Jump to content

9/11 Commission Report/Notes/Part 12

From Wikisource

What to Do? A Global Strategy

[edit]

1. For spending totals, see David Baumann, "Accounting for the Deficit," National Journal, June 12, 2004, p. 1852 (combining categories for defense discretionary, homeland security, and international affairs).

2.White House press release,"National Strategy for Combating Terrorism," Feb. 2003 (online at www.white-house.gov/news/releases/2003/02/20030214-7.html).

3. "Islamist terrorism is an immediate derivative of Islamism.This term distinguishes itself from Islamic by the fact that the latter refers to a religion and culture in existence over a millennium, whereas the first is a political/reli-gious phenomenon linked to the great events of the 20th century. Furthermore Islamists define themselves as 'Islamiyyoun/Islamists' precisely to differentiate themselves from 'Muslimun/Muslims.'... Islamism is defined as 'an Islamic militant, anti-democratic movement, bearing a holistic vision of Islam whose final aim is the restoration of the caliphate.'" Mehdi Mozaffari,"Bin Laden and Islamist Terrorism," Militaert Tidsskrift, vol. 131 (Mar. 2002), p. 1 (online at www.mirkflem.pup.blueyonder.co.uk/pdf/islamistterrorism.pdf). The Islamist movement, born about 1940, is a product of the modern world, influenced by Marxist-Leninist concepts about revolutionary organization. "Islamists consider Islam to be as much a religion as an 'ideology,' a neologism which they introduced and which remains anathema to the ulamas (the clerical scholars)." Olivier Roy, The Failure of Political Islam, trans. Carol Volk (Harvard Univ. Press, 1994), p. 3. Facing political limits by the end of the 1990s, the extremist wing of the Islamist movement "rejected the democratic references invoked by the moderates; and as a result, raw terrorism in its most spectacular and destructive form became its main option for reviving armed struggle in the new millennium." Gilles Kepel, Jihad:The Trail of Political Islam, trans. Anthony Roberts (Harvard University Press, 2002), p. 14.

4. Opening the Islamic Conference of Muslim leaders from around the world on October 16, 2003, then Malaysian prime minister Mahathir Mohamad said:"Today we, the whole Muslim ummah [community of believers] are treated with contempt and dishonour. Our religion is denigrated. Our holy places desecrated. Our countries are occupied. Our people are starved and killed. None of our countries are truly independent.We are under pressure to conform to our oppressors' wishes about how we should behave, how we should govern our lands, how we should think even." He added:"There is a feeling of hopelessness among the Muslim countries and their peo-ple.They feel that they can do nothing right.They believe that things can only get worse.The Muslims will forever be oppressed and dominated by the Europeans and Jews."The prime minister's argument was that the Muslims should gather their assets, not striking back blindly, but instead planning a thoughtful, long-term strategy to defeat their worldwide enemies, which he argued were controlled by the Jews. "But today the Jews rule the world by proxy.They get others to fight and die for them." Speech at the Opening of the Tenth Session of the Islamic Summit Conference, Oct. 16, 2003 (online at www.oicsummit2003.0rg.my/speech_03.php).

5. CIA map,"Possible Remote Havens for Terrorist and Other Illicit Activity," May 2003.

6. For the numbers, see Tariq interview (Oct. 20, 2003).

7. For Pakistan playing a key role in apprehending 500 terrorists, see Richard Armitage testimony, Mar. 23, 2004.

8. For Pakistan's unpoliced areas, see Tasneem Noorani interview (Oct. 27, 2003).

9. Pakistanis and Afghanis interviews (Oct. 2003); DOD Special Operations Command and Central Command briefings (Sept. 15-16, 2004); U.S. intelligence official interview (July 9, 2004).

10. Pervez Musharraf,"A Plea for Enlightened Moderation: Muslims Must Raise Themselves Up Through Individual Achievement and Socioeconomic Emancipation," Washington Post, June 1, 2004, p. A23.

11. For a review of ISAF's role, see NATO report, "NATO in Afghanistan," updated July 9, 2004 (online at www.nato.int/issues/afghanistan).

12. United States Institute of Peace report,"Establishing the Rule of Law in Afghanistan," Mar. 2004, pp. 1-3 (online at www.usip.org/pubs/specialreports/sr117.html).

13. For the change, see Lakhdar Brahimi interview (Oct. 24, 2003); U.S. officials in Afghanistan interview (Oct.

2003). For the request that the United States remain, see Kandahar province local leaders interview (Oct. 21, 2003). For the effect of the United States leaving, see Karim Khalili interview (Oct. 23, 2003).

14. Some have criticized the Bush administration for neglecting Afghanistan because of Iraq. Others, including General Franks, say that the size of the U.S. military commitment in Afghanistan has not been compromised by the commitments in Iraq.We have not investigated the issue and cannot offer a judgment on it.

15. Even if the U.S. forces, stretched thin, are reluctant to take on this role, "a limited, but extremely useful, change in the military mandate would involve intelligence sharing with civilian law enforcement and a willingness to take action against drug warehouses and heroin laboratories." United States Institute of Peace report,"Establish-ing the Rule of Law in Afghanistan," Mar. 2004, p. 17.

16. For barriers to Saudi monitoring of charities, see, e.g., Robert Jordan interview (Jan. 14, 2004); David Aufhauser interview (Feb. 12, 2004).

17. For the Saudi reformer's view, see Members of majles al-shura interview (Oct. 14, 2003).

18. Neil MacFarquhar,"Saudis Support a Jihad in Iraq, Not Back Home," New York Times, Apr. 23, 2004, p.A1.

19. Prince Bandar Bin Sultan,"A Diplomat's Call for War," Washington Post, June 6, 2004, p. B4 (translation of original in Al-Watan, June 2, 2004).

20. President Clinton meeting (Apr. 8, 2004).

21. For Jordan's initiatives, see testimony of William Burns before the Subcommittee on the Middle East and Central Asia of the House International Relations Committee, Mar. 19, 2003 (online at www.house.gov /international_relations/108/burn0319.htm). For the report, see United Nations Development Programme report, Arab Human Development Report 2003: Building a Knowledge Society (United Nations, 2003) (online at www.miftah.org/Doc/Reports/Englishcomplete2003.pdf).

22. DOD memo, Rumsfeld to Myers,Wolfowitz, Pace, and Feith, "Global War on Terrorism," Oct. 16, 2003 (online at www.usatoday.com/news/washington/executive/rumsfeld-memo.htm).

23. For the statistics, see James Zogby, What Arabs Think:Values, Beliefs, and Concerns (Zogby International, 2002). For fear of a U.S. attack, see Pew Global Attitudes Project report, Views of a Changing World: June 2003 (Pew Research Center for the People and the Press, 2003), p. 2. In our interviews, current and former U.S. officials dealing with the Middle East corroborated these findings.

24. For polling soon after 9/11, see Pew Research Center for the People and the Press report, "America Admired,Yet Its New Vulnerability Seen as Good Thing, Say Opinion Leaders; Little Support for Expanding War on Terrorism" (online at http://people-press.org/reports/print.php3?ReportID=145). For the quotation, see Pew Global Attitudes Project report,"War With Iraq Further Divides Global Publics But World Embraces Democratic Values and Free Markets," June 3, 2003 (online at www.pewtrusts.com/ideas/ideas_item.cfm?content_ item_id=1645&content_type_id=7).

25. For the Occidentalist "creed of Islamist revolutionaries," see, e.g., Avishai Margalit and Ian Buruma, Occi-dentalism:The West in the Eyes of Its Enemies (Penguin Press, 2004).

26.We draw these statistics, significantly, from the U.S. government's working paper circulated in April 2004 to G-8 "sherpas" in preparation for the 2004 G-8 summit.The paper was leaked and published in Al-Hayat. "U.S. Working Paper for G-8 Sherpas," Al-Hayat, Feb. 13, 2004 (online at http://english.daralhayat.com/Spec/02-2004/Article-20040213-ac40bdaf-c0a8-01ed-004e-5e7ac897d678/story.html).

27. Richard Holbrooke,"Get the Message Out," Washington Post, Oct. 28, 2001, p. B7; Richard Armitage interview (Jan. 12, 2004).

28. Testimony of George Tenet, "The Worldwide Threat 2004: Challenges in a Changing Global Context," before the Senate Select Committee on Intelligence, Feb. 24, 2004.

29. U.S. Department of Energy Advisory Board report,"A Report Card on the Department of Energy's Nonproliferation Programs with Russia," Jan. 10, 2001, p. vi.

30. For terrorists being self-funding, see United Nations report, "Second Report of the [UN] Monitoring Group, Pursuant to Security Council Resolution 1390," Sept. 19, 2002, p. 13.

31. For legal entry, see White House report, Office of Homeland Security,"The National Strategy for Homeland Security," July 2002, p. 20 (online at www.whitehouse.gov/homeland/book/index.html). For illegal entry, see Chicago Council on Foreign Relations task force report, Keeping the Promise: Immigration Proposals from the Heartland (Chicago Council on Foreign Relations, 2004), p. 28.

32.The names of at least three of the hijackers (Nawaf al Hazmi, Salem al Hazmi, and Khalid al Mihdhar) were in information systems of the intelligence community and thus potentially could have been watchlisted. Had they been watchlisted, the connections to terrorism could have been exposed at the time they applied for a visa or at the port of entry.The names of at least three of the hijackers (Nawaf al Hazmi, Salem al Hazmi, and Khalid al Mihdhar), were in information systems of the intelligence community and thus potentially could have been watch-listed. Had they been watchlisted, their terrorist affiliations could have been exposed either at the time they applied for a visa or at the port of entry.Two of the hijackers (Satam al Suqami and Abdul Aziz al Omari) presented passports manipulated in a fraudulent manner that has subsequently been associated with al Qaeda. Based on our review of their visa and travel histories, we believe it possible that as many as eleven additional hijackers (Wail al Shehri, Waleed al Shehri, Mohand al Shehri, Hani Hanjour, Majed Moqed, Nawaf al Hazmi, Hamza al Ghamdi,Ahmed al Ghamdi, Saeed al Ghamdi, Ahmed al Nami, and Ahmad al Haznawi) held passports containing these same fraudulent features, but their passports have not been found so we cannot be sure. Khalid al Mihdhar and Salem al Hazmi presented passports with a suspicious indicator of Islamic extremism.There is reason to believe that the passports of three other hijackers (Nawaf al Hazmi,Ahmed al Nami, and Ahmad al Haznawi) issued in the same Saudi passport office may have contained this same indicator; however, their passports have not been found, so we cannot be sure.

33. Khallad Bin Attash, Ramzi Binalshibh, Zakariya Essabar, Ali Abdul Aziz Ali, and Saeed al Ghamdi (not the individual by the same name who became a hijacker) tried to get visas and failed. Kahtani was unable to prove his admissibility and withdrew his application for admission after an immigration inspector remained unpersuaded that he was a tourist. All the hijackers whose visa applications we reviewed arguably could have been denied visas because their applications were not filled out completely. Had State visa officials routinely had a practice of acquiring more information in such cases, they likely would have found more grounds for denial. For example, three hijackers made statements on their visa applications that could have been proved false by U.S. government records (Hani Hanjour, Saeed al Ghamdi, and Khalid al Mihdhar), and many lied about their employment or educational status.Two hijackers could have been denied admission at the port of entry based on violations of immigration rules governing terms of admission-Mohamed Atta overstayed his tourist visa and then failed to present a proper vocational school visa when he entered in January 2001; Ziad Jarrah attended school in June 2000 without properly adjusting his immigration status, an action that violated his immigration status and rendered him inadmissible on each of his six subsequent reentries into the United States between June 2000 and August 5, 2001.There were possible grounds to deny entry to a third hijacker (Marwan al Shehhi). One hijacker violated his immigration status by failing to enroll as a student after entry (Hani Hanjour); two hijackers overstayed their terms of admission by four and eight months respectively (Satam al Suqami and Nawaf al Hazmi). Atta and Shehhi attended a flight school (Huffman Aviation) that the Justice Department's Inspector General concluded should not have been certified to accept foreign students, see DOJ Inspector General's report,"The INS' Contacts with Two September 11 Terrorists:A Review of the INS's Admissions of Atta and Shehhi, its Processing of their Change of Status Applications, and its Efforts to Track Foreign Students in the United States," May 20, 2002.

34. John Gordon interview (May 13, 2004).

35. For a description of a layering approach, see Stephen Flynn, America the Vulnerable: How the U.S. Has Failed to Secure the Homeland and Protect Its People from Terrorism (HarperCollins, 2004), p. 69.

36.The logical and timely rollout of such a program is hampered by an astonishingly long list of congressional mandates. The system originated in the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 and applied to all non-U.S. citizens who enter or exit the United States at any port of entry. Pub. L. No. 104-208, 110 Stat. 3009 (1996), � 110.The Data Management Improvement Act of 2000 altered this mandate by incorporating a requirement for a searchable centralized database, limiting the government's ability to require new data from certain travelers and setting a series of implementation deadlines. Pub. L. No. 106-215, 114 Stat. 337 (2000), � 2(a).The USA PATRIOT Act mandated that the Attorney General and Secretary of State "particularly focus" on having the entry-exit system include biometrics and tamper-resistant travel documents readable at all ports of entry. Pub. L. No. 107-56, 115 Stat. 272 (2001), � 1008(a). In the Enhanced Border Security and Visa Entry Reform Act, Congress directed that, not later than October 26, 2004, the attorney general and the secretary of state issue to all non-U.S. citizens only machine-readable, tamper-resistant visas and other travel and entry documents that use biometric identifiers and install equipment at all U.S. ports of entry to allow biometric authentication of such documents. Pub. L. No. 107-173, 116 Stat. 543 (2002), � 303(b).The Act also required that increased security still facilitate the free flow of commerce and travel. Ibid. � 102(a)(1)(C).The administration has requested a delay of two years for the requirement of tamper-proof passports.Testimony of Thomas Ridge before the House Judiciary Committee, Apr. 21, 2004 (online at www.dhs.gov/dhspublic/display?theme=45&content=3498&print=true). Program planners have set a goal of collecting information, confirming identity, providing information about foreign nationals throughout the entire immigration system, and ultimately enabling each point in the system to assess the lawfulness of travel and any security risks.

37. There are at least three registered traveler programs underway, at different points in the system, designed and run by two different agencies in the Department of Homeland Security (outside the U.S.VISIT system), which must ultimately be the basis for access to the United States.

38. For the statistics, see DOS report,"Workload Statistics by Post Regions for All Visa Classes" June 18, 2004. One post-9/11 screening process, known as Condor, has conducted over 130,000 extra name-checks. DOS letter, Karl Hofmann to the Commission, Apr. 5, 2004.The checks have caused significant delays in some cases but have never resulted in visas being denied on terrorism grounds. For a discussion of visa delays, see General Accounting Office report,"Border Security: Improvements Needed to Reduce Time Taken to Adjudicate Visas for Science Students and Scholars," Feb. 2004.We do not know all the reasons why visa applications have dropped so significantly. Several factors beyond the visa process itself include the National Security Entry-Exit Registration System, which requires additional screening processes for certain groups from Arab and Muslim countries; the Iraq war; and per

haps cyclical economic factors. For the cost to the United States of visa backlogs, see National Foreign Trade Council report,"Visa Backlog Costs U.S. Exporters More Than $30 Billion Since 2002, New Study Finds,"June 2, 2004 (online at www.nftc.org/newsflash/newsflash.asp?Mode=View&articleid=1686&Category=All).

39.These issues are on the G-8 agenda.White House press release, "G-8 Secure and Facilitated Travel Initiative (SAFTI)," June 9, 2004 (online at www.whitehouse.gov/news/releases/2004/06/20040609-51.html). Lax passport issuance standards are among the vulnerabilities exploited by terrorists, possibly including two of the 9/11 hijackers. Three models exist for strengthened prescreening: (1) better screening by airlines, such as the use of improved document authentication technology; (2) posting of border agents or inspectors in foreign airports to work cooperatively with foreign counterparts; and (3) establishing a full preinspection regime, such as now exists for travel to the United States from Canada and Ireland. All three models should be pursued, in addition to electronic prescreening .

40. Among the more important problems to address is that of varying transliterations of the same name. For example, the current lack of a single convention for transliterating Arabic names enabled the 19 hijackers to vary the spelling of their names to defeat name-based watchlist systems and confuse any potential efforts to locate them. While the gradual introduction of biometric identifiers will help, that process will take years, and a name match will always be useful.The ICAO should discuss the adoption of a standard requiring a digital code for all names that need to be translated into the Roman alphabet, ensuring one common spelling for all countries.

41. On achieving more reliable identification, see Markle Foundation task force report, Creating a Trusted Information Network for Homeland Security (Markle Foundation, 2003), p. 72 (online at www.markle.org).

42. General Accounting Office report, Mass Transit: Federal Action Could Help Transit Agencies Address Security Challenges, GAO-03-263, Dec. 2002 (online at www.gao.gov/new.items/d03263.pdf).