in Opa-
Locka, FL. Meanwhile, Ziad Jarrah completes 737 simulator training in Miami,
FL. With Hanjour and Jarrah simulator trained pilots and Atta, al-Shehhi, al-
Mihdar, al-Hamzi also residing in the United States, the network is nearly viable.
All the the members currently in the United States continue to change addresses,
obtain flight training (to include flying the “Hudson Tour” in New York), and make
phone calls (presumably to coordinate), and obtain documents such as drivers
licenses. At this point, they could conduct the planes operation, but the lack of
security personnel is noted.
15
Figure 11 Hamburg Network Time Period 7
16
Figure 12 Hamburg Network Time Period 8
17
Figure 13 Hamburg Network Time Period 9
With time period 9 and the arrival of al-Nami, al-Shehri, and al-Ghamdi in
Miami, the network now appears to be coming together for the planes operation.
Hanjour flies the “Hudson Tour” and the others continue their tradecraft by
opening mailboxes and joining gyms (presumably, non-attention getting meeting
locations).
18
Figure 14 Hamburg Network Time Period 10
In time period 10, al-Haznawi and al-Sheri enter the United States (Miami,
FL). Members of the network open bank accounts and continue to move around
to various safe houses.
19
Figure 15 Hamburg Network Time Period 11
Time period 11 starts the network move to the area to begin the planes
operation. These moves are not direct (used safe houses around United States).
20
Figure 16 Hamburg Network Time Period 12
In time period 12, the individual cells within the Hamburg Network
continue to move. Atta even heads to Las Vegas and stets the conditions for a
clandestine meeting with Hanjour and Nawaf. The visualization above shows the
distinct networks (the four based on target) have not yet solidified. Only
Hamburg, the active support cell, remains central.
21
Figure 17 Hamburg Network Time Period 13
Finally, in time period 13, the network has separated into 5 distinct cells,
each with their target and roles. Although the network was viable in time period 7
(with the minimum personnel in the United States trained and capable of
performing the operation) the network was not coordinated for the attack until
time period 13.
22
Figure 18 Geospatial Time Period 13 – Hamburg not shown (Google Earth)
As you can see by examining the network visualized in ORA over the 13
time intervals, the Hamburg Network grows and becomes more organized and
tied together over time. By time interval 7 it has the basic requirements to be
viable and strike the WTC towers. By time interval 13, the network has reached
its maximum potential and becomes capable of making an attempt on all four
targets. By examining the last time interval visualization, you can see that not all
members of each cell are aware of or known to each other. This high degree of
compartmentalization allows for the secure coordination of work by ensuring that
the kill or capture of one member cannot take out the entire network nor
compromise its plan.
Conclusion:
The analysis of the Hamburg Network over time provides more than
network growth and geospatial disposition, it also highlights the key points in time
where the network had the operational capacity to conduct the planes operation.
Based on our given criteria, the analysis shows that the Hamburg Network had
the capacity to attack the World Trade Center with two aircraft by time period 7.
23
If the attacks were executed during that time period (Time Period X), the
operational cells may have used the following configuration:
Key to the success of the operation was the proper training of the pilots.
Without the proper training, the hijackers would not have been able to hit their
intended targets because of the level of technical difficulty associated with
delivering a commercial aircraft to a pinpoint location. While the addition of other
hijackers after time period 7 increased the magnitude of the 911 attacks, it
actually increased the chance of compromise of illumination. While it is unlikely
24
that the removal of the Atta and the other pilots would have prevented the attacks
from ever occurring, tougher scrutany of the hijackers’ indicators of clandestine
and covert behavior—such as multiple addresses, mail boxes, pre-paid cellular
phones, etc.—could have set the conditions to force the terrorists to abort the
operation due to increased hostiliy of the environment.
25
BIBLIOGRAPHY
McCormick, G. H., and G. Owen. "Security and Coordination in a Clandestine
Organization." Mathematical and Computer Modeling, no. 31 (2000): 175-
192.
National Commission on Terrorist Attacks Upon the United States. The 9/11
Commission Report, http://www.gpoaccess.gov/911/index.html (accessed
on November 17, 2010).
Prosecution Exhibits from United States v. Zacarias Moussaoui, Criminal No. 01-
455-A, available at
http://www.vaed.uscourts.gov/notablecases/moussaoui/exhibits/procecutio
n.html accessed on November 11, 2010).
Sageman, Marc. Understanding Terror Networks, Philadelphia: University of
Philadelphia Press, 2004, 103-104.
Valdis E. “Mapping Networks of Terrorist Cells,” Connections: 2001, Vol 23, 43-
52.
26