U.S. intelligence first learned about al-Hada and his telephone number from one of the captured al Qaeda planners of the August 1998 East Africa bombings, a Saudi national named Mohamed Rashed Daoud al-’Owhali, who was arrested by Kenyan authorities on August 12, 1998, five days after the bombing of the U.S. embassy in Nairobi. Interrogated by a team of FBI agents, al-’Owhali gave up the key relay number (011-967-1-200-578)—the telephone number of Ahmed al-Hada.
NSA immediately began intercepting al-Hada’s telephone calls. This fortuitous break could not have come at a better time for the U.S. intelligence community, since NSA had just lost its access to bin Laden’s satellite phone traffic. For the next three years, the telephone calls coming in and out of the al-Hada house in Sana’a were the intelligence community’s principal window into what bin Laden and al Qaeda were up to. The importance of the intercepted al-Hada telephone calls remains today a highly classified secret within the intelligence community, which continues to insist that al-Hada be referred to only as a “suspected terrorist facility in the Middle East” in declassified reports regarding the 9/11 intelligence disaster.
In January 1999, NSA intercepted a series of phone calls to the al-Hada house. (The agency later identified Pakistan as their point of origin.) NSA analysts found only one item of intelligence interest in the transcripts of these calls— references to a number of individuals believed to be al Qaeda operatives, one of whom was a man named Nawaf al-Hazmi. NSA did not issue any intelligence reports concerning the contents of these intercepts because al-Hazmi and the other individuals mentioned in the intercept were not known to NSA’s analysts at the time. Almost three years later, al-Hazmi was one of the 9/11 hijackers who helped crash the Boeing airliner into the Pentagon. That al-Hazmi succeeded in getting into the United States using his real name after being prominently mentioned in an intercepted telephone call with a known al Qaeda operative is but one of several huge mistakes made by the U.S. intelligence community that investigators learned about only after 9/11.
The 1980s saw NSA grow from more than fifty thousand military and civilian personnel to seventy-five thousand in 1989, twenty-five thousand of whom worked at NSA headquarters at Fort Meade. In terms of manpower alone, the agency was the largest component of the U.S. intelligence community by far, with a headquarters staff larger than the entire CIA.
As the agency’s size grew at a staggering pace, so did the importance of its intelligence reporting. The amount of reporting produced by NSA during the 1980s was astronomical. According to former senior American intelligence officials, on some days during the 1980s SIGINT accounted for over 70 percent of the material contained in the CIA’s daily intelligence report to President Reagan. Former CIA director (now Secretary of Defense) Robert Gates stated, “The truth is, until the late 1980s, U.S. signals intelligence was way out in front of the rest of the world.”
But NSA’s SIGINT efforts continued to produce less information because of a dramatic increase in worldwide telecommunications traffic volumes, which NSA had great difficulty coping with. It also had to deal with the growing availability and complexity of new telecommunications technologies, such as cheaper and more sophisticated encryption systems. By the late 1980s, the number of intercepted messages flowing into NSA headquarters at Fort Meade had increased to the point that the agency’s staff and computers were only able to process about 20 percent of the incoming materials.68These developments were to come close to making NSA deaf, dumb, and blind in the decade that followed.
And:
The invasion of Kuwait on August 2, 1990, by Iraq’s Saddam Hussein caught the U.S. intelligence community by surprise once again. In a familiar but worrisome pattern, intelligence indicating the possibility of the invasion was not properly analyzed or was discounted by senior Bush administration officials, including then–secretary of defense Dick Cheney, who did not think that Hussein would be foolish enough to do it. General Lee Butler, the commander of the Strategic Air Command, was later quoted as saying, “We had the warning from the intelligence community— we refused to acknowledge it.”
It took five months for the United States to move resources by land and sea to implement Desert Storm’s ground attack by three hundred thousand coalition troops.
