FacebookTwitterRedditEmail

The Hariri Assassination

The indictment of four men linked to Hezbollah in the 2005 assassination of Lebanese Prime Minister Rafik Hariri made public by the Special Tribunal on Lebanon Aug. 17 is questionable not because it is based on “circumstantial evidence”, but because that evidence is based on a flawed premise.

The evidence depends on a convoluted theory involving what the indictment calls “co-location” of personal mobile phones associated with five distinct networks said to be somehow connected with the plot to murder Hariri.

The indictment, originally filed Jun. 10, says that, if there are “many instances” in which a phone is “active at the same location, on the same date, and within the same time frame as other phones”, but the phones do not contact each other, then it is “reasonable to conclude from these instances that one person is using multiple phones together”.

Based on that assumption the indictment asserts that “a person can ultimately be identified by co-location to be the user of a network phone.”

On that reasoning, one of the four accused, Salim Jamil Ayyash, is said to have participated in a “red” network of phones that was activated on Jan. 5, 2005, only contacted each other, and ceased operations two minutes before the blast that killed Hariri. The “red” network is presumed to have been used by those who carried out surveillance as well as prepared the logistics for the bombing.

But Ayyash is also linked by “co-location” to a “green” network that had been initiated in October 2004 and ceased to operate one hour before the attack, and a “blue” network that was active between September 2004 and September 2005. The only basis for linking either of those two sets of mobile phones to the assassination appears to be the claim of frequent “co-location” of Ayyash’s personal cell phone with one of the phones in those networks and one red phone.

But the idea that “co-location” of phones is evidence of a single owner is a logical fallacy. It ignores the statistical reality that a multitude of mobile phones would have been frequently co-located with any given phone carrying out surveillance on Hariri in Beirut over an hour or more on the same day during the weeks before the assassination.

In the area of Beirut from the parliament to the St. George Hotel, known as Beirut Central District, where the “red” network is said to have been active in carrying out its surveillance of Hariri, there are 11 base stations for mobile phones, each of which had a range varying from 300 metres to 1,250 metres, according to Riad Bahsoun, a prominent expert on Lebanon’s telecom system. Bahsoun estimates that, within the range of each of those cell towers, between 20,000 and 50,000 cell phones were operating during a typical working day.

Given that number of mobile phones operating within a relatively small area, a large number of phones would obviously have registered in the cell tower area and in the same general time frame – especially if defined as an hour or more, as appears to be the case – as at least one of the red network phones on many occasions.

The indictment does not state how many times one of Ayyash’s personal phones was allegedly “co-located” with a “red” network phone.

To prove that Ayyash was in charge of the team using the red phones, the indictment provides an extraordinarily detailed account of Ayyash’s alleged use of red, green and blue phones on seven days during the period between Jan. 11 and Feb. 14, the day of the assassination.

But according to that information, during the final nine days on which the red network was active in surveillance of Hariri, including the day of the bombing itself, Ayyash was in phone contact with the red and blue networks on only three days – a pattern that appears inconsistent with the role of coordinating the entire plot attributed to him.

The most senior Hezbollah figure indicted, Mustafa Amine Badreddine, is accused of involvement only because he is said to have had 59 phone contacts with Ayyash during the Jan. 5-Feb. 14 period. But those phone contacts are attributed to the two Hezbollah figures solely on the basis of co-location of their personal mobile phones with two phones in the “green” network on an unspecified number of occasions – not from direct evidence that they talked on those occasions.

Evidence from the U.N. commission investigating the Hariri assassination suggests that investigators did not stumble upon the alleged connections between the four Hezbollah figures and the different phone networks but used the link analysis software to find indirect links between phones identified as belonging to Hezbollah and the “red phones”.

In his third report, dated Sep. 26, 2006, then Commissioner Serge Brammertz said his team was using communications traffic analysis for “proactive and speculative” studies.

Brammertz referred in his next report in December 2006 to the pursuit of an “alternative hypothesis” that the motive for killing Hariri was a “combination of political and sectarian factors”. That language indicates that the “proactive and speculative” use of link analysis was to test the hypothesis that Shi’a Hezbollah was behind the bombing.

This is not the first time that communications link analysis has been used to link telephones associated with a specific group or entity to other phones presumed to be part of a major bombing plot.

In the investigation of the Buenos Aires terror bombing of a Jewish community centre in 1994, the Argentine intelligence service SIDE used analysis of phone records to link the Iranian cultural attaché, Mohsen Rabbani, to the bombing, according to the former head of the U.S. Federal Bureau of Investigation’s Office on Hezbollah, James Bernazzani.

Bernazzani, who was sent by the White House in early 1997 to assist SIDE in the bombing investigation, told this reporter in a November 2006 interview that SIDE had argued that a series of telephone calls made between Jul. 1 and Jul. 18, 1994 to a mobile phone in the Brazilian border city of Foz de Iguazu must have been made by the “operational group” for the bombing.

SIDE had further argued that a call allegedly made on a mobile phone belonging to Rabbani to the same number showed that he was linked the bombing plot.

Bernazzani called that use of link analysis by SIDE “speculative” – the same word that Brammertz used to describe the U.N. investigation’s employment of the same tool. Such speculative use of link analysis “can be very dangerous”, Bernazzani said. “Using that kind of analysis, you could link my telephone to [Osama] bin Laden’s.”

Gareth Porter is an investigative historian and journalist specialising in U.S. national security policy. The paperback edition of his latest book, “Perils of Dominance: Imbalance of Power and the Road to War in Vietnam”, was published in 2006.

GARETH PORTER is an investigative historian and journalist with Inter-Press Service specialising in U.S. national security policy. The paperback edition of his latest book, “Perils of Dominance: Imbalance of Power and the Road to War in Vietnam“, was published in 2006.

More articles by:

Gareth Porter is an independent investigative journalist and winner of the 2012 Gellhorn Prize for journalism. He is the author of the newly published Manufactured Crisis: The Untold Story of the Iran Nuclear Scare.

Weekend Edition
August 14, 2020
Friday - Sunday
Matthew Hoh
Lights! Camera! Kill! Hollywood, the Pentagon and Imperial Ambitions.
Joseph Grosso
Bloody Chicken: Inside the American Poultry Industry During the Time of COVID
Jeffrey St. Clair
Roaming Charges: It Had to be You
H. Bruce Franklin
August 12-22, 1945: Washington Starts the Korean and Vietnam Wars
Pete Dolack
Business as Usual Equals Many Extra Deaths from Global Warming
Paul Street
Whispers in the Asylum (Seven Days in August)
Richard Falk – Daniel Falcone
Predatory Capitalism and the Nuclear Threat in the Age of Trump
Paul Fitzgerald - Elizabeth Gould
‘Magical Thinking’ has Always Guided the US Role in Afghanistan
Ramzy Baroud
The Politics of War: What is Israel’s Endgame in Lebanon and Syria?
Ron Jacobs
It’s a Sick Country
Eve Ottenberg
Trump’s Plan: Gut Social Security, Bankrupt the States
Richard C. Gross
Trump’s Fake News
Jonathan Cook
How the Guardian Betrayed Not Only Corbyn But the Last Vestiges of British Democracy
Joseph Natoli
What Trump and the Republican Party Teach Us
Robert Fisk
Can Lebanon be Saved?
Brian Cloughley
Will Biden be Less Belligerent Than Trump?
Kenn Orphan
We Do Not Live in the World of Before
Kollibri terre Sonnenblume
Compromise & the Status Quo
Andrew Bacevich
Biden Wins, Then What?
Thomas Klikauer – Nadine Campbell
The Criminology of Global Warming
Michael Welton
Toppled Monuments and the Struggle For Symbolic Space
Prabir Purkayastha
Why 5G is the First Stage of a Tech War Between the U.S. and China
Daniel Beaumont
The Reign of Error
Adrian Treves – John Laundré
Science Does Not Support the Claims About Grizzly Hunting, Lethal Removal
David Rosen
A Moment of Social Crisis: Recalling the 1970s
Maximilian Werner
Who’s Afraid of the Big Bad Wolf: Textual Manipulations in Anti-wolf Rhetoric
Pritha Chandra
Online Education and the Struggle over Disposable Time
Robert Koehler
Learning from the Hibakushas
Seth Sandronsky
Teaching in a Pandemic: an Interview With Mercedes K. Schneider
Dean Baker
Financing Drug Development: What the Pandemic Has Taught Us
Greta Anderson
Blaming Mexican Wolves for Livestock Kills
Evaggelos Vallianatos
The Meaning of the Battle of Salamis
Mel Gurtov
The World Bank’s Poverty Illusion
Paul Gilk
The Great Question
Rev. Susan K. Williams Smith
Trump Doesn’t Want Law and Order
Martin Cherniack
Neo-conservatism: The Seductive Lure of Lying About History
Nicky Reid
Pick a Cold War, Any Cold War!
George Wuerthner
Zombie Legislation: the Latest Misguided Wildfire Bill
Lee Camp
The Execution of Elephants and Americans
Christopher Brauchli
I Read the News Today, Oh Boy…
Tony McKenna
The Truth About Prince Philip
Louis Proyect
MarxMail 2.0
Sidney Miralao
Get Military Recruiters Out of Our High Schools
Jon Hochschartner
Okra of Time
David Yearsley
Bringing Landscapes to Life: the Music of Johann Christian Bach
FacebookTwitterRedditEmail