9/11

The terrorist attacks of September 11, 2001, killed nearly three thousand Americans, led to two major wars, and redefined the contours of U.S. foreign policy. 

 

CFR continues to examine the legacy of 9/11, and offers selections from its archive of coverage. 

The U.S. military detention center at Guantanamo Bay, Cuba, has generated intense debate for two decades, raising enduring questions about national security, human rights, and justice.
Sep 9, 2022
The U.S. military detention center at Guantanamo Bay, Cuba, has generated intense debate for two decades, raising enduring questions about national security, human rights, and justice.
Sep 9, 2022
  • United States
    Examining Counterterrorism Culture
    Counterterrorism agencies in the United States proudly point to the lack of a “second 9/11 attack” in response to critics of their methods. Here’s a look at the continuing debate over the proper organization of U.S. counterterrorism agencies.
  • United States
    The United States and the Geneva Conventions
    Backgrounder: U.S. debate over treatment of detainees hinges on interpretation of the Geneva Conventions.
  • United States
    Priorities for Homeland Security
    Statement before the Senate Committee on Homeland Security and Governmental Affairs Thank you for the opportunity to address the committee on this vital topic. Just as a preamble, my remarks do not reflect the views of the Council on Foreign Relations, which does not have a corporate position on these matters. My understanding of the Committee’s objectives in holding this hearing is that witnesses should focus on the future and address themselves to issues that might help both Congress and the Executive branch set homeland security priorities. The Committee it seems to me is doing the right thing. Our vulnerability at home to terrorist assault, as well as to natural disasters, is essentially infinite. The fact is that not everything can be protected. Judicious decisions about what to protect given our wholesale and inevitable exposure to attack by clever and disciplined terrorists are essential. What follows are my personal reflections on this vexing problem. Given the myriad threats to our infrastructure—critical and otherwise—and to the lives of our fellow citizens, other analysts will legitimately come to different conclusions about the best way to focus our collective efforts and especially those of the agencies under the jurisdiction of this committee, and of departments and agencies with which DHS must interact continuously and cooperatively in order to fulfill its daunting mandate. I will concentrate on three issues: first, the importance of cities as terrorist havens and terrorist targets; second, the continuing significance to many jihadists of weapons of mass destruction (WMD); and third, the need to preserve the good will and sense of belonging of America’s Muslim communities as a matter of national security, beyond the intrinsic virtues of a cohesive, considerate society in which citizens of all creeds can feel at home. Urban Warfare The jihad that has evolved since September 11th has become a war of cities. The transition from caves to condos, as one observer described this evolution, is impressive. Although the relatively remote, rural bases that incubated the jihad had strong advantages, especially given the centrality of social networks to the early jihad, municipalities have their own attractions. They offer anonymity, but also community, both of which can confer a kind of cover. Urban neighborhoods, with their numberless apartments, coffee-houses, mosques and Islamic centers, provide the setting for recruitment, clandestine meetings, preparation of weapons and other activities that form the terrorist enterprise. Moreover, the majority of urban areas in which jihadists have established a presence are not targets for air strikes, Hellfire missiles, or submarine-launched cruise missiles. Think of Muhammad Atta’s Hamburg, or the Leeds of Muhammad Siddique Khan, orchestrator of the 7/7 bombings of the London underground and bus systems. Post-bin Laden jihadists are not the first militants to avail themselves of these tactical conveniences. The radical campaign in Egypt that began in mid-1970s was spawned in Cairo, one of the world’s largest cities. And of course non-Muslim terrorist organizations, such as the Provisional Irish Republican Army (IRA), have long thrived in urban areas. It could be said that having adapted to city life, the jihad has really come into its own. Qualities that favor the jihadists’ defensive requirements do not tell the whole story. The other side is that cities are where their targets—both symbolic and of flesh-and-blood—are to be found in abundance and proximity. There are many aspects of Islamist militancy that are quintessentially modern. The transformation of cities into fields of jihad is a classic example of the movement’s modernity. It is part and parcel of the post-World War II process of urbanization that swept the Middle East, North Africa and Pakistan. Large-scale migration of Muslims to Europe represents perhaps the last phase of this urbanizing process. In these cities, Muslims radicalized by a potent combination of powerful imagery in the media, socio-economic exclusion, and a set of simple, but internally consistent religious and ideological concepts, have ample targets for their hunger for retribution and duty—from their perspective—of self-defense. One of the striking features of contemporary Muslim public opinion to emerge from recent Pew polls is the degree to which Muslims in far-flung, diverse places have come to see themselves as having “more in common nowadays.” This attitude can be seen at work in the United Kingdom, Spain, Germany, The Netherlands and Denmark. Events far removed geographically from these countries, especially developments in Iraq, have mobilized youth in each of their capitals. New York has already shown itself to be a crucial target for jihadists. This great city was construed by al-Qaeda to be the beating heart of America’s economy, which bin Laden believed he could cripple; the symbol of American arrogance as embodied by the “looming towers” of the World Trade Center; and the seat of Jewish power, which jihadists believe accounts for the global subordination of Muslim interests to America and Israel. It is also a teeming city, whose large and densely packed population promised the most efficient path to a successful mass attack that—from a jihadist viewpoint—might begin to even the score with the United States. There is no reason to think that this conviction has weakened. Furthermore, New York City proffers the same advantages to the attacker as do all large cities. The array of targeting opportunities in New York is wide. Although we can be perversely certain that the attack, when it comes, will be the one we least expected, some preliminary judgments are possible. Mass transportation, which the jihadists have attacked elsewhere with some success, the financial district or banks, symbols of authority, and perhaps schools, given al Qaeda’s insistence on the need to avenge the tens of thousands of Muslim children it believes were deliberately killed by the U.S., either directly or through Israeli action thought to be sponsored by Washington. Car or truck bombs—the icon of urban violence in Iraq and used effectively before then in Lebanon and Argentina by Hezbollah and elsewhere by others including the IRA, the Basque separatist group ETA and the Baader-Meinhof gang—should also be expected at some point. Similarly, we might expect Palestinian style backpack bombs carried into restaurants or other public places by solitary suicidal attackers. The implications of this analysis are, first, that community policing and extensive video surveillance probably need to be stepped up. In this kind of urban warfare, intelligence is acquired best by those who are most familiar with the terrain: police officers walking their beat. On the front line, they get to know their neighborhoods, the residents and the shopkeepers, form and cultivate relationships with local citizens, and develop a sense of the natural order of things and therefore of signs that something is out of the ordinary or warrants investigation. The pivotal role of local law enforcement is reinforced by the incapacity of federal authorities to gather information skillfully, discretely, effectively, and without alienating potential sources of intelligence. The FBI, in particular, presently lacks the numbers, skills, knowledge base and orientation to contribute. This does not mean however that local law enforcement can or should operate in a vacuum, especially in light of connections that have been disclosed between the self-starter groups in the U.K. and al-Qaeda figures in Pakistan. On the contrary, local police need an umbilical connection to national intelligence agencies in order to connect the dots they’re collecting on the ground. It is worth noting that the success of the UK counterterrorism effort in Northern Ireland was largely due the tight linkages between the local police, national police, and Britain’s domestic intelligence agency that were forged early in the conflict. Yet information sharing, which all parties claim to be essential, has not advanced significantly. In part this seems to be due to a lack of leadership, and in part to a slow pace of work that seems incommensurate with the urgency of the threat. Thus, issuance of U.S. government sponsored clearances for local police officers, the necessary first step toward sharing intelligence information, has lagged. Even the New York Police Department (NYPD), which has built a very aggressive intelligence collection program and uncommonly close ties to Washington intelligence agencies, has only about 350 cleared officers, or less than one per cent of the force. Many of these patrolmen and detectives have clearances via their status as military reservists rather than as police officers. Countrywide, cleared personnel are usually the handful of detailees to the local Joint Terrorism Task Force. The circle clearly needs to widen. The other dimension to this issue is the apparent substitution of quantity for quality as Washington’s criterion for information sharing with local law enforcement. This puts municipal authorities in the worst of both worlds. The information does not help them do their jobs better, while the sheer volume of unhelpful information can make it harder to manage their responsibilities. The bigger question, however, is where these police officers will come from, at a time when State, local and federal budgets are under severe pressure. In the upcoming federal budget cycle the COPS program is again under pressure to be cut. This program has put more than 100,000 new police officers on the street over the last decade. Instead of eliminating this program it should be revamped to create the local intelligence capacity cities need. WMD Amid growing concerns about the vulnerability of ground transportation, civil aviation, financial institutions and landmarks to large bombs, one should not lose sight of the chemical, biological, radiological and nuclear threats. As many experts have usefully pointed out, jihadists, like other terrorists, prefer tried-and-true methods and shy away from technical innovation. This is certainly true as a general proposition, despite important exceptions, from the first use of dynamite by anarchists early in the 20th century to the experimentation with stabilized liquid explosives by Ramzi Ahmed Yousef in 1995. Yet intramural jihadist tactical and strategic discussions frequently refer to the use of one or another form of weapon of mass destruction. Not every contributor to this debate defines the utility of these weapons in the same way. For some jihadists, WMDs are the golden key to a reversal of fortune, for which the Muslim world allegedly yearns. Others see these weapons in less apocalyptic terms and more as tools for “worldly war.” For these jihadists, unconventional weapons are the indispensable instruments of the weaker party in an asymmetric struggle. Whether such a weapon is used in the belief that it will decisively settle the argument between Muslims and their chief enemy, or in pursuit of tactical effects meant to deter the enemy or deny him specific options, a toxic or radiological release or detonation of a nuclear weapon would have dramatic consequences. The social and economic effects would obviously be proportional to the damage, but the baseline for these effects would be high. Thus, most experts believe that if such a weapon is used it is unlikely to cause mass casualties. Nevertheless, even an attack that took relatively few lives would have an emotional and psychological impact that could tear the fabric of our society and undermine the social contract between government and society. It would also have sizable, perhaps open-ended economic costs, especially if the attacks were repeated or authorities could not assure citizens that the attackers had all been captured or killed. The implication here is twofold. First, Washington must make consequence management a priority. This means not only allocating appropriated funds, but also establishing a high, federally defined performance standard that cities would have to meet reasonably swiftly. The reason for this emphasis on consequence management is simply that a well-planned attack will be difficult to prevent without an uncommon dose of good luck. This being the case, the surest way to stave off the worst emotional, political and economic damage is to show not only the victimized community, but also the American public that the effects of the attack are being handled with confidence and competence by local and federal authorities working quickly and smoothly—and in lockstep. Efforts to do this have been broached repeatedly, ever since the second Nunn-Lugar bill was signed into law in 1996. Some of these initiatives failed because the government was not structured in a way that yielded a lead agency that could or would be held responsible for this important job. Now that we have a Department of Homeland Security, this impediment has been swept away. It is now time to systematize consequence management where it matters most, which is in large American cities. The other implication is that Washington and local leaders must begin soon to educate the public about the kind of CBRN attacks that are likely to occur. The purpose is not to scare people. Rather, it is to ensure that Americans understand that for the foreseeable future, a CBRN attack will not necessarily equate to instant annihilation, that it is likely to kill or wound relatively small numbers, and that the federal government and local authorities are prepared for such an eventuality. This is easier said than done, owing to the non-trivial risk that terrorists acquire a weapon capable of a catastrophic nuclear yield. An educational initiative would have to acknowledge this possibility, even as it strove to counter the effect of the Katrina aftermath on public confidence in the competence of their government. As part of this effort, dedicated broadcasting channels should be set up so that authorities can communicate with the public throughout a crisis and so that the public knows exactly how to “tune-in” to this source of information and guidance. Given the plethora of electronic media and the scarcity of bandwidth, operationalizing this recommendation will not be easy. In a crisis, however, we will wish we had it available. It goes without saying that the trans-attack and post-attack message must be fully coordinated among federal state and local agencies. It will be just as vital for all these players to have decided beforehand who will be empowered to speak publicly and about what. In the absence of such discipline, the public will be awash in contradictory and inconsistent statements and quickly conclude that no one is in charge. This perception will fuel the panic and desperation latent in what will be a terrifying and unprecedented situation. Muslim-Americans The 9/11 disaster showed that skilled, self-possessed and highly determined attackers could do tremendous damage to the homeland without having to rely on a support network within the United States. Halting and uneven progress on border security, especially at airports, has reduced the probability of this sort of attack by injecting uncertainty into terrorist calculations of their chances of getting in. Deterrence at that level does seem to work. This type of attack, however, is not the adversary’s sole option. Other approaches do require infrastructure, in the shape of cells that may or may not be linked to outside networks. A glance toward Western Europe, where this phenomenon seems to be well established, raises questions about circumstances here at home. The conventional wisdom is that Europe’s Muslim’s discontent is a result of failed immigration policies that could not affect America’s prosperous, happy Muslims, who have benefited from the welcoming embrace of our “melting pot” nation. This view may not reflect reality, even if it once did. Recent research shows that “the real story of American Muslims is one of accelerating alienation,” which could produce a “rejectionist generation.” Muslims are increasingly choosing not to assimilate into American society, finding solace in their religious identity instead. Muslim students’ associations on college campuses are growing rapidly as havens for Muslims who prefer not to socialize with non-Muslims, and Muslims are building Islamic schools as alternatives to a public school system perceived as inhospitable. To thwart media bias, Muslims are developing their own radio programs and publications. These initiatives may resemble those taken by other religious and ethnic groups in the United States since the nineteenth century to promote acceptance and assimilation. But the Muslims’ situation differs in that many perceive their nation’s foreign and domestic policy agenda as a campaign against their faith. The domestic aftermath of the 9/11 attacks implied that a low religious profile was better for their health, that they couldn’t take their civil rights for granted, and that their interests depended on the absence of serious future attacks within the United States. Iraq further dimmed America’s promise to its Muslims. The U.S. Muslim community is deeply skeptical about U.S. democracy promotion, which many think are undercut by lack of due process at home and support for authoritarian rulers abroad. In particular, Muslims vocally decry what they see as the biased implementation of the USA PATRIOT Act and the absence of official American sympathy for the victimization of Muslims worldwide, especially Palestinians. The evolving attitudes of non-Muslim Americans towards their Muslim compatriots are likely to spur alienation. According to a 2006 Gallup poll, a third of Americans admire “nothing” about the Muslim world. Nearly half of all Americans believe the U.S. government should restrict the civil liberties of Muslim Americans. Since September 11, they have faced increasing racism, employment and housing discrimination, and vandalism. The Justice Department has undertaken high-profile prosecutions based on meager evidence, flawed procedure or misidentification. Media coverage dwelling on the violence associated with radical Islam, and ignoring the respectable lifestyles of most American Muslims, along with rhetoric of some on the Christian Right casting the war on terrorism as a clash of religions, contributes to the public’s misunderstanding of Islam. To be sure, Muslims in the United States have shown no sign of violent protest, and American Muslims’ relative prosperity may function as a brake on radicalization. Yet U.S. Muslims’ post-9/11 insularity suggests that some, like many European Muslims, may seek psychological sanctuary in the umma—that is, the notional global community of Muslims. And the umma is where Osama bin Laden’s brand of militancy has maximum traction. The U.S. government also has not manifested trust in the nation’s Muslims. While the pool of Muslims available for official duty may not be large, the federal government has made no serious efforts to recruit Muslims for confirmable policy positions. Meanwhile, mutual distrust has burgeoned. The U.S. administration should consult American Muslims directly and earnestly on foreign-policy issues, as is it has customarily done with other politically important minority constituencies—e.g., American Jews with respect to Israel, Irish-Americans on Northern Ireland, and Greek-Americans as to Turkey and Cyprus. The difference here is that the electoral leverage of American Muslims is relatively weak. But their potential vulnerability to an incendiary ideology of confrontation that is being disseminated transnationally should override the normal course of domestic politics. Fear of being punished at the polls should not be the only incentive to be more attentive to Muslim concerns and anxieties. Finally, the Madrid and London bombings only confirm that governments need to understand the campaign against transnational Islamist terrorism as an internal security problem to a much greater extent than they have so far. The current approach, however, has been simply to enforce a zero-tolerance immigration policy with respect to the Muslim community. This dispensation has the doubly perverse quality of being both ineffective in counter-terrorism terms and alienating with respect to Muslim Americans. Domestic law enforcement’s ranks should also include more Muslims, both to improve the FBI’s understanding of and links with Muslim communities and to give Muslims a sense of ownership of America’s security challenges. American Muslims do not remotely pose the domestic threat that European Muslims do. To ensure it stays that way, they need to be embraced—not spurned. I put this issue before the committee for lack of a better place. The challenge outlined here requires leadership and a program. Yet given the way our government is structured, there is no obvious lead agency, or special assistant to the President on the National Security Council or Homeland Security Council, to formulate a program or provide the leadership. We are not the first to face this conundrum. Several years ago, in the wake of a Whitehall study showing upwards of 10,000 al Qaeda supporters in Great Britain, Her Majesty’s government tasked the Security Service—MI5—both to dismantle jihadist networks and devise a plan to win the hearts and minds of Britain’s Muslim minority. Ultimately, the Security Services balked at a difficult job for which they had no experience or clear jurisdiction. We need to do better. Fortunately, unlike our sister democracies across the Atlantic, we have time. We must not squander it.
  • United States
    Targets for Terrorists: Post-9/11 Aviation Security
    The air travel system remains one of the most high-profile targets for terrorists. This backgrounder examines efforts to improve aviation security since the 9/11 attacks.
  • United States
    Hamilton: In Five Years Since 9/11, United States Is ’Safer But Not Safe’
    Lee H. Hamilton, the vice-chairman of the National Commission on Terrorist Attacks upon the United States (also known as the 9/11 Commission), says "I would agree with the general assessment that we are safer than we were prior to 9/11, but we are not safe." While he is concerned about better protecting the United States from weapons of mass destruction, he is greatly worried about bioterrorism and ordinary chemical weapons.
  • Terrorism and Counterterrorism
    Al-Qaeda Crippled But Resilient
    Former U.S. counterterrorism coordinator Henry A. Crumpton says al-Qaeda is still capable of inspiring attacks.
  • International Law
    Feldman: Guantanamo Detainees May be Difficult to Try, Depending on Hamdan Ruling
    CFR Adjunct Fellow Noah Feldman, discussing the legal issues at stake in the upcoming Hamdan decision, says the case will decide whether military tribunals are constitutionally sufficient and warns that if the Supreme Court rules current trial procedures inadequate, it may be difficult to try many of the nearly 500 Guantanamo detainees.
  • Nonproliferation, Arms Control, and Disarmament
    The Limitations of the Current U.S. Government Efforts to Secure the Global Supply Chain against Terrorists Smuggling a WMD and a Proposed Way Forward
    Written Testimony before a hearing of the  Permanent Subcommittee on Investigations Committee on Homeland Security and Governmental Affairs United States Senate on “Neutralizing the Nuclear and Radiological Threat: Securing the Global Supply Chain” By Stephen E. Flynn, Ph.D. Commander, U.S. Coast Guard (ret.) Jeane J. Kirkpatrick Senior Fellow in National Security Studies Council on Foreign Relations Washington, D.C. Chairman Coleman, Senator Levin, and distinguished members of the Permanent Subcommittee on Investigations.  I am honored to appear before you again this morning, this time alongside Governor Tom Kean, to discuss the vital issue of nuclear smuggling and supply chain security.  At the outset, Mr. Chairman, I want to thank you for the outstanding leadership you have been providing in both raising the profile and advancing practical approaches to this complex challenge.  You have been hard at work on this issue long before the Dubai Ports World controversy made the issue of port and container security a hot-button issue here in Washington.  I also want to commend the work of Ray Shepherd and Brian White of your staff for their tireless oversight of the activities of the U.S. government on these issues.  I would count Mr. Shepherd and Mr. White along with Kathleen Kraninger and Jason Yanussi who are on the staff of the Senate Homeland Security and Governmental Affairs committee, as four of the most knowledgeable individuals on supply chain and container security in Washington. As I will outline below, the Government Accountability Office is largely on the mark in highlighting a number of serious shortcomings in the design and execution of the radiation detection programs being pursued by the Department of Energy and the Department of Homeland Security.  However, before getting into the particulars about what are the limits of these programs and outlining some recommendations for next steps, I think it important to review the nature of the terrorist threat as it relates to this issue. Let me share with you the terrorist scenario that most keeps me awake at night that I recently shared with the House Armed Services Committee.  This scenario has been informed by insights provided to me by Gary Gilbert, the Chairman of the Corporate Security Council and Senior Vice President for Hutchison Port Holdings (HPH) who will be testifying before you on Thursday, March 30th.  A container of athletic foot wear for a name brand company is loaded at a manufacturing plant in Surabaya, Indonesia.  The container doors are shut and a mechanical seal is put into the door pad-eyes.  These designer sneakers are destined for retail stores in malls across America.  The container and seal numbers are recorded at the factory. A local truck driver, sympathetic to al Qaeda picks up the container.  On the way to the port, he turns into an alleyway and backs up the truck at a nondescript warehouse where a small team of operatives pry loose one of the door hinges to open the container so that they can gain access to the shipment.  Some of the sneakers are removed and in their place, the operatives load a dirty bomb wrapped in lead shielding, and they then refasten the door.  The driver takes the container now loaded with a dirty bomb to the port of Surabaya where it is loaded on a coastal feeder ship carrying about 300 containers for the voyage to Jakarta.  In Jakarta, the container is transferred to an Inter-Asia ship which typically carry 1200-1500 containers to the port of Singapore or the Port of Hong Kong.   In this case, the ships goes to Hong Kong where it is loaded on a super-container ship that carriers 5000-8000 containers for the trans-Pacific voyage.  The container is then off-loaded in Vancouver, British Columbia.  Because it originates from a trusted-name brand company that has joined the Customs-Trade Partnership Against Terror, the shipment is never identified for inspection by the Container Security Initiative team of U.S. customs inspectors located in Vancouver.  Consequently, the container is loaded directly from the ship to a Canadian Pacific railcar where it is shipped to a rail yard in Chicago.  Because the dirty bomb is shielded in lead, the radiation portals currently deployed along the U.S.-Canadian border do not detect it.  When the container reaches a distribution center in the Chicago-area, a triggering device attached to the door sets the bomb off. There would be four immediate consequence associated with this attack.  First, there would be the local deaths and injuries associate with the blast of the conventional explosives.  Second, there would be the environmental damage done by the spread of industrial-grade radioactive material.  Third, there would  be no way to determine where the compromise  to security took place so the entire supply chain and all the transportation nodes and providers must be presumed to present a risk of a potential follow-on attack.  Fourth—and perhaps most importantly—all the current container and port security initiatives would be compromised by the incident.  In this scenario, the container originated from a one of the 5,800 companies that now belong to the Customs-Trade Partnership Against Terrorism. It would have transited through multiple ports—Surabaya, Jakarta, Hong Kong, and Vancouver—that have been certified by their host nation as compliant with the post-9/11 International Ship and Port Facility Security (ISPS) Code that came into effect on 1 July 2004.  Because it came from a trusted shipper, it would not have been identified for special screening by the Container Security Initiative team of inspectors in Hong Kong or Vancouver.  Nor would it have been identified by the radiation portal.  As a consequence, governors, mayors, and the American people would have no faith in the entire risk-management regime erected by the administration since 9/11.  There will be overwhelming political pressure to move from a 5 percent physical inspection rate to a 100 percent inspection rate, effectively shutting down the flow of commerce at and within our borders.  Within two weeks, the reverberations would be global.   As John Meredith, the Group Managing Director of Hutchison Port Holdings, warned in a Jan 20, 2004 letter to Robert Bonner, the former Commissioner of the U.S. Customs and Border Protection: “. . . I think the economic consequences could well spawn a global recession – or worse.”  In short the stakes are enormous.  But there are four factors associated with the scenario that I just laid out that usefully informs the focus of this hearing.  First, the threat is not so much tied to seaports and U.S. borders as it is global supply chains that now largely operate on an honor system because the standards are so nominal.  Second, no transportation provider, port operator, or border inspector really know what are in the containers that pass through their facilities and the radiation portal technology currently being deployed at U.S. borders and as a part of the Second Line of Defense and Megaports programs can be evaded by placing light shielding around a weapon.  Third, private companies must be a part of the solution since they have huge investments at stakes.  Fourth, the scenario I just laid out involved Vancouver as the offload port in North America, highlighting that the challenge of securing global supply chains can involve both port security and border security measures simultaneously. I believe that we are living on borrowed time when it comes to facing some variation of the scenario I have just laid out.  This is because both the opportunity for terrorists to target legitimate global supply chains remain plentiful and the motivation for doing so is only growing as jihadis gravitate towards economic disruption as a major tactic in their war with the United States and the West.   Let me elaborate on this latter point.  The primary conclusion that I reached in researching my book, America the Vulnerable, is that Americans and the West much assume that our most critical infrastructures that underpin our economy will become the targets of choice for terrorist groups like al-Qaeda.  This perspective runs contrary to the longstanding view of terrorism that has held that terrorists are mainly interested in symbolic and spectacular acts of violence that kill lots of people.  I point to the attacks on the London public transit system on July 7, 2005, to substantiate my thesis.  On that day, suicide bombers simultaneously set off their explosives in subway cars that were in dark tunnels resulting in far fewer deaths than had those same suicide bombers gone to Buckingham palace during the changing of the guard.  Further, an attack on a public event would have generated far more dramatic images since there would have been plenty of cameras on hand to capture the destruction and resultant mayhem.  But the goal of the London terrorists appears to have been not so much about random killings of innocent civilians as it was an attempt to dissuade Londoners from using their mass transit system, thereby crippling the city economically. This trend towards economic targeting has been growing in Iraq as well. Beginning in June 2003, Iraq’s energy sector became a primary target for insurgents.  By mid-July 2005 nearly 250 attacks on oil and gas pipelines had cost Iraq more than $10 billion in loss oil revenue.  Successful attacks on the electrical grid has kept average daily output at 5 to 10 percent below the prewar level despite the $1.2 billion the United States has spent too improve Iraqi electrical production.  To be sure, there is amble evidence that the war in Iraq has been attracting foreign insurgents and al Qaeda sympathizers to Baghdad versus to Main Street.  However, this is likely to prove to be a short-term reprieve that poses a longer-term danger as insurgents become increasingly skilled at targeting critical infrastructure.  Against this strategic backdrop, I believe there remains too little appreciation within the U.S. government that global supply chains and the intermodal transportation system that supports them remains a very vulnerable critical infrastructure to mass disruption.  Instead, U.S. border agencies and the national security community have been looking at supply chains as one of a menu of smuggling venues.  Some agencies like the Coast Guard and the Office of Naval Intelligence has argued that a weapon of mass destruction is more likely to be smuggled into the United States on a fishing vessel, ocean-going yacht, or a bulk cargo vessel, rather than in a container.  This is probably an accurate assumption in the case of a nuclear weapon.  A nuclear weapon would be such a high-value asset to a terrorist organization that they would be unlikely to surrender custody of it to unwitting third parties to transport it.  But the opposite reason applies to a “dirty bomb” which is more commonly referred to by national security experts as a “weapon of mass disruption” because its lethality is fairly limited, a factor primarily of the conventional explosives with which it is made.  The radioactive material contained in the bomb would create costly environmental damage and potentially some long term health risks for those who were exposed, but not immediate deaths.  The fact that a “dirty bomb” is suited for disruption makes it an ideal weapon to set off within the intermodal transportation system, precisely because it would generate the kinds of consequences that my scenario portends. For the foreseeable future, the material to make a dirty bomb will likely be available throughout the international community despite even stepped-up counter-proliferation.  This is because the radioactive materials that can be used in the construction of these weapons are becoming more widely available as sophisticated medical and engineering equipment are purchased and used throughout the international community.   As Gene Aloise of the Government Accountability Office will testify to in the next panel, according to the International Atomic Energy Agency, between 1993 and 2004, there were 662 confirmed cases of illicit-trafficking in nuclear and radiological materials worldwide, over 400 of which involved radioactive materials that could be used to produce a radiation dispersal device or “dirty bomb.”  These materials have been finding their ways to black markets and will continue to do so.  It is against this threat backdrop that we should evaluate the effectiveness of U.S. government programs who aim to confront this threat.  The possibility that terrorists could compromise the maritime and intermodal transportation system and global supply chains has led several U.S. agencies to pursue initiatives designed to manage this risk.  The U.S. Coast Guard chose to take primarily a multilateral approach by working through the London-based International Maritime Organization to establish new international standards for improving security practices on ocean-going vessels and within ports, called the International Ship and Port Facility Code (ISPS).  As of July 1, 2004, each member state was obliged to certify that the ships that fly their flag or the facilities under their jurisdiction are compliant.  The Coast Guard also requires that ships destined for the United States provide a notice of their arrival a minimum of 96 hours in advance to include a description of their cargoes and a crew and passenger list.  The agency then assesses the potential risk the vessel might pose and if the available intelligence indicates a pre-arrival boarding might be warranted, it arranges to intercept the ship at sea or as it enters the harbor in order to conduct an inspection. The U.S. Customs and Border Protection Agency (CBP) has pursued a mix of unilateral, bilateral, and multilateral approaches.  First, U.S. customs authorities mandated that ocean carriers electronically file cargo manifests outlining the contents of containers destined for the United States 24 hours in advance of their being loaded in an overseas port.   These manifests are then analyzed against the intelligence and other databases at CBP’s new National Targeting Center to determine if the container may pose a risk.  If the answer is yes, it will likely be inspected overseas before it is loaded on a U.S.-bound ship under a new protocol called the Container Security Initiative (CSI).  As of March 2006, there were 43 CSI port agreements in place where the host country permits U.S. customs inspectors to operate within its jurisdiction and agrees to conduct pre-loading inspections of any containers targeted by them.  Decisions about which containers will not be subjected to an inspection are informed by an importer’s willingness to participate in another post-9/11 initiative known as the Customs-Trade Partnership against Terrorism (C-TPAT).  C-TPAT importers and transportation companies voluntarily agree to conduct self-assessments of their company operations and supply chains and then put in place security measures to address any security vulnerabilities they find.    At the multilateral level, U.S. customs authorities have worked with the Brussels’ based World Customs Organization on establishing a new non-binding framework to improve trade security that all countries are being encouraged to adopt.  In addition to these Coast Guard and Customs initiatives, the U.S. Department of Energy, Department of State, and Department of Defense have developed their own programs aimed at the potential weapons of mass destruction threat.  They have been focused primarily on developing the means to detect and intercept a “dirty bomb” (a conventional explosive device that contains radioactive materials used in commercial applications), the fissile ingredients such as plutonium and highly-enriched uranium used in the construction of a nuclear weapon, and a nuclear weapon itself.  The Energy Department has been funding and deploying radiation sensors in many of the world’s largest ports as a part of a program called the Megaport Initiative.  These sensors are designed to detect radioactive material within containers while trucks drive past them.  The State Department is spearheading the Export Control and Related Border Security Assistance Program that includes providing equipment and training for border control agencies. Department of Defense has undertaken a “Proliferation Prevention Initiative” that involves obtaining permission from seafaring countries to allow specially trained U.S Navy boarding teams to conduct inspections of a flag vessel on the high seas when there is intelligence that points to the possibility that smuggled nuclear material or a weapon may be part of the ship’s cargo. Finally, in September 2005, the White House has weighed in directly on container security as a part of its new “National Maritime Security Strategy”. The strategy creates an interagency process to oversee the development of eight supporting plans.  These include an “International Outreach and Coordination Strategy,” a “Maritime Transportation System Security Plan,” and a “Maritime Infrastructure Recovery Plan.”  The stated objective of the strategy and these plans is to “present a comprehensive national effort to promote global economic stability and protect legitimate activities while preventing hostile or illegal acts within the maritime domain.” On its face, this vast menu of U.S. government initiatives since 9/11 suggests substantial progress is being made in securing the global trade and transportation system.  Unfortunately, all this activity should not be confused with real capability.  For one thing, the approach has been a piecemeal one, with each agency pursuing its signature program or programs with little regard for the other initiatives.  There are also vast disparities in the resources that the agencies have been allocated.  But more problematic are some of the questionable assumptions about the nature of the terrorist threat that underpin these programs.   Further, in an effort to secure funding and public support, agency heads and the White House have oversold the contributions these new initiatives are making towards addressing a very complicated and high-stake challenge.  Against a backdrop of inflated and unrealistic expectations, the public will be highly skeptical of official assurances in the aftermath of a terrorist attack involving the intermodal transportation system.  Absent change, in the scramble for fresh alternatives to reassure an anxious and angry citizenry, the White House and Congress are likely to succumb to the  political pressure to  impose draconian inspection protocols that will dramatically raise costs and the disrupt the cross-border trade flows.  The new “risk management” programs advanced by the Customs and Border Protection Agency (CBP) are especially vulnerable to being discredited should terrorist succeed at turning a container into a poor-man’s missile.  Before stepping down as Commissioner in late-November 2005, the agency’s head, Robert Bonner, maintained in public speeches and in testimony before Congress that his inspectors were: “inspect[ing] all high risk cargo containers.”  Implicit in that assertion is that Americans should be confident that the intelligence and the analytical tools that supported his agency’s targeting system could be counted upon to pinpoint the small universe of containers that might present a risk.  As such, routinely allowing 95 percent of containerized shipments to enter the United States without any physical examination should not be a source of concern. Former-Commissioner Bonner is correct in identifying that statistically, only a tiny percentage of containers pose any potential security risk.  However, the devil is in the details of how to identify just where the needles might lie within a huge haystack.  Unfortunately, CBP’s risk-management framework is not up to that task.  The fact is that there is very little counter-terrorism intelligence available to support the agency’s targeting system.  That leaves customs inspectors to rely primarily on their past experience in identifying criminal or regulatory misconduct to determine if a containerized shipment might potentially be compromised for nefarious purposes.  This should not inspire confidence given the fact that the Government Accountability Office (GAO) in testimony before the May 2005 hearings of this Committee, and the U.S. Department of Homeland Security’s own Inspector General have documented glaring weaknesses with the methodology, underlying assumptions, and execution of customs targeting practices.  Prior to 9/11, the cornerstone of the risk assessment framework used by customs inspectors was to identify “known shippers” that had an established track record of being engaged in legitimate commercial activity and playing by the rules.  Since 9/11, the agency has built on that model by extracting a commitment from shippers to follow the supply chain security practices outlined in the Customs-Trade Partnership against Terrorism (C-TPAT).  As long as there is not specific intelligence to tell inspectors otherwise, shipments from C-TPAT companies are viewed as presenting little risk. The problem with this approach is that what may have made sense for combating crime does not automatically translate to combating determined terrorists.  When it comes to warding off criminals, private companies can indeed put in place meaningful security safeguards that can deter criminals from exploiting legitimate cargo and conveyances for illicit purposes.  This is because good internal controls raise the risk over time that criminals that try and penetrate the operations of a legitimate company will be caught and their illicit enterprise will be shut down.  Organized crime groups want to maximize their profits by sustaining ongoing conspiracies.  As such they tend to gravitate towards the places where the controls are weakest, and law enforcement’s reach is only episodic.  But a terrorist attack involving a weapon of mass destruction differs in three important ways from organized criminal activity.  First, it is likely to be a one-time operation and most private company security measures are not designed to prevent single event infractions.  Instead, corporate security officers try to detect infractions when they occur, and conduct credible investigations after the fact that support imposing sanctions in order to foster a culture of compliance within the workplace.  This approach tends to work in deterring most employees from being drawn into an ongoing criminal enterprise.  However, it is not up to the task of detecting and preventing a situation where a terrorist organization seduces or intimidates an employee with a one-time offer or threat that he or she cannot refuse. Second, terrorists are likely to find it particularly attractive to target a legitimate company with a well-known brand name precisely because they can count on these shipments entering the United States with a only a cursory look or no inspection at all.  It is no secret which companies are viewed by U.S. customs inspectors as “trusted” shippers.  Many companies who have enlisted in C-TPAT have advertised their participation in press releases or with postings on their website.  In public speeches, senior U.S. customs officials have singled out several large companies by name as model participants in the program.  So all a terrorist organization need do is to find a single weak link within a “trusted” shipper’s complex supply chain, such as a poorly paid truck driver taking a container from a remote factory to a loading port.  They can then circumvent the mechanical door seal and gain access to the container in one of the half-dozen ways well-known to experienced smugglers.  Since inspectors view past performance as the primary indicator of current and future compliance, as long as the paperwork is in order, the compromised cargo container almost certainly will be cleared to enter a U.S. port without anyone ever looking at it. There is third important reason why terrorists would be more willing than criminals to exploit the supply chains of well-established companies.   By doing so, they can count on generating far greater economic disruption.  This is because once a dirty bomb arrives in the United States via a trusted shipper, the risk management system that customs authorities are relying on will come under withering scrutiny.  In the interim, it will become politically impossible to treat cross-border shipments by other trusted shippers as low risk.  When every container is assumed to be potentially high risk, everything must be examined which translates into putting the intermodal transportation system into gridlock. The International Ship and Port Facility Security (ISPS) code will only contribute to the problem of managing the aftermath of a terrorist attack involving an established importer.  This is because all containers arriving in a U.S. port today are being handled by marine terminals and are being carried aboard vessels that have been certified by their host government as compliant with the code.  There are no exceptions because if the loading facility or ship were not so certified, it would be denied permission by the U.S. Coast Guard to enter a U.S. port.  Accordingly, the credibility of the ISPS code as a risk management tool is not likely to survive the aftermath of a terrorist attack involving a maritime container. Since the container security initiatives that have been implemented by the Coast Guard and Customs and Border Protection Agency after 9/11 are not posing a meaningful barrier to determined terrorists, presumably one could look to the radiation sensors being deployed by the U.S. Department of Energy to provide a meaningful deterrent.  Alas, the technology currently being deployed around the world as a part of the Second Line of Defense and Mageport programs is not up to the task of detecting a nuclear weapon, a lightly shielded “dirty bomb,” or highly enriched uranium.  This is true not simply because there are problems at many foreign jurisdictions in keeping the detection equipment properly calibrated and in working condition as will be outlined in Mr. Aliose’s testimony.  But there is a more basic problem which is that nuclear weapons give off very little radioactivity since they are extremely well-shielded so that they can be readily handled.  In the case of a “dirty bomb”—as in the scenario I outlined at the start of my testimony—a terrorist who obtained or manufactured a dirty bomb is likely to take the necessary precaution of placing it in a container lined with lead.  The result will be that even a properly calibrated radiation sensor is unlikely to be able to detect the very low levels of radioactivity to register an alarm.  Finally, highly enriched uranium, which is used in the construction of a nuclear weapon, has such a long half-life that it emits too little radiation to be readily detected as well. This leaves as the final safeguard the radiation portals put in place by CBP at the exit of gates of U.S. ports or at our border crossings with Canada and Mexico.  Outside of the fact that a container that might contain a dirty bomb can expect to spend a day or more within the terminal before passing by this detection equipment, thereby placing the port facility itself at risk in the interim, the radiation portals used by CBP suffers from the same limitation as those operating overseas under DOE’s auspices. In the end, the container security measures being pursued by the U.S. government resembles a house of cards.  In all likelihood, when the next terrorist attack occurs on U.S. soil and it involves a maritime container it will have come in contact with most or even all the these new security protocols.  That is, the container likely will be from a C-TPAT company.  It will have originated or been transshipped through a CSI port.  It will have been handled in an ISPS compliant marine facility and crossed the ocean on an ISPS complaint ship.  It will have passed through a radiation portal and gone undetected.  As a consequence, when the attack happens, the entire security regime will implicated generating tremendous political pressure to abandon it. .  We can do better.  With relatively modest investments and a bit of ingenuity, the international intermodal system and global supply chains can have credible security while simultaneously improving their efficiency and reliability.   What is required are a series of measures that collectively enhance visibility and accountability within global supply chains. As a starting point, the United States should work with the Association of Southeast Asian Nations (ASEAN) and the European Union (EU) in authorizing third parties to conduct validation audits of the security protocols contained in the International Ship and Port Facility Security Code and the World Customs Organization’s new framework for security and trade facilitation.  The companies carrying out these inspections should be required to post a bond as a guarantor against substandard performance and be provided with appropriate liability protections should good-faith efforts prove insufficient to prevent a security breech.  A multilateral auditing organization made up of experienced inspectors and modeled on the International Atomic Energy Commission should be created to periodically audit the third party auditors.  This organization also should be charged with investigating major incidents and when appropriate, recommend changes to established security protocols. To minimize the risk that containers will be targeted by terrorist organizations between the factory and a loading port, the next step must be for governments to create incentives for the speedy adoption of technical standards developed by the International Standards Organization for tracking a container and monitoring its integrity.  The Radio Frequency Identification (RFID) technologies now being used by the U.S. Department of Defense for the global movement of military goods can provide a model for such a regime. Washington should next embrace and actively promote the widespread adoption of a novel container security project being sponsored by the Container Terminal Operators Association (CTOA) of Hong Kong.  Mr. Chairman, I know that you have seen this pilot in operation this past December, and just this weekend, two of your colleagues, Senator Lindsey Graham and Senator Charles Schumer have done so as well.  On April 1, 2006, DHS Secretary Michael Chertoff will be visiting Hong Kong to examine the pilot as well. As you know, starting in late 2004, every container arriving in the two main truck gates of two of the busiest marine terminals in the world are, at average speeds of 15 kph, have been passing through a gamma ray machine to scan its contents, a radiation portal to record the levels of radioactivity found within the container, and optical character recognition cameras which photograph the number painted on the top, back, and two sides of the container.  These scanned images, radiation profiles, and digital photos are then being stored in a database for customs authorities to immediately access if and when they want. The marine terminals in Hong Kong led by Group Managing Director John Meredith of Hutchison Port Holdings and Managing Director Sean Kelly of Modern Terminals have invested in this system for three reasons.  Most importantly, they are hoping that this 100 percent scanning regime will deter a terrorist organization from placing a weapon of mass destruction in a container passing through their port facilities.  Because the contents of every container are being scanned, should a terrorist organization try to shield a radioactive bomb or fissile material to defeat the radiation portals, it will be relatively easy to detect the shielding material because of its density.  A second reason for making this investment is to minimize the potential disruption associated with targeting containers for an inspection at the loading port. The system will allow the container to receive a preliminary inspection remotely without the container having to be removed from the marine terminal, transported to an inspection facility operated by Hong Kong customs authorities, and after the inspection, returned to the terminal but likely too late to be loaded on the ship for its scheduled voyage.  The third reason is that by maintaining a record of the contents of every container entering their terminal, the port is able to provide government authorities with a forensic tool that can support a follow-up investigation should a container still slip through with a weapon of mass destruction.  This tool would allow authorities to quickly isolate to a single supply chain where the security compromise took place, thereby minimizing the risk that a port-wide shut down will be necessary.  In other words, by scanning every container, the marine terminals in Hong Kong are well positioned to indemnify the port for security breeches that occur upstream.  As result, a terrorist would be unable to successfully generate enough fear and uncertainty to warrant shutting down one of the most important transportation hubs of the global trade system. This low-cost system of inspection is being carried out without impeding the operations of these very busy marine terminals.  It could be put in place in every major container port in the world at an estimated cost of $1.5 billion or approximately $10-25 per container, depending on the volume of containers moving through the terminal.   The system could be paid for by authorizing ports to collect user fees that cover the costs associated with purchasing the equipment, maintaining its upkeep, and investing in upgrades when appropriate.  Once such a system is operating globally, each nation would be in a position to monitor its exports and to spot-check their imports against the images first collected at the loading port.  From the standpoint of U.S. security, the biggest value of this system should it be widely deployed are twofold.  First, it provides a powerful deterrent to discourage terrorists from exploiting global supply chains as a conduit for a weapon of mass destruction.  This importantly also includes its counterproliferation potential.  If such a system were in place in the terminals owned and operated by Hutchison Port Holdings and Dubai Port World in the port of Karachi Pakistan, it would make that port a far less attractive place through which to smuggle nuclear materials to the Middle East.  The same holds true of ports along coastal China near North Korea.  Second, it creates a powerful deterrent to discourage terrorists from targeting the global supply chains with a “dirty bomb” since the inspection system will make the intermodal system far more resilient in managing a breach of security without a wholesale shutdown of the trade system. The total cost of third party compliance inspections, deploying “smart” containers, and operating a cargo scanning system such as the one being piloted in Hong Kong likely reach $50 to $100 per container depending on the number of containers an importer has and the complexity of its supply chain.  Such an investment would allow container security to quickly move from the current “trust, but don’t verify” system to a “trust but verify” one.  Can industry afford the cost of this regime?  Even if the final price tag came in at $100 additional cost per container, it would raise the average price of cargo moved by Wal-Mart or Target by only .2 percent.  What importers and consumers are getting in return for that investment is both the reduced risk of a catastrophic terrorist attack and the cascading economic consequences flowing from such an attack. Happily, developing the means to track and verify the status of containers provides benefits that go beyond security.  This is because there is a powerful commercial case for constructing this capability as well.  When retailers and manufacturers can monitor the status of all their orders, they can confidently reach out to a wider array of suppliers to provide them what they need at the best price.  They also can trim their overhead costs by reducing inventories with less risk that they will be left short.  Transportation providers will benefit from greater visibility as well.  Terminal operators and container ships, that have earlier and more detailed information about incoming goods, can develop load plans for outbound vessels in advance and direct truck movements with greater efficiency.  Greater visibility also brings potential benefits for dealing with insurance issues.  Knowing precisely where and when a theft takes place makes it easier to decipher the nature of the threat and to identify what breaches, if any, contributed to the loss.  When there is damage, it is much easier to track down the responsible parties.  In short, rather than spreading the risk across the entire transportation community, insurance premiums can be more carefully tailored.  In turn, that creates a stronger market incentive for all the participants in the supply chain to exercise greater care. Even if there were no terrorist threat, there are ample reasons for individual governments, ASEAN, the European Union, WTO, and other regional and international organizations to place port, border, and transportation security at the top of the multilateral agenda.  Enhance controls within the global trade lanes will help all countries reduce theft; stop the smuggling of drugs, humans, and counterfeit goods; crack down on tariff evasion; and improve export controls.  At the end of the day, confronting the nuclear smuggling threat requires that we take the post-9/11 security framework the U.S. government has been developing largely on the fly over the past four years, and quickly move it to the next generation of initiatives that build on the original framework.   We have a version 1.0.  We need a version 2.0.  The three key ingredients of getting from where we are to where we must be are: (1) to recognize that it is a global network that we are trying to secure; (2) that much of that network is owned and operated by private entities, many who have foreign ownership so U.S. government must be willing and able to work with those companies as well as their host governments so as to advance appropriate safeguards, and (3) both Congress and the White House should embrace a framework of "trust but verify," in President Ronald Reagan's phrase, based on real global standards and meaningful international oversight. Thank you and I look forward to responding to your questions. Stephen Flynn is the author of America the Vulnerable.  He is currently writing a new book to be published by Random House in Fall 2006 entitled, The Edge of Disaster: Catastrophic Storms, Terror, and American Recklessness.  He is the inaugural occupant of the Jeane J. Kirkpatrick Chair in National Security Studies at the Council on Foreign Relations. Dr. Flynn served as Director and principal author for the task force report “America: Still Unprepared—Still in Danger,” co-chaired by former Senators Gary Hart and Warren Rudman.  Since 9/11 he has provided congressional testimony on homeland security matters on fifteen occasions.  He spent twenty years as a commissioned officer in the U.S. Coast Guard including two commands at sea, served in the White House Military Office during the George H.W. Bush administration, and was director for Global Issues on the National Security Council staff during the Clinton administration.  He holds a Ph.D. and M.A.L.D. from the Fletcher School of Law and Diplomacy and a B.S. from the U.S. Coast Guard Academy.
  • Terrorism and Counterterrorism
    Prosecuting Terrorists after September 11
    The prosecution of alleged terrorists in U.S. civilian criminal courts and in new military tribunals has been fraught with controversy. U.S. federal courts have gradually asserted their role in the military tribunal process, and a case before the U.S. Supreme Court could make a major statement about the power of the U.S. presidency in prosecuting the war on terror.
  • Homeland Security
    Police Departments
    This publication is now archived. Has the job of America’s police departments changed since September 11? Yes. While the core mission of police departments—responding to emergencies and ensuring public safety—remains the same, experts say the September 11 attacks triggered a shift in policing priorities around the country. Many police departments are devoting increased resources to preparing for terrorist attacks and gathering intelligence to head off possible threats. In the event of a terrorist attack, police officers would be among the first emergency workers on the scene: on September 11, thousands of New York City police officers rushed to the World Trade Center, and twenty-three were killed when the towers collapsed. Police departments are also often the first to respond to and investigate civilian reports of terrorism-related criminal activity. Was terrorism a major concern for police departments before September 11? Not really. Experts say that following attacks such as the 1993 bombing of the World Trade Center, the 1995 bombing of Oklahoma City’s Murrah Federal Building, and the 1995 sarin gas attack in the Tokyo subway system, some big-city departments did begin to give more attention to security in certain buildings and transportation systems. For the most part, however, terrorism in the United States was considered a remote possibility, even in urban areas. Broader measures to prevent or prepare for an attack, such as improving intelligence sharing among law enforcement agencies or refining disaster plans, were generally not taken. Many local governments were facing budget deficits and focusing on trimming costs. Moreover, experts say that police departments generally thought the threat of terrorism could be handled by the FBI, the lead U.S. counterterrorism agency, and the CIA, the lead U.S. intelligence agency. How have police departments changed since September 11? While their efforts vary according to their respective community’s resources and perceived vulnerability, many police departments have: strengthened liaisons with federal, state, and local agencies, including fire departments and other police departments. refined their training and emergency response plans to address terrorist threats, including attacks with weapons of mass destruction. increased patrols and shored up barriers around landmarks, places of worship, ports of entry, transit systems, nuclear power plants, and so on. more heavily guarded public speeches, parades, and other public events. created new counterterrorism divisions and reassigned officers to counterterrorism from other divisions such as drug enforcement. employed new technologies, such as X-ray-like devices to scan containers at ports of entry and sophisticated sensors to detect a chemical, biological, or radiation attack. For the most part, the threat of terrorism has not led to large-scale hiring of new police officers. Counterterrorism measures put into place by the New York City Police Department (NYPD), which has firsthand experience in handling terrorist attacks and continues to respond to a flurry of threats, have made it a national and world model for police preparedness and training, as outlined in a comprehensive article published in the New Yorker in July 2005. How is the NYPD fighting terrorism? Its new measures include: creating a counterterrorism division and hiring a deputy police commissioner for counterterrorism to oversee related training, prevention, and investigations, and to work with state and federal agencies. hiring a deputy commissioner for intelligence and an in-house intelligence officer for each of the NYPD’s seventy-six precincts. training the department’s 39,000 officers in counterterrorism, including how to respond to a biological, chemical, or radiation attack. assigning detectives to train abroad with police departments in Israel, Canada, and potentially other countries in the Middle East and in Southeast Asia. assigning one detective to Interpol, the France-based international police agency, and two detectives to FBI headquarters in Washington. placing command centers throughout the city to back up headquarters in the event of a large-scale terrorist attack. acquiring equipment such as protective suits, gas masks, and portable radiation detectors. How do police departments work with the FBI? Primarily through Joint Terrorism Task Forces (JTTFs), which bring local and federal law enforcement officers together to respond to and investigate terrorism-related activity. The first JTTF was set up in 1979 with members of the NYPD and the FBI; the FBI established or authorized JTTFs in each of its fifty-six field offices. Did federal, state, and local agencies share information effectively before September 11? No. Experts say the CIA, the FBI, and local law enforcement failed to communicate before the attacks—this was the major finding in the long-anticipated 9/11 Commission’s report. Many experts attribute the lack of cooperation to mistrust and cultural differences between the agencies. Also, investigations of the way New York’s police and fire departments coordinated their response on September 11 have revealed numerous breakdowns in communication and command systems that may have cost many lives.
  • Terrorism and Counterterrorism
    Fire Departments
    This publication is now archived. Can fire departments help respond to terrorist attacks? Yes, as they famously did on September 11. America’s 31,000 local fire department are the first line of defense in many dangerous incidents, arriving within minutes of an alarm—often before anyone knows if what’s happening is an accident, arson, or terrorism. In addition to putting out fires, firefighters rescue people in danger, provide emergency medical services, and handle situations involving hazardous materials. These duties, combined with their quick-response role, put fire departments on the frontlines of responding to terrorist incidents. In an effort to contain the damage, save lives, and manage the crisis on the morning of September 11 in lower Manhattan, 343 New York City firefighters died in the attack on the World Trade Center. Are firefighters trained to respond to terrorist attacks? Yes. Some fire departments maintain specialized rescue or hazardous-materials units with skills that might also apply in a terrorist attack. And since the mid-1990s, many of America’s million or more firefighters have been trained to be alert for threats from terrorism and weapons of mass destruction. They have learned to watch out for secondary bombs after a first explosion, to stay away from potential biological or chemical toxins without proper equipment, to preserve evidence, and to coordinate with other federal and local authorities. Other groups such as the FBI and public health officials also respond to terrorist incidents, but it may take them longer to arrive at the scene. When did fire departments start to worry about terrorism? Fire service officials say that the 1993 World Trade Center bombing alerted them to the need for terrorism preparations, and that two major 1995 terrorist attacks—the release of sarin gas on the Tokyo subway and Timothy McVeigh’s bombing of the Alfred P. Murrah Federal Building in Oklahoma City —underscored the urgency. The September 11 attacks have led officials to call for all firefighters to receive basic terrorism-response training. Will the September 11 attacks change how firefighters do their jobs? Yes. After the loss of hundreds of New York firefighters in the Twin Towers attack, fire officials around the country are reevaluating whether they should do more to restrain firefighters’ impulse to enter burning buildings and rush into other situations where their own lives might be in peril. In light of increased concern over invisible dangers like biological or chemical weapons, current protocols direct firefighters not to enter an area unless they know what substance is involved and are wearing safety equipment. The New York Fire Department—which lost many members of its rescue, training, and leadership teams, as well as vehicles and other specialized equipment—conducted an internal review of its emergency response procedures to study how its staff handled the attack, and to explore failures in radio communications. Did the September 11 attacks raise other concerns for fire departments? Yes. Fire service officials are calling for more training, better equipment such as particle-filtering masks (not the oxygen masks firefighters sometimes wear), and the funding to pay for these improvements. They are also eager to rein in “self-deployers”—firefighters from other jurisdictions who decide as individuals to drive to the scene of an incident and offer help, as happened with the World Trade Center and the Pentagon. However noble their aims, experts say, self-deployers can be a hindrance when they show up unannounced, and they also leave their home departments high and dry—which could pose a danger in case of a local fire or a multiphase terrorist attack. Are fire departments organized on a national level Fire departments are fundamentally local institutions, although they share many protocols and have mutual-aid agreements with neighboring departments so they can support each other during major incidents. Fire departments coordinate through national unions, membership organizations, and the U.S. Fire Administration, a division of the Federal Emergency Management Administration. The fire service also has a representative in the White House Homeland Security Office.
  • Terrorism and Counterterrorism
    FBI and Law Enforcement
    This publication is now archived. Has the FBI’s mission changed since September 11? Yes. In the aftermath of September 11, the Federal Bureau of Investigation—the investigative arm of the Justice Department and the lead federal agency for counterterrorism—made preventing terrorist attacks its top priority, replacing the bureau’s old focus on pursuing white-collar criminals, bank robbers, and drug traffickers. One of the largest overhauls in the bureau’s history was announced in spring 2002 amid mounting complaints from FBI insiders, Congress, and experts that the bureau had mishandled key leads before the World Trade Center and Pentagon attacks. FBI director Robert S. Mueller III has said that part of the September 11 plot might have been uncovered if federal agencies had communicated better and properly evaluated the clues at hand. The 9/11 Commission report found that the intelligence community had a “significant increase” of intelligence information regarding Osama bin Laden and a potential terrorist attack, but that the community “too often failed to focus on that information and to capitalize on available and potentially important information.” Did the FBI miss clues prior to September 11? Yes. In a May 2002 memo to Mueller, Coleen Rowley, a senior agent in the FBI’s Minneapolis office, accused FBI headquarters of having repeatedly refused requests she had made before September 11 for a warrant to wiretap and to search the computer and belongings of Zacarias Moussaoui, the alleged “twentieth hijacker.” Moussaoui aroused suspicions while training at a Minnesota flight school and was arrested in August 2001 on visa violations. A search of his computer after September 11 revealed data about the cockpit layouts of commercial aircraft and phone numbers that could have led authorities to the plotters. The FBI also failed to connect the Moussaoui case to a July 2001 memo from a Phoenix FBI agent, Kenneth Williams, warning the FBI that Arab men who might be linked to Osama bin Laden were training at a flight school in Arizona. FBI headquarters rejected his proposal to investigate other flight schools, reportedly because of a lack of resources. Beyond ignoring warnings from the field, the FBI has also been criticized for failing to coordinate with the CIA. The FBI now admits it could have done better. The 9/11 Commission’s report sharply criticized intelligence agencies for failing to address the terrorist threat before September 11, revealed new findings about clues that the agencies ignored, and offered nineteen recommendations for improving their intelligence capabilities. Why did the FBI miss clues about the September 11 plot? Experts say the bureau’s failure to act on information from its field offices is not surprising. Before September 11, the FBI was configured as a law enforcement agency charged with solving crimes that had already taken place, not as an intelligence force aimed at preventing attacks. Field agents didn’t have the power to begin investigations without evidence that a specific crime had been committed or was going to be committed—and even then they had to wait weeks or months for approval from headquarters before proceeding. Did the FBI and the CIA cooperate effectively before September 11? No. The FBI and the CIA failed to share key clues before the attacks. Experts say that fundamental cultural differences and turf wars have long hindered cooperation between the two agencies. The CIA was established in 1947 to collect intelligence abroad, and its charter forbids it to conduct investigations inside the United States. Instead, it passes on intelligence relevant to domestic concerns to the FBI, which handles domestic investigations. Some experts say that the United States often fails to anticipate cross-border threats like terrorism because it lacks a single agency devoted to collecting, analyzing, and piecing together both domestic and foreign information. Two new agencies have recently been formed in an attempt to solve this problem—the Terrorist Threat Integration Center (TTIC), the head of which will report to the director of central intelligence, and the Information Analysis and Infrastructure Protection Directorate (IAIP) within the Homeland Security Department. Both will analyze and coordinate intelligence gathered by the CIA, FBI, DHS, and DOD, and assess threats to homeland security. In addition, President Bush asked Congress to approve the creation of a new post for a National Intelligence Director—a stand alone post that acts as the primary intelligence officer for the President. John Negroponte, former ambassador and United States permanent representative to the UN, was sworn in as the director in April 2005. What FBI reforms have been proposed? In December 2001, Mueller announced a plan to reorganize FBI headquarters that included the modernization of obsolete information systems and the creation of new divisions to emphasize counterterrorism, counterintelligence, cybercrimes, and communications with state and local law enforcement. But as criticism mounted in the spring of 2002, Mueller announced more sweeping reforms, including plans to: Hire 400 more analysts, including twenty-five analysts borrowed from the CIA. Shift 480 agents from white-collar and violent crime investigation to counterterrorism. Create an office of intelligence to gather, analyze, and share critical national security information. Establish “flying squads” of terrorism experts based at FBI headquarters to provide intelligence support to the bureau’s fifty-six field offices. Recruit fluent speakers of Arabic and other Middle Eastern and South Asian languages. Create a national joint terrorism task force to help the FBI coordinate its efforts with the CIA and other agencies. Improve strategic analyses of terrorist groups and networks, including looking more closely at their finances and methods of communication. Shortly after September 11, the passage of the U.S.A. Patriot Act enhanced the FBI’s power to intercept communications and collect information during terrorism investigations. In May 2002, former Attorney General John Ashcroft revised the bureau’s investigative guidelines to allow field offices to open criminal investigations without first obtaining approval from headquarters. Agents were also given broader powers to surf the Internet, monitor religious and political groups, and visit houses of worship without evidence that a crime has been committed. Will the reforms help prevent terrorist attacks? It’s hard to say. Some experts say the FBI has been given tools that will let it do its job. Others say the bureaucratic and cultural issues that plague the FBI and its relationships with other federal agencies—as well as local law enforcement—are too large to be addressed by quick reforms. Substantial numbers of high-ranking FBI officials quit in the wake of 9/11. The resulting labor shortage may hinder reform efforts—as may old habits. According to Jonathan Winer, a former State Department official, the largest problems at the FBI (besides a shortage of resources) are an unwillingness to share information with other agencies, poor communication within the bureau itself, and a lack of trust. Experts say it’s too soon to tell whether the new reforms can help build a FBI based on cooperation, where agents are rewarded for taking risks and thinking creatively.