And:
The worst threat to NSA’s fragile code-breaking capabilities came not from abroad but from a tiny computer software company in northern California called RSA Data Security, headed by Jim Bidzos. NSA was aware by the late 1980s that new encryption technologies being developed by private companies meant, according to a declassified internal NSA publication, that NSA’s code breakers were falling behind: “The underlying rate of cryptologic development throughout the world is faster than ever before and getting faster. Cryptologic literature in the public domain concerning advanced analytic techniques is proliferating. Inexpensive high-grade cryptographic equipment is readily accessible on the open market.” The agency was still able to break the cipher systems used by a small number of key countries around the world, such as Libya and Iran, but this could change quickly as target nations began using commercially available and rapidly evolving encryption software packages. It would have a catastrophic impact on the agency’s code-breaking efforts.
And:
But what was really killing NSA was the size of the agency’s payroll. Although the number of NSA personnel plummeted during McConnell’s tenure, the cost of paying those who remained skyrocketed as the agency had to reach deep into its pockets to try to keep its best and brightest from jumping ship and joining the dot-com boom. NSA stripped ever-increasing amounts of money from infrastructure improvement programs and its research and development efforts so that it could meet its payroll. It was left with little money to develop and build the new equipment desperately needed to access international communications traffic being carried by new and increasingly important telecommunications technologies, such as the Internet, cellular telephones, and fiber-optic cables. It was a decision that would, according to a former senior NSA official, “come back and bite us in the ass.”
A former marine SIGINT operator stationed in Lebanon recalled, “We were trained and equipped to intercept conventional Soviet military radio communications, not the walkie-talkies used by the Shi’ites and Druze in the foothills overlooking our base… Initially we couldn’t hear shit.” The Shi’ite and Druze militiamen who were their principal targets did not use fixed radio frequencies or regular call signs, or follow standardized radio procedures, which made monitoring their communications extremely difficult. The differing Arabic dialects spoken by the militiamen were also extremely hard for the school-trained marine intercept operators to understand, as was the West Beirut street slang the militiamen used. Taken together, this meant that the marine radio intercept operators and analysts had to improvise (oftentimes under fire) to do their job. A former marine SIGINT detachment commander recalled, “It was a hell of a way to learn your job, but that’s what Marines are good at. Adapt and improvise. I just wish we didn’t have to. So many lives were lost because we weren’t prepared for the enemy that we faced.”
And:
In July 1979, Pelton was forced to resign from NSA after filing for bankruptcy three months earlier. Desperate for money, on January 15, 1980, Pelton got in touch with the Russian embassy in Washington, and in the months that followed, he sold them, for a paltry thirty-five thousand dollars, a number of Top Secret Codeword documents and anything else he could remember. For the Soviets this was pure gold, and a bargain at that.
The damage that Pelton did was massive. He compromised the joint NSA– U.S. Navy undersea-cable tapping operation in the Sea of Okhotsk called Ivy Bells, which was producing vast amounts of enormously valuable, unencrypted, and incredibly detailed intelligence about the Soviet Pacific Fleet, information that might give the United States a clear, immediate warning of a Soviet attack. In 1981, a Soviet navy salvage ship lifted the Ivy Bells pod off the seafloor and took it to Moscow to be studied by Soviet electronics experts. It now resides in a forlorn corner of the museum of the Russian security service in the Lubyanka, in downtown Moscow.
