Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9-11 Commission Report — Part 18
Page 4
4 / 12
To:
Ottawa
From: San Diego.
Re:
265A-NY-280350 :, 04/11/2002
investigation revealed that numerous individuals used the seized compute.
to perform a myriad of functions, including checking email.
Special Agent
advised that based on discussion.
with agents working Domestic and International Terrorism, the alleged
terrorists involved in the attacks on the World Trade Center Towers and
b6
Pentagon collaborated and communicated with a network of individuals ang.
b7C
organizations to facilitate their attacks. It is believed that they usec
the Internet, including email accounts to communicate with associates.
FBI analysis of the business records and email activity
suspected hijackers used the internet to further their criminal conduct.
For example, at least 12 of the suspected hijackers purchased airline anc
other tickets over the internet using email and giving email addresses as
contact and confirmation points for their reservations. The tickets for
the hijacked flights that were purchased using email addresses were all
purchased between August 25 and August 29, 2001, further indicating that
scheme.
Upon reviewinq the contents of.
MSN Hotmail.
account,
agents of the FBI.
discovered'an email dated.
01/18/2001,
from
that contained.
statements relating to possible terrorist activities.
The communication.
contained, in part, the following statements:.
"before, our plan was to go to the U.s, we would have a few.
on to say that "All this sounds impossible, but anything is possible".
The author finally directs the recipients of the email to respond to the
account
and tell him what they think of the plan..
A 2703(d) Court Order was served on Msn Hotmail for records
relating to the account
The results showed that
Yeay dgewnoh new :sessappe dt Io negunu e wong passanae dem nunonee ay?
aean deg ssaappe dI gear pue gunenae noeeaah e oo ugbot Aaaae do paonae e
for that login. An Ip address is a unique number assigned to each
computer on the Internet. The physical equivalent would be a telephone
number with country and area code..
The subscriber records can be obtaine
for an IP address just as with a telephone number.
The following IP addresses were used to access the
Jaccount at the times listed:.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic