Beruflich Dokumente
Kultur Dokumente
Lorry M. Fenner
The US government and military have not yet fully transitioned from Cold War and
Industrial Age thinking and postures to face Information Age, transnational threats
effectively. Catastrophic terrorist attacks are not the only significant challenges we face,
but the attacks of September 11, 2001 have shown us in dramatic terms that we can no
longer adjust gradually to globalization and the new era. We must move much more
rapidly to posture and equip our people, our government and the intelligence community
to combat this challenge as well as other transnational challenges (those known and
those not yet anticipated).
Hypothesis: The Intelligence Community (1C) and policy makers did not understand
the threat to US national security in the late 1990s. We focused too narrowly on Usama
Bin Laden (UBL), and then incrementally enlarged that focus to al Qa'ida senior
leadership (AQSL). The narrow focus and ad hoc changes made creating a
comprehensive and appropriate US Government (USG) strategy difficult. This, in turn,
made the development of an effective intelligence strategy nearly impossible. Since
9/11 our focus has changed. Now it is too broad - a global war on terrorism (GWOT).2
Our strategy must be grander than one that only addresses a tactic; terrorism.
Although others reject this notion, we posit that the threat is ideological -violent Islamic
extremism. We do not posit a "clash of civilizations", however whether our adversary is
one group, al Qa'ida, or a network of groups, we must address this ideology, and we
must analyze the adversary's goals and strategy.3 Only then can we truly understand
why the US is a target. Only then can we design a strategy or set of strategies with
effective campaign plans and tactics to defeat our adversaries.4
First, this paper posits our adversary's strategy including notional "ends, ways,
and means." Next, is a review of the security environment and terrorism and the
intelligence attempts to assess and respond to these. While we had a general National
Intelligence Estimate (NIE) and an update, in the absence of a comprehensive
assessment specifically of al Qa'ida, the Counterterrorism Center worked from a
narrow, DCI approved "plan". The paper ends with a call for an appropriate assessment
of the threat and proposes possibilities that would bring us closer to being able to
design an effective strategy.
1 Many books have been written about the threat, terrorism, and strategy. This is not meant to be
a comprehensive review or overview, but a thumbnail sketch of our framework for analysis.
2 Jeffrey Record, "Bounding the Global War on Terrorism," Strategic Studies Institute, December
2003.
3 Bard O'Neill, Insurgency & Terrorism: Inside Modern Revolutionary Warfare, Brassey's Inc.,
Washington, 1990. O'Neill provides a framework for analysis.
4 Combating Terrorism in a Globalized World, National War College, May 2002 is one example of
an analysis of a "pansurgency" and designing ends, ways and means to respond.
COMMISSION SENSITIVE 1
2/3/2004
COMMISSION SENSITIVE
Ends. Some do not agree with the notion that we can use an analogy to International
Communism and the Cold War to analyze our current problem.5 Although our
adversaries do not now have a national base like the Soviet Union or China, we can
make a useful if not perfect comparison to communist insurgencies in their movement
phase. This challenge is "an international"; Al Qa'ida and its affiliates (GAI, EIJ, ASG,
etc.) form a larger, world-wide group that has loyalty to a movement. UBL's February
1998 fatwa announced the formation of the "World Islamic Front for Jihad Against the
Jews and Crusaders" and calls for attacks to continue until Jerusalem and Mecca are
"liberated" from the United States and its allies and US troops "move out of all the lands
of Islam, defeated and unable to threaten any Muslim." Their goals are explicit; they
want to claim nation-states as bases with clients, proxies and possibly a bloc. Their
collective strategy is long term, attritional and, possibly, annihilationist (at least towards
Christians and Jews in their regimes and regions). Their enemies include secularist
Arabs, moderate Muslims, and leaders of Muslim majority states who do not support.
As they seek to overthrow the current world order, first they want the United States and
other non-Muslim powers out of the states they wish to claim. Next, they want Islamic
regimes as neighbors; Israel must be destroyed. Finally, they want to emasculate
international organizations and disrupt non-Muslim states worldwide (the US, Canada,
Australia, other western democracies, Russia) so they will never be a threat to their
extremist regimes or their people in the future.