Even worse, Pelton betrayed virtually every sensitive SIGINT operation that NSA and Britain’s GCHQ were then conducting against the Soviet Union, including the seven most highly classified compartmented intelligence operations that A Group was then engaged in. The programs were so sensitive that Charles Lord, the NSA deputy director of operations at the time, called them the “Holiest of Holies.” He told the Russians about the ability of NSA’s Vortex SIGINT satellites to intercept sensitive communications deep inside the USSR that were being carried by microwave radio-relay systems. Pelton also revealed the full extent of the intelligence being collected by the joint NSA-CIA Broadside listening post in the U.S. embassy in Moscow. Within months of Pelton being debriefed in Vienna, the Soviets intensified their jamming of the frequencies being monitored by the Moscow embassy listening post, and the intelligence “take” coming out of Broadside fell to practically nothing. Pelton also told the Russians about virtually every Russian cipher machine that NSA’s cryptanalysts in A Group had managed to crack in the late 1970s. NSA analysts had wondered why at the height of the Polish crisis in 1981 they had inexplicably lost their ability to exploit key Soviet and Polish communications systems, which had suddenly gone silent without warning. Pelton also told the Russians about a joint CIA-NSA operation wherein CIA operatives placed fake tree stumps containing sophisticated electronic eavesdropping devices near Soviet military installations around Moscow. The data intercepted by these devices was either relayed electronically to the U.S. embassy or sent via burst transmission to the United States via communication satellites.
In December 1985, Pelton was arrested and charged in federal court in Baltimore, with six counts of passing classified information to the Soviet Union. After a brief trial, in June 1986 Pelton was found guilty and sentenced to three concurrent life terms in prison.
A 1976 study of U.S. intelligence reporting on the Soviet Union, however, found that virtually all of the material contained in the CIA’s National Intelligence Estimates about Soviet strategic and conventional military forces came from SIGINT and satellite imagery. A similar study found that less than 5 percent of the finished intelligence being generated by the U.S. intelligence community came from HUMINT. Moreover, rapid changes in intelligence-gathering and information-processing technology proved to be a godsend for NSA. In 1976, NSA retired its huge IBM Harvest computer system, which had been the mainstay of the agency’s cryptanalysts since February 1962. It was replaced by the first of computer genius Seymour Cray’s new Cray-1 supercomputers. Standing six feet six inches high, the Cray supercomputer was a remarkable piece of machinery, capable of performing 150–200 million calculations a second, giving it ten times the computing power of any other computer in the world. More important, the Cray allowed the agency’s crypt-analysts for the first time to tackle the previously invulnerable Soviet high-level cipher systems.
Shortly after Bobby Inman became the director of NSA in 1977, cryptanalysts working for the agency’s Soviet code-breaking unit, A Group, headed by Ann Caracristi, succeeded in solving a number of Soviet cipher systems that gave NSA access to high-level Soviet communications. Credit for this accomplishment goes to a small and ultra-secretive unit called the Rainfall Program Management Division, headed from 1974 to 1978 by a native New Yorker named Lawrence Castro. Holding bachelor’s and master’s degrees in electrical engineering from the Massachusetts Institute of Technology, Castro got into the SIGINT business in 1965 when he joined ASA as a young second lieu-tenant. In 1967, he converted to civilian status and joined NSA as an engineer in the agency’s Research and Engineering Organization, where he worked on techniques for solving high-level Russian cipher systems.
By 1976, thanks in part to some mistakes made by Russian cipher operators, NSA cryptanalysts were able to reconstruct some of the inner workings of the Soviet military’s cipher systems. In 1977, NSA suddenly was able to read at least some of the communications traffic passing between Moscow and the Russian embassy in Washington, including one message from Russian ambassador Anatoly Dobrynin to the Soviet Foreign Ministry repeating the advice given him by Henry Kissinger on how to deal with the new Carter administration in the still-ongoing SALT II negotiations.
And:
Since there have been so few success stories in American intelligence history, when one comes along, it is worthwhile to examine it to see what went right. NSA’s performance in the months prior to the Soviet invasion of Afghanistan in December 1979 was one of these rare cases. Not only did all of the new high-tech intelligence-collection sensors that NSA had purchased in the 1970s work as intended, but the raw data that they collected was processed in a timely fashion, which enabled Bobby Ray Inman to boast that his agency had accurately predicted that the Soviets would invade Afghanistan.
As opposition to the Soviet-supported Afghan regime in Kabul headed by President Nur Mohammed Taraki mounted in late 1978 and early 1979, the Soviets continued to increase their military presence in the country, until it had grown to five Russian generals and about a thousand military advisers.91A rebellion in the northeastern Afghan city of Herat in mid-March 1979 in which one hundred Russian military and civilian personnel were killed was put down by Afghan troops from Kandahar, but not before an estimated three thousand to five thousand Afghans had died in the fighting.
At this point, satellite imagery and SIGINT detected unusual activity by the two Soviet combat divisions stationed along the border with Afghanistan.
The CIA initially regarded these units as engaged in military exercises, but these “exercises” fit right into a scenario for a Soviet invasion. On March 26– 27, SIGINT detected a steady stream of Russian reinforcements and heavy equipment being flown to Bagram airfield, north of Kabul, and by June, the intelligence community estimated that the airlift had brought in a total of twenty-five hundred personnel, which included fifteen hundred airborne troops and additional “advisers” as well as the crews of a squadron of eight AN-12 military transport aircraft now based in-country. SIGINT revealed that the Russians were also secretly setting up a command-and-control communications network inside Afghanistan; it would be used to direct the Soviet intervention in December 1979.
In the last week of August and the first weeks of September, satellite imagery and SIGINT revealed preparations for Soviet operations obviously aimed at Afghanistan, including forward deployment of Soviet IL-76 and AN-12 military transport aircraft that were normally based in the European portion of the USSR.
So clear were all these indications that CIA director Turner sent a Top Secret Umbra memo to the NSC on September 14 warning, “The Soviet leaders may be on the threshold of a decision to commit their own forces to prevent the collapse of the Taraki regime and protect their sizeable stake in Afghanistan. Small Soviet combat units may have already arrived in the country.”
On September 16, President Taraki was deposed in a coup d’état, and his pro-Moscow deputy, Hafizullah Amin, took his place as the leader of Afghanistan.
Over the next two weeks, American reconnaissance satellites and SIGINT picked up increased signs of Soviet mobilization, including three divisions on the border and the movement of many Soviet military transport aircraft from their home bases to air bases near the barracks of two elite airborne divisions, strongly suggesting an invasion was imminent.
On September 28, the CIA concluded that “in the event of a breakdown of control in Kabul, the Soviets would be likely to deploy one or more Soviet airborne divisions to the Kabul vicinity to protect Soviet citizens as well as to ensure the continuance of some pro-Soviet regime in the capital.” Then, in October, SIGINT detected the call-up of thousands of Soviet reservists in the Central Asian republics.
Throughout November and December, NSA monitored and the CIA reported on virtually every move made by Soviet forces. The CIA advised the White House on December 19 that the Russians had perhaps as many as three airborne battalions at Bagram, and NSA predicted on December 22, three full days before the first Soviet troops crossed the Soviet-Afghan border, that the Russians would invade Afghanistan within the next seventy-two hours.
NSA’s prediction was right on the money. The Russians had an ominous Christmas present for Afghanistan, and NSA unwrapped it. Late on Christmas Eve, Russian linguists at the U.S. Air Force listening posts at Royal Air Force Chicksands, north of London, and San Vito dei Normanni Air Station, in southern Italy, detected the takeoff from air bases in the western USSR of the first of 317 Soviet military transport flights carrying elements of two Russian airborne divisions and heading for Afghanistan; on Christmas morning, the CIA issued a final intelligence report saying that the Soviets had prepared for a massive intervention and might “have started to move into that country in force today.” SIGINT indicated that a large force of Soviet paratroopers was headed for Afghanistan—and then, at six p.m. Kabul time, it ascertained that the first of the Soviet IL-76 and AN-22 military transport aircraft had touched down at Bagram Air Base and the Kabul airport carrying the first elements of the 103rd Guards Airborne Division and an in dependent parachute regiment. Three days later, the first of twenty-five thousand troops of Lieutenant General Yuri Vladimirovich Tukharinov’s Fortieth Army began crossing the Soviet-Afghan border.
The studies done after the Afghan invasion all characterized the performance of the U.S. intelligence community as an “intelligence success story.”101NSA’s newfound access to high-level Soviet communications enabled the agency to accurately monitor and report quickly on virtually every key facet of the Soviet military’s activities. As we shall see in the next chapter, Afghanistan may have been the “high water mark” for NSA.
the Anglo-American code breakers discovered that they now faced two new and seemingly insurmountable obstacles that threatened to keep them deaf, dumb, and blind for years. First, there was far less high-level Soviet government and military radio traffic than prior to Black Friday because the Russians had switched much of their military communication to telegraph lines or buried cables, which was a simple and effective way of keeping this traffic away from the American and British radio intercept operators. Moreover, the high-level Russian radio traffic that could still be intercepted was proving to be nearly impossible to crack because of the new cipher machines and unbreakable cipher systems that were introduced on all key radio circuits. The Russians also implemented tough communications security practices and procedures and draconian rules and regulations governing the encryption of radio communications traffic, and radio security discipline was suddenly rigorously and ruthlessly enforced. Facing potential death sentences for failing to comply with the new regulations, Russian radio operators suddenly began making fewer mistakes in the encoding and decoding of messages, and operator chatter disappeared almost completely from the airwaves. It was also at about this time that the Russian military and key Soviet government ministries began encrypting their telephone calls using a newly developed voice-scrambling device called Vhe Che (“High Frequency”), which further degraded the ability of the Anglo-American SIGINT personnel to access even low-level Soviet communications. It would eventually be discovered that the Russians had made their massive shift because William Weisband, a forty-year-old Russian linguist with ASA, had told the KGB everything that he knew about ASA’s Russian code-breaking efforts at Arlington Hall. (For reasons of security, Weisband was not put on trial for espionage.)
Decades later, at a Central Intelligence Agency conference on Venona, Meredith Gardner, an intensely private and taciturn man, did not vent his feelings about Weisband, even though he had done grave damage to Gardner’s work on Venona. But Gardner’s boss, Frank Rowlett, was not so shy in an interview before his death, calling Weisband “the traitor that got away.”
Unfortunately, internecine warfare within the upper echelons of the U.S. intelligence community at the time got in the way of putting stronger security safeguards into effect— despite the damage that a middle-level employee like Weisband had done to America’s SIGINT effort. Four years later, a 1952 review found that “very little had been done” to implement the 1948 recommendations for strengthening security practices within the U.S. cryptologic community.
And:
The 1964 Gulf of Tonkin Crisis is an important episode in the history of both NSA and the entire U.S. intelligence community because it demonstrated all too clearly two critical points that were to rear their ugly head again forty years later in the 2003 Iraqi weapons of mass destruction scandal. The first was that under intense political pressure, intelligence collectors and analysts will more often than not choose as a matter of political expediency not to send information to the White House that they know will piss off the president of the United States. The second was that intelligence information, if put in the wrong hands, can all too easily be misused or misinterpreted if a system of analytic checks and balances are not in place and rigidly enforced.
And:
In Saigon, Ambassador Graham Martin refused to believe the SIGINT reporting that detailed the massive North Vietnamese military buildup taking place all around the city. He steadfastly disregarded the portents, even after the South Vietnamese president, Nguyen Van Thieu, and most of his ministers resigned and fled the country. An NSA history notes that Martin “believed that the SIGINT was NVA deception” and repeatedly refused to allow NSA’s station chief, Tom Glenn, to evacuate his forty-three-man staff and their twenty-two dependents from Saigon. Glenn also wanted to evacuate as many of the South Vietnamese SIGINT staff as possible, as they had worked side by side with NSA for so many years, but this request was also refused. NSA director Lieutenant General Lew Allen Jr., who had taken over the position in August 1973, pleaded with CIA director William Colby for permission to evacuate the NSA station from Saigon, but even this plea was to no avail because Martin did not want to show any sign that the U.S. government thought Saigon would fall. So Glenn disobeyed Martin’s direct order and surreptitiously put most of his staff and all of their dependents onto jammed commercial airlines leaving Saigon. There was nothing he could do for the hundreds of South Vietnamese officers and staff members who remained at their posts in Saigon listening to the North Vietnamese close in on the capital.
By April 24, 1975, even the CIA admitted the end was near. Colby delivered the bad news to President Gerald Ford, telling him that “the fate of the Republic of Vietnam is sealed, and Saigon faces imminent military collapse.”
Even when enemy troops and tanks overran the major South Vietnamese military base at Bien Hoa, outside Saigon, on April 26, Martin still refused to accept that Saigon was doomed. On April 28, Glenn met with the ambassador carry ing a message from Allen ordering Glenn to pack up his equipment and evacuate his remaining staff immediately. Martin refused to allow this. The following morning, the military airfield at Tan Son Nhut fell, cutting off the last air link to the outside.
A massive evacuation operation to remove the last Americans and their South Vietnamese allies from Saigon began on April 29. Navy helicop ters from the aircraft carrier USS Hancock, cruising offshore, began shuttling back and forth, carrying seven thousand Americans and South Vietnamese to safety. U.S. Air Force U-2 and RC-135 reconnaissance aircraft were orbiting off the coast monitoring North Vietnamese radio traffic to detect any threat to the evacuation. In the confusion, Glenn discovered that no one had made any arrangements to evacuate his remaining staff, so the U.S. military attaché arranged for cars to pick up Glenn and his people at their compound outside Saigon and transport them to the embassy. That night, Glenn and his colleagues boarded a U.S. Navy helicopter for the short ride to one of the navy ships off the coast.
But the thousands of South Vietnamese SIGINT officers and intercept operators, including their chief, General Pham Van Nhon, never got out. The North Vietnamese captured the entire twenty-seven-hundred-man organization intact as well as all their equipment. An NSA history notes, “Many of the South Vietnamese SIGINTers undoubtedly perished; others wound up in reeducation camps. In later years a few began trickling into the United States under the orderly departure program. Their story is yet untold.” By any measure, it was an inglorious end to NSA’s fifteen-year involvement in the Vietnam War, one that still haunts agency veterans to this day.
Unfortunately, despite the best efforts of the SIGINT collectors, the vast majority of the foreign fighters managed to successfully evade the U.S. Army units deployed along the border. An army battalion commander stationed on the border in 2003 recalled that they “weren’t sneaking across; they were just driving across, because in Arab countries it’s easy to get false passports and stuff.” Once inside Iraq, most of them made their way to Ramadi, in rebellious al-Anbar Province, which became the key way station for foreign fighters on their way into the heart of Iraq. In Ramadi, they were trained, equipped, given false identification papers, and sent on their first missions. The few foreign fighters who were captured were dedicated— but not very bright. One day during the summer of 2003, Lieutenant Colonel Henry Arnold, a battalion commander stationed on the Syrian border, was shown the passport of a person seeking to enter Iraq. “I think he was from the Sudan or something like that— and under ‘Reason for Traveling,’ it said, ‘Jihad.’ That’s how dumb these guys were.”
And:
Hayden and his senior managers had hoped that they could keep the massive reengineering of NSA out of the public realm. But these hopes were dashed when, on December 6, reporter Seymour Hersh published an article in the New Yorker magazine that blew the lid off NSA’s secret, revealing that America’s largest intelligence agency was having trouble performing its mission. Hersh’s article set off a furious debate within NSA about the difficulties the agency was facing. The considered judgment of many NSA insiders was in many respects harsher and more critical than anything Hersh had written. Diane Mezzanotte, then a staff officer in NSA’s Office of Corporate Relations, wrote, “NSA is facing a serious survival problem, brought about by the widespread use of emerging communications technologies and public encryption keys, draconian budget cuts, and an increasingly negative public perception of NSA and its SIGINT operations.”
