Defense and Security

Homeland Security

  • Terrorism and Counterterrorism
    Responding to Radiation Attacks
    This publication is now archived. Could terrorists use radiation as a weapon?Experts say they might, and Osama bin Laden’s al-Qaeda terrorist network has been eager to acquire radioactive material. In the aftermath of September 11, scenarios that have particularly worried homeland security officials include the detonation of a “dirty bomb”—an ordinary explosive laced with radioactive material—and the sabotage of a nuclear power plant with the intent to release radiation into the environment. In May 2002, the United States arrested an alleged al-Qaeda terrorist plotting to build and detonate a dirty bomb. What is radiation?Radiation is energy in the form of particles or waves. The term “radiation” is commonly used to refer to what scientists call “ionizing radiation,” which is emitted from the nuclei of atoms and is harmful to humans.Every day, people are exposed to naturally occurring ionizing radiation from elements in the soil and air, cosmic rays, and even materials in the human body itself. Man-made devices such as X-ray machines and nuclear power plants also generate radiation, although their output is tightly controlled to prevent harm. Some forms of radiation—including alpha and beta particles—are harmful only when they are ingested or come into contact with skin, and they can be blocked by something as simple as a sheet of paper or a plate of glass. But “penetrating radiation”—including gamma rays and the neutron radiation produced in nuclear fission—can travel hundreds of yards through the air, penetrate normal walls or floors, and affect the entire human body. How could a radiological attack expose people to harmful radiation?It can in two ways: One form of attack could spread radiation by placing concentrated, highly radioactive material in a city or by sabotaging a nuclear power plant. A second form of radiological attack could involve spreading radioactive materials with an aerosol spray or a dirty bomb. The dust and debris thrown up by a dirty bomb explosion might land on people’s skin and then be inhaled, ingested, or absorbed through wounds. Victims might also be exposed to radiation from radioactive materials scattered nearby. Victims near a dirty bomb attack might also absorb radioactive contaminants into their bodies. Radiation released by radioactive materials inside the body can damage the liver, thyroid, kidneys, and bones, as well as increase a victim’s chances of getting cancer. What would be the initial reaction to such attacks?To stop the exposure to radiation, victims would have to be decontaminated by removing irradiated clothing, washing the skin, and purging inhaled or ingested materials from inside the body. The surrounding area would also need to be decontaminated to remove radioactive material, prevent radioactive dust and debris from spreading, and protect food and water supplies. What health conditions can result from exposure to radiation?The exact biological effects of radiation exposure are not fully understood, scientists say. But we do know of two possible effects: the direct damage known as “radiation sickness” and an increased likelihood of developing cancer later on. What is radiation sickness?The illness takes different forms depending on the degree of exposure. Exposure to up to twenty times the annual background dose of radiation received by the average American would have no discernible effect. Up to 400 times the annual background dose would cause mild changes in the composition of the human blood and some temporary nausea or vomiting.Up to 1,000 times the annual background dose would cause nausea, vomiting, hair loss, reduced immune system function, and serious blood disease.Still higher doses—such as those that would hit unshielded workers inside a catastrophically sabotaged nuclear reactor—could cause severe dehydration, anemia, hemorrhaging, and infections. Such doses would kill 80 percent to 100 percent of the people exposed.
  • Homeland Security
    Targets for Terrorism: Food and Agriculture
    This publication is now archived. Is America’s food supply safe from terrorist attacks?No. The United States spends more than $1 billion every year to keep America’s food supply safe, but even without terrorism, food-borne diseases cause about 5,000 deaths and 325,000 hospitalizations each year, according to the Centers for Disease Control and Prevention (CDC). Former Secretary of Health and Human Services Tommy Thompson told a congressional terrorism panel in November 2001 that he was “particularly concerned” about food-related terrorism, which could involve either attempts to introduce poisons into the food supply or attacks that would ruin domestically cultivated crops or livestock. Have there been past terrorist attacks in the United States involving food?Yes. In 1984, members of an Oregon religious commune—followers of an Indian-born guru named Bhagwan Shree Rajneesh—tried to influence a local election by poisoning salad bars with salmonella bacteria to sicken voters. Although no one died, 751 people became ill. There have been a couple of other attempts to deliberately contaminate food with biological agents since World War II, but these have been criminal acts, not terrorism. There have been no documented terrorist attacks on U.S. agriculture. But the number and variety of food-borne illnesses and crop and livestock diseases make it hard to distinguish terrorist attacks from natural events. It took a year for U.S. officials to conclude that the Oregon attack was deliberate. How might terrorists attack the food supply?The Oregon attack took place at local restaurants, near the end of the food-distribution chain, but an attack could occur at any point between farm and table. Imported food could be tainted with biological or chemical agents before entering the United States, or toxins could be introduced at a domestic food-processing plant. Crops or livestock raised on American soil could also be targeted. Experts also worry that terrorists might try to spread false rumors about unsafe foods via the mass media or the Internet. How much damage could an attack on the U.S. food supply cause?Some attacks could cause illnesses and deaths, depending upon how quickly the contamination was detected. But even attacks that don’t directly affect human health could cause panic, undermine the economy, and even erode confidence in the U.S. government, experts say. Agriculture exports amount to about $140 billion a year, and many American jobs have at least an indirect connection to food and agriculture. A 1970s plot by Palestinian terrorists to inject mercury into Jaffa oranges reduced Israel’s exports of citrus fruit to Europe by 40 percent, and a 1989 incident in which a shipment of Chilean grapes to the United States tested positive for cyanide led to international trade suspensions that cost Chile $200 million. The U.S. Department of Agriculture estimates that an attack on livestock—a successful attempt to infect American cattle with a contagious disease such as foot-and-mouth, for example—could cause between $10 billion and $30 billion in damage to the U.S. economy. What kinds of terrorists might mount a food-related attack?We don’t know. Concerns about such attacks have grown since September 11. Some forms of attack wouldn’t require a large or highly skilled organization and could come from foreign groups like Osama bin Laden’s al-Qaeda network, domestic terrorists, eco-terrorists, a cult-like group such as Oregon’s Rajneeshees, or an unaffiliated individual—anyone who wanted to undermine the economy and spread panic. Elsewhere, groups that have threatened agroterrorist attacks include Tamil militants in Sri Lanka and British activists opposed to chemical and biological warfare. Who is in charge of food safety?The two main agencies are the Food and Drug Administration (FDA), which is part of the Department of Health and Human Services, and the Food Safety and Inspection Service (FSIS), a part of the Department of Agriculture. The FSIS handles meat, poultry, and egg inspections, and the FDA inspects everything else. State and local agencies, other federal bodies, and foreign inspection services are also sometimes involved in food safety. Many experts have long favored consolidating food-safety programs in a single agency, and calls for a consolidation have been repeated since September 11. But food manufacturers and some members of Congress have grown accustomed to the current system and oppose its overhaul.
  • Terrorism and Counterterrorism
    Responding to Chemical Attacks
    This publication is now archived. How serious a threat are chemical weapons?Chemical weapons are very dangerous, but they’re not easy to acquire or use. Synthesizing chemical warfare agents is often difficult, particularly in home laboratories. These super toxic chemicals are also extremely dangerous to handle and deliver in the large quantities needed to inflict mass casualties. Aum Shinrikyo, a Japanese doomsday cult, spent an estimated $30 million on chemical weapons research and had many scientists in its ranks, but it managed to kill only nineteen people with the nerve agent sarin—both because it encountered problems making sarin, experts say, and because it had difficulty using it as a mass-casualty weapon. How do chemical weapons work?To inflict harm, most chemical warfare agents must be inhaled, although some act through the skin or eyes. Various agents come in gas, liquid, aerosol-spray, or dry-powder form. An agent’s effect depends on the purity of the chemical, its concentration in the air, the wind and weather conditions at the time of its release, and the length of a victim’s exposure. Exposure in enclosed spaces is more dangerous than in the outdoors. Do terrorists have chemical weapons?Aum Shinrikyo is the only terrorist group known to have possessed and used sophisticated chemical agents, but U.S. intelligence agencies have long warned that terrorist groups such as Hamas are seeking such weapons. Evidence recovered in Afghanistan suggests that Osama bin Laden’s al-Qaeda terrorist network was conducting crude chemical warfare experiments. Information on how to make such weapons has been available in scientific literature for decades; it is now posted on the Internet, and experts say many of the raw materials are not hard to obtain. In addition, Iran, North Korea, Libya, Sudan, and Syria—all labeled state sponsors of terrorism by the U.S. government—are thought to have significant chemical warfare capabilities that they might pass along to terrorists. What are the different sorts of chemical agents?The deadliest types are: Nerve agents such as sarin and VX, which disrupt the body’s nervous system;Choking agents such as chlorine and phosgene, which attack the lungs; and Blood agents such as cyanide, which carry tissue-killing poisons throughout the body.Depending on the level of exposure (one milligram or less is often enough), nerve agents such as sarin and VX can kill a victim in as little as ten to fifteen minutes. Blood agents also act rapidly, but choking agents can take several hours to kill.Blister-causing agents such as mustard gas attack the skin and eyes and can be fatal if inhaled in large quantities. The effects of mustard gas—pain and skin blistering—take one to six hours to appear. Other agents, such as the potent hallucinogen BZ, aim to incapacitate rather than kill. Beyond these military-grade substances, thousands of toxic industrial chemicals (such as chlorine, phosgene, and cyanide) and agricultural pesticides could cause mass casualties, depending on how they are prepared and dispersed. The Chemical Weapons Convention, a 1993 disarmament and nonproliferation treaty, names twenty-nine specific substances and fourteen broad families of chemicals—some widely used in commercial industry—that could be used as weapons. How might terrorists stage a major chemical attack?Several ways. Experts say terrorists could try to set off a homemade chemical device in a public area, release a gas such as chlorine into the air by bombing a chemical plant, or blow up a vehicle transporting hazardous materials, among other scenarios. Could a chemical spill kill large numbers of people?It could, depending on the amount of toxic chemical released, the atmospheric and weather conditions, and the spill’s proximity to a densely populated area. One notorious precedent is the 1984 release of methyl isocyanate gas from a Union Carbide pesticide plant in Bhopal, India, that killed almost 4,000 people—the worst industrial accident ever. A U.S. Army study warns that a terrorist attack on a chemical plant which released deadly vapors over a city could result in as many as 2.4 million deaths and injuries.
  • Homeland Security
    Targets for Terrorism: Nuclear Facilities
    This publication is now archived. Could terrorists target U.S. nuclear power plants? Yes. In his January 2002 State of the Union speech, President Bush said that U.S. forces “found diagrams of American nuclear power plants” in al-Qaeda materials in Afghanistan. An al-Qaeda training manual lists nuclear plants as among the best targets for spreading fear in the United States. The government is taking the threat seriously: in February 2002, the Nuclear Regulatory Commission (NRC) issued an advisory to the nation’s 103 nuclear power plants that terrorists might try to fly hijacked planes into some of them. And eight governors have independently ordered the National Guard to protect nuclear reactors in their states. How vulnerable are U.S. nuclear weapons sites? Not very, most experts say. Nuclear weapons production and storage sites are guarded by security forces supervised by the Department of Energy. John Gordon, the administrator of the Department of Energy’s National Nuclear Security Administration, has called such sites “one of the last places a terrorist would think about attacking and having hopes of success; the security basically bristles.” But a watchdog organization, the Project on Government Oversight (POGO), charged that security at U.S. nuclear weapons complexes was inadequate and that hundreds of tons of weapons-grade plutonium and highly enriched uranium could be stolen, sabotaged, or even detonated. The Department of Energy dismisses such criticism, adding that security has been stepped up since September 11. Experts note that a terrorist looking to steal nuclear weapons or weapons-grade material would have a much easier time in Russia or Pakistan than in the United States. How might terrorists attack other U.S. nuclear facilities? U.S. homeland security planners are most concerned about the following scenarios: A massive release of radiation after a nuclear plant is hit with a bomb delivered by truck or boat. A September 11-type attack using a plane as a guided missile to crash into a nuclear facility. Sabotage at a nuclear facility by an insider or by intruders. A ground assault on a nuclear plant by a commando team attempting to blow up the plant. Suicide terrorists might also try to break in to a nuclear plant and quickly build and detonate a “dirty bomb”—a conventional explosive laced with radioactive material. Attackers could also use conventional explosives to blow up some nuclear waste or nuclear fuel, thereby spewing radioactive materials into nearby areas. Finally, experts warn that terrorists might target the pools in which nuclear reactors’ highly radioactive waste (“spent fuel”) is kept. This waste, which is kept cool by water, could ignite if exposed to the air.  One nuclear expert, Robert Alvarez, has said that this would cause a “catastrophic fire” that could be “worse than a reactor meltdown.” What kind of damage could such attacks cause to a nuclear power plant? Experts say that an attack on a nuclear power plant, all of which are guarded by private security forces hired by the plants and supervised by the NRC, couldn’t lead to a nuclear explosion. The danger, they say, is that attackers could cause a meltdown or a fire or set off a major conventional explosion, all of which could spew radiation into nearby cities and towns. What would happen if a plane crashed into a nuclear plant? No one knows. U.S. nuclear power plants are built to withstand hurricanes, tornadoes, earthquakes, and small plane crashes. Their “containment walls” are typically made of two to five feet of reinforced concrete with an interior steel lining. But the NRC didn’t anticipate the type of attacks seen on September 11—large passenger airliners loaded with fuel slamming into targets. Both the NRC and the International Atomic Energy Agency (IAEA) have said that U.S. nuclear plants were not designed to withstand such an impact, and the NRC has ordered a study of plant designs to look at what would happen in such a scenario. Have terrorists threatened specific nuclear plants? In January 2002, former NRC chair Richard Meserve said that “since September 11, there have been no specific credible threats of a terrorist attack on nuclear power plants.” But he added that in light of “the high general threat environment, nonetheless, we and our licensees have maintained our highest security posture.” On October 18, 2001, there was what was initially called a “credible threat” to the Three Mile Island nuclear power plant in Pennsylvania, the site of America’s worst nuclear accident, which occurred in 1979. The threat closed down two nearby airports for four hours, and military aircraft were sent to patrol the area. But by the next morning, the threat was dismissed and the alert canceled.
  • Terrorism and Counterterrorism
    Responding to Biological Attacks
    This publication is now archived. How dangerous could biological terrorism be?The anthrax-laced letters mailed in the fall of 2001 infected twenty-three people and killed five—a toll that only hinted at the damage bioterrorism could cause. In a 2001 government exercise called Dark Winter, a simulated “worst-case” terrorist attack with smallpox virus—a germ more worrisome than the anthrax bacterium because it’s contagious—was projected to cause some 300,000 smallpox cases within three weeks, about one in three of which would be fatal. Plague, anthrax, and other diseases could also be major killers. Have terrorists experimented with biological weapons before?Yes. CIA Director George Tenet has testified that documents found in Afghanistan showed that the al-Qaeda terrorist network was pursuing sophisticated biological weapons research in Afghanistan. Aum Shinrikyo, a doomsday cult in Japan, had an ambitious biological weapons program and released anthrax spores and botulinum toxin in Tokyo on several occasions, but none of the attacks inflicted any known casualties. Iraq, the Soviet Union, and other countries experimented extensively with anthrax bacteria and other germs as recently as the 1990s. (The United States abandoned its offensive biowarfare program in 1969 and destroyed its biological arsenal in the early 1970s.) How is the U.S. government responding to the threat of bioterrorism?Through a wide variety of measures including: The Department of Health and Human Services has established a new Office of Public Health Preparedness to address bioterrorist threats.In July 2002, Dr. Julie Gerberding, an infectious diseases expert noted for her work combating anthrax and bioterrorism, was named director of the Centers for Disease Control and Prevention (CDC).In December 2002, the Bush administration announced plans to start inoculating some ten million health-care, emergency, law-enforcement, and military personnel against smallpox before making the vaccine available to the general public on a voluntary basis in 2004.In January 2003, the Bush administration created a system designed to detect the release of deadly germs like anthrax and smallpox within twenty-four hours by adapting many of the Environmental Protection Agency’s 3,000 air-quality monitoring stations nationwide. Funding to combat bioterrorism, which was increasing even before September 11 and the 2001 anthrax letters, has shot up in their wake. A June 2002 bioterrorism law provided $4.6 billion for stockpiling medicines and vaccines, enhancing inspections of the nation’s food supply, increasing water-system security, and improving hospital preparedness. In President Bush’s January 2003 State of the Union address, he proposed spending $6 billion more for research and production of vaccines and other treatments against agents like anthrax, botulinum toxin, Ebola, and plague. Will the increased spending help?It should, experts say. The threat from bioterrorism is serious, but quick and effective public health and medical responses could save many lives. Preparedness has improved significantly in recent months, and public health authorities are on alert. Nevertheless, state and local governments are inadequately prepared to cope with a major bioterrorist attack. The new spending is earmarked for scientific research, public health initiatives, vaccine and drug stockpiles, hospital preparedness, and disease surveillance and response systems at the federal, state, and local levels. Down the road, the planned expenditures should also produce indirect benefits for public health in general, experts say. What diseases are authorities most worried about?The “Category A” list of biological threat agents—as classified by the CDC—includes the germs that cause anthrax, botulism, plague, smallpox, tularemia, and hemorrhagic fever viruses such as Ebola. These infectious diseases cause potentially high death rates, could trigger public panic, and require special action to cure and contain. A few are contagious (smallpox, plague, and Ebola). More than a dozen other types of biological disease threats are classified by the CDC as generally less dangerous but still capable of killing many victims. How would health authorities discover that a biological attack was underway?Bioterrorism can be hard to detect, experts say. Environmental monitoring might be able to pick up signs of an airborne release of germs, assuming authorities knew where to look. But an attack could go unnoticed until victims feel sick and visit hospitals. A 1984 outbreak of food poisoning in a small Oregon town that sickened 751 people was initially believed to be a natural outbreak; only a year later did authorities realize that a religious cult called the Rajneeshees had deliberately contaminated salad bars with salmonella bacteria.
  • Homeland Security
    Targets for Terrorism: Information Infrastructure
    This publication is now archived. What is information infrastructure?A network of computers and communication lines underlying critical services that American society has come to depend on: financial systems, the power grid, transportation, emergency services, and government programs. Information infrastructure includes the Internet, telecommunications networks, “embedded” systems (the built-in microprocessors that control machines from microwaves to missiles), and “dedicated” devices like the computer you’re using now. The U.S. information infrastructure, which is mostly privately owned, is an important resource in peacetime and a vital one during a crisis. During the September 11 attacks, for example, telephone traffic surged, straining the capacity of switching equipment and cellular networks, and failures in the New York Fire Department’s radio system meant that some firefighters did not receive orders to leave the Twin Towers before they collapsed. What does information infrastructure have to do with terrorism?Protecting the information infrastructure is a key aspect of homeland security, experts say. U.S. officials and information technology (IT) experts worry that terrorists might try to undermine America’s information infrastructure with acts of cyberterrorism. Experts also say that the federal government could modernize its information infrastructure and use it as a tool against terrorism. How could information technology be used to fight terrorism?In many ways, from programs that can assist in foreign-language translations to massive databases that compile data and search for patterns that might signal future attacks. Proposals for the cabinet-level Department of Homeland Security and from other federal agencies have asked for funding to jump-start computer-aided threat assessment. Former Attorney General John Ashcroft said in April 2002, “Information is the best friend of prevention.” While experts agree that the U.S. government’s information systems are outdated and inadequate, some IT experts warn that the creation of centralized databases could invite abuse by law enforcement officials and compromise the privacy of ordinary citizens without necessarily preventing terrorist attacks. Which government agencies collect information relevant to terrorism investigations?Federal, state, and local agencies collect data in many ways, including passport inspections, visa application interviews, customs declarations, local police investigations, foreign and domestic intelligence reports, social welfare programs, and tax filings. More than sixty federal agencies gather information that could shed light on terrorist activity. Is this information stored on computers?Not always. Some agencies keep some records only on paper or are slow to transfer information to computers. How up-to-date are the government’s information systems?It varies, experts say, but many agencies depend on obsolete computer systems—decades-old mainframes designed for specific tasks, programmed in now-obscure coding, and incompatible with other computers, often even those within the same agency. Complex purchasing procedures, the high cost of modernization, and inadequate funding mean that government computer systems lag far behind those in the private sector. The Customs Service and the INS are each now spending more than $1 billion on multiyear programs to modernize their systems.
  • United States
    Flynn: Disturbing Lack of Attention Paid to America’s Security Vulnerabilities
    For the first time since September 11, 2001, passengers at U.S. airports this week were allowed to bring nail clippers, small scissors, and other items onto aircraft as the Department of Homeland Security modified emergency provisions enacted after the 9/11 attacks. Hardly a milestone, yet according to Stephen E. Flynn, the Jeanne J. Kirkpatrick senior fellow for national security studies at the Council on Foreign Relations, the focus on such things is symbolic of a disturbing lack of attention to things that really make the United States vulnerable to terrorism. "We’re putting all our eggs into one basket, taking the battle to the enemy, getting better intelligence, and extending the authority of law enforcement," he says.But, he says, "We don’t have much of a debate about the fact that the 9/11 Commission’s final recommendations lay untouched in many cases, especially when it comes to spending wisely on first responders and hardening or building redundancy into key infrastructure. We have debates about the Patriot Act and Iraq, and sure, they warrant debate, but they don’t address the full panoply of issues that threaten Americans here at home."Flynn was interviewed while traveling along the eastern seaboard on an Amtrak train, December 21, 2005, by cfr.org’s Executive Editor Michael Moran.What is your take on the president’s admission that the National Security Agency (NSA) has been spying on Americans?On domestic spying, this touches on one of the key concerns that have animated my work. I believe that when it comes to protecting and safeguarding the American people, we must not only focus on the dangers posed by terrorists and their weapons, but we must be mindful of the need to protect ourselves from ourselves. This is a big part of what a homeland security mandate should be—protecting not just physical and living things in America, but also America’s way and quality of life. The do-whatever-it-takes mindset, whether it’s torturing people in Guantanamo Bay or spying on your own citizens, is the kind of perverse argument made by those who argue that there’s no way to adequately safeguard the country here at home because we just have too many soft targets which we can’t possibly afford to adequately protect. This defeatist view about what can be done to make ourselves more resilient at home leads to the kind of advocacy we have been hearing in recent days from the President and Vice President for extreme measures to prevent acts of terror that we would never have considered before. There’s no question, in my view, that dealing with al-Qaeda and the ongoing terrorist threat requires a different level of and different kinds of authority than existed before 9/11. But as a core principle, if you’re going to raise the authority of the government to a new level, then you have to raise the bar on accountability. Unfortunately, what we seem to have today is a constant rising of government’s level of authority with a diminishing level of accountability. The result of that, in the long run, will be a backlash by the public and a loss of support for important measures, particularly as the time between terrorist incidents expands.How important is the Patriot Act to American security?It is important that the bulk of the Patriot Act be renewed, to my mind. Yet some of the more controversial elements of it—such as allowing law enforcement access to a citizen’s library records—should be open to negotiation given their marginal importance to law enforcement, particularly when a potential terrorist is far more likely to spend time on the internet than checking out a library book. The argument that these more controversial elements can’t be removed without crippling the act is not true. They can potentially be pared down while still protecting some of the more essential authorities that the act provides. Meanwhile, while we hear endless arguments over access to public library records, one of the most basic tools to support counterterrorism—a single, coordinated national watch list of terrorist suspects—still has not been created. There still, to this day, are several watch lists maintained across the U.S. government, feeding confusion among frontline inspectors with the result that the wrong people are being targeted and potentially the wrong people are being allowed to enter the country. The imperative that there be far better information sharing within the federal government and among state and local law enforcement agencies was one of the most important and basic recommendations of the 9/11 Commission. The former Commissioners released a report on December 5th that gave the government a D for a grade on how they are doing on this. Yet I see little or no focus on it in the public debate. You get the sense we’re mired in debate over access to a very small universes of marginally useful data, while the big glaring gaps in sharing information already available to law enforcement that might help prevent acts of terrorism go unaddressed because of unresolved turf battles or a lack of investment in new technologies. I don’t see that the administration is embarrassed by this situation. Instead, they seem to want to play political hardball over homeland security. I think it is reasonable to allow a temporary extension on the renewal of the Patriot Act to allow the controversial elements to be debated. Instead we seem to be seeing a replay of the same kind of jockeying for partisan advantage that we saw in the fall of 2002 when Democrats voiced their concerns about proposed changes to federal employee rules for the new Department of Homeland Security and Republicans branded them as being soft on terrorism. A several-month extension allows Congress to deliberate on the more controversial elements of the Patriot Act. It is nonsense to portray this extension of existing authorities as something that is endangering the American public, especially in light of recent revelations about domestic spying. Should we really be surprised the National Security Agency, given its mandate and secrecy, is spying on Americans?There’s little question that our technology is such that identifying tidy boundaries and jurisdictions of NSA’s work seems almost quaint. As we fly around the planet with the same cell phone, downloading emails and holding conversations, it becomes very difficult to distinguish between what is foreign and domestic. At a more basic level, I wonder about NSA’s actual ability to glibly separate domestic from foreign sources in the flow of communications that exists today. It probably is not, strictly speaking, possible.Yet the real issue here is whether NSA and other intelligence agencies are operating with oversight. The requirement that intelligence agencies operate under oversight was put into place in 1978 for a reason -- because before that, they conducted operations that crossed lines and ultimately lost them the support of the American public. Again, it’s important that if you give government increased authority, there has to be a mechanism for oversight and accountability should that authority be abused. If abuse does occur, as a practical matter, you’ll lose public support for what may be a necessary capability. I don’t understand why the administration would simply dismiss going through the special court process that exists. Washington seems to have loss sight of the fact that at the end of the day, there will never be enough spies, censors, cops on the beat, to protect Americans against terrorists’ intent on inflicting harm. Ultimately, it takes a much more engaged citizenry, and you can’t get there from here if the citizenry senses they are losing elements of their rights and their faith in the transparency and honesty of government.Well, you’re now traveling on one of the most important rail links in the United States, the New York-Washington corridor. How much safer are you on Amtrak today than you would have been on September 10, 2001?An argument that I have been trying to make about our post-9/11 world is that we have to assume that our most critical infrastructures that underpin our economy are becoming increasingly attractive targes for terrorist groups