Ways. Our adversary has taken the strategic offensive with terrorist acts worldwide,
even while they entice us to challenge their strong, tactical defensive stance with hit-
and-run attacks in Afghanistan, Iraq, and elsewhere. A campaign of widely separated,
shifting, surprise attacks strategically and tactically gives them the initiative. But this is
not the whole of it. Terrorism is only one tool or tactic. Among other tools, they use
diplomacy, public diplomacy/propaganda and educational programs/support, economic
support for like-minded groups or opportunistic allies, and efforts to undermine other
cultures.6
A lot of paper and ink is spent on this problem. While we have found many alerts
of possible attacks; many intelligence reports of terrorist activities and personalities; and
many assessments of terrorist leaders' intentions and goals; we do not find evidence
that our 1C has conducted a comprehensive analysis of our adversaries' as part of a
pansurgency or ideological movement nor of their strategy. While the 1995 National
intelligence Estimate (NIE) and 1997 update assessed many things correctly, neither
took a broader view of our adversary. In addition, even after the 1998 East Africa
Embassy bombings and the two year limit of the 1997 update, the 1C failed to update
the Estimate even as our understanding of UBL and al Qa'ida was changing. Even as
the 1C gained an understanding that UBL championed an ideology that was inimical to
our interests, called for worldwide jihad against American civilians and others, and that
participated in planning strategy and operations, our evidence so far shows the
Community only communicated this new understanding to policy makers in piecemeal
fashion. The large numbers of documents the 1C produced did not suffice to capture the
5 Record.
6 There is evidence that al Qa'ida and affiliates make money from the drug trade; and that the
leadership has recognized the additional benefits of fostering a drug culture.
COMMISSION SENSITIVE
2/3/2004
COMMISSION SENSITIVE
Means. UBL has his family finances and legitimate financial market activity as well as
gaining resources through some Islamic charities. Al Qa'ida uses legitimate and
criminal markets to gain as well. The movement is able to recruit not just the desperate
and destitute, but also the well-educated, the scientists and engineers and medical
doctors, the middle-class and well off (many middle-class young men have few
prospects for viable professional or political careers in their societies). Many of the
latter bring monetary as well as intellectual capital to the fight. UBL and his cohort have
trained thousands of mujahedin. They are able to use and ally with rogue regimes and
non-Islamic terrorist organizations as proxies and affiliates.
We need a comprehensive assessment of how and who they recruit if we are to
be able to counter them successfully. While we target the "vanguard" or leaders, we
must recognize that they are in many ways quite different from the "workers" and
"farmers" who commit suicide or act as facilitators. The movement can afford to lose
19/3000 in ratios for suicides, but they will still need a mass of followers to move to the
next constructive phases of their strategy. The organization needs these footsoldiers if
it is to graduate into a mass movement and achieve its larger goals. We need to prevent
that. We also need to prevent other groups and proxies from joining, or split those
already joined apart which are necessary to achieve their larger goals.
As our National Security Strategy (NSS), September 2002, and our National
Strategy for Combating Terrorism (NSCT), February 2003, recognize, we must fight "a
war of ideas" and win the "minds and hearts", but we did not, and have not yet,
articulated the threat as an ideology with a mass of followers [or an aim to build such a
movement/pansurgency] and our current strategy seeks to transform the
international/transnational warriors back into state confined criminals who can be
countered by national law enforcement.
COMMISSION SENSITIVE 3
2/3/2004
COMMISSION SENSITIVE
phenomena have erased the domestic/foreign divide which has been an organizing
principle of US national security and law enforcement for many years. In order to
respond and reform appropriately, in order to organize our structures and processes
effectively, we have to understand the threats and opportunities of the 21st Century.7
We address only one here.
Terrorism: Terrorism is a very old tactic used by state and non-state entities—some
criminal and some motivated by powerlust or ideology. It is used predominantly by
those who are not as powerful militarily and technologically as their adversaries, i.e.
insurgents. Because terrorist targets can include civilians and non-combatants, it has
over the years been criminalized or outlawed by governments and international
protocols. Still, there are many and varied specific definitions of terrorism. The 2002
NSS says, "The enemy is terrorism - premeditated, politically motivated violence
perpetrated against innocents." Bard O'Neill explains that "[i]nsurgent terrorism is
purposeful, rather then mindless, violence because terrorists seek to achieve specific
long-term, intermediate, and short-term goals. The longer term goal is, of course, to
change the political community, political system, authorities, or policies. The
intermediate goal of terrorism is not so much the desire to deplete the government's
physical resources as it is to erode its psychological support by instilling fear into
officials and their domestic and international supporters."8 O'Neill continues that
"though the general purpose of terrorism has been to alter the behavior and attitudes of
specific groups, this has not excluded the simultaneous pursuit of one or more
proximate objectives...." Jane Holl posits that even the 9/11 attacks on the United
States were aimed at the Saudi regime.9 By itself, terrorism is rarely successful in the
long term. In the short term, if governments respond too weakly, or instead too violently
or indiscriminantly, populations might side with terrorists creating a popular revolution.
If the government provides adequate security and accomplishes needed reforms, it will
gain favor with the population and take motivating grievances away from the terrorists.
Because the 1C (primarily the Central Intelligence Agency (CIA) and the DCI's
Counterterrorism Center (CTC)), and therefore the USG, identified the threat to the
nation's security as terrorism - even though terrorism is merely a tactic - our response
has been skewed. What we required was for the 1C to go beyond notice and warning
that there was a growing use of this tactic by a variety of groups, to a sharper and more
comprehensive assessment of these groups' underlying motivations and intentions. We
have responded intuitively, with all the attendant tendencies to mirror-image the threat,
instead of intellectually to this challenge. According to many we have interviewed, the
1C was too busy responding to multiple complex and conflicting challenges in the 1990s
from the wars in Iraq and Kosovo to watching China, Iran and North Korea closely to the
hunt for proliferators and WMD. According to a senior UBL/al Qa'ida analyst at the Joint
7 Discussions with Gordon Lederman, Lloyd Salvetti, and Kevin Scheid (9/11 Intelligence Task
Force).
8 O'Neill, pp. 24-25. O'Neill acknowledges others in defining insurgency as "a struggle between a
nonruling group and the ruling authorities in which the nonruling group consciously uses political
resources (e.g., organizational expertise, propaganda, and demonstrations) and violence to
destroy, reformulate, or sustain the basis of legitimacy of one or more aspects of politics," p.13.
9 Staff Director for the Carnegie Commission on the Causes of Violent Conflict. Currently the UN
Assistant Secretary General for Mission Support, Department of Peacekeeping.
COMMISSION SENSITIVE 4
2/3/2004
COMMISSION SENSITIVE
COMMISSION SENSITIVE 5
2/3/2004
COMMISSION SENSITIVE
It presumably is built on the NSS and NSCT which are both problematic. Still, it is
critical that it address the entire 1C and the links to the National Strategy for Homeland
Security and other USG and state and local intelligence and law enforcement support
for decision makers.
The DCI's Plan: Until 2004, according to Joint Inquiry and our own interviews, CTC
was working from "a Plan." It was not a CIA plan and it was not an 1C plan, much less
was it a USG strategy. It focused on a tactic. It focused on terrorism as a crime and
UBL and his senior lieutenants as criminals. It focused overseas where these particular
criminals lived, trained, and operated before 9/11 (leaving aside for the moment the
question of their involvement in the first World Trade Center (WTC) bombing in 1993).
Even the FBI, which had responsibility for domestic intelligence and criminal
investigation on terrorism, was focused overseas on capturing and prosecuting these
criminals. Relatedly, but not comprehensively or synergistically or in full coordination,
the State Department and Department of Treasury pursued stopping state support for or
acquiescence to UBL and to contain his finances. Little was done, despite the WTC 93
attack or the Ressam Millenium arrest and other warnings of possible domestic attacks,
to effectively and appropriately bring in State (consular affairs), Justice (INS, Border
Patrol), airport and port security, the FAA or commercial transportation. UBL and his
senior lieutenants moved, but not that widely (as far as we knew) outside the Middle
East and South Asia.11 The USG focus was on responding to the catastrophic results of
the use of WMD or cyber attack in the United States, but besides a "forward defense"
(deter, disrupt, render overseas) little was done to consider prevention of them. Further,
little if anything was done to consider the psychological and economic effects of a high
explosives attack or numerous smaller attacks on the homeland.12
One can look at the many successes of the 1C from 1995 - 2003 in preventing or
delaying terrorist attacks and in capturing terrorist groups' second tier leaders and
functionaries and from these successes decide that the few attacks that have affected
Americans are the price of living in the world. In other words, there has been no real
failure. If so, we could judge our approach, even without a USG-wide and IC-wide
strategy as a general success to be capitalized on and expanded. On the other hand,
one might conclude that we have been extremely lucky (despite our lack of sound
management and integrated approach) that these groups have been relatively timid and
resource poor. Then we might judge that our structure and approach are really
ineffective and that it is only a matter of time before they attack again. In fact, we might
10 All these Departments and USG agencies had representation on the CTC's IICT and
levied/vetted requirements and warnings.