Less than sixty days later, another disaster hit the agency. During the week of January 23, 2000, the main SIGINT processing computer at NSA collapsed and for four days could not be restarted because of a critical software anomaly. The result was an intelligence blackout, with no intelligence reporting coming out of Fort Meade for more than seventy-two hours. A declassified NSA report notes, “As one result, the President’s Daily Briefing—60% of which is normally based on SIGINT— was reduced to a small portion of its typical size.”
And:
During President Truman’s October 1948 nationwide whistle-stop train tour in his uphill battle for reelection against Governor Thomas Dewey, the U.S. government was at a virtualstandstill. On the afternoon of Friday, October 29, just as Truman was preparing to deliver a fiery campaign speech at the Brooklyn Academy of Music in New York City, the Russian government and military executed a massive change of virtually all of their cipher systems. On that day, referred to within NSA as Black Friday, and continuing for several months thereafter, all of the cipher systems used on Soviet military and internal-security radio networks, including all mainline Soviet military, naval, and police radio nets, were changed to new, unbreakable systems. The Russians also changed all their radio call signs and operating frequencies and replaced all of the cipher machines that the Americans and British had solved, and even some they hadn’t, with newer and more sophisticated cipher machines that were to defy the ability of American and British cryptanalysts to solve them for almost thirty years, until the tenure of Admiral Bobby Ray Inman in the late 1970s.
Black Friday was an unmitigated disaster, inflicting massive and irreparable damage on the Anglo-American SIGINT organizations’ efforts against the USSR, killing off virtually all of the productive intelligence sources that were then available to them regarding what was going on inside the Soviet Union and rendering useless most of four years’ hard work by thousands of American and British cryptanalysts, linguists, and traffic analysts. The loss of so many critically important high-level intelligence sources in such a short space of time was, as NSA historians have aptly described it, “perhaps the most significant intelligence loss in U.S. history.” And more important, it marked the beginning of an eight-year period when reliable intelligence about what was occurring inside the USSR was practically nonexistent.
Beginning in May and continuing through early July 2001, NSA intercepted thirty-three separate messages indicating that bin Laden intended to mount one or more terrorist attacks against U.S. targets in the near future. But the intercepts provided no specifics about the impending operation other than that “Zero Hour was near.”
In June, intercepts led to the arrest of two bin Laden operatives who were planning to attack U.S. military installations in Saudi Arabia as well as another one planning an attack on the U.S. embassy in Paris. On June 22, U.S. military forces in the Persian Gulf and the Middle East were once again placed on alert after NSA intercepted a conversation between two al Qaeda operatives in the region, which indicated that “a major attack was imminent.” All U.S. Navy ships docked in Bahrain, homeport of the U.S. Fifth Fleet, were ordered to put to sea immediately.
These NSA intercepts scared the daylights out of both the White House’s “terrorism czar,” Richard Clarke, and CIA director George Tenet. Tenet told Clarke, “It’s my sixth sense, but I feel it coming. This is going to be the big one.” On Thursday, June 28, Clarke warned National Security Advisor Condoleezza Rice that al Qaeda activity had “reached a crescendo,” strongly suggesting that an attack was imminent. That same day, the CIA issued what was called an Alert Memorandum, which stated that the latest intelligence indicated the probability of imminent al Qaeda attacks that would “have dramatic consequences on governments or cause major casualties.”
But many senior officials in the Bush administration did not share Clarke and Tenet’s concerns, notably Secretary of Defense Donald Rumsfeld, who distrusted the material coming out of the U.S. intelligence community. Rumsfeld thought this traffic might well be a “hoax” and asked Tenet and NSA to check the veracity of the al Qaeda intercepts. At NSA director Hayden’s request, Bill Gaches, the head of NSA’s counterterrorism office, reviewed all the intercepts and reported that they were genuine al Qaeda communications.
