Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
WHAT TO DO? A GLOBAL STRATEGY
5
REFLECTING ON A GENERATIONAL CHALLENGE
6
Three years after 9/11, Americans are still thinking and talking about how to protect
7
our nation in this new era. The national debate continues. Countering terrorism has
8
become, beyond any doubt, the top national security priority for the United States.
9
This shift has occurred with the full support of the Congress, both major political
10
parties, the media, and the American people.
11
The nation has committed enormous resources to national security and to countering
12
terrorism. Between fiscal year 2001, the last budget adopted before 9/11, and the
13
present fiscal year 2004, total federal spending on defense (including expenditures
14
on both Iraq and Afghanistan), homeland security, and international affairs rose
15
more than 50 percent, from $354 billion to about $547 billion. The United States has
16
not experienced such a rapid surge in national security spending since the Korean
17
War.
18
19
This pattern has occurred before in American history. The United States faces a
20
sudden crisis and summons a tremendous exertion of national energy. Then, as that
21
surge transforms the landscape, comes a time for reflection and reevaluation. Some
22
programs and even agencies are discarded; others are invented or redesigned. Private
23
firms and engaged citizens redefine their relationships with government, working
24
through the processes of the American republic.
25
Now is the time for that reflection and reevaluation. The United States should
26
consider what to do-the shape and objectives of a strategy. Americans should also
27
consider how to do it-organizing their government in a different way. Defining the
28
Threat In the post-9/11 world, threats are defined more by the fault lines within
29
societies than by the territorial boundaries between them. From terrorism to global
30
disease or environmental degradation, the challenges have become transnational
31
rather than international. That is the defining quality of world politics in the
32
twenty-first century.
33
National security used to be considered by studying foreign frontiers, weighing
34
opposing groups of states, and measuring industrial might. To be dangerous, an enemy
35
had to muster large armies. Threats emerged slowly, often visibly, as weapons were
36
forged, armies conscripted, and units trained and moved into place. Because large
37
states were more powerful, they also had more to lose. They could be deterred.
38
Now threats can emerge quickly. An organization like al Qaeda, headquartered in a
39
country on the other side of the earth, in a region so poor that electricity or
40
telephones were scarce, could nonetheless scheme to wield weapons of unprecedented
41
destructive power in the largest cities of the United States. In this sense, 9/11
42
has taught us that terrorism against American interests "over there" should be
43
regarded just as we regard terrorism against America "over here." In this same
44
sense, the American homeland is the planet. But the enemy is not just "terrorism,"
45
some generic evil.
46
47
This vagueness blurs the strategy. The catastrophic threat at this moment in history
48
is more specific. It is the threat posed by Islamist terrorism-especially the al
49
Qaeda network, its affiliates, and its ideology.
50
51
As we mentioned in chapter 2, Usama Bin Ladin and other Islamist terrorist leaders
52
draw on a long tradition of extreme intolerance within one stream of Islam (a
53
minority tradition), from at least Ibn Taimiyyah, through the founders of Wahhabism,
54
through the Muslim Brotherhood, to Sayyid Qutb. That stream is motivated by religion
55
and does not distinguish politics from religion, thus distorting both. It is further
56
fed by grievances stressed by Bin Ladin and widely felt throughout the Muslim
57
world-against the U.S. military presence in the Middle East, policies perceived as
58
anti-Arab and anti-Muslim, and support of Israel. Bin Ladin and Islamist terrorists
59
mean exactly what they say: to them America is the font of all evil, the "head of
60
the snake," and it must be converted or destroyed.
61
It is not a position with which Americans can bargain or negotiate. With it there is
62
no common ground-not even respect for life-on which to begin a dialogue. It can only
63
be destroyed or utterly isolated.
64
Because the Muslim world has fallen behind the West politically, economically, and
65
militarily for the past three centuries, and because few tolerant or secular Muslim
66
democracies provide alternative models for the future, Bin Ladin's message finds
67
receptive ears. It has attracted active support from thousands of disaffected young
68
Muslims and resonates powerfully with a far larger number who do not actively
69
support his methods. The resentment of America and the West is deep, even among
70
leaders of relatively successful Muslim states.
71
72
Tolerance, the rule of law, political and economic openness, the extension of greater
73
opportunities to women-these cures must come from within Muslim societies
74
themselves. The United States must support such developments. But this process is
75
likely to be measured in decades, not years. It is a process that will be violently
76
opposed by Islamist terrorist organizations, both inside Muslim countries and in
77
attacks on the United States and other Western nations. The United States finds
78
itself caught up in a clash within a civilization. That clash arises from particular
79
conditions in the Muslim world, conditions that spill over into expatriate Muslim
80
communities in non-Muslim countries. Our enemy is twofold: al Qaeda, a stateless
81
network of terrorists that struck us on 9/11; and a radical ideological movement in
82
the Islamic world, inspired in part by al Qaeda, which has spawned terrorist groups
83
and violence across the globe. The first enemy is weakened, but continues to pose a
84
grave threat. The second enemy is gathering, and will menace Americans and American
85
interests long after Usama Bin Ladin and his cohorts are killed or captured. Thus
86
our strategy must match our means to two ends: dismantling the al Qaeda network and
87
prevailing in the longer term over the ideology that gives rise to Islamist
88
terrorism.
89
Islam is not the enemy. It is not synonymous with terror. Nor does Islam teach
90
terror. America and its friends oppose a perversion of Islam, not the great world
91
faith itself. Lives guided by religious faith, including literal beliefs in holy
92
scriptures, are common to every religion, and represent no threat to us. Other
93
religions have experienced violent internal struggles. With so many diverse
94
adherents, every major religion will spawn violent zealots. Yet understanding and
95
tolerance among people of different faiths can and must prevail. The present
96
transnational danger is Islamist terrorism. What is needed is a broad
97
political-military strategy that rests on a firm tripod of policies to
98
99
attack terrorists and their organizations;
100
prevent the continued growth of Islamist terrorism; and
101
protect against and prepare for terrorist attacks.
102
103
More Than a War on Terrorism
104
Terrorism is a tactic used by individuals and organizations to kill and destroy. Our
105
efforts should be directed at those individuals and organizations. Calling this
106
struggle a war accurately describes the use of American and allied armed forces to
107
find and destroy terrorist groups and their allies in the field, notably in
108
Afghanistan. The language of war also evokes the mobilization for a national effort.
109
Yet the strategy should be balanced.
110
The first phase of our post-9/11 efforts rightly included military action to topple
111
the Taliban and pursue al Qaeda. This work continues. But long-term success demands
112
the use of all elements of national power: diplomacy, intelligence, covert action,
113
law enforcement, economic policy, foreign aid, public diplomacy, and homeland
114
defense. If we favor one tool while neglecting others, we leave ourselves vulnerable
115
and weaken our national effort.
116
Certainly the strategy should include offensive operations to counter terrorism.
117
Terrorists should no longer find safe haven where their organizations can grow and
118
flourish. America's strategy should be a coalition strategy, that includes Muslim
119
nations as partners in its development and implementation. Our effort should be
120
accompanied by a preventive strategy that is as much, or more, political as it is
121
military. The strategy must focus clearly on the Arab and Muslim world, in all its
122
variety.
123
Our strategy should also include defenses. America can be attacked in many ways and
124
has many vulnerabilities. No defenses are perfect. But risks must be calculated;
125
hard choices must be made about allocating resources. Responsibilities for America's
126
defense should be clearly defined. Planning does make a difference, identifying
127
where a little money might have a large effect. Defenses also complicate the plans
128
of attackers, increasing their risks of discovery and failure. Finally, the nation
129
must prepare to deal with attacks that are not stopped.
130
Measuring Success
131
What should Americans expect from their government in the struggle against Islamist
132
terrorism? The goals seem unlimited: Defeat terrorism anywhere in the world. But
133
Americans have also been told to expect the worst: An attack is probably coming; it
134
may be terrible.
135
With such benchmarks, the justifications for action and spending seem limitless.
136
Goals are good. Yet effective public policies also need concrete objectives.
137
Agencies need to be able to measure success.
138
These measurements do not need to be quantitative: government cannot measure success
139
in the ways that private firms can. But the targets should be specific enough so
140
that reasonable observers-in the White House, the Congress, the media, or the
141
general public-can judge whether or not the objectives have been attained.
142
Vague goals match an amorphous picture of the enemy. Al Qaeda and its affiliates are
143
popularly described as being all over the world, adaptable, resilient, needing
144
little higher-level organization, and capable of anything. The American people are
145
thus given the picture of an omnipotent, unslayable hydra of destruction. This image
146
lowers expectations for government effectiveness. It should not lower them too far.
147
Our report shows a determined and capable group of plotters. Yet the group was
148
fragile, dependent on a few key personalities, and occasionally left vulnerable by
149
the marginal, unstable people often attracted to such causes. The enemy made
150
mistakes-like Khalid al Mihdhar's unauthorized departure from the United States that
151
required him to enter the country again in July 2001, or the selection of Zacarias
152
Moussaoui as a participant and Ramzi Binalshibh's transfer of money to him. The U.S.
153
government was not able to capitalize on those mistakes in time to prevent 9/11. We
154
do not believe it is possible to defeat all terrorist attacks against Americans,
155
every time and everywhere. A president should tell the American people:
156
157
No president can promise that a catastrophic attack like that of 9/11 will not
158
happen again. History has shown that even the most vigilant and expert agencies
159
cannot always prevent determined, suicidal attackers from reaching a target.
160
But the American people are entitled to expect their government to do its very
161
best. They should expect that officials will have realistic objectives, clear
162
guidance, and effective organization. They are entitled to see some standards
163
for performance so they can judge, with the help of their elected
164
representatives, whether the objectives are being met.
165
166
ATTACK TERRORISTS AND THEIR ORGANIZATIONS
167
The U.S.government, joined by other governments around the world, is working through
168
intelligence, law enforcement, military, financial, and diplomatic channels to
169
identify, disrupt, capture, or kill individual terrorists. This effort was going on
170
before 9/11 and it continues on a vastly enlarged scale. But to catch terrorists, a
171
U.S. or foreign agency needs to be able to find and reach them.
172
No Sanctuaries
173
The 9/11 attack was a complex international operation, the product of years of
174
planning. Bombings like those in Bali in 2003 or Madrid in 2004, while able to take
175
hundreds of lives, can be mounted locally. Their requirements are far more modest in
176
size and complexity. They are more difficult to thwart. But the U.S. government must
177
build the capacities to prevent a 9/11-scale plot from succeeding, and those
178
capabilities will help greatly to cope with lesser but still devastating attacks.
179
A complex international terrorist operation aimed at launching a catastrophic attack
180
cannot be mounted by just anyone in any place. Such operations appear to require
181
182
time, space, and ability to perform competent planning and staff work;
183
a command structure able to make necessary decisions and possessing the
184
authority and contacts to assemble needed people, money, and materials;
185
opportunity and space to recruit, train, and select operatives with the needed
186
skills and dedication, providing the time and structure required to socialize
187
them into the terrorist cause, judge their trustworthiness, and hone their
188
skills;
189
a logistics network able to securely manage the travel of operatives, move
190
money, and transport resources (like explosives) where they need to go;
191
access, in the case of certain weapons, to the special materials needed for a
192
nuclear, chemical, radiological, or biological attack;
193
reliable communications between coordinators and operatives; and
194
opportunity to test the workability of the plan.
195
196
Many details in chapters 2, 5, and 7 illustrate the direct and indirect value of the
197
Afghan sanctuary to al Qaeda in preparing the 9/11 attack and other operations. The
198
organization cemented personal ties among veteran jihadists working together there
199
for years. It had the operational space to gather and sift recruits, indoctrinating
200
them in isolated, desert camps. It built up logistical networks, running through
201
Pakistan and the United Arab Emirates.
202
Al Qaeda also exploited relatively lax internal security environments in Western
203
countries, especially Germany. It considered the environment in the United States so
204
hospitable that the 9/11 operatives used America as their staging area for further
205
training and exercises-traveling into, out of, and around the country and
206
complacently using their real names with little fear of capture. To find sanctuary,
207
terrorist organizations have fled to some of the least governed, most lawless places
208
in the world. The intelligence community has prepared a world map that highlights
209
possible terrorist havens, using no secret intelligence-just indicating areas that
210
combine rugged terrain, weak governance, room to hide or receive supplies, and low
211
population density with a town or city near enough to allow necessary interaction
212
with the outside world. Large areas scattered around the world meet these
213
criteria.
214
215
In talking with American and foreign government officials and military officers on
216
the front lines fighting terrorists today, we asked them: If you were a terrorist
217
leader today, where would you locate your base? Some of the same places come up
218
again and again on their lists:
219
220
western Pakistan and the Pakistan-Afghanistan border region
221
southern or western Afghanistan
222
the Arabian Peninsula, especially Saudi Arabia and Yemen, and the nearby Horn
223
of Africa, including Somalia and extending southwest into Kenya
224
Southeast Asia, from Thailand to the southern Philippines to Indonesia
225
West Africa, including Nigeria and Mali
226
European cities with expatriate Muslim communities, especially cities in
227
central and eastern Europe where security forces and border controls are less
228
effective
229
230
In the twentieth century, strategists focused on the world's great industrial
231
heartlands. In the twenty-first, the focus is in the opposite direction, toward
232
remote regions and failing states. The United States has had to find ways to extend
233
its reach, straining the limits of its influence.
234
Every policy decision we make needs to be seen through this lens. If, for example,
235
Iraq becomes a failed state, it will go to the top of the list of places that are
236
breeding grounds for attacks against Americans at home. Similarly, if we are paying
237
insufficient attention to Afghanistan, the rule of the Taliban or warlords and
238
narcotraffickers may reemerge and its countryside could once again offer refuge to
239
al Qaeda, or its successor.
240
241
Recommendation: The U.S. government must identify and prioritize
242
actual or potential terrorist sanctuaries. For each, it should have a realistic
243
strategy to keep possible terrorists insecure and on the run, using all elements
244
of national power. We should reach out, listen to, and work with other countries
245
that can help.
246
247
We offer three illustrations that are particularly applicable today, in 2004:
248
Pakistan, Afghanistan, and Saudi Arabia.
249
Pakistan
250
Pakistan's endemic poverty, widespread corruption, and often ineffective government
251
create opportunities for Islamist recruitment. Poor education is a particular
252
concern. Millions of families, especially those with little money, send their
253
children to religious schools, or madrassahs. Many of these schools are the only
254
opportunity available for an education, but some have been used as incubators for
255
violent extremism. According to Karachi's police commander, there are 859 madrassahs
256
teaching more than 200,000 youngsters in his city alone.
257
258
It is hard to overstate the importance of Pakistan in the struggle against Islamist
259
terrorism. Within Pakistan's borders are 150 million Muslims, scores of al Qaeda
260
terrorists, many Taliban fighters, and-perhaps-Usama Bin Ladin. Pakistan possesses
261
nuclear weapons and has come frighteningly close to war with nuclear-armed India
262
over the disputed territory of Kashmir. A political battle among anti-American
263
Islamic fundamentalists, the Pakistani military, and more moderate mainstream
264
political forces has already spilled over into violence, and there have been
265
repeated recent attempts to kill Pakistan's president, Pervez Musharraf.
266
In recent years, the United States has had three basic problems in its relationship
267
with Pakistan:
268
269
On terrorism, Pakistan helped nurture theTaliban. The Pakistani army and
270
intelligence services, especially below the top ranks, have long been ambivalent
271
about confronting Islamist extremists. Many in the government have sympathized
272
with or provided support to the extremists. Musharraf agreed that Bin Ladin was
273
bad. But before 9/11, preserving good relations with the Taliban took
274
precedence.
275
On proliferation, Musharraf has repeatedly said that Pakistan does not barter
276
with its nuclear technology. But proliferation concerns have been long-standing
277
and very serious. Most recently, the Pakistani government has claimed not to
278
have known that one of its nuclear weapons developers, a national figure, was
279
leading the most dangerous nuclear smuggling ring ever disclosed.
280
Finally, Pakistan has made little progress toward the return of democratic
281
rule at the national level, although that turbulent process does continue to
282
function at the provincial level and the Pakistani press remains relatively
283
free.
284
285
Immediately after 9/11, confronted by the United States with a stark choice, Pakistan
286
made a strategic decision. Its government stood aside and allowed the U.S.-led
287
coalition to destroy theTaliban regime. In other ways, Pakistan actively assisted:
288
its authorities arrested more than 500 al Qaeda operatives and Taliban members, and
289
Pakistani forces played a leading part in tracking down KSM, Abu Zubaydah, and other
290
key al Qaeda figures.
291
292
In the following two years, the Pakistani government tried to walk the fence, helping
293
against al Qaeda while seeking to avoid a larger confrontation withTaliban remnants
294
and other Islamic extremists. When al Qaeda and its Pakistani allies repeatedly
295
tried to assassinate Musharraf, almost succeeding, the battle came home.
296
The country's vast unpoliced regions make Pakistan attractive to extremists seeking
297
refuge and recruits and also provide a base for operations against coalition forces
298
in Afghanistan. Almost all the 9/11 attackers traveled the northsouth nexus of
299
Kandahar-Quetta-Karachi. The Baluchistan region of Pakistan (KSM's ethnic home) and
300
the sprawling city of Karachi remain centers of Islamist extremism where the U.S.
301
and Pakistani security and intelligence presence has been weak. The U.S. consulate
302
in Karachi is a makeshift fortress, reflecting the gravity of the surrounding
303
threat.
304
305
During the winter of 2003-2004, Musharraf made another strategic decision. He ordered
306
the Pakistani army into the frontier provinces of northwest Pakistan along the
307
Afghan border, where Bin Ladin and Ayman al Zawahiri have reportedly taken refuge.
308
The army is confronting groups of al Qaeda fighters and their local allies in very
309
difficult terrain. On the other side of the frontier, U.S. forces in Afghanistan
310
have found it challenging to organize effective joint operations, given Pakistan's
311
limited capabilities and reluctance to permit U.S. military operations on its soil.
312
Yet in 2004, it is clear that the Pakistani government is trying harder than ever
313
before in the battle against Islamist terrorists.
314
315
Acknowledging these problems and Musharraf 's own part in the story, we believe that
316
Musharraf 's government represents the best hope for stability in Pakistan and
317
Afghanistan.
318
319
In an extraordinary public essay asking how Muslims can "drag ourselves out of
320
the pit we find ourselves in, to raise ourselves up," Musharraf has called for a
321
strategy of "enlightened moderation." The Muslim world, he said, should shun
322
militancy and extremism; the West-and the United States in particular-should
323
seek to resolve disputes with justice and help better the Muslim world.
324
325
Having come close to war in 2002 and 2003, Pakistan and India have recently
326
made significant progress in peacefully discussing their longstanding
327
differences. The United States has been and should remain a key supporter of
328
that process.
329
The constant refrain of Pakistanis is that the United States long treated them
330
as allies of convenience. As the United States makes fresh commitments now, it
331
should make promises it is prepared to keep, for years to come.
332
333
334
Recommendation: If Musharraf stands for enlightened moderation in a
335
fight for his life and for the life of his country, the United States should be
336
willing to make hard choices too, and make the difficult long-term commitment to
337
the future of Pakistan. Sustaining the current scale of aid to Pakistan, the
338
United States should support Pakistan's government in its struggle against
339
extremists with a comprehensive effort that extends from military aid to support
340
for better education, so long as Pakistan's leaders remain willing to make
341
difficult choices of their own.
342
343
Afghanistan
344
Afghanistan was the incubator for al Qaeda and for the 9/11 attacks. In the fall of
345
2001, the U.S.-led international coalition and its Afghan allies toppled the Taliban
346
and ended the regime's protection of al Qaeda. Notable progress has been made.
347
International cooperation has been strong, with a clear UN mandate and a NATO-led
348
peacekeeping force (the International Security Assistance Force, or ISAF). More than
349
10,000 American soldiers are deployed today in Afghanistan, joined by soldiers from
350
NATO allies and Muslim states. A central government has been established in Kabul,
351
with a democratic constitution, new currency, and a new army. Most Afghans enjoy
352
greater freedom, women and girls are emerging from subjugation, and 3 million
353
children have returned to school. For the first time in many years, Afghans have
354
reason to hope.
355
356
But grave challenges remain. Taliban and al Qaeda fighters have regrouped in the
357
south and southeast. Warlords control much of the country beyond Kabul, and the land
358
is awash in weapons. Economic development remains a distant hope. The narcotics
359
trade-long a massive sector of the Afghan economy- is again booming. Even the most
360
hardened aid workers refuse to operate in many regions, and some warn that
361
Afghanistan is near the brink of chaos.
362
363
Battered Afghanistan has a chance. Elections are being prepared. It is revealing that
364
in June 2004, Taliban fighters resorted to slaughtering 16 Afghans on a bus,
365
apparently for no reason other than their boldness in carrying an unprecedented
366
Afghan weapon: a voter registration card.
367
Afghanistan's president, Hamid Karzai, is brave and committed. He is trying to build
368
genuinely national institutions that can overcome the tradition of allocating powers
369
among ethnic communities. Yet even if his efforts are successful and elections bring
370
a democratic government to Afghanistan, the United States faces some difficult
371
choices.
372
After paying relatively little attention to rebuilding Afghanistan during the
373
military campaign, U.S. policies changed noticeably during 2003. Greater
374
consideration of the political dimension and congressional support for a substantial
375
package of assistance signaled a longer-term commitment to Afghanistan's future. One
376
Afghan regional official plaintively told us the country finally has a good
377
government. He begged the United States to keep its promise and not abandon
378
Afghanistan again, as it had in the 1990s. Another Afghan leader noted that if the
379
United States leaves, "we will lose all that we have gained."
380
381
Most difficult is to define the security mission in Afghanistan. There is continuing
382
political controversy about whether military operations in Iraq have had any effect
383
on the scale of America's commitment to the future of Afghanistan. The United States
384
has largely stayed out of the central government's struggles with dissident warlords
385
and it has largely avoided confronting the related problem of narcotrafficking.
386
387
388
Recommendation: The President and the Congress deserve praise for
389
their efforts in Afghanistan so far. Now the United States and the international
390
community should make a long-term commitment to a secure and stable Afghanistan,
391
in order to give the government a reasonable opportunity to improve the life of
392
the Afghan people. Afghanistan must not again become a sanctuary for
393
international crime and terrorism. The United States and the international
394
community should help the Afghan government extend its authority over the
395
country, with a strategy and nation-by-nation commitments to achieve their
396
objectives.
397
398
399
This is an ambitious recommendation. It would mean a redoubled effort to
400
secure the country, disarm militias, and curtail the age of warlord rule. But
401
the United States and NATO have already committed themselves to the future of
402
this region-wisely, as the 9/11 story shows-and failed half-measures could be
403
worse than useless.
404
NATO in particular has made Afghanistan a test of the Alliance's ability to
405
adapt to current security challenges of the future. NATO must pass this test.
406
Currently, the United States and the international community envision enough
407
support so that the central government can build a truly national army and
408
extend essential infrastructure and minimum public services to major towns and
409
regions. The effort relies in part on foreign civil-military teams, arranged
410
under various national flags. The institutional commitments of NATO and the
411
United Nations to these enterprises are weak. NATO member states are not
412
following through; some of the other states around the world that have pledged
413
assistance to Afghanistan are not fulfilling their pledges.
414
The U.S. presence in Afghanistan is overwhelmingly oriented toward military
415
and security work. The State Department presence is woefully understaffed, and
416
the military mission is narrowly focused on al Qaeda andTaliban remnants in the
417
south and southeast. The U.S.government can do its part if the international
418
community decides on a joint effort to restore the rule of law and contain
419
rampant crime and narcotics trafficking in this crossroads of Central Asia.
420
421
422
We heard again and again that the money for assistance is allocated so rigidly that,
423
on the ground, one U.S. agency often cannot improvise or pitch in to help another
424
agency, even in small ways when a few thousand dollars could make a great
425
difference.
426
The U.S. government should allocate money so that lower-level officials have more
427
flexibility to get the job done across agency lines, adjusting to the circumstances
428
they find in the field. This should include discretionary funds for expenditures by
429
military units that often encounter opportunities to help the local population.
430
Saudi Arabia
431
Saudi Arabia has been a problematic ally in combating Islamic extremism. At the level
432
of high policy, Saudi Arabia's leaders cooperated with American diplomatic
433
initiatives aimed at theTaliban or Pakistan before 9/11. At the same time, Saudi
434
Arabia's society was a place where al Qaeda raised money directly from individuals
435
and through charities. It was the society that produced 15 of the 19 hijackers.
436
The Kingdom is one of the world's most religiously conservative societies, and its
437
identity is closely bound to its religious links, especially its position as the
438
guardian of Islam's two holiest sites. Charitable giving, or zakat, is one of the
439
five pillars of Islam. It is broader and more pervasive than Western ideas of
440
charity- functioning also as a form of income tax, educational assistance, foreign
441
aid, and a source of political influence. The Western notion of the separation of
442
civic and religious duty does not exist in Islamic cultures. Funding charitable
443
works is an integral function of the governments in the Islamic world. It is so
444
ingrained in Islamic culture that in Saudi Arabia, for example, a department within
445
the Saudi Ministry of Finance and National Economy collects zakat directly, much as
446
the U.S. Internal Revenue Service collects payroll withholding tax. Closely tied to
447
zakat is the dedication of the government to propagating the Islamic faith,
448
particularly the Wahhabi sect that flourishes in Saudi Arabia.
449
Traditionally, throughout the Muslim world, there is no formal oversight mechanism
450
for donations. As Saudi wealth increased, the amounts contributed by individuals and
451
the state grew dramatically. Substantial sums went to finance Islamic charities of
452
every kind.
453
While Saudi domestic charities are regulated by the Ministry of Labor and Social
454
Welfare, charities and international relief agencies, such as the World Assembly of
455
Muslim Youth (WAMY), are currently regulated by the Ministry of Islamic Affairs.
456
This ministry uses zakat and government funds to spread Wahhabi beliefs throughout
457
the world, including in mosques and schools. Often these schools provide the only
458
education available; even in affluent countries, Saudi-funded Wahhabi schools are
459
often the only Islamic schools. Some Wahhabi-funded organizations have been
460
exploited by extremists to further their goal of violent jihad against non-Muslims.
461
One such organization has been the al Haramain Islamic Foundation; the assets of
462
some branch offices have been frozen by the U.S. and Saudi governments.
463
Until 9/11, few Saudis would have considered government oversight of charitable
464
donations necessary; many would have perceived it as interference in the exercise of
465
their faith. At the same time, the government's ability to finance most state
466
expenditures with energy revenues has delayed the need for a modern income tax
467
system. As a result, there have been strong religious, cultural, and administrative
468
barriers to monitoring charitable spending. That appears to be changing, however,
469
now that the goal of violent jihad also extends to overthrowing Sunni governments
470
(such as the House of Saud) that are not living up to the ideals of the Islamist
471
extremists.
472
473
The leaders of the United States and the rulers of Saudi Arabia have long had
474
friendly relations, rooted in fundamentally common interests against the Soviet
475
Union during the Cold War, in American hopes that Saudi oil supplies would stabilize
476
the supply and price of oil in world markets, and in Saudi hopes that America could
477
help protect the Kingdom against foreign threats. In 1990, the Kingdom hosted U.S.
478
armed forces before the first U.S.-led war WHAT TO DO? A GLOBAL STRATEGY 373 against
479
Iraq. American soldiers and airmen have given their lives to help protect Saudi
480
Arabia. The Saudi government has difficulty acknowledging this. American military
481
bases remained there until 2003, as part of an international commitment to contain
482
Iraq.
483
For many years, leaders on both sides preferred to keep their ties quiet and behind
484
the scenes. As a result, neither the U.S. nor the Saudi people appreciated all the
485
dimensions of the bilateral relationship, including the Saudi role in U.S.
486
strategies to promote the Middle East peace process. In each country, political
487
figures find it difficult to publicly defend good relations with the other. Today,
488
mutual recriminations flow. Many Americans see Saudi Arabia as an enemy, not as an
489
embattled ally. They perceive an autocratic government that oppresses women,
490
dominated by a wealthy and indolent elite. Saudi contacts with American politicians
491
are frequently invoked as accusations in partisan political arguments. Americans are
492
often appalled by the intolerance, anti-Semitism, and anti-American arguments taught
493
in schools and preached in mosques. Saudis are angry too. Many educated Saudis who
494
were sympathetic to America now perceive the United States as an unfriendly state.
495
One Saudi reformer noted to us that the demonization of Saudi Arabia in the U.S.
496
media gives ammunition to radicals, who accuse reformers of being U.S. lackeys. Tens
497
of thousands of Saudis who once regularly traveled to (and often had homes in) the
498
United States now go elsewhere.
499
500
Among Saudis, the United States is seen as aligned with Israel in its conflict with
501
the Palestinians, with whom Saudis ardently sympathize. Although Saudi Arabia's
502
cooperation against terrorism improved to some extent after the September 11
503
attacks, significant problems remained. Many in the Kingdom initially reacted with
504
disbelief and denial. In the following months, as the truth became clear, some
505
leading Saudis quietly acknowledged the problem but still did not see their own
506
regime as threatened, and thus often did not respond promptly to U.S. requests for
507
help. Though Saddam Hussein was widely detested, many Saudis are sympathetic to the
508
anti-U.S. insurgents in Iraq, although majorities also condemn jihadist attacks in
509
the Kingdom.
510
511
As in Pakistan, Yemen, and other countries, attitudes changed when the terrorism came
512
home. Cooperation had already become significant, but after the bombings in Riyadh
513
on May 12, 2003, it improved much more. The Kingdom openly discussed the problem of
514
radicalism, criticized the terrorists as religiously deviant, reduced official
515
support for religious activity overseas, closed suspect charitable foundations, and
516
publicized arrests-very public moves for a government that has preferred to keep
517
internal problems quiet. The Kingdom of Saudi Arabia is now locked in mortal combat
518
with al Qaeda. Saudi police are regularly being killed in shootouts with terrorists.
519
In June 2004, the Saudi ambassador to the United States called publicly-in the Saudi
520
press-for his government to wage a jihad of its own against the terrorists." We must
521
all, as a state and as a people, recognize the truth about these criminals," he
522
declared, "[i]f we do not declare a general mobilization-we will lose this war on
523
terrorism."
524
525
Saudi Arabia is a troubled country. Although regarded as very wealthy, in fact per
526
capita income has dropped from $28,000 at its height to the present level of about
527
$8,000. Social and religious traditions complicate adjustment to modern economic
528
activity and limit employment opportunities for young Saudis. Women find their
529
education and employment sharply limited. President Clinton offered us a perceptive
530
analysis of Saudi Arabia, contending that fundamentally friendly rulers have been
531
constrained by their desire to preserve the status quo. He, like others, made the
532
case for pragmatic reform instead. He hopes the rulers will envision what they want
533
their Kingdom to become in 10 or 20 years, and start a process in which their
534
friends can help them change.
535
536
There are signs that Saudi Arabia's royal family is trying to build a consensus for
537
political reform, though uncertain about how fast and how far to go. Crown Prince
538
Abdullah wants the Kingdom to join the World Trade Organization to accelerate
539
economic liberalization. He has embraced the Arab Human Development Report, which
540
was highly critical of the Arab world's political, economic, and social failings and
541
called for greater economic and political reform.
542
543
Cooperation with Saudi Arabia against Islamist terrorism is very much in the U.S.
544
interest. Such cooperation can exist for a time largely in secret, as it does now,
545
but it cannot grow and thrive there. Nor, on either side, can friendship be
546
unconditional.
547
548
Recommendation: The problems in the U.S.-Saudi relationship must be
549
confronted, openly. The United States and Saudi Arabia must determine if they
550
can build a relationship that political leaders on both sides are prepared to
551
publicly defend-a relationship about more than oil. It should include a shared
552
commitment to political and economic reform, as Saudis make common cause with
553
the outside world. It should include a shared interest in greater tolerance and
554
cultural respect, translating into a commitment to fight the violent extremists
555
who foment hatred.
556
557
PREVENT THE CONTINUED GROWTH OF ISLAMIST TERRORISM
558
In October 2003, reflecting on progress after two years of waging the global war on
559
terrorism, Defense Secretary Donald Rumsfeld asked his advisers:"Are we capturing,
560
killing or deterring and dissuading more terrorists every day than the madrassas and
561
the radical clerics are recruiting, training and deploying against us? Does the US
562
need to fashion a broad, integrated plan to stop the next generation of terrorists?
563
The US is putting relatively little effort into a long-range plan, but we are
564
putting a great deal of effort into trying to stop terrorists. The cost-benefit
565
ratio is against us! Our cost is billions against the terrorists' costs of
566
millions."
567
568
These are the right questions. Our answer is that we need short-term action on a
569
long-range strategy, one that invigorates our foreign policy with the attention that
570
the President and Congress have given to the military and intelligence parts of the
571
conflict against Islamist terrorism.
572
Engage the Struggle of Ideas
573
The United States is heavily engaged in the Muslim world and will be for many years
574
to come. This American engagement is resented. Polls in 2002 found that among
575
America's friends, like Egypt-the recipient of more U.S. aid for the past 20 years
576
than any other Muslim country-only 15 percent of the population had a favorable
577
opinion of the United States. In Saudi Arabia the number was 12 percent. And
578
two-thirds of those surveyed in 2003 in countries from Indonesia to Turkey (a NATO
579
ally) were very or somewhat fearful that the United States may attack them.
580
581
Support for the United States has plummeted. Polls taken in Islamic countries after
582
9/11 suggested that many or most people thought the United States was doing the
583
right thing in its fight against terrorism; few people saw popular support for al
584
Qaeda; half of those surveyed said that ordinary people had a favorable view of the
585
United States. By 2003, polls showed that "the bottom has fallen out of support for
586
America in most of the Muslim world. Negative views of the U.S. among Muslims, which
587
had been largely limited to countries in the Middle East, have spread. . . . Since
588
last summer, favorable ratings for the U.S. have fallen from 61% to 15% in Indonesia
589
and from 71% to 38% among Muslims in Nigeria."
590
591
Many of these views are at best uninformed about the United States and, at worst,
592
informed by cartoonish stereotypes, the coarse expression of a fashionable
593
"Occidentalism" among intellectuals who caricature U.S. values and policies. Local
594
newspapers and the few influential satellite broadcasters-like al Jazeera-often
595
reinforce the jihadist theme that portrays the United States as anti-Muslim.
596
597
The small percentage of Muslims who are fully committed to Usama Bin Ladin's version
598
of Islam are impervious to persuasion. It is among the large majority of Arabs and
599
Muslims that we must encourage reform, freedom, democracy, and opportunity, even
600
though our own promotion of these messages is limited in its effectiveness simply
601
because we are its carriers. Muslims themselves will have to reflect upon such basic
602
issues as the concept of jihad, the position of women, and the place of non-Muslim
603
minorities. The United States can promote moderation, but cannot ensure its
604
ascendancy. Only Muslims can do this.
605
The setting is difficult. The combined gross domestic product of the 22 countries in
606
the Arab League is less than the GDP of Spain. Forty percent of adult Arabs are
607
illiterate, two-thirds of them women. One-third of the broader Middle East lives on
608
less than two dollars a day. Less than 2 percent of the population has access to the
609
Internet. The majority of older Arab youths have expressed a desire to emigrate to
610
other countries, particularly those in Europe.
611
612
In short, the United States has to help defeat an ideology, not just a group of
613
people, and we must do so under difficult circumstances. How can the United States
614
and its friends help moderate Muslims combat the extremist ideas?
615
616
Recommendation: The U.S. government must define what the message is,
617
what it stands for. We should offer an example of moral leadership in the world,
618
committed to treat people humanely, abide by the rule of law, and be generous
619
and caring to our neighbors. America and Muslim friends can agree on respect for
620
human dignity and opportunity. To Muslim parents, terrorists like Bin Ladin have
621
nothing to offer their children but visions of violence and death. America and
622
its friends have a crucial advantage-we can offer these parents a vision that
623
might give their children a better future. If we heed the views of thoughtful
624
leaders in the Arab and Muslim world, a moderate consensus can be found.
625
626
That vision of the future should stress life over death: individual educational and
627
economic opportunity. This vision includes widespread political participation and
628
contempt for indiscriminate violence. It includes respect for the rule of law,
629
openness in discussing differences, and tolerance for opposing points of view.
630
631
Recommendation: Where Muslim governments, even those who are
632
friends, do not respect these principles, the United States must stand for a
633
better future. One of the lessons of the long Cold War was that short-term gains
634
in cooperating with the most repressive and brutal governments were too often
635
outweighed by long-term setbacks for America's stature and interests.
636
637
American foreign policy is part of the message. America's policy choices have
638
consequences. Right or wrong, it is simply a fact that American policy regarding the
639
Israeli-Palestinian conflict and American actions in Iraq are dominant staples of
640
popular commentary across the Arab and Muslim world. That does not mean U.S. choices
641
have been wrong. It means those choices must be integrated with America's message of
642
opportunity to the Arab and Muslim world. Neither Israel nor the new Iraq will be
643
safer if worldwide Islamist terrorism grows stronger.
644
The United States must do more to communicate its message. Reflecting on Bin Ladin's
645
success in reaching Muslim audiences, Richard Holbrooke wondered, " How can a man in
646
a cave outcommunicate the world's leading communications society?" Deputy Secretary
647
of State Richard Armitage worried to us that Americans have been "exporting our
648
fears and our anger,"not our vision of opportunity and hope.
649
650
651
Recommendation: Just as we did in the Cold War, we need to defend
652
our ideals abroad vigorously. America does stand up for its values. The United
653
States defended, and still defends, Muslims against tyrants and criminals in
654
Somalia, Bosnia, Kosovo, Afghanistan, and Iraq. If the United States does not
655
act aggressively to define itself in the Islamic world, the extremists will
656
gladly do the job for us.
657
658
659
660
Recognizing that Arab and Muslim audiences rely on satellite
661
television and radio, the government has begun some promising initiatives in
662
television and radio broadcasting to the Arab world, Iran, and Afghanistan.
663
These efforts are beginning to reach large audiences. The Broadcasting Board
664
of Governors has asked for much larger resources. It should get them.
665
666
667
The United States should rebuild the scholarship, exchange, and
668
library programs that reach out to young people and offer them knowledge and
669
hope. Where such assistance is provided, it should be identified as coming
670
from the citizens of the United States.
671
672
673
An Agenda of Opportunity
674
The United States and its friends can stress educational and economic opportunity.
675
The United Nations has rightly equated "literacy as freedom."
676
677
The international community is moving toward setting a concrete goal-to cut
678
the Middle East region's illiteracy rate in half by 2010, targeting women and
679
girls and supporting programs for adult literacy.
680
Unglamorous help is needed to support the basics, such as textbooks that
681
translate more of the world's knowledge into local languages and libraries to
682
house such materials. Education about the outside world, or other cultures, is
683
weak.
684
More vocational education is needed, too, in trades and business skills. The
685
Middle East can also benefit from some of the programs to bridge the digital
686
divide and increase Internet access that have already been developed for other
687
regions of the world.
688
689
Education that teaches tolerance, the dignity and value of each individual, and
690
respect for different beliefs is a key element in any global strategy to eliminate
691
Islamist terrorism.
692
693
Recommendation: The U.S. government should offer to join with other
694
nations in generously supporting a new International Youth Opportunity Fund.
695
Funds will be spent directly for building and operating primary and secondary
696
schools in those Muslim states that commit to sensibly investing their own money
697
in public education.
698
699
Economic openness is essential. Terrorism is not caused by poverty. Indeed, many
700
terrorists come from relatively well-off families. Yet when people lose hope, when
701
societies break down, when countries fragment, the breeding grounds for terrorism
702
are created. Backward economic policies and repressive political regimes slip into
703
societies that are without hope, where ambition and passions have no constructive
704
outlet.
705
The policies that support economic development and reform also have political
706
implications. Economic and political liberties tend to be linked. Commerce,
707
especially international commerce, requires ongoing cooperation and compromise, the
708
exchange of ideas across cultures, and the peaceful resolution of differences
709
through negotiation or the rule of law. Economic growth expands the middle class, a
710
constituency for further reform. Successful economies rely on vibrant private
711
sectors, which have an interest in curbing indiscriminate government power. Those
712
who develop the practice of controlling their own economic destiny soon desire a
713
voice in their communities and political societies.
714
The U.S. government has announced the goal of working toward a Middle East Free Trade
715
Area, or MEFTA, by 2013. The United States has been seeking comprehensive free trade
716
agreements (FTAs) with the Middle Eastern nations most firmly on the path to reform.
717
The U.S.-Israeli FTA was enacted in 1985, and Congress implemented an FTA with
718
Jordan in 2001. Both agreements have expanded trade and investment, thereby
719
supporting domestic economic reform. In 2004, new FTAs were signed with Morocco and
720
Bahrain, and are awaiting congressional approval. These models are drawing the
721
interest of their neighbors. Muslim countries can become full participants in the
722
rules-based global trading system, as the United States considers lowering its trade
723
barriers with the poorest Arab nations.
724
725
Recommendation: A comprehensive U.S. strategy to counter terrorism
726
should include economic policies that encourage development, more open
727
societies, and opportunities for people to improve the lives of their families
728
and to enhance prospects for their children's future.
729
730
Turning a National Strategy into a Coalition Strategy
731
Practically every aspect of U.S.counterterrorism strategy relies on international
732
cooperation. Since 9/11, these contacts concerning military, law enforcement,
733
intelligence, travel and customs, and financial matters have expanded so
734
dramatically, and often in an ad hoc way, that it is difficult to track these
735
efforts, much less integrate them.
736
737
Recommendation: The United States should engage other nations in
738
developing a comprehensive coalition strategy against Islamist terrorism. There
739
are several multilateral institutions in which such issues should be addressed.
740
But the most important policies should be discussed and coordinated in a
741
flexible contact group of leading coalition governments. This is a good place,
742
for example, to develop joint strategies for targeting terrorist travel, or for
743
hammering out a common strategy for the places where terrorists may be finding
744
sanctuary.
745
746
Presently the Muslim and Arab states meet with each other, in organizations such as
747
the Islamic Conference and the Arab League. The Western states meet with each other
748
in organizations such as NATO and the Group of Eight summit of leading industrial
749
nations. A recent G-8 summit initiative to begin a dialogue about reform may be a
750
start toward finding a place where leading Muslim states can discuss-and be seen to
751
discuss-critical policy issues with the leading Western powers committed to the
752
future of the Arab and Muslim world. These new international efforts can create
753
durable habits of visible cooperation, as states willing to step up to their
754
responsibilities join together in constructive efforts to direct assistance and
755
coordinate action.
756
Coalition warfare also requires coalition policies on what to do with enemy captives.
757
Allegations that the United States abused prisoners in its custody make it harder to
758
build the diplomatic, political, and military alliances the government will need.
759
The United States should work with friends to develop mutually agreed-on principles
760
for the detention and humane treatment of captured international terrorists who are
761
not being held under a particular country's criminal laws. Countries such as
762
Britain, Australia, and Muslim friends, are committed to fighting terrorists.
763
America should be able to reconcile its views on how to balance humanity and
764
security with our nation's commitment to these same goals. The United States and
765
some of its allies do not accept the application of full Geneva Convention treatment
766
of prisoners of war to captured terrorists. Those Conventions establish a minimum
767
set of standards for prisoners in internal conflicts. Since the international
768
struggle against Islamist terrorism is not internal, those provisions do not
769
formally apply, but they are commonly accepted as basic standards for humane
770
treatment.
771
772
Recommendation: The United States should engage its friends to
773
develop a common coalition approach toward the detention and humane treatment of
774
captured terrorists. New principles might draw upon Article 3 of the Geneva
775
Conventions on the law of armed conflict. That article was specifically designed
776
for those cases in which the usual laws of war did not apply. Its minimum
777
standards are generally accepted throughout the world as customary international
778
law.
779
780
Proliferation of Weapons of Mass Destruction
781
The greatest danger of another catastrophic attack in the United States will
782
materialize if the world's most dangerous terrorists acquire the world's most
783
dangerous weapons. As we note in chapter 2, al Qaeda has tried to acquire or make
784
nuclear weapons for at least ten years. In chapter 4, we mentioned officials
785
worriedly discussing, in 1998, reports that Bin Ladin's associates thought their
786
leader was intent on carrying out a "Hiroshima." These ambitions continue. In the
787
public portion of his February 2004 worldwide threat assessment to Congress,
788
DCITenet noted that Bin Ladin considered the acquisition of weapons of mass
789
destruction to be a "religious obligation." He warned that al Qaeda "continues to
790
pursue its strategic goal of obtaining a nuclear capability." Tenet added that "more
791
than two dozen other terrorist groups are pursuing CBRN [chemical, biological,
792
radiological, and nuclear] materials."
793
794
A nuclear bomb can be built with a relatively small amount of nuclear material. A
795
trained nuclear engineer with an amount of highly enriched uranium or plutonium
796
about the size of a grapefruit or an orange, together with commercially available
797
material, could fashion a nuclear device that would fit in a van like the one Ramzi
798
Yousef parked in the garage of the World Trade Center in 1993. Such a bomb would
799
level Lower Manhattan.
800
801
The coalition strategies we have discussed to combat Islamist terrorism should
802
therefore be combined with a parallel, vital effort to prevent and counter the
803
proliferation of weapons of mass destruction (WMD). We recommend several initiatives
804
in this area.
805
Strengthen Counterproliferation Efforts.
806
807
While efforts to shut down Libya's illegal nuclear program have been generally
808
successful, Pakistan's illicit trade and the nuclear smuggling networks of Pakistani
809
scientist A.Q. Khan have revealed that the spread of nuclear weapons is a problem of
810
global dimensions. Attempts to deal with Iran's nuclear program are still underway.
811
Therefore, the United States should work with the international community to develop
812
laws and an international legal regime with universal jurisdiction to enable the
813
capture, interdiction, and prosecution of such smugglers by any state in the world
814
where they do not disclose their activities.
815
Expand the Proliferation Security Initiative.
816
817
In May 2003, the Bush administration announced the Proliferation Security Initiative
818
(PSI): nations in a willing partnership combining their national capabilities to use
819
military, economic, and diplomatic tools to interdict threatening shipments of WMD
820
and missile-related technology.
821
The PSI can be more effective if it uses intelligence and planning resources of the
822
NATO alliance. Moreover, PSI membership should be open to non- NATO countries.
823
Russia and China should be encouraged to participate.
824
Support the Cooperative Threat Reduction Program.
825
826
Outside experts are deeply worried about the U.S. government's commitment and
827
approach to securing the weapons and highly dangerous materials still scattered in
828
Russia and other countries of the Soviet Union. The government's main instrument in
829
this area, the CooperativeThreat Reduction Program (usually referred to as
830
"Nunn-Lugar," after the senators who sponsored the legislation in 1991), is now in
831
need of expansion, improvement, and resources. The U.S. government has recently
832
redoubled its international commitments to support this program, and we recommend
833
that the United States do all it can, if Russia and other countries will do their
834
part. The government should weigh the value of this investment against the
835
catastrophic cost America would face should such weapons find their way to the
836
terrorists who are so anxious to acquire them.
837
838
Recommendation: Our report shows that al Qaeda has tried to acquire
839
or make weapons of mass destruction for at least ten years. There is no doubt
840
the United States would be a prime target. Preventing the proliferation of these
841
weapons warrants a maximum effort-by strengthening counterproliferation efforts,
842
expanding the Proliferation Security Initiative, and supporting the Cooperative
843
Threat Reduction program.
844
845
Targeting Terrorist Money
846
The general public sees attacks on terrorist finance as a way to "starve the
847
terrorists of money." So, initially, did the U.S. government. After 9/11, the United
848
States took aggressive actions to designate terrorist financiers and freeze their
849
money, in the United States and through resolutions of the United Nations. These
850
actions appeared to have little effect and, when confronted by legal challenges, the
851
United States and the United Nations were often forced to unfreeze assets.
852
The difficulty, understood later, was that even if the intelligence community might
853
"link" someone to a terrorist group through acquaintances or communications, the
854
task of tracing the money from that individual to the terrorist group, or otherwise
855
showing complicity, was far more difficult. It was harder still to do so without
856
disclosing secrets.
857
These early missteps made other countries unwilling to freeze assets or otherwise act
858
merely on the basis of a U.S. action. Multilateral freezing mechanisms now require
859
waiting periods before being put into effect, eliminating the element of surprise
860
and thus virtually ensuring that little money is actually frozen. Worldwide asset
861
freezes have not been adequately enforced and have been easily circumvented, often
862
within weeks, by simple methods. But trying to starve the terrorists of money is
863
like trying to catch one kind of fish by draining the ocean. A better strategy has
864
evolved since those early months, as the government learned more about how al Qaeda
865
raises, moves, and spends money.
866
867
Recommendation: Vigorous efforts to track terrorist financing must
868
remain front and center in U.S. counterterrorism efforts. The government has
869
recognized that information about terrorist money helps us to understand their
870
networks, search them out, and disrupt their operations. Intelligence and law
871
enforcement have targeted the relatively small number of financial
872
facilitators-individuals al Qaeda relied on for their ability to raise and
873
deliver money-at the core of al Qaeda's revenue stream. These efforts have
874
worked. The death or capture of several important facilitators has decreased the
875
amount of money available to al Qaeda and has increased its costs and difficulty
876
in raising and moving that money. Captures have additionally provided a windfall
877
of intelligence that can be used to continue the cycle of disruption.
878
879
The U.S. financial community and some international financial institutions have
880
generally provided law enforcement and intelligence agencies with extraordinary
881
cooperation, particularly in supplying information to support quickly developing
882
investigations. Obvious vulnerabilities in the U.S. financial system have been
883
corrected. The United States has been less successful in persuading other countries
884
to adopt financial regulations that would permit the tracing of financial
885
transactions.
886
Public designation of terrorist financiers and organizations is still part of the
887
fight, but it is not the primary weapon. Designations are instead a form of
888
diplomacy, as governments join together to identify named individuals and groups as
889
terrorists. They also prevent open fundraising. Some charities that have been
890
identified as likely avenues for terrorist financing have seen their donations WHAT
891
TO DO? A GLOBAL STRATEGY 383 diminish and their activities come under more scrutiny,
892
and others have been put out of business, although controlling overseas branches of
893
Gulf-area charities remains a challenge. The Saudi crackdown after the May 2003
894
terrorist attacks in Riyadh has apparently reduced the funds available to al
895
Qaeda-perhaps drastically-but it is too soon to know if this reduction will last.
896
Though progress apparently has been made, terrorists have shown considerable
897
creativity in their methods of moving money. If al Qaeda is replaced by smaller,
898
decentralized terrorist groups, the premise behind the government's efforts-that
899
terrorists need a financial support network-may become outdated. Moreover, some
900
terrorist operations do not rely on outside sources of money and may now be
901
self-funding, either through legitimate employment or low-level criminal
902
activity.
903
904
PROTECT AGAINST AND PREPARE FOR TERRORIST ATTACKS
905
In the nearly three years since 9/11, Americans have become better protected against
906
terrorist attack. Some of the changes are due to government action, such as new
907
precautions to protect aircraft. A portion can be attributed to the sheer scale of
908
spending and effort. Publicity and the vigilance of ordinary Americans also make a
909
difference.
910
But the President and other officials acknowledge that although Americans may be
911
safer, they are not safe. Our report shows that the terrorists analyze defenses.
912
They plan accordingly.
913
Defenses cannot achieve perfect safety. They make targets harder to attack
914
successfully, and they deter attacks by making capture more likely. Just increasing
915
the attacker's odds of failure may make the difference between a plan attempted, or
916
a plan discarded. The enemy also may have to develop more elaborate plans, thereby
917
increasing the danger of exposure or defeat.
918
Protective measures also prepare for the attacks that may get through, containing the
919
damage and saving lives.
920
Terrorist Travel
921
More than 500 million people annually cross U.S. borders at legal entry points, about
922
330 million of them noncitizens. Another 500,000 or more enter illegally without
923
inspection across America's thousands of miles of land borders or remain in the
924
country past the expiration of their permitted stay. The challenge for national
925
security in an age of terrorism is to prevent the very few people who may pose
926
overwhelming risks from entering or remaining in the United States undetected.
927
928
In the decade before September 11, 2001, border security-encompassing travel, entry,
929
and immigration-was not seen as a national security matter. Public figures voiced
930
concern about the "war on drugs," the right level and kind of immigration, problems
931
along the southwest border, migration crises originating in the Caribbean and
932
elsewhere, or the growing criminal traffic in humans. The immigration system as a
933
whole was widely viewed as increasingly dysfunctional and badly in need of reform.
934
In national security circles, however, only smuggling of weapons of mass destruction
935
carried weight, not the entry of terrorists who might use such weapons or the
936
presence of associated foreign-born terrorists.
937
For terrorists, travel documents are as important as weapons. Terrorists must travel
938
clandestinely to meet, train, plan, case targets, and gain access to attack. To
939
them, international travel presents great danger, because they must surface to pass
940
through regulated channels, present themselves to border security officials, or
941
attempt to circumvent inspection points.
942
In their travels, terrorists use evasive methods, such as altered and counterfeit
943
passports and visas, specific travel methods and routes, liaisons with corrupt
944
government officials, human smuggling networks, supportive travel agencies, and
945
immigration and identity fraud. These can sometimes be detected.
946
Before 9/11, no agency of the U.S. government systematically analyzed terrorists'
947
travel strategies. Had they done so, they could have discovered the ways in which
948
the terrorist predecessors to al Qaeda had been systematically but detectably
949
exploiting weaknesses in our border security since the early 1990s.
950
We found that as many as 15 of the 19 hijackers were potentially vulnerable to
951
interception by border authorities. Analyzing their characteristic travel documents
952
and travel patterns could have allowed authorities to intercept 4 to 15 hijackers
953
and more effective use of information available in U.S. government databases could
954
have identified up to 3 hijackers.
955
956
Looking back, we can also see that the routine operations of our immigration
957
laws-that is, aspects of those laws not specifically aimed at protecting against
958
terrorism-inevitably shaped al Qaeda's planning and opportunities. Because they were
959
deemed not to be bona fide tourists or students as they claimed, five conspirators
960
that we know of tried to get visas and failed, and one was denied entry by an
961
inspector. We also found that had the immigration system set a higher bar for
962
determining whether individuals are who or what they claim to be-and ensuring
963
routine consequences for violations-it could potentially have excluded, removed, or
964
come into further contact with several hijackers who did not appear to meet the
965
terms for admitting short-term visitors.
966
967
Our investigation showed that two systemic weaknesses came together in our border
968
system's inability to contribute to an effective defense against the 9/11 attacks: a
969
lack of well-developed counterterrorism measures as a part of border security and an
970
immigration system not able to deliver on its basic commitments, much less support
971
counterterrorism. These weaknesses have been reduced but are far from being
972
overcome.
973
974
Recommendation: Targeting travel is at least as powerful a weapon
975
against terrorists as targeting their money. The United States should combine
976
terrorist travel intelligence, operations, and law enforcement in a strategy to
977
intercept terrorists, find terrorist travel facilitators, and constrain
978
terrorist mobility.
979
980
Since 9/11, significant improvements have been made to create an integrated watchlist
981
that makes terrorist name information available to border and law enforcement
982
authorities. However, in the already difficult process of merging border agencies in
983
the new Department of Homeland Security-"changing the engine while flying" as one
984
official put it34-new insights into terrorist travel have not yet been integrated
985
into the front lines of border security. The small terrorist travel intelligence
986
collection and analysis program currently in place has produced disproportionately
987
useful results. It should be expanded. Since officials at the borders encounter
988
travelers and their documents first and investigate travel facilitators, they must
989
work closely with intelligence officials.
990
Internationally and in the United States, constraining terrorist travel should become
991
a vital part of counterterrorism strategy. Better technology and training to detect
992
terrorist travel documents are the most important immediate steps to reduce
993
America's vulnerability to clandestine entry. Every stage of our border and
994
immigration system should have as a part of its operations the detection of
995
terrorist indicators on travel documents. Information systems able to authenticate
996
travel documents and detect potential terrorist indicators should be used at
997
consulates, at primary border inspection lines, in immigration services offices, and
998
in intelligence and enforcement units. All frontline personnel should receive some
999
training. Dedicated specialists and ongoing linkages with the intelligence community
1000
are also required. The Homeland Security Department's Directorate of Information
1001
Analysis and Infrastructure Protection should receive more resources to accomplish
1002
its mission as the bridge between the frontline border agencies and the rest of the
1003
government counterterrorism community.
1004
A Biometric Screening System
1005
When people travel internationally, they usually move through defined channels, or
1006
portals. They may seek to acquire a passport. They may apply for a visa. They stop
1007
at ticket counters, gates, and exit controls at airports and seaports. Upon arrival,
1008
they pass through inspection points. They may transit to another gate to get on an
1009
airplane. Once inside the country, they may seek another form of identification and
1010
try to enter a government or private facility. They may seek to change immigration
1011
status in order to remain.
1012
Each of these checkpoints or portals is a screening-a chance to establish that people
1013
are who they say they are and are seeking access for their stated purpose, to
1014
intercept identifiable suspects, and to take effective action. The job of protection
1015
is shared among these many defined checkpoints. By taking advantage of them all, we
1016
need not depend on any one point in the system to do the whole job. The challenge is
1017
to see the common problem across agencies and functions and develop a conceptual
1018
framework-an architecture- for an effective screening system.
1019
1020
Throughout government, and indeed in private enterprise, agencies and firms at these
1021
portals confront recurring judgments that balance security, efficiency, and civil
1022
liberties. These problems should be addressed systemically, not in an ad hoc,
1023
fragmented way. For example:
1024
What information is an individual required to present and in what form?
1025
1026
A fundamental problem, now beginning to be addressed, is the lack of standardized
1027
information in "feeder" documents used in identifying individuals. Biometric
1028
identifiers that measure unique physical characteristics, such as facial features,
1029
fingerprints, or iris scans, and reduce them to digitized, numerical statements
1030
called algorithms, are just beginning to be used. Travel history, however, is still
1031
recorded in passports with entry-exit stamps called cachets, which al Qaeda has
1032
trained its operatives to forge and use to conceal their terrorist activities.
1033
How will the individual and the information be checked?
1034
There are many databases just in the United States-for terrorist, criminal, and
1035
immigration history, as well as financial information, for instance. Each is set up
1036
for different purposes and stores different kinds of data, under varying rules of
1037
access. Nor is access always guaranteed. Acquiring information held by foreign
1038
governments may require painstaking negotiations, and records that are not yet
1039
digitized are difficult to search or analyze. The development of terrorist
1040
indicators has hardly begun, and behavioral cues remain important.
1041
Who will screen individuals, and what will they be trained to do?
1042
A wide range of border, immigration, and law enforcement officials encounter
1043
visitors and immigrants and they are given little training in terrorist travel
1044
intelligence. Fraudulent travel documents, for instance, are usually returned to
1045
travelers who are denied entry without further examination for terrorist trademarks,
1046
investigation as to their source, or legal process.
1047
What are the consequences of finding a suspicious indicator, and who
1048
will take action?
1049
One risk is that responses may be ineffective or produce no further information.
1050
Four of the 9/11 attackers were pulled into secondary border inspection, but then
1051
admitted. More than half of the 19 hijackers were flagged by the Federal Aviation
1052
Administration's profiling system when they arrived for their flights, but the
1053
consequence was that bags, not people, were checked. Competing risks include "false
1054
positives,"or the danger that rules may be applied with insufficient training or
1055
judgment. Overreactions can impose high costs too-on individuals, our economy, and
1056
our beliefs about justice.
1057
1058
A special note on the importance of trusting subjective judgment: One
1059
potential hijacker was turned back by an immigration inspector as he tried to
1060
enter the United States. The inspector relied on intuitive experience to ask
1061
questions more than he relied on any objective factor that could be detected by
1062
"scores" or a machine. Good people who have worked in such jobs for a long time
1063
understand this phenomenon well. Other evidence we obtained confirmed the
1064
importance of letting experienced gate agents or security screeners ask
1065
questions and use their judgment. This is not an invitation to arbitrary
1066
exclusions. But any effective system has to grant some scope, perhaps in a
1067
little extra inspection or one more check, to the instincts and discretion of
1068
well trained human beings.
1069
1070
1071
Recommendation: The U.S. border security system should be integrated
1072
into a larger network of screening points that includes our transportation
1073
system and access to vital facilities, such as nuclear reactors. The President
1074
should direct the Department of Homeland Security to lead the effort to design a
1075
comprehensive screening system, addressing common problems and setting common
1076
standards with systemwide goals in mind. Extending those standards among other
1077
governments could dramatically strengthen America and the world's collective
1078
ability to intercept individuals who pose catastrophic threats.
1079
1080
We advocate a system for screening, not categorical profiling. A screening system
1081
looks for particular, identifiable suspects or indicators of risk. It does not
1082
involve guesswork about who might be dangerous. It requires frontline border
1083
officials who have the tools and resources to establish that people are who they say
1084
they are, intercept identifiable suspects, and disrupt terrorist operations.
1085
The U.S. Border Screening System
1086
The border and immigration system of the United States must remain a visible
1087
manifestation of our belief in freedom, democracy, global economic growth, and the
1088
rule of law, yet serve equally well as a vital element of counterterrorism.
1089
Integrating terrorist travel information in the ways we have described is the most
1090
immediate need. But the underlying system must also be sound.
1091
Since September 11, the United States has built the first phase of a biometric
1092
screening program, called US VISIT (the United States Visitor and Immigrant Status
1093
Indicator Technology program). It takes two biometric identifiers-digital
1094
photographs and prints of two index fingers-from travelers. False identities are
1095
used by terrorists to avoid being detected on a watchlist. These biometric
1096
identifiers make such evasions far more difficult. So far, however, only visitors
1097
who acquire visas to travel to the United States are covered. While visitors from
1098
"visa waiver" countries will be added to the program, beginning this year, covered
1099
travelers will still constitute only about 12 percent of all noncitizens crossing
1100
U.S. borders. Moreover, exit data are not uniformly collected and entry data are not
1101
fully automated. It is not clear the system can be installed before 2010, but even
1102
this timetable may be too slow, given the possible security dangers.
1103
1104
1105
Americans should not be exempt from carrying biometric passports or otherwise
1106
enabling their identities to be securely verified when they enter the United
1107
States; nor should Canadians or Mexicans. Currently U.S. persons are exempt from
1108
carrying passports when returning from Canada, Mexico, and the Caribbean. The
1109
current system enables non-U.S. citizens to gain entry by showing minimal
1110
identification. The 9/11 experience shows that terrorists study and exploit
1111
America's vulnerabilities.
1112
To balance this measure, programs to speed known travelers should be a higher
1113
priority, permitting inspectors to focus on greater risks. The daily commuter
1114
should not be subject to the same measures as first-time travelers. An
1115
individual should be able to preenroll, with his or her identity verified in
1116
passage. Updates of database information and other checks can ensure ongoing
1117
reliability. The solution, requiring more research and development, is likely to
1118
combine radio frequency technology with biometric identifiers.
1119
1120
The current patchwork of border screening systems, including several frequent
1121
traveler programs, should be consolidated with the USVISIT system to enable the
1122
development of an integrated system, which in turn can become part of the wider
1123
screening plan we suggest.
1124
The program allowing individuals to travel from foreign countries through the
1125
United States to a third country, without having to obtain a U.S. visa, has been
1126
suspended. Because "transit without visa" can be exploited by terrorists to
1127
enter the United States, the program should not be reinstated unless and until
1128
transit passage areas can be fully secured to prevent passengers from illegally
1129
exiting the airport.
1130
1131
Inspectors adjudicating entries of the 9/11 hijackers lacked adequate information and
1132
knowledge of the rules. All points in the border system-from consular offices to
1133
immigration services offices-will need appropriate electronic access to an
1134
individual's file. Scattered units at Homeland Security and the State Department
1135
perform screening and data mining: instead, a government-wide team of border and
1136
transportation officials should be working together. A modern border and immigration
1137
system should combine a biometric entry-exit system with accessible files on
1138
visitors and immigrants, along with intelligence on indicators of terrorist travel.
1139
Our border screening system should check people efficiently and welcome friends.
1140
Admitting large numbers of students, scholars, businesspeople, and tourists fuels
1141
our economy, cultural vitality, and political reach. There is evidence that the
1142
present system is disrupting travel to the United States. Overall, visa applications
1143
in 2003 were down over 32 percent since 2001. In the Middle East, they declined
1144
about 46 percent. Training and the design of security measures should be
1145
continuously adjusted.
1146
1147
1148
Recommendation: The Department of Homeland Security, properly
1149
supported by the Congress, should complete, as quickly as possible, a biometric
1150
entry-exit screening system, including a single system for speeding qualified
1151
travelers. It should be integrated with the system that provides benefits to
1152
foreigners seeking to stay in the United States. Linking biometric passports to
1153
good data systems and decisionmaking is a fundamental goal. No one can hide his
1154
or her debt by acquiring a credit card with a slightly different name. Yet
1155
today, a terrorist can defeat the link to electronic records by tossing away an
1156
old passport and slightly altering the name in the new one.
1157
1158
Completion of the entry-exit system is a major and expensive challenge. Biometrics
1159
have been introduced into an antiquated computer environment. Replacement of these
1160
systems and improved biometric systems will be required. Nonetheless, funding and
1161
completing a biometrics-based entry-exit system is an essential investment in our
1162
national security.
1163
Exchanging terrorist information with other countries, consistent with privacy
1164
requirements, along with listings of lost and stolen passports, will have immediate
1165
security benefits. We should move toward real-time verification of passports with
1166
issuing authorities. The further away from our borders that screening occurs, the
1167
more security benefits we gain. At least some screening should occur before a
1168
passenger departs on a flight destined for the United States. We should also work
1169
with other countries to ensure effective inspection regimes at all airports.
1170
1171
The international community arrives at international standards for the design of
1172
passports through the International Civil Aviation Organization (ICAO). The global
1173
standard for identification is a digital photograph; fingerprints are optional. We
1174
must work with others to improve passport standards and provide foreign assistance
1175
to countries that need help in making the transition.
1176
1177
1178
Recommendation: The U.S. government cannot meet its own obligations
1179
to the American people to prevent the entry of terrorists without a major effort
1180
to collaborate with other governments. We should do more to exchange terrorist
1181
information with trusted allies, and raise U.S. and global border security
1182
standards for travel and border crossing over the medium and long term through
1183
extensive international cooperation.
1184
1185
Immigration Law and Enforcement
1186
Our borders and immigration system, including law enforcement, ought to send a
1187
message of welcome, tolerance, and justice to members of immigrant communities in
1188
the United States and in their countries of origin. We should reach out to immigrant
1189
communities. Good immigration services are one way of doing so that is valuable in
1190
every way-including intelligence. It is elemental to border security to know who is
1191
coming into the country. Today more than 9 million people are in the United States
1192
outside the legal immigration system. We must also be able to monitor and respond to
1193
entrances between our ports of entry, working with Canada and Mexico as much as
1194
possible. There is a growing role for state and local law enforcement agencies. They
1195
need more training and work with federal agencies so that they can cooperate more
1196
effectively with those federal authorities in identifying terrorist suspects. All
1197
but one of the 9/11 hijackers acquired some form of U.S. identification document,
1198
some by fraud. Acquisition of these forms of identification would have assisted them
1199
in boarding commercial flights, renting cars, and other necessary activities.
1200
1201
Recommendation: Secure identification should begin in the United
1202
States. The federal government should set standards for the issuance of birth
1203
certificates and sources of identification, such as drivers licenses. Fraud in
1204
identification documents is no longer just a problem of theft. At many entry
1205
points to vulnerable facilities, including gates for boarding aircraft, sources
1206
of identification are the last opportunity to ensure that people are who they
1207
say they are and to check whether they are terrorists.
1208
1209
1210
Strategies for Aviation and Transportation Security
1211
The U.S. transportation system is vast and, in an open society, impossible to secure
1212
completely against terrorist attacks. There are hundreds of commercial airports,
1213
thousands of planes, and tens of thousands of daily flights carrying more than half
1214
a billion passengers a year. Millions of containers are imported annually through
1215
more than 300 sea and river ports served by more than 3,700 cargo and passenger
1216
terminals. About 6,000 agencies provide transit services through buses, subways,
1217
ferries, and light-rail service to about 14 million Americans each weekday.
1218
1219
In November 2001, Congress passed and the President signed the Aviation and
1220
Transportation Security Act. This act created the Transportation Security
1221
Administration (TSA), which is now part of the Homeland Security Department. In
1222
November 2002, both the Homeland Security Act and the Maritime Transportation
1223
Security Act followed. These laws required the development of strategic plans to
1224
describe how the new department and TSA would provide security for critical parts of
1225
the U.S. transportation sector. Over 90 percent of the nation's $5.3 billion annual
1226
investment in the TSA goes to aviation-to fight the last war. The money has been
1227
spent mainly to meet congressional mandates to federalize the security checkpoint
1228
screeners and to deploy existing security methods and technologies at airports. The
1229
current efforts do not yet reflect a forward-looking strategic plan systematically
1230
analyzing assets, risks, costs, and benefits. Lacking such a plan, we are not
1231
convinced that our transportation security resources are being allocated to the
1232
greatest risks in a cost-effective way.
1233
1234
Major vulnerabilities still exist in cargo and general aviation security.
1235
These, together with inadequate screening and access controls, continue to
1236
present aviation security challenges.
1237
While commercial aviation remains a possible target, terrorists may turn their
1238
attention to other modes. Opportunities to do harm are as great, or greater, in
1239
maritime or surface transportation. Initiatives to secure shipping containers
1240
have just begun. Surface transportation systems such as railroads and mass
1241
transit remain hard to protect because they are so accessible and
1242
extensive.
1243
1244
Despite congressional deadlines, the TSA has developed neither an integrated
1245
strategic plan for the transportation sector nor specific plans for the various
1246
modes-air, sea, and ground.
1247
1248
Recommendation: Hard choices must be made in allocating limited
1249
resources. The U.S. government should identify and evaluate the transportation
1250
assets that need to be protected, set risk-based priorities for defending them,
1251
select the most practical and cost-effective ways of doing so, and then develop
1252
a plan, budget, and funding to implement the effort. The plan should assign
1253
roles and missions to the relevant authorities (federal, state, regional, and
1254
local) and to private stakeholders. In measuring effectiveness, perfection is
1255
unattainable. But terrorists should perceive that potential targets are
1256
defended. They may be deterred by a significant chance of failure. Congress
1257
should set a specific date for the completion of these plans and hold the
1258
Department of Homeland Security and TSA accountable for achieving them.
1259
1260
The most powerful investments may be for improvements in technologies with
1261
applications across the transportation modes, such as scanning technologies designed
1262
to screen containers that can be transported by plane, ship, truck, or rail. Though
1263
such technologies are becoming available now, widespread deployment is still years
1264
away.
1265
In the meantime, the best protective measures may be to combine improved methods of
1266
identifying and tracking the high-risk containers, operators, and facilities that
1267
require added scrutiny with further efforts to integrate intelligence analysis,
1268
effective procedures for transmitting threat information to transportation
1269
authorities, and vigilance by transportation authorities and the public.
1270
A Layered Security System
1271
No single security measure is foolproof. Accordingly, the TSA must have multiple
1272
layers of security in place to defeat the more plausible and dangerous forms of
1273
attack against public transportation.
1274
1275
The plan must take into consideration the full array of possible enemy
1276
tactics, such as use of insiders, suicide terrorism, or standoff attack. Each
1277
layer must be effective in its own right. Each must be supported by other layers
1278
that are redundant and coordinated.
1279
The TSA should be able to identify for Congress the array of potential
1280
terrorist attacks, the layers of security in place, and the reliability provided
1281
by each layer. TSA must develop a plan as described above to improve weak
1282
individual layers and the effectiveness of the layered systems it
1283
deploys.
1284
1285
On 9/11, the 19 hijackers were screened by a computer-assisted screening system
1286
called CAPPS. More than half were identified for further inspection, which applied
1287
only to their checked luggage.
1288
Under current practices, air carriers enforce government orders to stop certain known
1289
and suspected terrorists from boarding commercial flights and to apply secondary
1290
screening procedures to others. The "no-fly" and "automatic selectee" lists include
1291
only those individuals who the U.S. government believes pose a direct threat of
1292
attacking aviation.
1293
Because air carriers implement the program, concerns about sharing intelligence
1294
information with private firms and foreign countries keep the U.S.government from
1295
listing all terrorist and terrorist suspects who should be included. The TSA has
1296
planned to take over this function when it deploys a new screening system to take
1297
the place of CAPPS. The deployment of this system has been delayed because of claims
1298
it may violate civil liberties.
1299
1300
Recommendation: Improved use of "no-fly" and "automatic selectee"
1301
lists should not be delayed while the argument about a successor to CAPPS
1302
continues. This screening function should be performed by the TSA, and it should
1303
utilize the larger set of watchlists maintained by the federal government. Air
1304
carriers should be required to supply the information needed to test and
1305
implement this new system.
1306
1307
CAPPS is still part of the screening process, still profiling passengers, with the
1308
consequences of selection now including personal searches of the individual and
1309
carry-on bags. TheTSA is dealing with the kind of screening issues that are being
1310
encountered by other agencies. As we mentioned earlier, these screening issues need
1311
to be elevated for high-level attention and addressed promptly by the government.
1312
Working through these problems can help clear the way for theTSA's screening
1313
improvements and would help many other agencies too. The next layer is the screening
1314
checkpoint itself. As the screening system tries to stop dangerous people, the
1315
checkpoint needs to be able to find dangerous items. Two reforms are needed soon:
1316
(1) screening people for explosives, not just their carry-on bags, and (2) improving
1317
screener performance.
1318
1319
Recommendation: The TSA and the Congress must give priority
1320
attention to improving the ability of screening checkpoints to detect explosives
1321
on passengers. As a start, each individual selected for special screening should
1322
be screened for explosives. Further, the TSA should conduct a human factors
1323
study, a method often used in the private sector, to understand problems in
1324
screener performance and set attainable objectives for individual screeners and
1325
for the checkpoints where screening takes place.
1326
1327
Concerns also remain regarding the screening and transport of checked bags and cargo.
1328
More attention and resources should be directed to reducing or mitigating the threat
1329
posed by explosives in vessels' cargo holds. The TSA should expedite the
1330
installation of advanced (in-line) baggage-screening equipment. Because the aviation
1331
industry will derive substantial benefits from this deployment, it should pay a fair
1332
share of the costs. The TSA should require that every passenger aircraft carrying
1333
cargo must deploy at least one hardened container to carry any suspect cargo. TSA
1334
also needs to intensify its efforts to identify, track, and appropriately screen
1335
potentially dangerous cargo in both the aviation and maritime sectors.
1336
The Protection of Civil Liberties
1337
Many of our recommendations call for the government to increase its presence in our
1338
lives-for example, by creating standards for the issuance of forms of
1339
identification, by better securing our borders, by sharing information gathered by
1340
many different agencies. We also recommend the consolidation of authority over the
1341
now far-flung entities constituting the intelligence community. The Patriot Act
1342
vests substantial powers in our federal government. We have seen the government use
1343
the immigration laws as a tool in its counterterrorism effort. Even without the
1344
changes we recommend, the American public has vested enormous authority in the U.S.
1345
government.
1346
At our first public hearing on March 31, 2003, we noted the need for balance as our
1347
government responds to the real and ongoing threat of terrorist attacks. The
1348
terrorists have used our open society against us. In wartime, government calls for
1349
greater powers, and then the need for those powers recedes after the war ends. This
1350
struggle will go on. Therefore, while protecting our homeland, Americans should be
1351
mindful of threats to vital personal and civil liberties. This balancing is no easy
1352
task, but we must constantly strive to keep it right.
1353
This shift of power and authority to the government calls for an enhanced system of
1354
checks and balances to protect the precious liberties that are vital to our way of
1355
life. We therefore make three recommendations.
1356
First, as we will discuss in chapter 13, to open up the sharing of information across
1357
so many agencies and with the private sector, the President should take
1358
responsibility for determining what information can be shared by which agencies and
1359
under what conditions. Protection of privacy rights should be one key element of
1360
this determination.
1361
1362
Recommendation: As the President determines the guidelines for
1363
information sharing among government agencies and by those agencies with the
1364
private sector, he should safeguard the privacy of individuals about whom
1365
information is shared.
1366
1367
Second, Congress responded, in the immediate aftermath of 9/11, with the Patriot Act,
1368
which vested substantial new powers in the investigative agencies of the government.
1369
Some of the most controversial provisions of the Patriot Act are to "sunset" at the
1370
end of 2005. Many of the act's provisions are relatively noncontroversial, updating
1371
America's surveillance laws to reflect technological developments in a digital age.
1372
Some executive actions that have been criticized are unrelated to the Patriot Act.
1373
The provisions in the act that facilitate the sharing of information among
1374
intelligence agencies and between law enforcement and intelligence appear, on
1375
balance, to be beneficial. Because of concerns regarding the shifting balance of
1376
power to the government, we think that a full and informed debate on the Patriot Act
1377
would be healthy.
1378
1379
Recommendation: The burden of proof for retaining a particular
1380
governmental power should be on the executive, to explain (a) that the power
1381
actually materially enhances security and (b) that there is adequate supervision
1382
of the executive's use of the powers to ensure protection of civil liberties. If
1383
the power is granted, there must be adequate guidelines and oversight to
1384
properly confine its use.
1385
1386
Third, during the course of our inquiry, we were told that there is no office within
1387
the government whose job it is to look across the government at the actions we are
1388
taking to protect ourselves to ensure that liberty concerns are appropriately
1389
considered. If, as we recommend, there is substantial change in the way we collect
1390
and share intelligence, there should be a voice within the executive branch for
1391
those concerns. Many agencies have privacy offices, albeit of limited scope. The
1392
Intelligence Oversight Board of the President's Foreign Intelligence Advisory Board
1393
has, in the past, had the job of overseeing certain activities of the intelligence
1394
community.
1395
1396
Recommendation: At this time of increased and consolidated
1397
government authority, there should be a board within the executive branch to
1398
oversee adherence to the guidelines we recommend and the commitment the
1399
government makes to defend our civil liberties.
1400
1401
We must find ways of reconciling security with liberty, since the success of one
1402
helps protect the other. The choice between security and liberty is a false choice,
1403
as nothing is more likely to endanger America's liberties than the success of a
1404
terrorist attack at home. Our history has shown us that insecurity threatens
1405
liberty. Yet, if our liberties are curtailed, we lose the values that we are
1406
struggling to defend.
1407
Setting Priorities for National Preparedness
1408
Before 9/11, no executive department had, as its first priority, the job of defending
1409
America from domestic attack. That changed with the 2002 creation of the Department
1410
of Homeland Security. This department now has the lead responsibility for problems
1411
that feature so prominently in the 9/11 story, such as protecting borders, securing
1412
transportation and other parts of our critical infrastructure, organizing emergency
1413
assistance, and working with the private sector to assess vulnerabilities.
1414
Throughout the government, nothing has been harder for officials-executive or
1415
legislative-than to set priorities, making hard choices in allocating limited
1416
resources. These difficulties have certainly afflicted the Department of Homeland
1417
Security, hamstrung by its many congressional overseers. In delivering assistance to
1418
state and local governments, we heard-especially in New York-about imbalances in the
1419
allocation of money. The argument concentrates on two questions.
1420
First, how much money should be set aside for criteria not directly related to risk?
1421
Currently a major portion of the billions of dollars appropriated for state and
1422
local assistance is allocated so that each state gets a certain amount, or an
1423
allocation based on its population-wherever they live.
1424
1425
Recommendation: Homeland security assistance should be based
1426
strictly on an assessment of risks and vulnerabilities. Now, in 2004,
1427
Washington, D.C., and New York City are certainly at the top of any such list.
1428
We understand the contention that every state and city needs to have some
1429
minimum infrastructure for emergency response. But federal homeland security
1430
assistance should not remain a program for general revenue sharing. It should
1431
supplement state and local resources based on the risks or vulnerabilities that
1432
merit additional support. Congress should not use this money as a pork
1433
barrel.
1434
1435
The second question is, Can useful criteria to measure risk and vulnerability be
1436
developed that assess all the many variables? The allocation of funds should be
1437
based on an assessment of threats and vulnerabilities. That assessment should
1438
consider such factors as population, population density, vulnerability, and the
1439
presence of critical infrastructure within each state. In addition, the federal
1440
government should require each state receiving federal emergency preparedness funds
1441
to provide an analysis based on the same criteria to justify the distribution of
1442
funds in that state.
1443
In a free-for-all over money, it is understandable that representatives will work to
1444
protect the interests of their home states or districts. But this issue is too
1445
important for politics as usual to prevail. Resources must be allocated according to
1446
vulnerabilities. We recommend that a panel of security experts be convened to
1447
develop written benchmarks for evaluating community needs. We further recommend that
1448
federal homeland security funds be allocated in accordance with those benchmarks,
1449
and that states be required to abide by those benchmarks in disbursing the federal
1450
funds. The benchmarks will be imperfect and subjective; they will continually
1451
evolve. But hard choices must be made. Those who would allocate money on a different
1452
basis should then defend their view of the national interest.
1453
Command, Control, and Communications
1454
The attacks on 9/11 demonstrated that even the most robust emergency response
1455
capabilities can be overwhelmed if an attack is large enough. Teamwork,
1456
collaboration, and cooperation at an incident site are critical to a successful
1457
response. Key decisionmakers who are represented at the incident command level help
1458
to ensure an effective response, the efficient use of resources, and responder
1459
safety. Regular joint training at all levels is, moreover, essential to ensuring
1460
close coordination during an actual incident.
1461
1462
Recommendation: Emergency response agencies nationwide should adopt
1463
the Incident Command System (ICS). When multiple agencies or multiple
1464
jurisdictions are involved, they should adopt a unified command. Both are proven
1465
frameworks for emergency response. We strongly support the decision that federal
1466
homeland security funding will be contingent, as of October 1, 2004, upon the
1467
adoption and regular use of ICS and unified command procedures. In the future,
1468
the Department of Homeland Security should consider making funding contingent on
1469
aggressive and realistic training in accordance with ICS and unified command
1470
procedures. The attacks of September 11, 2001 overwhelmed the response
1471
capacity of most of the local jurisdictions where the hijacked airliners crashed.
1472
While many jurisdictions have established mutual aid compacts, a serious obstacle to
1473
multijurisdictional response has been the lack of indemnification for mutual-aid
1474
responders in areas such as the National Capital Region.
1475
Public safety organizations, chief administrative officers, state emergency
1476
management agencies, and the Department of Homeland Security should develop a
1477
regional focus within the emergency responder community and promote
1478
multi-jurisdictional mutual assistance compacts. Where such compacts already exist,
1479
training in accordance with their terms should be required. Congress should pass
1480
legislation to remedy the long-standing indemnification and liability impediments to
1481
the provision of public safety mutual aid in the National Capital Region and where
1482
applicable throughout the nation. The inability to communicate was a critical
1483
element at the World Trade Center, Pentagon, and Somerset County, Pennsylvania,
1484
crash sites, where multiple agencies and multiple jurisdictions responded. The
1485
occurrence of this problem at three very different sites is strong evidence that
1486
compatible and adequate communications among public safety organizations at the
1487
local, state, and federal levels remains an important problem.
1488
1489
Recommendation: Congress should support pending legislation which
1490
provides for the expedited and increased assignment of radio spectrum for public
1491
safety purposes. Furthermore, high-risk urban areas such as New York City and
1492
Washington, D.C., should establish signal corps units to ensure communications
1493
connectivity between and among civilian authorities, local first responders, and
1494
the National Guard. Federal funding of such units should be given high priority
1495
by Congress.
1496
1497
Private-Sector Preparedness
1498
The mandate of the Department of Homeland Security does not end with government; the
1499
department is also responsible for working with the private sector to ensure
1500
preparedness. This is entirely appropriate, for the private sector controls 85
1501
percent of the critical infrastructure in the nation. Indeed, unless a terrorist's
1502
target is a military or other secure government facility, the "first" first
1503
responders will almost certainly be civilians. Homeland security and national
1504
preparedness therefore often begins with the private sector.
1505
Preparedness in the private sector and public sector for rescue, restart, and
1506
recovery of operations should include (1) a plan for evacuation, (2) adequate
1507
communications capabilities, and (3) a plan for continuity of operations. As we
1508
examined the emergency response to 9/11, witness after witness told us that despite
1509
9/11, the private sector remains largely unprepared for a terrorist attack. We were
1510
also advised that the lack of a widely embraced private-sector preparedness standard
1511
was a principal contributing factor to this lack of preparedness.
1512
We responded by asking the American National Standards Institute (ANSI) to develop a
1513
consensus on a "National Standard for Preparedness" for the private sector. ANSI
1514
convened safety, security, and business continuity experts from a wide range of
1515
industries and associations, as well as from federal, state, and local government
1516
stakeholders, to consider the need for standards for private sector emergency
1517
preparedness and business continuity.
1518
The result of these sessions was ANSI's recommendation that the Commission endorse a
1519
voluntary National Preparedness Standard. Based on the existing American National
1520
Standard on Disaster/Emergency Management and Business Continuity Programs (NFPA
1521
1600), the proposed National Preparedness Standard establishes a common set of
1522
criteria and terminology for preparedness, disaster management, emergency
1523
management, and business continuity programs. The experience of the private sector
1524
in the World Trade Center emergency demonstrated the need for these standards.
1525
1526
Recommendation: We endorse the American National Standards
1527
Institute's recommended standard for private preparedness. We were encouraged by
1528
Secretary Tom Ridge's praise of the standard, and urge the Department of
1529
Homeland Security to promote its adoption. We also encourage the insurance and
1530
credit-rating industries to look closely at a company's compliance with the ANSI
1531
standard in assessing its insurability and creditworthiness. We believe that
1532
compliance with the standard should define the standard of care owed by a
1533
company to its employees and the public for legal purposes. Private-sector
1534
preparedness is not a luxury; it is a cost of doing business in the post-9/11
1535
world. It is ignored at a tremendous potential cost in lives, money, and
1536
national security.
1537
1538
1539
1540
1541