like al-Qaeda. This perspective runs a bit contrary to the conventional view of terrorism being primarily about spectacular acts of violence that kill lots of people. In my view we need to inventory the things in our society that are both critical and currently vulnerable and quickly work to make them more resilient. Resilience can take one of three forms. One way is to harden things such as putting Jersey barriers around important buildings to keep truck bombs from getting too close. Another is redundancy. For instance, the distribution system of our electric grid would be more resilient if we have an inventory of spare electrical transformers so if one is targeted, it can be replaced quickly and power can be readily restored. Having spares would make transformers a less attractive terrorist target. The third form is to make your response capabilities as good as possible. For instance, the Trans-Alaska oil pipeline really doesn’t lend itself to hardening or redunancy. But quick response to a repair an accidental or intentional breach in the pipeline could be an effective deterrent. An emphasis on one or more elements of resiliency would depend on both balancing the potential consequences of a successful terrorist attack and the costs associated with each of the resiliency options. For instance, in the case of nuclear power plants and key chemical plants, you’re looking at hardening them since the potential for catastrophic loss of life is high and the cost of building spares is prohibitive. For rail or mass transit, the issue is more economic than loss of life, and the approach to managing the threat is more about effectively managing the response to a possible attack versus trying to harden the system to prevent every possible attack. The London attacks [on the public transit system July 7, 2005] illustrated this. On its face, the conventional wisdom of terrorist being only interested in spectacular acts of violence would seem to translate into the London Underground being a fairly unattractive target. The suicide bombers set off their explosives in cars that were in dark tunnels which makes for lousy television images and did not achieve mass casualties on a major scale. A couple of suicide bombers at the changing of the guard at Buckingham Palace would have drawn far more attention in that respect. But the 7/7 attacks points to the evolution by terrorists towards economic targeting vs. mass killings. I believe that the goal of the terrorists was not some much to kill lots of civilians as to create so much fear about traveling in the mass transit system that daily life in London would be crippled in the kind of way New York City is right now as a result of the transit strike. However, it turned out that the London Underground was far more resilient than the terrorists probably expected. This didn’t happen by magic. The British government made substantial investments in close-circuit television cameras that allowed them to determine who and how the attacks were carried out. The transit workers were well trained to respond to emergencies and the police, firefighters, and EMTs had conducted many exercises so they responded to the attacks quickly and professionally, reducing the loss of life. Finally, the British politicians did not overreact and the British people themselves showed the resiliency they had acquired after decades of IRA [Irish Republican Army] attacks, by getting back on the trains the next day. As a result of all this, I think in the future terrorist are likely to conclude that the Underground is not a soft target which is worth using their limited resources to take on. In short, a priority in our war on terrorism should be for the federal government to take the lead on making critical infrastructures more secure, thus diminishing their attractiveness as targets. How far have we come since 9/11? The answer is not very far at all. We’re putting all our eggs into one basket, taking the battle to the enemy, getting better intelligence and extending the authority of law enforcement. Yet we don’t have much of a debate about the fact that the 9/11 Commission’s final recommendations on how to make the U.S. safer at home lay untouched in many cases, especially when it comes to spending wisely on first responders and hardening or building redundancy into key infrastructure. We have debates about the Patriot Act and Iraq, and sure, they warrant debate, but they don’t address the full panoply of issues that threaten Americans at home.What about airports? Millions are using them as we speak for holiday travel. Are they safer?There’s good news and bad news here. In terms of the 9/11 scenario -- men with box cutters commandeering an aircraft and turning it into a missile -- we’ve pretty much nailed that scenario. The most important change made is a change in passenger behavior. It’s unlikely passengers would allow that to happen anymore. But the major hole in aviation safety is air cargo. Almost a third does not move on UPS or other cargo lines. Rather, it’s in the lower deck of passenger lines and it’s an increasingly important revenue stream for air passenger carriers. The only thing happening to those cargo items is that they’re weighed to determine how much to charge. Other than that, it’s straight onto the plane. It’s a glaring problem going back to [the 1988 Pan Am] Lockerbie bombing [over Scotland] the opportunity to put into cargo holds an explosive device that takes out the aircraft. Of course, that wouldn’t have the same affect of turning an airplane into a missile, and on its most basic level, to me, the most important things we did post-9/11 to improve aviation security were relatively simple and not very costly: locking cockpit doors and changing the behavior of passengers. To a large extend, the rest of it, all the passenger screening, etc., has only added much smaller increments of security. Over the years, we’ve heard of efforts to target bridges and tunnels, particularly in New York City. Has progress been made securing these assets?Very little has been done outside of improving some surveillance of the sites, mostly relying on surveillance cameras. It’s been very piecemeal and, in most cases, law enforcement officials won’t be near enough to react to an attack if a surveillance camera even picks it up. The main value of surveillance is looking for people scouting out and probing the security of a target. That means you’d have to have someone there to analyze the data you are collecting and they need to be able to connect the proverbial dots. Someone taking a picture of a bridge may just be an artist who wants to paint it. But someone taking a picture of five different bridges that have little aesthetic appeal should set off an alarm. However, across the country, the challenge of taking local law enforcement suspicious sighting reports and putting them together to form a common picture is something we haven’t accomplished yet. Most importantly, when we talk about some of our critical bridges and tunnels, the ability to protect or to have spares on hand of key components and to nimbly respond when something goes wrong may be the best deterrent. Sabotage is always harder than it may first seem though it is a threat we should be increasing concerned about because al-Qaeda is developing the skills in Iraq to do it better. Invariably, when talking about major targets, the more public authorities and the operators exercise the more everyone understand the problems that would arise in an emergency. Again the ability to respond well is an important part of diminishing the appeal of attacking critical transportation systems as the Brits response to the subway bombing illustrated. One formula that is sure not to work is our tendency only to surge protective measures when Washington believes it has the intelligence to warrant raising the general alert level. If we should have learned anything from 9/11 it is both the limits of our intelligence community and al-Qaeda’s ability to strike when our guard is down. What about tanker trucks, trains, and other vessels carrying hazardous materials?There is some improvement, but the basic, overall vulnerability remains largely unaddressed. Most of our rail travels through the heart of our cities, especially along the East Coast and in the older Midwest cities. They often transit right through the heart of communities and trucks do the same. Barges on inland waterways carrying dangerous cargoes move through large cities in heartland of the country as well. This should be a source of concern. So how do you deal with it? You don’t try to harden every truck, train, or barge. Instead, you think about re-routing the most dangerous cargoes away from population centers, sensitive economic and environmental areas. Where that’s not possible, industry needs to be more transparent about what they are moving with the public authorities in the communities they are transiting through who are involved in protecting and responding. There needs to be a more robust capability than exists today for the rail and truck industry to provide information to local authorities that lets them know what’s coming their way and what contingency they might face. Right now, in most case, all local emergency responders have to rely on are placards on the sides of trucks or rail cars. That’s often is too little too late. There has been some talk about tackling this issue, but so far, it’s mainly just talk.What about the nation’s large container ports and cargo-handling areas along the various coasts and major rivers?This has been such a priority for me because the cargo container, the forty-foot and twenty-foot boxes, are really the conveyor belt for our manufacturing and retail sectors. Our factories and stores have come to depend on a razor-thin inventory margins to stay competitive. That means there is the potential for tremendous economic fallout from a single incident involving a container, particularly a dirty-bomb kind of scenario, since our government’s response almost certainly would be to stop the movement of all containers while they sort out the attack and post-attack security. Still today, more than four years after 9/11, the federal government has not put together a plan for how to turn the transportation system back on should it be shutdown after a terrorist attack involving a container. The risk, then, is not so much loss of life or local damage, but literally that an incident could bring the global trade system to a grinding halt within three weeks as the U.S. closes its ports and develops a protocol on the fly to manage it. In terms of how to address this vulnerability, my focus is primarily on the ability to monitor the flows of containers and try to verify whether low risk is low risk or not. That way, if a terrorist incident happened, our public authorities would be able to focus their response to that part of the system where the breech of security took place while letting the rest of the system continue to flow. But if you rely essentially on a trust-but-don’t-verify system [where] you ask companies to be [responsible] but can’t determine if they really are, I worry that everything we defined as low risk will be redefined as high risk. Again, it’s building resiliency here at home. We need to be able to not only throw a punch, but to be able to take punch, too. The president has not conveyed, in all his talk about doing whatever it takes, the need to inventory the most critical assets that support our quality of life and take the minimal steps to prevent vulnerabilities. Things like the New York City transit strike and natural disasters demonstrate how easy it is to disrupt our lives if the systems we depend on are compromised. If we learn anything from [Hurricane] Katrina, it should be that what you fail to do in advance sows the seeds of catastrophe. That lesson still seems to be unlearned.
  • United States
    Real Security in a Post-9/11 World
    Podcast
    12:15–1:00 p.m. Lunch1:00–2:00 p.m. Meeting
  • United States
    America the Vulnerable
    In this book, CFR Fellow Stephen E. Flynn argues that three years after September 11, the United States is still dangerously unprepared to prevent or respond to another attack on its soil. The United States should be operating on a wartime footing at home, but despite the many new security precautions that have been proposed, America’s most serious vulnerabilities remain ominously exposed. Teaching notes by the author.
  • United States
    Ending the Post 9/11 Security Neglect of America’s Chemical Facilities
    Written Testimony before a hearing of the Committee on Homeland Security and Governmental Affairs United States Senate on “The Security of America’s Chemical Facilities" Chairman Collins, Senator Lieberman, and distinguished members of the Committee on Homeland Security and Governmental Affairs, I am the Jeane J. Kirkpatrick Senior fellow in national security studies at the Council on Foreign Relations. I am honored to appear before you this morning to discuss the vitally important issue of assessing the security of America’s chemical facilities and to provide recommendations for moving beyond the tepid federal government effort since 9/11 to reduce the vulnerability of this critical sector to terrorism. There is no more important work this Committee can undertake than holding hearings such as this one. With the passage of time, it has become tempting for many in Washington to become self-congratulatory about the efforts that have been made to date to deal with the catastrophic terrorist threat. Some would like to believe that our post-9/11 military operations in Iraq and Afghanistan have dissuaded terrorists from doing their worse on U.S. soil or at least distracted them from attacking the U.S. homeland. Others would like to assign a deterrent value to the very modest measures that have been taken to date to bolster security at home. On the other end of the spectrum, as Americans become aware of just how “target-rich” we are as a nation, many simply become fatalistic. One view holds that a determined terrorist will succeed no matter what measures we put in place so any effort is hardly worth the effort. Some go so far as to argue that the expense of safeguarding what is valuable and vulnerable in our midst is itself a concession to terrorism; i.e., “the terrorists have won” if we have to make post-9/11 adjustments to the way we conduct business or go about our daily lives. When the optimists who believe America is winning the war on terror by way of its overseas exertions are combined with the pessimists who believe efforts to protect the U.S. homeland are futile, what is left is a very small constituency who support tackling the complex issue of critical infrastructure protection. This is why it so important that this committee continues to exercise leadership on these issues. It is my conviction that al Qaeda or one of its many radical jihadist imitators will attempt to carry out a major terrorist attack on the United States within the next five years. At the top of the list of likely targets is the chemical industry. I also believe that there are practical steps that can be taken right now at a reasonable cost that can reduce the risk that the next terrorist attack will be catastrophic. We must necessarily begin with a far more active role by the federal government in advancing security within an industry that has long been accustomed to managing its own affairs. The case for purposeful federal leadership to bolster security in the chemical industry rests on two legs. First, is the attractiveness of the industry as a potential terrorist target? Second, are the inherent limits of the marketplace— left on its own— to advance security within this sector? THE THREAT One of the questions that is asked with growing frequency today is why there has not been another attack since 9/11? If America is indeed vulnerable, why have the terrorists not struck again? Implicit in this question are both: (1) a critique that perhaps observers like me are overstating the threat and underestimating what the U.S. government has accomplished since 9/11 to reduce the risk, and (2) a concern that new investments in added security may end up being wasteful. There is a compelling explanation for a lengthy interval between the 9/11 attacks and the next attack that should serve as an antidote for the quickening slide back towards national complacency. Al Qaeda has made clear that they want to carry out a more devastating attack then those on New York and Washington. Launching such an attack requires developing a plan and mobilizing the capacity to carry out that plan. This includes setting up a logistics cell, surveillance cell, and attack cell to scope out the target, conduct dry runs, and ultimately to execute the attack. Establishing this organizational capacity takes time, particularly within the United States, where al Qaeda must work from a much smaller organizational footprint than it has in Western Europe or countries like Indonesia. Going after lesser targets puts that organization at risk because any attack exposes terrorist cells to enforcement action. This is because it is impossible to carry out an attack without leaving a forensic trail that can put a carefully built organization at risk. In short, while it is true that there are many easy targets within the United States that terrorists could have struck since 9/11, carrying out a truly catastrophic terrorists attack requires more time. Of the carefully selected potential targets that al Qaeda or its imitators might seek to attack, the chemical industry should be at the top of the list. There are hundreds of chemical facilities within the United States that represent the military equivalent of a poorly guarded arsenal of weapons of mass destruction. Terrorists do not need to produce or procure chemical weapons and smuggle them into the United States. Just as on 9/11 they converted domestic airliners into missiles that destroyed the twin towers, they can target facilities that manufacture or conveyances that transport such lethal chemicals as chlorine, anhydrous ammonia, boron tri-flouride, cyanide, and nitrates. These facilities are found around the country in industrial parks, in seaports, and near the major population centers. Dangerous chemicals routinely travel along our highways, inland waterways, and on railcars that pass through the heart of major cities including Washington, DC just a short distance from Capitol Hill. Terrorist attacks on the U.S. chemical industry have the potential to kill tens of thousands of Americans and seriously injure many more. In many instances, these attacks hold the potential for having a cascading effect across other infrastructures, particularly in the energy and transportation sectors. This is both because of the damage that can be caused by the attack, and the enormous expense and effort associated with the clean-up to an affected area in its aftermath. The four metropolitan areas that deserve the most federal attention and support are Newark, New Orleans, Houston, and Los Angeles. THE LIMITS OF THE MARKET The White House National Strategy for Homeland Security, released on July 16, 2002, assigns most of the responsibility for funding the protection of potential targets within U.S. borders to the private sector. In Chapter Six, “The Costs of Homeland Security,” the strategy lays out “the broad principles that should guide the allocation of funding for homeland security [and] help determine who should bear the financial burdens.” It declares: "The government should only address those activities that the market does not adequately provide— for example, national defense or border security…. For other aspects of homeland security, sufficient incentives exist in the private market to supply protection. In these cases we should rely on the private sector." Unfortunately, this expression of faith in the market has not been borne out by security investments within the private sector. According to a survey commissioned by the Washington-based Council on Competitiveness just one year after September 11, 92 percent of executives did not believe that terrorists would target their companies, and only 53 percent of the respondents indicated that their companies had increased security spending between 2001 and 2002. With the passing of each month without a new attack, the reluctance of companies to invest in security has only grown. If there were indeed “sufficient incentives in the private market to supply protection,” there would be no need for the hearing we are having today. 3 ½ years after the September 11 attacks we should be seeing the chemical industry making substantial investments in addressing longstanding security weaknesses. But, there are two barriers to this kind of investment taking place. First, executives in this increasingly competitive industry worry that such investments will place them at a competitive disadvantage. Second, there are unique liability issues associated with industry-led efforts to define and implement adequate security. Security is not free. A company incurs costs when it invests in measures to protect the portion of a vital sector it controls. If a company does not believe other companies are willing or able to make a similar investment, then it faces the likelihood of losing market share while simply shifting the sector’s vulnerability elsewhere. If terrorists strike, the company will still suffer the disruptive consequences of an attack right alongside those who did nothing to prevent it. Those consequences are likely to include the cost of implementing new government requirements. Therefore, infrastructure security suffers from a dilemma commonly referred to as the "tragedy of the commons." The “tragedy of the commons” applies to the chemical industry in this way: By and large, chemical manufacturers have had an impressive safety record. They routinely work with and transport some of the most dangerous substances known to man, but accidents that result in serious loss of life and damage to the environment are rare. However, the post-9/11 security imperative poses a special challenge for them. Operating on thin profit margins and faced with growing overseas competition, most companies have been reluctant to incur the additional costs associated with improving their security. Consider the case of a hypothetical manager of a chemical plant who decides to spend a day looking around his facility to access its security and discovers many serious lapses. After a fitful night of sleep, he wakes up and decides to invest in protective measures that raise the cost to his customers by $50 per shipment. A competitor who does not make that investment will be able to attract business away from the security-conscious plant because his handling costs will be lower. Capable terrorists and criminals will target this lower-cost operation since it is an easier target. The result is that the terrorist threat is only displaced, not deterred. Even if the chemical industry could agree amongst itself to a common set of security measures and felt confident that good faith efforts would be made across the sector to abide by them, it still faces the unique uncertainties associated with liability when it comes to deciding, “How much security is enough.” Since all security measures follow the rule of diminishing returns; i.e., higher investments buy incrementally less additional security; at some point a decision about the cost-benefit trade-off must be made. When executives make decisions about safety or other business issues, they can refer to empirical data from reliable open or proprietary sources. But decisions about adequate security require information about the threat. Typically, that information/intelligence is carefully controlled by the public sector and often lacks specificity. So the private sector is left essentially making their best guess about how much security they should invest in. However, a successful attack on their sector in the wake of new investments to protect it, will inevitably lead to a public judgment that the bar was set too low. The only way to prevent the tragedy of the commons and to address the liability issue is for the public sector: (1) to be intimately involved in the decision about what security measures should be taken, (2) to have a credible enforcement role in assuring industry compliance with these measures, and (3) to provide a reasonable level of indemnification should agreed upon security measures be found wanting following a terrorist attack; i.e., to provide the industry with a measure of “Good Samaritan” protection as long as they abide by agreed upon standards . In short, security of critical infrastructures such as the chemical industry requires an effective performance-based regulatory regime developed at the federal level. To this end, I recommend this committee consider holding hearings and drafting legislation that incorporates the following: (1) Provides the necessary resources for the Department of Homeland Security to work with (a) the Local Planning Emergency Committees created under the Emergency Response and Community Right to Know Act (EPCRA) and (b) the FBI’s district-based INFRAGARD program to identify minimal standards for the industry to: Establish physical security, communications capabilities, and access control at chemical facilities based on the quantity and lethality of the chemicals produced and stored within a facility, its proximity to major population centers, and its proximity to other critical infrastructure such as energy and transportation. Conduct regular exercises to test the adequacy of security measures to prevent intrusions. To conduct community outreach on incidence management with neighbors to the facilities who would be directly affected in the aftermath of a successful attack. To set minimal intervals for emergency response training involving local firefighters, police, and emergency healthcare based on the likelihood of large-scale casualties in the aftermath of a successful attack. (2) To authorize the creation of bonded, third-party inspectors to audit compliance with these minimal standards at intervals appropriate to the risk posed by a successful attack on the chemical facility. (3) To create within the Department of Homeland a chemical security compliance office that conducts periodic inspections of facilities to determine both the adequacy of their compliance and the care at which third-party inspectors have conducted their compliance audits. In carrying out this “auditing-the-auditors” program, DHS must possess the authority to swiftly sanction third-party inspectors who it finds to be providing substandard audits. (4) To sponsor research and development and to provide tax incentives which reward the adoption of less dangerous processes for making, handling, and storing the most lethal chemicals. (5) To sponsor research and development of new technologies to mitigate the risk of chemical releases beyond a chemical facility. (6) To sponsor research and development of lower-cost, more user-friendly protective equipment for emergency responders. (7) To create a task force that recommends a new protocol for resolving the conflict associated with the pre-9/11 community outreach requirements of EPCRA and the post-9/11 trend towards restricting public access to information deemed to be sensitive by DHS. The need for advanced information to be available for communities to take necessary life-saving measures in the aftermath of an attack should be assigned as much of a priority as DHS’s tendency to treat public disclosure of details associated with high-risk/high-consequence facilities as sensitive information. This is especially the case in the near term to medium term, given the low-probability that DHS will have actionable intelligence to prevent a terrorist attack. (8) To require security risk assessments that are reviewed by the senior homeland security official at the state level before new non-industrial development is allowed in the vicinity of existing chemical facilities. This is designed to provide the means for an appropriate evaluation of decisions such as the one made this year by the Los Angeles Community College District to build a campus to accommodate up to 12,000 students in the southeast Los Angeles community of South Gate, next to one of southern California’s largest chemical plants. CONCLUSIONS: While this hearing has focused on the issue of chemical facilities, it is important that the issue of transportation of chemicals receive equal attention by this committee and by the federal government. At the end of the day, precursor chemicals must be shipped to manufacturing facilities to produce their final products, and those products need to reach consumers for them to have commercial value. This means that virtually all of the chemicals that we should be concerned with at industrial facilities are concurrently moving about on railcars, barges, and trucks, often in close proximity to major population centers. There are even some chemicals that are so hazardous that they become unstable if they do not reach their destination within prescribed timeframes; i.e., they will explode. The limited progress there has been made to date within the chemical industry has primarily involved efforts to improve physical security. While these “gates, guards, and guns” issues warrant the attention they have been receiving, they represent only a small part of the overall security agenda. At the end of the day, determined terrorist organizations will be able to compromise any existing industrial security regime. This does not mean these measures are futile because the harder a target becomes to compromise, the more expertise, money, planning, and dry-runs a terrorist organization requires to compromise it. This translates into improved odds that they will do things that will allow them to be detected by vigilant law enforcement. However, the best way to protect both the American people and an industry as critical to the U.S. economy and our modern way of life as the chemical sector is to reduce the probability that targeting chemical facilities or the transport of hazardous chemicals is the equivalent of constructing and deploying a weapon of mass destruction. We can accomplish this by adding a new security lens to the safety lens that is already well entrenched within the industry. The safety lens which has evolved from training, professional protocols, regulation, and liability law, requires that the industry automatically anticipate the possibilities and potential consequences of an act of God, human error, or mechanical error and devise means to mitigate those risks. In our post-9/11 age, the new requirement must be that the industry also automatically asks: “What is the possibility and what are the potential consequences that we could be targeted by someone with malicious intent?” Based on the answer to that question, they must incorporate appropriate safeguards to lower the risk. In the end, given that it will be several years before the recent reforms to our intelligence community will bear fruit, we must accept that while a “threat-based” approach to homeland security may be desirable, it will be elusive for some time to come. The only prudent alternative to dealing with our intelligence shortcomings is to look at the sectors where the consequences of an attack would be greatest and assume that our adversaries are interested in attacking those targets. This means that we must put in place, as quickly as possible, reasonable safeguards to both protect those targets and to reduce the consequences should our prevention efforts fail. One of the central conclusions of the 9/11 Commission noted the pervasive lack of imagination across the U.S. government in anticipating that organizations like al Qaeda would use aircraft as instruments of terror. What should be guiding our efforts on homeland security today is not whether there is explicit evidence that demonstrates that our adversaries are thinking how and when to harm us, but whether there are in place credible measures that would prevent an attack from happening. As I look at the chemical industry today, I do not see credible barriers to a determined and resourceful terrorist organization. This is clearly an unsatisfactory state of affairs in our post-9/11 world. Stephen Flynn is the author of America the Vulnerable, published by HarperCollins in July 2004. He is the inaugural occupant of the Jeane J. Kirkpatrick Chair in National Security Studies at the Council on Foreign Relations. Dr. Flynn served as Director and principal author for the task force report “America: Still Unprepared— Still in Danger,” co-chaired by former Senators Gary Hart and Warren Rudman. He spent twenty years as a commissioned officer in the U.S. Coast Guard including two commands at sea, served in the White House Military Office during the George H.W. Bush administration, and was director for Global Issue on the National Security Council staff during the Clinton administration. He holds a Ph.D. and M.A.L.D. from the Fletcher School of Law and Diplomacy and a B.S. from the U.S. Coast Guard Academy.