But unbeknownst to Gaches’s analysts at NSA, most of the 9/11 hijackers were already in the United States busy completing their final preparations. Calls from operatives in the United States were routed through the Ahmed al-Hada “switchboard” in Yemen, but apparently none of these calls were intercepted by NSA. Only after 9/11 did the FBI obtain the telephone billing records of the hijackers during their stay in the United States. These records indicated that the hijackers had made a number of phone calls to numbers known by NSA to have been associated with al Qaeda activities, including that of al-Hada.
Unfortunately, NSA had taken the legal position that intercepting calls from abroad to individuals inside the United States was the responsibility of the FBI. NSA had been badly burned in the past when Congress had blasted it for illegal domestic intercepts, which had led to the 1978 Foreign Intelligence Surveillance Act (FISA). NSA could have gone to the Foreign Intelligence Surveillance Court (FISC) for warrants to monitor communications between terrorist suspects in the United States and abroad but feared this would violate U.S. laws.
The ongoing argument about this responsibility between NSA and the FBI created a yawning intelligence gap, which al Qaeda easily slipped through, since there was no effective coordination between the two agencies. One senior NSA official admitted after the 9/11 attacks, “Our cooperation with our foreign allies is a helluva lot better than with the FBI.”
While NSA and the FBI continued to squabble, the tempo of al Qaeda intercepts mounted during the first week of July 2001. A series of SIGINT intercepts produced by NSA in early July allowed American and allied intelligence services to disrupt a series of planned al Qaeda terrorist attacks in Paris, Rome, and Istanbul. On July 10, Tenet and the head of the CIA’s Coun-terterrorism Center, J. Cofer Black, met with National Security Advisor Rice to underline how seriously they took the chatter being picked up by NSA. Both Tenet and Black came away from the meeting believing that Rice did not take their warnings seriously.
Clarke and Tenet also encountered continuing skepticism at the Pentagon from Rumsfeld and his deputy, Paul Wolfowitz. Both contended that the spike in traffic was a hoax and a diversion. Steve Cambone, the undersecretary of defense for intelligence, asked Tenet if he had “considered the possibility that al-Qa’ida’s threats were just a grand deception, a clever ploy to tie up our resources and expend our energies on a phantom enemy that lacked both the power and the will to carry the battle to us.”
In August 2001, either NSA or Britain’s GCHQ intercepted a telephone call from one of bin Laden’s chief lieutenants, Abu Zubaida, to an al Qaeda operative believed to have been in Pakistan. The intercept centered on an operation that was to take place in September. At about the same time, bin Laden telephoned an associate inside Afghanistan and discussed the upcoming operation. Bin Laden reportedly praised the other party to the conversation for his role in planning the operation. For some reason, these intercepts were reportedly never forwarded to intelligence consumers, although this contention is strongly denied by NSA officials.13Just prior to the September 11, 2001, bombings, several Eu rope an intelligence services reportedly intercepted a telephone call that bin Laden made to his wife, who was living in Syria, asking her to return to Afghanistan immediately.
In the seventy-two hours before 9/11, four more NSA intercepts suggested that a terrorist attack was imminent. But NSA did not translate or disseminate any of them until the day after 9/11.15 In one of the two most significant, one of the speakers said, “The big match is about to begin.” In the other, another unknown speaker was overheard saying that tomorrow is “zero hour.”
From Aid’s The Secret Sentry:
More (#6) from The Secret Sentry:
And:
And:
And:
More (#5) from The Secret Sentry:
And:
More (#4) from The Secret Sentry:
And:
More (#3) from The Secret Sentry:
And:
And:
Even when enemy troops and tanks overran the major South Vietnamese military base at Bien Hoa, outside Saigon, on April 26, Martin still refused to accept that Saigon was doomed. On April 28, Glenn met with the ambassador carry ing a message from Allen ordering Glenn to pack up his equipment and evacuate his remaining staff immediately. Martin refused to allow this. The following morning, the military airfield at Tan Son Nhut fell, cutting off the last air link to the outside.
More (#2) from The Secret Sentry:
And:
And:
More (#1) from The Secret Sentry: