THE 9/11 COMMISSION REPORT 02

Table of Contents

THE 9/11 COMMISSION REPORT

CONTENTS

7

THE ATTACK LOOMS

7.1 FIRST ARRIVALS IN CALIFORNIA

In chapter 5 we described the Southeast Asia travels of Nawaf al Hazmi, Khalid al Mihdhar, and others in January 2000 on the first part of the “planes opera- tion.” In that chapter we also described how Mihdhar was spotted in Kuala Lumpur early in January 2000, along with associates who were not identified, and then was lost to sight when the group passed through Bangkok. On Jan- uary 15, Hazmi and Mihdhar arrived in Los Angeles. They spent about two weeks there before moving on to San Diego.1

Two Weeks in Los Angeles

Why Hazmi and Mihdhar came to California, we do not know for certain. Khalid Sheikh Mohammed (KSM), the organizer of the planes operation, explains that California was a convenient point of entry from Asia and had the added benefit of being far away from the intended target area.2

Hazmi and Mihdhar were ill-prepared for a mission in the United States. Their only qualifications for this plot were their devotion to Usama Bin Ladin, their veteran service, and their ability to get valid U.S. visas. Neither had spent any substantial time in the West, and neither spoke much, if any, English.3

It would therefore be plausible that they or KSM would have tried to iden- tify, in advance, a friendly contact for them in the United States. In detention, KSM denies that al Qaeda had any agents in Southern California.We do not credit this denial.4 We believe it is unlikely that Hazmi and Mihdhar—neither of whom, in contrast to the Hamburg group, had any prior exposure to life in the West—would have come to the United States without arranging to receive assistance from one or more individuals informed in advance of their arrival.5 KSM says that though he told others involved in the conspiracy to stay away from mosques and to avoid establishing personal contacts, he made an excep- tion in this case and instructed Hazmi and Mihdhar to pose as newly arrived

215

Saudi students and seek assistance at local mosques. He counted on their break- ing off any such relationships once they moved to the East Coast.6 Our inabil- ity to ascertain the activities of Hazmi and Mihdhar during their first two weeks in the United States may reflect al Qaeda tradecraft designed to protect the identity of anyone who may have assisted them during that period.

Hazmi and Mihdhar were directed to enroll in English-language classes upon arriving in Southern California, so that they could begin pilot training as soon as possible. KSM claims to have steered the two to San Diego on the basis of his own research, which supposedly included thumbing through a San Diego phone book acquired at a Karachi flea market. Contradicting himself, he also says that, as instructed, they attempted to enroll in three language schools in Los Angeles.7 After the pair cleared Immigration and Customs at Los Angeles International Airport, we do not know where they went.8 They appear to have obtained assis- tance from the Muslim community, specifically the community surrounding the King Fahd mosque in Culver City, one of the most prominent mosques in

Southern California.

It is fairly certain that Hazmi and Mihdhar spent time at the King Fahd mosque and made some acquaintances there. One witness interviewed by the FBI after the September 11 attacks has said he first met the hijackers at the mosque in early 2000. Furthermore, one of the people who would befriend them—a man named Mohdar Abdullah—recalled a trip with Hazmi and Mihdhar to Los Angeles in June when, on their arrival, the three went to the King Fahd mosque. There Hazmi and Mihdhar greeted various individuals whom they appeared to have met previously, including a man named “Khal- lam.” In Abdullah’s telling, when Khallam visited the al Qaeda operatives at their motel that evening,Abdullah was asked to leave the room so that Hazmi, Mihdhar, and Khallam could meet in private.The identity of Khallam and his purpose in meeting with Hazmi and Mihdhar remain unknown.9

To understand what Hazmi and Mihdhar did in their first weeks in the United States, evidently staying in Los Angeles, we have investigated whether anyone associated with the King Fahd mosque assisted them.This subject has received substantial attention in the media. Some have speculated that Fahad al Thumairy—an imam at the mosque and an accredited diplomat at the Saudi Arabian consulate from 1996 until 2003—may have played a role in helping the hijackers establish themselves on their arrival in Los Angeles.This specula- tion is based, at least in part, on Thumairy’s reported leadership of an extrem- ist faction at the mosque.10

A well-known figure at the King Fahd mosque and within the Los Ange- les Muslim community,Thumairy was reputed to be an Islamic fundamental- ist and a strict adherent to orthodox Wahhabi doctrine. Some Muslims concerned about his preaching have said he “injected non-Islamic themes into his guidance/prayers at the [King Fahd] Mosque” and had followers “support- ive of the events of September 11, 2001.”11 Thumairy appears to have associ-

ated with a particularly radical faction within the community of local worship- pers, and had a network of contacts in other cities in the United States. After 9/11,Thumairy’s conduct was a subject of internal debate among some Saudi officials. He apparently lost his position at the King Fahd mosque, possibly because of his immoderate reputation. On May 6, 2003,Thumairy attempted to reenter the United States from Saudi Arabia but was refused entry, based on a determination by the State Department that he might be connected with ter- rorist activity.12

When interviewed by both the FBI and the Commission staff, Thumairy has denied preaching anti-Western sermons, much less promoting violent jihad. More to the point, he claimed not to recognize either Hazmi or Mihdhar. Both denials are somewhat suspect. (He likewise denied knowing Omar al Bay- oumi—a man from San Diego we will discuss shortly—even though witnesses and telephone records establish that the two men had contact with each other. Similarly,Thumairy’s claim not to know Mohdar Abdullah is belied by Abdul- lah’s contrary assertion.) On the other hand,Thumairy undoubtedly met with and provided religious counseling to countless individuals during his tenure at the King Fahd mosque, so he might not remember two transients like Hazmi and Mihdhar several years later.13

The circumstantial evidence makes Thumairy a logical person to consider as a possible contact for Hazmi and Mihdhar.Yet, after exploring the available leads, we have not found evidence that Thumairy provided assistance to the two operatives.14

We do not pick up their trail until February 1, 2000, when they encoun- tered Omar al Bayoumi and Caysan Bin Don at a halal food restaurant on Venice Boulevard in Culver City, a few blocks away from the King Fahd mosque. Bayoumi and Bin Don have both told us that they had driven up from San Diego earlier that day so that Bayoumi could address a visa issue and col- lect some papers from the Saudi consulate. Bayoumi heard Hazmi and Mih- dhar speaking in what he recognized to be Gulf Arabic and struck up a conversation. Since Bin Don knew only a little Arabic, he had to rely heavily on Bayoumi to translate for him.15

Mihdhar and Hazmi said they were students from Saudi Arabia who had just arrived in the United States to study English. They said they were living in an apartment near the restaurant but did not specify the address. They did not like Los Angeles and were having a hard time, especially because they did not know anyone. Bayoumi told them how pleasant San Diego was and offered to help them settle there.The two pairs then left the restaurant and went their separate ways.16

Bayoumi and Bin Don have been interviewed many times about the Feb- ruary 1, 2000, lunch. For the most part, their respective accounts corroborate each other. However, Bayoumi has said that he and Bin Don attempted to visit the King Fahd mosque after lunch but could not find it. Bin Don, on the other

hand, recalls visiting the mosque twice that day for prayers, both before and after the meal. Bin Don’s recollection is spotty and inconsistent. Bayoumi’s ver- sion can be challenged as well, since the mosque is close to the restaurant and Bayoumi had visited it, and the surrounding area, on multiple occasions, includ- ing twice within six weeks of February 1.We do not know whether the lunch encounter occurred by chance or design.We know about it because Bayoumi told law enforcement that it happened.17

Bayoumi, then 42 years old, was in the United States as a business student, supported by a private contractor for the Saudi Civil Aviation Authority, where Bayoumi had worked for over 20 years.18 The object of considerable media speculation following 9/11, he lives now in Saudi Arabia, well aware of his notoriety. Both we and the FBI have interviewed him and investigated evi- dence about him.

Bayoumi is a devout Muslim, obliging and gregarious. He spent much of his spare time involved in religious study and helping run a mosque in El Cajon, about 15 miles from San Diego. It is certainly possible that he has dis- sembled about some aspects of his story, perhaps to counter suspicion. On the other hand, we have seen no credible evidence that he believed in violent extremism or knowingly aided extremist groups.19 Our investigators who have dealt directly with him and studied his background find him to be an unlikely candidate for clandestine involvement with Islamist extremists.

The Move to San Diego

By February 4, Hazmi and Mihdhar had come to San Diego from Los Ange- les, possibly driven by Mohdar Abdullah. Abdullah, a Yemeni university student in his early 20s, is fluent in both Arabic and English, and was perfectly suited to assist the hijackers in pursuing their mission.20

After 9/11,Abdullah was interviewed many times by the FBI. He admitted knowing of Hazmi and Mihdhar’s extremist leanings and Mihdhar’s involve- ment with the Islamic Army of Aden (a group with ties to al Qaeda) back in Yemen. Abdullah clearly was sympathetic to those extremist views. During a post-9/11 search of his possessions, the FBI found a notebook (belonging to someone else) with references to planes falling from the sky, mass killing, and hijacking. Further, when detained as a material witness following the 9/11 attacks, Abdullah expressed hatred for the U.S. government and “stated that the

U.S. brought ‘this’ on themselves.”21

When interviewed by the FBI after 9/11, Abdullah denied having advance knowledge of attacks. In May 2004, however, we learned of reports about Abdullah bragging to fellow inmates at a California prison in September– October 2003 that he had known Hazmi and Mihdhar were planning a ter- rorist attack.The stories attributed to Abdullah are not entirely consistent with each other. Specifically, according to one inmate, Abdullah claimed an unnamed individual had notified him that Hazmi and Mihdhar would be arriv-

ing in Los Angeles with plans to carry out an attack. Abdullah allegedly told the same inmate that he had driven the two al Qaeda operatives from Los Ange- les to San Diego, but did not say when this occurred.We have been unable to corroborate this account.22

Another inmate has recalled Abdullah claiming he first heard about the hijackers’ terrorist plans after they arrived in San Diego, when they told him they planned to fly an airplane into a building and invited him to join them on the plane. According to this inmate, Abdullah also claimed to have found out about the 9/11 attacks three weeks in advance, a claim that appears to dove- tail with evidence that Abdullah may have received a phone call from Hazmi around that time, that he stopped making calls from his telephone after August 25, 2001, and that, according to his friends, he started acting strangely.23

Although boasts among prison inmates often tend to be unreliable, this evi- dence is obviously important.To date, neither we nor the FBI have been able to verify Abdullah’s alleged jailhouse statements, despite investigative efforts.

We thus do not know when or how Hazmi and Mihdhar first came to San Diego. We do know that on February 4, they went to the Islamic Center of San Diego to find Omar al Bayoumi and take him up on his offer of help. Bay- oumi obliged by not only locating an apartment but also helping them fill out the lease application, co-signing the lease and, when the real estate agent refused to take cash for a deposit, helping them open a bank account (which they did with a $9,900 deposit); he then provided a certified check from his own account for which the al Qaeda operatives reimbursed him on the spot for the deposit. Neither then nor later did Bayoumi give money to either Hazmi or Mihdhar, who had received money from KSM.24

Hazmi and Mihdhar moved in with no furniture and practically no posses- sions. Soon after the move, Bayoumi used their apartment for a party attended by some 20 male members of the Muslim community. At Bayoumi’s request, Bin Don videotaped the gathering with Bayoumi’s video camera. Hazmi and Mihdhar did not mingle with the other guests and reportedly spent most of the party by themselves off camera, in a back room.25

Hazmi and Mihdhar immediately started looking for a different place to stay. Based on their comment to Bayoumi about the first apartment being expen- sive, one might infer that they wanted to save money.They may also have been reconsidering the wisdom of living so close to the video camera–wielding Bay- oumi, who Hazmi seemed to think was some sort of Saudi spy. Just over a week after moving in, Hazmi and Mihdhar filed a 30-day notice of intention to vacate. Bayoumi apparently loaned them his cell phone to help them check out possibilities for new accommodations.26

Their initial effort to move turned out poorly. An acquaintance arranged with his landlord to have Mihdhar take over his apartment. Mihdhar put down a $650 deposit and signed a lease for the apartment effective March 1. Several weeks later, Mihdhar sought a refund of his deposit, claiming he no longer

intended to move in because the apartment was too messy.When the landlord refused to refund the deposit, Mihdhar became belligerent. The landlord remembers him “ranting and raving” as if he were “psychotic.”27

Hazmi and Mihdhar finally found a room to rent in the home of an indi- vidual they had met at a mosque in San Diego.According to the homeowner, the future hijackers moved in on May 10, 2000. Mihdhar moved out after only about a month. On June 9, he left San Diego to return to Yemen. Hazmi, on the other hand, stayed at this house for the rest of his time in California, until mid-December; he would then leave for Arizona with a newly arrived 9/11 hijacker-pilot, Hani Hanjour.28

While in San Diego, Hazmi and Mihdhar played the part of recently arrived foreign students.They continued to reach out to members of the Muslim com- munity for help.At least initially, they found well-meaning new acquaintances at the Islamic Center of San Diego, which was only a stone’s throw from the apartment where they first lived. For example, when they purchased a used car (with cash), they bought it from a man who lived across the street from the Islamic Center and who let them use his address in registering the vehicle, an accommodation “to help a fellow Muslim brother.” Similarly, in April, when their cash supply may have been dwindling, Hazmi persuaded the administra- tor of the Islamic Center to let him use the administrator’s bank account to receive a $5,000 wire transfer from someone in Dubai, in the United Arab Emi- rates (this was KSM’s nephew, Ali Abdul Aziz Ali).29

Hazmi and Mihdhar visited other mosques as well, mixing comfortably as devout worshippers. During the operatives’ critical first weeks in San Diego, Mohdar Abdullah helped them. Translating between English and Arabic, he assisted them in obtaining California driver’s licenses and with applying to lan- guage and flight schools.Abdullah also introduced them to his circle of friends; he shared an apartment with some of those friends near the Rabat mosque in La Mesa, a few miles from the hijackers’ residence.30

Abdullah has emerged as a key associate of Hazmi and Mihdhar in San Diego. Detained after 9/11 (first as a material witness, then on immigration charges), he was deported to Yemen on May 21, 2004, after the U.S. Attorney for the Southern District of California declined to prosecute him on charges arising out of his alleged jailhouse admissions concerning the 9/11 operatives. The Department of Justice declined to delay his removal pending further inves- tigation of this new information.31

Other friends of Abdullah also translated for Hazmi and Mihdhar and helped them adjust to life in San Diego. Some held extremist beliefs or were well acquainted with known extremists. For example, immediately after 9/11, Osama Awadallah, a Yemeni whose telephone number was found in Hazmi’s Toyota at Washington Dulles International Airport, was found to possess pho- tos, videos, and articles relating to Bin Ladin.Awadallah also had lived in a house where copies of Bin Ladin’s fatwas and other similar materials were distributed

to the residents. Omar Bakarbashat, a Saudi, also met Hazmi and Mihdhar at the Rabat mosque. He admitted helping Hazmi to learn English and taking over the operatives’ first apartment in San Diego after they moved out. Bakar- bashat apparently had downloaded stridently anti-American Web pages to his computer’s hard drive.32

Another potentially significant San Diego contact for Hazmi and Mihdhar was Anwar Aulaqi, an imam at the Rabat mosque. Born in New Mexico and thus a U.S. citizen, Aulaqi grew up in Yemen and studied in the United States on a Yemeni government scholarship. We do not know how or when Hazmi and Mihdhar first met Aulaqi. The operatives may even have met or at least talked to him the same day they first moved to San Diego. Hazmi and Mih- dhar reportedly respected Aulaqi as a religious figure and developed a close rela- tionship with him.33

When interviewed after 9/11, Aulaqi said he did not recognize Hazmi’s name but did identify his picture. Although Aulaqi admitted meeting with Hazmi several times, he claimed not to remember any specifics of what they discussed. He described Hazmi as a soft-spoken Saudi student who used to appear at the mosque with a companion but who did not have a large circle of friends.34

Aulaqi left San Diego in mid-2000, and by early 2001 had relocated to Vir- ginia.As we will discuss later, Hazmi eventually showed up at Aulaqi’s mosque in Virginia, an appearance that may not have been coincidental.We have been unable to learn enough about Aulaqi’s relationship with Hazmi and Mihdhar to reach a conclusion.35

In sum, although the evidence is thin as to specific motivations, our overall impression is that soon after arriving in California, Hazmi and Mihdhar sought out and found a group of young and ideologically like-minded Muslims with roots in Yemen and Saudi Arabia, individuals mainly associated with Mohdar Abdullah and the Rabat mosque.The al Qaeda operatives lived openly in San Diego under their true names, listing Hazmi in the telephone directory.They managed to avoid attracting much attention.

Flight Training Fails; Mihdhar Bails Out

Hazmi and Mihdhar came to the United States to learn English, take flying lessons, and become pilots as quickly as possible.They turned out, however, to have no aptitude for English. Even with help and tutoring from Mohdar Abdul- lah and other bilingual friends, Hazmi and Mihdhar’s efforts to learn proved futile.This lack of language skills in turn became an insurmountable barrier to learning how to fly.36

A pilot they consulted at one school, the Sorbi Flying Club in San Diego, spoke Arabic. He explained to them that their flight instruction would begin with small planes. Hazmi and Mihdhar emphasized their interest in learning to fly jets, Boeing aircraft in particular, and asked where they might enroll to train

on jets right away. Convinced that the two were either joking or dreaming, the pilot responded that no such school existed. Other instructors who worked with Hazmi and Mihdhar remember them as poor students who focused on learning to control the aircraft in flight but took no interest in takeoffs or land- ings. By the end of May 2000, Hazmi and Mihdhar had given up on learning how to fly.37

Mihdhar’s mind seems to have been with his family back in Yemen, as evi- denced by calls he made from the apartment telephone.When news of the birth of his first child arrived, he could stand life in California no longer. In late May and early June of 2000, he closed his bank account, transferred the car regis- tration to Hazmi, and arranged his return to Yemen.According to KSM, Mih- dhar was bored in San Diego and foresaw no problem in coming back to the United States since he had not overstayed his visa. Hazmi and Mohdar Abdul- lah accompanied him to Los Angeles on June 9. After visiting the King Fahd mosque one last time with his friends, Mihdhar left the country the follow- ing day.38

KSM kept in fairly close touch with his operatives, using a variety of meth- ods. When Bin Ladin called KSM back from Pakistan to Afghanistan in the spring of 2000, KSM asked Khallad (whom we introduced in chapter 5) to maintain email contact with Hazmi in the United States. Mihdhar’s decision to strand Hazmi in San Diego enraged KSM, who had not authorized the departure and feared it would compromise the plan. KSM attempted to drop Mihdhar from the planes operation and would have done so, he says, had he not been overruled by Bin Ladin.39

Following Mihdhar’s departure, Hazmi grew lonely and worried that he would have trouble managing by himself. He prayed with his housemate each morning at 5:00 A.M. and attended services at the Islamic Center. He borrowed his housemate’s computer for Internet access, following news coverage of fight- ing in Chechnya and Bosnia.With his housemate’s help, Hazmi also used the Internet to search for a wife (after obtaining KSM’s approval to marry). This search did not succeed. Although he developed a close relationship with his housemate, Hazmi preferred not to use the house telephone, continuing the practice he and Mihdhar had adopted of going outside to make phone calls.40 After Mihdhar left, other students moved into the house. One of these, Yazeed al Salmi, stands out. In July 2000, Salmi purchased $4,000 in traveler’s checks at a bank in Riyadh, Saudi Arabia. On September 5, Hazmi deposited

$1,900 of the traveler’s checks into his bank account, after withdrawing the same amount in cash. It is possible that Hazmi was simply cashing the traveler’s checks for a friend.We do not know; Salmi claims not to remember the trans- action.After 9/11, Salmi reportedly confided to Mohdar Abdullah that he had previously known terrorist pilot Hani Hanjour.After living in the same house with Hazmi for about a month, Salmi moved to the La Mesa apartment shared by Abdullah and others.41

By the fall of 2000, Hazmi no longer even pretended to study English or take flying lessons. Aware that his co-conspirators in Afghanistan and Pakistan would be sending him a new colleague shortly, he bided his time and worked for a few weeks at a gas station in La Mesa where some of his friends, includ- ing Abdullah, were employed. On one occasion, Hazmi told a fellow employee that he was planning to find a better job, and let slip a prediction that he would become famous.42

On December 8, 2000, Hani Hanjour arrived in San Diego, having traveled from Dubai via Paris and Cincinnati. Hazmi likely picked up Hanjour at the airport.We do not know where Hanjour stayed; a few days later, both men left San Diego. Before departing, they visited the gas station in La Mesa, where Hazmi reportedly introduced Hanjour as a “long time friend from Saudi Ara- bia.” Hazmi told his housemate that he and his friend “Hani” were headed for San Jose to take flying lessons and told his friends that he would stay in touch. Hazmi promised to return to San Diego soon, and he and Hanjour drove off.43 Hazmi did not sever all contact with his friends in San Diego.According to Abdullah, after Hazmi left San Diego in December 2000, he telephoned Abdul- lah twice: in December 2000 or January 2001, Hazmi said he was in San Fran- cisco and would be attending flight school there; about two weeks later, he said he was attending flight school in Arizona. Some evidence, which we will dis- cuss later, indicates that Hazmi contacted Abdullah again, in August 2001. In addition, during the month following Hazmi’s departure from San Diego, he emailed his housemate three times, including a January 2001 email that Hazmi signed “Smer,” an apparent attempt to conceal his identity that struck the housemate as strange at the time. Hazmi also telephoned his housemate that he and his friend had decided to take flight lessons in Arizona, and that Mih- dhar was now back in Yemen.That was their last contact.When the housemate emailed Hazmi in February and March of 2001 to find out how he was far-

ing, Hazmi did not reply. 44

The housemate who rented the room to Hazmi and Mihdhar during 2000 is an apparently law-abiding citizen with long-standing, friendly contacts among local police and FBI personnel. He did not see anything unusual enough in the behavior of Hazmi or Mihdhar to prompt him to report to his law enforcement contacts. Nor did those contacts ask him for information about his tenants/housemates.

7.2 THE 9/11 PILOTS IN THE UNITED STATES

The Hamburg Pilots Arrive in the United States

In the early summer of 2000, the Hamburg group arrived in the United States to begin flight training. Marwan al Shehhi came on May 29, arriving in Newark on a flight from Brussels. He went to New York City and waited there for

Mohamed Atta to join him. On June 2, Atta traveled to the Czech Republic by bus from Germany and then flew from Prague to Newark the next day. According to Ramzi Binalshibh, Atta did not meet with anyone in Prague; he simply believed it would contribute to operational security to fly out of Prague rather than Hamburg, the departure point for much of his previous interna- tional travel.45

Atta and Shehhi had not settled on where they would obtain their flight training. In contrast, Ziad Jarrah had already arranged to attend the Florida Flight Training Center (FFTC) in Venice, Florida. Jarrah arrived in Newark on June 27 and then flew to Venice. He immediately began the private pilot pro- gram at FFTC, intending to get a multi-engine license. Jarrah moved in with some of the flight instructors affiliated with his school and bought a car.46

While Jarrah quickly settled into training in Florida, Atta and Shehhi kept searching for a flight school. After visiting the Airman Flight School in Nor- man, Oklahoma (where Zacarias Moussaoui would enroll several months later and where another al Qaeda operative, Ihab Ali, had taken lessons in the mid- 1990s), Atta started flight instruction at Huffman Aviation in Venice, Florida, and both Atta and Shehhi subsequently enrolled in the Accelerated Pilot Pro- gram at that school. By the end of July, both of them took solo flights, and by mid-August they passed the private pilot airman test.They trained through the summer at Huffman, while Jarrah continued his training at FFTC.47

The Hamburg operatives paid for their flight training primarily with funds wired from Dubai by KSM’s nephew,Ali Abdul Aziz Ali. Between June 29 and September 17, 2000,Ali sent Shehhi and Atta a total of $114,500 in five trans- fers ranging from $5,000 to $70,000.Ali relied on the unremarkable nature of his transactions, which were essentially invisible amid the billions of dollars flowing daily across the globe.48 Ali was not required to provide identification in sending this money and the aliases he used were not questioned.49

In mid-September,Atta and Shehhi applied to change their immigration sta- tus from tourist to student, stating their intention to study at Huffman until September 1, 2001. In late September, they decided to enroll at Jones Aviation in Sarasota, Florida, about 20 miles north of Venice. According to the instruc- tor at Jones, the two were aggressive, rude, and sometimes even fought with him to take over the controls during their training flights. In early October, they took the Stage I exam for instruments rating at Jones Aviation and failed. Very upset, they said they were in a hurry because jobs awaited them at home. Atta and Shehhi then returned to Huffman.50

In the meantime, Jarrah obtained a single-engine private pilot certificate in early August. Having reached that milestone, he departed on the first of five foreign trips he would take after first entering the United States. In October, he flew back to Germany to visit his girlfriend, Aysel Senguen.The two trav- eled to Paris before Jarrah returned to Florida on October 29. His relationship with her remained close throughout his time in the United States. In addition

to his trips, Jarrah made hundreds of phone calls to her and communicated fre- quently by email.51

Jarrah was supposed to be joined at FFTC by Ramzi Binalshibh, who even sent the school a deposit. But Binalshibh could not obtain a U.S. visa. His first applications in May and June 2000 were denied because he lacked established ties in Germany ensuring his return from a trip to the United States. In Sep- tember, he went home to Yemen to apply for a visa from there, but was denied on grounds that he also lacked sufficient ties to Yemen. In October, he tried one last time, in Berlin, applying for a student visa to attend “aviation language school,” but the prior denials were noted and this application was denied as well, as incomplete.52

Unable to participate directly in the operation, Binalshibh instead took on the role of coordinating between KSM and the operatives in the United States. Apart from sending a total of about $10,000 in wire transfers to Atta and Sheh- hi during the summer of 2000, one of Binalshibh’s first tasks in his new role as plot coordinator was to assist another possible pilot, Zacarias Moussaoui.53

In the fall of 2000, KSM had sent Moussaoui to Malaysia for flight training, but Moussaoui did not find a school he liked. He worked instead on other ter- rorist schemes, such as buying four tons of ammonium nitrate for bombs to be planted on cargo planes flying to the United States.When KSM found out, he recalled Moussaoui back to Pakistan and directed him to go to the United States for flight training. In early October, Moussaoui went to London.When Binalshibh visited London in December, he stayed at the same 16-room dor- mitory where Moussaoui was still residing. From London, Moussaoui sent inquiries to the Airman Flight School in Norman, Oklahoma.54

Confronting training or travel problems with Hazmi, Mihdhar, Binalshibh, and Moussaoui, al Qaeda was looking for another possible pilot candidate. A new recruit with just the right background conveniently presented himself in Afghanistan.

The Fourth Pilot: Hani Hanjour

Hani Hanjour, from Ta’if, Saudi Arabia, first came to the United States in 1991 to study at the Center for English as a Second Language at the University of Arizona. He seems to have been a rigorously observant Muslim. According to his older brother, Hani Hanjour went to Afghanistan for the first time in the late 1980s, as a teenager, to participate in the jihad and, because the Soviets had already withdrawn, worked for a relief agency there.55

In 1996, Hanjour returned to the United States to pursue flight training, after being rejected by a Saudi flight school. He checked out flight schools in Florida, California, and Arizona; and he briefly started at a couple of them before returning to Saudi Arabia. In 1997, he returned to Florida and then, along with two friends, went back to Arizona and began his flight training there in earnest. After about three months, Hanjour was able to obtain his private

pilot’s license. Several more months of training yielded him a commercial pilot certificate, issued by the Federal Aviation Administration (FAA) in April 1999. He then returned to Saudi Arabia.56

Hanjour reportedly applied to the civil aviation school in Jeddah after returning home, but was rejected. He stayed home for a while and then told his family he was going to the United Arab Emirates to work for an airline. Where Hanjour actually traveled during this time period is unknown. It is pos- sible he went to the training camps in Afghanistan.57

The fact that Hanjour spent so much time in Arizona may be significant.A number of important al Qaeda figures attended the University of Arizona in Tucson or lived in Tucson in the 1980s and early 1990s.58 Some of Hanjour’s known Arizona associates from the time of his flight training in the late 1990s have also raised suspicion.59 FBI investigators have speculated that al Qaeda may have directed other extremist Muslims in the Phoenix area to enroll in avia- tion training. It is clear that when Hanjour lived in Arizona in the 1990s, he associated with several individuals holding extremist beliefs who have been the subject of counterterrorism investigations. Some of them trained with Han- jour to be pilots. Others had apparent connections to al Qaeda, including train- ing in Afghanistan.60

By the spring of 2000, Hanjour was back in Afghanistan.According to KSM, Hanjour was sent to him in Karachi for inclusion in the plot after Hanjour was identified in al Qaeda’s al Faruq camp as a trained pilot, on the basis of back- ground information he had provided. Hanjour had been at a camp in Afghanistan for a few weeks when Bin Ladin or Atef apparently realized that he was a trained pilot; he was told to report to KSM, who then trained Han- jour for a few days in the use of code words.61

On June 20, Hanjour returned home to Saudi Arabia. He obtained a U.S. student visa on September 25 and told his family he was returning to his job in the UAE. Hanjour did go to the UAE, but to meet facilitator Ali Abdul Aziz Ali.62

Ali opened a bank account in Dubai for Hanjour and providing the initial funds for his trip. On December 8, Hanjour traveled to San Diego. His supposed destination was an English as a second language program in Oakland, Califor- nia, which he had scheduled before leaving Saudi Arabia but never attended. Instead, as mentioned earlier, he joined Nawaf al Hazmi in San Diego.63

Hazmi and Hanjour left San Diego almost immediately and drove to Ari- zona. Settling in Mesa, Hanjour began refresher training at his old school,Ari- zona Aviation. He wanted to train on multi-engine planes, but had difficulties because his English was not good enough.The instructor advised him to dis- continue but Hanjour said he could not go home without completing the training. In early 2001, he started training on a Boeing 737 simulator at Pan Am International Flight Academy in Mesa.An instructor there found his work well below standard and discouraged him from continuing.Again, Hanjour per-

severed; he completed the initial training by the end of March 2001. At that point, Hanjour and Hazmi vacated their apartment and started driving east, anticipating the arrival of the “muscle hijackers”—the operatives who would storm the cockpits and control the passengers. By as early as April 4, Hanjour and Hazmi had arrived in Falls Church,Virginia.64

The three pilots in Florida continued with their training. Atta and Shehhi finished up at Huffman and earned their instrument certificates from the FAA in November. In mid-December 2000, they passed their commercial pilot tests and received their licenses.They then began training to fly large jets on a flight simulator. At about the same time, Jarrah began simulator training, also in Florida but at a different center. By the end of 2000, less than six months after their arrival, the three pilots on the East Coast were simulating flights on large jets.65

Travels in Early 2001

Jarrah, Atta, and Shehhi, having progressed in their training, all took foreign trips during the holiday period of 2000–2001. Jarrah flew through Germany to get home to Beirut.A few weeks later, he returned to Florida via Germany, with Aysel Senguen. She stayed with him in Florida for ten days, even accom- panying him to a flight training session. We do not know whether Atta or al Qaeda leaders knew about Jarrah’s trips and Senguen’s visit.The other opera- tives had broken off regular contact with their families. At the end of January 2001, Jarrah again flew to Beirut, to visit his sick father. After staying there for several weeks, Jarrah visited Senguen in Germany for a few days before return- ing to the United States at the end of February.66

While Jarrah took his personal trips,Atta traveled to Germany in early Jan- uary 2001 for a progress meeting with Ramzi Binalshibh. Binalshibh says Atta told him to report to the al Qaeda leadership in Afghanistan that the three Hamburg pilots had completed their flight training and were awaiting orders. Atta also disclosed that a fourth pilot, Hanjour, had joined Hazmi. Upon returning to Florida,Atta wired Binalshibh travel money. Binalshibh proceeded to Afghanistan, made his report, and spent the next several months there and in Pakistan.67

When Atta returned to Florida, Shehhi left for Morocco, traveling to Casablanca in mid-January. Shehhi’s family, concerned about not having heard from him, reported him missing to the UAE government.The UAE embassy in turn contacted the Hamburg police and a UAE representative tried to find him in Germany, visiting mosques and Shehhi’s last address in Hamburg.After learning that his family was looking for him, Shehhi telephoned them on Jan- uary 20 and said he was still living and studying in Hamburg.The UAE gov- ernment then told the Hamburg police they could call off the search.68

Atta and Shehhi both encountered some difficulty reentering the United States, on January 10 and January 18, respectively. Because neither presented a

Atta’s Alleged Trip to Prague

Mohamed Atta is known to have been in Prague on two occasions: in December 1994, when he stayed one night at a transit hotel, and in June 2000, when he was en route to the United States. On the latter occa- sion, he arrived by bus from Germany, on June 2, and departed for Newark the following day.69

The allegation that Atta met with an Iraqi intelligence officer in Prague in April 2001 originates from the reporting of a single source of the Czech intelligence service. Shortly after 9/11, the source reported having seen Atta meet with Ahmad Khalil Ibrahim Samir al Ani, an Iraqi diplomat, at the Iraqi Embassy in Prague on April 9, 2001, at 11:00 A.M. This information was passed to CIA headquarters.

The U.S. legal attaché (“Legat”) in Prague, the representative of the FBI, met with the Czech service’s source. After the meeting, the assess- ment of the Legat and the Czech officers present was that they were 70 percent sure that the source was sincere and believed his own story of the meeting. Subsequently, the Czech intelligence service publicly stated that there was a 70 percent probability that the meeting between Atta and Ani had taken place.The Czech Interior Minister also made several statements to the press about his belief that the meeting had occurred, and the story was widely reported.

The FBI has gathered evidence indicating that Atta was in Virginia Beach on April 4 (as evidenced by a bank surveillance camera photo), and in Coral Springs, Florida on April 11, where he and Shehhi leased an apartment. On April 6, 9, 10, and 11,Atta’s cellular telephone was used numerous times to call various lodging establishments in Florida from cell sites within Florida. We cannot confirm that he placed those calls. But there are no U.S. records indicating that Atta departed the country during this period. Czech officials have reviewed their flight and bor- der records as well for any indication that Atta was in the Czech Repub- lic in April 2001, including records of anyone crossing the border who even looked Arab.They have also reviewed pictures from the area near the Iraqi embassy and have not discovered photos of anyone who looked like Atta. No evidence has been found that Atta was in the Czech Republic in April 2001.

According to the Czech government,Ani, the Iraqi officer alleged to have met with Atta, was about 70 miles away from Prague on April 8–9 and did not return until the afternoon of the ninth, while the source was firm that the sighting occurred at 11:00 A.M. When questioned about the reported April 2001 meeting,Ani—now in custody—has denied ever

student visa, both of them had to persuade INS inspectors that they should be admitted so that they could continue their flight training. Neither operative had any problem clearing Customs.71

After returning to Florida from their trips,Atta and Shehhi visited Georgia, staying briefly in Norcross and Decatur, and renting a single-engine plane to fly with an instructor in Lawrenceville. By February 19,Atta and Shehhi were in Virginia.They rented a mailbox in Virginia Beach, cashed a check, and then promptly returned to Georgia, staying in Stone Mountain.We have found no explanation for these travels. In mid-March, Jarrah was in Georgia as well, stay- ing in Decatur.There is no evidence that the three pilots met, although Jarrah and Atta apparently spoke on the phone. At the end of the month, Jarrah left the United States again and visited Senguen in Germany for two weeks. In early April, Atta and Shehhi returned to Virginia Beach and closed the mail- box they had opened in February.72

By the time Atta and Shehhi returned to Virginia Beach from their travels in Georgia, Hazmi and Hanjour had also arrived in Virginia, in Falls Church. They made their way to a large mosque there, the Dar al Hijra mosque, some- time in early April.73

As we mentioned earlier, one of the imams at this mosque was the same Anwar Aulaqi with whom Hazmi had spent time at the Rabat mosque in San Diego. Aulaqi had moved to Virginia in January 2001. He remembers Hazmi

from San Diego but has denied having any contact with Hazmi or Hanjour in Virginia.74

At the Dar al Hijra mosque, Hazmi and Hanjour met a Jordanian named Eyad al Rababah. Rababah says he had gone to the mosque to speak to the imam, Aulaqi, about finding work. At the conclusion of services, which nor- mally had 400 to 500 attendees, Rababah says he happened to meet Hazmi and Hanjour.They were looking for an apartment; Rababah referred them to a friend who had one to rent. Hazmi and Hanjour moved into the apartment, which was in Alexandria.75

Some FBI investigators doubt Rababah’s story. Some agents suspect that Aulaqi may have tasked Rababah to help Hazmi and Hanjour. We share that suspicion, given the remarkable coincidence of Aulaqi’s prior relationship with Hazmi. As noted above, the Commission was unable to locate and interview Aulaqi. Rababah has been deported to Jordan, having been convicted after 9/11 in a fraudulent driver’s license scheme.76

Rababah, who had lived in Connecticut, New York, and New Jersey, told investigators that he had recommended Paterson, New Jersey, as a place with an Arabic-speaking community where Hazmi and Hanjour might want to set- tle.They asked for his help in getting them an apartment in Paterson. Rababah tried without success. He says he then suggested that Hazmi and Hanjour travel with him to Connecticut where they could look for a place to live.77

On May 8, Rababah went to Hazmi and Hanjour’s apartment to pick them up for the trip to Connecticut.There he says he found them with new room- mates—Ahmed al Ghamdi and Majed Moqed.These two men had been sent to America to serve as muscle hijackers and had arrived at Dulles Airport on May 2. Rababah drove Hanjour to Fairfield, Connecticut, followed by Hazmi, who had Moqed and Ghamdi in his car. After a short stay in Connecticut, where they apparently called area flight schools and real estate agents, Rababah drove the four to Paterson to have dinner and show them around. He says that they returned with him to Fairfield that night, and that he never saw them again.78

Within a few weeks, Hanjour, Hazmi, and several other operatives moved to Paterson and rented a one-room apartment. When their landlord later paid a visit, he found six men living there—Nawaf al Hazmi, now joined by his younger brother Salem, Hanjour, Moqed, probably Ahmed al Ghamdi, and Abdul Aziz al Omari; Hazmi’s old friend Khalid al Mihdhar would soon join them.79

Atta and Shehhi had already returned to Florida. On April 11, they moved into an apartment in Coral Springs. Atta stayed in Florida, awaiting the arrival of the first muscle hijackers.80

Shehhi, on the other hand, bought a ticket to Cairo and flew there from Miami on April 18. We do not know much more about Shehhi’s reason for traveling to Egypt in April than we know about his January trip to Morocco.

Shehhi did meet with Atta’s father, who stated in a post-9/11 interview that Shehhi just wanted to pick up Atta’s international driver’s license and some money.This story is not credible.Atta already had the license with him and pre- sented it during a traffic stop on April 26 while Shehhi was still abroad. Sheh- hi spent about two weeks in Egypt, obviously more time than would have been needed just to meet with Atta’s father. Shehhi could have traveled elsewhere during this time, but no records indicating additional travel have been discov- ered.81

Shehhi returned to Miami on May 2. That day, Atta and Jarrah were together, about 30 miles to the north, visiting a Department of Motor Vehicles office in Lauderdale Lakes, Florida, to get Florida driver’s licenses. Back in Vir- ginia, Hazmi and Hanjour were about to leave for Connecticut and New Jer- sey.As the summer approached, the lead operatives were settled in Florida and New Jersey, waiting for the rest of their contingent to join them.82

7.3 ASSEMBLING THE TEAMS

During the summer and early autumn of 2000, Bin Ladin and senior al Qaeda leaders in Afghanistan started selecting the muscle hijackers—the operatives who would storm the cockpits and control the passengers. Despite the phrase widely used to describe them, the so-called muscle hijackers were not at all physically imposing; most were between 5′ 5″ and 5′ 7″ in height.83

Recruitment and Selection for 9/11

Twelve of the 13 muscle hijackers (excluding Nawaf al Hazmi and Mihdhar) came from Saudi Arabia: Satam al Suqami, Wail al Shehri, Waleed al Shehri, Abdul Aziz al Omari, Ahmed al Ghamdi, Hamza al Ghamdi, Mohand al Shehri, Majed Moqed, Salem al Hazmi, Saeed al Ghamdi,Ahmad al Haznawi, and Ahmed al Nami. The remaining recruit, Fayez Banihammad, came from the UAE. He appears to have played a unique role among the muscle hijack- ers because of his work with one of the plot’s financial facilitators, Mustafa al Hawsawi.84

Saudi authorities interviewed the relatives of these men and have briefed us on what they found.The muscle hijackers came from a variety of educational and societal backgrounds. All were between 20 and 28 years old; most were unemployed with no more than a high school education and were unmarried.85 Four of them—Ahmed al Ghamdi, Saeed al Ghamdi, Hamza al Ghamdi, and Ahmad al Haznawi—came from a cluster of three towns in the al Bahah region, an isolated and underdeveloped area of Saudi Arabia, and shared the same tribal affiliation. None had a university degree.Their travel patterns and information from family members suggest that the four may have been in con-

tact with each other as early as the fall of 1999.86

Five more—Wail al Shehri,Waleed al Shehri,Abdul Aziz al Omari, Mohand al Shehri, and Ahmed al Nami—came from Asir Province, a poor region in southwestern Saudi Arabia that borders Yemen; this weakly policed area is sometimes called “the wild frontier.”Wail and Waleed al Shehri were brothers. All five in this group had begun university studies. Omari had graduated with honors from high school, had attained a degree from the Imam Muhammad Ibn Saud Islamic University, was married, and had a daughter.87

The three remaining muscle hijackers from Saudi Arabia were Satam al Suqami, Majed Moqed, and Salem al Hazmi. Suqami came from Riyadh. Moqed hailed from a small town called Annakhil, west of Medina. Suqami had very little education, and Moqed had dropped out of university. Neither Suqami nor Moqed appears to have had ties to the other, or to any of the other operatives, before getting involved with extremists, probably by 1999.88

Salem al Hazmi, a younger brother of Nawaf, was born in Mecca. Salem’s family recalled him as a quarrelsome teenager. His brother Nawaf probably rec- ommended him for recruitment into al Qaeda. One al Qaeda member who knew them says that Nawaf pleaded with Bin Ladin to allow Salem to partic- ipate in the 9/11 operation.89

Detainees have offered varying reasons for the use of so many Saudi oper- atives. Binalshibh argues that al Qaeda wanted to send a message to the gov- ernment of Saudi Arabia about its relationship with the United States. Several other al Qaeda figures, however, have stated that ethnicity generally was not a factor in the selection of operatives unless it was important for security or oper- ational reasons.90

KSM, for instance, denies that Saudis were chosen for the 9/11 plot to drive a wedge between the United States and Saudi Arabia, and stresses practical rea- sons for considering ethnic background when selecting operatives. He says that so many were Saudi because Saudis comprised the largest portion of the pool of recruits in the al Qaeda training camps. KSM estimates that in any given camp, 70 percent of the mujahideen were Saudi, 20 percent were Yemeni, and 10 percent were from elsewhere. Although Saudi and Yemeni trainees were most often willing to volunteer for suicide operations, prior to 9/11 it was eas- ier for Saudi operatives to get into the United States.91

Most of the Saudi muscle hijackers developed their ties to extremists two or three years before the attacks. Their families often did not consider these young men religious zealots. Some were perceived as devout, others as lacking in faith. For instance, although Ahmed al Ghamdi, Hamza al Ghamdi, and Saeed al Ghamdi attended prayer services regularly and Omari often served as an imam at his mosque in Saudi Arabia, Suqami and Salem al Hazmi appeared unconcerned with religion and, contrary to Islamic law, were known to drink alcohol.92

Like many other al Qaeda operatives, the Saudis who eventually became the muscle hijackers were targeted for recruitment outside Afghanistan— probably in Saudi Arabia itself. Al Qaeda recruiters, certain clerics, and—in a

few cases—family members probably all played a role in spotting potential candidates. Several of the muscle hijackers seem to have been recruited through contacts at local universities and mosques.93

According to the head of one of the training camps in Afghanistan, some were chosen by unnamed Saudi sheikhs who had contacts with al Qaeda. Omari, for example, is believed to have been a student of a radical Saudi cleric named Sulayman al Alwan. His mosque, which is located in al Qassim Province, is known among more moderate clerics as a “terrorist factory.”The province is at the very heart of the strict Wahhabi movement in Saudi Arabia. Saeed al Ghamdi and Mohand al Shehri also spent time in al Qassim, both breaking with their families. According to his father, Mohand al Shehri’s fre- quent visits to this area resulted in his failing exams at his university in Riyadh. Saeed al Ghamdi transferred to a university in al Qassim, but he soon stopped talking to his family and dropped out of school without informing them.94

The majority of these Saudi recruits began to break with their families in late 1999 and early 2000. According to relatives, some recruits began to make arrangements for extended absences. Others exhibited marked changes in behavior before disappearing. Salem al Hazmi’s father recounted that Salem— who had had problems with alcohol and petty theft—stopped drinking and started attending mosque regularly three months before he disappeared.95

Several family members remembered that their relatives had expressed a desire to participate in jihad, particularly in Chechnya. None had mentioned going to Afghanistan.These statements might be true or cover stories.The four recruits from the al Ghamdi tribe, for example, all told their families that they were going to Chechnya. Only two—Ahmed al Ghamdi and Saeed al Ghamdi—had documentation suggesting travel to a Russian republic.96

Some aspiring Saudi mujahideen, intending to go to Chechnya, encoun- tered difficulties along the way and diverted to Afghanistan. In 1999, Ibn al Khattab—the primary commander of Arab nationals in Chechnya—reportedly had started turning away most foreign mujahideen because of their inexperi- ence and inability to adjust to the local conditions. KSM states that several of the 9/11 muscle hijackers faced problems traveling to Chechnya and so went to Afghanistan, where they were drawn into al Qaeda.97

Khallad has offered a more detailed story of how such diversions occurred. According to him, a number of Saudi mujahideen who tried to go to Chech- nya in 1999 to fight the Russians were stopped at the Turkish-Georgian bor- der. Upon arriving in Turkey, they received phone calls at guesthouses in places such as Istanbul and Ankara, informing them that the route to Chechnya via Georgia had been closed.These Saudis then decided to travel to Afghanistan, where they could train and wait to make another attempt to enter Chechnya during the summer of 2000.While training at al Qaeda camps, a dozen of them heard Bin Ladin’s speeches, volunteered to become suicide operatives, and eventually were selected as muscle hijackers for the planes operation. Khallad says he met a number of them at the Kandahar airport, where they were help-

ing to provide extra security. He encouraged Bin Ladin to use them. Khallad claims to have been closest with Saeed al Ghamdi, whom he convinced to become a martyr and whom he asked to recruit a friend, Ahmed al Ghamdi, to the same cause. Although Khallad claims not to recall everyone from this group who was later chosen for the 9/11 operation, he says they also included Suqami,Waleed and Wail al Shehri, Omari, Nami, Hamza al Ghamdi, Salem al Hazmi, and Moqed.98

According to KSM, operatives volunteered for suicide operations and, for the most part, were not pressured to martyr themselves. Upon arriving in Afghanistan, a recruit would fill out an application with standard questions, such as,What brought you to Afghanistan? How did you travel here? How did you hear about us? What attracted you to the cause? What is your educational back- ground? Where have you worked before? Applications were valuable for deter- mining the potential of new arrivals, for filtering out potential spies from among them, and for identifying recruits with special skills. For instance, as pointed out earlier, Hani Hanjour noted his pilot training. Prospective opera- tives also were asked whether they were prepared to serve as suicide operatives; those who answered in the affirmative were interviewed by senior al Qaeda lieutenant Muhammad Atef.99

KSM claims that the most important quality for any al Qaeda operative was willingness to martyr himself. Khallad agrees, and claims that this criterion had preeminence in selecting the planes operation participants. The second most important criterion was demonstrable patience, Khallad says, because the planning for such attacks could take years.100

Khallad claims it did not matter whether the hijackers had fought in jihad previously, since he believes that U.S. authorities were not looking for such operatives before 9/11. But KSM asserts that young mujahideen with clean records were chosen to avoid raising alerts during travel. The al Qaeda train- ing camp head mentioned above adds that operatives with no prior involve- ment in activities likely to be known to international security agencies were purposefully selected for the 9/11 attacks.101

Most of the muscle hijackers first underwent basic training similar to that given other al Qaeda recruits. This included training in firearms, heavy weapons, explosives, and topography. Recruits learned discipline and military life.They were subjected to artificial stresses to measure their psychological fit- ness and commitment to jihad.At least seven of the Saudi muscle hijackers took this basic training regime at the al Faruq camp near Kandahar.This particular camp appears to have been the preferred location for vetting and training the potential muscle hijackers because of its proximity to Bin Ladin and senior al Qaeda leadership.Two others—Suqami and Moqed—trained at Khal- dan, another large basic training facility located near Kabul, where Mihdhar had trained in the mid-1990s.102

By the time operatives for the planes operation were picked in mid-2000, some of them had been training in Afghanistan for months, others were just

arriving for the first time, and still others may have been returning after prior visits to the camps. According to KSM, Bin Ladin would travel to the camps to deliver lectures and meet the trainees personally. If Bin Ladin believed a trainee held promise for a special operation, that trainee would be invited to the al Qaeda leader’s compound at Tarnak Farms for further meetings.103

KSM claims that Bin Ladin could assess new trainees very quickly, in about ten minutes, and that many of the 9/11 hijackers were selected in this manner. Bin Ladin, assisted by Atef, personally chose all the future muscle hijackers for the planes operation, primarily between the summer of 2000 and April 2001. Upon choosing a trainee, Bin Ladin would ask him to swear loyalty for a sui- cide operation. After the selection and oath-swearing, the operative would be sent to KSM for training and the filming of a martyrdom video, a function KSM supervised as head of al Qaeda’s media committee.104

KSM sent the muscle hijacker recruits on to Saudi Arabia to obtain U.S. visas. He gave them money (about $2,000 each) and instructed them to return to Afghanistan for more training after obtaining the visas. At this early stage, the operatives were not told details about the operation.The majority of the Saudi muscle hijackers obtained U.S. visas in Jeddah or Riyadh between Sep- tember and November of 2000.105

KSM told potential hijackers to acquire new “clean” passports in their home countries before applying for a U.S. visa. This was to avoid raising suspicion about previous travel to countries where al Qaeda operated. Fourteen of the 19 hijackers, including nine Saudi muscle hijackers, obtained new passports. Some of these passports were then likely doctored by the al Qaeda passport division in Kandahar, which would add or erase entry and exit stamps to cre- ate “false trails” in the passports.106

In addition to the operatives who eventually participated in the 9/11 attacks as muscle hijackers, Bin Ladin apparently selected at least nine other Saudis who, for various reasons, did not end up taking part in the operation: Mohamed Mani Ahmad al Kahtani, Khalid Saeed Ahmad al Zahrani, Ali Abd al Rahman al Faqasi al Ghamdi, Saeed al Baluchi, Qutaybah al Najdi, Zuhair al Thubaiti, Saeed Abdullah Saeed al Ghamdi, Saud al Rashid, and Mushabib al Hamlan. A tenth individual, a Tunisian with Canadian citizenship named Abderraouf Jdey, may have been a candidate to participate in 9/11, or he may have been a candidate for a later attack.These candidate hijackers either backed out, had trouble obtaining needed travel documents, or were removed from the operation by the al Qaeda leadership. Khallad believes KSM wanted between four and six operatives per plane. KSM states that al Qaeda had originally planned to use 25 or 26 hijackers but ended up with only the 19.107

Final Training and Deployment to the United States

Having acquired U.S. visas in Saudi Arabia, the muscle hijackers returned to Afghanistan for special training in late 2000 to early 2001.The training report- edly was conducted at the al Matar complex by Abu Turab al Jordani, one of

only a handful of al Qaeda operatives who, according to KSM, was aware of the full details of the planned planes operation. Abu Turab taught the opera- tives how to conduct hijackings, disarm air marshals, and handle explosives. He also trained them in bodybuilding and provided them with a few basic Eng- lish words and phrases.108

According to KSM,Abu Turab even had the trainees butcher a sheep and a camel with a knife to prepare to use knives during the hijackings.The recruits learned to focus on storming the cockpit at the earliest opportunity when the doors first opened, and to worry about seizing control over the rest of the plane later. The operatives were taught about other kinds of attack as well, such as truck bombing, so that they would not be able to disclose the exact nature of their operation if they were caught. According to KSM, the muscle did not learn the full details—including the plan to hijack planes and fly them into buildings—before reaching the United States.109

After training in Afghanistan, the operatives went to a safehouse maintained by KSM in Karachi and stayed there temporarily before being deployed to the United States via the UAE.The safehouse was run by al Qaeda operative Abd al Rahim Ghulum Rabbani, also known as Abu Rahmah, a close associate of KSM who assisted him for three years by finding apartments and lending logis- tical support to operatives KSM would send.

According to an al Qaeda facilitator, operatives were brought to the safe- house by a trusted Pakistani al Qaeda courier named Abdullah Sindhi, who also worked for KSM. The future hijackers usually arrived in groups of two or three, staying at the safe house for as long as two weeks.The facilitator has identified each operative whom he assisted at KSM’s direction in the spring of 2001. Before the operatives left Pakistan, each of them received $10,000 from KSM for future expenses.110

From Pakistan, the operatives transited through the UAE en route to the United States. In the Emirates they were assisted primarily by al Qaeda oper- atives Ali Abdul Aziz Ali and Mustafa al Hawsawi. Ali apparently assisted nine future hijackers between April and June 2001 as they came through Dubai. He helped them with plane tickets, traveler’s checks, and hotel reservations; he also taught them about everyday aspects of life in the West, such as purchasing clothes and ordering food. Dubai, a modern city with easy access to a major airport, travel agencies, hotels, and Western commercial establishments, was an ideal transit point.111

Ali reportedly assumed the operatives he was helping were involved in a big operation in the United States, he did not know the details.112 When he asked KSM to send him an assistant, KSM dispatched Hawsawi, who had worked on al Qaeda’s media committee in Kandahar. Hawsawi helped send the last four operatives (other than Mihdhar) to the United States from the UAE. Hawsawi would consult with Atta about the hijackers’ travel schedules to the United States and later check with Atta to confirm that each had arrived. Hawsawi told

the muscle hijackers that they would be met by Atta at the airport. Hawsawi also facilitated some of the operation’s financing.113

The muscle hijackers began arriving in the United States in late April 2001. In most cases, they traveled in pairs on tourist visas and entered the United States in Orlando or Miami, Florida; Washington, D.C.; or New York. Those arriving in Florida were assisted by Atta and Shehhi, while Hazmi and Han- jour took care of the rest. By the end of June, 14 of the 15 muscle hijackers had crossed the Atlantic.114

The muscle hijackers supplied an infusion of funds, which they carried as a mixture of cash and traveler’s checks purchased in the UAE and Saudi Arabia. Seven muscle hijackers are known to have purchased a total of nearly $50,000 in traveler’s checks that were used in the United States. Moreover, substantial deposits into operatives’ U.S. bank accounts immediately followed the entry of other muscle hijackers, indicating that those newcomers brought money with them as well. In addition, muscle hijacker Banihammad came to the United States after opening bank accounts in the UAE into which were deposited the equivalent of approximately $30,000 on June 25, 2001.After his June 27 arrival in the United States, Banihammad made Visa and ATM withdrawals from his UAE accounts.115

The hijackers made extensive use of banks in the United States, choosing both branches of major international banks and smaller regional banks. All of the hijackers opened accounts in their own name, and used passports and other identification documents that appeared valid on their face. Contrary to numer- ous published reports, there is no evidence the hijackers ever used false Social Security numbers to open any bank accounts. While the hijackers were not experts on the use of the U.S. financial system, nothing they did would have led the banks to suspect criminal behavior, let alone a terrorist plot to commit mass murder.116

The last muscle hijacker to arrive was Khalid al Mihdhar.As mentioned ear- lier, he had abandoned Hazmi in San Diego in June 2000 and returned to his family inYemen. Mihdhar reportedly stayed inYemen for about a month before Khallad persuaded him to return to Afghanistan. Mihdhar complained about life in the United States. He met with KSM, who remained annoyed at his deci- sion to go AWOL. But KSM’s desire to drop him from the operation yielded to Bin Ladin’s insistence to keep him.117

By late 2000, Mihdhar was in Mecca, staying with a cousin until February 2001, when he went home to visit his family before returning to Afghanistan. In June 2001, Mihdhar returned once more to Mecca to stay with his cousin for another month. Mihdhar said that Bin Ladin was planning five attacks on the United States. Before leaving, Mihdhar asked his cousin to watch over his home and family because of a job he had to do.118

On July 4, 2001, Mihdhar left Saudi Arabia to return to the United States, arriving at John F. Kennedy International Airport in New York. Mihdhar gave

American Airlines Flight 11

Left to right, Mohamed Atta, pilot; Waleed al Shehri, Wail al Shehri, Satam al Suqami, Abdulaziz al Omari, hijackers

United Airlines Flight 175

Left to right, Marwan al Shehhi, pilot; Fayez Baniham- mad, Ahmed al Ghamdi, Hamza al Ghamdi, Mohand al Shehri, hijackers

American Airlines Flight 77

Left to right,

Hani Hanjour, pilot; Nawaf al Hazmi, Khalid al Mihdhar, Majed Moqed, Salem al Hazmi, hijackers

United Airlines Flight 93

Left to right, Ziad Jarrah pilot; Saeed al Ghamdi,

Ahmad al Haznawi, Ahmed al Nami, hijackers

his intended address as the Marriott Hotel, New York City, but instead spent one night at another New York hotel. He then joined the group of hijackers in Paterson, reuniting with Nawaf al Hazmi after more than a year.With two months remaining, all 19 hijackers were in the United States and ready to take the final steps toward carrying out the attacks.119

Assistance from Hezbollah and Iran to al Qaeda

As we mentioned in chapter 2, while in Sudan, senior managers in al Qaeda maintained contacts with Iran and the Iranian-supported worldwide terrorist organization Hezbollah, which is based mainly in southern Lebanon and Beirut. Al Qaeda members received advice and training from Hezbollah.

Intelligence indicates the persistence of contacts between Iranian security officials and senior al Qaeda figures after Bin Ladin’s return to Afghanistan. Khallad has said that Iran made a concerted effort to strengthen relations with al Qaeda after the October 2000 attack on the USS Cole, but was rebuffed because Bin Ladin did not want to alienate his supporters in Saudi Arabia. Khal- lad and other detainees have described the willingness of Iranian officials to facilitate the travel of al Qaeda members through Iran, on their way to and from Afghanistan. For example, Iranian border inspectors would be told not to place telltale stamps in the passports of these travelers. Such arrangements were par- ticularly beneficial to Saudi members of al Qaeda.120

Our knowledge of the international travels of the al Qaeda operatives selected for the 9/11 operation remains fragmentary. But we now have evi- dence suggesting that 8 to 10 of the 14 Saudi “muscle” operatives traveled into or out of Iran between October 2000 and February 2001.121

In October 2000, a senior operative of Hezbollah visited Saudi Arabia to coordinate activities there. He also planned to assist individuals in Saudi Ara- bia in traveling to Iran during November. A top Hezbollah commander and Saudi Hezbollah contacts were involved.122

Also in October 2000, two future muscle hijackers, Mohand al Shehri and Hamza al Ghamdi, flew from Iran to Kuwait. In November, Ahmed al Ghamdi apparently flew to Beirut, traveling—perhaps by coincidence—on the same flight as a senior Hezbollah operative.Also in November, Salem al Hazmi appar- ently flew from Saudi Arabia to Beirut.123

In mid-November, we believe, three of the future muscle hijackers,Wail al Shehri,Waleed al Shehri, and Ahmed al Nami, all of whom had obtained their

U.S. visas in late October, traveled in a group from Saudi Arabia to Beirut and then onward to Iran. An associate of a senior Hezbollah operative was on the same flight that took the future hijackers to Iran. Hezbollah officials in Beirut and Iran were expecting the arrival of a group during the same time period. The travel of this group was important enough to merit the attention of sen- ior figures in Hezbollah.124

Later in November, two future muscle hijackers, Satam al Suqami and Majed

Moqed, flew into Iran from Bahrain. In February 2001, Khalid al Mihdhar may have taken a flight from Syria to Iran, and then traveled further within Iran to a point near the Afghan border.125

KSM and Binalshibh have confirmed that several of the 9/11 hijackers (at least eight, according to Binalshibh) transited Iran on their way to or from Afghanistan, taking advantage of the Iranian practice of not stamping Saudi passports.They deny any other reason for the hijackers’ travel to Iran.They also deny any relationship between the hijackers and Hezbollah.126

In sum, there is strong evidence that Iran facilitated the transit of al Qaeda members into and out of Afghanistan before 9/11, and that some of these were future 9/11 hijackers.There also is circumstantial evidence that senior Hezbol- lah operatives were closely tracking the travel of some of these future muscle hijackers into Iran in November 2000. However, we cannot rule out the pos- sibility of a remarkable coincidence—that is, that Hezbollah was actually focus- ing on some other group of individuals traveling from Saudi Arabia during this same time frame, rather than the future hijackers.127

We have found no evidence that Iran or Hezbollah was aware of the plan- ning for what later became the 9/11 attack.At the time of their travel through Iran, the al Qaeda operatives themselves were probably not aware of the spe- cific details of their future operation.

After 9/11, Iran and Hezbollah wished to conceal any past evidence of cooperation with Sunni terrorists associated with al Qaeda. A senior Hezbol- lah official disclaimed any Hezbollah involvement in 9/11.128

We believe this topic requires further investigation by the U.S. government.

7.4 FINAL STRATEGIES AND TACTICS

Final Preparations in the United States

During the early summer of 2001, Atta, assisted by Shehhi, was busy coordi- nating the arrival of most of the muscle hijackers in southern Florida—pick- ing them up at the airport, finding them places to stay, and helping them settle in the United States.129

The majority settled in Florida. Some opened bank accounts, acquired mail- boxes, and rented cars. Several also joined local gyms, presumably to stay fit for the operation. Upon first arriving, most stayed in hotels and motels; but by mid- June, they settled in shared apartments relatively close to one another and Atta.130 Though these muscle hijackers did not travel much after arriving in the United States, two of them, Waleed al Shehri and Satam al Suqami, took unusual trips.

On May 19, Shehri and Suqami flew from Fort Lauderdale to Freeport, the Bahamas, where they had reservations at the Bahamas Princess Resort.The two were turned away by Bahamian officials on arrival, however, because they

lacked visas; they returned to Florida that same day. They likely took this trip to renew Suqami’s immigration status, as Suqami’s legal stay in the United States ended May 21.131

On July 30, Shehri traveled alone from Fort Lauderdale to Boston. He flew to San Francisco the next day, where he stayed one night before returning via Las Vegas.While this travel may have been a casing flight—Shehri traveled in first class on the same type of aircraft he would help hijack on September 11 (a Boeing 767) and the trip included a layover in Las Vegas—Shehri was nei- ther a pilot nor a plot leader, as were the other hijackers who took surveillance flights.132

The three Hamburg pilots—Atta, Shehhi, and Jarrah—took the first of their cross-country surveillance flights early in the summer. Shehhi flew from New York to Las Vegas via San Francisco in late May. Jarrah flew from Baltimore to Las Vegas via Los Angeles in early June. Atta flew from Boston to Las Vegas via San Francisco at the end of June. Each traveled in first class, on United Airlines. For the east-west transcontinental leg, each operative flew on the same type of aircraft he would pilot on September 11 (Atta and Shehhi, a Boeing 767; Jar- rah, a Boeing 757).133 Hanjour and Hazmi, as noted below, took similar cross- country surveillance flights in August.

Jarrah and Hanjour also received additional training and practice flights in the early summer.A few days before departing on his cross-country test flight, Jarrah flew from Fort Lauderdale to Philadelphia, where he trained at Hort- man Aviation and asked to fly the Hudson Corridor, a low-altitude “hallway” along the Hudson River that passes New York landmarks like the World Trade Center. Heavy traffic in the area can make the corridor a dangerous route for an inexperienced pilot. Because Hortman deemed Jarrah unfit to fly solo, he could fly this route only with an instructor.134

Hanjour, too, requested to fly the Hudson Corridor about this same time, at Air Fleet Training Systems in Teterboro, New Jersey, where he started receiv- ing ground instruction soon after settling in the area with Hazmi. Hanjour flew the Hudson Corridor, but his instructor declined a second request because of what he considered Hanjour’s poor piloting skills. Shortly thereafter, Hanjour switched to Caldwell Flight Academy in Fairfield, New Jersey, where he rented small aircraft on several occasions during June and July. In one such instance on July 20, Hanjour—likely accompanied by Hazmi—rented a plane from Caldwell and took a practice flight from Fairfield to Gaithersburg, Maryland, a route that would have allowed them to fly near Washington, D.C. Other evi- dence suggests that Hanjour may even have returned to Arizona for flight sim- ulator training earlier in June.135

There is no indication that Atta or Shehhi received any additional flight training in June. Both were likely too busy organizing the newly arrived mus- cle hijackers and taking their cross-country surveillance flights.Atta, moreover, needed to coordinate with his second-in-command, Nawaf al Hazmi.136

Although Atta and Hazmi appear to have been inVirginia at about the same time in early April, they probably did not meet then.Analysis of late April com- munications associated with KSM indicates that they had wanted to get together in April but could not coordinate the meeting.137 Atta and Hazmi probably first met in the United States only when Hazmi traveled round-trip from Newark to Miami between June 19 and June 25.

After he returned to New Jersey, Hazmi’s behavior began to closely paral- lel that of the other hijackers. He and Hanjour, for instance, soon established new bank accounts, acquired a mailbox, rented cars, and started visiting a gym. So did the four other hijackers who evidently were staying with them in New Jersey. Several also obtained new photo identification, first in New Jersey and then at theVirginia Department of MotorVehicles, where Hazmi and Hanjour had obtained such documents months earlier, likely with help from their Jor- danian friend, Rababah.138

Atta probably met again with Hazmi in early July. Returning from his ini- tial cross-country surveillance flight, Atta flew into New York. Rather than return immediately to Florida, he checked into a New Jersey hotel. He picked up tickets to travel to Spain at a travel agency in Paterson on July 4 before departing for Fort Lauderdale. Now that the muscle hijackers had arrived, he was ready to meet with Ramzi Binalshibh for the last time.139

The Meeting in Spain

After meeting with Atta in Berlin in January 2001, Binalshibh had spent much of the spring of 2001 in Afghanistan and Pakistan, helping move the muscle hijackers as they passed through Karachi. During the Berlin meeting, the two had agreed to meet later in the year in Kuala Lumpur to discuss the operation in person again. In late May, Binalshibh reported directly to Bin Ladin at an al Qaeda facility known as “Compound Six” near Kandahar.140

Bin Ladin told Binalshibh to instruct Atta and the others to focus on their security and that of the operation, and to advise Atta to proceed as planned with the targets discussed before Atta left Afghanistan in early 2000—the World Trade Center, the Pentagon, the White House, and the Capitol. According to Binalshibh, Bin Ladin said he preferred the White House over the Capitol, asking Binalshibh to confirm that Atta understood this preference. Binalshibh says Bin Ladin had given the same message to Waleed al Shehri for conveyance to Atta earlier that spring. Binalshibh also received permission to meet Atta in Malaysia.Atef provided money for the trip, which KSM would help Binalshibh arrange in Karachi.141

In early June, Binalshibh traveled by taxi from Kandahar to Quetta, Pakistan, where al Qaeda courier Abu Rahmah took him to KSM.According to Binal- shibh, KSM provided a plane ticket to Malaysia and a fraudulent Saudi pass- port to use for the trip. KSM told him to ask Atta to select a date for the attacks. Binalshibh was to return to Germany and then inform KSM of the date. KSM

also gave Binalshibh the email address of Zacarias Moussaoui for future con- tact. Binalshibh then left for Kuala Lumpur.142

Binalshibh contacted Atta upon arriving in Malaysia and found a change in plan. Atta could not travel because he was too busy helping the new arrivals settle in the United States.After remaining in Malaysia for approximately three weeks, Binalshibh went to Bangkok for a few days before returning to Ger- many. He and Atta agreed to meet later at a location to be determined.143

In early July, Atta called Binalshibh to suggest meeting in Madrid, for rea- sons Binalshibh claims not to know. He says he preferred Berlin, but that he and Atta knew too many people in Germany and feared being spotted together. Unable to buy a ticket to Madrid at the height of the tourist season, Binalshibh booked a seat on a flight to Reus, near Barcelona, the next day.Atta was already en route to Madrid, so Binalshibh phoned Shehhi in the United States to inform him of the change in itinerary.144

Atta arrived in Madrid on July 8. He spent the night in a hotel and made three calls from his room, most likely to coordinate with Binalshibh.The next day, Atta rented a car and drove to Reus to pick up Binalshibh; the two then drove to the nearby town of Cambrils. Hotel records show Atta renting rooms in the same area until July 19, when he returned his rental car in Madrid and flew back to Fort Lauderdale. On July 16, Binalshibh returned to Hamburg, using a ticket Atta had purchased for him earlier that day. According to Binal- shibh, they did not meet with anyone else while in Spain.145

Binalshibh says he told Atta that Bin Ladin wanted the attacks carried out as soon as possible. Bin Ladin, Binalshibh conveyed, was worried about hav- ing so many operatives in the United States.Atta replied that he could not yet provide a date because he was too busy organizing the arriving hijackers and still needed to coordinate the timing of the flights so that the crashes would occur simultaneously. Atta said he required about five to six weeks before he could provide an attack date. Binalshibh advised Atta that Bin Ladin had directed that the other operatives not be informed of the date until the last minute.Atta was to provide Binalshibh with advance notice of at least a week or two so that Binalshibh could travel to Afghanistan and report the date per- sonally to Bin Ladin.146

As to targets, Atta understood Bin Ladin’s interest in striking the White House.Atta said he thought this target too difficult, but had tasked Hazmi and Hanjour to evaluate its feasibility and was awaiting their answer. Atta said that those two operatives had rented small aircraft and flown reconnaissance flights near the Pentagon.Atta explained that Hanjour was assigned to attack the Pen- tagon, Jarrah the Capitol, and that both Atta and Shehhi would hit the World Trade Center. If any pilot could not reach his intended target, he was to crash the plane. If Atta could not strike the World Trade Center, he planned to crash his aircraft directly into the streets of New York.Atta told Binalshibh that each pilot had volunteered for his assigned target, and that the assignments were sub- ject to change.147

During the Spain meeting,Atta also mentioned that he had considered tar- geting a nuclear facility he had seen during familiarization flights near New York—a target they referred to as “electrical engineering.”According to Binal- shibh, the other pilots did not like the idea.They thought a nuclear target would be difficult because the airspace around it was restricted, making reconnaissance flights impossible and increasing the likelihood that any plane would be shot down before impact. Moreover, unlike the approved targets, this alternative had not been discussed with senior al Qaeda leaders and therefore did not have the requisite blessing. Nor would a nuclear facility have particular symbolic value. Atta did not ask Binalshibh to pass this idea on to Bin Ladin, Atef, or KSM, and Binalshibh says he did not mention it to them until after September 11.148 Binalshibh claims that during their time in Spain, he and Atta also discussed how the hijackings would be executed. Atta said he, Shehhi, and Jarrah had encountered no problems carrying box cutters on cross-country surveillance flights.The best time to storm the cockpit would be about 10–15 minutes after takeoff, when the cockpit doors typically were opened for the first time. Atta did not believe they would need any other weapons. He had no firm contin- gency plan in case the cockpit door was locked.While he mentioned general ideas such as using a hostage or claiming to have a bomb, he was confident the cockpit doors would be opened and did not consider breaking them down a viable idea. Atta told Binalshibh he wanted to select planes departing on long flights because they would be full of fuel, and that he wanted to hijack Boeing aircraft because he believed them easier to fly than Airbus aircraft, which he understood had an autopilot feature that did not allow them to be crashed into

the ground.149

Finally, Atta confirmed that the muscle hijackers had arrived in the United States without incident. They would be divided into teams according to their English-speaking ability.That way they could assist each other before the oper- ation and each team would be able to command the passengers in English. According to Binalshibh,Atta complained that some of the hijackers wanted to contact their families to say goodbye, something he had forbidden. Atta, more- over, was nervous about his future communications with Binalshibh, whom he instructed to obtain new telephones upon returning to Germany. Before Binal- shibh left Spain, he gave Atta eight necklaces and eight bracelets that Atta had asked him to buy when he was recently in Bangkok, believing that if the hijack- ers were clean shaven and well dressed, others would think them wealthy Saudis and give them less notice.150

As directed, upon returning from Spain, Binalshibh obtained two new phones, one to communicate with Atta and another to communicate with KSM and others, such as Zacarias Moussaoui. Binalshibh soon contacted KSM and, using code words, reported the results of his meeting with Atta. This important exchange occurred in mid-July.151

The conversation covered various topics. For example, Jarrah was to send Binalshibh certain personal materials from the hijackers, including copies of their

passports, which Binalshibh in turn would pass along to KSM, probably for sub- sequent use in al Qaeda propaganda.152

The most significant part of the mid-July conversation concerned Jarrah’s troubled relationship with Atta. KSM and Binalshibh both acknowledge that Jarrah chafed under Atta’s authority over him. Binalshibh believes the disagree- ment arose in part from Jarrah’s family visits. Moreover, Jarrah had been on his own for most of his time in the United States because Binalshibh’s visa diffi- culty had prevented the two of them from training together. Jarrah thus felt excluded from the decisionmaking. Binalshibh had to act as a broker between Jarrah and Atta.153

Concerned that Jarrah might withdraw from the operation at this late stage, KSM emphasized the importance of Atta and Jarrah’s resolving their differ- ences. Binalshibh claims that such concern was unwarranted, and in their mid- July discussion reassured KSM that Atta and Jarrah would reconcile and be ready to move forward in about a month, after Jarrah visited his family. Not- ing his concern and the potential for delay, KSM at one point instructed Binal- shibh to send “the skirts” to “Sally”—a coded instruction to Binalshibh to send funds to Zacarias Moussaoui.While Binalshibh admits KSM did direct him to send Moussaoui money during the mid-July conversation, he denies knowing exactly why he received this instruction—though he thought the money was being provided “within the framework” of the 9/11 operation.154

KSM may have instructed Binalshibh to send money to Moussaoui in order to help prepare Moussaoui as a potential substitute pilot for Jarrah. On July 20, 2001, Aysel Senguen, Jarrah’s girlfriend, purchased a one-way ticket for Jarrah from Miami to Dusseldorf. On Jarrah’s previous four trips from the United States to see Senguen and his family in Lebanon, he had always traveled with a round-trip ticket. When Jarrah departed Miami on July 25, Atta appears to have driven him to the airport, another unique circumstance.155

Binalshibh picked up Jarrah at the airport in Dusseldorf on July 25. Jarrah wanted to see Senguen as soon as possible, so he and Binalshibh arranged to meet a few days later.When they did, they had an emotional conversation dur- ing which Binalshibh encouraged Jarrah to see the plan through.156

While Jarrah was in Germany, Binalshibh and Moussaoui were in contact to arrange for the transfer of funds. Binalshibh received two wire transfers from Hawsawi in the UAE totaling $15,000 and, within days, relayed almost all of this money to Moussaoui in two installments.157

Moussaoui had been taking flight lessons at the Airman Flight School in Norman, Oklahoma, since February but stopped in late May.Although at that point he had only about 50 hours of flight time and no solo flights to his credit, Moussaoui began making inquiries about flight materials and simulator train- ing for Boeing 747s. On July 10, he put down a $1,500 deposit for flight sim- ulator training at Pan Am International Flight Academy in Eagan, Minnesota, and by the end of the month, he had received a simulator schedule to train from

August 13 through August 20. Moussaoui also purchased two knives and inquired of two manufacturers of GPS equipment whether their products could be converted for aeronautical use—activities that closely resembled those of the 9/11 hijackers during their final preparations for the attacks.158

On August 10, shortly after getting the money from Binalshibh, Moussaoui left Oklahoma with a friend and drove to Minnesota.Three days later, Mous- saoui paid the $6,800 balance owed for his flight simulator training at Pan Am in cash and began his training. His conduct, however, raised the suspicions of his flight instructor. It was unusual for a student with so little training to be learning to fly large jets without any intention of obtaining a pilot’s license or other goal. On August 16, once the instructor reported his suspicion to the authorities, Moussaoui was arrested by the INS on immigration charges.159

KSM denies ever considering Moussaoui for the planes operation. Instead he claims that Moussaoui was slated to participate in a “second wave” of attacks. KSM also states that Moussaoui had no contact with Atta, and we are unaware of evidence contradicting this assertion.160

Yet KSM has also stated that by the summer of 2001, he was too busy with the planes operation to continue planning for any second-wave attacks. More- over, he admits that only three potential pilots were ever recruited for the alleged second wave, Moussaoui plus two others who, by midsummer of 2001, had backed out of the plot.161 We therefore believe that the effort to push Moussaoui forward in August 2001 lends credence to the suspicion that he was being primed as a possible pilot in the immediate planes operation.

Binalshibh says he assumed Moussaoui was to take his place as another pilot in the 9/11 operation. Recounting a post-9/11 discussion with KSM in Kan- dahar, Binalshibh claims KSM mentioned Moussaoui as being part of the 9/11 operation. Although KSM never referred to Moussaoui by name, Binalshibh understood he was speaking of the operative to whom Binalshibh had wired money. Binalshibh says KSM did not approve of Moussaoui but believes KSM did not remove him from the operation only because Moussaoui had been selected and assigned by Bin Ladin himself.162

KSM did not hear about Moussaoui’s arrest until after September 11. According to Binalshibh, had Bin Ladin and KSM learned prior to 9/11 that Moussaoui had been detained, they might have canceled the operation.When Binalshibh discussed Moussaoui’s arrest with KSM after September 11, KSM congratulated himself on not having Moussaoui contact the other operatives, which would have compromised the operation. Moussaoui had been in con- tact with Binalshibh, of course, but this was not discovered until after 9/11.163 As it turned out, Moussaoui was not needed to replace Jarrah. By the time Moussaoui was arrested in mid-August, Jarrah had returned to the United States from his final trip to Germany, his disagreement with Atta apparently

resolved.The operatives began their final preparations for the attacks.164

Readying the Attacks

A week after he returned from meeting Binalshibh in Spain, Atta traveled to Newark, probably to coordinate with Hazmi and give him additional funds. Atta spent a few days in the area before returning to Florida on July 30. The month of August was busy, as revealed by a set of contemporaneous Atta- Binalshibh communications that were recovered after September 11.165

On August 3, for example, Atta and Binalshibh discussed several matters, such as the best way for the operatives to purchase plane tickets and the assign- ment of muscle hijackers to individual teams. Atta and Binalshibh also revis- ited the question of whether to target the White House.They discussed targets in coded language, pretending to be students discussing various fields of study: “architecture” referred to the World Trade Center, “arts” the Pentagon, “law” the Capitol, and “politics” the White House.166

Binalshibh reminded Atta that Bin Ladin wanted to target the White House. Atta again cautioned that this would be difficult. When Binalshibh persisted, Atta agreed to include the White House but suggested they keep the Capitol as an alternate target in case the White House proved too difficult. Atta also suggested that the attacks would not happen until after the first week in Sep- tember, when Congress reconvened.167

Atta and Binalshibh also discussed “the friend who is coming as a tourist”— a cryptic reference to candidate hijacker Mohamed al Kahtani (mentioned above), whom Hawsawi was sending the next day as “the last one” to “com- plete the group.” On August 4,Atta drove to the Orlando airport to meet Kah- tani. Upon arrival, however, Kahtani was denied entry by immigration officials because he had a one-way ticket and little money, could not speak English, and could not adequately explain what he intended to do in the United States. He was sent back to Dubai. Hawsawi contacted KSM, who told him to help Kah- tani return to Pakistan.168

On August 7,Atta flew from Fort Lauderdale to Newark, probably to coor- dinate with Hazmi.Two days later,Ahmed al Ghamdi and Abdul Aziz al Omari, who had been living in New Jersey with Hazmi and Hanjour, flew to Miami—probably signifying that the four hijacking teams had finally been assigned.While Atta was in New Jersey, he, Hazmi, and Hanjour all purchased tickets for another set of surveillance flights. Like Shehhi, Jarrah, Atta, and Waleed al Shehri before them, Hazmi and Hanjour each flew in first class on the same type of aircraft they would hijack on 9/11 (a Boeing 757), and on transcontinental flights that connected to Las Vegas. This time, however, Atta himself also flew directly to Las Vegas, where all three stayed on August 13–14. Beyond Las Vegas’s reputation for welcoming tourists, we have seen no credi- ble evidence explaining why, on this occasion and others, the operatives flew to or met in Las Vegas.169

Through August, the hijackers kept busy with their gym training and the pilots took frequent practice flights on small rented aircraft.The operatives also

began to make purchases suggesting that the planning was coming to an end. In mid-August, for example, they bought small knives that may actually have been used in the attacks. On August 22, moreover, Jarrah attempted to pur- chase four GPS units from a pilot shop in Miami. He was able to buy only one unit, which he picked up a few days later when he also purchased three aero- nautical charts.170

Perhaps most significant, however, was the purchase of plane tickets for Sep- tember 11. On August 23, Atta again flew to Newark, probably to meet with Hazmi and select flights. All 19 tickets were booked and purchased between August 25 and September 5.171

It therefore appears that the attack date was selected by the third week of August. This timing is confirmed by Binalshibh, who claims Atta called him with the date in mid-August. According to Binalshibh, Atta used a riddle to convey the date in code—a message of two branches, a slash, and a lollipop (to non-Americans, 11/9 would be interpreted as September 11). Binalshibh says he called Atta back to confirm the date before passing it to KSM.172

KSM apparently received the date from Binalshibh in a message sent through Binalshibh’s old Hamburg associate, Zakariya Essabar. Both Binalshibh and KSM claim that Essabar was not privy to the meaning of the message and had no foreknowledge of the attacks.According to Binalshibh, shortly after the date was chosen, he advised Essabar and another Hamburg associate, Said Bahaji, that if they wanted to go to Afghanistan, now was the time because it would soon become more difficult. Essabar made reservations on August 22 and departed Hamburg for Karachi on August 30; Bahaji purchased his tickets on August 20 and departed Hamburg for Karachi on September 3.173

Binalshibh also made arrangements to leave for Pakistan during early Sep- tember, before the attacks, as did Ali and Hawsawi, the plot facilitators in the UAE. During these final days, Binalshibh and Atta kept in contact by phone, email, and instant messaging.Although Atta had forbidden the hijackers to con- tact their families, he apparently placed one last call to his own father on Sep- tember 9. Atta also asked Binalshibh to contact the family of one hijacker, pass along goodbyes from others, and give regards to KSM. Jarrah alone appears to have left a written farewell—a sentimental letter to Aysel Senguen.174

Hazmi, however, may not have been so discreet. He may have telephoned his former San Diego companion, Mohdar Abdullah, in late August. Several bits of evidence indicate that others in Abdullah’s circle may have received word that something big would soon happen. As noted earlier, Abdullah’s behavior reportedly changed noticeably. Prior to September 11, both he and Yazeed al Salmi suddenly became intent on proceeding with their planned marriages. One witness quotes Salmi as commenting after the 9/11 attacks,“I knew they were going to do something, that is why I got married.” Moreover, as of August 2001, Iyad Kreiwesh and other employees at the Texaco station where Hazmi had worked suddenly were anticipating attention from law enforcement

authorities in the near future. Finally, according to an uncorroborated witness account, early on the morning of September 10, Abdullah, Osama Awadallah, Omar Bakarbashat, and others behaved suspiciously at the gas station.Accord- ing to the witness, after the group met, Awadallah said “it is finally going to happen” as the others celebrated by giving each other high fives.175

Dissent within the al Qaeda Leadership

While tactical preparations for the attack were nearing completion, the entire operation was being questioned at the top, as al Qaeda and the Taliban argued over strategy for 2001. Our focus has naturally been on the specifics of the planes operation. But from the perspective of Bin Ladin and Atef, this opera- tion was only one, admittedly key, element of their unfolding plans for the year. Living in Afghanistan, interacting constantly with the Taliban, the al Qaeda leaders would never lose sight of the situation in that country.

Bin Ladin’s consistent priority was to launch a major attack directly against the United States. He wanted the planes operation to proceed as soon as pos- sible. Mihdhar reportedly told his cousin during the summer of 2001 that Bin Ladin was reputed to have remarked,“I will make it happen even if I do it by myself.”176

According to KSM, Bin Ladin had been urging him to advance the date of the attacks. In 2000, for instance, KSM remembers Bin Ladin pushing him to launch the attacks amid the controversy after then-Israeli opposition party leader Ariel Sharon’s visit to the Temple Mount in Jerusalem. KSM claims Bin Ladin told him it would be enough for the hijackers simply to down planes rather than crash them into specific targets. KSM says he resisted the pressure.177 KSM claims to have faced similar pressure twice more in 2001. According

to him, Bin Ladin wanted the operation carried out on May 12, 2001, seven months to the day after the Cole bombing. KSM adds that the 9/11 attacks had originally been envisioned for May 2001. The second time he was urged to launch the attacks early was in June or July 2001, supposedly after Bin Ladin learned from the media that Sharon would be visiting the White House. On both occasions KSM resisted, asserting that the hijacking teams were not ready. Bin Ladin pressed particularly strongly for the latter date in two letters stress- ing the need to attack early.The second letter reportedly was delivered by Bin Ladin’s son-in-law, Aws al Madani.178

Other evidence corroborates KSM’s account. For instance, Mihdhar told his cousin that the attacks were to happen in May, but were postponed twice, first to July, then to September. Moreover, one candidate hijacker remembers a general warning being issued in the al Qaeda camps in July or early August, just like the warnings issued two weeks before the Cole bombing and ten days before the eventual 9/11 attacks. During the midsummer alert, al Qaeda members dispersed with their families, security was increased, and Bin Ladin disappeared for about 30 days, until the alert was canceled.179

While the details of the operation were strictly compartmented, by the time

of the alert, word had begun to spread that an attack against the United States was coming. KSM notes that it was generally well known by the summer of 2001 that he was planning some kind of operation against the United States. Many were even aware that he had been preparing operatives to go to the United States, leading some to conclude that al Qaeda was planning a near- term attack on U.S. soil. Moreover, Bin Ladin had made several remarks that summer hinting at an upcoming attack and generating rumors throughout the worldwide jihadist community. Bin Ladin routinely told important visitors to expect significant attacks against U.S. interests soon and, during a speech at the al Faruq camp, exhorted trainees to pray for the success of an attack involving 20 martyrs. Others have confirmed hearing indications of an impending attack and have verified that such news, albeit without specific details, had spread across al Qaeda.180

Although Bin Ladin’s top priority apparently was to attack the United States, others had a different view.The Taliban leaders put their main empha- sis on the year’s military offensive against the Northern Alliance, an offensive that ordinarily would begin in the late spring or summer.They certainly hoped that this year’s offensive would finally finish off their old enemies, driving them from Afghanistan. From the Taliban’s perspective, an attack against the United States might be counterproductive. It might draw the Americans into the war against them, just when final victory seemed within their grasp.181

There is evidence that Mullah Omar initially opposed a major al Qaeda operation directly against the United States in 2001. Furthermore, by July, with word spreading of a coming attack, a schism emerged among the senior lead- ership of al Qaeda. Several senior members reportedly agreed with Mullah Omar. Those who reportedly sided with Bin Ladin included Atef, Sulayman Abu Ghayth, and KSM. But those said to have opposed him were weighty fig- ures in the organization—including Abu Hafs the Mauritanian, Sheikh Saeed al Masri, and Sayf al Adl. One senior al Qaeda operative claims to recall Bin Ladin arguing that attacks against the United States needed to be carried out immediately to support insurgency in the Israeli-occupied territories and protest the presence of U.S. forces in Saudi Arabia. Beyond these rhetorical appeals, Bin Ladin also reportedly thought an attack against the United States would benefit al Qaeda by attracting more suicide operatives, eliciting greater donations, and increasing the number of sympathizers willing to provide logis- tical assistance.182

Mullah Omar is reported to have opposed this course of action for ideo- logical reasons rather than out of fear of U.S. retaliation. He is said to have pre- ferred for al Qaeda to attack Jews, not necessarily the United States. KSM contends that Omar faced pressure from the Pakistani government to keep al Qaeda from engaging in operations outside Afghanistan. Al Qaeda’s chief financial manager, Sheikh Saeed, argued that al Qaeda should defer to the Tali- ban’s wishes. Another source says that Sheikh Saeed opposed the operation, both out of deference to Omar and because he feared the U.S. response to an

attack. Abu Hafs the Mauritanian reportedly even wrote Bin Ladin a message basing opposition to the attacks on the Qur’an.183

According to KSM, in late August, when the operation was fully planned, Bin Ladin formally notified the al Qaeda Shura Council that a major attack against the United States would take place in the coming weeks.When some council members objected, Bin Ladin countered that Mullah Omar lacked authority to prevent al Qaeda from conducting jihad outside Afghanistan. Though most of the Shura Council reportedly disagreed, Bin Ladin persisted. The attacks went forward.184

The story of dissension within al Qaeda regarding the 9/11 attacks is prob- ably incomplete.The information on which the account is based comes from sources who were not privy to the full scope of al Qaeda and Taliban planning. Bin Ladin and Atef, however, probably would have known, at least, that

  • The general Taliban offensive against the Northern Alliance would rely on al Qaeda military support.
  • Another significant al Qaeda operation was making progress during the summer—a plot to assassinate the Northern Alliance leader, Ahmed Shah Massoud. The operatives, disguised as journalists, were in Massoud’s camp and prepared to kill him sometime in August.Their appointment to see him was delayed.185

But on September 9, the Massoud assassination took place.The delayed Tal- iban offensive against the Northern Alliance was apparently coordinated to begin as soon as he was killed, and it got under way on September 10.186

As they deliberated earlier in the year, Bin Ladin and Atef would likely have remembered that Mullah Omar was dependent on them for the Massoud assas- sination and for vital support in the Taliban military operations. KSM remem- bers Atef telling him that al Qaeda had an agreement with the Taliban to eliminate Massoud, after which the Taliban would begin an offensive to take over Afghanistan. Atef hoped Massoud’s death would also appease the Taliban when the 9/11 attacks happened. There are also some scant indications that Omar may have been reconciled to the 9/11 attacks by the time they occurred.187

Moving to Departure Positions

In the days just before 9/11, the hijackers returned leftover funds to al Qaeda and assembled in their departure cities.They sent the excess funds by wire trans- fer to Hawsawi in the UAE, about $26,000 altogether.188

The hijackers targeting American Airlines Flight 77, to depart from Dulles, migrated from New Jersey to Laurel, Maryland, about 20 miles from Washing- ton, D.C.They stayed in a motel during the first week in September and spent

time working out at a gym. On the final night before the attacks, they lodged at a hotel in Herndon,Virginia, close to the airport.189

Further north, the hijackers targeting United Airlines Flight 93, to depart from Newark, gathered in that city from their base in Florida on September 7. Just after midnight on September 8–9, Jarrah received a speeding ticket in Mary- land as he headed north on I-95. He joined the rest of his team at their hotel.190 Atta was still busy coordinating the teams. On September 7, he flew from Fort Lauderdale to Baltimore, presumably to meet with the Flight 77 team in Laurel. On September 9, he flew from Baltimore to Boston. By then, Shehhi had arrived there, and Atta was seen with him at his hotel.The next day, Atta picked up Omari at another hotel, and the two drove to Portland, Maine, for reasons that remain unknown. In the early morning hours of September 11, they boarded a commuter flight to Boston to connect to American Airlines Flight 11. The two spent their last night pursuing ordinary activities: making ATM withdrawals, eating pizza, and shopping at a convenience store. Their three fellow hijackers for Flight 11 stayed together in a hotel in Newton, Mass-

achusetts, just outside of Boston.191

Shehhi and his team targeting United Airlines Flight 175 from Logan Air- port spent their last hours at two Boston hotels.192 The plan that started with a proposal by KSM in 1996 had evolved to overcome numerous obstacles. Now 19 men waited in nondescript hotel rooms to board four flights the next morning.

8

“THE SYSTEM WAS BLINKING RED”

8.1 THE SUMMER OF THREAT

As 2001 began, counterterrorism officials were receiving frequent but fragmen- tary reports about threats. Indeed, there appeared to be possible threats almost everywhere the United States had interests—including at home.

To understand how the escalation in threat reporting was handled in the summer of 2001, it is useful to understand how threat information in general is collected and conveyed. Information is collected through several methods, including signals intelligence and interviews of human sources, and gathered into intelligence reports. Depending on the source and nature of the report- ing, these reports may be highly classified—and therefore tightly held—or less sensitive and widely disseminated to state and local law enforcement agencies. Threat reporting must be disseminated, either through individual reports or through threat advisories. Such advisories, intended to alert their recipients, may address a specific threat or be a general warning.

Because the amount of reporting is so voluminous, only a select fraction can be chosen for briefing the president and senior officials. During 2001, Direc- tor of Central Intelligence George Tenet was briefed regularly regarding threats and other operational information relating to Usama Bin Ladin.1 He in turn met daily with President Bush, who was briefed by the CIA through what is known as the President’s Daily Brief (PDB). Each PDB consists of a series of six to eight relatively short articles or briefs covering a broad array of topics; CIA staff decides which subjects are the most important on any given day. There were more than 40 intelligence articles in the PDBs from January 20 to September 10, 2001, that related to Bin Ladin. The PDB is considered highly sensitive and is distributed to only a handful of high-level officials.2

The Senior Executive Intelligence Brief (SEIB), distributed to a broader group of officials, has a similar format and generally covers the same subjects as the PDB. It usually contains less information so as to protect sources and

254

methods. Like their predecessors, the Attorney General, the FBI Director, and Richard Clarke, the National Security Council (NSC) counterterrorism coor- dinator, all received the SEIB, not the PDB.3 Clarke and his staff had extensive access to terrorism reporting, but they did not have access to internal, nondis- seminated information at the National Security Agency (NSA), CIA, or FBI.

The Drumbeat Begins

In the spring of 2001, the level of reporting on terrorist threats and planned attacks increased dramatically to its highest level since the millennium alert.At the end of March, the intelligence community disseminated a terrorist threat advisory, indicating a heightened threat of Sunni extremist terrorist attacks against U.S. facilities, personnel, and other interests.4

On March 23, in connection with discussions about possibly reopening Pennsylvania Avenue in front of the White House, Clarke warned National Security Advisor Condoleezza Rice that domestic or foreign terrorists might use a truck bomb—their “weapon of choice”—on Pennsylvania Avenue.That would result, he said, in the destruction of the West Wing and parts of the res- idence.5 He also told her that he thought there were terrorist cells within the United States, including al Qaeda.

The next week, Rice was briefed on the activities of Abu Zubaydah and on CIA efforts to locate him.As pointed out in chapter 6,Abu Zubaydah had been a major figure in the millennium plots. Over the next few weeks, the CIA repeat- edly issued warnings—including calls from DCI Tenet to Clarke—that Abu Zubaydah was planning an operation in the near future. One report cited a source indicating that Abu Zubaydah was planning an attack in a country that CIA ana- lysts thought might be Israel, or perhaps Saudi Arabia or India. Clarke relayed these reports to Rice.6

In response to these threats, the FBI sent a message to all its field offices on April 13, summarizing reporting to date. It asked the offices to task all resources, including human sources and electronic databases, for any informa- tion pertaining to “current operational activities relating to Sunni extremism.” It did not suggest that there was a domestic threat.7

The interagency Counterterrorism Security Group (CSG) that Clarke chaired discussed the Abu Zubaydah reports on April 19.The next day, a brief- ing to top officials reported “Bin Ladin planning multiple operations.” When the deputies discussed al Qaeda policy on April 30, they began with a briefing on the threat.8

In May 2001, the drumbeat of reporting grew louder with reports to top officials that “Bin Ladin public profile may presage attack” and “Bin Ladin net- work’s plans advancing.” In early May, a walk-in to the FBI claimed there was a plan to launch attacks on London, Boston, and New York. Attorney General John Ashcroft was briefed by the CIA on May 15 regarding al Qaeda gener- ally and the current threat reporting specifically. The next day brought a report

that a phone call to a U.S. embassy had warned that Bin Ladin supporters were planning an attack in the United States using “high explosives.” On May 17, based on the previous day’s report, the first item on the CSG’s agenda was “UBL: Operation Planned in U.S.”9 The anonymous caller’s tip could not be corroborated.

Late May brought reports of a possible hostage plot against Americans abroad to force the release of prisoners, including Sheikh Omar Abdel Rahman, the “Blind Sheikh,” who was serving a life sentence for his role in the 1993 plot to blow up sites in New York City. The reporting noted that operatives might opt to hijack an aircraft or storm a U.S. embassy. This report led to a Federal Avia- tion Administration (FAA) information circular to airlines noting the potential for “an airline hijacking to free terrorists incarcerated in the United States.” Other reporting mentioned that Abu Zubaydah was planning an attack, possi- bly against Israel, and expected to carry out several more if things went well. On May 24 alone, counterterrorism officials grappled with reports alleging plots inYemen and Italy, as well as a report about a cell in Canada that an anonymous caller had claimed might be planning an attack against the United States.10

Reports similar to many of these were made available to President Bush in morning intelligence briefings with DCI Tenet, usually attended by Vice Pres- ident Dick Cheney and National Security Advisor Rice.While these briefings discussed general threats to attack America and American interests, the specific threats mentioned in these briefings were all overseas.

On May 29, Clarke suggested that Rice ask DCI Tenet what more the United States could do to stop Abu Zubaydah from launching “a series of major terrorist attacks,” probably on Israeli targets, but possibly on U.S. facilities. Clarke wrote to Rice and her deputy, Stephen Hadley, “When these attacks occur, as they likely will, we will wonder what more we could have done to stop them.” In May, CIA Counterterrorist Center (CTC) Chief Cofer Black told Rice that the current threat level was a 7 on a scale of 1 to 10, as com- pared to an 8 during the millennium.11

High Probability of Near-Term “Spectacular” Attacks

Threat reports surged in June and July, reaching an even higher peak of urgency. The summer threats seemed to be focused on Saudi Arabia, Israel, Bahrain, Kuwait, Yemen, and possibly Rome, but the danger could be anywhere— including a possible attack on the G-8 summit in Genoa.A June 12 CIA report passing along biographical background information on several terrorists men- tioned, in commenting on Khalid Sheikh Mohammed, that he was recruiting people to travel to the United States to meet with colleagues already there so that they might conduct terrorist attacks on Bin Ladin’s behalf. On June 22, the CIA notified all its station chiefs about intelligence suggesting a possible al Qaeda suicide attack on a U.S. target over the next few days. DCI Tenet asked that all U.S. ambassadors be briefed.12

That same day, the State Department notified all embassies of the terrorist threat and updated its worldwide public warning. In June, the State Depart- ment initiated the Visa Express program in Saudi Arabia as a security measure, in order to keep long lines of foreigners away from vulnerable embassy spaces. The program permitted visa applications to be made through travel agencies, instead of directly at the embassy or consulate.13

A terrorist threat advisory distributed in late June indicated a high proba- bility of near-term “spectacular” terrorist attacks resulting in numerous casu- alties. Other reports’ titles warned,“Bin Ladin Attacks May be Imminent” and “Bin Ladin and Associates Making Near-Term Threats.” The latter reported multiple attacks planned over the coming days, including a “severe blow” against U.S. and Israeli “interests” during the next two weeks.14

On June 21, near the height of the threat reporting, U.S. Central Command raised the force protection condition level for U.S. troops in six countries to the highest possible level, Delta.The U.S. Fifth Fleet moved out of its port in Bahrain, and a U.S. Marine Corps exercise in Jordan was halted. U.S. embassies in the Persian Gulf conducted an emergency security review, and the embassy in Yemen was closed.The CSG had foreign emergency response teams, known as FESTs, ready to move on four hours’ notice and kept up the terrorism alert posture on a “rolling 24 hour basis.”15

On June 25, Clarke warned Rice and Hadley that six separate intelligence reports showed al Qaeda personnel warning of a pending attack.An Arabic tel- evision station reported Bin Ladin’s pleasure with al Qaeda leaders who were saying that the next weeks “will witness important surprises” and that U.S. and Israeli interests will be targeted. Al Qaeda also released a new recruitment and fund-raising tape. Clarke wrote that this was all too sophisticated to be merely a psychological operation to keep the United States on edge, and the CIA agreed.The intelligence reporting consistently described the upcoming attacks as occurring on a calamitous level, indicating that they would cause the world to be in turmoil and that they would consist of possible multiple—but not nec- essarily simultaneous—attacks.16

On June 28, Clarke wrote Rice that the pattern of al Qaeda activity indi- cating attack planning over the past six weeks “had reached a crescendo.” “A series of new reports continue to convince me and analysts at State, CIA, DIA [Defense Intelligence Agency], and NSA that a major terrorist attack or series of attacks is likely in July,” he noted. One al Qaeda intelligence report warned that something “very, very, very, very” big was about to happen, and most of Bin Ladin’s network was reportedly anticipating the attack. In late June, the CIA ordered all its station chiefs to share information on al Qaeda with their host governments and to push for immediate disruptions of cells.17

The headline of a June 30 briefing to top officials was stark:“Bin Ladin Plan- ning High-Profile Attacks.” The report stated that Bin Ladin operatives expected near-term attacks to have dramatic consequences of catastrophic pro-

portions.That same day, Saudi Arabia declared its highest level of terror alert. Despite evidence of delays possibly caused by heightened U.S. security, the planning for attacks was continuing.18

On July 2, the FBI Counterterrorism Division sent a message to federal agencies and state and local law enforcement agencies summarizing informa- tion regarding threats from Bin Ladin. It warned that there was an increased volume of threat reporting, indicating a potential for attacks against U.S. tar- gets abroad from groups “aligned with or sympathetic to Usama Bin Ladin.” Despite the general warnings, the message further stated, “The FBI has no information indicating a credible threat of terrorist attack in the United States.” However, it went on to emphasize that the possibility of attack in the United States could not be discounted. It also noted that the July 4 holiday might heighten the threats.The report asked recipients to “exercise extreme vigilance” and “report suspicious activities” to the FBI. It did not suggest specific actions that they should take to prevent attacks.19

Disruption operations against al Qaeda–affiliated cells were launched involving 20 countries. Several terrorist operatives were detained by foreign governments, possibly disrupting operations in the Gulf and Italy and perhaps averting attacks against two or three U.S. embassies. Clarke and others told us of a particular concern about possible attacks on the Fourth of July. After it passed uneventfully, the CSG decided to maintain the alert.20

To enlist more international help,Vice President Cheney contacted Saudi Crown Prince Abdullah on July 5. Hadley apparently called European coun- terparts, while Clarke worked with senior officials in the Gulf. In late July, because of threats, Italy closed the airspace over Genoa and mounted antiair- craft batteries at the Genoa airport during the G-8 summit, which President Bush attended.21

At home, the CSG arranged for the CIA to brief intelligence and security officials from several domestic agencies. On July 5, representatives from the Immigration and Naturalization Service (INS), the FAA, the Coast Guard, the Secret Service, Customs, the CIA, and the FBI met with Clarke to discuss the current threat. Attendees report that they were told not to disseminate the threat information they received at the meeting. They interpreted this direc- tion to mean that although they could brief their superiors, they could not send out advisories to the field.An NSC official recalls a somewhat different empha- sis, saying that attendees were asked to take the information back to their home agencies and “do what you can” with it, subject to classification and distribu- tion restrictions. A representative from the INS asked for a summary of the information that she could share with field offices. She never received one.22

That same day, the CIA briefed Attorney General Ashcroft on the al Qaeda threat, warning that a significant terrorist attack was imminent. Ashcroft was told that preparations for multiple attacks were in late stages or already com-

plete and that little additional warning could be expected. The briefing addressed only threats outside the United States.23

The next day, the CIA representative told the CSG that al Qaeda members believed the upcoming attack would be “spectacular,” qualitatively different from anything they had done to date.24

Apparently as a result of the July 5 meeting with Clarke, the interagency committee on federal building security was tasked to examine security meas- ures. This committee met on July 9, when 37 officials from 27 agencies and organizations were briefed on the “current threat level” in the United States. They were told that not only the threat reports from abroad but also the recent convictions in the East Africa bombings trial, the conviction of Ahmed Ressam, and the just-returned Khobar Towers indictments reinforced the need to “exercise extreme vigilance.” Attendees were expected to determine whether their respective agencies needed enhanced security measures.25

On July 18, 2001, the State Department provided a warning to the public regarding possible terrorist attacks in the Arabian Peninsula.26

Acting FBI Director Thomas Pickard told us he had one of his periodic con- ference calls with all special agents in charge on July 19. He said one of the items he mentioned was the need, in light of increased threat reporting, to have evidence response teams ready to move at a moment’s notice, in case of an attack.27 He did not task field offices to try to determine whether any plots were being considered within the United States or to take any action to dis- rupt any such plots.

In mid-July, reporting started to indicate that Bin Ladin’s plans had been delayed, maybe for as long as two months, but not abandoned. On July 23, the lead item for CSG discussion was still the al Qaeda threat, and it included men- tion of suspected terrorist travel to the United States.28

On July 31, an FAA circular appeared alerting the aviation community to “reports of possible near-term terrorist operations . . . particularly on the Ara- bian Peninsula and/or Israel.” It stated that the FAA had no credible evidence of specific plans to attack U.S. civil aviation, though it noted that some of the “currently active” terrorist groups were known to “plan and train for hijack- ings” and were able to build and conceal sophisticated explosive devices in lug- gage and consumer products.29

Tenet told us that in his world “the system was blinking red.” By late July, Tenet said, it could not “get any worse.”30 Not everyone was convinced. Some asked whether all these threats might just be deception. On June 30, the SEIB contained an article titled “Bin Ladin Threats Are Real.” Yet Hadley told Tenet in July that Deputy Secretary of Defense Paul Wolfowitz questioned the report- ing. Perhaps Bin Ladin was trying to study U.S. reactions.Tenet replied that he had already addressed the Defense Department’s questions on this point; the reporting was convincing.To give a sense of his anxiety at the time, one senior

official in the Counterterrorist Center told us that he and a colleague were con- sidering resigning in order to go public with their concerns.31

The Calm Before the Storm

On July 27, Clarke informed Rice and Hadley that the spike in intelligence about a near-term al Qaeda attack had stopped. He urged keeping readiness high during the August vacation period, warning that another report suggested an attack had just been postponed for a few months “but will still happen.”32 On August 1, the FBI issued an advisory that in light of the increased vol- ume of threat reporting and the upcoming anniversary of the East Africa embassy bombings, increased attention should be paid to security planning. It noted that although most of the reporting indicated a potential for attacks on

U.S. interests abroad, the possibility of an attack in the United States could not be discounted.33

On August 3, the intelligence community issued an advisory concluding that the threat of impending al Qaeda attacks would likely continue indefi- nitely. Citing threats in the Arabian Peninsula, Jordan, Israel, and Europe, the advisory suggested that al Qaeda was lying in wait and searching for gaps in security before moving forward with the planned attacks.34

During the spring and summer of 2001, President Bush had on several occa- sions asked his briefers whether any of the threats pointed to the United States. Reflecting on these questions, the CIA decided to write a briefing article sum- marizing its understanding of this danger. Two CIA analysts involved in prepar- ing this briefing article believed it represented an opportunity to communicate their view that the threat of a Bin Ladin attack in the United States remained both current and serious.35 The result was an article in the August 6 Presiden- tial Daily Brief titled “Bin Ladin Determined to Strike in US.” It was the 36th PDB item briefed so far that year that related to Bin Ladin or al Qaeda, and the first devoted to the possibility of an attack in the United States.

The President told us the August 6 report was historical in nature. President Bush said the article told him that al Qaeda was dangerous, which he said he had known since he had become President. The President said Bin Ladin had long been talking about his desire to attack America. He recalled some oper- ational data on the FBI, and remembered thinking it was heartening that 70 investigations were under way.As best he could recollect, Rice had mentioned that the Yemenis’ surveillance of a federal building in New York had been looked into in May and June, but there was no actionable intelligence.

He did not recall discussing the August 6 report with the Attorney General or whether Rice had done so. He said that if his advisers had told him there was a cell in the United States, they would have moved to take care of it. That never happened.36

Although the following day’s SEIB repeated the title of this PDB, it did not contain the reference to hijackings, the alert in New York, the alleged casing

The following is the text of an item from the Presidential Daily Brief received by President George W. Bush on August 6, 2001.37 Redacted material is indicated by brackets.

Bin Ladin Determined To Strike in US

Clandestine, foreign government, and media reports indicate Bin Ladin since 1997 has wanted to conduct terrorist attacks in the US. Bin Ladin implied in US television interviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber RamziYousef and “bring the fighting to America.”

After US missile strikes on his base in Afghanistan in 1998, Bin Ladin told followers he wanted to retaliate in Washington, accord- ing to a [] service.

An Egyptian Islamic Jihad (EIJ) operative told an [] service at the same time that Bin Ladin was planning to exploit the oper- ative’s access to the US to mount a terrorist strike.

The millennium plotting in Canada in 1999 may have been part of Bin Ladin’s first serious attempt to implement a terrorist strike in the US. Convicted plotter Ahmed Ressam has told the FBI that he conceived the idea to attack Los Angeles International Airport himself, but that Bin Ladin lieutenant Abu Zubaydah encouraged him and helped facilitate the operation. Ressam also said that in 1998 Abu Zubaydah was plan- ning his own US attack.

Ressam says Bin Ladin was aware of the Los Angeles operation.

Although Bin Ladin has not succeeded, his attacks against the US Embassies in Kenya and Tanzania in 1998 demonstrate that he prepares operations years in advance and is not deterred by setbacks. Bin Ladin associates surveilled our Embassies in Nairobi and Dar es Salaam as early as 1993, and some members of the Nairobi cell planning the bombings were arrested and deported in 1997.

Al-Qa’ida members—including some who are US citizens—have resided in or traveled to the US for years, and the group apparently maintains a support structure that could aid attacks. Two al-Qua’ da members found

guilty in the conspiracy to bomb our embassies in East Africa were US citizens, and a senior EIJ member lived in California in the mid-1990s.

A clandestine source said in 1998 that a Bin Ladin cell in NewYork was recruiting Muslim-American youth for attacks.

We have not been able to corroborate some of the more sensational threat reporting, such as that from a [] service in 1998 saying that Bin Ladin wanted to hijack a US aircraft to gain the release of “Blind Shaykh” ‘Umar ‘Abd al-Rahman and other US-held extremists.

Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks, including recent surveillance of federal buildings in New York.

The FBI is conducting approximately 70 full field investigations throughout the US that it considers Bin Ladin-related. CIA and the FBI are investigating a call to our Embassy in the UAE in May saying that a group of Bin Ladin supporters was in the US plan- ning attacks with explosives.

of buildings in New York, the threat phoned in to the embassy, or the fact that the FBI had approximately 70 ongoing bin Ladin–related investigations.38 No CSG or other NSC meeting was held to discuss the possible threat of a strike in the United States as a result of this report.

Late in the month, a foreign service reported that Abu Zubaydah was con- sidering mounting terrorist attacks in the United States, after postponing pos- sible operations in Europe. No targets, timing, or method of attack were provided.39

We have found no indication of any further discussion before September 11 among the President and his top advisers of the possibility of a threat of an al Qaeda attack in the United States. DCI Tenet visited President Bush in Crawford,Texas, on August 17 and participated in PDB briefings of the Pres- ident between August 31 (after the President had returned to Washington) and September 10. But Tenet does not recall any discussions with the President of the domestic threat during this period.40

Most of the intelligence community recognized in the summer of 2001 that the number and severity of threat reports were unprecedented. Many officials told us that they knew something terrible was planned, and they were desper- ate to stop it. Despite their large number, the threats received contained few

specifics regarding time, place, method, or target. Most suggested that attacks were planned against targets overseas; others indicated threats against unspeci- fied “U.S. interests.” We cannot say for certain whether these reports, as dra- matic as they were, related to the 9/11 attacks.

Government Response to the Threats

National Security Advisor Rice told us that the CSG was the “nerve center” for running the crisis, although other senior officials were involved over the course of the summer. In addition to his daily meetings with President Bush, and weekly meetings to go over other issues with Rice,Tenet was speaking reg- ularly with Secretary of State Colin Powell and Secretary of Defense Donald Rumsfeld. The foreign policy principals routinely talked on the telephone every day on a variety of topics.41

Hadley told us that before 9/11, he and Rice did not feel they had the job of coordinating domestic agencies. They felt that Clarke and the CSG (part of the NSC) were the NSC’s bridge between foreign and domestic threats.42

There was a clear disparity in the levels of response to foreign versus domes- tic threats. Numerous actions were taken overseas to disrupt possible attacks— enlisting foreign partners to upset terrorist plans, closing embassies, moving military assets out of the way of possible harm. Far less was done domestically— in part, surely, because to the extent that specifics did exist, they pertained to threats overseas.As noted earlier, a threat against the embassy in Yemen quickly resulted in its closing. Possible domestic threats were more vague.When reports did not specify where the attacks were to take place, officials presumed that they would again be overseas, though they did not rule out a target in the United States. Each of the FBI threat advisories made this point.43

Clarke mentioned to National Security Advisor Rice at least twice that al Qaeda sleeper cells were likely in the United States. In January 2001, Clarke forwarded a strategy paper to Rice warning that al Qaeda had a presence in the United States. He noted that two key al Qaeda members in the Jordanian cell involved in the millennium plot were naturalized U.S. citizens and that one jihadist suspected in the East Africa bombings had “informed the FBI that an extensive network of al Qida ‘sleeper agents’ currently exists in the US.” He added that Ressam’s abortive December 1999 attack revealed al Qaeda sup- porters in the United States.44 His analysis, however, was based not on new threat reporting but on past experience.

The September 11 attacks fell into the void between the foreign and domes- tic threats. The foreign intelligence agencies were watching overseas, alert to foreign threats to U.S. interests there.The domestic agencies were waiting for evidence of a domestic threat from sleeper cells within the United States. No one was looking for a foreign threat to domestic targets. The threat that was coming was not from sleeper cells. It was foreign—but from foreigners who had infiltrated into the United States.

A second cause of this disparity in response is that domestic agencies did not know what to do, and no one gave them direction. Cressey told us that the CSG did not tell the agencies how to respond to the threats. He noted that the agencies that were operating overseas did not need direction on how to respond; they had experience with such threats and had a “playbook.” In con- trast, the domestic agencies did not have a game plan. Neither the NSC (includ- ing the CSG) nor anyone else instructed them to create one.45

This lack of direction was evident in the July 5 meeting with representa- tives from the domestic agencies.The briefing focused on overseas threats.The domestic agencies were not questioned about how they planned to address the threat and were not told what was expected of them. Indeed, as noted earlier, they were specifically told they could not issue advisories based on the brief- ing.46 The domestic agencies’ limited response indicates that they did not per- ceive a call to action.

Clarke reflected a different perspective in an email to Rice on September 15, 2001. He summarized the steps taken by the CSG to alert domestic agen- cies to the possibility of an attack in the United States. Clarke concluded that domestic agencies, including the FAA, knew that the CSG believed a major al Qaeda attack was coming and could be in the United States.

Although the FAA had authority to issue security directives mandating new security procedures, none of the few that were released during the summer of 2001 increased security at checkpoints or on board aircraft. The information circulars mostly urged air carriers to “exercise prudence” and be alert. Prior to 9/11, the FAA did present a CD-ROM to air carriers and airport authorities describing the increased threat to civil aviation. The presentation mentioned the possibility of suicide hijackings but said that “fortunately, we have no indi- cation that any group is currently thinking in that direction.”47 The FAA con- ducted 27 special security briefings for specific air carriers between May 1, 2001, and September 11, 2001.Two of these briefings discussed the hijacking threat overseas. None discussed the possibility of suicide hijackings or the use of aircraft as weapons. No new security measures were instituted.48

Rice told us she understood that the FBI had tasked its 56 U.S. field offices to increase surveillance of suspected terrorists and to reach out to informants who might have information about terrorist plots. An NSC staff document at the time describes such a tasking as having occurred in late June but does not indicate whether it was generated by the NSC or the FBI. Other than the pre- viously described April 13 communication sent to all FBI field offices, how- ever, the FBI could not find any record of having received such a directive.The April 13 document asking field offices to gather information on Sunni extremism did not mention any possible threat within the United States and did not order surveillance of suspected operatives. The NSC did not specify what the FBI’s directives should contain and did not review what had been issued earlier.49

Acting FBI Director Pickard told us that in addition to his July 19 confer- ence call, he mentioned the heightened terrorist threat in individual calls with the special agents in charge of field offices during their annual performance review discussions. In speaking with agents around the country, we found lit- tle evidence that any such concerns had reached FBI personnel beyond the New York Field Office.50

The head of counterterrorism at the FBI, Dale Watson, said he had many discussions about possible attacks with Cofer Black at the CIA. They had expected an attack on July 4. Watson said he felt deeply that something was going to happen. But he told us the threat information was “nebulous.” He wished he had known more. He wished he had had “500 analysts looking at Usama Bin Ladin threat information instead of two.”51

Attorney General Ashcroft was briefed by the CIA in May and by Pickard in early July about the danger. Pickard said he met with Ashcroft once a week in late June, through July, and twice in August. There is a dispute regarding Ashcroft’s interest in Pickard’s briefings about the terrorist threat situation. Pickard told us that after two such briefings Ashcroft told him that he did not want to hear about the threats anymore. Ashcroft denies Pickard’s charge. Pickard says he continued to present terrorism information during further briefings that summer, but nothing further on the “chatter” the U.S. govern- ment was receiving.52

The Attorney General told us he asked Pickard whether there was intelli- gence about attacks in the United States and that Pickard said no. Pickard said he replied that he could not assure Ashcroft that there would be no attacks in the United States, although the reports of threats were related to overseas tar- gets. Ashcroft said he therefore assumed the FBI was doing what it needed to do. He acknowledged that in retrospect, this was a dangerous assumption. He did not ask the FBI what it was doing in response to the threats and did not task it to take any specific action. He also did not direct the INS, then still part of the Department of Justice, to take any specific action.53

In sum, the domestic agencies never mobilized in response to the threat. They did not have direction, and did not have a plan to institute.The borders were not hardened.Transportation systems were not fortified. Electronic sur- veillance was not targeted against a domestic threat.54 State and local law enforcement were not marshaled to augment the FBI’s efforts.The public was not warned.

The terrorists exploited deep institutional failings within our government. The question is whether extra vigilance might have turned up an opportu- nity to disrupt the plot. As seen in chapter 7, al Qaeda’s operatives made mis- takes. At least two such mistakes created opportunities during 2001, especially in late August.

8.2 LATE LEADS—MIHDHAR, MOUSSAOUI, AND KSM

In chapter 6 we discussed how intelligence agencies successfully detected some of the early travel in the planes operation, picking up the movements of Khalid al Mihdhar and identifying him, and seeing his travel converge with someone they perhaps could have identified but did not—Nawaf al Hazmi—as well as with less easily identifiable people such as Khallad and Abu Bara.These observations occurred in December 1999 and January 2000.The trail had been lost in Janu- ary 2000 without a clear realization that it had been lost, and without much effort to pick it up again. Nor had the CIA placed Mihdhar on the State Department’s watchlist for suspected terrorists, so that either an embassy or a port of entry might take note if Mihdhar showed up again.

On four occasions in 2001, the CIA, the FBI, or both had apparent oppor- tunities to refocus on the significance of Hazmi and Mihdhar and reinvigorate the search for them. After reviewing those episodes we will turn to the han- dling of the Moussaoui case and some late leads regarding Khalid Sheikh Mohammed.

January 2001: Identification of Khallad

Almost one year after the original trail had been lost in Bangkok, the FBI and the CIA were working on the investigation of the Cole bombing.They learned of the link between a captured conspirator and a person called “Khallad.”They also learned that Khallad was a senior security official for Bin Ladin who had helped direct the bombing (we introduced Khallad in chapter 5, and returned to his role in the Cole bombing in chapter 6).55

One of the members of the FBI’s investigative team in Yemen realized that he had heard of Khallad before, from a joint FBI/CIA source four months ear- lier.The FBI agent obtained from a foreign government a photo of the person believed to have directed the Cole bombing. It was shown to the source, and he confirmed that the man in that photograph was the same Khallad he had described.56

In December 2000, on the basis of some links associated with Khalid al Mihdhar, the CIA’s Bin Ladin unit speculated that Khallad and Khalid al Mihd- har might be one and the same.57

The CIA asked that a Kuala Lumpur surveillance photo of Mihdhar be shown to the joint source who had identified Khallad. In early January 2001, two photographs from the Kuala Lumpur meeting were shown to the source. One was a known photograph of Mihdhar, the other a photograph of a then unknown subject.The source did not recognize Mihdhar. But he indicated he was 90 percent certain that the other individual was Khallad.58

This meant that Khallad and Mihdhar were two different people. It also meant that there was a link between Khallad and Mihdhar, making Mihdhar seem even more suspicious.59 Yet we found no effort by the CIA to renew the long-abandoned search for Mihdhar or his travel companions.

In addition, we found that the CIA did not notify the FBI of this identifi- cation. DCI Tenet and Cofer Black testified before Congress’s Joint Inquiry into 9/11 that the FBI had access to this identification from the beginning. But drawing on an extensive record, including documents that were not available to the CIA personnel who drafted that testimony, we conclude this was not the case.The FBI’s primary Cole investigators had no knowledge that Khallad had been in Kuala Lumpur with Mihdhar and others until after the Septem- ber 11 attacks. Because the FBI had not been informed in January 2000 about Mihdhar’s possession of a U.S. visa, it had not then started looking for him in the United States. Because it did not know of the links between Khallad and Mihdhar, it did not start looking for him in January 2001.60

This incident is an example of how day-to-day gaps in information sharing can emerge even when there is mutual goodwill.The information was from a joint FBI/CIA source who spoke essentially no English and whose languages were not understood by the FBI agent on the scene overseas. Issues of travel and security necessarily kept short the amount of time spent with the source. As a result, the CIA officer usually did not translate either questions or answers for his FBI colleague and friend.61

For interviews without simultaneous translation, the FBI agent on the scene received copies of the reports that the CIA disseminated to other agencies regarding the interviews. But he was not given access to the CIA’s internal operational reports, which contained more detail. It was there—in reporting to which FBI investigators did not have access—that information regarding the January 2001 identification of Khallad appeared.The CIA officer does not recall this particular identification and thus cannot say why it was not shared with his FBI colleague. He might not have understood the possible significance of the new identification.62

In June 2000, Mihdhar left California and returned to Yemen. It is possible that if, in January 2001, the CIA had resumed its search for him, placed him on the State Department’s TIPOFF watchlist, or provided the FBI with the information, he might have been found—either before or at the time he applied for a new visa in June 2001, or when he returned to the United States on July 4.

Spring 2001: Looking Again at Kuala Lumpur

By mid-May 2001, as the threat reports were surging, a CIA official detailed to the International Terrorism Operations Section at the FBI wondered where the attacks might occur.We will call him “John.” Recalling the episode about the Kuala Lumpur travel of Mihdhar and his associates, “John” searched the CIA’s databases for information regarding the travel. On May 15, he and an official at the CIA reexamined many of the old cables from early 2000, includ- ing the information that Mihdhar had a U.S. visa, and that Hazmi had come to Los Angeles on January 15, 2000.63

The CIA official who reviewed the cables took no action regarding them.

“John,” however, began a lengthy exchange with a CIA analyst, whom we will call “Dave,” to figure out what these cables meant. “John” was aware of how dangerous Khallad was—at one point calling him a “major league killer.” He concluded that “something bad was definitely up.” Despite the U.S. links evi- dent in this traffic, “John” made no effort to determine whether any of these individuals was in the United States. He did not raise that possibility with his FBI counterpart. He was focused on Malaysia.64

“John” described the CIA as an agency that tended to play a “zone defense.” He was worrying solely about Southeast Asia, not the United States. In con- trast, he told us, the FBI tends to play “man-to-man.”65

Desk officers at the CIA’s Bin Ladin unit did not have “cases” in the same sense as an FBI agent who works an investigation from beginning to end.Thus, when the trail went cold after the Kuala Lumpur meeting in January 2000, the desk officer moved on to different things. By the time the March 2000 cable arrived with information that one of the travelers had flown to Los Angeles, the case officer was no longer responsible for follow-up.While several individ- uals at the Bin Ladin unit opened the cable when it arrived in March 2000, no action was taken.66

The CIA’s zone defense concentrated on “where,” not “who.” Had its infor- mation been shared with the FBI, a combination of the CIA’s zone defense and the FBI’s man-to-man approach might have been productive.

June 2001: The Meeting in New York

“John’s” review of the Kuala Lumpur meeting did set off some more shar- ing of information, getting the attention of an FBI analyst whom we will call “Jane.” “Jane” was assigned to the FBI’s Cole investigation. She knew that another terrorist involved in that operation, Fahd al Quso, had traveled to Bangkok in January 2000 to give money to Khallad.67

“Jane” and the CIA analyst, “Dave,” had been working together on Cole– related issues. Chasing Quso’s trail, “Dave” suggested showing some photo- graphs to FBI agents in NewYork who were working on the Cole case and had interviewed Quso.68

“John” gave three Kuala Lumpur surveillance pictures to “Jane” to show to the New York agents. She was told that one of the individuals in the photo- graphs was someone named Khalid al Mihdhar. She did not know why the photographs had been taken or why the Kuala Lumpur travel might be signif- icant, and she was not told that someone had identified Khallad in the photo- graphs. When “Jane” did some research in a database for intelligence reports, Intelink, she found the original NSA reports on the planning for the meeting. Because the CIA had not disseminated reports on its tracking of Mihdhar, “Jane” did not pull up any information about Mihdhar’s U.S. visa or about travel to the United States by Hazmi or Mihdhar.69

“Jane,”“Dave,” and an FBI analyst who was on detail to the CIA’s Bin Ladin

unit went to NewYork on June 11 to meet with the agents about the Cole case. “Jane” brought the surveillance pictures. At some point in the meeting she showed the photographs to the agents and asked whether they recognized Quso in any of them. The agents asked questions about the photographs— Why were they taken? Why were these people being followed? Where are the rest of the photographs?70

The only information “Jane” had about the meeting—other than the pho- tographs—were the NSA reports that she had found on Intelink. These reports, however, contained caveats that their contents could not be shared with crim- inal investigators without the permission of the Justice Department’s Office of Intelligence Policy and Review (OIPR).Therefore “Jane” concluded that she could not pass on information from those reports to the agents.This decision was potentially significant, because the signals intelligence she did not share linked Mihdhar to a suspected terrorist facility in the Middle East.The agents would have established a link to the suspected facility from their work on the embassy bombings case. This link would have made them very interested in learning more about Mihdhar.71 The sad irony is that the agents who found the source were being kept from obtaining the fruits of their own work.

“Dave,” the CIA analyst, knew more about the Kuala Lumpur meeting. He knew that Mihdhar possessed a U.S. visa, that his visa application indicated that he intended to travel to New York, that Hazmi had traveled to Los Angeles, and that a source had put Mihdhar in the company of Khallad. No one at the meeting asked him what he knew; he did not volunteer anything. He told investigators that as a CIA analyst, he was not authorized to answer FBI ques- tions regarding CIA information.“Jane” said she assumed that if “Dave” knew the answers to questions, he would have volunteered them. The New York agents left the meeting without obtaining information that might have started them looking for Mihdhar.72

Mihdhar had been a weak link in al Qaeda’s operational planning. He had left the United States in June 2000, a mistake KSM realized could endanger the entire plan—for to continue with the operation, Mihdhar would have to travel to the United States again.And unlike other operatives, Mihdhar was not “clean”: he had jihadist connections. It was just such connections that had brought him to the attention of U.S. officials.

Nevertheless, in this case KSM’s fears were not realized. Mihdhar received a new U.S. visa two days after the CIA-FBI meeting in New York. He flew to New York City on July 4. No one was looking for him.

August 2001: The Search for Mihdhar and Hazmi Begins and Fails During the summer of 2001 “John,” following a good instinct but not as part of any formal assignment, asked “Mary,” an FBI analyst detailed to the CIA’s Bin Ladin unit, to review all the Kuala Lumpur materials one more time. She had been at the New York meeting with “Jane” and “Dave” but had not

looked into the issues yet herself.“John” asked her to do the research in her free time.73

“Mary” began her work on July 24.That day, she found the cable reporting that Mihdhar had a visa to the United States.A week later, she found the cable reporting that Mihdhar’s visa application—what was later discovered to be his first application—listed New York as his destination. On August 21, she located the March 2000 cable that “noted with interest” that Hazmi had flown to Los Angeles in January 2000. She immediately grasped the significance of this information.74

“Mary” and “Jane” promptly met with an INS representative at FBI head- quarters. On August 22, the INS told them that Mihdhar had entered the United States on January 15, 2000, and again on July 4, 2001. “Jane” and “Mary” also learned that there was no record that Hazmi had left the coun- try since January 2000, and they assumed he had left with Mihdhar in June 2000. They decided that if Mihdhar was in the United States, he should be found.75

They divided up the work.“Mary” asked the Bin Ladin unit to draft a cable requesting that Mihdhar and Hazmi be put on the TIPOFF watchlist. Both Hazmi and Mihdhar were added to this watchlist on August 24.76

“Jane” took responsibility for the search effort inside the United States. As the information indicated that Mihdhar had last arrived in NewYork, she began drafting what is known as a lead for the FBI’s New York Field Office. A lead relays information from one part of the FBI to another and requests that a par- ticular action be taken. She called an agent in New York to give him a “heads- up” on the matter, but her draft lead was not sent until August 28. Her email told the New York agent that she wanted him to get started as soon as possi- ble, but she labeled the lead as “Routine”—a designation that informs the receiving office that it has 30 days to respond.77

The agent who received the lead forwarded it to his squad supervisor.That same day, the supervisor forwarded the lead to an intelligence agent to open an intelligence case—an agent who thus was behind “the wall” keeping FBI intelligence information from being shared with criminal prosecutors. He also sent it to the Cole case agents and an agent who had spent significant time in Malaysia searching for another Khalid: Khalid Sheikh Mohammad.78

The suggested goal of the investigation was to locate Mihdhar, determine his contacts and reasons for being in the United States, and possibly conduct an interview. Before sending the lead,“Jane” had discussed it with “John,” the CIA official on detail to the FBI. She had also checked with the acting head of the FBI’s Bin Ladin unit. The discussion seems to have been limited to whether the search should be classified as an intelligence investigation or as a criminal one. It appears that no one informed higher levels of management in either the FBI or CIA about the case.79 There is no evidence that the lead, or the search for these terrorist suspects, was substantively discussed at any level

above deputy chief of a section within the Counterterrorism Division at FBI headquarters.

One of the Cole case agents read the lead with interest, and contacted “Jane” to obtain more information.“Jane” argued, however, that because the agent was designated a “criminal” FBI agent, not an intelligence FBI agent, the wall kept him from participating in any search for Mihdhar. In fact, she felt he had to destroy his copy of the lead because it contained NSA information from reports that included caveats ordering that the information not be shared without OIPR’s permission. The agent asked “Jane” to get an opinion from the FBI’s National Security Law Unit (NSLU) on whether he could open a criminal case on Mihdhar.80

“Jane” sent an email to the Cole case agent explaining that according to the NSLU, the case could be opened only as an intelligence matter, and that if Mihdhar was found, only designated intelligence agents could conduct or even be present at any interview. She appears to have misunderstood the complex rules that could apply to this situation.81

The FBI agent angrily responded:

Whatever has happened to this—someday someone will die—and wall or not—the public will not understand why we were not more effective and throwing every resource we had at certain “problems.”

Let’s hope the National Security Law Unit will stand behind their decisions then, especially since the biggest threat to us now, UBL, is get- ting the most “protection.”

“Jane” replied that she was not making up the rules; she claimed that they were in the relevant manual and “ordered by the [FISA] Court and every office of the FBI is required to follow them including FBI NY.”82

It is now clear that everyone involved was confused about the rules govern- ing the sharing and use of information gathered in intelligence channels. Because Mihdhar was being sought for his possible connection to or knowl- edge of the Cole bombing, he could be investigated or tracked under the exist- ing Cole criminal case. No new criminal case was needed for the criminal agent to begin searching for Mihdhar. And as NSA had approved the passage of its information to the criminal agent, he could have conducted a search using all available information. As a result of this confusion, the criminal agents who were knowledgeable about al Qaeda and experienced with criminal investiga- tive techniques, including finding suspects and possible criminal charges, were thus excluded from the search.83

The search was assigned to one FBI agent, and it was his very first coun- terterrorism lead. Because the lead was “routine,” he was given 30 days to open an intelligence case and make some unspecified efforts to locate Mihdhar. He started the process a few days later. He checked local New York databases for

criminal record and driver’s license information and checked the hotel listed on Mihdhar’s U.S. entry form. Finally, on September 11, the agent sent a lead to Los Angeles, because Mihdhar had initially arrived in Los Angeles in Janu- ary 2000.84

We believe that if more resources had been applied and a significantly dif- ferent approach taken, Mihdhar and Hazmi might have been found.They had used their true names in the United States. Still, the investigators would have needed luck as well as skill to find them prior to September 11 even if such searches had begun as early as August 23, when the lead was first drafted.85

Many FBI witnesses have suggested that even if Mihdhar had been found, there was nothing the agents could have done except follow him onto the planes.We believe this is incorrect. Both Hazmi and Mihdhar could have been held for immigration violations or as material witnesses in the Cole bombing case. Investigation or interrogation of them, and investigation of their travel and financial activities, could have yielded evidence of connections to other par- ticipants in the 9/11 plot.The simple fact of their detention could have derailed the plan. In any case, the opportunity did not arise.

Phoenix Memo

The Phoenix memo was investigated thoroughly by the Joint Inquiry and the Department of Justice Inspector General.86 We will recap it briefly here. In July 2001, an FBI agent in the Phoenix field office sent a memo to FBI headquar- ters and to two agents on international terrorism squads in the NewYork Field Office, advising of the “possibility of a coordinated effort by Usama Bin Ladin” to send students to the United States to attend civil aviation schools.The agent based his theory on the “inordinate number of individuals of investigative inter- est” attending such schools in Arizona.87

The agent made four recommendations to FBI headquarters: to compile a list of civil aviation schools, establish liaison with those schools, discuss his the- ories about Bin Ladin with the intelligence community, and seek authority to obtain visa information on persons applying to flight schools. His recommen- dations were not acted on. His memo was forwarded to one field office. Man- agers of the Usama Bin Ladin unit and the Radical Fundamentalist unit at FBI headquarters were addressees, but they did not even see the memo until after September 11. No managers at headquarters saw the memo before September 11, and the New York Field Office took no action.88

As its author told investigators, the Phoenix memo was not an alert about suicide pilots. His worry was more about a Pan Am Flight 103 scenario in which explosives were placed on an aircraft.The memo’s references to aviation training were broad, including aeronautical engineering.89 If the memo had been distributed in a timely fashion and its recommendations acted on promptly, we do not believe it would have uncovered the plot. It might well, however, have sensitized the FBI so that it might have taken the Moussaoui matter more seri- ously the next month.

Zacarias Moussaoui

On August 15, 2001, the Minneapolis FBI Field Office initiated an intelligence investigation on Zacarias Moussaoui.As mentioned in chapter 7, he had entered the United States in February 2001, and had begun flight lessons at Airman Flight School in Norman, Oklahoma. He resumed his training at the Pan Am International Flight Academy in Eagan, Minnesota, starting on August 13. He had none of the usual qualifications for flight training on Pan Am’s Boeing 747 flight simulators. He said he did not intend to become a commercial pilot but wanted the training as an “ego boosting thing.” Moussaoui stood out because, with little knowledge of flying, he wanted to learn how to “take off and land” a Boeing 747.90

The agent in Minneapolis quickly learned that Moussaoui possessed jihadist beliefs. Moreover, Moussaoui had $32,000 in a bank account but did not pro- vide a plausible explanation for this sum of money. He had traveled to Pakistan but became agitated when asked if he had traveled to nearby countries while in Pakistan (Pakistan was the customary route to the training camps in Afghanistan). He planned to receive martial arts training, and intended to pur- chase a global positioning receiver. The agent also noted that Moussaoui became extremely agitated whenever he was questioned regarding his religious beliefs.The agent concluded that Moussaoui was “an Islamic extremist prepar- ing for some future act in furtherance of radical fundamentalist goals.” He also believed Moussaoui’s plan was related to his flight training.91

Moussaoui can be seen as an al Qaeda mistake and a missed opportunity. An apparently unreliable operative, he had fallen into the hands of the FBI. As discussed in chapter 7, Moussaoui had been in contact with and received money from Ramzi Binalshibh. If Moussaoui had been connected to al Qaeda, questions should instantly have arisen about a possible al Qaeda plot that involved piloting airliners, a possibility that had never been seriously ana- lyzed by the intelligence community.

The FBI agent who handled the case in conjunction with the INS repre- sentative on the Minneapolis Joint Terrorism Task Force suspected that Mous- saoui might be planning to hijack a plane. Minneapolis and FBI headquarters debated whether Moussaoui should be arrested immediately or surveilled to obtain additional information. Because it was not clear whether Moussaoui could be imprisoned, the FBI case agent decided the most important thing was to prevent Moussaoui from obtaining any further training that he could use to carry out a potential attack.92

As a French national who had overstayed his visa, Moussaoui could be detained immediately. The INS arrested Moussaoui on the immigration viola- tion.A deportation order was signed on August 17, 2001.93

The agents in Minnesota were concerned that the U.S.Attorney’s Office in Minneapolis would find insufficient probable cause of a crime to obtain a crim- inal warrant to search Moussaoui’s laptop computer.94 Agents at FBI headquar- ters believed there was insufficient probable cause. Minneapolis therefore

sought a special warrant under the Foreign Intelligence Surveillance Act to conduct the search (we introduced FISA in chapter 3).

To do so, however, the FBI needed to demonstrate probable cause that Moussaoui was an agent of a foreign power, a demonstration that was not required to obtain a criminal warrant but was a statutory requirement for a FISA warrant.95 The case agent did not have sufficient information to connect Moussaoui to a “foreign power,” so he reached out for help, in the United States and overseas.

The FBI agent’s August 18 message requested assistance from the FBI legal attaché in Paris. Moussaoui had lived in London, so the Minneapolis agent sought assistance from the legal attaché there as well. By August 24, the Min- neapolis agent had also contacted an FBI detailee and a CIA desk officer at the Counterterrorist Center about the case.96

The FBI legal attaché’s office in Paris first contacted the French government on August 16 or 17, shortly after speaking to the Minneapolis case agent on the telephone. On August 22 and 27, the French provided information that made a connection between Moussaoui and a rebel leader in Chechnya, Ibn al Khattab. This set off a spirited debate between the Minneapolis Field Office, FBI headquarters, and the CIA as to whether the Chechen rebels and Khattab were sufficiently associated with a terrorist organization to constitute a “for- eign power” for purposes of the FISA statute. FBI headquarters did not believe this was good enough, and its National Security Law Unit declined to submit a FISA application.97

After receiving the written request for assistance, the legal attaché in Lon- don had promptly forwarded it to his counterparts in the British government, hand-delivering the request on August 21. On August 24, the CIA also sent a cable to London and Paris regarding “subjects involved in suspicious 747 flight training” that described Moussaoui as a possible “suicide hijacker.” On August 28, the CIA sent a request for information to a different service of the British government; this communication warned that Moussaoui might be expelled to Britain by the end of August. The FBI office in London raised the matter briefly with British officials as an aside, after a meeting about a more urgent matter on September 3, and sent the British service a written update on Sep- tember 5. The case was not handled by the British as a priority amid a large number of other terrorist-related inquiries.98

On September 4, the FBI sent a teletype to the CIA, the FAA, the Customs Service, the State Department, the INS, and the Secret Service summarizing the known facts regarding Moussaoui. It did not report the case agent’s per- sonal assessment that Moussaoui planned to hijack an airplane. It did contain the FAA’s comment that it was not unusual for Middle Easterners to attend flight training schools in the United States.99

Although the Minneapolis agents wanted to tell the FAA from the begin- ning about Moussaoui, FBI headquarters instructed Minneapolis that it could

not share the more complete report the case agent had prepared for the FAA. The Minneapolis supervisor sent the case agent in person to the local FAA office to fill in what he thought were gaps in the FBI headquarters teletype.100 No FAA actions seem to have been taken in response.

There was substantial disagreement between Minneapolis agents and FBI headquarters as to what Moussaoui was planning to do. In one conversation between a Minneapolis supervisor and a headquarters agent, the latter com- plained that Minneapolis’s FISA request was couched in a manner intended to get people “spun up.”The supervisor replied that was precisely his intent. He said he was “trying to keep someone from taking a plane and crashing into the World Trade Center.” The headquarters agent replied that this was not going to happen and that they did not know if Moussaoui was a terrorist.101

There is no evidence that either FBI Acting Director Pickard or Assistant Director for Counterterrorism Dale Watson was briefed on the Moussaoui case prior to 9/11. Michael Rolince, the FBI assistant director heading the Bureau’s International Terrorism Operations Section (ITOS), recalled being told about Moussaoui in two passing hallway conversations but only in the context that he might be receiving telephone calls from Minneapolis complaining about how headquarters was handling the matter. He never received such a call. Although the acting special agent in charge of Minneapolis called the ITOS supervisors to discuss the Moussaoui case on August 27, he declined to go up the chain of command at FBI headquarters and call Rolince.102

On August 23, DCI Tenet was briefed about the Moussaoui case in a brief- ing titled “Islamic Extremist Learns to Fly.”103 Tenet was also told that Mous- saoui wanted to learn to fly a 747, paid for his training in cash, was interested to learn the doors do not open in flight, and wanted to fly a simulated flight from London to New York. He was told that the FBI had arrested Moussaoui because of a visa overstay and that the CIA was working the case with the FBI. Tenet told us that no connection to al Qaeda was apparent to him at the time. Seeing it as an FBI case, he did not discuss the matter with anyone at the White House or the FBI. No connection was made between Moussaoui’s presence in the United States and the threat reporting during the summer of 2001.104

On September 11, after the attacks, the FBI office in London renewed their appeal for information about Moussaoui. In response to U.S. requests, the British government supplied some basic biographical information about Moussaoui.The British government informed us that it also immediately tasked intelligence collection facilities for information about Moussaoui. On Septem- ber 13, the British government received new, sensitive intelligence that Mous- saoui had attended an al Qaeda training camp in Afghanistan. It passed this intelligence to the United States on the same day. Had this information been available in late August 2001, the Moussaoui case would almost certainly have received intense, high-level attention.105

The FBI also learned after 9/11 that the millennium terrorist Ressam, who

by 2001 was cooperating with investigators, recognized Moussaoui as some- one who had been in the Afghan camps.106 As mentioned above, before 9/11 the FBI agents in Minneapolis had failed to persuade supervisors at headquar- ters that there was enough evidence to seek a FISA warrant to search Mous- saoui’s computer hard drive and belongings. Either the British information or the Ressam identification would have broken the logjam.

A maximum U.S. effort to investigate Moussaoui conceivably could have unearthed his connections to Binalshibh. Those connections might have brought investigators to the core of the 9/11 plot.The Binalshibh connection was recognized shortly after 9/11, though it was not an easy trail to find. Dis- covering it would have required quick and very substantial cooperation from the German government, which might well have been difficult to obtain.

However, publicity about Moussaoui’s arrest and a possible hijacking threat might have derailed the plot.107 With time, the search for Mihdhar and Hazmi and the investigation of Moussaoui might also have led to a breakthrough that would have disrupted the plot.

Khalid Sheikh Mohammed

Another late opportunity was presented by a confluence of information regarding Khalid Sheikh Mohammed received by the intelligence community in the summer of 2001.The possible links between KSM, Moussaoui, and an individual only later identified as Ramzi Binalshibh would remain undiscov- ered, however.

Although we readily equate KSM with al Qaeda today, this was not the case before 9/11. KSM, who had been indicted in January 1996 for his role in the Manila air plot, was seen primarily as another freelance terrorist, associated with Ramzi Yousef. Because the links between KSM and Bin Ladin or al Qaeda were not recognized at the time, responsibility for KSM remained in the small Islamic Extremist Branch of the Counterterrorist Center, not in the Bin Ladin unit.

Moreover, because KSM had already been indicted, he became targeted for arrest. In 1997, the Counterterrorist Center added a Renditions Branch to help find wanted fugitives. Responsibility for KSM was transferred to this branch, which gave the CIA a “man-to-man” focus but was not an analyti- cal unit.When subsequent information came, more critical for analysis than for tracking, no unit had the job of following up on what the information might mean.108

For example, in September 2000, a source had reported that an individual named Khalid al-Shaykh al-Ballushi was a key lieutenant in al Qaeda. Al- Ballushi means “from Baluchistan,” and KSM is from Baluchistan. Recogniz- ing the possible significance of this information, the Bin Ladin unit sought more information.When no information was forthcoming, the Bin Ladin unit

dropped the matter.109 When additional pieces of the puzzle arrived in the spring and summer of 2001, they were not put together.

The first piece of the puzzle concerned some intriguing information asso- ciated with a person known as “Mukhtar” that the CIA had begun analyzing in April 2001. The CIA did not know who Mukhtar was at the time—only that he associated with al Qaeda lieutenant Abu Zubaydah and that, based on the nature of the information, he was evidently involved in planning possible terrorist activities.110

The second piece of the puzzle was some alarming information regarding KSM. On June 12, 2001, a CIA report said that “Khaled” was actively recruiting people to travel outside Afghanistan, including to the United States where col- leagues were reportedly already in the country to meet them, to carry out terrorist-related activities for Bin Ladin. CIA headquarters presumed from the details of the reporting that this person was Khalid Sheikh Mohammed. In July, the same source was shown a series of photographs and identified a photograph of Khalid Sheikh Mohammed as the Khaled he had previously discussed.111

The final piece of the puzzle arrived at the CIA’s Bin Ladin unit on August 28 in a cable reporting that KSM’s nickname was Mukhtar. No one made the connection to the reports about Mukhtar that had been circulated in the spring. This connection might also have underscored concern about the June reporting that KSM was recruiting terrorists to travel, including to the United States. Only after 9/11 would it be discovered that Muhktar/KSM had com- municated with a phone that was used by Binalshibh, and that Binalshibh had used the same phone to communicate with Moussaoui, as discussed in chap- ter 7. As in the Moussaoui situation already described, the links to Binalshibh might not have been an easy trail to find and would have required substantial cooperation from the German government. But time was short, and running out.112

Time Runs Out

As Tenet told us, “the system was blinking red” during the summer of 2001. Officials were alerted across the world. Many were doing everything they pos- sibly could to respond to the threats.

Yet no one working on these late leads in the summer of 2001 connected the case in his or her in-box to the threat reports agitating senior officials and being briefed to the President. Thus, these individual cases did not become national priorities.As the CIA supervisor “John” told us, no one looked at the bigger picture; no analytic work foresaw the lightning that could connect the thundercloud to the ground.113

We see little evidence that the progress of the plot was disturbed by any gov- ernment action. The U.S. government was unable to capitalize on mistakes made by al Qaeda.Time ran out.

9

HEROISM AND HORROR

9.1 PREPAREDNESS AS OF SEPTEMBER 11

Emergency response is a product of preparedness. On the morning of Septem- ber 11, 2001, the last best hope for the community of people working in or visiting the World Trade Center rested not with national policymakers but with private firms and local public servants, especially the first responders: fire, police, emergency medical service, and building safety professionals.

Building Preparedness

The World Trade Center. The World Trade Center (WTC) complex was built for the Port Authority of New York and New Jersey. Construction began in 1966, and tenants began to occupy its space in 1970.The Twin Towers came to occupy a unique and symbolic place in the culture of New York City and America.

The WTC actually consisted of seven buildings, including one hotel, spread across 16 acres of land.The buildings were connected by an underground mall (the concourse).The Twin Towers (1 WTC, or the North Tower, and 2 WTC, or the South Tower) were the signature structures, containing 10.4 million square feet of office space. Both towers had 110 stories, were about 1,350 feet high, and were square; each wall measured 208 feet in length. On any given workday, up to 50,000 office workers occupied the towers, and 40,000 people passed through the complex.1

Each tower contained three central stairwells, which ran essentially from top to bottom, and 99 elevators. Generally, elevators originating in the lobby ran to “sky lobbies” on higher floors, where additional elevators carried passengers to the tops of the buildings.2

Stairwells A and C ran from the 110th floor to the raised mezzanine level of the lobby. Stairwell B ran from the 107th floor to level B6, six floors below ground, and was accessible from the West Street lobby level, which was one

278

The World Trade Center Complex as of 9/11

Rendering by Marco Crupi

floor below the mezzanine. All three stairwells ran essentially straight up and down, except for two deviations in stairwells A and C where the staircase jut- ted out toward the perimeter of the building. On the upper and lower bound- aries of these deviations were transfer hallways contained within the stairwell proper. Each hallway contained smoke doors to prevent smoke from rising from lower to upper portions of the building; they were kept closed but not locked. Doors leading from tenant space into the stairwells were never kept locked; reentry from the stairwells was generally possible on at least every fourth floor.3 Doors leading to the roof were locked. There was no rooftop evacuation plan. The roofs of both the North Tower and the South Tower were sloped and cluttered surfaces with radiation hazards, making them impractical for hel- icopter landings and as staging areas for civilians. Although the South Tower roof had a helipad, it did not meet 1994 Federal Aviation Administration

guidelines.4

The 1993 Terrorist Bombing of the WTC and the Port Authority’s Response. Unlike most of America, NewYork City and specifically the World

Trade Center had been the target of terrorist attacks before 9/11.At 12:18 P.M. on February 26, 1993, a 1,500-pound bomb stashed in a rental van was deto- nated on a parking garage ramp beneath the Twin Towers.The explosion killed six people, injured about 1,000 more, and exposed vulnerabilities in the World Trade Center’s and the city’s emergency preparedness.5

The towers lost power and communications capability. Generators had to be shut down to ensure safety, and elevators stopped. The public-address sys- tem and emergency lighting systems failed. The unlit stairwells filled with smoke and were so dark as to be impassable. Rescue efforts by the Fire Depart- ment of New York (FDNY) were hampered by the inability of its radios to function in buildings as large as the Twin Towers.The 911 emergency call sys- tem was overwhelmed.The general evacuation of the towers’ occupants via the stairwells took more than four hours.6

Several small groups of people who were physically unable to descend the stairs were evacuated from the roof of the South Tower by New York Police Department (NYPD) helicopters. At least one person was lifted from the North Tower roof by the NYPD in a dangerous helicopter rappel operation— 15 hours after the bombing. General knowledge that these air rescues had occurred appears to have left a number of civilians who worked in the Twin Towers with the false impression that helicopter rescues were part of the WTC evacuation plan and that rescue from the roof was a viable, if not favored, option for those who worked on upper floors. Although they were considered after 1993, helicopter evacuations in fact were not incorporated into the WTC fire safety plan.7

To address the problems encountered during the response to the 1993 bombing, the Port Authority spent an initial $100 million to make physical, structural, and technological improvements to the WTC, as well as to enhance its fire safety plan and reorganize and bolster its fire safety and security staffs.8 Substantial enhancements were made to power sources and exits. Fluores- cent signs and markings were added in and near stairwells.The Port Authority also installed a sophisticated computerized fire alarm system with redundant electronics and control panels, and state-of-the-art fire command stations were

placed in the lobby of each tower.9

To manage fire emergency preparedness and operations, the Port Authority created the dedicated position of fire safety director.The director supervised a team of deputy fire safety directors, one of whom was on duty at the fire com- mand station in the lobby of each tower at all times. He or she would be respon- sible for communicating with building occupants during an emergency.10

The Port Authority also sought to prepare civilians better for future emer- gencies. Deputy fire safety directors conducted fire drills at least twice a year, with advance notice to tenants.“Fire safety teams” were selected from among civilian employees on each floor and consisted of a fire warden, deputy fire war- dens, and searchers.The standard procedure for fire drills was for fire wardens

to lead co-workers in their respective areas to the center of the floor, where they would use the emergency intercom phone to obtain specific information on how to proceed. Some civilians have told us that their evacuation on Sep- tember 11 was greatly aided by changes and training implemented by the Port Authority in response to the 1993 bombing.11

But during these drills, civilians were not directed into the stairwells, or pro- vided with information about their configuration and about the existence of transfer hallways and smoke doors. Neither full nor partial evacuation drills were held. Moreover, participation in drills that were held varied greatly from tenant to tenant. In general, civilians were never told not to evacuate up.The standard fire drill announcement advised participants that in the event of an actual emergency, they would be directed to descend to at least three floors below the fire. Most civilians recall simply being taught to await the instruc- tions that would be provided at the time of an emergency. Civilians were not informed that rooftop evacuations were not part of the evacuation plan, or that doors to the roof were kept locked.The Port Authority acknowledges that it had no protocol for rescuing people trapped above a fire in the towers.12

Six weeks before the September 11 attacks, control of the WTC was trans- ferred by net lease to a private developer, Silverstein Properties. Select Port Authority employees were designated to assist with the transition. Others remained on-site but were no longer part of the official chain of command. However, on September 11, most Port Authority World Trade Department employees—including those not on the designated “transition team”— reported to their regular stations to provide assistance throughout the morn- ing. Although Silverstein Properties was in charge of the WTC on September 11, the WTC fire safety plan remained essentially the same.13

Preparedness of First Responders

On 9/11, the principal first responders were from the Fire Department of New York, the NewYork Police Department, the Port Authority Police Department (PAPD), and the Mayor’s Office of Emergency Management (OEM).

Port Authority Police Department. On September 11, 2001, the Port Authority of New York and New Jersey Police Department consisted of 1,331 officers, many of whom were trained in fire suppression methods as well as in law enforcement. The PAPD was led by a superintendent. There was a sepa- rate PAPD command for each of the Port Authority’s nine facilities, including the World Trade Center.14

Most Port Authority police commands used ultra-high-frequency radios. Although all the radios were capable of using more than one channel, most PAPD officers used one local channel. The local channels were low-wattage and worked only in the immediate vicinity of that command.The PAPD also had an agencywide channel, but not all commands could access it.15

As of September 11, the Port Authority lacked any standard operating pro- cedures to govern how officers from multiple commands would respond to and then be staged and utilized at a major incident at the WTC. In particular, there were no standard operating procedures covering how different commands should communicate via radio during such an incident.

The New York Police Department. The 40,000-officer NYPD was headed by a police commissioner, whose duties were not primarily operational but who retained operational authority. Much of the NYPD’s operational activities were run by the chief of department. In the event of a major emer- gency, a leading role would be played by the Special Operations Division.This division included the Aviation Unit, which provided helicopters for surveys and rescues, and the Emergency Service Unit (ESU), which carried out specialized rescue missions.The NYPD had specific and detailed standard operating pro- cedures for the dispatch of officers to an incident, depending on the incident’s magnitude.16

The NYPD precincts were divided into 35 different radio zones, with a cen- tral radio dispatcher assigned to each. In addition, there were several radio chan- nels for citywide operations. Officers had portable radios with 20 or more available channels, so that the user could respond outside his or her precinct. ESU teams also had these channels but at an operation would use a separate point-to-point channel (which was not monitored by a dispatcher).17

The NYPD also supervised the city’s 911 emergency call system. Its approximately 1,200 operators, radio dispatchers, and supervisors were civil- ian employees of the NYPD. They were trained in the rudiments of emer- gency response.When a 911 call concerned a fire, it was transferred to FDNY dispatch.18

The Fire Department of New York. The 11,000-member FDNY was headed by a fire commissioner who, unlike the police commissioner, lacked operational authority. Operations were headed by the chief of department— the sole five-star chief.19

The FDNY was organized in nine separate geographic divisions. Each divi- sion was further divided into between four to seven battalions. Each battalion contained typically between three and four engine companies and two to four ladder companies. In total, the FDNY had 205 engine companies and 133 lad- der companies. On-duty ladder companies consisted of a captain or lieutenant and five firefighters; on-duty engine companies consisted of a captain or lieu- tenant and normally four firefighters. Ladder companies’ primary function was to conduct rescues; engine companies focused on extinguishing fires.20

The FDNY’s Specialized Operations Command (SOC) contained a lim- ited number of units that were of particular importance in responding to a terrorist attack or other major incident.The department’s five rescue compa- nies and seven squad companies performed specialized and highly risky res- cue operations.21

The logistics of fire operations were directed by Fire Dispatch Operations Division, which had a center in each of the five boroughs. All 911 calls concern- ing fire emergencies were transferred to FDNY dispatch.22

As of September 11, FDNY companies and chiefs responding to a fire used analog, point-to-point radios that had six normal operating channels.Typically, the companies would operate on the same tactical channel, which chiefs on the scene would monitor and use to communicate with the firefighters. Chiefs at a fire operation also would use a separate command channel. Because these point-to-point radios had weak signal strength, communications on them could be heard only by other FDNY personnel in the immediate vicinity. In addition, the FDNY had a dispatch frequency for each of the five boroughs; these were not point-to-point channels and could be monitored from around the city.23

The FDNY’s radios performed poorly during the 1993 WTC bombing for two reasons. First, the radios signals often did not succeed in penetrating the numerous steel and concrete floors that separated companies attempting to communicate; and second, so many different companies were attempting to use the same point-to-point channel that communications became unintelligible.24 The Port Authority installed, at its own expense, a repeater system in 1994

to greatly enhance FDNY radio communications in the difficult high-rise environment of the Twin Towers. The Port Authority recommended leaving the repeater system on at all times. The FDNY requested, however, that the repeater be turned on only when it was actually needed because the channel could cause interference with other FDNY operations in Lower Manhattan. The repeater system was installed at the Port Authority police desk in 5 WTC, to be activated by members of the Port Authority police when the FDNY units responding to the WTC complex so requested. However, in the spring of 2000 the FDNY asked that an activation console for the repeater system be placed instead in the lobby fire safety desk of each of the towers, making FDNY per- sonnel entirely responsible for its activation.The Port Authority complied.25

Between 1998 and 2000, fewer people died from fires in New York City than in any three-year period since accurate measurements began in 1946. Fire- fighter deaths—a total of 22 during the 1990s—compared favorably with the most tranquil periods in the department’s history.26

Office of Emergency Management and Interagency Preparedness. In 1996, Mayor Rudolph Giuliani created the Mayor’s Office of Emergency Man- agement, which had three basic functions. First, OEM’s Watch Command was to monitor the city’s key communications channels—including radio frequen- cies of FDNY dispatch and the NYPD—and other data. A second purpose of the OEM was to improve NewYork City’s response to major incidents, includ- ing terrorist attacks, by planning and conducting exercises and drills that would involve multiple city agencies, particularly the NYPD and FDNY. Third, the OEM would play a crucial role in managing the city’s overall response to an

The World Trade Center Radio Repeater System

Rendering by Marco Crupi

incident.After OEM’s Emergency Operations Center was activated, designated liaisons from relevant agencies, as well as the mayor and his or her senior staff, would respond there. In addition, an OEM field responder would be sent to the scene to ensure that the response was coordinated.27

The OEM’s headquarters was located at 7 WTC. Some questioned locating it both so close to a previous terrorist target and on the 23rd floor of a build- ing (difficult to access should elevators become inoperable). There was no backup site.28

In July 2001, Mayor Giuliani updated a directive titled “Direction and Control of Emergencies in the City of New York.” Its purpose was to elim- inate “potential conflict among responding agencies which may have areas

of overlapping expertise and responsibility.”The directive sought to accom- plish this objective by designating, for different types of emergencies, an appropriate agency as “Incident Commander.” This Incident Commander would be “responsible for the management of the City’s response to the emergency,” while the OEM was “designated the ‘On Scene Interagency Coordinator.’”29

Nevertheless, the FDNY and NYPD each considered itself operationally autonomous.As of September 11, they were not prepared to comprehensively coordinate their efforts in responding to a major incident.The OEM had not overcome this problem.

9.2 SEPTEMBER 11, 2001

As we turn to the events of September 11, we are mindful of the unfair per- spective afforded by hindsight. Nevertheless, we will try to describe what hap- pened in the following 102 minutes:

  • the 17 minutes from the crash of the hijacked American Airlines Flight 11 into 1 World Trade Center (the North Tower) at 8:46 until the South Tower was hit
  • the 56 minutes from the crash of the hijacked United Airlines Flight 175 into 2 World Trade Center (the South Tower) at 9:03 until the collapse of the South Tower
  • the 29 minutes from the collapse of the South Tower at 9:59 until the collapse of the North Tower at 10:28
From 8:46 until 9:03 A.M.

At 8:46:40, the hijacked American Airlines Flight 11 flew into the upper por- tion of the North Tower, cutting through floors 93 to 99. Evidence suggests that all three of the building’s stairwells became impassable from the 92nd floor up. Hundreds of civilians were killed instantly by the impact. Hundreds more remained alive but trapped.30

Civilians, Fire Safety Personnel, and 911 Calls

North Tower. A jet fuel fireball erupted upon impact and shot down at least one bank of elevators.The fireball exploded onto numerous lower floors, includ- ing the 77th and 22nd; the West Street lobby level; and the B4 level, four stories below ground.The burning jet fuel immediately created thick, black smoke that enveloped the upper floors and roof of the North Tower.The roof of the South Tower was also engulfed in smoke because of prevailing light winds from the northwest.31

Within minutes, New York City’s 911 system was flooded with eyewit-

ness accounts of the event. Most callers correctly identified the target of the attack. Some identified the plane as a commercial airliner.32

The first response came from private firms and individuals—the people and companies in the building. Everything that would happen to them during the next few minutes would turn on their circumstances and their preparedness, assisted by building personnel on-site.

Hundreds of civilians trapped on or above the 92nd floor gathered in large and small groups, primarily between the 103rd and 106th floors.A large group was reported on the 92nd floor, technically below the impact but unable to descend. Civilians were also trapped in elevators. Other civilians below the impact zone—mostly on floors in the 70s and 80s, but also on at least the 47th and 22nd floors—were either trapped or waiting for assistance.33

It is unclear when the first full building evacuation order was attempted over the public-address system. The deputy fire safety director in the lobby, while immediately aware that a major incident had occurred, did not know for approximately ten minutes that a commercial jet had directly hit the building. Following protocol, he initially gave announcements to those floors that had generated computerized alarms, advising those tenants to descend to points of safety—at least two floors below the smoke or fire—and to wait there for fur- ther instructions. The deputy fire safety director has told us that he began instructing a full evacuation within about ten minutes of the explosion. But the first FDNY chiefs to arrive in the lobby were advised by the Port Author- ity fire safety director—who had reported to the lobby although he was no longer the designated fire safety director—that the full building evacuation announcement had been made within one minute of the building being hit.34 Because of damage to building systems caused by the impact of the plane, public-address announcements were not heard in many locations. For the same reason, many civilians may have been unable to use the emergency intercom

phones, as they had been advised to do in fire drills. Many called 911.35

The 911 system was not equipped to handle the enormous volume of calls it received. Some callers were unable to connect with 911 operators, receiving an “all circuits busy” message. Standard operating procedure was for calls relat- ing to fire emergencies to be transferred from 911 operators to FDNY dispatch operators in the appropriate borough (in this case, Manhattan).Transfers were often plagued by delays and were in some cases unsuccessful. Many calls were also prematurely disconnected.36

The 911 operators and FDNY dispatchers had no information about either the location or the magnitude of the impact zone and were therefore unable to provide information as fundamental as whether callers were above or below the fire. Because the operators were not informed of NYPD Aviation’s deter- mination of the impossibility of rooftop rescues from the Twin Towers on that day, they could not knowledgeably answer when callers asked whether to go up or down. In most instances, therefore, the operators and the FDNY dis- patchers relied on standard operating procedures for high-rise fires—that civil-

ians should stay low, remain where they are, and wait for emergency person- nel to reach them.This advice was given to callers from the North Tower for locations both above and below the impact zone. Fire chiefs told us that the evacuation of tens of thousands of people from skyscrapers can create many new problems, especially for individuals who are disabled or in poor health. Many of the injuries after the 1993 bombing occurred during the evacuation.37 Although the guidance to stay in place may seem understandable in cases

of conventional high-rise fires, FDNY chiefs in the North Tower lobby deter- mined at once that all building occupants should attempt to evacuate imme- diately. By 8:57, FDNY chiefs had instructed the PAPD and building personnel to evacuate the South Tower as well, because of the magnitude of the damage caused by the first plane’s impact.38

These critical decisions were not conveyed to 911 operators or to FDNY dispatchers. Departing from protocol, a number of operators told callers that they could break windows, and several operators advised callers to evacuate if they could.39 Civilians who called the Port Authority police desk located at 5 WTC were advised to leave if they could.40

Most civilians who were not obstructed from proceeding began evacuating without waiting for instructions over the intercom system. Some remained to wait for help, as advised by 911 operators. Others simply continued to work or delayed to collect personal items, but in many cases were urged to leave by oth- ers. Some Port Authority civilian employees remained on various upper floors to help civilians who were trapped and to assist in the evacuation.41

While evacuating, some civilians had trouble reaching the exits because of damage caused by the impact. Some were confused by deviations in the increas- ingly crowded stairwells, and impeded by doors that appeared to be locked but actually were jammed by debris or shifting that resulted from the impact of the plane. Despite these obstacles, the evacuation was relatively calm and orderly.42 Within ten minutes of impact, smoke was beginning to rise to the upper floors in debilitating volumes and isolated fires were reported, although there were some pockets of refuge. Faced with insufferable heat, smoke, and fire, and

with no prospect for relief, some jumped or fell from the building.43

South Tower. Many civilians in the South Tower were initially unaware of what had happened in the other tower. Some believed an incident had occurred in their building; others were aware that a major explosion had occurred on the upper floors of the North Tower. Many people decided to leave, and some were advised to do so by fire wardens. In addition, Morgan Stanley, which occupied more than 20 floors of the South Tower, evacuated its employees by the decision of company security officials.44

Consistent with protocol, at 8:49 the deputy fire safety director in the South Tower told his counterpart in the North Tower that he would wait to hear from “the boss from the Fire Department or somebody” before ordering an evacua- tion.45 At about this time, an announcement over the public-address system in

The World Trade Center North Tower Stairwell with Deviation

Rendering by Marco Crupi

the South Tower stated that the incident had occurred in the other building and advised tenants, generally, that their building was safe and that they should remain on or return to their offices or floors. A statement from the deputy fire safety director informing tenants that the incident had occurred in the other building was consistent with protocol; the expanded advice did not correspond to any existing written protocol, and did not reflect any instruction known to have been given to the deputy fire safety director that day.We do not know the reason for the announcement, as both the deputy fire safety director believed to have made it and the director of fire safety for the WTC complex perished in the South Tower’s collapse. Clearly, however, the prospect of another plane hitting the sec- ond building was beyond the contemplation of anyone giving advice.According

to one of the first fire chiefs to arrive, such a scenario was unimaginable,“beyond our consciousness.”As a result of the announcement, many civilians remained on their floors. Others reversed their evacuation and went back up.46

Similar advice was given in person by security officials in both the ground- floor lobby—where a group of 20 that had descended by the elevators was per- sonally instructed to go back upstairs—and in the upper sky lobby, where many waited for express elevators to take them down. Security officials who gave this advice were not part of the fire safety staff.47

Several South Tower occupants called the Port Authority police desk in 5 WTC. Some were advised to stand by for further instructions; others were strongly advised to leave.48

It is not known whether the order by the FDNY to evacuate the South Tower was received by the deputy fire safety director making announcements there. However, at approximately 9:02—less than a minute before the building was hit—an instruction over the South Tower’s public-address system advised civilians, generally, that they could begin an orderly evacuation if conditions warranted. Like the earlier advice to remain in place, it did not correspond to any prewritten emergency instruction.49

FDNY Initial Response

Mobilization. The FDNY response began within five seconds of the crash. By 9:00, many senior FDNY leaders, including 7 of the 11 most highly ranked chiefs in the department, as well as the Commissioner and many of his deputies and assistants, had begun responding from headquarters in Brooklyn.While en route over the Brooklyn Bridge, the Chief of Department and the Chief of Operations had a clear view of the situation on the upper floors of the North Tower.They determined that because of the fire’s magnitude and location near the top of the building, their mission would be primarily one of rescue.They called for a fifth alarm, which would bring additional engine and ladder com- panies, as well as for two more elite rescue units. The Chief of Department arrived at about 9:00; general FDNY Incident Command was transferred to his location on the West Side Highway. In all, 22 of the 32 senior chiefs and commissioners arrived at the WTC before 10:00.50

As of 9:00, the units that were dispatched (including senior chiefs respond- ing to headquarters) included approximately 235 firefighters.These units con- sisted of 21 engine companies, nine ladder companies, four of the department’s elite rescue teams, the department’s single Hazmat team, two of the city’s elite squad companies, and support staff. In addition, at 8:53 nine Brooklyn units were staged on the Brooklyn side of the Brooklyn-Battery Tunnel to await pos- sible dispatch orders.51

Operations. A battalion chief and two ladder and two engine companies arrived at the North Tower at approximately 8:52. As they entered the lobby, they encountered badly burned civilians who had been caught in the path of

the fireball. Floor-to-ceiling windows in the northwest corner of the West Street level of the lobby had been blown out; some large marble tiles had been dislodged from the walls; one entire elevator bank was destroyed by the fire- ball. Lights were functioning, however, and the air was clear of smoke.52

As the highest-ranking officer on the scene, the battalion chief initially was the FDNY incident commander. Minutes later, the on-duty division chief for Lower Manhattan arrived and took over. Both chiefs immediately began speak- ing with the former fire safety director and other building personnel to learn whether building systems were working.They were advised that all 99 eleva- tors in the North Tower appeared to be out, and there were no assurances that sprinklers or standpipes were working on upper floors. Chiefs also spoke with Port Authority police personnel and an OEM representative.53

After conferring with the chiefs in the lobby, one engine and one ladder company began climbing stairwell C at about 8:57, with the goal of approach- ing the impact zone as scouting units and reporting back to the chiefs in the lobby.The radio channel they used was tactical 1. Following FDNY high-rise fire protocols, other units did not begin climbing immediately, as the chiefs worked to formulate a plan before sending them up. Units began mobilizing in the lobby, lining up and awaiting their marching orders.54

Also by approximately 8:57, FDNY chiefs had asked both building person- nel and a Port Authority police officer to evacuate the South Tower, because in their judgment the impact of the plane into the North Tower made the entire complex unsafe—not because of concerns about a possible second plane.55

The FDNY chiefs in the increasingly crowded North Tower lobby were confronting critical choices with little to no information.They had ordered units up the stairs to report back on conditions, but did not know what the impact floors were; they did not know if any stairwells into the impact zone were clear; and they did not know whether water for firefighting would be available on the upper floors.They also did not know what the fire and impact zone looked like from the outside.56

They did know that the explosion had been large enough to send down a fireball that blew out elevators and windows in the lobby and that conditions were so dire that some civilians on upper floors were jumping or falling from the building.They also knew from building personnel that some civilians were trapped in elevators and on specific floors. According to Division Chief for Lower Manhattan Peter Hayden, “We had a very strong sense we would lose firefighters and that we were in deep trouble, but we had estimates of 25,000 to 50,000 civilians, and we had to try to rescue them.”57

The chiefs concluded that this would be a rescue operation, not a firefight- ing operation. One of the chiefs present explained:

We realized that, because of the impact of the plane, that there was some structural damage to the building, and most likely that the fire suppres-

sion systems within the building were probably damaged and possibly inoperable  We knew that at the height of the day there were as many

as 50,000 people in this building.We had a large volume of fire on the upper floors. Each floor was approximately an acre in size. Several floors of fire would have been beyond the fire-extinguishing capability of the forces that we had on hand. So we determined, very early on, that this was going to be strictly a rescue mission. We were going to vacate the building, get everybody out, and then we were going to get out.58

The specifics of the mission were harder to determine, as they had almost no information about the situation 80 or more stories above them.They also received advice from senior FDNY chiefs that while the building might even- tually suffer a partial collapse on upper floors, such structural failure was not imminent. No one anticipated the possibility of a total collapse.59

Emergency medical services (EMS) personnel were directed to one of four triage areas being set up around the perimeter of the WTC. Some entered the lobby to respond to specific casualty reports. In addition, many ambulance para- medics from private hospitals were rushing to the WTC complex.60

NYPD Initial Response

Numerous NYPD officers saw the plane strike the North Tower and immedi- ately reported it to NYPD communications dispatchers.61

At 8:58, while en route, the NYPD Chief of Department raised the NYPD’s mobilization to level 4, thereby sending to the WTC approximately 22 lieutenants, 100 sergeants, and 800 police officers from all over the city. The Chief of Department arrived at Church and Vesey at 9:00.62

At 9:01, the NYPD patrol mobilization point was moved to West and Vesey in order to handle the greater number of patrol officers dispatched in the higher-level mobilization. These officers would be stationed around the perimeter of the complex to direct the evacuation of civilians. Many were diverted on the way to the scene by intervening emergencies related to the attack.63

At 8:50, the Aviation Unit of the NYPD dispatched two helicopters to the WTC to report on conditions and assess the feasibility of a rooftop landing or of special rescue operations. En route, the two helicopters communicated with air traffic controllers at the area’s three major airports and informed them of the commercial airplane crash at the World Trade Center.The air traffic con- trollers had been unaware of the incident.64

At 8:56, an NYPD ESU team asked to be picked up at the Wall Street hel- iport to initiate rooftop rescues. At 8:58, however, after assessing the North Tower roof, a helicopter pilot advised the ESU team that they could not land on the roof, because “it is too engulfed in flames and heavy smoke condition.”65 By 9:00, a third NYPD helicopter was responding to the WTC complex.

NYPD helicopters and ESU officers remained on the scene throughout the morning, prepared to commence rescue operations on the roof if conditions improved. Both FDNY and NYPD protocols called for FDNY personnel to be placed in NYPD helicopters in the event of an attempted rooftop rescue at a high-rise fire. No FDNY personnel were placed in NYPD helicopters on September 11.66

The 911 operators and FDNY dispatchers were not advised that rooftop rescues were not being undertaken.They thus were not able to communicate this fact to callers, some of whom spoke of attempting to climb to the roof.67 Two on-duty NYPD officers were on the 20th floor of the North Tower at 8:46.They climbed to the 29th floor, urging civilians to evacuate, but did not

locate a group of civilians trapped on the 22nd floor.68

Just before 9:00, an ESU team began to walk from Church and Vesey to the North Tower lobby, with the goal of climbing toward and setting up a triage center on the upper floors for the severely injured.A second ESU team would follow them to assist in removing those individuals.69

Numerous officers responded in order to help injured civilians and to urge those who could walk to vacate the area immediately. Putting themselves in danger of falling debris, several officers entered the plaza and successfully res- cued at least one injured, nonambulatory civilian, and attempted to rescue others.70

Also by about 9:00, transit officers began shutting down subway stations in the vicinity of the World Trade Center and evacuating civilians from those stations.71

Around the city, the NYPD cleared major thoroughfares for emergency vehicles to access the WTC.The NYPD and PAPD coordinated the closing of bridges and tunnels into Manhattan.72

PAPD Initial Response

The Port Authority’s on-site commanding police officer was standing in the concourse when a fireball erupted out of elevator shafts and exploded onto the mall concourse, causing him to dive for cover. The on-duty sergeant initially instructed the officers in the WTC Command to meet at the police desk in 5 WTC. Soon thereafter, he instructed officers arriving from outside commands to meet him at the fire safety desk in the North Tower lobby. A few of these officers from outside commands were given WTC Command radios.73

One Port Authority police officer at the WTC immediately began climb- ing stairwell C in the North Tower.74 Other officers began performing res- cue and evacuation operations on the ground floors and in the PATH (Port Authority Trans-Hudson) station below the WTC complex.

Within minutes of impact, Port Authority police officers from the PATH, bridges, tunnels, and airport commands began responding to the WTC. The PAPD lacked written standard operating procedures for personnel responding from outside commands to the WTC during a major incident. In addition, offi-

cers from some PAPD commands lacked interoperable radio frequencies. As a result, there was no comprehensive coordination of PAPD’s overall response.75 At 9:00, the PAPD commanding officer of the WTC ordered an evacuation

of all civilians in the World Trade Center complex, because of the magnitude of the calamity in the North Tower. This order was given over WTC police radio channel W, which could not be heard by the deputy fire safety director in the South Tower.76

Also at 9:00, the PAPD Superintendent and Chief of Department arrived separately and made their way to the North Tower.77

OEM Initial Response

By 8:48, officials in OEM headquarters on the 23rd floor of 7 WTC—just to the north of the North Tower—began to activate the Emergency Operations Center by calling such agencies as the FDNY, NYPD, Department of Health, and the Greater Hospital Association and instructing them to send their des- ignated representatives to the OEM. In addition, the Federal Emergency Man- agement Agency (FEMA) was called and asked to send at least five federal Urban Search and Rescue Teams (such teams are located throughout the United States). At approximately 8:50, a senior representative from the OEM arrived in the lobby of the North Tower and began to act as the OEM field responder to the incident. He soon was joined by several other OEM officials, including the OEM Director.78

Summary

In the 17-minute period between 8:46 and 9:03 A.M. on September 11, New York City and the Port Authority of New York and New Jersey had mobilized the largest rescue operation in the city’s history. Well over a thousand first responders had been deployed, an evacuation had begun, and the critical deci- sion that the fire could not be fought had been made.

Then the second plane hit.

From 9:03 until 9:59 A.M.

At 9:03:11, the hijacked United Airlines Flight 175 hit 2 WTC (the South Tower) from the south, crashing through the 77th to 85th floors.What had been the largest and most complicated rescue operation in city history instantly dou- bled in magnitude.The plane banked as it hit the building, leaving portions of the building undamaged on impact floors. As a consequence—and in contrast to the situation in the North Tower—one of the stairwells (A) initially remained passable from at least the 91st floor down, and likely from top to bottom.79

Civilians, Fire Safety Personnel, and 911 Calls

South Tower. At the lower end of the impact, the 78th-floor sky lobby, hun- dreds had been waiting to evacuate when the plane hit. Many had attempted but failed to squeeze into packed express elevators. Upon impact, many were

killed or severely injured; others were relatively unharmed.We know of at least one civilian who seized the initiative and shouted that anyone who could walk should walk to the stairs, and anyone who could help should help others in need of assistance. As a result, at least two small groups of civilians descended from that floor. Others remained on the floor to help the injured and move victims who were unable to walk to the stairwell to aid their rescue.80

Still others remained alive in the impact zone above the 78th floor. Dam- age was extensive, and conditions were highly precarious. The only survivor known to have escaped from the heart of the impact zone described the 81st floor—where the wing of the plane had sliced through his office—as a “dem- olition” site in which everything was “broken up” and the smell of jet fuel was so strong that it was almost impossible to breathe.This person escaped by means of an unlikely rescue, aided by a civilian fire warden descending from a higher floor, who, critically, had been provided with a flashlight.81

At least four people were able to descend stairwell A from the 81st floor or above. One left the 84th floor immediately after the building was hit. Even at that point, the stairway was dark, smoky, and difficult to navigate; glow strips on the stairs and handrails were a significant help. Several flights down, how- ever, the evacuee became confused when he reached a smoke door that caused him to believe the stairway had ended. He was able to exit that stairwell and switch to another.82

Many civilians in and above the impact zone ascended the stairs. One small group reversed its descent down stairwell A after being advised by another civil- ian that they were approaching a floor “in flames.”The only known survivor has told us that their intention was to exit the stairwell in search of clearer air. At the 91st floor, joined by others from intervening floors, they perceived themselves to be trapped in the stairwell and began descending again. By this time, the stairwell was “pretty black,” intensifying smoke caused many to pass out, and fire had ignited in the 82nd-floor transfer hallway.83

Others ascended to attempt to reach the roof but were thwarted by locked doors. At approximately 9:30 a “lock release” order—which would unlock all areas in the complex controlled by the buildings’ computerized security sys- tem, including doors leading to the roofs—was transmitted to the Security Command Center located on the 22nd floor of the North Tower. Damage to the software controlling the system, resulting from the impact of the plane, pre- vented this order from being executed.84

Others, attempting to descend, were frustrated by jammed or locked doors in stairwells or confused by the structure of the stairwell deviations. By the lower 70s, however, stairwells A and B were well-lit, and conditions were gen- erally normal.85

Some civilians remained on affected floors, and at least one ascended from a lower point into the impact zone, to help evacuate colleagues or assist the injured.86

Within 15 minutes after the impact, debilitating smoke had reached at least

one location on the 100th floor, and severe smoke conditions were reported throughout floors in the 90s and 100s over the course of the following half hour. By 9:30, a number of civilians who had failed to reach the roof remained on the 105th floor, likely unable to descend because of intensifying smoke in the stairwell.There were reports of tremendous smoke on that floor, but at least one area remained less affected until shortly before the building collapsed. There were several areas between the impact zone and the uppermost floors where conditions were better.At least a hundred people remained alive on the 88th and 89th floors, in some cases calling 911 for direction.87

The 911 system remained plagued by the operators’ lack of awareness of what was occurring. Just as in the North Tower, callers from below and above the impact zone were advised to remain where they were and wait for help. The operators were not given any information about the inability to conduct rooftop rescues and therefore could not advise callers that they had essentially been ruled out.This lack of information, combined with the general advice to remain where they were, may have caused civilians above the impact not to attempt to descend, although stairwell A may have been passable.88

In addition, the 911 system struggled with the volume of calls and rigid stan- dard operating procedures according to which calls conveying crucial informa- tion had to wait to be transferred to either EMS or FDNY dispatch.89 According to one civilian who was evacuating down stairwell A from the heart of the impact zone and who stopped on the 31st floor in order to call 911,

I told them when they answered the phone, where I was, that I had passed somebody on the 44th floor, injured—they need to get a medic and a stretcher to this floor, and described the situation in brief, and the per- son then asked for my phone number, or something, and they said—they put me on hold. “You gotta talk to one of my supervisors”—and sud- denly I was on hold. And so I waited a considerable amount of time. Somebody else came back on the phone, I repeated the story. And then it happened again. I was on hold a second time, and needed to repeat the story for a third time. But I told the third person that I am only telling you once. I am getting out of the building, here are the details, write it down, and do what you should do.90

Very few 911 calls were received from floors below the impact, but at least one person was advised to remain on the 73rd floor despite the caller’s protests that oxygen was running out.The last known 911 call from this location came at 9:52.91

Evidence suggests that the public-address system did not continue to func- tion after the building was hit. A group of people trapped on the 97th floor, however, made repeated references in calls to 911 to having heard “announce- ments” to go down the stairs. Evacuation tones were heard in locations both above and below the impact zone.92

By 9:35, the West Street lobby level of the South Tower was becoming over- whelmed by injured people who had descended to the lobby but were having difficulty going on.Those who could continue were directed to exit north or east through the concourse and then out of the WTC complex.93

By 9:59, at least one person had descended from as high as the 91st floor of that tower, and stairwell A was reported to have been almost empty. Stairwell B was also reported to have contained only a handful of descending civilians at an earlier point in the morning. But just before the tower collapsed, a team of NYPD ESU officers encountered a stream of civilians descending an unidentified stairwell in the 20s.These civilians may have been descending from at or above the impact zone.94

North Tower. In the North Tower, civilians continued their evacuation. On the 91st floor, the highest floor with stairway access, all civilians but one were uninjured and able to descend.While some complained of smoke, heat, fumes, and crowding in the stairwells, conditions were otherwise fairly normal on floors below the impact.At least one stairwell was reported to have been “clear and bright” from the upper 80s down.95

Those who called 911 from floors below the impact were generally advised to remain in place. One group trapped on the 83rd floor pleaded repeatedly to know whether the fire was above or below them, specifically asking if 911 oper- ators had any information from the outside or from the news.The callers were transferred back and forth several times and advised to stay put. Evidence sug- gests that these callers died.96

At 8:59, the Port Authority police desk at Newark Airport told a third party that a group of Port Authority civilian employees on the 64th floor should evacuate. (The third party was not at the WTC, but had been in phone con- tact with the group on the 64th floor.) At 9:10, in response to an inquiry from the employees themselves, the Port Authority police desk in Jersey City con- firmed that employees on the 64th floor should “be careful, stay near the stair- wells, and wait for the police to come up.” When the third party inquired again at 9:31, the police desk at Newark Airport advised that they “absolutely” evac- uate.The third party informed the police desk that the employees had previ- ously received contrary advice from the FDNY, which could only have come via 911. These workers were not trapped, yet unlike most occupants on the upper floors, they had chosen not to descend immediately after impact.They eventually began to descend the stairs, but most of them died in the collapse of the North Tower.97

All civilians who reached the lobby were directed by NYPD and PAPD offi- cers into the concourse, where other police officers guided them to exit the concourse and complex to the north and east so that they might avoid falling debris and victims.98

By 9:55, only a few civilians were descending above the 25th floor in stair-

well B; these primarily were injured, handicapped, elderly, or severely over- weight civilians, in some cases being assisted by other civilians.99

By 9:59, tenants from the 91st floor had already descended the stairs and exited the concourse. However, a number of civilians remained in at least stair- well C, approaching lower floors. Other evacuees were killed earlier by debris falling on the street.100

FDNY Response

Increased Mobilization. Immediately after the second plane hit, the FDNY Chief of Department called a second fifth alarm.101

By 9:15, the number of FDNY personnel en route to or present at the scene was far greater than the commanding chiefs at the scene had requested. Five factors account for this disparity. First, while the second fifth alarm had called for 20 engine and 8 ladder companies, in fact 23 engine and 13 ladder com- panies were dispatched. Second, several other units self-dispatched. Third, because the attacks came so close to the 9:00 shift change, many firefighters just going off duty were given permission by company officers to “ride heavy” and became part of those on-duty teams, under the leadership of that unit’s officer. Fourth, many off-duty firefighters responded from firehouses separately from the on-duty unit (in some cases when expressly told not to) or from home.The arrival of personnel in excess of that dispatched was particularly pro- nounced in the department’s elite units. Fifth, numerous additional FDNY per- sonnel—such as fire marshals and firefighters in administrative positions—who lacked a predetermined operating role also reported to the WTC.102

The Repeater System. Almost immediately after the South Tower was hit, senior FDNY chiefs in the North Tower lobby huddled to discuss strategy for the operations in the two towers. Of particular concern to the chiefs—in light of FDNY difficulties in responding to the 1993 bombing—was communica- tions capability. One of the chiefs recommended testing the repeater channel to see if it would work.103

Earlier, an FDNY chief had asked building personnel to activate the repeater channel, which would enable greatly-enhanced FDNY portable radio communications in the high-rises. One button on the repeater system activa- tion console in the North Tower was pressed at 8:54, though it is unclear by whom.As a result of this activation, communication became possible between FDNY portable radios on the repeater channel. In addition, the repeater’s mas- ter handset at the fire safety desk could hear communications made by FDNY portable radios on the repeater channel. The activation of transmission on the master handset required, however, that a second button be pressed. That sec- ond button was never activated on the morning of September 11.104

At 9:05, FDNY chiefs tested the WTC complex’s repeater system. Because the second button had not been activated, the chief on the master handset could

not transmit. He was also apparently unable to hear another chief who was attempting to communicate with him from a portable radio, either because of a technical problem or because the volume was turned down on the console (the normal setting when the system was not in use). Because the repeater channel seemed inoperable—the master handset appeared unable to transmit or receive communications—the chiefs in the North Tower lobby decided not to use it.The repeater system was working at least partially, however, on portable FDNY radios, and firefighters subsequently used repeater channel 7 in the South Tower.105

FDNY North Tower Operations. Command and control decisions were affected by the lack of knowledge of what was happening 30, 60, 90, and 100 floors above. According to one of the chiefs in the lobby, “One of the most critical things in a major operation like this is to have information.We didn’t have a lot of information coming in.We didn’t receive any reports of what was seen from the [NYPD] helicopters. It was impossible to know how much dam- age was done on the upper floors, whether the stairwells were intact or not.”106 According to another chief present, “People watching on TV certainly had more knowledge of what was happening a hundred floors above us than we did in the lobby. … [W]ithout critical information coming in . . . it’s very dif- ficult to make informed, critical decisions[.]”107

As a result, chiefs in the lobby disagreed over whether anyone at or above the impact zone possibly could be rescued, or whether there should be even limited firefighting for the purpose of cutting exit routes through fire zones.108 Many units were simply instructed to ascend toward the impact zone and report back to the lobby via radio. Some units were directed to assist specific groups of individuals trapped in elevators or in offices well below the impact zone. One FDNY company successfully rescued some civilians who were trapped on the 22nd floor as a result of damage caused by the initial fireball.109 An attempt was made to track responding units’ assignments on a magnetic board, but the number of units and individual firefighters arriving in the lobby made this an overwhelming task.As the fire companies were not advised to the contrary, they followed protocol and kept their radios on tactical channel 1, which would be monitored by the chiefs in the lobby. Those battalion chiefs who would climb would operate on a separate command channel, which also

would be monitored by the chiefs in the lobby.110

Fire companies began to ascend stairwell B at approximately 9:07, laden with about 100 pounds of heavy protective clothing, self-contained breathing apparatuses, and other equipment (including hoses for engine companies and heavy tools for ladder companies).111

Firefighters found the stairways they entered intact, lit, and clear of smoke. Unbeknownst to the lobby command post, one battalion chief in the North Tower found a working elevator, which he took to the 16th floor before begin- ning to climb.112

In ascending stairwell B, firefighters were passing a steady and heavy stream of descending civilians. Firemen were impressed with the composure and total lack of panic shown by almost all civilians. Many civilians were in awe of the firefighters and found their mere presence to be calming.113

Firefighters periodically stopped on particular floors and searched to ensure that no civilians were still on it. In a few instances healthy civilians were found on floors, either because they still were collecting personal items or for no apparent reason; they were told to evacuate immediately. Firefighters deputized healthy civilians to be in charge of others who were struggling or injured.114 Climbing up the stairs with heavy protective clothing and equipment was hard work even for physically fit firefighters.As firefighters began to suffer vary-

ing levels of fatigue, some became separated from others in their unit.115

At 9:32, a senior chief radioed all units in the North Tower to return to the lobby, either because of a false report of a third plane approaching or because of his judgment about the deteriorating condition of the building. Once the rumor of the third plane was debunked, other chiefs continued operations, and there is no evidence that any units actually returned to the lobby. At the same time, a chief in the lobby was asked to consider the possibility of a rooftop res- cue but was unable to reach FDNY dispatch by radio or phone. Out on West Street, however, the FDNY Chief of Department had already dismissed any rooftop rescue as impossible.116

As units climbed higher, their ability to communicate with chiefs on tacti- cal 1 became more limited and sporadic, both because of the limited effective- ness of FDNY radios in high-rises and because so many units on tactical 1 were trying to communicate at once. When attempting to reach a particular unit, chiefs in the lobby often heard nothing in response.117

Just prior to 10:00, in the North Tower one engine company had climbed to the 54th floor, at least two other companies of firefighters had reached the sky lobby on the 44th floor, and numerous units were located between the 5th and 37th floors.118

FDNY South Tower and Marriott Hotel Operations. Immediately after the repeater test, a senior chief and a battalion chief commenced operations in the South Tower lobby. Almost at once they were joined by an OEM field responder.They were not, however, joined right away by a sizable number of fire companies, as units that had been in or en route to the North Tower lobby at 9:03 were not reallocated to the South Tower.119

A battalion chief and a ladder company found a working elevator to the 40th floor and from there proceeded to climb stairwell B. Another ladder company arrived soon thereafter, and began to rescue civilians trapped in an elevator between the first and second floors. The senior chief in the lobby expressed frustration about the lack of units he initially had at his disposal for South Tower operations.120

Unlike the commanders in the North Tower, the senior chief in the lobby

and the ascending battalion chief kept their radios on repeater channel 7. For the first 15 minutes of the operations, communications among them and the ladder company climbing with the battalion chief worked well. Upon learn- ing from a company security official that the impact zone began at the 78th floor, a ladder company transmitted this information, and the battalion chief directed an engine company staged on the 40th floor to attempt to find an ele- vator to reach that upper level.121

To our knowledge, no FDNY chiefs outside the South Tower realized that the repeater channel was functioning and being used by units in that tower. The senior chief in the South Tower lobby was initially unable to communi- cate his requests for more units to chiefs either in the North Tower lobby or at the outdoor command post.122

From approximately 9:21 on, the ascending battalion chief was unable to reach the South Tower lobby command post because the senior chief in the lobby had ceased to communicate on repeater channel 7. The vast majority of units that entered the South Tower did not communicate on the repeater chan- nel.123

The first FDNY fatality of the day occurred at approximately 9:30, when a civilian landed on and killed a fireman near the intersection of West and Lib- erty streets.124

By 9:30, chiefs in charge of the South Tower still were in need of additional companies. Several factors account for the lag in response. First, only two units that had been dispatched to the North Tower prior to 9:03 reported immedi- ately to the South Tower. Second, units were not actually sent until approxi- mately five minutes after the FDNY Chief of Department ordered their dispatch. Third, those units that had been ordered at 8:53 to stage at the Brooklyn-Battery Tunnel—and thus very close to the WTC complex—were not dispatched after the plane hit the South Tower. Fourth, units parked fur- ther north on West Street, then proceeded south on foot and stopped at the overall FDNY command post on West Street, where in some cases they were told to wait. Fifth, some units responded directly to the North Tower. (Indeed, radio communications indicated that in certain cases some firemen believed that the South Tower was 1 WTC when in fact it was 2 WTC.) Sixth, some units couldn’t find the staging area (at West Street south of Liberty) for the South Tower. Finally, the jumpers and debris that confronted units attempting to enter the South Tower from its main entrance on Liberty Street caused some units to search for indirect ways to enter that tower, most often through the Marriott Hotel, or simply to remain on West Street.125

A chief at the overall outdoor command post was under the impression that he was to assist in lobby operations of the South Tower, and in fact his aide already was in that lobby. But because of his lack of familiarity with the WTC complex and confusion over how to get to there, he instead ended up in the Marriott at about 9:35. Here he came across about 14 units, many of which had been trying to find safe access to the South Tower. He directed them to

secure the elevators and conduct search-and-rescue operations on the upper floors of the Marriott. Four of these companies searched the spa on the hotel’s top floor—the 22nd floor—for civilians, and found none.126

Feeling satisfied with the scope of the operation in the Marriott, the chief in the lobby there directed some units to proceed to what he thought was the South Tower. In fact, he pointed them to the North Tower. Three of the FDNY companies who had entered the North Tower from the Marriott found a work- ing elevator in a bank at the south end of the lobby, which they took to the 23rd floor.127

In response to the shortage of units in the South Tower, at 9:37 an addi- tional second alarm was requested by the chief at the West and Liberty streets staging area. At this time, the units that earlier had been staged on the Brook- lyn side of the Brooklyn-Battery Tunnel were dispatched to the South Tower; some had gone through the tunnel already and had responded to the Marriott, not the South Tower.128

Between 9:45 and 9:58, the ascending battalion chief continued to lead FDNY operations on the upper floors of the South Tower.At 9:50, an FDNY ladder company encountered numerous seriously injured civilians on the 70th floor.With the assistance of a security guard, at 9:53 a group of civilians trapped in an elevator on the 78th-floor sky lobby were found by an FDNY company. They were freed from the elevator at 9:58. By that time the battalion chief had reached the 78th floor on stairwell A; he reported that it looked open to the 79th floor, well into the impact zone. He also reported numerous civilian fatal- ities in the area.129

FDNY Command and Control Outside the Towers. The overall com- mand post consisted of senior chiefs, commissioners, the field communications van (Field Comm), numerous units that began to arrive after the South Tower was hit, and EMS chiefs and personnel.130

Field Comm’s two main functions were to relay information between the overall operations command post and FDNY dispatch and to track all units operating at the scene on a large magnetic board. Both of these missions were severely compromised by the magnitude of the disaster on September 11. First, the means of transmitting information were unreliable. For example, while FDNY dispatch advised Field Comm that 100 people were reported via 911 to be trapped on the 105th floor of the North Tower, and Field Comm then attempted to convey that report to chiefs at the outdoor com- mand post, this information did not reach the North Tower lobby. Second, Field Comm’s ability to keep track of which units were operating where was limited, because many units reported directly to the North Tower, the South Tower, or the Marriott.Third, efforts to track units by listening to tactical 1 were severely hampered by the number of units using that channel; as many people tried to speak at once, their transmissions overlapped and often became indecipherable. In the opinion of one of the members of the Field

Comm group, tactical 1 simply was not designed to handle the number of units operating on it that morning.131

The primary Field Comm van had access to the NYPD’s Special Opera- tions channel (used by NYPD Aviation), but it was in the garage for repairs on September 11.The backup van lacked that capability.132

The Chief of Department, along with civilian commissioners and senior EMS chiefs, organized ambulances on West Street to expedite the transport of injured civilians to hospitals.133

To our knowledge, none of the chiefs present believed that a total collapse of either tower was possible. One senior chief did articulate his concern that upper floors could begin to collapse in a few hours, and that firefighters thus should not ascend above floors in the 60s.That opinion was not conveyed to chiefs in the North Tower lobby, and there is no evidence that it was conveyed to chiefs in the South Tower lobby either.134

Although the Chief of Department had general authority over operations, tactical decisions remained the province of the lobby commanders. The highest-ranking officer in the North Tower was responsible for communicat- ing with the Chief of Department. They had two brief conversations. In the first, the senior lobby chief gave the Chief of Department a status report and confirmed that this was a rescue, not firefighting, operation. In the second con- versation, at about 9:45, the Chief of Department suggested that given how the North Tower appeared to him, the senior lobby chief might want to consider evacuating FDNY personnel.135

At 9:46, the Chief of Department called an additional fifth alarm, and at 9:54 an additional 20 engine and 6 ladder companies were sent to the WTC. As a result, more than one-third of all FDNY companies now had been dispatched to the WTC.At about 9:57, an EMS paramedic approached the FDNY Chief of Department and advised that an engineer in front of 7 WTC had just remarked that the Twin Towers in fact were in imminent danger of a total collapse.136

NYPD Response

Immediately after the second plane hit, the Chief of Department of the NYPD ordered a second Level 4 mobilization, bringing the total number of NYPD officers responding to close to 2,000.137

The NYPD Chief of Department called for Operation Omega, which required the protection of sensitive locations around the city. NYPD headquar- ters were secured and all other government buildings were evacuated.138

The ESU command post at Church and Vesey streets coordinated all NYPD ESU rescue teams.After the South Tower was hit, the ESU officer running this command post decided to send one ESU team (each with approximately six police officers) up each of the Twin Towers’ stairwells.While he continued to monitor the citywide SOD channel, which NYPD helicopters were using, he also monitored the point-to-point tactical channel that the ESU teams climb- ing in the towers would use.139

The first NYPD ESU team entered the West Street–level lobby of the North Tower and prepared to begin climbing at about 9:15 A.M. They attempted to check in with the FDNY chiefs present, but were rebuffed. OEM personnel did not intervene.The ESU team began to climb the stairs. Shortly thereafter, a second NYPD ESU team entered the South Tower.The OEM field respon- der present ensured that they check in with the FDNY chief in charge of the lobby, and it was agreed that the ESU team would ascend and support FDNY personnel.140

A third ESU team subsequently entered the North Tower at its elevated mezzanine lobby level and made no effort to check in with the FDNY com- mand post. A fourth ESU team entered the South Tower. By 9:59, a fifth ESU team was next to 6 WTC and preparing to enter the North Tower.141

By approximately 9:50, the lead ESU team had reached the 31st floor, observing that there appeared to be no more civilians still descending. This ESU team encountered a large group of firefighters and administered oxygen to some of them who were exhausted.142

At about 9:56, the officer running the ESU command post on Church and Vesey streets had a final radio communication with one of the ESU teams in the South Tower. The team then stated that it was ascending via stairs, was somewhere in the 20s, and was making slow progress because of the numer- ous descending civilians crowding the stairwell.143

Three plainclothes NYPD officers without radios or protective gear had begun ascending either stairwell A or C of the North Tower.They began check- ing every other floor above the 12th for civilians. Only occasionally did they find any, and in those few cases they ordered the civilians to evacuate imme- diately.While checking floors, they used office phones to call their superiors. In one phone call an NYPD chief instructed them to leave the North Tower, but they refused to do so.As they climbed higher, they encountered increasing smoke and heat. Shortly before 10:00 they arrived on the 54th floor.144

Throughout this period (9:03 to 9:59), a group of NYPD and Port Author- ity police officers, as well as two Secret Service agents, continued to assist civil- ians leaving the North Tower. They were positioned around the mezzanine lobby level of the North Tower, directing civilians leaving stairwells A and C to evacuate down an escalator to the concourse.The officers instructed those civilians who seemed composed to evacuate the complex calmly but rapidly. Other civilians exiting the stairs who were either injured or exhausted collapsed at the foot of these stairs; officers then assisted them out of the building.145

When civilians reached the concourse, another NYPD officer stationed at the bottom of the escalator directed them to exit through the concourse to the north and east and then out of the WTC complex.This exit route ensured that civilians would not be endangered by falling debris and people on West Street, on the plaza between the towers, and on Liberty Street.146

Some officers positioned themselves at the top of a flight of stairs by 5 WTC that led down into the concourse, going into the concourse when necessary

to evacuate injured or disoriented civilians. Numerous other NYPD officers were stationed throughout the concourse, assisting burned, injured, and disori- ented civilians, as well as directing all civilians to exit to the north and east. NYPD officers were also in the South Tower lobby to assist in civilian evacu- ation. NYPD officers stationed on Vesey Street between West Street and Church Street urged civilians not to remain in the area and instead to keep walking north.147

At 9:06, the NYPD Chief of Department instructed that no units were to land on the roof of either tower. At about 9:30, one of the helicopters present advised that a rooftop evacuation still would not be possible. One NYPD hel- icopter pilot believed one portion of the North Tower roof to be free enough of smoke that a hoist could be lowered in order to rescue people, but there was no one on the roof. This pilot’s helicopter never attempted to hover directly over the tower. Another helicopter did attempt to do so, and its pilot stated that the severity of the heat from the jet fuel–laden fire in the North Tower would have made it impossible to hover low enough for a rescue, because the high temperature would have destabilized the helicopter.148

At 9:51, an aviation unit warned units of large pieces of debris hanging from the building. Prior to 9:59, no NYPD helicopter pilot predicted that either tower would collapse.149

Interaction of 911 Calls and NYPD Operations. At 9:37, a civilian on the 106th floor of the South Tower reported to a 911 operator that a lower floor—the “90-something floor”—was collapsing. This information was conveyed inaccurately by the 911 operator to an NYPD dispatcher.The dis- patcher further confused the substance of the 911 call by telling NYPD offi- cers at the WTC complex that “the 106th floor is crumbling” at 9:52, 15 minutes after the 911 call was placed. The NYPD dispatcher conveyed this message on the radio frequency used in precincts in the vicinity of the WTC and subsequently on the Special Operations Division channel, but not on City Wide channel 1.150

PAPD Response

Initial responders from outside PAPD commands proceeded to the police desk in 5 WTC or to the fire safety desk in the North Tower lobby. Some officers were then assigned to assist in stairwell evacuations; others were assigned to expedite evacuation in the plaza, concourse, and PATH station.As information was received of civilians trapped above ground-level floors of the North Tower, other PAPD officers were instructed to climb to those floors for rescue efforts. Still others began climbing toward the impact zone.151

At 9:11, the PAPD Superintendent and an inspector began walking up stair- well B of the North Tower to assess damage near and in the impact zone.The PAPD Chief and several other PAPD officers began ascending a stairwell in

order to reach the Windows on the World restaurant on the 106th floor, from which calls had been made to the PAPD police desk reporting at least 100 peo- ple trapped.152

Many PAPD officers from different commands responded on their own ini- tiative. By 9:30, the PAPD central police desk requested that responding offi- cers meet at West and Vesey and await further instructions. In the absence of a predetermined command structure to deal with an incident of this magnitude, a number of PAPD inspectors, captains, and lieutenants stepped forward at around 9:30 to formulate an on-site response plan. They were hampered by not knowing how many officers were responding to the site and where those officers were operating. Many of the officers who responded to this command post lacked suitable protective equipment to enter the complex.153

By 9:58, one PAPD officer had reached the 44th-floor sky lobby of the North Tower.Also in the North Tower, one team of PAPD officers was in the mid-20s and another was in the lower 20s. Numerous PAPD officers were also climbing in the South Tower, including the PAPD ESU team. Many PAPD officers were on the ground floors of the complex—some assisting in evacuation, others man- ning the PAPD desk in 5 WTC or assisting at lobby command posts.154

OEM Response

After the South Tower was hit, OEM senior leadership decided to remain in its “bunker” and continue conducting operations, even though all civilians had been evacuated from 7 WTC. At approximately 9:30, a senior OEM official ordered the evacuation of the facility, after a Secret Service agent in 7 WTC advised him that additional commercial planes were not accounted for. Prior to its evacuation, no outside agency liaisons had reached OEM. OEM field responders were stationed in each tower’s lobby, at the FDNY overall com- mand post, and, at least for some period of time, at the NYPD command post at Church and Vesey.155

Summary

The emergency response effort escalated with the crash of United 175 into the South Tower. With that escalation, communications as well as command and control became increasingly critical and increasingly difficult. First responders assisted thousands of civilians in evacuating the towers, even as incident com- manders from responding agencies lacked knowledge of what other agencies and, in some cases, their own responders were doing.

From 9:59 until 10:28 A.M.

At 9:58:59, the South Tower collapsed in ten seconds, killing all civilians and emergency personnel inside, as well a number of individuals—both first responders and civilians—in the concourse, in the Marriott, and on neighbor- ing streets.The building collapsed into itself, causing a ferocious windstorm and

creating a massive debris cloud. The Marriott hotel suffered significant dam- age as a result of the collapse of the South Tower.156

Civilian Response in the North Tower

The 911 calls placed from most locations in the North Tower grew increas- ingly desperate as time went on.As late as 10:28, people remained alive in some locations, including on the 92nd and 79th floors. Below the impact zone, it is likely that most civilians who were physically and emotionally capable of descending had exited the tower.The civilians who were nearing the bottom of stairwell C were assisted out of the building by NYPD, FDNY, and PAPD personnel. Others, who experienced difficulty evacuating, were being helped by first responders on lower floors.157

FDNY Response

Immediate Impact of the Collapse of the South Tower. The FDNY overall command post and posts in the North Tower lobby, the Marriott lobby, and the staging area on West Street south of Liberty all ceased to operate upon the collapse of the South Tower, as did EMS staging areas, because of their prox- imity to the building.158

Those who had been in the North Tower lobby had no way of knowing that the South Tower had suffered a complete collapse. Chiefs who had fled from the overall command post on the west side of West Street took shelter in the underground parking garage at 2 World Financial Center and were not available to influence FDNY operations for the next ten minutes or so.159

When the South Tower collapsed, firefighters on upper floors of the North Tower heard a violent roar, and many were knocked off their feet; they saw debris coming up the stairs and observed that the power was lost and emer- gency lights activated. Nevertheless, those firefighters not standing near win- dows facing south had no way of knowing that the South Tower had collapsed; many surmised that a bomb had exploded, or that the North Tower had suf- fered a partial collapse on its upper floors.160

We do not know whether the repeater channel continued to function after 9:59.161

Initial Evacuation Instructions and Communications. The South Tower’s total collapse was immediately communicated on the Manhattan dis- patch channel by an FDNY boat on the Hudson River; but to our knowledge, no one at the site received this information, because every FDNY command post had been abandoned—including the overall command post, which included the Field Comm van. Despite his lack of knowledge of what had hap- pened to the South Tower, a chief in the process of evacuating the North Tower lobby sent out an order within a minute of the collapse:“Command to all units in Tower 1, evacuate the building.”Another chief from the North Tower lobby soon followed with an additional evacuation order issued on tactical 1.162

Evacuation orders did not follow the protocol for giving instructions when a building’s collapse may be imminent—a protocol that includes constantly repeating “Mayday, Mayday, Mayday”—during the 29 minutes between the fall of the South Tower and that of the North Tower. In addition, most of the evac- uation instructions did not mention that the South Tower had collapsed. How- ever, at least three firefighters heard evacuation instructions which stated that the North Tower was in danger of “imminent collapse.”163

FDNY Personnel above the Ground Floors of the North Tower. Within minutes, some firefighters began to hear evacuation orders over tactical 1. At least one chief also gave the evacuation instruction on the command channel used only by chiefs in the North Tower, which was much less crowded.164

At least two battalion chiefs on upper floors of the North Tower—one on the 23rd floor and one on the 35th floor—heard the evacuation instruction on the command channel and repeated it to everyone they came across.The chief on the 23rd floor apparently aggressively took charge to ensure that all fire- fighters on the floors in the immediate area were evacuating. The chief on the 35th floor also heard a separate radio communication stating that the South Tower had collapsed (which the chief on the 23rd floor may have heard as well). He subsequently acted with a sense of urgency, and some firefighters heard the evacuation order for the first time when he repeated it on tactical 1.This chief also had a bullhorn and traveled to each of the stairwells and shouted the evac- uation order:“All FDNY, get the fuck out!”As a result of his efforts, many fire- fighters who had not been in the process of evacuating began to do so.165

Other firefighters did not receive the evacuation transmissions, for one of four reasons: First, some FDNY radios did not pick up the transmission because of the difficulties of radio communications in high-rises. Second, the numbers trying to use tactical 1 after the South Tower collapsed may have drowned out some evacuation instructions. According to one FDNY lieutenant who was on the 31st floor of the North Tower at the time, “[Tactical] channel 1 just might have been so bogged down that it may have been impossible to get that order through.”166 Third, some firefighters in the North Tower were off-duty and did not have radios. Fourth, some firefighters in the North Tower had been dispatched to the South Tower and likely were on the different tactical chan- nel assigned to that tower.167

FDNY personnel in the North Tower who received the evacuation orders did not respond uniformly. Some units—including one whose officer knew that the South Tower had collapsed—either delayed or stopped their evacua- tion in order to assist nonambulatory civilians. Some units whose members had become separated during the climb attempted to regroup so they could descend together. Some units began to evacuate but, according to eyewitnesses, did not hurry. At least several firefighters who survived believed that they and others would have evacuated more urgently had they known of the South Tower’s complete collapse. Other firefighters continued to sit and rest on floors

while other companies descended past them and reminded them that they were supposed to evacuate. Some firefighters were determined not to leave the build- ing while other FDNY personnel remained inside and, in one case, convinced others to remain with them. In another case, firefighters had successfully descended to the lobby, where another firefighter then persuaded them to reas- cend in order to look for specific FDNY personnel.168

Other FDNY personnel did not hear the evacuation order on their radio but were advised orally to leave the building by other firefighters and police who were themselves evacuating.169

By 10:24, approximately five FDNY companies reached the bottom of stair- well B and entered the North Tower lobby.They stood in the lobby for more than a minute, not certain what to do, as no chiefs were present. Finally, one firefighter—who had earlier seen from a window that the South Tower had col- lapsed—urged that they all leave, as this tower could fall as well.The units then proceeded to exit onto West Street.While they were doing so, the North Tower began its pancake collapse, killing some of these men.170

Other FDNY Personnel. The Marriott Hotel suffered significant damage in the collapse of the South Tower.Those in the lobby were knocked down and enveloped in the darkness of a debris cloud. Some were hurt but could walk. Others were more severely injured, and some were trapped. Several firefight- ers came across a group of about 50 civilians who had been taking shelter in the restaurant and assisted them in evacuating. Up above, at the time of the South Tower’s collapse four companies were descending the stairs single file in a line of approximately 20 men. Four survived.171

At the time of the South Tower’s collapse, two FDNY companies were either at the eastern side of the North Tower lobby, near the mall concourse, or actu- ally in the mall concourse, trying to reach the South Tower. Many of these men were thrown off their feet by the collapse of the South Tower; they then attempted to regroup in the darkness of the debris cloud and evacuate civil- ians and themselves, not knowing that the South Tower had collapsed. Several of these firefighters subsequently searched the PATH station below the con- course—unaware that the PAPD had cleared the area of all civilians by 9:19.172 At about 10:15, the FDNY Chief of Department and the Chief of Safety, who had returned to West Street from the parking garage, confirmed that the South Tower had collapsed.The Chief of Department issued a radio order for all units to evacuate the North Tower, repeating it about five times. He then directed that the FDNY command post be moved further north on West Street and told FDNY units in the area to proceed north on West Street toward Chambers Street. At approximately 10:25, he radioed for two ladder compa- nies to respond to the Marriott, where he was aware that both FDNY person-

nel and civilians were trapped.173

Many chiefs, including several of those who had been in the North Tower lobby, did not learn that the South Tower had collapsed until 30 minutes or

more after the event. According to two eyewitnesses, however, one senior FDNY chief who knew that the South Tower had collapsed strongly expressed the opinion that the North Tower would not collapse, because unlike the South Tower, it had not been hit on a corner.174

After the South Tower collapsed, some firefighters on the streets neighbor- ing the North Tower remained where they were or came closer to the North Tower. Some of these firefighters did not know that the South Tower had col- lapsed, but many chose despite that knowledge to remain in an attempt to save additional lives. According to one such firefighter, a chief who was preparing to mount a search-and-rescue mission in the Marriott, “I would never think of myself as a leader of men if I had headed north on West Street after [the] South Tower collapsed.” Just outside the North Tower on West Street one fire- fighter was directing others exiting the building, telling them when no jumpers were coming down and it was safe to run out. A senior chief had grabbed an NYPD bullhorn and was urging firefighters exiting onto West Street to continue running north, well away from the WTC. Three of the most senior and respected members of the FDNY were involved in attempting to rescue civilians and firefighters from the Marriott.175

NYPD Response

A member of the NYPD Aviation Unit radioed that the South Tower had col- lapsed immediately after it happened, and further advised that all people in the WTC complex and nearby areas should be evacuated. At 10:04, NYPD avia- tion reported that the top 15 stories of the North Tower “were glowing red” and that they might collapse. At 10:08, a helicopter pilot warned that he did not believe the North Tower would last much longer.176

Immediately after the South Tower collapsed, many NYPD radio frequen- cies became overwhelmed with transmissions relating to injured, trapped, or missing officers. As a result, NYPD radio communications became strained on most channels. Nevertheless, they remained effective enough for the two clos- est NYPD mobilization points to be moved further from the WTC at 10:06.177 Just like most firefighters, the ESU rescue teams in the North Tower had no idea that the South Tower had collapsed. However, by 10:00 the ESU officer running the command post at Church and Vesey ordered the evacuation of all ESU units from the WTC complex.This officer, who had observed the South Tower collapse, reported it to ESU units in the North Tower in his evacuation

instruction.178

This instruction was clearly heard by the two ESU units already in the North Tower and the other ESU unit preparing to enter the tower.The ESU team on the 31st floor found the full collapse of the South Tower so unfath- omable that they radioed back to the ESU officer at the command post and asked him to repeat his communication. He reiterated his urgent message.179

The ESU team on the 31st floor conferred with the FDNY personnel there to ensure that they, too, knew that they had to evacuate, then proceeded down

stairwell B. During the descent, they reported seeing many firefighters who were resting and did not seem to be in the process of evacuating.They further reported advising these firefighters to evacuate, but said that at times they were not acknowledged. In the opinion of one of the ESU officers, some of these firefighters essentially refused to take orders from cops. At least one firefighter who was in the North Tower has supported that assessment, stating that he was not going to take an evacuation instruction from a cop that morning. How- ever, another firefighter reports that ESU officers ran past him without advis- ing him to evacuate.180

The ESU team on the 11th floor began descending stairwell C after receiv- ing the evacuation order. Once near the mezzanine level—where stairwell C ended—this team spread out in chain formation, stretching from several floors down to the mezzanine itself.They used their flashlights to provide a path of beacons through the darkness and debris for civilians climbing down the stairs. Eventually, when no one else appeared to be descending, the ESU team exited the North Tower and ran one at a time to 6 WTC, dodging those who still were jumping from the upper floors of the North Tower by acting as spotters for each other.They remained in the area, conducting additional searches for civilians; all but two of them died.181

After surviving the SouthTower’s collapse,the ESU team that had been prepar- ing to enter the North Tower spread into chain formation and created a path for civilians (who had exited from the NorthTower mezzanine) to evacuate theWTC complex by descending the stairs on the north side of 5 and 6 WTC, which led down toVesey Street.They remained at this post until the North Tower collapsed, yet all survived.182

The three plainclothes NYPD officers who had made it up to the 54th floor of the North Tower felt the building shake violently at 9:59 as the South Tower collapsed (though they did not know the cause). Immediately thereafter, they were joined by three firefighters from an FDNY engine company. One of the firefighters apparently heard an evacuation order on his radio, but responded in a return radio communication,“We’re not fucking coming out!” However, the firefighters urged the police officers to descend because they lacked the protective gear and equipment needed to handle the increasing smoke and heat.The police officers reluctantly began descending, checking that the lower floors were clear of civilians.They proceeded down stairwell B, poking their heads into every floor and briefly looking for civilians.183

Other NYPD officers helping evacuees on the mezzanine level of the North Tower were enveloped in the debris cloud that resulted from the South Tower’s collapse.They struggled to regroup in the darkness and to evacuate both them- selves and civilians they encountered.At least one of them died in the collapse of the North Tower. At least one NYPD officer from this area managed to evac- uate out toward 5 WTC, where he teamed up with a Port Authority police officer and acted as a spotter in advising the civilians who were still exiting

when they could safely run from 1 WTC to 5 WTC and avoid being struck by people and debris falling from the upper floors.184

At the time of the collapse of the South Tower, there were numerous NYPD officers in the concourse, some of whom are believed to have died there. Those who survived struggled to evacuate themselves in darkness, assisting civilians as they exited the concourse in all directions.185

Port Authority Response

The collapse of the South Tower forced the evacuation of the PAPD com- mand post on West and Vesey, compelling PAPD officers to move north. There is no evidence that PAPD officers without WTC Command radios received an evacuation order by radio. Some of these officers in the North Tower decided to evacuate, either on their own or in consultation with other first responders they came across. Some greatly slowed their own descent in order to assist nonambulatory civilians.186

After 10:28 A.M.

The North Tower collapsed at 10:28:25 A.M., killing all civilians alive on upper floors, an undetermined number below, and scores of first responders. The FDNY Chief of Department, the Port Authority Police Department Superin- tendent, and many of their senior staff were killed. Incredibly, twelve firefight- ers, one PAPD officer, and three civilians who were descending stairwell B of the North Tower survived its collapse.187

On September 11, the nation suffered the largest loss of life—2,973—on its soil as a result of hostile attack in its history. The FDNY suffered 343 fatalities— the largest loss of life of any emergency response agency in history. The PAPD suffered 37 fatalities—the largest loss of life of any police force in history.The NYPD suffered 23 fatalities—the second largest loss of life of any police force in history, exceeded only by the number of PAPD officers lost the same day.188 Mayor Giuliani, along with the Police and Fire commissioners and the OEM director, moved quickly north and established an emergency operations command post at the Police Academy. Over the coming hours, weeks, and months, thousands of civilians and city, state, and federal employees devoted

themselves around the clock to putting New York City back on its feet.189

9.3 EMERGENCY RESPONSE AT THE PENTAGON

If it had happened on any other day, the disaster at the Pentagon would be remembered as a singular challenge and an extraordinary national story.Yet the calamity at the World Trade Center that same morning included catastrophic damage 1,000 feet above the ground that instantly imperiled tens of thousands of people.The two experiences are not comparable. Nonetheless, broader les-

The Twin Towers following the impact of American Airlines Flight 11 and United Airlines Flight 175

The Pentagon, after being struck by American Airlines Flight 77

United Airlines Flight 93 crash site, Shanksville, Pennsylvania

sons in integrating multiagency response efforts are apparent when we analyze the response at the Pentagon.

The emergency response at the Pentagon represented a mix of local, state, and federal jurisdictions and was generally effective. It overcame the inherent complications of a response across jurisdictions because the Incident Command System, a formalized management structure for emergency response, was in place in the National Capital Region on 9/11.190

Because of the nature of the event—a plane crash, fire, and partial building collapse—the Arlington County Fire Department served as incident com- mander. Different agencies had different roles. The incident required a major rescue, fire, and medical response from Arlington County at the U.S. military’s headquarters—a facility under the control of the secretary of defense. Since it was a terrorist attack, the Department of Justice was the lead federal agency in charge (with authority delegated to the FBI for operational response). Addi- tionally, the terrorist attack affected the daily operations and emergency management requirements of Arlington County and all bordering and sur- rounding jurisdictions.191

At 9:37, the west wall of the Pentagon was hit by hijacked American Air- lines Flight 77, a Boeing 757. The crash caused immediate and catastrophic damage. All 64 people aboard the airliner were killed, as were 125 people inside the Pentagon (70 civilians and 55 military service members). One hundred six people were seriously injured and transported to area hospitals.192

While no emergency response is flawless, the response to the 9/11 terror- ist attack on the Pentagon was mainly a success for three reasons: first, the strong professional relationships and trust established among emergency responders; second, the adoption of the Incident Command System; and third, the pursuit of a regional approach to response. Many fire and police agencies that responded had extensive prior experience working together on regional events and training exercises. Indeed, at the time preparations were under way at many of these agencies to ensure public safety at the annual meetings of the International Monetary Fund and the World Bank scheduled to be held later that month in Washington, D.C.193

Local, regional, state, and federal agencies immediately responded to the Pentagon attack. In addition to county fire, police, and sheriff ’s departments, the response was assisted by the Metropolitan Washington Airports Authority, Ronald Reagan Washington National Airport Fire Department, Fort Myer Fire Department, the Virginia State Police, the Virginia Department of Emergency Management, the FBI, FEMA, a National Medical Response Team, the Bureau of Alcohol,Tobacco, and Firearms, and numerous military personnel within the Military District of Washington.194

Command was established at 9:41.At the same time, the Arlington County Emergency Communications Center contacted the fire departments of Fair- fax County, Alexandria, and the District of Columbia to request mutual aid.

The incident command post provided a clear view of and access to the crash site, allowing the incident commander to assess the situation at all times.195

At 9:55, the incident commander ordered an evacuation of the Pentagon impact area because a partial collapse was imminent; it occurred at 9:57, and no first responder was injured.196

At 10:15, the incident commander ordered a full evacuation of the com- mand post because of the warning of an approaching hijacked aircraft passed along by the FBI. This was the first of three evacuations caused by reports of incoming aircraft, and the evacuation order was well communicated and well coordinated.197

Several factors facilitated the response to this incident, and distinguish it from the far more difficult task in New York.There was a single incident, and it was not 1,000 feet above ground. The incident site was relatively easy to secure and contain, and there were no other buildings in the immediate area. There was no collateral damage beyond the Pentagon.198

Yet the Pentagon response encountered difficulties that echo those expe- rienced in NewYork. As the “Arlington County: After-Action Report” notes, there were significant problems with both self-dispatching and communica- tions: “Organizations, response units, and individuals proceeding on their own initiative directly to an incident site, without the knowledge and permission of the host jurisdiction and the Incident Commander, complicate the exer- cise of command, increase the risks faced by bonafide responders, and exac- erbate the challenge of accountability.”With respect to communications, the report concludes: “Almost all aspects of communications continue to be prob- lematic, from initial notification to tactical operations. Cellular telephones were of little value…. Radio channels were initially oversaturated.  Pagers

seemed to be the most reliable means of notification when available and used, but most firefighters are not issued pagers.”199

It is a fair inference, given the differing situations in New York City and Northern Virginia, that the problems in command, control, and communica- tions that occurred at both sites will likely recur in any emergency of similar scale. The task looking forward is to enable first responders to respond in a coordinated manner with the greatest possible awareness of the situation.

9.4 ANALYSIS

Like the national defense effort described in chapter 1, the emergency response to the attacks on 9/11 was necessarily improvised. In New York, the FDNY, NYPD, the Port Authority, WTC employees, and the building occu- pants themselves did their best to cope with the effects of an unimaginable catastrophe—unfolding furiously over a mere 102 minutes—for which they were unprepared in terms of both training and mindset. As a result of the

efforts of first responders, assistance from each other, and their own good instincts and goodwill, the vast majority of civilians below the impact zone were able to evacuate the towers.

The National Institute of Standards and Technology has provided a prelim- inary estimation that between 16,400 and 18,800 civilians were in the WTC complex as of 8:46 A.M. on September 11. At most 2,152 individuals died at the WTC complex who were not (1) fire or police first responders, (2) secu- rity or fire safety personnel of the WTC or individual companies, (3) volun- teer civilians who ran to the WTC after the planes’ impact to help others, or

(4) on the two planes that crashed into the Twin Towers. Out of this total num- ber of fatalities, we can account for the workplace location of 2,052 individu- als, or 95.35 percent. Of this number, 1,942 or 94.64 percent either worked or were supposed to attend a meeting at or above the respective impact zones of the Twin Towers; only 110, or 5.36 percent of those who died, worked below the impact zone.While a given person’s office location at the WTC does not definitively indicate where that individual died that morning or whether he or she could have evacuated, these data strongly suggest that the evacuation was a success for civilians below the impact zone.200

Several factors influenced the evacuation on September 11. It was aided greatly by changes made by the Port Authority in response to the 1993 bomb- ing and by the training of both Port Authority personnel and civilians after that time. Stairwells remained lit near unaffected floors; some tenants relied on procedures learned in fire drills to help them to safety; others were guided down the stairs by fire safety officials based in the lobby. Because of damage caused by the impact of the planes, the capability of the sophisticated building systems may have been impaired. Rudimentary improvements, however, such as the addition of glow strips to the handrails and stairs, were credited by some as the reason for their survival. The general evacuation time for the towers dropped from more than four hours in 1993 to under one hour on Septem- ber 11 for most civilians who were not trapped or physically incapable of enduring a long descent.

First responders also played a significant role in the success of the evacua- tion. Some specific rescues are quantifiable, such as an FDNY company’s res- cue of civilians trapped on the 22d floor of the North Tower, or the success of FDNY, PAPD, and NYPD personnel in carrying nonambulatory civilians out of both the North and South Towers. In other instances, intangibles combined to reduce what could have been a much higher death total. It is impossible to measure how many more civilians who descended to the ground floors would have died but for the NYPD and PAPD personnel directing them—via safe exit routes that avoided jumpers and debris—to leave the complex urgently but calmly. It is impossible to measure how many more civilians would have died but for the determination of many members of the FDNY, PAPD, and NYPD to continue assisting civilians after the South Tower collapsed. It is

impossible to measure the calming influence that ascending firefighters had on descending civilians or whether but for the firefighters’ presence the poor behavior of a very few civilians could have caused a dangerous and panicked mob flight. But the positive impact of the first responders on the evacuation came at a tremendous cost of first responder lives lost.201

Civilian and Private-Sector Challenges

The “first” first responders on 9/11, as in most catastrophes, were private- sector civilians. Because 85 percent of our nation’s critical infrastructure is controlled not by government but by the private sector, private-sector civil- ians are likely to be the first responders in any future catastrophes. For that reason, we have assessed the state of private sector and civilian preparedness in order to formulate recommendations to address this critical need. Our rec- ommendations grow out of the experience of the civilians at the World Trade Center on 9/11.

Lack of Protocol for Rooftop Rescues. Civilians at or above the impact zone in the North Tower had the smallest hope of survival. Once the plane struck, they were prevented from descending because of damage to or impass- able conditions in the building’s three stairwells. The only hope for those on the upper floors of the North Tower would have been a swift and extensive air rescue. Several factors made this impossible. Doors leading to the roof were kept locked for security reasons, and damage to software in the security command station prevented a lock release order from taking effect. Even if the doors had not been locked, structural and radiation hazards made the rooftops unsuitable staging areas for a large number of civilians; and even if conditions permitted general helicopter evacuations—which was not the case—only several people could be lifted at a time.

The WTC lacked any plan for evacuation of civilians on upper floors of the WTC in the event that all stairwells were impassable below.

Lack of Comprehensive Evacuation of South Tower Immediately after the North Tower Impact. No decision has been criticized more than the decision of building personnel not to evacuate the South Tower immediately after the North Tower was hit.A firm and prompt evacuation order would likely have led many to safety. Even a strictly “advisory” announcement would not have dissuaded those who decided for themselves to evacuate. The advice to stay in place was understandable, however, when considered in its context. At that moment, no one appears to have thought a second plane could hit the South Tower. The evacuation of thousands of people was seen as inherently dangerous. Additionally, conditions were hazardous in some areas outside the towers.202

Less understandable, in our view, is the instruction given to some civilians

who had reached the lobby to return to their offices. They could have been held in the lobby or perhaps directed through the underground concourse.

Despite the initial advice given over its public-address system, the South Tower was ordered to be evacuated by the FDNY and PAPD within 12 min- utes of the North Tower’s being hit. If not for a second, unanticipated attack, the evacuation presumably would have proceeded.

Impact of Fire Safety Plan and Fire Drills on Evacuation. Once the South Tower was hit, civilians on upper floors wasted time ascending the stairs instead of searching for a clear path down, when stairwell A was at least ini- tially passable. Although rooftop rescues had not been conclusively ruled out, civilians were not informed in fire drills that roof doors were locked, that rooftop areas were hazardous, and that no helicopter evacuation plan existed. In both towers, civilians who were able to reach the stairs and descend were also stymied by the deviations in the stairways and by smoke doors.This con- fusion delayed the evacuation of some and may have obstructed that of others.

The Port Authority has acknowledged that in the future, tenants should be made aware of what conditions they will encounter during descent.

Impact of 911 Calls on Evacuation. The NYPD’s 911 operators and FDNY dispatch were not adequately integrated into the emergency response. In several ways, the 911 system was not ready to cope with a major disaster. These operators and dispatchers were one of the only sources of information for individuals at and above the impact zone of the towers.The FDNY ordered both towers fully evacuated by 8:57, but this guidance was not conveyed to 911 operators and FDNY dispatchers, who for the next hour often continued to advise civilians not to self-evacuate, regardless of whether they were above or below the impact zones. Nor were 911 operators or FDNY dispatchers advised that rooftop rescues had been ruled out.This failure may have been harmful to civilians on the upper floors of the South Tower who called 911 and were not told that their only evacuation hope was to attempt to descend, not to ascend. In planning for future disasters, it is important to integrate those taking 911 calls into the emergency response team and to involve them in providing up- to-date information and assistance to the public.

Preparedness of Individual Civilians. One clear lesson of September 11 is that individual civilians need to take responsibility for maximizing the prob- ability that they will survive, should disaster strike. Clearly, many building occu- pants in the World Trade Center did not take preparedness seriously. Individuals should know the exact location of every stairwell in their work- place. In addition, they should have access at all times to flashlights, which were deemed invaluable by some civilians who managed to evacuate the WTC on September 11.

Challenges Experienced by First Responders

The Challenge of Incident Command. As noted above, in July 2001, Mayor Giuliani updated a directive titled “Direction and Control of Emergen- cies in the City of New York.”The directive designated, for different types of emergencies, an appropriate agency as “Incident Commander”; it would be “responsible for the management of the City’s response to the emergency.” The directive also provided that where incidents are “so multifaceted that no one agency immediately stands out as the Incident Commander, OEM will assign the role of Incident Commander to an agency as the situation demands.”203

To some degree, the Mayor’s directive for incident command was followed on 9/11. It was clear that the lead response agency was the FDNY, and that the other responding local, federal, bistate, and state agencies acted in a supporting role. There was a tacit understanding that FDNY personnel would have pri- mary responsibility for evacuating civilians who were above the ground floors of the Twin Towers, while NYPD and PAPD personnel would be in charge of evacuating civilians from the WTC complex once they reached ground level. The NYPD also greatly assisted responding FDNY units by clearing emer- gency lanes to the WTC.204

In addition, coordination occurred at high levels of command. For exam- ple, the Mayor and Police Commissioner consulted with the Chief of the Department of the FDNY at approximately 9:20.There were other instances of coordination at operational levels, and information was shared on an ad hoc basis. For example, an NYPD ESU team passed the news of their evacuation order to firefighters in the North Tower.205

It is also clear, however, that the response operations lacked the kind of integrated communications and unified command contemplated in the directive. These problems existed both within and among individual responding agencies.

Command and Control within First Responder Agencies. For a uni- fied incident management system to succeed, each participant must have com- mand and control of its own units and adequate internal communications.This was not always the case at the WTC on 9/11.

Understandably lacking experience in responding to events of the magni- tude of the World Trade Center attacks, the FDNY as an institution proved incapable of coordinating the numbers of units dispatched to different points within the 16-acre complex. As a result, numerous units were congregating in the undamaged Marriott Hotel and at the overall command post on West Street by 9:30, while chiefs in charge of the South Tower still were in desperate need of units.With better understanding of the resources already available, additional units might not have been dispatched to the South Tower at 9:37.

The task of accounting for and coordinating the units was rendered diffi- cult, if not impossible, by internal communications breakdowns resulting from

the limited capabilities of radios in the high-rise environment of the WTC and from confusion over which personnel were assigned to which frequency. Fur- thermore, when the South Tower collapsed the overall FDNY command post ceased to operate, which compromised the FDNY’s ability to understand the situation; an FDNY marine unit’s immediate radio communication to FDNY dispatch that the South Tower had fully collapsed was not conveyed to chiefs at the scene.The FDNY’s inability to coordinate and account for the different radio channels that would be used in an emergency of this scale contributed to the early lack of units in the South Tower, whose lobby chief initially could not communicate with anyone outside that tower.206

Though almost no one at 9:50 on September 11 was contemplating an imminent total collapse of the Twin Towers, many first responders and civilians were contemplating the possibility of imminent additional terrorist attacks throughout New York City. Had any such attacks occurred, the FDNY’s response would have been severely compromised by the concentration of so many of its off-duty personnel, particularly its elite personnel, at the WTC.

The Port Authority’s response was hampered by the lack of both standard oper- ating procedures and radios capable of enabling multiple commands to respond in unified fashion to an incident at the WTC. Many officers reporting from the tunnel and airport commands could not hear instructions being issued over the WTC Command frequency. In addition, command and control was complicated by senior Port Authority Police officials becoming directly involved in frontline rescue operations.

The NYPD experienced comparatively fewer internal command and con- trol and communications issues. Because the department has a history of mobi- lizing thousands of officers for major events requiring crowd control, its technical radio capability and major incident protocols were more easily adapted to an incident of the magnitude of 9/11. In addition, its mission that day lay largely outside the towers themselves. Although there were ESU teams and a few individual police officers climbing in the towers, the vast majority of NYPD personnel were staged outside, assisting with crowd control and evacu- ation and securing other sites in the city. The NYPD ESU division had firm command and control over its units, in part because there were so few of them (in comparison to the number of FDNY companies) and all reported to the same ESU command post. It is unclear, however, whether non-ESU NYPD officers operating on the ground floors, and in a few cases on upper floors, of the WTC were as well coordinated.

Significant shortcomings within the FDNY’s command and control capa- bilities were painfully exposed on September 11. To its great credit, the department has made a substantial effort in the past three years to address these.While significant problems in the command and control of the PAPD also were exposed on September 11, it is less clear that the Port Authority has adopted new training exercises or major incident protocols to address these shortcomings.207

Lack of Coordination among First Responder Agencies. Any attempt to establish a unified command on 9/11 would have been further frustrated by the lack of communication and coordination among responding agencies. Cer- tainly, the FDNY was not “responsible for the management of the City’s response to the emergency,” as the Mayor’s directive would have required.The command posts were in different locations, and OEM headquarters, which could have served as a focal point for information sharing, did not play an inte- grating role in ensuring that information was shared among agencies on 9/11, even prior to its evacuation.There was a lack of comprehensive coordination between FDNY, NYPD, and PAPD personnel climbing above the ground floors in the Twin Towers.

Information that was critical to informed decisionmaking was not shared among agencies. FDNY chiefs in leadership roles that morning have told us that their decision making capability was hampered by a lack of information from NYPD aviation. At 9:51 A.M., a helicopter pilot cautioned that “large pieces” of the South Tower appeared to be about to fall and could pose a dan- ger to those below. Immediately after the tower’s collapse, a helicopter pilot radioed that news.This transmission was followed by communications at 10:08, 10:15, and 10:22 that called into question the condition of the North Tower. The FDNY chiefs would have benefited greatly had they been able to com- municate with personnel in a helicopter.

The consequence of the lack of real-time intelligence from NYPD aviation should not be overstated. Contrary to a widely held misperception, no NYPD helicopter predicted the fall of either tower before the South Tower collapsed, and no NYPD personnel began to evacuate the WTC complex prior to that time. Furthermore, the FDNY, as an institution, was in possession of the knowl- edge that the South Tower had collapsed as early as the NYPD, as its fall had been immediately reported by an FDNY boat on a dispatch channel. Because of internal breakdowns within the department, however, this information was not disseminated to FDNY personnel on the scene.

The FDNY, PAPD, and NYPD did not coordinate their units that were searching the WTC complex for civilians. In many cases, redundant searches of specific floors and areas were conducted. It is unclear whether fewer first responders in the aggregate would have been in the Twin Towers if there had been an integrated response, or what impact, if any, redundant searches had on the total number of first responder fatalities.

Whether the lack of coordination between the FDNY and NYPD on Sep- tember 11 had a catastrophic effect has been the subject of controversy. We believe that there are too many variables for us to responsibly quantify those consequences. It is clear that the lack of coordination did not affect adversely the evacuation of civilians. It is equally clear, however, that the Incident Com- mand System did not function to integrate awareness among agencies or to facilitate interagency response.208

If New York and other major cities are to be prepared for future terrorist

attacks, different first responder agencies within each city must be fully coordi- nated, just as different branches of the U.S. military are. Coordination entails a unified command that comprehensively deploys all dispatched police, fire, and other first responder resources.

In May 2004, New York City adopted an emergency response plan that expressly contemplates two or more agencies jointly being lead agency when responding to a terrorist attack but does not mandate a comprehensive and uni- fied incident command that can deploy and monitor all first responder resources from one overall command post. In our judgment, this falls short of an optimal response plan, which requires clear command and control, common training, and the trust that such training creates. The experience of the mili- tary suggests that integrated into such a coordinated response should be a uni- fied field intelligence unit, which should receive and combine information from all first responders—including 911 operators. Such a field intelligence unit could be valuable in large and complex incidents.

Radio Communication Challenges:The Effectiveness and Urgency of Evacuation Instructions. As discussed above, the location of the NYPD ESU command post was crucial in making possible an urgent evacuation order explaining the South Tower’s full collapse. Firefighters most certainly would have benefited from that information.

A separate matter is the varied success at conveying evacuation instructions to personnel in the North Tower after the South Tower’s collapse.The success of NYPD ESU instruction is attributable to a combination of (1) the strength of the radios, (2) the relatively small numbers of individuals using them, and

(3) use of the correct channel by all.

The same three factors worked against successful communication among FDNY personnel. First, the radios’ effectiveness was drastically reduced in the high-rise environment. Second, tactical channel 1 was simply overwhelmed by the number of units attempting to communicate on it at 10:00. Third, some firefighters were on the wrong channel or simply lacked radios altogether.

It is impossible to know what difference it made that units in the North Tower were not using the repeater channel after 10:00. While the repeater channel was at least partially operational before the South Tower collapsed, we do not know whether it continued to be operational after 9:59.

Even without the repeater channel, at least 24 of the at most 32 companies who were dispatched to and actually in the North Tower received the evacu- ation instruction—either via radio or directly from other first responders. Nev- ertheless, many of these firefighters died, either because they delayed their evacuation to assist civilians, attempted to regroup their units, lacked urgency, or some combination of these factors. In addition, many other firefighters not dispatched to the North Tower also died in its collapse. Some had their radios on the wrong channel. Others were off-duty and lacked radios. In view of these

considerations, we conclude that the technical failure of FDNY radios, while a contributing factor, was not the primary cause of the many firefighter fatal- ities in the North Tower.209

The FDNY has worked hard in the past several years to address its radio deficiencies.To improve radio capability in high-rises, the FDNY has internally developed a “post radio” that is small enough for a battalion chief to carry to the upper floors and that greatly repeats and enhances radio signal strength.210 The story with respect to Port Authority police officers in the North Tower

is less complicated; most of them lacked access to the radio channel on which the Port Authority police evacuation order was given. Since September 11, the Port Authority has worked hard to integrate the radio systems of their differ- ent commands.

. . .

The lesson of 9/11 for civilians and first responders can be stated simply: in the new age of terror, they—we—are the primary targets.The losses Amer- ica suffered that day demonstrated both the gravity of the terrorist threat and the commensurate need to prepare ourselves to meet it.

The first responders of today live in a world transformed by the attacks on 9/11. Because no one believes that every conceivable form of attack can be prevented, civilians and first responders will again find themselves on the front lines.We must plan for that eventuality. A rededication to preparedness is per- haps the best way to honor the memories of those we lost that day.

10

WARTIME

After the attacks had occurred, while crisis managers were still sorting out a number of unnerving false alarms, Air Force One flew to Barksdale Air Force Base in Louisiana. One of these alarms was of a reported threat against Air Force One itself, a threat eventually run down to a misunderstood com- munication in the hectic White House Situation Room that morning.1

While the plan at the elementary school had been to return to Washington, by the time Air Force One was airborne at 9:55 A.M. the Secret Service, the President’s advisers, and Vice President Cheney were strongly advising against it. President Bush reluctantly acceded to this advice and, at about 10:10, Air Force One changed course and began heading due west.The immediate objec- tive was to find a safe location—not too far away—where the President could land and speak to the American people.The Secret Service was also interested in refueling the aircraft and paring down the size of the traveling party. The President’s military aide, an Air Force officer, quickly researched the options and, sometime around 10:20, identified Barksdale Air Force Base as an appro- priate interim destination.2

When Air Force One landed at Barksdale at about 11:45, personnel from the local Secret Service office were still en route to the airfield.The motorcade consisted of a military police lead vehicle and a van; the proposed briefing the- ater had no phones or electrical outlets. Staff scrambled to prepare another room for the President’s remarks, while the lead Secret Service agent reviewed the security situation with superiors in Washington.The President completed his statement, which for security reasons was taped and not broadcast live, and the traveling party returned to Air Force One. The next destination was dis- cussed: once again the Secret Service recommended against returning to Wash- ington, and the Vice President agreed. Offutt Air Force Base in Nebraska was chosen because of its elaborate command and control facilities, and because it could accommodate overnight lodging for 50 persons. The Secret Service wanted a place where the President could spend several days, if necessary.3

325

Air Force One arrived at Offutt at 2:50 P.M. At about 3:15, President Bush met with his principal advisers through a secure video teleconference.4 Rice said President Bush began the meeting with the words, “We’re at war,”5 and that Director of Central Intelligence George Tenet said the agency was still assessing who was responsible, but the early signs all pointed to al Qaeda.6 That evening the Deputies Committee returned to the pending presidential direc- tive they had labored over during the summer.7

The secretary of defense directed the nation’s armed forces to Defense Con- dition 3, an increased state of military readiness.8 For the first time in history, all nonemergency civilian aircraft in the United States were grounded, strand- ing tens of thousands of passengers across the country. Contingency plans for the continuity of government and the evacuation of leaders had been imple- mented.9 The Pentagon had been struck; the White House or the Capitol had narrowly escaped direct attack. Extraordinary security precautions were put in place at the nation’s borders and ports.

In the late afternoon, the President overruled his aides’ continuing reluc- tance to have him return to Washington and ordered Air Force One back to Andrews Air Force Base. He was flown by helicopter back to the White House, passing over the still-smoldering Pentagon.At 8:30 that evening, President Bush addressed the nation from the White House. After emphasizing that the first priority was to help the injured and protect against any further attacks, he said: “We will make no distinction between the terrorists who committed these acts and those who harbor them.” He quoted Psalm 23—“though I walk through the valley of the shadow of death . . .” No American, he said,“will ever forget this day.”10

Following his speech, President Bush met again with his National Security Council (NSC), expanded to include Secretary of Transportation Norman Mineta and Joseph Allbaugh, the director of the Federal Emergency Manage- ment Agency. Secretary of State Colin Powell, who had returned from Peru after hearing of the attacks, joined the discussion.They reviewed the day’s events.11

10.1 IMMEDIATE RESPONSES AT HOME

As the urgent domestic issues accumulated,White House Deputy Chief of Staff Joshua Bolten chaired a temporary “domestic consequences” group.12 The agenda in those first days is worth noting, partly as a checklist for future crisis planners. It began with problems of how to help victims and stanch the flow- ing losses to the American economy, such as

  • Organizing federal emergency assistance. One question was what kind of public health advice to give about the air quality in Lower Manhat- tan in the vicinity of the fallen buildings.13
  • Compensating victims.They evaluated legislative options, eventually setting up a federal compensation fund and defining the powers of a special master to run it.
  • Determining federal assistance. On September 13, President Bush promised to provide $20 billion for New York City, in addition to the

$20 billion his budget director had already guessed might be needed for the country as a whole.14

  • Restoring civil aviation. On the morning of September 13, the national airspace reopened for use by airports that met newly impro- vised security standards.
  • Reopening the financial markets. After extraordinary emergency efforts involving the White House, the Treasury Department, and the Securities and Exchange Commission, aided by unprecedented cooperation among the usually competitive firms of the financial industry, the markets reopened on Monday, September 17.15
  • Deciding when and how to return border and port security to more normal operations.
  • Evaluating legislative proposals to bail out the airline industry and cap its liability.

The very process of reviewing these issues underscored the absence of an effective government organization dedicated to assessing vulnerabilities and handling problems of protection and preparedness.Though a number of agen- cies had some part of the task, none had security as its primary mission.

By September 14,Vice President Cheney had decided to recommend, at least as a first step, a new White House entity to coordinate all the relevant agen- cies rather than tackle the challenge of combining them in a new department. This new White House entity would be a homeland security adviser and Homeland Security Council—paralleling the National Security Council sys- tem.Vice President Cheney reviewed the proposal with President Bush and other advisers. President Bush announced the new post and its first occupant— Pennsylvania governor Tom Ridge—in his address to a joint session of Con- gress on September 20.16

Beginning on September 11, Immigration and Naturalization Service agents working in cooperation with the FBI began arresting individuals for immigration violations whom they encountered while following up leads in the FBI’s investigation of the 9/11 attacks. Eventually, 768 aliens were arrested as “special interest” detainees. Some (such as Zacarias Moussaoui) were actu- ally in INS custody before 9/11; most were arrested after. Attorney General John Ashcroft told us that he saw his job in directing this effort as “risk mini- mization,” both to find out who had committed the attacks and to prevent a subsequent attack. Ashcroft ordered all special interest immigration hearings closed to the public, family members, and press; directed government attorneys

to seek denial of bond until such time as they were “cleared” of terrorist con- nections by the FBI and other agencies; and ordered the identity of the detainees kept secret. INS attorneys charged with prosecuting the immigration violations had trouble getting information about the detainees and any terror- ist connections; in the chaos after the attacks, it was very difficult to reach law enforcement officials, who were following up on other leads. The clearance process approved by the Justice Department was time-consuming, lasting an average of about 80 days.17

We have assessed this effort to detain aliens of “special interest.” The detainees were lawfully held on immigration charges. Records indicate that 531 were deported, 162 were released on bond, 24 received some kind of immi- gration benefits, 12 had their proceedings terminated, and 8—one of whom was Moussaoui—were remanded to the custody of the U.S. Marshals Service. The inspector general of the Justice Department found significant problems in the way the 9/11 detainees were treated.18 In response to a request about the counterterrorism benefits of the 9/11 detainee program, the Justice Depart- ment cited six individuals on the special interest detainee list, noting that two (including Moussaoui) were linked directly to a terrorist organization and that it had obtained new leads helpful to the investigation of the 9/11 terrorist attacks.19 A senior al Qaeda detainee has stated that U.S. government efforts after the 9/11 attacks to monitor the American homeland, including review of Muslims’ immigration files and deportation of nonpermanent residents, forced al Qaeda to operate less freely in the United States.20

The government’s ability to collect intelligence inside the United States, and the sharing of such information between the intelligence and law enforcement communities, was not a priority before 9/11. Guidelines on this subject issued in August 2001 by Deputy Attorney General Larry Thompson essentially reca- pitulated prior guidance. However, the attacks of 9/11 changed everything. Less than one week after September 11, an early version of what was to become the Patriot Act (officially, the USA PATRIOT Act) began to take shape.21 A cen- tral provision of the proposal was the removal of “the wall” on information sharing between the intelligence and law enforcement communities (discussed in chapter 3). Ashcroft told us he was determined to take every conceivable action, within the limits of the Constitution, to identify potential terrorists and deter additional attacks.22 The administration developed a proposal that even- tually passed both houses of Congress by large majorities and was signed into law on October 26.23

Flights of Saudi Nationals Leaving the United States

Three questions have arisen with respect to the departure of Saudi nationals from the United States in the immediate aftermath of 9/11:

(1) Did any flights of Saudi nationals take place before national airspace reopened on September 13, 2001? (2) Was there any political interven- tion to facilitate the departure of Saudi nationals? (3) Did the FBI screen Saudi nationals thoroughly before their departure?

First, we found no evidence that any flights of Saudi nationals, domestic or international, took place before the reopening of national airspace on the morning of September 13, 2001.24 To the contrary, every flight we have identified occurred after national airspace reopened.25

Second, we found no evidence of political intervention.We found no evidence that anyone at the White House above the level of Richard Clarke participated in a decision on the departure of Saudi nationals. The issue came up in one of the many video teleconferences of the interagency group Clarke chaired, and Clarke said he approved of how the FBI was dealing with the matter when it came up for interagency discussion at his level. Clarke told us,“I asked the FBI, Dale Watson . . . to handle that, to check to see if that was all right with them, to see if they wanted access to any of these people, and to get back to me.And if they had no objections, it would be fine with me.” Clarke added,“I have no recollection of clearing it with anybody at the White House.”26

Although White House Chief of Staff Andrew Card remembered someone telling him about the Saudi request shortly after 9/11, he said he had not talked to the Saudis and did not ask anyone to do anything about it.The President and Vice President told us they were not aware of the issue at all until it surfaced much later in the media. None of the officials we interviewed recalled any intervention or direction on this matter from any political appointee.27

Third, we believe that the FBI conducted a satisfactory screening of Saudi nationals who left the United States on charter flights.28 The Saudi government was advised of and agreed to the FBI’s requirements that passengers be identified and checked against various databases before the flights departed.29 The Federal Aviation Administration rep- resentative working in the FBI operations center made sure that the

10.2 PLANNING FOR WAR

By late in the evening of September 11, the President had addressed the nation on the terrible events of the day.Vice President Cheney described the Presi- dent’s mood as somber.32 The long day was not yet over.When the larger meet- ing that included his domestic department heads broke up, President Bush chaired a smaller meeting of top advisers, a group he would later call his “war council.”33 This group usually includedVice President Cheney, Secretary of State Powell, Secretary of Defense Donald Rumsfeld, General Hugh Shelton, Vice Chairman of the Joint Chiefs (later to become chairman) General Myers, DCI Tenet, Attorney General Ashcroft, and FBI Director Robert Mueller. From the White House staff, National Security Advisor Condoleezza Rice and Chief of Staff Card were part of the core group, often joined by their deputies, Stephen Hadley and Joshua Bolten.

In this restricted National Security Council meeting, the President said it was a time for self-defense.The United States would punish not just the per- petrators of the attacks, but also those who harbored them. Secretary Powell said the United States had to make it clear to Pakistan, Afghanistan, and the Arab states that the time to act was now. He said we would need to build a coalition.The President noted that the attacks provided a great opportunity to engage Russia and China. Secretary Rumsfeld urged the President and the principals to think broadly about who might have harbored the attackers, including Iraq, Afghanistan, Libya, Sudan, and Iran. He wondered aloud how much evidence the United States would need in order to deal with these coun- tries, pointing out that major strikes could take up to 60 days to assemble.34

President Bush chaired two more meetings of the NSC on September 12. In the first meeting, he stressed that the United States was at war with a new and different kind of enemy.The President tasked principals to go beyond their pre-9/11 work and develop a strategy to eliminate terrorists and punish those who support them.As they worked on defining the goals and objectives of the upcoming campaign, they considered a paper that went beyond al Qaeda to

propose the “elimination of terrorism as a threat to our way of life,” an aim that would include pursuing other international terrorist organizations in the Mid- dle East.35

Rice chaired a Principals Committee meeting on September 13 in the Sit- uation Room to refine how the fight against al Qaeda would be conducted. The principals agreed that the overall message should be that anyone support- ing al Qaeda would risk harm. The United States would need to integrate diplomacy, financial measures, intelligence, and military actions into an over- arching strategy.The principals also focused on Pakistan and what it could do to turn the Taliban against al Qaeda.They concluded that if Pakistan decided not to help the United States, it too would be at risk.36

The same day, Deputy Secretary of State Richard Armitage met with the Pakistani ambassador to the United States, Maleeha Lodhi, and the visiting head of Pakistan’s military intelligence service, Mahmud Ahmed.Armitage said that the United States wanted Pakistan to take seven steps:

  • to stop al Qaeda operatives at its border and end all logistical support for Bin Ladin;
  • to give the United States blanket overflight and landing rights for all necessary military and intelligence operations;
  • to provide territorial access to U.S. and allied military intelligence and other personnel to conduct operations against al Qaeda;
  • to provide the United States with intelligence information;
  • to continue to publicly condemn the terrorist acts;
  • to cut off all shipments of fuel to the Taliban and stop recruits from going to Afghanistan; and,
  • if the evidence implicated bin Ladin and al Qaeda and the Taliban continued to harbor them, to break relations with the Taliban government.37

Pakistan made its decision swiftly.That afternoon, Secretary of State Powell announced at the beginning of an NSC meeting that Pakistani President Musharraf had agreed to every U.S. request for support in the war on terror- ism.The next day, the U.S. embassy in Islamabad confirmed that Musharraf and his top military commanders had agreed to all seven demands. “Pakistan will need full US support as it proceeds with us,” the embassy noted. “Musharraf said the GOP [government of Pakistan] was making substantial concessions in allowing use of its territory and that he would pay a domestic price. His stand- ing in Pakistan was certain to suffer.To counterbalance that he needed to show that Pakistan was benefiting from his decisions.”38

At the September 13 NSC meeting, when Secretary Powell described Pak- istan’s reply, President Bush led a discussion of an appropriate ultimatum to the Taliban. He also ordered Secretary Rumsfeld to develop a military plan against

the Taliban.The President wanted the United States to strike the Taliban, step back, wait to see if they got the message, and hit them hard if they did not. He made clear that the military should focus on targets that would influence the Taliban’s behavior.39

President Bush also tasked the State Department, which on the following day delivered to the White House a paper titled “Game Plan for a Political- Military Strategy for Pakistan and Afghanistan.” The paper took it as a given that Bin Ladin would continue to act against the United States even while under Taliban control. It therefore detailed specific U.S. demands for the Tal- iban: surrender Bin Ladin and his chief lieutenants, including Ayman al Zawahiri; tell the United States what the Taliban knew about al Qaeda and its operations; close all terrorist camps; free all imprisoned foreigners; and comply with all UN Security Council resolutions.40

The State Department proposed delivering an ultimatum to the Taliban: produce Bin Ladin and his deputies and shut down al Qaeda camps within 24 to 48 hours, or the United States will use all necessary means to destroy the terrorist infrastructure. The State Department did not expect the Taliban to comply. Therefore, State and Defense would plan to build an international coalition to go into Afghanistan. Both departments would consult with NATO and other allies and request intelligence, basing, and other support from coun- tries, according to their capabilities and resources. Finally, the plan detailed a public U.S. stance: America would use all its resources to eliminate terrorism as a threat, punish those responsible for the 9/11 attacks, hold states and other actors responsible for providing sanctuary to terrorists, work with a coalition to eliminate terrorist groups and networks, and avoid malice toward any peo- ple, religion, or culture.41

President Bush recalled that he quickly realized that the administration would have to invade Afghanistan with ground troops.42 But the early brief- ings to the President and Secretary Rumsfeld on military options were disap- pointing.43 Tommy Franks, the commanding general of Central Command (CENTCOM), told us that the President was dissatisfied. The U.S. military, Franks said, did not have an off-the-shelf plan to eliminate the al Qaeda threat in Afghanistan. The existing Infinite Resolve options did not, in his view, amount to such a plan.44

All these diplomatic and military plans were reviewed over the weekend of September 15–16, as President Bush convened his war council at Camp David.45 Present were Vice President Cheney, Rice, Hadley, Powell, Armitage, Rumsfeld, Ashcroft, Mueller, Tenet, Deputy Secretary of Defense Paul Wol- fowitz, and Cofer Black, chief of the DCI’s Counterterrorist Center.

Tenet described a plan for collecting intelligence and mounting covert oper- ations. He proposed inserting CIA teams into Afghanistan to work with Afghan warlords who would join the fight against al Qaeda.46 These CIA teams would act jointly with the military’s Special Operations units. President Bush later praised this proposal, saying it had been a turning point in his thinking.47

General Shelton briefed the principals on the preliminary plan for Afghanistan that the military had put together. It drew on the Infinite Resolve “phased campaign” plan the Pentagon had begun developing in November 2000 as an addition to the strike options it had been refining since 1998. But Shelton added a new element—the possible significant use of ground forces— and that is where President Bush reportedly focused his attention.48

After hearing from his senior advisers, President Bush discussed with Rice the contents of the directives he would issue to set all the plans into motion. Rice prepared a paper that President Bush then considered with principals on Monday morning, September 17. “The purpose of this meeting,” he recalled saying,“is to assign tasks for the first wave of the war against terror- ism. It starts today.”49

In a written set of instructions slightly refined during the morning meet- ing, President Bush charged Ashcroft, Mueller, and Tenet to develop a plan for homeland defense. President Bush directed Secretary of State Powell to deliver an ultimatum to the Taliban along the lines that his department had originally proposed. The State Department was also tasked to develop a plan to stabilize Pakistan and to be prepared to notify Russia and countries near Afghanistan when hostilities were imminent.50

In addition, Bush and his advisers discussed new legal authorities for covert action in Afghanistan, including the administration’s first Memorandum of Notification on Bin Ladin. Shortly thereafter, President Bush authorized broad new authorities for the CIA.51

President Bush instructed Rumsfeld and Shelton to develop further the Camp David military plan to attack the Taliban and al Qaeda if the Taliban rejected the ultimatum. The President also tasked Rumsfeld to ensure that robust measures to protect American military forces against terrorist attack were implemented worldwide. Finally, he directed Treasury Secretary Paul O’Neill to craft a plan to target al Qaeda’s funding and seize its assets.52 NSC staff mem- bers had begun leading meetings on terrorist fund-raising by September 18.53 Also by September 18, Powell had contacted 58 of his foreign counterparts and received offers of general aid, search-and-rescue equipment and person- nel, and medical assistance teams.54 On the same day, Deputy Secretary of State Armitage was called by Mahmud Ahmed regarding a two-day visit to Afghanistan during which the Pakistani intelligence chief had met with Mul- lah Omar and conveyed the U.S. demands. Omar’s response was “not negative on all these points.”55 But the administration knew that the Taliban was unlikely

to turn over Bin Ladin.56

The pre-9/11 draft presidential directive on al Qaeda evolved into a new directive, National Security Presidential Directive 9, now titled “Defeating the Terrorist Threat to the United States.” The directive would now extend to a global war on terrorism, not just on al Qaeda. It also incorporated the Presi- dent’s determination not to distinguish between terrorists and those who har- bor them. It included a determination to use military force if necessary to end

al Qaeda’s sanctuary in Afghanistan. The new directive—formally signed on October 25, after the fighting in Afghanistan had already begun—included new material followed by annexes discussing each targeted terrorist group.The old draft directive on al Qaeda became, in effect, the first annex.57 The United States would strive to eliminate all terrorist networks, dry up their financial sup- port, and prevent them from acquiring weapons of mass destruction.The goal was the “elimination of terrorism as a threat to our way of life.”58

10.3 “PHASE TWO” AND THE QUESTION OF IRAQ

President Bush had wondered immediately after the attack whether Saddam Hussein’s regime might have had a hand in it. Iraq had been an enemy of the United States for 11 years, and was the only place in the world where the United States was engaged in ongoing combat operations. As a former pilot, the President was struck by the apparent sophistication of the operation and some of the piloting, especially Hanjour’s high-speed dive into the Pentagon. He told us he recalled Iraqi support for Palestinian suicide terrorists as well. Speculating about other possible states that could be involved, the President told us he also thought about Iran.59

Clarke has written that on the evening of September 12, President Bush told him and some of his staff to explore possible Iraqi links to 9/11. “See if Sad- dam did this,” Clarke recalls the President telling them.“See if he’s linked in any way.”60 While he believed the details of Clarke’s account to be incorrect, Presi- dent Bush acknowledged that he might well have spoken to Clarke at some point, asking him about Iraq.61

Responding to a presidential tasking, Clarke’s office sent a memo to Rice on September 18, titled “Survey of Intelligence Information on Any Iraq Involvement in the September 11 Attacks.” Rice’s chief staffer on Afghanistan, Zalmay Khalilzad, concurred in its conclusion that only some anecdotal evi- dence linked Iraq to al Qaeda.The memo found no “compelling case” that Iraq had either planned or perpetrated the attacks. It passed along a few foreign intelligence reports, including the Czech report alleging an April 2001 Prague meeting between Atta and an Iraqi intelligence officer (discussed in chapter 7) and a Polish report that personnel at the headquarters of Iraqi intelligence in Baghdad were told before September 11 to go on the streets to gauge crowd reaction to an unspecified event. Arguing that the case for links between Iraq and al Qaeda was weak, the memo pointed out that Bin Ladin resented the secularism of Saddam Hussein’s regime. Finally, the memo said, there was no confirmed reporting on Saddam cooperating with Bin Ladin on unconven- tional weapons.62

On the afternoon of 9/11, according to contemporaneous notes, Secretary Rumsfeld instructed General Myers to obtain quickly as much information as

possible.The notes indicate that he also told Myers that he was not simply inter- ested in striking empty training sites. He thought the U.S. response should con- sider a wide range of options and possibilities. The secretary said his instinct was to hit Saddam Hussein at the same time—not only Bin Ladin. Secretary Rumsfeld later explained that at the time, he had been considering either one of them, or perhaps someone else, as the responsible party.63

According to Rice, the issue of what, if anything, to do about Iraq was really engaged at Camp David. Briefing papers on Iraq, along with many others, were in briefing materials for the participants. Rice told us the administration was concerned that Iraq would take advantage of the 9/11 attacks. She recalled that in the first Camp David session chaired by the President, Rumsfeld asked what the administration should do about Iraq. Deputy Secretary Wolfowitz made the case for striking Iraq during “this round” of the war on terrorism.64

A Defense Department paper for the Camp David briefing book on the strategic concept for the war on terrorism specified three priority targets for initial action: al Qaeda, the Taliban, and Iraq. It argued that of the three, al Qaeda and Iraq posed a strategic threat to the United States. Iraq’s long-standing involvement in terrorism was cited, along with its interest in weapons of mass destruction.65

Secretary Powell recalled that Wolfowitz—not Rumsfeld—argued that Iraq was ultimately the source of the terrorist problem and should therefore be attacked.66 Powell said that Wolfowitz was not able to justify his belief that Iraq was behind 9/11. “Paul was always of the view that Iraq was a problem that had to be dealt with,” Powell told us.“And he saw this as one way of using this event as a way to deal with the Iraq problem.” Powell said that President Bush did not give Wolfowitz’s argument “much weight.”67 Though continuing to worry about Iraq in the following week, Powell said, President Bush saw Afghanistan as the priority.68

President Bush told Bob Woodward that the decision not to invade Iraq was made at the morning session on September 15. Iraq was not even on the table during the September 15 afternoon session, which dealt solely with Afghanistan.69 Rice said that when President Bush called her on Sunday, Sep- tember 16, he said the focus would be on Afghanistan, although he still wanted plans for Iraq should the country take some action or the administration even- tually determine that it had been involved in the 9/11 attacks.70

At the September 17 NSC meeting, there was some further discussion of “phase two” of the war on terrorism.71 President Bush ordered the Defense Department to be ready to deal with Iraq if Baghdad acted against U.S. inter- ests, with plans to include possibly occupying Iraqi oil fields.72

Within the Pentagon, Deputy Secretary Wolfowitz continued to press the case for dealing with Iraq.Writing to Rumsfeld on September 17 in a memo headlined “Preventing More Events,” he argued that if there was even a 10 per- cent chance that Saddam Hussein was behind the 9/11 attack, maximum pri-

ority should be placed on eliminating that threat. Wolfowitz contended that the odds were “far more” than 1 in 10, citing Saddam’s praise for the attack, his long record of involvement in terrorism, and theories that Ramzi Yousef was an Iraqi agent and Iraq was behind the 1993 attack on the World Trade Cen- ter.73 The next day, Wolfowitz renewed the argument, writing to Rumsfeld about the interest of Yousef ’s co-conspirator in the 1995 Manila air plot in crashing an explosives-laden plane into CIA headquarters, and about informa- tion from a foreign government regarding Iraqis’ involvement in the attempted hijacking of a Gulf Air flight. Given this background, he wondered why so lit- tle thought had been devoted to the danger of suicide pilots, seeing a “failure of imagination” and a mind-set that dismissed possibilities.74

On September 19, Rumsfeld offered several thoughts for his commanders as they worked on their contingency plans.Though he emphasized the world- wide nature of the conflict, the references to specific enemies or regions named only the Taliban, al Qaeda, and Afghanistan.75 Shelton told us the administra- tion reviewed all the Pentagon’s war plans and challenged certain assumptions underlying them, as any prudent organization or leader should do.76

General Tommy Franks, the commanding general of Central Command, recalled receiving Rumsfeld’s guidance that each regional commander should assess what these plans meant for his area of responsibility. He knew he would soon be striking the Taliban and al Qaeda in Afghanistan. But, he told us, he now wondered how that action was connected to what might need to be done in Somalia,Yemen, or Iraq.77

On September 20, President Bush met with British Prime Minister Tony Blair, and the two leaders discussed the global conflict ahead.When Blair asked about Iraq, the President replied that Iraq was not the immediate problem. Some members of his administration, he commented, had expressed a differ- ent view, but he was the one responsible for making the decisions.78

Franks told us that he was pushing independently to do more robust plan- ning on military responses in Iraq during the summer before 9/11—a request President Bush denied, arguing that the time was not right. (CENTCOM also began dusting off plans for a full invasion of Iraq during this period, Franks said.) The CENTCOM commander told us he renewed his appeal for further military planning to respond to Iraqi moves shortly after 9/11, both because he personally felt that Iraq and al Qaeda might be engaged in some form of collusion and because he worried that Saddam might take advantage of the attacks to move against his internal enemies in the northern or southern parts of Iraq, where the United States was flying regular missions to enforce Iraqi no-fly zones. Franks said that President Bush again turned down the request.79

.  .  .

H aving issued directives to guide his administration’s preparations for war, on Thursday, September 20, President Bush addressed the nation before a joint session of Congress. “Tonight,” he said, “we are a country awakened to

danger.”80 The President blamed al Qaeda for 9/11 and the 1998 embassy bombings and, for the first time, declared that al Qaeda was “responsible for bombing the USS Cole.”81 He reiterated the ultimatum that had already been conveyed privately.“The Taliban must act, and act immediately,” he said.“They will hand over the terrorists, or they will share in their fate.”82 The President added that America’s quarrel was not with Islam: “The enemy of America is not our many Muslim friends; it is not our many Arab friends. Our enemy is a radical network of terrorists, and every government that supports them.” Other regimes faced hard choices, he pointed out: “Every nation, in every region, now has a decision to make: Either you are with us, or you are with the terrorists.”83

President Bush argued that the new war went beyond Bin Ladin.“Our war on terror begins with al Qaeda, but it does not end there,” he said.“It will not end until every terrorist group of global reach has been found, stopped, and defeated.”The President had a message for the Pentagon: “The hour is com- ing when America will act, and you will make us proud.” He also had a mes- sage for those outside the United States. “This is civilization’s fight,” he said. “We ask every nation to join us.”84

President Bush approved military plans to attack Afghanistan in meetings with Central Command’s General Franks and other advisers on September 21 and October 2. Originally titled “Infinite Justice,” the operation’s code word was changed—to avoid the sensibilities of Muslims who associate the power of infinite justice with God alone—to the operational name still used for opera- tions in Afghanistan:“Enduring Freedom.”85

The plan had four phases.

  • In Phase One, the United States and its allies would move forces into the region and arrange to operate from or over neighboring coun- tries such as Uzbekistan and Pakistan.This occurred in the weeks fol- lowing 9/11, aided by overwhelming international sympathy for the United States.
  • In Phase Two, air strikes and Special Operations attacks would hit key al Qaeda and Taliban targets. In an innovative joint effort, CIA and Special Operations forces would be deployed to work together with each major Afghan faction opposed to the Taliban. The Phase Two strikes and raids began on October 7.The basing arrangements con- templated for Phase One were substantially secured—after arduous effort—by the end of that month.
  • In PhaseThree, the United States would carry out “decisive operations” using all elements of national power, including ground troops, to top- ple the Taliban regime and eliminate al Qaeda’s sanctuary in Afghanistan. Mazar-e-Sharif, in northern Afghanistan, fell to a coali- tion assault by Afghan and U.S. forces on November 9. Four days later the Taliban had fled from Kabul. By early December, all major cities

had fallen to the coalition. On December 22, Hamid Karzai, a Pash- tun leader from Kandahar, was installed as the chairman of Afghanistan’s interim administration. Afghanistan had been liberated from the rule of the Taliban.

In December 2001, Afghan forces, with limited U.S. support, engaged al Qaeda elements in a cave complex called Tora Bora. In March 2002, the largest engagement of the war was fought, in the mountainous Shah-i-Kot area south of Gardez, against a large force of al Qaeda jihadists.The three-week battle was substantially successful, and almost all remaining al Qaeda forces took refuge in Pakistan’s equally mountainous and lightly governed frontier provinces. As of July 2004, Bin Ladin and Zawahiri are still believed to be at large.

  • In Phase Four, civilian and military operations turned to the indefinite task of what the armed forces call “security and stability operations.”

Within about two months of the start of combat operations, several hun- dred CIA operatives and Special Forces soldiers, backed by the striking power of U.S. aircraft and a much larger infrastructure of intelligence and support efforts, had combined with Afghan militias and a small number of other coali- tion soldiers to destroy the Taliban regime and disrupt al Qaeda.They had killed or captured about a quarter of the enemy’s known leaders. Mohammed Atef, al Qaeda’s military commander and a principal figure in the 9/11 plot, had been killed by a U.S. air strike.According to a senior CIA officer who helped devise the overall strategy, the CIA provided intelligence, experience, cash, covert action capabilities, and entrée to tribal allies. In turn, the U.S. military offered combat expertise, firepower, logistics, and communications.86 With these ini- tial victories won by the middle of 2002, the global conflict against Islamist ter- rorism became a different kind of struggle.

11

FORESIGHT—AND HINDSIGHT

I n composing this narrative, we have tried to remember that we write with the benefit and the handicap of hindsight. Hindsight can sometimes see the past clearly—with 20/20 vision. But the path of what happened is so brightly lit that it places everything else more deeply into shadow. Comment- ing on Pearl Harbor, Roberta Wohlstetter found it “much easier after the event to sort the relevant from the irrelevant signals.After the event, of course, a sig- nal is always crystal clear; we can now see what disaster it was signaling since the disaster has occurred. But before the event it is obscure and pregnant with conflicting meanings.”1

As time passes, more documents become available, and the bare facts of what happened become still clearer.Yet the picture of how those things happened becomes harder to reimagine, as that past world, with its preoccupations and uncertainty, recedes and the remaining memories of it become colored by what happened and what was written about it later.With that caution in mind, we asked ourselves, before we judged others, whether the insights that seem appar- ent now would really have been meaningful at the time, given the limits of what people then could reasonably have known or done.

We believe the 9/11 attacks revealed four kinds of failures: in imagination, policy, capabilities, and management.

11.1 IMAGINATION

Historical Perspective

The 9/11 attack was an event of surpassing disproportion. America had suf- fered surprise attacks before—Pearl Harbor is one well-known case, the 1950 Chinese attack in Korea another. But these were attacks by major powers.

While by no means as threatening as Japan’s act of war, the 9/11 attack was in some ways more devastating. It was carried out by a tiny group of people,

339

not enough to man a full platoon. Measured on a governmental scale, the resources behind it were trivial.The group itself was dispatched by an organi- zation based in one of the poorest, most remote, and least industrialized coun- tries on earth. This organization recruited a mixture of young fanatics and highly educated zealots who could not find suitable places in their home soci- eties or were driven from them.

To understand these events, we attempted to reconstruct some of the con- text of the 1990s. Americans celebrated the end of the Cold War with a mix- ture of relief and satisfaction.The people of the United States hoped to enjoy a peace dividend, as U.S. spending on national security was cut following the end of the Soviet military threat.

The United States emerged into the post–Cold War world as the globe’s pre- eminent military power. But the vacuum created by the sudden demise of the Soviet Union created fresh sources of instability and new challenges for the United States. President George H.W. Bush dealt with the first of these in 1990 and 1991 when he led an international coalition to reverse Iraq’s invasion of Kuwait. Other examples of U.S. leaders’ handling new threats included the removal of nuclear weapons from Ukraine, Belarus, and Kazakhstan; the Nunn-Lugar threat reduction program to help contain new nuclear dangers; and international involvement in the wars in Bosnia and Kosovo.

America stood out as an object for admiration, envy, and blame. This cre- ated a kind of cultural asymmetry.To us, Afghanistan seemed very far away.To members of al Qaeda, America seemed very close. In a sense, they were more globalized than we were.

Understanding the Danger

If the government’s leaders understood the gravity of the threat they faced and understood at the same time that their policies to eliminate it were not likely to succeed any time soon, then history’s judgment will be harsh. Did they understand the gravity of the threat?

The U.S. government responded vigorously when the attack was on our soil. Both RamziYousef, who organized the 1993 bombing of the World Trade Center, and Mir Amal Kansi, who in 1993 killed two CIA employees as they waited to go to work in Langley,Virginia, were the objects of relentless, uncom- promising, and successful efforts to bring them back to the United States to stand trial for their crimes.

Before 9/11, al Qaeda and its affiliates had killed fewer than 50 Americans, including the East Africa embassy bombings and the Cole attack.The U.S. gov- ernment took the threat seriously, but not in the sense of mustering anything like the kind of effort that would be gathered to confront an enemy of the first, second, or even third rank.The modest national effort exerted to contain Ser- bia and its depredations in the Balkans between 1995 and 1999, for example, was orders of magnitude larger than that devoted to al Qaeda.

As best we can determine, neither in 2000 nor in the first eight months of 2001 did any polling organization in the United States think the subject of ter- rorism sufficiently on the minds of the public to warrant asking a question about it in a major national survey. Bin Ladin, al Qaeda, or even terrorism was not an important topic in the 2000 presidential campaign. Congress and the media called little attention to it.

If a president wanted to rally the American people to a warlike effort, he would need to publicize an assessment of the growing al Qaeda danger. Our government could spark a full public discussion of who Usama Bin Ladin was, what kind of organization he led, what Bin Ladin or al Qaeda intended, what past attacks they had sponsored or encouraged, and what capabilities they were bringing together for future assaults. We believe American and international public opinion might have been different––and so might the range of options for a president––had they been informed of these details. Recent examples of such debates include calls to arms against such threats as Serbian ethnic cleans- ing, biological attacks, Iraqi weapons of mass destruction, global climate change, and the HIV/AIDS epidemic.

While we now know that al Qaeda was formed in 1988, at the end of the Soviet occupation of Afghanistan, the intelligence community did not describe this organization, at least in documents we have seen, until 1999. A National Intelligence Estimate distributed in July 1995 predicted future terrorist attacks against the United States—and in the United States. It warned that this dan- ger would increase over the next several years. It specified as particular points of vulnerability the White House, the Capitol, symbols of capitalism such as Wall Street, critical infrastructure such as power grids, areas where people con- gregate such as sports arenas, and civil aviation generally. It warned that the 1993 World Trade Center bombing had been intended to kill a lot of people, not to achieve any more traditional political goal.

This 1995 estimate described the greatest danger as “transient groupings of individuals” that lacked “strong organization but rather are loose affiliations.” They operate “outside traditional circles but have access to a worldwide net- work of training facilities and safehavens.”2 This was an excellent summary of the emerging danger, based on what was then known.

In 1996–1997, the intelligence community received new information mak- ing clear that Bin Ladin headed his own terrorist group, with its own target- ing agenda and operational commanders. Also revealed was the previously unknown involvement of Bin Ladin’s organization in the 1992 attack on a Yemeni hotel quartering U.S. military personnel, the 1993 shootdown of U.S. Army Black Hawk helicopters in Somalia, and quite possibly the 1995 Riyadh bombing of the American training mission to the Saudi National Guard.

The 1997 update of the 1995 estimate did not discuss the new intelligence. It did state that the terrorist danger depicted in 1995 would persist. In the update’s summary of key points, the only reference to Bin Ladin was this sen-

tence:“Iran and its surrogates, as well as terrorist financier Usama Bin Ladin and his followers, have stepped up their threats and surveillance of US facilities abroad in what also may be a portent of possible additional attacks in the United States.”3 Bin Ladin was mentioned in only two other sentences in the six-page report.The al Qaeda organization was not mentioned.The 1997 update was the last national estimate on the terrorism danger completed before 9/11.4

From 1998 to 2001, a number of very good analytical papers were distrib- uted on specific topics. These included Bin Ladin’s political philosophy, his command of a global network, analysis of information from terrorists captured in Jordan in December 1999, al Qaeda’s operational style, and the evolving goals of the Islamist extremist movement. Many classified articles for morning brief- ings were prepared for the highest officials in the government with titles such as “Bin Ladin Threatening to Attack US Aircraft [with antiaircraft missiles]” (June 1998),“Strains Surface Between Taliban and Bin Ladin” (January 1999), “Terrorist Threat to US Interests in Caucasus” (June 1999), “Bin Ladin to Exploit Looser Security During Holidays” (December 1999),“Bin Ladin Evad- ing Sanctions” (March 2000),“Bin Ladin’s Interest in Biological, Radiological Weapons” (February 2001), “Taliban Holding Firm on Bin Ladin for Now” (March 2001),“Terrorist Groups Said Cooperating on US Hostage Plot” (May 2001), and “Bin Ladin Determined to Strike in the US” (August 2001).5

Despite such reports and a 1999 paper on Bin Ladin’s command structure for al Qaeda, there were no complete portraits of his strategy or of the extent of his organization’s involvement in past terrorist attacks. Nor had the intelli- gence community provided an authoritative depiction of his organization’s relationships with other governments, or the scale of the threat his organiza- tion posed to the United States.

Though Deputy DCI John McLaughlin said to us that the cumulative out- put of the Counterterrorist Center (CTC) “dramatically eclipsed” any analy- sis that could have appeared in a fresh National Intelligence Estimate, he conceded that most of the work of the Center’s 30- to 40-person analytic group dealt with collection issues.6 In late 2000, DCI George Tenet recognized the deficiency of strategic analysis against al Qaeda. To tackle the problem within the CTC he appointed a senior manager, who briefed him in March 2001 on “creating a strategic assessment capability.”The CTC established a new strategic assessments branch during July 2001. The decision to add about ten analysts to this effort was seen as a major bureaucratic victory, but the CTC labored to find them.The new chief of this branch reported for duty on Sep- tember 10, 2001.7

Whatever the weaknesses in the CIA’s portraiture, both Presidents Bill Clin- ton and George Bush and their top advisers told us they got the picture—they understood Bin Ladin was a danger. But given the character and pace of their policy efforts, we do not believe they fully understood just how many people

al Qaeda might kill, and how soon it might do it. At some level that is hard to define, we believe the threat had not yet become compelling.

It is hard now to recapture the conventional wisdom before 9/11. For exam- ple, a New York Times article in April 1999 sought to debunk claims that Bin Ladin was a terrorist leader, with the headline “U.S. Hard Put to Find Proof Bin Laden Directed Attacks.”8 The head of analysis at the CTC until 1999 dis- counted the alarms about a catastrophic threat as relating only to the danger of chemical, biological, or nuclear attack—and he downplayed even that, writing several months before 9/11:“It would be a mistake to redefine counterterror- ism as a task of dealing with ‘catastrophic,’‘grand,’ or ‘super’ terrorism, when in fact these labels do not represent most of the terrorism that the United States is likely to face or most of the costs that terrorism imposes on U.S. interests.”9 Beneath the acknowledgment that Bin Ladin and al Qaeda presented seri- ous dangers, there was uncertainty among senior officials about whether this was just a new and especially venomous version of the ordinary terrorist threat America had lived with for decades, or was radically new, posing a threat beyond any yet experienced. Such differences affect calculations about

whether or how to go to war.

Therefore, those government experts who saw Bin Ladin as an unprece- dented new danger needed a way to win broad support for their views, or at least spotlight the areas of dispute, and perhaps prompt action across the gov- ernment.The national estimate has often played this role, and is sometimes con- troversial for this very reason.10 Such assessments, which provoke widespread thought and debate, have a major impact on their recipients, often in a wider circle of decisionmakers.The National Intelligence Estimate is noticed in the Congress, for example. But, as we have said, none was produced on terrorism between 1997 and 9/11.

By 2001 the government still needed a decision at the highest level as to whether al Qaeda was or was not “a first order threat,” Richard Clarke wrote in his first memo to Condoleezza Rice on January 25, 2001. In his blistering protest about foot-dragging in the Pentagon and at the CIA, sent to Rice just a week before 9/11, he repeated that the “real question” for the principals was “are we serious about dealing with the al Qida threat? . . . Is al Qida a big deal?” One school of thought, Clarke wrote in this September 4 note, implicitly argued that the terrorist network was a nuisance that killed a score of Ameri- cans every 18–24 months. If that view was credited, then current policies might be proportionate. Another school saw al Qaeda as the “point of the spear of radical Islam.” But no one forced the argument into the open by calling for a national estimate or a broader discussion of the threat. The issue was never joined as a collective debate by the U.S. government, including the Congress,

before 9/11.

We return to the issue of proportion—and imagination. Even Clarke’s note

challenging Rice to imagine the day after an attack posits a strike that kills “hundreds” of Americans. He did not write “thousands.”

Institutionalizing Imagination:

The Case of Aircraft as Weapons

Imagination is not a gift usually associated with bureaucracies. For example, before Pearl Harbor the U.S. government had excellent intelligence that a Japanese attack was coming, especially after peace talks stalemated at the end of November 1941. These were days, one historian notes, of “excruciating uncertainty.”The most likely targets were judged to be in Southeast Asia. An attack was coming,“but officials were at a loss to know where the blow would fall or what more might be done to prevent it.”11 In retrospect, available inter- cepts pointed to Japanese examination of Hawaii as a possible target. But, another historian observes,“in the face of a clear warning, alert measures bowed to routine.”12

It is therefore crucial to find a way of routinizing, even bureaucratizing, the exercise of imagination. Doing so requires more than finding an expert who can imagine that aircraft could be used as weapons. Indeed, since al Qaeda and other groups had already used suicide vehicles, namely truck bombs, the leap to the use of other vehicles such as boats (the Cole attack) or planes is not far-fetched.

Yet these scenarios were slow to work their way into the thinking of avia- tion security experts. In 1996, as a result of the TWA Flight 800 crash, Presi- dent Clinton created a commission under Vice President Al Gore to report on shortcomings in aviation security in the United States.The Gore Commission’s report, having thoroughly canvassed available expertise in and outside of gov- ernment, did not mention suicide hijackings or the use of aircraft as weapons. It focused mainly on the danger of placing bombs onto aircraft—the approach of the Manila air plot. The Gore Commission did call attention, however, to lax screening of passengers and what they carried onto planes.

In late 1998, reports came in of a possible al Qaeda plan to hijack a plane. One, a December 4 Presidential Daily Briefing for President Clinton (reprinted in chapter 4), brought the focus back to more traditional hostage taking; it reported Bin Ladin’s involvement in planning a hijack operation to free prison- ers such as the “Blind Sheikh,” Omar Abdel Rahman. Had the contents of this PDB been brought to the attention of a wider group, including key members of Congress, it might have brought much more attention to the need for per- manent changes in domestic airport and airline security procedures.13

Threat reports also mentioned the possibility of using an aircraft filled with explosives. The most prominent of these mentioned a possible plot to fly an explosives-laden aircraft into a U.S. city. This report, circulated in September 1998, originated from a source who had walked into an American consulate in East Asia. In August of the same year, the intelligence community had received information that a group of Libyans hoped to crash a plane into the

World Trade Center. In neither case could the information be corroborated. In addition, an Algerian group hijacked an airliner in 1994, most likely intend- ing to blow it up over Paris, but possibly to crash it into the Eiffel Tower.14

In 1994, a private airplane had crashed onto the south lawn of the White House. In early 1995,Abdul Hakim Murad—RamziYousef ’s accomplice in the Manila airlines bombing plot—told Philippine authorities that he and Yousef had discussed flying a plane into CIA headquarters.15

Clarke had been concerned about the danger posed by aircraft since at least the 1996 Atlanta Olympics. There he had tried to create an air defense plan using assets from the Treasury Department, after the Defense Department declined to contribute resources.The Secret Service continued to work on the problem of airborne threats to the Washington region. In 1998, Clarke chaired an exercise designed to highlight the inadequacy of the solution. This paper exercise involved a scenario in which a group of terrorists commandeered a Learjet on the ground in Atlanta, loaded it with explosives, and flew it toward a target in Washington, D.C. Clarke asked officials from the Pentagon, Federal Aviation Administration (FAA), and Secret Service what they could do about the situation. Officials from the Pentagon said they could scramble aircraft from Langley Air Force Base, but they would need to go to the President for rules of engagement, and there was no mechanism to do so.There was no clear res- olution of the problem at the exercise.16

In late 1999, a great deal of discussion took place in the media about the crash off the coast of Massachusetts of EgyptAir Flight 990, a Boeing 767.The most plausible explanation that emerged was that one of the pilots had gone berserk, seized the controls, and flown the aircraft into the sea. After the 1999–2000 millennium alerts, when the nation had relaxed, Clarke held a meeting of his Counterterrorism Security Group devoted largely to the pos- sibility of a possible airplane hijacking by al Qaeda.17

In his testimony, Clarke commented that he thought that warning about the possibility of a suicide hijacking would have been just one more speculative theory among many, hard to spot since the volume of warnings of “al Qaeda threats and other terrorist threats, was in the tens of thousands—probably hun- dreds of thousands.”18 Yet the possibility was imaginable, and imagined. In early August 1999, the FAA’s Civil Aviation Security intelligence office summarized the Bin Ladin hijacking threat. After a solid recitation of all the information available on this topic, the paper identified a few principal scenarios, one of which was a “suicide hijacking operation.”The FAA analysts judged such an operation unlikely, because “it does not offer an opportunity for dialogue to achieve the key goal of obtaining Rahman and other key captive extremists.

. . . A suicide hijacking is assessed to be an option of last resort.”19

Analysts could have shed some light on what kind of “opportunity for dia- logue” al Qaeda desired.20 The CIA did not write any analytical assessments of possible hijacking scenarios.

One prescient pre-9/11 analysis of an aircraft plot was written by a Justice Department trial attorney. The attorney had taken an interest, apparently on his own initiative, in the legal issues that would be involved in shooting down a U.S. aircraft in such a situation.21

The North American Aerospace Defense Command imagined the possible use of aircraft as weapons, too, and developed exercises to counter such a threat—from planes coming to the United States from overseas, perhaps car- rying a weapon of mass destruction. None of this speculation was based on actual intelligence of such a threat. One idea, intended to test command and control plans and NORAD’s readiness, postulated a hijacked airliner coming from overseas and crashing into the Pentagon. The idea was put aside in the early planning of the exercise as too much of a distraction from the main focus (war in Korea), and as too unrealistic.As we pointed out in chapter 1, the mil- itary planners assumed that since such aircraft would be coming from overseas; they would have time to identify the target and scramble interceptors.22

We can therefore establish that at least some government agencies were con- cerned about the hijacking danger and had speculated about various scenar- ios. The challenge was to flesh out and test those scenarios, then figure out a way to turn a scenario into constructive action.

Since the Pearl Harbor attack of 1941, the intelligence community has devoted generations of effort to understanding the problem of forestalling a sur- prise attack. Rigorous analytic methods were developed, focused in particular on the Soviet Union, and several leading practitioners within the intelligence community discussed them with us. These methods have been articulated in many ways, but almost all seem to have at least four elements in common: (1) think about how surprise attacks might be launched; (2) identify telltale indi- cators connected to the most dangerous possibilities; (3) where feasible, collect intelligence on these indicators; and (4) adopt defenses to deflect the most dan- gerous possibilities or at least trigger an earlier warning.

After the end of the Gulf War, concerns about lack of warning led to a major study conducted for DCI Robert Gates in 1992 that proposed several recom- mendations, among them strengthening the national intelligence officer for warning.We were told that these measures languished under Gates’s successors. Responsibility for warning related to a terrorist attack passed from the national intelligence officer for warning to the CTC. An Intelligence Community Counterterrorism Board had the responsibility to issue threat advisories.23

With the important exception of analysis of al Qaeda efforts in chemical, biological, radiological, and nuclear weapons, we did not find evidence that the methods to avoid surprise attack that had been so laboriously developed over the years were regularly applied.

Considering what was not done suggests possible ways to institutionalize imagination.To return to the four elements of analysis just mentioned:

  1. The CTC did not analyze how an aircraft, hijacked or explosives- laden, might be used as a weapon. It did not perform this kind of analysis from the enemy’s perspective (“red team” analysis), even though suicide terrorism had become a principal tactic of Middle Eastern terrorists. If it had done so, we believe such an analysis would soon have spotlighted a critical constraint for the terrorists—finding a suicide operative able to fly large jet aircraft.They had never done so before 9/11.
  2. The CTC did not develop a set of telltale indicators for this method of attack. For example, one such indicator might be the discovery of possible terrorists pursuing flight training to fly large jet aircraft, or seeking to buy advanced flight simulators.
  3. The CTC did not propose, and the intelligence community collec- tion management process did not set, requirements to monitor such telltale indicators.Therefore the warning system was not looking for information such as the July 2001 FBI report of potential terrorist interest in various kinds of aircraft training in Arizona, or the August 2001 arrest of Zacarias Moussaoui because of his suspicious behavior in a Minnesota flight school. In late August, the Moussaoui arrest was briefed to the DCI and other top CIA officials under the heading “Islamic Extremist Learns to Fly.”24 Because the system was not tuned to comprehend the potential significance of this information, the news had no effect on warning.
  4. Neither the intelligence community nor aviation security experts ana- lyzed systemic defenses within an aircraft or against terrorist- controlled aircraft, suicidal or otherwise. The many threat reports mentioning aircraft were passed to the FAA.While that agency con- tinued to react to specific, credible threats, it did not try to perform the broader warning functions we describe here. No one in the gov- ernment was taking on that role for domestic vulnerabilities.

Richard Clarke told us that he was concerned about the danger posed by aircraft in the context of protecting the Atlanta Olympics of 1996, the White House complex, and the 2001 G-8 summit in Genoa. But he attributed his awareness more to Tom Clancy novels than to warnings from the intelligence community. He did not, or could not, press the government to work on the systemic issues of how to strengthen the layered security defenses to protect aircraft against hijackings or put the adequacy of air defenses against suicide hijack- ers on the national policy agenda.

The methods for detecting and then warning of surprise attack that the U.S. government had so painstakingly developed in the decades after Pearl Harbor

did not fail; instead, they were not really tried.They were not employed to ana- lyze the enemy that, as the twentieth century closed, was most likely to launch a surprise attack directly against the United States.

11.2 POLICY

The road to 9/11 again illustrates how the large, unwieldy U.S. government tended to underestimate a threat that grew ever greater.The terrorism fostered by Bin Ladin and al Qaeda was different from anything the government had faced before.The existing mechanisms for handling terrorist acts had been trial and punishment for acts committed by individuals; sanction, reprisal, deter- rence, or war for acts by hostile governments.The actions of al Qaeda fit nei- ther category. Its crimes were on a scale approaching acts of war, but they were committed by a loose, far-flung, nebulous conspiracy with no territories or cit- izens or assets that could be readily threatened, overwhelmed, or destroyed.

Early in 2001, DCI Tenet and Deputy Director for Operations James Pavitt gave an intelligence briefing to President-elect Bush, Vice President–elect Cheney, and Rice; it included the topic of al Qaeda. Pavitt recalled conveying that Bin Ladin was one of the gravest threats to the country.25

Bush asked whether killing Bin Ladin would end the problem. Pavitt said he and the DCI had answered that killing Bin Ladin would have an impact, but would not stop the threat.The CIA later provided more formal assessments to the White House reiterating that conclusion. It added that in the long term, the only way to deal with the threat was to end al Qaeda’s ability to use Afghanistan as a sanctuary for its operations.26

Perhaps the most incisive of the advisors on terrorism to the new adminis- tration was the holdover Richard Clarke.Yet he admits that his policy advice, even if it had been accepted immediately and turned into action, would not have prevented 9/11.27

We must then ask when the U.S. government had reasonable opportunities to mobilize the country for major action against al Qaeda and its Afghan sanc- tuary. The main opportunities came after the new information the U.S. gov- ernment received in 1996–1997, after the embassy bombings of August 1998, after the discoveries of the Jordanian and Ressam plots in late 1999, and after the attack on the USS Cole in October 2000.

The U.S. policy response to al Qaeda before 9/11 was essentially defined following the embassy bombings of August 1998.We described those decisions in chapter 4. It is worth noting that they were made by the Clinton adminis- tration under extremely difficult domestic political circumstances. Opponents were seeking the President’s impeachment. In addition, in 1998–99 President Clinton was preparing the government for possible war against Serbia, and he

had authorized major air strikes against Iraq.

The tragedy of the embassy bombings provided an opportunity for a full examination, across the government, of the national security threat that Bin Ladin posed. Such an examination could have made clear to all that issues were at stake that were much larger than the domestic politics of the moment. But the major policy agencies of the government did not meet the threat.

The diplomatic efforts of the Department of State were largely ineffective. Al Qaeda and terrorism was just one more priority added to already-crowded agendas with countries like Pakistan and Saudi Arabia. After 9/11 that changed.

Policymakers turned principally to the CIA and covert action to implement policy. Before 9/11, no agency had more responsibility—or did more—to attack al Qaeda, working day and night, than the CIA. But there were limits to what the CIA was able to achieve in its energetic worldwide efforts to disrupt terrorist activities or use proxies to try to capture or kill Bin Ladin and his lieu- tenants. As early as mid-1997, one CIA officer wrote to his supervisor: “All we’re doing is holding the ring until the cavalry gets here.”28

Military measures failed or were not applied. Before 9/11 the Department of Defense was not given the mission of ending al Qaeda’s sanctuary in Afghanistan.

Officials in both the Clinton and Bush administrations regarded a full U.S. invasion of Afghanistan as practically inconceivable before 9/11. It was never the subject of formal interagency deliberation.

Lesser forms of intervention could also have been considered. One would have been the deployment of U.S. military or intelligence personnel, or special strike forces, to Afghanistan itself or nearby—openly, clandestinely (secretly), or covertly (with their connection to the United States hidden). Then the United States would no longer have been dependent on proxies to gather actionable intelligence. However, it would have needed to secure basing and overflight support from neighboring countries.A significant political, military, and intelligence effort would have been required, extending over months and perhaps years, with associated costs and risks. Given how hard it has proved to locate Bin Ladin even today when there are substantial ground forces in Afghanistan, its odds of sucess are hard to calculate.We have found no indica- tion that President Clinton was offered such an intermediate choice, or that this option was given any more consideration than the idea of invasion.

These policy challenges are linked to the problem of imagination we have already discussed. Since we believe that both President Clinton and President Bush were genuinely concerned about the danger posed by al Qaeda, approaches involving more direct intervention against the sanctuary in Afghanistan apparently must have seemed—if they were considered at all—to be disproportionate to the threat.