  • United States
    Cordesman: 9/11 Commission Report Lacks Specifics
    Anthony H. Cordesman, a leading expert on intelligence, says President Bush wisely declined to embrace all of the 9/11 Commission’s proposals for intelligence reform. Bush’s call for a new director of national intelligence (DNI) was “a compromise between taking the kind of action that would show that intelligence reform was under way and overreacting to the 9/11 report, which provides almost no detail, no specific plans, and no rationale for most of its recommendations.” Cordesman says it is “irresponsible” for politicians like Democratic presidential nominee John F. Kerry to call for quick approval of all the commission’s recommendations without proper study by Congress. Cordesman holds the Arleigh A. Burke chair in strategy at the Center for Strategic and International Studies in Washington. He was interviewed on August 3, 2004, by Bernard Gwertzman, consulting editor of cfr.org. President Bush said on Monday that he supports the idea of a new director of national intelligence, a new intelligence “czar”... Let me interrupt. Nobody has said this new intelligence director is going to be an intelligence “czar,” in terms of defining any of the powers he is going to have. This is particularly true in terms of tasking and budget control. So until you see a presidential directive, I would be very careful about using the word “czar.” What then has the president proposed? He compromised between taking the kind of action that would show that intelligence reform was under way and overreacting to the 9/11 report, which provides almost no detail, no specific plans, and no rationale for most of its recommendations. What Bush did, effectively, was to say that there would be a new national intelligence director and that this new person would be his principal adviser and would be separate from the director of the Central Intelligence Agency [CIA]. He talked about an office that would combine domestic and foreign intelligence in terms of coordination, but he did not really go beyond that to try to define specific roles. He talked about creating a national counterterrorism center in this office, but he also talked about building on the work done since 9/11 within the CIA. Much of this would presumably consist of transferring a component of the CIA to the new DNI. But he was careful to note something the 9/11 Commission did not consider at all— that there are many, many more uses of intelligence than just counterterrorism. So he pointed out that it might well be necessary to have a similar center to deal with issues like proliferation. He also wisely, I think, talked about endorsing the recommendations of the commission in some areas, but provided no details as to which he would endorse, the timing, or how [the recommendations] would be implemented. Given the fact that the commission report basically provides no details as to what these recommendations mean in terms of staffing, costs, procedures, information technology, or any of the other steps necessary to implement them, the president has effectively left most issues open. Is this good or bad? Is this now open for discussion with Congress? It will take some time to put together a plan. That is one of the key issues. Nothing could have been worse or more impractical than calling Congress back to essentially try to vote on legislation to implement recommendations that have no details and no specifics. I think one of the great problems people face is that politicians rushed to join the bandwagon, effectively endorsing chapters 12 and 13 of this report. But they could not possibly have bothered to read what they were endorsing. Nobody in Congress with any experience is going to endorse a generalized recommendation for organizational change without any specifics, without any knowledge of the cost or the effectiveness, or even, because this is the major failing of the report, any knowledge of what has been done since 9/11 to try to fix the problems exposed in the commission report. Are you implying that Senator John F. Kerry, the Democratic nominee, was premature in endorsing the report’s recommendations? In fairness to Senator Kerry, there were many people in both parties who rushed out to gain political visibility and do the same thing. But it isn’t a matter of being premature; it is a matter of being totally irresponsible to think that you can rush Congress back to pass legislation when you haven’t the faintest idea of what it means, when most of the recommendations have never been reviewed or commented on by the intelligence community, and nobody has any idea of the staffing requirements or costs. There has been some criticism that the president, by declining to give the DNI control over the government’s intelligence budget, has made the job meaningless. Is this criticism premature? I think it is. The president has to consider some very real problems. Most of the intelligence budget goes to what are called “national technical means” [such as photo and communications satellites]. These are extremely sophisticated high-technology systems. Almost all of the planning and development of these systems occurs in the Defense Department [DOD]. They are designed to be integrated into an overall command-and-control system for military crisis management and war fighting. Now, when you reach budget decisions you have to have a budget structure where both the new DNI and the DOD can play the proper roles in budget review, and where there is programming authority and a programming staff to look beyond the current annual requirement to the overall needs for intelligence and how they fit into our command-and-control and communications systems. Again, one of the great problems in the commission report is that it looked at exactly one issue— counterterrorism— and none of the others. But [U.S.] intelligence users consist of more than 1 million people, many of them in uniform, and when you talk about budgeting and programming authority, you have to consider that. The other difficulty is that at some point— and it will have to be very quick, if the new DNI is given budget authority— the [current] archaic and outdated budget system, which has many different elements and information systems, is going to have to be integrated and converted into a more modern system. You cannot simply wave a magic wand and tell somebody how to create a system that can manage what is certainly more than $20 billion a year. I’m not quite sure where you come out on this. Do you think the new DNI should have overall budget authority, or should he just be a coordinator with the existing agencies? I think, like almost every recommendation in the commission report, that is something that requires study and the creation of some clear planning system. I think the DNI has to have programming capabilities, budget review, and budget authority. But he is not the only person who has to be involved in the process. And the DOD is still going to be the primary office in charge of integrating, developing, and reviewing most of this budget. In fact, if you look at the commission report, one of the problems— which is typical— is there is no description of any of these issues. The president is going to have to study this and reach a decision. All of the people who talk about how this should be implemented instantly, without any study or planning, have absolutely no idea of what they are talking about or what they mean when they say it. You are not happy with the overall conclusions of the report? One needs to be very careful. Many of these conclusions are probably very valuable. But this is a 13-chapter report. Eleven chapters are a masterful description of what happened and what went wrong that led to the 9/11 attack. There is no chapter that explains what people did after 9/11. There is no chapter that qualifies that this is only one of many problems in intelligence and intelligence reform. The last two chapters effectively describe changes in an organizational chart and make very broad recommendations. Anybody who bothers to read them, which tends to be a remarkably few people who are commenting on the report, realizes that you can’t solve problems when you don’t know what you are saying in terms of staff, costs, operating systems, and other details. This is critical because, among other things, when you look through that report, you see vague recommendations about getting rid of the causes of terrorism or about dealing with issues like Islamic extremism or improving the quality of the CIA, which are among the most important recommendations you could make. And then you suddenly realize that this is a paragraph of generalities or cliches with absolutely no operating content at all. To do its job properly, the commission needed at least several more months. It needed to actually create useful plans. And at some point, there needs to be a commission, or somebody, who looks at the overall needs of the intelligence community and doesn’t make counterterrorism effectively the only function of the intelligence community. Who would be the ideal DNI? The answer to that is no one. You are asking who is the perfect person to tie together collection and analysis for the entire world, looking at today’s issues and indefinitely into the future, and then communicate them perfectly to all the possible users, from the president on down. That person clearly does not exist. But whoever does do it has to have vast experience in actually managing the intelligence community, in knowing how to allocate resources, looking at the overall complexity of this issue. One of the great weaknesses in the new system is the same weakness of the old system: The same person is supposed to create an effective structure to manage a global intelligence system, which costs more than $20 billion a year, and then be the ideal personal intelligence adviser to the president. I’m not sure that, quite apart from the perfect person, one person can do those functions. But again, that question is not addressed in the 9/11 report.
  • Homeland Security
    America the Vulnerable
    Three years after September 11, the United States is still dangerously unprepared to prevent or respond to another attack on its soil. Faced with this threat, the United States should be operating on a wartime footing at home. But despite the many new security precautions that have been proposed, America's most serious vulnerabilities remain ominously exposed. The United States still offers its enemies a vast menu of soft targets: water and food supplies; chemical plants; energy grids and pipelines; bridges, tunnels, and ports; and the millions of cargo containers that carry most of the goods U.S. consumers depend on. A leading expert on homeland security, Stephen E. Flynn, says the measures cobbled together to protect these vital systems are hardly fit to deter amateur thieves, vandals, and smugglers, let alone determined terrorists. Worse still, small improvements are often oversold as giant steps forward, lowering the guard of the average citizen and building an unwarranted sense of confidence. The book describes a frightening scenario of what the next major terrorist attack might look like, revealing the tragic loss of life and economic havoc it would leave in its wake, as well as the seismic political consequences it would have in Washington and across the country. In a new world of heightened risk and fear, America the Vulnerable delivers a timely, forceful message that cannot be ignored. A Council on Foreign Relations Book
  • United States
    Rethinking the Role of the U.S. Mexican Border in the Post-9/11 World
      Written Testimony before a hearing of the Committee on Foreign Relations, United States Senate on “U.S.-Mexico: Immigration Policy & The Bilateral Relationship” Stephen E. Flynn, Ph.D. Commander, U.S. Coast Guard (ret.) Jeane J. Kirkpatrick Senior Fellow in National Security Studies March 23, 2004   Chairman Lugar, Senator Biden, and distinguished members of the Senate Foreign Affairs Committee. I am the Jeane J. Kirkpatrick Senior Fellow in National Security Studies at the Council on Foreign Relations where I recently directed the Independent Task Force on Homeland Security, co-chaired by former Senators Warren Rudman and Gary Hart. In June 2002, I retired as a Commander in the U.S. Coast Guard after 20 years of active duty service. I am honored to be appearing before you this morning to discuss the issue of border control as an element of the bilateral relationship between the United States and Mexico. North America finds itself in paradoxical times. On the one hand, the hemisphere’s economic prosperity depends on an open continental system that facilitates the free movement of people and goods. On the other, worries over America’s exposure to catastrophic terrorist attacks have transformed homeland security into one of Washington’s leading preoccupations. The result is that while the NAFTA imperative of a more open border was gathering steam prior to 9/11, since that fateful day, controlling the southwest border in an effort to prevent illegal immigration and smuggling has been advanced as essential to combating the terrorist threat against the United States. Security has trumped cross-border facilitation as our abiding interest. This is a mistake since it wrongly presumes that there is an automatic tradeoff between advancing greater degrees of openness to support the movement of legitimate people and goods and the need for more rigorous border controls. The experience over the past decade of stepped-up enforcement along the Mexican border suggests that U.S. efforts aimed at hardening its borders can have the unintended consequence of creating precisely the kind of an environment that is conducive to terrorists and criminals. Draconian measures to police the border invariably provide incentives for informal arrangements and criminal conspiracies to overcome cross-border barriers to commerce and labor movements. In addition, unilateral measures pursued on one side of the border create political impediments for enforcement cooperation on the other. The result is that the border region becomes more chaotic which makes it ideal for exploitation by criminals and terrorists. Terrorists and the tools of terrorism do not spring up at the border. Instead, they arrive via hemispheric and international trade and travel networks. Advancing a continental approach to deterring, detecting, and intercepting illicit actors seeking to exploit those networks would accomplish two things. First, it would provide some strategic depth for responding to a threat before it arrived at a critical and congested border crossing. Second, it would allow the ability to segment risk so that the cross-border movements of people and cargo deemed to present a low-risk could be facilitated. Then limited enforcement resources could be targeted more effectively at those that present a high risk. The shared risks of loss of life and massive economic disruption presented by the catastrophic terrorist threat should provide the basis for greater levels of bilateral cooperation that can remove many longstanding barriers to continental commerce precisely because those barriers themselves can elevate security risks. For example, the longstanding neglect of the border in terms of limited infrastructure investment and tepid efforts at customs and immigration modernization and harmonization made no sense in purely economic terms. But the resultant inefficiencies that carry substantial commercial costs also create opportunities that thugs and terrorists can exploit. Thus, there is a national security rationale to redress those inefficiencies. The agendas for both promoting security and greater continental commerce can be and must be mutual reinforcing. The Hardened Border Paradox Great powers have been building great walls throughout history. The Great Wall of China, the Maginot Line, and the Berlin Wall went up at considerable expense in sweat and treasure and all ultimately failed to block or contain the forces that prompted their construction. The recent efforts by the United States to “protect” the southwest border including installing a 26-mile long fence between San Diego and Tijuana, has had a similar fate. Take the case of illegal migration. Stepped-up patrolling and policing of the border may raise the costs of getting to the United States, but it also creates a demand for those who are in the business of arranging the illegal crossings. Migrants who once simply strolled across the border to seek work on the other side, now need “professional” help. That help is provided by guides known as “coyotes” who take migrants to remote border locations or put together increasingly sophisticated smuggling operations at the land border entries. As the coyote business becomes more lucrative, criminal gangs are better positioned to invest in pay-offs of front-line agents.[1] The prevalence of corruption, in turn, undermines information sharing and operational coordination between U.S. authorities and their Mexican counterparts. Enforcement driven-delays at the border also ironically contribute to creating opportunities for smuggling narcotics as well. In Laredo, Texas for instance, truck crossings were at 2.8 million in 1999, up from 1.3 million in 1993.[2] Many of these trucks operating at the border are old and poorly maintained and owned by small mom-and-pop trucking companies. The turnover-rate among drivers is extremely high. These conditions are prevalent because waiting hours at a border crossing in order to make a 20-mile round trip, with an empty trailer on the return, is not a lucrative business. Moving intercontinental freight is, so the trucks and drivers who make long-haul journeys tend to be of a higher quality. Since it is uneconomical to run a state-of-the-art rig near the border, trailers are usually offloaded at depots near the border. In the case of south-bound traffic, a short-haul truck is then contracted to move the freight to a customs broker who will then order another short-haul truck to transport the freight to another depot across the border. A long-haul truck will then pick up the load and carry it into the interior. The drivers of these short-haul rigs tend to be younger, less skilled, and are paid only nominal wages— as little as $7 to $10 per trip. As a result, the potential payoff for carrying contraband through a congested border crossing is all the more tempting.[3] The White House Office of National Drug Control Policy estimates that more than half of the cocaine that arrives in the United States comes via the southwest border.[4] Even with the rise in the number of inspectors and investigators assigned to the 28 border-entry points in Texas, New Mexico, Arizona, and California, given both the volume and the nature of the trucking sector that services the border, the U.S. government clearly is facing “needle-in-a-haystack” odds as it strives to detect and intercept illicit drugs. The pure cocaine to feed America’s annual coke habit could be transported in just fifteen of the more than 20 million 40-foot containers that arrived at America’s land and sea borders each year. And in addition to looking for drugs, the U.S. Bureau of Customs and Border Protection is charged with monitoring compliance with more than 400 laws and 34 international treaties, statutes, agreements, and conventions on behalf of 40 federal agencies.[5] So while the prevalence of migrant and narcotics smuggling seems to provide a compelling rationale for tightening up controls along U.S. borders, aggressive border inspections in turn, confront improbable odds while fostering the kinds of conditions that generate ample time and opportunity within a Mexican and US border city for these illicit transfers to occur. Hardened borders also transform the cost-reward structure so amateur crooks are replaced by sophisticated criminal enterprises and corruption issues become more pronounced. In short, the experience of the southwest border suggests that aggressive border security measures end up contributing to problems that inspired them in the first place. The Open Border Paradox The United States has enjoyed the remarkable good fortune of having the oft-heralded “longest undefended border in the world” with it Canadian neighbor to the north. For much of the two nation’s history, to the extent that there was a government presence along the 49th parallel, it was only to collect customs duties. As a result, the 5,525 mile border can be summed up as a national boundary with no fences and a few toll gates. In recent years, those toll gates have come under increasing pressure as cross border trade has flourished. Take the automotive industry, for example. General Motors, Ford, and DaimlerChrysler manufacture many of the parts to build their cars and trucks from plants in the Canadian province of Ontario. Several times each day these parts are delivered to the assembly plants in the United States. Delivery trucks are loaded so that parts meant for specific vehicles can be unloaded and placed directly on the appropriate chassis as it moves down the assembly line. This “just-in-time” delivery system has given the Big Three a more cost-effective and efficient production process. It has also generated a great deal of truck traffic. For example, up to 9000 trucks a day transit the Ambassador Bridge between Detroit, Michigan, and Windsor, Ontario. At these rates, U.S. Customs and Border Protection officials must clear one truck every 18 seconds. If they fall behind, the parking lot can accommodate only 90 tractor-trailers at a time. Once the parking lot fills, trucks back up onto the bridge. The resulting pileup virtually closes the border, generating roadway chaos throughout metropolitan Windsor and Detroit, and costs the average automotive assembly plant an average of $1 million per hour in lost production. Over the past two decades, the episodic attention directed at the northern border was primarily centered around efforts to minimize any source of administrative friction that added to cost and delay of legitimate commerce. The notion of the 49th parallel as a security issue is a recent phenomenon that burst into the limelight just prior to the millennium. The catalyst was the December 1999 arrest of an Algerian terrorist with ties to Osama bin Laden in Port Angeles, Washington. Ahmed Ressam had arrived onboard a ferry from Vancouver in a passenger car with a trunk full of bomb-making materials. Only a U.S. Customs Service official’s unease with the way Ressam answered her questions prevented him from driving onto American soil. The jitters surrounding the Ressam arrest turned into near panic immediately following the September 11 attacks. Worries about the possibility of additional attacks led to the effective sealing of the border as every truck, car, driver, and passenger came under close examination. Within a day there was a 16-hour queue at the major border crossings in Michigan and New York.[6] By September 13, Damiler-Chrysler announced they would have to close an assembling plant on the following day because their supplies were stuck on the north side of the border.[7] On September 14, Ford announced they would be closing 5 plants the following week.[8] Washington quickly reconsidered its initial response and within a week, the border inspection wait times returned close to normal. On its face, the open and very limited controls exercised at the U.S.-Canada border would suggest that it was ripe for exploitation by criminals and terrorists. The reality is that the imperative to manage cross-border threats without disrupting trade that amounts to more than $1 billion a day and the travel of 220 million people each year, has led to an extraordinary degree of cross-border cooperation. On the Vermont-Quebec border, for instance, Canadian and U.S. law enforcement officers at the federal, state, provincial, and local levels have been meeting for 18 years to discuss their criminal cases without any formal charter. The relationships are such that participants sit together and share information in much the same way they might at a roll call if they all belonged to the same police precinct.[9] The resultant collegiality spills over into their daily police work. In fact, local agents in Vermont or New Hampshire who are frustrated on occasion by bureaucratic obstacles to getting information or assistance from U.S. federal agencies have found a successful end-run to be to seek out their Canadian counterparts and ask them to serve as intermediaries for their requests! In Washington state and British Colombia, U.S. and Canadian police, immigration and customs officials, stood up a bi-national team in 1996 to work on cross-border crimes with local, state, and provincial enforcement agencies. The team was called the “Integrated Border Enforcement Team (IBET)” and initially focused on drug smuggling, but the portfolio later expanded to include terrorism. Following the September 11 attacks, Washington and Ottawa agreed to establish a total of 8 of these IBETs along the border.[10] The movement towards emphasizing a broader framework of bi-national cooperation versus focusing on the physical borderline gained impetus in 1999 when Prime Minister Jean Chretien and President Bill Clinton formed a process of consultation labeled the “Canada-U.S. Partnership (CUSP).” The process had as its objective the reinvention of border management to support the seamless passage of legitimate flows of people and goods between the two countries.[11] Progress towards this end was somewhat halting until after September 11. With 40 percent of its GDP tied to trade with the United States[12] , the post-9-11 closing of the border transformed the CUSP agenda into Ottawa’s top priority. The then Canadian foreign minister, John Manley, was dispatched to Washington to meet with the new White House Director of Homeland Security, Tom Ridge. Manley found a sympathetic audience in Ridge who had just stepped down as Governor of Pennsylvania (Canada was that state’s number 1 trade partner.) Together they hammered out a 30 point “Smart Border Action Plan” which they announced on December 10, 2001. The preamble of the declaration declared:   Public Security and economic security are mutually reinforcing. By working together to develop a zone of confidence against terrorist activity, we create a unique opportunity to build a smart border for the 21st century; a border that securely facilitates the free flow of people and commerce; a border that reflects the largest trading relationship in the world.[13]   In short, in dramatic contrast to the approach the United States had pursued on its southern border throughout the 1990s, with respect to its northern border Washington has concluded that its security is optimized by striving to keep the border as open as possible, while working to improve cooperative bi-national arrangements. Indeed, efforts to harden the border along the 49th parallel have been assessed to be self-defeating not just in economic terms, but in security terms. Closing the border in the wake of a terrorist attack only reinforces the military value of engaging in such attacks. This is because it means the U.S. government ends up doing something to itself that no other world power could aspire to accomplish— it imposes a blockade on its own economy. The result is to convert a small investment in terror into massive disruption of daily life that has a clear and adverse effect on the U.S. and overall global economy. America’s adversaries would undoubtedly take solace in this and recognize that the potential benefits of this kind of warfare warrants consideration. Beyond Border Control Embracing openness and advancing homeland security need not be an "either-or" proposition if Washington is willing to apply the lessons it has drawn from its northern border to Mexico and the broader global community. The end game must not be about defending a line on a map, but advancing greater bilateral integration while managing important safety, security, and other public policy interests. This balancing act can be accomplished by: (1) developing the means to validate in advance the overwhelming majority of the people and goods that cross the border as law abiding and low risk; and (2) enhancing the means of federal agents to target and intercept inbound high risk people and goods. Accomplishing the first is key to succeeding at the second since there will always be limits on the time and resources available for agents to conduct investigations and inspections. The goal must be to limit the size of the haystack in which there are most likely to be illicit needles. Verifying legitimate cross border flows as truly legitimate is not as fearsome task as it might first appear. This is because aggregate border crossing numbers are somewhat misleading since so many of the vehicles, drivers, and people are regular customers. For instance, while there were 4.2 million recorded southwest border truck crossings in 1999, these crossings were made by roughly 80,000 trucks.[14] If we are willing to make the investment, the technologies are certainly available to identify frequent travelers as such. After undergoing a pre-screening application and inspection process, vehicles can be equipped with an electronic transponder and the driver can be provided with a NAFTA transportation identity card with encoded biometric information to confirm that they are in fact who they profess to be. Quickly clearing these vehicles and their drivers allows inspectors to focus more of their time and energy on examining unfamiliar or suspicious traffic. Similarly, the vast majority of the daily pedestrian border crossings are made by day laborers who return to their homes south of the border each evening. These individuals can be recognized as such by inspectors who are assigned to the border. Well-designed border crossings that are adequately staffed with inspectors who are well-trained in behavior pattern recognition can be more effective than reliance on high-technology when dealing with this foot traffic. An inspector does not need a machine to tell her if she is looking at a face she has never seen before. And a biometric devise is useless in detecting behaviors such as excessive anxiety that should arouse suspicion. There is no substitute for human judgment when making these kinds of calls. Manufacturers, carriers, shippers, importers or exporters could be encouraged to adopt stringent internal security practices that reduce their exposure to internal criminal conspiracies and which deter criminal elements from targeting their vehicles and goods once they leave a factory, warehouse, or transshipment facility. They should also be encouraged to invest in information and tracking technologies to maintain near real-time accountability of their drivers, vehicles, and cargo from the point of origin through the final destination. Finally, they should transmit in advance, the electronic information border agents need to assess their compliance with the applicable laws and regulations. Theft-resistant transportation networks are more difficult for criminals and terrorists to compromise. Should there be advance intelligence of such a compromise, these information systems will make it easier to locate and interdict shipments that might contain illegal migrants or contraband before it enters a crowded port or land border inspection facility; alternatively, authorities can put together a “controlled-delivery” sting operation, where the contraband is allowed to reach the intended recipient so that the appropriate arrests can be made. Given the value this has for security, the U.S. government should work to create every incentive for expanding participation in these frequent-traveler programs including providing adequate staff to quickly process applications and eliminating or substantially reducing or waiving of the fees for receiving these biometric cards and transponders. Since these programs advance our national security, making an appropriate investment in federal resources to them is appropriate. Still, bringing about the kind of transformation that makes the private sector a willing and able partner in supporting a reinvented border control mission requires strong market incentives. Happily such incentives exists if the U.S. government is thoughtful about how new investments in transportation infrastructure are made at and near the border. Specifically, the Transportation Equity Act for the 21st Century has targeted substantial funding for major roadway improvements under the Coordinated Border Infrastructure Program.[15] As development and management plans for such projects as the “Ports-to-Plain” Corridor and the I-69 NAFTA highway are drawn-up, the development of a “dedicated trade lane” should be incorporated. That is, like commuter “High Occupancy Vehicle” (HOV) lanes found around many metropolitan areas, access to a dedicated trade lane would be restricted to only those vehicles and drivers and that cargo that participates in the new border management regime. An additional incentive could come by moving many of the border entry inspection processes away from the physical border itself and instead consolidate them into a single trilateral “NAFTA inspection facility” and locate it on a dedicated traffic lane that leads to the border. For instance there is an 18-mile new toll road leading from I-39 to the Mexican state of Nueva Leon via the recently constructed Colombia Bridge on the outskirts of Laredo, Texas. Why not have the United States, Mexico, and Canada agree to grant extraterritorial legal authority within a NAFTA inspection facility placed at the start of that toll road where trucks, drivers, and cargo could be examined by inspectors from all three countries and where each agency is allowed to enforce their respective national laws and regulations for goods and conveyances bound for their jurisdiction. Statutes governing the development of border crossing facilities and infrastructure should be examined to identify legal barriers which prevent or slow the investment of federal monies in these projects. Specifically, there should be a fast track for completing environmental impact studies that can delay border infrastructure projects up to ten years. The Bureau of Customs and Border Protection has already embraced this approach in sea ports under a program Commissioner Robert Bonner has called the “Container Security Initiative.” An important element of that initiative is stationing U.S. Customs inspectors overseas in loading and transshipment ports to inspect suspicious cargo before it is even loaded on a ship. Nations who agree to participate are given reciprocal privileges in U.S. ports.[16] In the North American context, the end-state, ideally, should be to develop a single zone conducting “one-stop” arrival and departure inspections. In the case of northbound trucks from Mexico City and Monterey and southbound trucks bound for the Mexican interior, operators would have to stop just once at a location where there is plenty of space to conduct inspections so there is no risk of hours-long backups that now routinely plague the bridges. Once the trucks are cleared, the flow of traffic could be closely monitored by use of “intelligent transportation systems” (ITS) radio frequency or GPS technologies. But simply relocating where inspections take place is not enough. Border control agencies need to fundamentally change the way they are doing business as well. The days of random, tedious, administrative and labor-intensive border inspection systems— the bane of every legitimate international traveler and business— must be numbered. The manpower constraints inherent in traditional border-control practices guarantee their continuing inability to adequately police the surge in continental and global commerce. What is the alternative? The answer lies in placing greater emphasis on developing the means to enhance “domain awareness” and the capacity to perform “anomaly detection.” In the computer industry, “anomaly detection” represents the most promising means for detecting hackers intent on stealing data or transmitting computer viruses.[17] The process involves monitoring the cascading flows of computer traffic with an eye towards discerning what is “normal” traffic; i.e., that which moves by way of the most technologically rational route. Once this baseline is established, software is written to detect that which is aberrant. A good computer hacker will try to look as close as possible to a legitimate user. But, since he is not, he inevitably must do some things differently and good cyber-security software will detect that variation, and deny access. For those hackers who manage to get through, their breach is identified and shared so that this abnormal behavior can be removed from the guidance of what is “normal” and acceptable. In much the same way, the overwhelming majority of the vehicles, people, and cargo that move across the U.S. borders move in predictable patterns. If inspectors have the means to analyze and keep track of these flows, they will have the means to detect “aberrant” behavior. In short, “anomaly detection” of cross-border flows is possible, if the regulatory and enforcement agencies whose daily tasks is to police those flows: (1) are given access to intelligence about real or suspected threats, and (2) are provided the means to gather, share, and mine private sector data that provides a comprehensive picture of “normal” cross border traffic so as to enhance their odds of detecting threats when they materialize. If the public sector undertakes these changes, the private-sector must also change its attitude about engaging in self-policing and sharing anything but the minimum amounts of relevant data with government agencies. Border control agencies have important and legitimate jobs to perform. The general public wants restrictions on the flows of contraband such as weapons, drugs, and child pornography. Immigration policies require that who enters and who leaves their jurisdictions be monitored and controlled. Many public-health strategies aimed at managing the spread of disease require the identification and isolation of people, livestock, and agricultural products that could place the general population at risk. Safety and environmental threats connected with unsafe shipping and trucking mandate that the transportation sector be monitored. And trade rules must be enforced for trade agreements to be sustainable. Barriers to continental progress The approach to border management outlined above has started to gain some currency with respect to the U.S.-Canada border. Just prior to the first anniversary of the tragic attacks on New York and Washington, President George W. Bush and Prime Minister Jean Chrétien met on the Detroit-side of the Ambassador Bridge to launch an initiative dubbed “the Free and Secure Trade (FAST)” program whose purpose is to move pre-approved goods across the border quickly. The two leaders also announced the expansion of program designed to speed the flow of pre-screened “low-risk” travelers across the border known as NEXUS along with a number of actions they are taking in support of the Ridge-Manley Smart Border agreement.[18] Against the backdrop of the world’s busiest commercial border crossing, President Bush declared:   With these two initiatives, we'll ensure faster movement of legal, low-risk goods, and faster travel for people cross our borders, and we'll be able to better enhance security. Our inspectors will spend less time inspecting law-abiding citizens and more time inspecting those who may harm us.[19]   For his part, the former Prime Minister Chrétien asserted:   We recognized that we could create a ‘smart border’-- one that was not only more secure, but more efficient for trade, to permit our businesses to get back to business, to allow our nurses, engineers and computer technicians to provide their services, and our students to attend classes. To let our communities continue planning a shared future together, secure in the knowledge that the border welcomes legitimate trade and travelers.[20]   While ample challenges remain with regard to adequate staffing, infrastructure, data management, and intelligence issues to make this “risk management” approach more capable and credible, there is clearly a consensus that measures that would have the net effect of hardening the border between Canada and the United States would be counterproductive. Meanwhile, the situation on U.S.-Mexican border stands in marked contrast. This is not for the want of any willingness on Mexico’s part. President Vincente Fox has repeatedly offered to have a no-holds bar conversation on the future of its shared border with the United States. But, there has been little enthusiasm in the post 9-11 Washington to reciprocate. While the new homeland security imperative is cited as the rationale for change to the north, to the south it is being proffered up to explain why the U.S.-Mexican border reform agenda has move from the political fast track to the breakdown lane. The persistent incidence of crime, narcotics and migrant trafficking, and corruption are rallying points for advocates of “tightening-up” border enforcement. The generally unchallenged assumption is that, now more than ever, the United States needs to be committed to vigilance along the southern border. But, the case for fundamental reform should be even more compelling. Presumably, the combination of the new high security stakes and the acknowledgement in the Ridge-Manley agreement that hardening the 49th parallel is self-defeating, should create fertile ground for a thoughtful reexamination of the prevailing approach to managing the southern border. So why hasn’t this logic been the prevailing one? The answer lies with the fact that the southern border is imprisoned in a legacy of immigration and drug enforcement efforts. Despite two decades of evidence to the contrary, Washington continues to see interdiction at the border as the key to successfully combating the northbound flow of illicit drugs and migrants. To adopt the “smart border” agenda throughout North America will require that Washington countenance an alternative approach to dealing with the issues of illicit drugs and immigration. It will require the federal agencies for whom border enforcement has been a growth business to acknowledge the unintended consequence of their collective effort has been to actually make the border region more difficult to police and secure. And it will require those within the U.S. Congress who oppose NAFTA to stop exploiting America’s newfound homeland security imperative as a means for advancing their protectionist agenda. Conclusion The most important reason to get border management right is to satisfy what is arguably the most critical homeland security imperative of our time: to reduce the risk that hemispheric and global trade lanes will be exploited to smuggle a weapons of mass destruction into the United States. Without a committed effort to advance a bilateral approach to border management, terrorists will continue to have ample opportunity to bring their battles to American streets. It is in the collective interest of the United States and Mexico to work together to mitigate that risk. But the impetus for challenging conventional notions of border control owes it source not just to a transformed post-9/11 threat environment. It is also a long overdue response to the evolution of commercial and social patterns of interaction throughout North America that have made continental relationships more dynamic, organic, and integrated. As such, the case against traditional border management practices such as those pursued along the southwest border had been already made by the close of the last century for anyone willing to look at objectively at the yawning gap between enforcement rhetoric and reality. Stepped-up efforts to harden the border are a flawed, even counterproductive, approach to advancing important security and public policy interests. By contrast, the kind of “smart border” initiatives being embraced on the northern border hold out real promise. The outline for transformed border management is clear. It requires a risk management approach to policing cross-border flows which includes the close collaboration of the major beneficiaries of an increasingly open North American continent— the United States’ neighbors to the North and the South, and the private sector. The stakes of getting this right are also clear. Transforming how the border is managed is an essential step towards assuring the long-term sustainability of hemispheric economic integration within the context of the transformed security environment of the post-9-11 world. Thank you Mr. Chairman. I look forward to responding to your questions. [1] Peter Andreas, Border Games: Policing the U.S.- Mexico Divide (Ithaca: Cornell University Press, 2000). [2] Keith Philips and Carlos Manzanares, “Transportation Infrastructure and the Border Economy,” in The Border Economy (Dallas: Federal Reserve Bank of Dallas, June 2001), 11. [3] Field visit by the author to Laredo, Texas Aug 20-21, 2001. [4] Office of National Drug Control Policy, National Drug Control Strategy: 2001 Annual Report, Shielding U.S. Borders from the Drug Threat (Washington: USGPO, 2001). [5] U.S. Customs Service, “About U.S. Customs,” accessed on September 6, 2002 at http://www.customs.gov/about/about.htm. [6] U.S. Customs Service, Border Wait Times at major northern and southern border crossings. Current border wait-times information is available at http://www.customs.gov/travel/travel.htm. [7] Steve Erwin, Automakers forced to shut down: Parts shortage suspends production,” Edmonton Journal, September 14, 2001, F4. [8] “Parts Shortages Cause Ford Shutdown,” Associated Press, September 14, 2001. [9] The Committee is informally known as the “Leene Committee,” named for its founder, James Leene, a former policeman who serve’s in the U.S. Attorney’s office in Burlington, VT. [10] 6th Annual Canada-U.S Cross-Border Crime Forum Press Release, July 6, 2002, accessed on September 6, 2002 at http://www.sgc.gc.ca/Releases/e20020722.htm [11] George Haynal, “Interdependence, Globalization, and North American Borders,” in Governance and Public Security (Syracuse: Maxwell School, 2002), 55. [12] Authors calculations based on statistics available at Statistics Canada, www.statcan.ca [13] The Whitehouse Office of Homeland Security, “Action Plan for Creating a Secure and Smart Border,” Dec 12, 2001, accessed on September 5, 2002 at http://www.whitehouse.gov/news/releases/2001/12/20011212-6.html [14] Office of the Inspector General, “Interim Report on Status of Implementing the North American Free Trade Agreement’s Cross Border Trucking Provisions,” Federal Motor Carrier Safety Administration, MH-2001-059, (May 8, 2001), 7. Also, Statement of the Honorable Kenneth M. Mead, Inspector General, USDOT, “Motor Carrier Safety at the U.S. – Mexican Border,” July 18, 2001 before the Committee on Commerce, Science and Transportation, United States Senate. [15] TEA-21 [1119(a)] [16] Robert C. Bonner, “Pushing Borders Outwards: Rethinking Customs Border Enforcement,” A speech presented at the Center for Strategic and International Studies, Washington, D.C., Jan 17, 2002.
  • United States
    Testimony of Jamie Metzl Before the House Select Committee on Homeland Security
    STATEMENT OF JAMIE F. METZL SENIOR FELLOW AND COORDINATOR FOR HOMELAND SECURITY PROGRAMS, COUNCIL ON FOREIGN RELATIONS PROJECT DIRECTOR, COUNCIL ON FOREIGN RELATIONSINDEPENDENT TASK FORCE ON EMERGENCY RESPONDERS BEFORE THE HOUSE SELECT COMMITTEE ON HOMELAND SECURITY July 17, 2003 Mr. Chairman and Members of the Committee, Thank you for inviting me to testify before you today. It is an honor for me to be here. I serve as Project Director of the Council on Foreign Relations Independent task Force on Emergency Responders, where I work with our Chairman, Senator Warren Rudman and Senior Advisor Richard Clarke. The non-partisan task force has brought together leading Americans from diverse political and professional backgrounds to examine whether or not America is sufficiently prepared for another terrorist attack. Our members include former Secretary of State George Shultz, former CIA and FBI Director William Webster, the former Chairman of the Joint Chiefs of Staff, the former Chief of Staff of the Army, three Nobel laureates, and other senior experts of a similar stature. The Task Force met with local emergency responders across the country, worked closely with emergency responder professional associations, and partnered on spending-related issues with two of the national leading budgetary analysis organizations, the Center for Strategic and Budgetary Assessment and the Concord Coalition. Based on these extensive contacts and the totality of our investigation, we came to one very simple conclusion: almost two years after 9/11, America is not sufficiently prepared for another terrorist attack. This is not to say that we are not better prepared to address some aspects of the terrorist threat or that the government has done nothing since 9/11. In our report entitled Emergency Responders: Drastically Underfunded, Dangerously Unprepared which we released on June 30, the Task Force credited the Bush administration, Congress, governors, and mayors with taking important steps since the September 11 attacks to respond to the risk of catastrophic terrorism. It is to say, however, that we are not as prepared as we must be given the magnitude of the threat we face and the tremendous repercussions of another attack. As Senator Rudman has said, the question is not if the next attack will take place, but rather when it will take place. Somewhere in the world, perhaps even here in America, terrorists are now likely planning attacks on the United States. At the same time, America’s diplomats, military officers, intelligence agents, policemen, firefighters, and others are working frantically to prevent and prepare for such an attack. These two groups of people are in a race with each other that our side cannot afford to lose. An effective homeland security strategy must therefore play both offense and defense. We must attack terrorists wherever they are, cut off their financing, and destroy their networks. We must also address global causes of instability that provide fertile soil for the recruitment of terrorists. At home, we must protect our critical infrastructure, keep our airways, ports, and highways safe, and make sure that our local policemen, firefighters, health workers and others have the equipment and the training they need to prevent and respond to terrorist attacks. Although there are many aspects of homeland security that need to be reviewed, our examination focused on the preparedness of emergency responders. What we found shocked us. We found that on average, fire departments across the country have only enough radios to equip half the firefighters on a shift, and breathing apparatuses for only one third. We found that a mere ten percent of fire departments in the United States have the personnel and equipment to respond to a building collapse. We found that police departments in cities across the country do not have the protective gear to safely secure a site following an attack with weapons of mass destruction. We found that public health labs in most states still lack basic equipment and expertise to adequately respond to a chemical or biological attack, and that 75 percent of state laboratories report being overwhelmed by too many testing requests. In sum, we found that emergency responders across the country don’t have the equipment and the training they need to respond safely and effectively to a terrorist attack. In order to quantify this preparedness gap, we worked with each emergency responder community -- fire, police, emergency medical, public health, emergency management, and others -- and asked them to determine and cost out the minimum essential capabilities they required to be prepared for a terrorist attack. We were very clear that we were not asking for a wish list, and we carefully reviewed the data we collected from these sources. We were extremely conservative in our estimates. The high funding estimate provided to us by the fire community, for example, was roughly $85 billion over five years. The number that we ended up using for our calculation, however, was $37 billion. The high estimate for establishing interoperable communications was $18 billion over five years, but we used the much lower number of $6.8 billion based on the more economical funding model of the Capital Wireless Integration Network project in the greater DC area. Most significantly, because police organizations were unable to provide us with any reliable estimates of their need, we decided not to include a police figure rather than include a number we would not be able to support. Finally, we assumed that every dollar allocated for emergency responders would be used to address terrorism preparedness needs, not for more generic purposes. Based on our calculations, we found that America will fall roughly $98.4 billion short of meeting critical emergency responder needs over the next five years if current federal, state, and local funding levels are maintained. According to our estimates, combined federal, state, and local expenditures would need to be as much as tripled over the next five years to address this unmet need. As you know, states across the country are in their worst financial situation in decades, and there are many who argue that terrorism is a national security threat which, according to the constitution, is primarily a responsibility of the federal government. Covering the $98.4 billion funding shortfall using federal funds alone, therefore, would require a five-fold increase from the current level of $5.4 billion per year to an annual federal expenditure of $25.1 billion. Among other things, these additional funds are badly needed to enhance federal and local urban search and rescue capabilities; to foster interoperable communications systems for emergency responders across the country; to enhance public health preparedness by strengthening laboratories and disease tracking capabilities, and training public health professionals for biological, chemical, and radiological events; to provide basic protective gear and WMD remediation equipment to firefighters; to support an extensive series of national exercises that would allow responders to improve on response techniques; to enhance emergency agricultural and veterinary capabilities for response to a potential national food supply attack; and to help develop surge capacity in the nation’s hospitals to help them better prepare for a WMD attack. While these critical needs must be addressed immediately, our Task Force is the first to admit that our figures for meeting them are preliminary and that the Unites States must develop a more sophisticated requirements-generation process. Unless we both get the necessary resources to America’s front-line emergency responders and create a policy framework for spending these funds most efficiently, the American taxpayer will not receive the best return on our investments in homeland security and, more importantly, we will not be as safe as we must become. If we allocate the funds without getting the policy issues right, or if we get the policy issues right without allocating the funds, we will not be prepared. America must do both. The centerpiece of this policy framework must be national preparedness standards. America needs national standards that define what emergency preparedness means. Every city of a given size should have a minimum set of capabilities -- they should be able to respond to a biological event of a certain size, decontaminate a certain number of people, etc. But because America has not defined what preparedness is, we have no way of knowing systematically how prepared we are or what we need to do to get from where we are now to where we need to be. Standards should not become the basis for federal micromanaging of state and local governments, but they must establish minimum essential capabilities that every jurisdiction of a certain size should either have or have access to. Within these parameters, state and local governments should be allowed flexibility for determining priorities and allocating resources so long as national standards are met over a fixed period of time. National standards can then provide the basis for a requirements process similar to that employed by the United States military. Threats must be identified, capabilities for addressing threats determined, and requirements generated for establishing or otherwise gaining access to necessary capabilities. Effective coordination and planning between and among all levels of government and emergency responders on the ground must then transform new capabilities into a national preparedness system. A second element in getting the policy framework right is fixing the system for allocating scarce emergency responder funds. It makes no sense to distribute funds based primarily on a divide the spoils formula. As Secretary Ridge and others have correctly asserted, we need to think less about politics and more about our vulnerabilities and the hierarchy of threats facing us when making decisions about distributing funds. This must be the case on both the federal and on the state level. Otherwise, our funds will be diluted to the point of being wasted. America must smartly allocate our limited resources to address our greatest vulnerabilities. In addition, the erratic nature of federal funding has created perverse incentives for short-term thinking among cities and states, and this process must be fixed. State and local governments can’t make long-term decisions to address their needs without confidence that increased federal funding will be sustained. Multi-year funding is extremely difficult in our political system, even for military appropriations, but we must work to create confidence among states and localities that funding levels will be maintained over time in order to establish proper incentives for systematic, long-term planning. You are the experts on the issue of Congressional oversight, and I am therefore hesitant to make recommendations regarding how Congress might be organized. Nevertheless, the Task Force found that an estimated 88 committees and subcommittees of the House and Senate have a hand in the unwieldy homeland security authorization and appropriations process. For this reason, the Task Force has recommended that the authorization and appropriations processes must be focused and streamlined both to ensure necessary oversight and to better guarantee that funds will be appropriated and distributed with necessary speed. The Task Force believes that Congress should have a lead committee, or an effective joint committee, to shape overall policy in order to prevent the fragmentation of oversight and the distortion of appropriations. As I’m sure you know, the Task Force has recommended that the House of Representatives transform this committee into a standing committee and give it a formal, leading role in the authorization of all emergency responder expenditures. Finally, the federal and state grants systems are duplicative and unnecessarily complicated and serve to slow the funding process for no real benefit. The current inflexible structure of homeland security funding, along with shifting federal requirements and increased amounts of paperwork, place unnecessary burdens on state and local governments. For example, some states have been required to submit as many as five homeland security plans in order to qualify for federal assistance. While a balance should be maintained between the need for the rapid allocation of emergency preparedness funds and the maintenance of appropriate oversight to ensure that such funds are well spent, the present danger is too great to allow for business as usual. As part of an overall response to this larger structural problem, we believe that Congress should require DHS to work with other federal agencies to streamline homeland security grant programs in a way that reduces unnecessary duplication and establishes coordinated “one-stop shopping” for state and local authorities seeking grant funds. America’s local emergency responders will always be the first to confront a terrorist incident and will play the central role in managing its immediate consequences. Their efforts in the first minutes and hours following an attack will be critical to saving lives, reestablishing order, and preventing mass panic. America would not think of sending our military to fight a war overseas without proper equipment and training. It is therefore unconscionable that we are not providing those same necessities to the local emergency responders who are also on the front lines of the war on terror. One of the many things we learned from the 9/11 attacks is that our local emergency responders will rush to the scene of a terrorist incident, even if they do not have everything they will need once they get there. In New York, this led to inexcusable deaths. The United States has both a responsibility and a critical need to provide our emergency responders with the equipment, training, and other necessary resources to do their jobs safely and effectively. Otherwise, we will all be in unnecessary danger. America must do better. Thank you very much. I look forward to answering any questions you may have.
