Escolar Documentos
Profissional Documentos
Cultura Documentos
é m
5
. IO
Q 2
,
Sl§§éET,NOFORJN,Xl!
% WW! _
rf!+i*" /
QATE: U3 2§ 2UB5
LA3SIFiED BY nana ans TRMKNLTECLQ
._,3 ,,
'
r356" "-3,1; M
*3 L,_s"1,a _ »f<§k. l¬¢1;1
1; ;,,
: H3
-- Eé ~HL§5¢i
~ [15 J
I/
_mm:
fax 92 b
. , t
'
.- a
6
J
°
l$o><E'r.No1=0|uv.x|!
"/11 ~'92-:_=Q§
,.-
9292 l-"_'9292 V
:
The 11
September Hijacker Cello Model
U! EXECUTIVESUMMARY
U! Key
Flndinrgrtsin
"Tire11
September hijackers successfully
eluded the
of
notice US laweni o~rcemen_t and
intelligence they
as plotted
to commandeer
and use
four airliners
as weapons,
but details
their
of
lives andactivities canbe usedto detectcells thatmay
follow the 11September hijackersmodel.
It shouldbe noted,
however, that
the1993attack
on the WorldTrade Center
and theMillennium
bombing plot --theprevious two
major international
terrorist operations
on US soil- used tactics
that aredifferent in
key respects
from thell Septémher
model, suggesting
future sleeper
that cells
will use avariety of
measures to concealtheir" activities.
* The.hijackers largely
avoided associating
with radical
Islamic groups
in theUS, likelyin an.
effort to reduce thechances ofdetection by law enforcement.
The l'1i_l?1£El¬¬7I5'GOII1IIlllIllCi!1iQrlS
' meetings,tcchniqucsi
prepaid
phone.faoc-to~face
cards,
payphoncs,
phones, the Internet,
cell and possibly
cornrneroially available
mailboxes- madedifficult
it to
trace thoiroperational rrornmunications, ~.
-5 J M ,-r>h.J»>_;__nu>
...,92_¢.L|a : »_9
1
1 I0.. " t l
9,
ss¬Q;T.r~roroRN.xo
1' 1~;-
,,._ Q1".-
. .. 92 _M .
»»92'924.: -ll '-
1,| ..92
V The ll.
S%epte~mber
Cell
Hijacker
Model bl
U! Snapshot of theHijackers
*The hijsacikers.all
were
Middle
Eastern men
between and
20 33
years of
age. Many
of them
spent time
in Afghanistan
in eitherlate 19919
or 2000,according to
a variety
of rcportingi
REQ- #36-1
S%Tl1ORCON.NOFORN,X
i 000000026
I!
-....._ -.-.. _,_ _
l MM
I
'
n t l
1
»;
92 . K
V_.; 1 .. r.__;.§-_-,_
. , ifrsE§QT.Noi=oRn.xii
,____
V MW
_,__
if , A
V.~'~:
.t -. - » -_-K
> I"5;_.~x_~_.
,. V",.,
-r The fourpilotsacquired
theirtraveldocuments»-passports
fromSaudiArabia,UnitedArab
ErriirateUAE!, andEgypt,andvisasissued
in Jeddah,
SaudiArabia;Dubai,UAE;and
Berlin,Germany- hetween oneandlivemonths beforeentering
theUS. Theotherhijackers
acquired
theird0euments-Sau<li
andUAEpassports
withvisas
issued
mostly
in Jeddah
and
Riyadh fremseveral
monthsto morethana gearbeforeentering
theUS
~ Mostof thehijackers
reported
theirprevious
passports
aslostor stolenandreceived
new
onesthatrevealed
notraveltoAfghanistan,-~ea
potentialredflag"thatmight
haveinvited
scrutinyevenpriorto ll September.
LES! Thehijackerschoices
forlivingarrangements
andcarswerenondescript
andlikelywould
not have in themselvesraisedsuspicion.
'
Thehijackers
usually
livedin smallgroups
oftwoto veandroutinely
movedbetween cheap
motels
-and
apatrtmenets.
Thepilotsmaintained
relatively
stable
residence
during
their ight
training,
obtaining
apartments
forapproximately
sixmonths.
e't
Theyowned
fouroldernon-deseript 1988
vehicles:
Nawafal-He2rni s Toyota
Corolla,
Iarrah s[990 Mitsubishi
Eclipse,Waleedal-Shehri's
1993DodgeColtandAtta s1989
Pontiac
GranPrix.Thehijackers
alsorenteda varietyof vehicles
2'7
timesfromseveral
companies,
includingEnterprise,Budget,andAlamo.
LES! Manyofthehijackers
obtained
identi cation,
cardsor driverlicenses
to riseinstead
of
their passports,
which wouldhavecalledattentionto them asforeigners. .
* Eightehijackers
obtained
driverlicenses
fromArizona,
California,
andFlorida,
l6 obtained
stateidemiiication
cardsfromFloridaandVirginia,andsevenobtained
commercially
available
ID cards. None hadsocialsecuritynumbers,
~ At leasttwohijackersrequested duplicate
Florida,
driverlicenses,
andbothAltaandal-Shehhi
requested replacementpilotlicenses,
leavingopenthepossibility thatEll-Q8'id~8
forgers
received theoriginals
or duplicates
andcantry to reproduoe theseitems».
REQ.
#35,-1 S ,NOFORN,Xi! 000000027
_...,,,,. . < .. . < . ~ .._.,M....-,.. _,.. .t .. ..
i
_.., _»._v.~.,_ Y,,. __¥ _ _d7___7_*_li____, _ ____ _ _
v~
l' '_
.tr
.
>~Q
r T552
.; '~f!_;¢
1.».
.,, 3;
I 1
}:/.";_ V___.._W~
S FORN,Xl!
~
,' - V . -.'
*92;;st_,:~.-Q, -. W _
-1?,1 _ i_.~,
. 1. ,5 A._
, 92" in
i »:T 4
_,_v. E.
U! Flight Schools
LES! The hijackers enrollmentat multiple US ight schools wasnot in itself uncommon,but
their focus on learningonly theskills that would bene t their milsslon <-such
as Attaand al
Shehhi requestingadvanced jetflight training that focusesd on approachesand turns but not on
take-offs and
landings-made them
stand-out. 0
~Between June 2000and September2001, Atta, at-Shclthi, andJarrah took ying classes,
underwent ightsimulator training,
and flewtest ights in atleast height
facilities inFlorida
and Georgia.Alta andal--Shehhi also
visited thoAirman FlightSchool inOklahoma.
' Hanjour
altltendod threc
ight schoolsin Arizonaand Califomiabetween 1996
and 1999.
Alter renaming
to theUS inDecember 2000,
took jet simulator
he in
lessons Arizona and
planes
rented from atleast veother facilitiesin Arizona,New Jersey,
and Maryland.
'other
Two hijackers
brie y tookiintroiductory flying
lessons in
San Diego
in springof 2000,
neither
but sought further ight training.
REQ
~#364 l SP%ET,NOFGRTN_Xll! 990999923
t
..0 Y 1
9
-,'
i V st; _T,NOFORN,Xl! l
.. =_5- -v_-'3
.y4-pt ,
~ s~ M
~=~* ~ W r
~
_',92j_":.-1,
K ~'i>"_':_';
- r ;v_'_____..
,pH* .
_._
. -. no
U! Banking in the US ~
LES! Thehijackersnanced
theiroperation
withmoney
electronically
translerredi
fromoverseas
aswell aswith cashand travelercheckstheycarried--anddeclared whentheyenteredthe US.
They openedUS bank accounts andused;themlegally,but theyfavoredan llnusualpracticeof
sihari»ng accounts
betweenunrelatedmembers.Noneofthe hijackersworkedto supplement this
funding.
- Thehijackers, 24
o enin pairs,used bankaccounts,
frombranchbanksbelonging
to Sun
Trust,HudsonUnited, FirstUnion, BankofArnericsa,
and Dime Savings.
5
- As theOperation
drewnear,thehijackers
closedthemajorityof theirbankaccounts
andwired
Union
mostof the remainingrnoncyoverseasthroughWcstcm stationsat busterminalsand
grocery stores.
LES!Thehijackers
favored
communications
techniques
designed
tomake
operational
discussions
dif cult to trace.
- Theyapparently
reserved
theirmostsensitive
planning
discussionos
forface-t0~face
meetings,
2001; Germanyin January,
whichlikelywereheldthreetimesin Spainin July,andLasVegas
in mid-August.
~ At leastninehijackers
usedpostofficemailboxessuch
from places
asMail BoxesEtcand
Mail Depot,possiblyto receiveregularmail and to help establishresidcnoel.
U! Businesses
TheyFrequented
LES! Besides
rentalcar businesses
andcommercially
availablepostof ceboxes,thehijackers
also frequentedseveral other businesses.
- TheyusedKinkosforphotocopying
unknown
niatcrials
andforcomputer
rentals,
~ Marwan
al-Shchhi
alsovisited
several
barsduring
hisstayintheUSandalong
withHamza
al~Gamdi a
Iwiccin July2001purchasedlargeamountof pornograp1hy-~$2s50,
andS183
worth frcun a Video Outlet store in Floricla.
3119-#354 <sr¬t} E'r,NOFoRN.xn 999090029
¬
L.
.
. .
'
E
' $#~§T.NOFORN,!
L l!
.: V - 1
W ~__l__1 - :7?
.,. 492_-'
:. ;.;<"~_4,
,. _: _--
b2
b5
ma
13;
U! Rituals
REQ
.#3¬~"-
1 Vs 'NQFORN'X~}! Q QQ
00
QQ30
T . o-
1.
Q Q
~ 2
1 1!
SECRET,NOFORN,X
5 *- ": "*r92." _~
; >,
e 92 =-'-" Wrr e W" " " ~ 1"
T.'
1;.. -,,
'1
"'
-Q-l-.
._-92
V.'. -'.
. ,-,
=, X
V - Some
of theconspirators
frombothplotsarrived
in theUSat leastsixmonths
priortothe
attacks-~in
somecases,morethana year-~andmembers
focused
theirtimeandenergyin
preparing
fortheattacks. ~
* Somemembers
ofeachplotused
shared
bankaccounts.
'
Yousefandco-conspirato-r
Mohammad
Ajaj traveledtogether
from?aldstan
andusedfalse
namesand documents
to enterto the US, while all 19 hijackersusedtheirtruenames,legitimate
passports,
andsecureti
visasto enterthecountry.
~ Yousefusedat leastfourpassports
andthreedifferentnamesto enter,operate,
andexitthe
US, whilethehijackersacquired
legitimate
formsof identi cations,
suchasdriv_erlicenses
s
and state identi cation cards in their true name.
1993
'
The conspirators their
frequentlymadeoverseasphonecallsfrom while
residences,
thehijackers
reliedonprepaidcellphones,
callingcards,andInternetcafesto communicate
abroad.Youscfhadeapersonal
computer,butthehijackers
arenotknowntohaveownedlaptop
or desktop
computers oranyelectronic
datastoragemedia.
#36
R29 c$E§[Qor,~01=om~1.ext_1
909099031
¢uv-r
v1
~O V I9292
O
l 1
-.'92!>|;92, l ' .~
. Z 195"
:-. SW KT,NOPORN.Xl!
J;",¢-v";92 .':_'I §:_.* WK 1.. _ _
.. '~>-___ _ .t
= N __
;.~i"t-._,W._ .51:,
',_
t |.~. xTx»
»~ _ -= _,.~:._,__92.*
LE8! There
are few similarities
between the
Millennium bomber
Ahmed Ressakn
and hisplot to
attack LoxAngeles airportand the 11
September .hija*ckers.
-92 Rcssam
applied for
and was
granted political
asylum inCanada in
1994, inviting
increased
scrutiny by
Canadian immigration
authorities. The
llSeptemberplotters sought
no special
immigration status.
~In contrast to
the 11September hijackcrs,
neither Rcssam
nor hisassociate, Abdcimajaid
Dahoumanc, conductedsurveillance or rout: rchcarsals to the US, Oih r fha with amap-
' the
Like.
llSeptemberhijackers, Ressampracticed operationalt
security in
communicating
with hisassociates, although
not aswell. Ressam used multiple
pro-paid calling
cards and
scvcral differentpay phones,
but useda cellularphone toleave messages
at thelocal mosque
for associates to meet him thcrc.
¢. .>_~a&: it .
~13» iT
, at
-v,-
.0
~:v.o~., » 0
r .
I s@:3E m01=0aN.1<1!
<-;
I
'..-".2
; ».._
~. ,_
W
. ,_ _ ._ {'4
1'
~13 » 92-¢
2; Z .,».92* v_» .,
U! Annex
C: List of Hijackers andPlanes
American AirlinesFlight I1
Departed Boston ~Corashedinto thenorth
tower of theWorld TradeCenter
76 passengorsgand
ll crew
Mahamcd Atia
Satam al-Suqarni
Waled air-Shehzi
Wa il a'I~$hehri
Abdulaziz al-Omari
Marwan at-Shehhi
Faye: Bardhammad
Ahmed al~Ghamd.i
Hamza all-Gamdi
Mohand al-Sh hri
Hani Hanjour
Khalid al-Mihdhar
Majed Moqed
a1-Hazmi
Nawaf
Salon: a1~Hazmi
Ziad Iarrah
Saecd al~Ghamdi
Ahmed aJ~Haznawi
Ahmed ali-Nami