11 The January hearings pointed out that, although individual agencies had some efforts
dedicated to terrorist travel, the 1C did not have a comprehensive strategy to track the travel of
leaders overseas and "footsoldiers" to the US and Europe. We see the results of a new CTC
operational approach to doing so in the arrest, over the past two years, of a number of al Qa'ida's
senior leadership.
12 It appears little was done to think of or counter the myriad other possibilities except for one occasion
reported on in the Joint Inquiry report. During the Reagan administration INS tried to enlist the assistance
of the FBI to find student visa abusers who were studying in certain sensitive subjects who were from
countries on the state-sponsors of terrorism list. The FBI was non-responsive.
COMMISSION SENSITIVE 6
2/3/2004
COMMISSION SENSITIVE
reason that we have not experienced more domestic attacks because our adversaries
have concentrated on spectacular and suicide attacks. What if they change their tactics
and decide to attack us at home on a smaller but more continuous basis? We can posit
that they would have even more success and we would not at all be prepared to counter
that strategy with our current approach. If they have learned something from the 2001
anthrax attacks or the DC area sniper or successful but smaller scale attacks in Israel,
we are in deep trouble.
"The Plan" is not enough: Focusing on encouraging the world to criminalize terrorism
is an old requirement and a good one as far as it goes. It is appropriate that we work
this with all the tools of national power with renewed and constant attention. It is not
enough.
Tracking down criminals for arrest and prosecution is an old requirement and a
good one. It is appropriate that law enforcement, the military, and intelligence and
special activities work this with the help of all the tools of national power with renewed
and constant attention. We must also enlist our allies and friends and international
organizations; we must help maximize their efforts and leverage them in our own
strategy. It is not enough.
Preventing groups and states that use terrorist tactics from obtaining WMD or
advanced conventional weapons is an old requirement and a good one. It is
appropriate that we, our allies and the international community use our best law
enforcement, intelligence, and military capabilities in this effort. It is not enough.
Obstructing the flow of money and other material resources to terrorists and their
proxies as well as states who support them is an old requirement and a good one.
Again, it is appropriate that we use all the tools of national power and enlist the help of
the international community for this endeavor. It is not enough.
It is not enough because even though we are finally talking about addressing the
root causes of terrorism, we have not fully addressed the ideologies and strategic goals
of the groups that are increasingly using this tactic. We know why people resort to
terrorism - they are either sadists or revolutionaries or messianic murderers who either
relish the harming of the unarmed and unsuspecting, or they believe it is the only means
they have of gaining their objectives against more powerful adversaries, or they feel
they must kill all those who are not them by whatever means they have. It is not
enough to know this.
COMMISSION SENSITIVE 7
2/3/2004
COMMISSION SENSITIVE
Holl and others have suggested. We already understand that this enemy does not
respond to traditional Cold War incentives, deterrents, and containment. Have we
considered what incentives and punishments they might respond to beyond arrests and
destruction of their sanctuaries when it is politically palatable?
COMMISSION SENSITIVE 8
2/3/2004
COMMISSION SENSITIVE
Our nation needs an NIE or other special intelligence product that assesses
which of the above (or combination) is most likely. We continue to shy away from
the religious identity of our attackers, but if ideology is really the root, we must
name it and devise our strategy accordingly. The threat is ideological. Whether it is
one group or a confederation of groups with interests each in their own states, or in their
own region, or in the world, we must address the ideology and their strategy for
achieving their goals (and, specifically, why we are their targets). Only then can we
plan a strategy or set of strategies with campaign plans and tactics to defeat them.14
Only then can we devise a truly comprehensive and integrated intelligence strategy to
support the President and executive departments (Defense, Homeland Security, State,
etc.) to successfully address the threat.
14There are some psychological assessments or particular leaders and lieutenants of al Qa'ida
and affiliates, but we have not yet seen an assessment of UBL's ideological geneaology,
schooling, thoughts, writings, etc.
COMMISSION SENSITIVE
2/3/2004