  • United States
    America Still Unprepared--America Still in Danger
    Written Testimony before a hearing of theU.S. Senate Judiciary Subcommittee onTechnology, Terrorism, and Government Information Stephen E. Flynn, Ph.D.Commander, U.S. Coast Guard (ret.)Jeane J. Kirkpatrick Senior Fellow in National Security Studies andDirector, Council on Foreign Relations Independent Task Forceon Homeland Security Imperative Room 226Dirksen Senate Office BuildingWashington, D.C. November 14, 2002 Senator Feinstein, Senator Kyl, and distinguished members of the Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information. On behalf of the Council on Foreign Relations Independent Task Force on Homeland Security, thank you for so quickly assembling this hearing on our recently issued report, “America Still Unprepared—America Still in Danger.” I am honored to be appearing before you with one of our task force’s co-chairs and a truly great American, former Senator Warren Rudman, and my fellow task force member, Mr. Phil Odeen. Fourteen months after 9/11, America remains dangerously unprepared to prevent and respond to a catastrophic attack on U.S. soil. In all likelihood, the next attack will result in even greater casualties and widespread disruption to American lives and the economy. This is the core finding of our task force for which I was privileged to serve as director and which was led by former Senators Warren Rudman and Gary Hart—co-chairs of the now famous Commission on National Security that warned of such a terrorist attack three years ago. Our bipartisan Independent Task Force, which came to this sober conclusion and which makes recommendations for emergency action, included two former secretaries of state, three Nobel laureates, two former chairmen of the Joint Chiefs of Staff, a former director of the CIA and FBI, and some of the nation's most distinguished financial, legal, and medical experts. It is a finding which we believe the nation must respond to with the same level of intensity that we are investing in our overseas efforts to combat terrorism. Stated succinctly, we believe we should be operating essentially on a wartime footing here at home—and we are not. Indeed, we fear that there are worrisome signs that the nation is already slipping back into complacency. Jumping directly to the agenda of this hearing today—what should Congress be doing to make the nation safer—two immediate actions are essential. First, the pending legislation to create the Department of Homeland Security should be acted on without delay. Second, Congress needs to immediately act to approve the remaining fiscal 2003 Appropriations Bills. Quite frankly, it is a disgrace that so many important measures we should be taking to address our many serious vulnerabilities are stalled because so much of the government is operating under the budgetary restrictions associated with the spending limits imposed by the rules governing continuing resolutions. In addition, we hope that the House and Senate will take a serious look at many of the recommendations for urgent action contained in our task force report which I attach to this statement and ask that it be included as a part of the official record of this hearing’s proceedings. In my opening statement this afternoon, I would like to stress why we believe that the nation is entering a period of especially grave danger with regard to the threat of a second catastrophic terrorist attack on the United States. First, there the lessons of 9/11: (1) The homeland of the United States is largely open and unprotected, and (2) there is a vast menu of civilian targets which if exploited will lead to mass societal and economic disruption. In short, what we witnessed on September 11, 2002 is how warfare will likely be conducted against the United States for the foreseeable future. We are the world’s “Goliath,” and our adversaries must become creative “David’s” to challenge our power. Going toe-to-toe on the conventional military battlefield almost certainly would be a losing proposition. Second, there is mounting evidence that al Qaeda is returning to an operational footing. In the words of George Tenet who testified publicly before the Senate Select Committee on Intelligence a month ago: "When you see the multiple attacks that you've seen occur around the world, from Bali to Kuwait, the number of failed attacks that have been attempted, the various messages that have been issued by senior al-Qaeda leaders, you must make the assumption that al-Qaeda is in an execution phase and intends to strike us both here and overseas; that's unambiguous as far as I am concerned." Directors of Central Intelligence rarely use in public the word “unambiguous” alongside their intelligence assessments—this assessment deserves to be taken extremely seriously. Third, there is the fact that we are poised to embark on a war with Iraq. Such a war will have at least two implications for the homeland security imperative. (1) It elevates the risk in the near term of an attack on the United States. We are preparing to attack a ruthless adversary who may well have access to weapons of mass destruction. Given Saddam Hussein’s past track record, prudence requires that we assume he will resort to any means to hang on to power. This could well include sponsorship of terrorist operations against the United States, at home as well as abroad. (2) A war with Iraq will likely consume virtually all the nation’s attention and command the bulk of the available resources, leaving little left over to address our many domestic vulnerabilities. Against this backdrop, where are we today with regard to advancing the security of the U.S. homeland? Our findings include the following: 650,000 local and state police officials continue to operate in a virtual intelligence vacuum, without a workable means to routinely access terrorist watch lists provided by the U.S. Department of State to immigration and consular officials. While 50,000 federal screeners are being hired at the nation's airports to check passengers, only the tiniest percentage of containers, ships, trucks, and trains that enter the United States each day are subject to examination—and a weapon of mass destruction could well be hidden among this cargo. Should the maritime or surface elements of America's global transportation system be used as a weapon delivery device, the response right now would almost certainly be to shut the system down at an enormous cost to the economies of the United States and its trade partners. First responders—police, fire, emergency medical technician personnel—are not prepared for a chemical or biological attack. Their radios cannot communicate with one another, and they lack the training and protective gear to protect themselves and the public in an emergency. The consequence of this could be the unnecessary loss of thousands of American lives. America's own ill-prepared response could hurt its people to a much greater extent than any single attack by a terrorist. America is a powerful and resilient nation, and terrorists are not supermen. But the risk of self-inflicted harm to America's liberties and way of life is greatest during and immediately following a national trauma. An adversary intent on disrupting America's reliance on energy need not target oil fields in the Middle East. The homeland infrastructure for refining and distributing energy to support the daily lives of Americans remains largely unprotected to sabotage. While the overwhelming majority of the nation's critical infrastructure is owned and operated by the private sector, significant legal barriers remain to forging effective private-public partnerships on homeland security issues. These include potential antitrust conflicts, concerns about the public release of sensitive security information by way of the Freedom of Information Act (FOIA), and liability exposure. Domestic security measures must be pursued within an international context. The critical infrastructures that support the daily lives of Americans are linked to global networks. Efforts to protect these systems will fail unless they are pursued abroad as well as at home. The National Guard is currently equipped and trained primarily for carrying out its role in supporting conventional combat units overseas. The homeland security mission can draw on many of these capabilities but it requires added emphasis on bolstering the capacity of National Guard units to respond to biological attacks; acquiring protection, detection, and other equipment that is tailored for complex urban environments; and special training to provide civil support in the aftermath of a large-scale catastrophic attack. Our key recommendations include the following: Empower front-line agents to intercept terrorists by establishing a twenty-four-hour operations center in each state that can provide access to terrorist watch list information via real time intergovernmental links between local and federal law enforcement. Make first responders ready to respond by immediately providing federal funds to clear the backlog of requests for protective gear, training, and communications equipment. State and local budgets cannot bankroll these necessities in the near term. Recalibrate the agenda for transportation security; the vulnerabilities are greater and the stakes are higher in the sea and land modes than in commercial aviation. Systems such as those used in the aviation sector, which start from the assumption that every passenger and every bag of luggage poses an equal risk, must give way to more intelligence-driven and layered security approaches that emphasize prescreening and monitoring based on risk-criteria. Fund energy distribution vulnerability assessments to be completed in no more than six months, fund a stockpile of modular backup components to quickly restore the operation of the energy grid should it be targeted, and work with Canada to put in place adequate security measures for binational pipelines. Strengthen the capacity of local, state, and federal public heath and agricultural agencies to detect and conduct disease outbreak investigations. The key to mitigating casualties associated with a biological attack against people or the food supply is to identify the source of infection as early as possible. Enact an "Omnibus Anti-Red Tape" law with a two-year sunset clause for approved private-public homeland security task forces to include: (1) a fast-track security clearance process that permits the sharing of "secret-level" classified information with non-federal and industry leaders; (2) a FOIA exemption in instances when critical infrastructure industry leaders agree to share information about their security vulnerabilities with federal agencies; (3) an exemption of private participants in these task forces from antitrust rules; (4) homeland security appropriations to be managed under the more liberal rules governing research and development programs in the Department of Defense rather than the normal Federal Acquisition Rules; and (5) liability safeguards and limits. Fund, equip, and train National Guard units around the country to ensure they can support the new state homeland security plans under development by each governor. Also, triple the number of National Guard Weapons of Mass Destruction Support Teams from twenty-two to sixty-six. In conclusion, it is the belief our task force that quickly mobilizing the nation to prepare for the worst is an act of prudence, not fatalism. In the twenty-first century, security and liberty are inseparable. The absence of adequate security elevates the risk that laws will be passed immediately in the wake of surprise terrorist attacks that will be reactive, not deliberative. Predictably, the consequence will be to compound the initial harm incurred by a tragic event with measures that overreach in terms of imposing costly new security mandates and the assumption of new government authorities that may erode our freedoms. Accordingly, aggressively pursuing America's homeland security imperatives quickly and immediately may well be the most important thing we can do to sustain America's cherished freedoms for future generations. President Bush has declared that combating terrorism requires a war on two fronts—at home and abroad. The Task Force believes the nation should respond accordingly. Preparedness at home can play an indispensable role in combating terrorism by reducing its appeal as an effective means of warfare. Acts of catastrophic terrorism produce not only deaths and physical destruction but also societal and economic disruption. Thus, as important as it is to try and attack terrorist organizations overseas and isolate those who support them, it is equally important to eliminate the incentive for undertaking these acts in the first place. By sharply reducing, if not eliminating, the disruptive effects of terrorism, America's adversaries may be deterred from taking their battles to the streets of the American homeland. Thank you and I look forward to responding to your questions.