Insight for the future is thus not easy to apply in practice. It is hardest to mount a major effort while a problem still seems minor. Once the danger has fully materialized, evident to all, mobilizing action is easier—but it then may be too late.

Another possibility, short of putting U.S. personnel on the ground, was to issue a blunt ultimatum to the Taliban, backed by a readiness to at least launch an indefinite air campaign to disable that regime’s limited military capabilities and tip the balance in Afghanistan’s ongoing civil war.The United States had warned the Taliban that they would be held accountable for further attacks by Bin Ladin against Afghanistan’s U.S. interests.The warning had been given in 1998, again in late 1999, once more in the fall of 2000, and again in the sum- mer of 2001. Delivering it repeatedly did not make it more effective.

As evidence of al Qaeda’s responsibility for the Cole attack came in during November 2000, National Security Advisor Samuel Berger asked the Penta- gon to develop a plan for a sustained air campaign against the Taliban. Clarke developed a paper laying out a formal, specific ultimatum. But Clarke’s plan apparently did not advance to formal consideration by the Small Group of principals.We have found no indication that the idea was briefed to the new administration or that Clarke passed his paper to them, although the same team of career officials spanned both administrations.

After 9/11, President Bush announced that al Qaeda was responsible for the attack on the USS Cole. Before 9/11, neither president took any action. Bin Ladin’s inference may well have been that attacks, at least at the level of the Cole, were risk free.29

11.3 CAPABILITIES

Earlier chapters describe in detail the actions decided on by the Clinton and Bush administrations. Each president considered or authorized covert actions, a process that consumed considerable time—especially in the Clinton admin- istration—and achieved little success beyond the collection of intelligence.After the August 1998 missile strikes in Afghanistan, naval vessels remained on sta- tion in or near the region, prepared to fire cruise missiles. General Hugh Shel- ton developed as many as 13 different strike options, and did not recommend any of them. The most extended debate on counterterrorism in the Bush administration before 9/11 had to do with missions for the unmanned Preda- tor—whether to use it just to locate Bin Ladin or to wait until it was armed with a missile, so that it could find him and also attack him. Looking back, we are struck with the narrow and unimaginative menu of options for action offered to both President Clinton and President Bush.

Before 9/11, the United States tried to solve the al Qaeda problem with the

same government institutions and capabilities it had used in the last stages of the Cold War and its immediate aftermath.These capabilities were insufficient, but little was done to expand or reform them.

For covert action, of course, the White House depended on the Countert- errorist Center and the CIA’s Directorate of Operations. Though some offi- cers, particularly in the Bin Ladin unit, were eager for the mission, most were not.The higher management of the directorate was unenthusiastic.The CIA’s capacity to conduct paramilitary operations with its own personnel was not large, and the Agency did not seek a large-scale general expansion of these capa- bilities before 9/11. James Pavitt, the head of this directorate, remembered that covert action, promoted by the White House, had gotten the Clandestine Ser- vice into trouble in the past. He had no desire to see this happen again. He thought, not unreasonably, that a truly serious counterterrorism campaign against an enemy of this magnitude would be business primarily for the mili- tary, not the Clandestine Service.30

As for the Department of Defense, some officers in the Joint Staff were keen to help. Some in the Special Operations Command have told us that they worked on plans for using Special Operations Forces in Afghanistan and that they hoped for action orders. JCS Chairman General Shelton and General Anthony Zinni at Central Command had a different view. Shelton felt that the August 1998 attacks had proved a waste of good ordnance and thereafter con- sistently opposed firing expensive Tomahawk missiles merely at “jungle gym” terrorist training infrastructure.31 In this view, he had complete support from Defense Secretary William Cohen. Shelton was prepared to plan other options, but he was also prepared to make perfectly clear his own strong doubts about the wisdom of any military action that risked U.S. lives unless the intelligence was “actionable.”32

The high price of keeping counterterrorism policy within the restricted cir- cle of the Counterterrorism Security Group and the highest-level principals was nowhere more apparent than in the military establishment.After the August 1998 missile strike, other members of the JCS let the press know their unhap- piness that, in conformity with the Goldwater-Nichols reforms, Shelton had been the only member of the JCS to be consulted. Although follow-on mili- tary options were briefed more widely, the vice director of operations on the Joint Staff commented to us that intelligence and planning documents relating to al Qaeda arrived in a ziplock red package and that many flag and general officers never had the clearances to see its contents.33

At no point before 9/11 was the Department of Defense fully engaged in the mission of countering al Qaeda, though this was perhaps the most danger- ous foreign enemy then threatening the United States.The Clinton adminis- tration effectively relied on the CIA to take the lead in preparing long-term offensive plans against an enemy sanctuary. The Bush administration adopted this approach, although its emerging new strategy envisioned some yet unde-

fined further role for the military in addressing the problem.Within Defense, both Secretary Cohen and Secretary Donald Rumsfeld gave their principal attention to other challenges.

America’s homeland defenders faced outward. NORAD itself was barely able to retain any alert bases. Its planning scenarios occasionally considered the danger of hijacked aircraft being guided to American targets, but only aircraft that were coming from overseas. We recognize that a costly change in NORAD’s defense posture to deal with the danger of suicide hijackers, before such a threat had ever actually been realized, would have been a tough sell. But NORAD did not canvass available intelligence and try to make the case.

The most serious weaknesses in agency capabilities were in the domestic arena. In chapter 3 we discussed these institutions—the FBI, the Immigration and Naturalization Service, the FAA, and others.The major pre-9/11 effort to strengthen domestic agency capabilities came in 2000, as part of a millennium after-action review. President Clinton and his principal advisers paid consider- able attention then to border security problems, but were not able to bring about significant improvements before leaving office.The NSC-led interagency process did not effectively bring along the leadership of the Justice and Trans- portation departments in an agenda for institutional change.

The FBI did not have the capability to link the collective knowledge of agents in the field to national priorities.The acting director of the FBI did not learn of his Bureau’s hunt for two possible al Qaeda operatives in the United States or about his Bureau’s arrest of an Islamic extremist taking flight training until September 11.The director of central intelligence knew about the FBI’s Moussaoui investigation weeks before word of it made its way even to the FBI’s own assistant director for counterterrorism.

Other agencies deferred to the FBI. In the August 6 PDB reporting to Pres- ident Bush of 70 full-field investigations related to al Qaeda, news the Presi- dent said he found heartening, the CIA had simply restated what the FBI had said. No one looked behind the curtain.

The FAA’s capabilities to take aggressive, anticipatory security measures were especially weak.Any serious policy examination of a suicide hijacking sce- nario, critiquing each of the layers of the security system, could have suggested changes to fix glaring vulnerabilities—expanding no-fly lists, searching passen- gers identified by the CAPPS screening system, deploying Federal Air Marshals domestically, hardening cockpit doors, alerting air crew to a different kind of hijacking than what they had been trained to expect, or adjusting the training of controllers and managers in the FAA and NORAD.

Government agencies also sometimes display a tendency to match capabil- ities to mission by defining away the hardest part of their job.They are often passive, accepting what are viewed as givens, including that efforts to identify and fix glaring vulnerabilities to dangerous threats would be too costly, too controversial, or too disruptive.

11.4 MANAGEMENT

Operational Management

Earlier in this report we detailed various missed opportunities to thwart the 9/11 plot. Information was not shared, sometimes inadvertently or because of legal misunderstandings.Analysis was not pooled. Effective operations were not launched. Often the handoffs of information were lost across the divide sepa- rating the foreign and domestic agencies of the government.

However the specific problems are labeled, we believe they are symptoms of the government’s broader inability to adapt how it manages problems to the new challenges of the twenty-first century.The agencies are like a set of spe- cialists in a hospital, each ordering tests, looking for symptoms, and prescrib- ing medications.What is missing is the attending physician who makes sure they work as a team.

One missing element was effective management of transnational operations. Action officers should have drawn on all available knowledge in the govern- ment.This management should have ensured that information was shared and duties were clearly assigned across agencies, and across the foreign-domestic divide.

Consider, for example, the case of Mihdhar, Hazmi, and their January 2000 trip to Kuala Lumpur, detailed in chapter 6. In late 1999, the National Secu- rity Agency (NSA) analyzed communications associated with a man named Khalid, a man named Nawaf, and a man named Salem.Working-level officials in the intelligence community knew little more than this. But they correctly concluded that “Nawaf ” and “Khalid” might be part of “an operational cadre” and that “something nefarious might be afoot.”

The NSA did not think its job was to research these identities. It saw itself as an agency to support intelligence consumers, such as CIA.The NSA tried to respond energetically to any request made. But it waited to be asked.

If NSA had been asked to try to identify these people, the agency would have started by checking its own database of earlier information from these same sources. Some of this information had been reported; some had not. But it was all readily accessible in the database. NSA’s analysts would promptly have discovered who Nawaf was, that his full name might be Nawaf al Hazmi, and that he was an old friend of Khalid.

With this information and more that was available, managers could have more effectively tracked the movement of these operatives in southeast Asia. With the name “Nawaf al Hazmi,” a manager could then have asked the State Department also to check that name. State would promptly have found its own record on Nawaf al Hazmi, showing that he too had been issued a visa to visit the United States. Officials would have learned that the visa had been issued at the same place—Jeddah—and on almost the same day as the one given to Khalid al Mihdhar.

When the travelers left Kuala Lumpur for Bangkok, local officials were able to identify one of the travelers as Khalid al Mihdhar. After the flight left, they learned that one of his companions had the name Alhazmi. But the officials did not know what that name meant.

The information arrived at Bangkok too late to track these travelers as they came in. Had the authorities there already been keeping an eye out for Khalid al Mihdhar as part of a general regional or worldwide alert, they might have tracked him coming in. Had they been alerted to look for a possible compan- ion named Nawaf al Hazmi, they might have noticed him too. Instead, they were notified only after Kuala Lumpur sounded the alarm. By that time, the travelers had already disappeared into the streets of Bangkok.

On January 12, the head of the CIA’s al Qaeda unit told his bosses that sur- veillance in Kuala Lumpur was continuing. He may not have known that in fact Mihdhar and his companions had dispersed and the tracking was falling apart. U.S. officials in Bangkok regretfully reported the bad news on January

13. The names they had were put on a watchlist in Bangkok, so that Thai authorities might notice if the men left the country. On January 14, the head of the CIA’s al Qaeda unit again updated his bosses, telling them that officials were continuing to track the suspicious individuals who had now dispersed to various countries.

Unfortunately, there is no evidence of any tracking efforts actually being undertaken by anyone after the Arabs disappeared into Bangkok. No other effort was made to create other opportunities to spot these Arab travelers in case the screen in Bangkok failed. Just from the evidence in Mihdhar’s pass- port, one of the logical possible destinations and interdiction points would have been the United States.Yet no one alerted the INS or the FBI to look for these individuals.They arrived, unnoticed, in Los Angeles on January 15.

In early March 2000, Bangkok reported that Nawaf al Hazmi, now identi- fied for the first time with his full name, had departed on January 15 on a United Airlines flight to Los Angeles. Since the CIA did not appreciate the sig- nificance of that name or notice the cable, we have found no evidence that this information was sent to the FBI.

Even if watchlisting had prevented or at least alerted U.S. officials to the entry of Hazmi and Mihdhar, we do not think it is likely that watchlisting, by itself, have prevented the 9/11 attacks.Al Qaeda adapted to the failure of some of its operatives to gain entry into the United States. None of these future hijackers was a pilot. Alternatively, had they been permitted entry and sur- veilled, some larger results might have been possible had the FBI been patient. These are difficult what-ifs.The intelligence community might have judged that the risks of conducting such a prolonged intelligence operation were too high—potential terrorists might have been lost track of, for example.The pre- 9/11 FBI might not have been judged capable of conducting such an opera- tion. But surely the intelligence community would have preferred to have the

chance to make these choices.

From the details of this case, or from the other opportunities we catalogue in the text box, one can see how hard it is for the intelligence community to assemble enough of the puzzle pieces gathered by different agencies to make some sense of them and then develop a fully informed joint plan.Accomplish- ing all this is especially difficult in a transnational case.We sympathize with the working-level officers, drowning in information and trying to decide what is important or what needs to be done when no particular action has been requested of them.

Who had the job of managing the case to make sure these things were done? One answer is that everyone had the job.The CIA’s deputy director for oper- ations, James Pavitt, stressed to us that the responsibility resided with all involved. Above all he emphasized the primacy of the field.The field had the lead in managing operations.The job of headquarters, he stressed, was to sup- port the field, and do so without delay. If the field asked for information or other support, the job of headquarters was to get it—right away.34

This is a traditional perspective on operations and, traditionally, it has had great merit. It reminded us of the FBI’s pre-9/11 emphasis on the primacy of its field offices.When asked about how this traditional structure would adapt to the challenge of managing a transnational case, one that hopped from place to place as this one did, the deputy director argued that all involved were

Operational Opportunities
  1. January 2000: the CIA does not watchlist Khalid al Mihdhar or notify the FBI when it learned Mihdhar possessed a valid U.S. visa.
  2. January 2000: the CIA does not develop a transnational plan for tracking Mihdhar and his associates so that they could be fol- lowed to Bangkok and onward, including the United States.
  3. March 2000: the CIA does not watchlist Nawaf al Hazmi or notify the FBI when it learned that he possessed a U.S. visa and had flown to Los Angeles on January 15, 2000.
  4. January 2001: the CIA does not inform the FBI that a source had identified Khallad, or Tawfiq bin Attash, a major figure in the October 2000 bombing of the USS Cole, as having attended the meeting in Kuala Lumpur with Khalid al Mihd- har.
  5. May 2001: a CIA official does not notify the FBI about Mihd- har’s U.S. visa, Hazmi’s U.S. travel, or Khallad’s having attended the Kuala Lumpur meeting (identified when he reviewed all of the relevant traffic because of the high level of threats).
  1. June 2001: FBI and CIA officials do not ensure that all relevant information regarding the Kuala Lumpur meeting was shared with the Cole investigators at the June 11 meeting.
  2. August 2001: the FBI does not recognize the significance of the information regarding Mihdhar and Hazmi’s possible arrival in the United States and thus does not take adequate action to share information, assign resources, and give sufficient priority to the search.
  3. August 2001: FBI headquarters does not recognize the signifi- cance of the information regarding Moussaoui’s training and beliefs and thus does not take adequate action to share infor- mation, involve higher-level officials across agencies, obtain information regarding Moussaoui’s ties to al Qaeda, and give sufficient priority to determining what Moussaoui might be planning.
  4. August 2001: the CIA does not focus on information that Khalid Sheikh Mohammed is a key al Qaeda lieutenant or con- nect information identifying KSM as the “Mukhtar” mentioned in other reports to the analysis that could have linked “Mukhtar” with Ramzi Binalshibh and Moussaoui.
  5. August 2001: the CIA and FBI do not connect the presence of Mihdhar, Hazmi, and Moussaoui to the general threat report- ing about imminent attacks.

responsible for making it work. Pavitt underscored the responsibility of the par- ticular field location where the suspects were being tracked at any given time. On the other hand, he also said that the Counterterrorist Center was supposed to manage all the moving parts, while what happened on the ground was the responsibility of managers in the field.35

Headquarters tended to support and facilitate, trying to make sure every- one was in the loop. From time to time a particular post would push one way, or headquarters would urge someone to do something. But headquarters never really took responsibility for the successful management of this case. Hence the managers at CIA headquarters did not realize that omissions in planning had occurred, and they scarcely knew that the case had fallen apart.

The director of the Counterterrorist Center at the time, Cofer Black, recalled to us that this operation was one among many and that, at the time, it was “considered interesting, but not heavy water yet.” He recalled the failure to get the word to Bangkok fast enough, but has no evident recollection of why the case then dissolved, unnoticed.36

The next level down, the director of the al Qaeda unit in CIA at the time recalled that he did not think it was his job to direct what should or should not be done. He did not pay attention when the individuals dispersed and things fell apart. There was no conscious decision to stop the operation after the trail was temporarily lost in Bangkok. He acknowledged, however, that per- haps there had been a letdown for his overworked staff after the extreme ten- sion and long hours in the period of the millennium alert.37

The details of this case illuminate real management challenges, past and future.The U.S. government must find a way of pooling intelligence and using it to guide the planning of and assignment of responsibilities for joint operations involving organizations as disparate as the CIA, the FBI, the State Department, the military, and the agencies involved in homeland security.

Institutional Management

Beyond those day-to-day tasks of bridging the foreign-domestic divide and matching intelligence with plans, the challenges include broader management issues pertaining to how the top leaders of the government set priorities and allocate resources. Once again it is useful to illustrate the problem by examin- ing the CIA, since before 9/11 this agency’s role was so central in the govern- ment’s counterterrorism efforts.

On December 4, 1998, DCI Tenet issued a directive to several CIA officials and his deputy for community management, stating:“We are at war. I want no resources or people spared in this effort, either inside CIA or the Community.”38 The memorandum had little overall effect on mobilizing the CIA or the intel- ligence community.39

The memo was addressed only to CIA officials and the deputy for commu- nity management, Joan Dempsey. She faxed the memo to the heads of the major intelligence agencies after removing covert action sections. Only a hand- ful of people received it. The NSA director at the time, Lieutenant General Kenneth Minihan, believed the memo applied only to the CIA and not the NSA, because no one had informed him of any NSA shortcomings. For their part, CIA officials thought the memorandum was intended for the rest of the intelligence community, given that they were already doing all they could and believed that the rest of the community needed to pull its weight.40

The episode indicates some of the limitations of the DCI’s authority over the direction and priorities of the intelligence community, especially its ele- ments within the Department of Defense.The DCI has to direct agencies with- out controlling them. He does not receive an appropriation for their activities, and therefore does not control their purse strings. He has little insight into how they spend their resources. Congress attempted to strengthen the DCI’s authority in 1996 by creating the positions of deputy DCI for community management and assistant DCIs for collection, analysis and production, and administration. But the authority of these positions is limited, and the vision of central management clearly has not been realized.

The DCI did not develop a management strategy for a war against Islamist terrorism before 9/11. Such a management strategy would define the capabil- ities the intelligence community must acquire for such a war—from language training to collection systems to analysts. Such a management strategy would necessarily extend beyond the CTC to the components that feed its expertise and support its operations, linked transparently to counterterrorism objectives. It would then detail the proposed expenditures and organizational changes required to acquire and implement these capabilities.

DCI Tenet and his deputy director for operations told us they did have a management strategy for a war on terrorism. It was to rebuild the CIA.They said the CIA as a whole had been badly damaged by prior budget constraints and that capabilities needed to be restored across the board. Indeed, the CTC budget had not been cut while the budgets had been slashed in many other parts of the Agency. By restoring funding across the CIA, a rising tide would lift all boats.They also stressed the synergy between improvements of every part of the Agency and the capabilities that the CTC or stations overseas could draw on in the war on terror.41

As some officials pointed out to us, there is a tradeoff in this management approach. In an attempt to rebuild everything at once, the highest priority efforts might not get the maximum support that they need. Furthermore, this approach attempted to channel relatively strong outside support for combat- ing terrorism into backing for across-the-board funding increases. Proponents of the counterterrorism agenda might respond by being less inclined to loosen the purse strings than they would have been if offered a convincing countert- errorism budget strategy. The DCI’s management strategy was also focused mainly on the CIA.

Lacking a management strategy for the war on terrorism or ways to see how funds were being spent across the community, DCI Tenet and his aides found it difficult to develop an overall intelligence community budget for a war on terrorism.

Responsibility for domestic intelligence gathering on terrorism was vested solely in the FBI, yet during almost all of the Clinton administration the rela- tionship between the FBI Director and the President was nearly nonexistent. The FBI Director would not communicate directly with the President. His key personnel shared very little information with the National Security Council and the rest of the national security community. As a consequence, one of the critical working relationships in the counterterrorism effort was broken.

The Millennium Exception

Before concluding our narrative, we offer a reminder, and an explanation, of the one period in which the government as a whole seemed to be acting in concert to deal with terrorism—the last weeks of December 1999 preceding the millennium.

In the period between December 1999 and early January 2000, informa- tion about terrorism flowed widely and abundantly.The flow from the FBI was particularly remarkable because the FBI at other times shared almost no infor- mation. That from the intelligence community was also remarkable, because some of it reached officials—local airport managers and local police depart- ments—who had not seen such information before and would not see it again before 9/11, if then. And the terrorist threat, in the United States even more than abroad, engaged the frequent attention of high officials in the executive branch and leaders in both houses of Congress.

Why was this so? Most obviously, it was because everyone was already on edge with the millennium and possible computer programming glitches (“Y2K”) that might obliterate records, shut down power and communication lines, or otherwise disrupt daily life.Then, Jordanian authorities arrested 16 al Qaeda terrorists planning a number of bombings in that country.Those in cus- tody included two U.S. citizens. Soon after, an alert Customs agent caught Ahmed Ressam bringing explosives across the Canadian border with the apparent intention of blowing up Los Angeles airport. He was found to have confederates on both sides of the border.

These were not events whispered about in highly classified intelligence dailies or FBI interview memos.The information was in all major newspapers and highlighted in network television news.Though the Jordanian arrests only made page 13 of the NewYorkTimes, they were featured on every evening news- cast. The arrest of Ressam was on front pages, and the original story and its follow-ups dominated television news for a week. FBI field offices around the country were swamped by calls from concerned citizens. Representatives of the Justice Department, the FAA, local police departments, and major airports had microphones in their faces whenever they showed themselves.42

After the millennium alert, the government relaxed. Counterterrorism went back to being a secret preserve for segments of the FBI, the Countert- errorist Center, and the Counterterrorism Security Group. But the experi- ence showed that the government was capable of mobilizing itself for an alert against terrorism.While one factor was the preexistence of widespread con- cern about Y2K, another, at least equally important, was simply shared infor- mation. Everyone knew not only of an abstract threat but of at least one terrorist who had been arrested in the United States.Terrorism had a face—that of Ahmed Ressam—and Americans from Vermont to southern California went on the watch for his like.

In the summer of 2001, DCI Tenet, the Counterterrorist Center, and the Counterterrorism Security Group did their utmost to sound a loud alarm, its basis being intelligence indicating that al Qaeda planned something big. But the millennium phenomenon was not repeated. FBI field offices apparently saw no abnormal terrorist activity, and headquarters was not shaking them up.

Between May 2001 and September 11, there was very little in newspapers

or on television to heighten anyone’s concern about terrorism. Front-page sto- ries touching on the subject dealt with the windup of trials dealing with the East Africa embassy bombings and Ressam.All this reportage looked backward, describing problems satisfactorily resolved. Back-page notices told of tightened security at embassies and military installations abroad and government cautions against travel to the Arabian Peninsula. All the rest was secret.

12

WHAT TO DO?

A GLOBAL STRATEGY

12.1 REFLECTING ON A GENERATIONAL CHALLENGE

Three years after 9/11, Americans are still thinking and talking about how to protect our nation in this new era.The national debate continues.

Countering terrorism has become, beyond any doubt, the top national security priority for the United States. This shift has occurred with the full support of the Congress, both major political parties, the media, and the Amer- ican people.

The nation has committed enormous resources to national security and to countering terrorism. Between fiscal year 2001, the last budget adopted before 9/11, and the present fiscal year 2004, total federal spending on defense (includ- ing expenditures on both Iraq and Afghanistan), homeland security, and inter- national affairs rose more than 50 percent, from $354 billion to about $547 billion.The United States has not experienced such a rapid surge in national security spending since the Korean War.1

This pattern has occurred before in American history. The United States faces a sudden crisis and summons a tremendous exertion of national energy. Then, as that surge transforms the landscape, comes a time for reflection and reevaluation. Some programs and even agencies are discarded; others are invented or redesigned. Private firms and engaged citizens redefine their rela- tionships with government, working through the processes of the American republic.

Now is the time for that reflection and reevaluation.The United States should consider what to do—the shape and objectives of a strategy. Americans should also consider how to do it—organizing their government in a different way.

Defining the Threat

In the post-9/11 world, threats are defined more by the fault lines within soci- eties than by the territorial boundaries between them. From terrorism to global

361

disease or environmental degradation, the challenges have become transnational rather than international. That is the defining quality of world politics in the twenty-first century.

National security used to be considered by studying foreign frontiers, weighing opposing groups of states, and measuring industrial might.To be dan- gerous, an enemy had to muster large armies. Threats emerged slowly, often visibly, as weapons were forged, armies conscripted, and units trained and moved into place. Because large states were more powerful, they also had more to lose.They could be deterred.

Now threats can emerge quickly. An organization like al Qaeda, headquar- tered in a country on the other side of the earth, in a region so poor that elec- tricity or telephones were scarce, could nonetheless scheme to wield weapons of unprecedented destructive power in the largest cities of the United States. In this sense, 9/11 has taught us that terrorism against American interests “over there” should be regarded just as we regard terrorism against America

“over here.” In this same sense, the American homeland is the planet.

But the enemy is not just “terrorism,” some generic evil.2 This vagueness blurs the strategy.The catastrophic threat at this moment in history is more spe- cific. It is the threat posed by Islamist terrorism—especially the al Qaeda net- work, its affiliates, and its ideology.3

As we mentioned in chapter 2, Usama Bin Ladin and other Islamist terror- ist leaders draw on a long tradition of extreme intolerance within one stream of Islam (a minority tradition), from at least Ibn Taimiyyah, through the founders of Wahhabism, through the Muslim Brotherhood, to Sayyid Qutb. That stream is motivated by religion and does not distinguish politics from reli- gion, thus distorting both. It is further fed by grievances stressed by Bin Ladin and widely felt throughout the Muslim world—against the U.S. military pres- ence in the Middle East, policies perceived as anti-Arab and anti-Muslim, and support of Israel. Bin Ladin and Islamist terrorists mean exactly what they say: to them America is the font of all evil, the “head of the snake,” and it must be converted or destroyed.

It is not a position with which Americans can bargain or negotiate.With it there is no common ground—not even respect for life—on which to begin a dialogue. It can only be destroyed or utterly isolated.

Because the Muslim world has fallen behind the West politically, economi- cally, and militarily for the past three centuries, and because few tolerant or sec- ular Muslim democracies provide alternative models for the future, Bin Ladin’s message finds receptive ears. It has attracted active support from thousands of disaffected young Muslims and resonates powerfully with a far larger number who do not actively support his methods.The resentment of America and the West is deep, even among leaders of relatively successful Muslim states.4

Tolerance, the rule of law, political and economic openness, the extension

of greater opportunities to women—these cures must come from within Mus- lim societies themselves.The United States must support such developments. But this process is likely to be measured in decades, not years. It is a process that will be violently opposed by Islamist terrorist organizations, both inside Muslim countries and in attacks on the United States and other Western nations.The United States finds itself caught up in a clash within a civilization. That clash arises from particular conditions in the Muslim world, conditions that spill over into expatriate Muslim communities in non-Muslim countries.

Our enemy is twofold: al Qaeda, a stateless network of terrorists that struck us on 9/11; and a radical ideological movement in the Islamic world, inspired in part by al Qaeda, which has spawned terrorist groups and violence across the globe.The first enemy is weakened, but continues to pose a grave threat. The second enemy is gathering, and will menace Americans and American interests long after Usama Bin Ladin and his cohorts are killed or captured.Thus our strategy must match our means to two ends: dismantling the al Qaeda net- work and prevailing in the longer term over the ideology that gives rise to Islamist terrorism.

Islam is not the enemy. It is not synonymous with terror. Nor does Islam teach terror.America and its friends oppose a perversion of Islam, not the great world faith itself. Lives guided by religious faith, including literal beliefs in holy scriptures, are common to every religion, and represent no threat to us.

Other religions have experienced violent internal struggles.With so many diverse adherents, every major religion will spawn violent zealots.Yet under- standing and tolerance among people of different faiths can and must prevail.

The present transnational danger is Islamist terrorism. What is needed is a broad political-military strategy that rests on a firm tripod of policies to

  • attack terrorists and their organizations;
  • prevent the continued growth of Islamist terrorism; and
  • protect against and prepare for terrorist attacks.
More Than a War on Terrorism

Terrorism is a tactic used by individuals and organizations to kill and destroy. Our efforts should be directed at those individuals and organizations.

Calling this struggle a war accurately describes the use of American and allied armed forces to find and destroy terrorist groups and their allies in the field, notably in Afghanistan.The language of war also evokes the mobilization for a national effort.Yet the strategy should be balanced.

The first phase of our post-9/11 efforts rightly included military action to topple the Taliban and pursue al Qaeda. This work continues. But long-term success demands the use of all elements of national power: diplomacy, intelli-

gence, covert action, law enforcement, economic policy, foreign aid, public diplomacy, and homeland defense. If we favor one tool while neglecting oth- ers, we leave ourselves vulnerable and weaken our national effort.

Certainly the strategy should include offensive operations to counter ter- rorism. Terrorists should no longer find safe haven where their organizations can grow and flourish. America’s strategy should be a coalition strategy, that includes Muslim nations as partners in its development and implementation.

Our effort should be accompanied by a preventive strategy that is as much, or more, political as it is military.The strategy must focus clearly on the Arab and Muslim world, in all its variety.

Our strategy should also include defenses.America can be attacked in many ways and has many vulnerabilities. No defenses are perfect. But risks must be calculated; hard choices must be made about allocating resources. Responsi- bilities for America’s defense should be clearly defined. Planning does make a difference, identifying where a little money might have a large effect. Defenses also complicate the plans of attackers, increasing their risks of discovery and failure. Finally, the nation must prepare to deal with attacks that are not stopped.

Measuring Success

What should Americans expect from their government in the struggle against Islamist terrorism? The goals seem unlimited: Defeat terrorism anywhere in the world. But Americans have also been told to expect the worst: An attack is probably coming; it may be terrible.

With such benchmarks, the justifications for action and spending seem lim- itless. Goals are good.Yet effective public policies also need concrete objectives. Agencies need to be able to measure success.

These measurements do not need to be quantitative: government cannot measure success in the ways that private firms can. But the targets should be specific enough so that reasonable observers—in the White House, the Con- gress, the media, or the general public—can judge whether or not the objec- tives have been attained.

Vague goals match an amorphous picture of the enemy. Al Qaeda and its affiliates are popularly described as being all over the world, adaptable, resilient, needing little higher-level organization, and capable of anything.The Ameri- can people are thus given the picture of an omnipotent, unslayable hydra of destruction.This image lowers expectations for government effectiveness.

It should not lower them too far. Our report shows a determined and capa- ble group of plotters.Yet the group was fragile, dependent on a few key per- sonalities, and occasionally left vulnerable by the marginal, unstable people often attracted to such causes.The enemy made mistakes—like Khalid al Mihd- har’s unauthorized departure from the United States that required him to enter the country again in July 2001, or the selection of Zacarias Moussaoui as a par-

ticipant and Ramzi Binalshibh’s transfer of money to him. The U.S. govern- ment was not able to capitalize on those mistakes in time to prevent 9/11.

We do not believe it is possible to defeat all terrorist attacks against Ameri- cans, every time and everywhere. A president should tell the American people:

  • No president can promise that a catastrophic attack like that of 9/11 will not happen again. History has shown that even the most vigilant and expert agencies cannot always prevent determined, suicidal attackers from reaching a target.
  • But the American people are entitled to expect their government to do its very best. They should expect that officials will have realistic objectives, clear guidance, and effective organization. They are enti- tled to see some standards for performance so they can judge, with the help of their elected representatives, whether the objectives are being met.

12.2 ATTACK TERRORISTS

AND THEIR ORGANIZATIONS

The U.S. government, joined by other governments around the world, is work- ing through intelligence, law enforcement, military, financial, and diplomatic channels to identify, disrupt, capture, or kill individual terrorists.This effort was going on before 9/11 and it continues on a vastly enlarged scale. But to catch terrorists, a U.S. or foreign agency needs to be able to find and reach them.

No Sanctuaries

The 9/11 attack was a complex international operation, the product of years of planning. Bombings like those in Bali in 2003 or Madrid in 2004, while able to take hundreds of lives, can be mounted locally. Their requirements are far more modest in size and complexity.They are more difficult to thwart. But the

U.S. government must build the capacities to prevent a 9/11-scale plot from succeeding, and those capabilities will help greatly to cope with lesser but still devastating attacks.

A complex international terrorist operation aimed at launching a cata- strophic attack cannot be mounted by just anyone in any place. Such opera- tions appear to require

  • time, space, and ability to perform competent planning and staff work;
  • a command structure able to make necessary decisions and possessing the authority and contacts to assemble needed people, money, and materials;
  • opportunity and space to recruit, train, and select operatives with the needed skills and dedication, providing the time and structure required to socialize them into the terrorist cause, judge their trust- worthiness, and hone their skills;
  • a logistics network able to securely manage the travel of operatives, move money, and transport resources (like explosives) where they need to go;
  • access, in the case of certain weapons, to the special materials needed for a nuclear, chemical, radiological, or biological attack;
  • reliable communications between coordinators and operatives; and
  • opportunity to test the workability of the plan.

Many details in chapters 2, 5, and 7 illustrate the direct and indirect value of the Afghan sanctuary to al Qaeda in preparing the 9/11 attack and other oper- ations.The organization cemented personal ties among veteran jihadists work- ing together there for years. It had the operational space to gather and sift recruits, indoctrinating them in isolated, desert camps. It built up logistical net- works, running through Pakistan and the United Arab Emirates.

Al Qaeda also exploited relatively lax internal security environments in West- ern countries, especially Germany. It considered the environment in the United States so hospitable that the 9/11 operatives used America as their staging area for further training and exercises—traveling into, out of, and around the coun- try and complacently using their real names with little fear of capture.

To find sanctuary, terrorist organizations have fled to some of the least gov- erned, most lawless places in the world. The intelligence community has pre- pared a world map that highlights possible terrorist havens, using no secret intelligence—just indicating areas that combine rugged terrain, weak gover- nance, room to hide or receive supplies, and low population density with a town or city near enough to allow necessary interaction with the outside world. Large areas scattered around the world meet these criteria.5

In talking with American and foreign government officials and military offi- cers on the front lines fighting terrorists today, we asked them: If you were a terrorist leader today, where would you locate your base? Some of the same places come up again and again on their lists:

  • western Pakistan and the Pakistan-Afghanistan border region
  • southern or western Afghanistan
  • the Arabian Peninsula, especially Saudi Arabia and Yemen, and the nearby Horn of Africa, including Somalia and extending southwest into Kenya
  • Southeast Asia, from Thailand to the southern Philippines to Indonesia
  • West Africa, including Nigeria and Mali
  • European cities with expatriate Muslim communities, especially cities

in central and eastern Europe where security forces and border con- trols are less effective

In the twentieth century, strategists focused on the world’s great industrial heartlands. In the twenty-first, the focus is in the opposite direction, toward remote regions and failing states. The United States has had to find ways to extend its reach, straining the limits of its influence.

Every policy decision we make needs to be seen through this lens. If, for example, Iraq becomes a failed state, it will go to the top of the list of places that are breeding grounds for attacks against Americans at home. Similarly, if we are paying insufficient attention to Afghanistan, the rule of the Taliban or warlords and narcotraffickers may reemerge and its countryside could once again offer refuge to al Qaeda, or its successor.

Recommendation:The U.S. government must identify and prioritize actual or potential terrorist sanctuaries. For each, it should have a realistic strategy to keep possible terrorists insecure and on the run, using all elements of national power. We should reach out, listen to, and work with other countries that can help.

We offer three illustrations that are particularly applicable today, in 2004: Pak- istan, Afghanistan, and Saudi Arabia.

Pakistan

Pakistan’s endemic poverty, widespread corruption, and often ineffective gov- ernment create opportunities for Islamist recruitment. Poor education is a par- ticular concern. Millions of families, especially those with little money, send their children to religious schools, or madrassahs. Many of these schools are the only opportunity available for an education, but some have been used as incubators for violent extremism. According to Karachi’s police commander, there are 859 madrassahs teaching more than 200,000 youngsters in his city alone.6

It is hard to overstate the importance of Pakistan in the struggle against Islamist terrorism.Within Pakistan’s borders are 150 million Muslims, scores of al Qaeda terrorists, many Taliban fighters, and—perhaps—Usama Bin Ladin. Pakistan possesses nuclear weapons and has come frighteningly close to war with nuclear-armed India over the disputed territory of Kashmir. A political battle among anti-American Islamic fundamentalists, the Pakistani military, and more moderate mainstream political forces has already spilled over into vio- lence, and there have been repeated recent attempts to kill Pakistan’s president, Pervez Musharraf.

In recent years, the United States has had three basic problems in its rela- tionship with Pakistan:

  • On terrorism, Pakistan helped nurture the Taliban.The Pakistani army and intelligence services, especially below the top ranks, have long been ambivalent about confronting Islamist extremists. Many in the government have sympathized with or provided support to the extremists. Musharraf agreed that Bin Ladin was bad. But before 9/11, preserving good relations with the Taliban took precedence.
  • On proliferation, Musharraf has repeatedly said that Pakistan does not barter with its nuclear technology. But proliferation concerns have been long-standing and very serious. Most recently, the Pakistani gov- ernment has claimed not to have known that one of its nuclear weapons developers, a national figure, was leading the most danger- ous nuclear smuggling ring ever disclosed.
  • Finally, Pakistan has made little progress toward the return of demo- cratic rule at the national level, although that turbulent process does continue to function at the provincial level and the Pakistani press remains relatively free.

Immediately after 9/11, confronted by the United States with a stark choice, Pakistan made a strategic decision. Its government stood aside and allowed the U.S.-led coalition to destroy the Taliban regime. In other ways, Pakistan actively assisted: its authorities arrested more than 500 al Qaeda operatives and Taliban members, and Pakistani forces played a leading part in tracking down KSM, Abu Zubaydah, and other key al Qaeda figures.7

In the following two years, the Pakistani government tried to walk the fence, helping against al Qaeda while seeking to avoid a larger confrontation with Tal- iban remnants and other Islamic extremists. When al Qaeda and its Pakistani allies repeatedly tried to assassinate Musharraf, almost succeeding, the battle came home.

The country’s vast unpoliced regions make Pakistan attractive to extremists seeking refuge and recruits and also provide a base for operations against coali- tion forces in Afghanistan. Almost all the 9/11 attackers traveled the north- south nexus of Kandahar–Quetta–Karachi.The Baluchistan region of Pakistan (KSM’s ethnic home) and the sprawling city of Karachi remain centers of Islamist extremism where the U.S. and Pakistani security and intelligence pres- ence has been weak. The U.S. consulate in Karachi is a makeshift fortress, reflecting the gravity of the surrounding threat.8

During the winter of 2003–2004, Musharraf made another strategic deci- sion. He ordered the Pakistani army into the frontier provinces of northwest Pakistan along the Afghan border, where Bin Ladin and Ayman al Zawahiri have reportedly taken refuge. The army is confronting groups of al Qaeda fighters and their local allies in very difficult terrain. On the other side of the frontier,

U.S. forces in Afghanistan have found it challenging to organize effective joint

operations, given Pakistan’s limited capabilities and reluctance to permit U.S. military operations on its soil.Yet in 2004, it is clear that the Pakistani govern- ment is trying harder than ever before in the battle against Islamist terrorists.9

Acknowledging these problems and Musharraf ’s own part in the story, we believe that Musharraf ’s government represents the best hope for stability in Pakistan and Afghanistan.

  • In an extraordinary public essay asking how Muslims can “drag our- selves out of the pit we find ourselves in, to raise ourselves up,” Musharraf has called for a strategy of “enlightened moderation.”The Muslim world, he said, should shun militancy and extremism; the West—and the United States in particular—should seek to resolve dis- putes with justice and help better the Muslim world.10
  • Having come close to war in 2002 and 2003, Pakistan and India have recently made significant progress in peacefully discussing their long- standing differences.The United States has been and should remain a key supporter of that process.
  • The constant refrain of Pakistanis is that the United States long treated them as allies of convenience. As the United States makes fresh com- mitments now, it should make promises it is prepared to keep, for years to come.
Recommendation: If Musharraf stands for enlightened moderation in a fight for his life and for the life of his country, the United States should be willing to make hard choices too, and make the difficult long-term commitment to the future of Pakistan. Sustaining the cur- rent scale of aid to Pakistan, the United States should support Pak- istan’s government in its struggle against extremists with a comprehensive effort that extends from military aid to support for better education, so long as Pakistan’s leaders remain willing to make difficult choices of their own.

Afghanistan

Afghanistan was the incubator for al Qaeda and for the 9/11 attacks. In the fall of 2001, the U.S.-led international coalition and its Afghan allies toppled the Taliban and ended the regime’s protection of al Qaeda. Notable progress has been made. International cooperation has been strong, with a clear UN man- date and a NATO-led peacekeeping force (the International Security Assis- tance Force, or ISAF). More than 10,000 American soldiers are deployed today in Afghanistan, joined by soldiers from NATO allies and Muslim states.A cen- tral government has been established in Kabul, with a democratic constitution, new currency, and a new army. Most Afghans enjoy greater freedom, women

and girls are emerging from subjugation, and 3 million children have returned to school. For the first time in many years, Afghans have reason to hope.11

But grave challenges remain.Taliban and al Qaeda fighters have regrouped in the south and southeast. Warlords control much of the country beyond Kabul, and the land is awash in weapons. Economic development remains a dis- tant hope.The narcotics trade—long a massive sector of the Afghan economy— is again booming. Even the most hardened aid workers refuse to operate in many regions, and some warn that Afghanistan is near the brink of chaos.12

Battered Afghanistan has a chance. Elections are being prepared. It is reveal- ing that in June 2004,Taliban fighters resorted to slaughtering 16 Afghans on a bus, apparently for no reason other than their boldness in carrying an unprecedented Afghan weapon: a voter registration card.

Afghanistan’s president, Hamid Karzai, is brave and committed. He is trying to build genuinely national institutions that can overcome the tradition of allo- cating powers among ethnic communities.Yet even if his efforts are successful and elections bring a democratic government to Afghanistan, the United States faces some difficult choices.

After paying relatively little attention to rebuilding Afghanistan during the military campaign, U.S. policies changed noticeably during 2003. Greater con- sideration of the political dimension and congressional support for a substan- tial package of assistance signaled a longer-term commitment to Afghanistan’s future. One Afghan regional official plaintively told us the country finally has a good government. He begged the United States to keep its promise and not abandon Afghanistan again, as it had in the 1990s.Another Afghan leader noted that if the United States leaves,“we will lose all that we have gained.”13

Most difficult is to define the security mission in Afghanistan.There is con- tinuing political controversy about whether military operations in Iraq have had any effect on the scale of America’s commitment to the future of Afghanistan. The United States has largely stayed out of the central govern- ment’s struggles with dissident warlords and it has largely avoided confronting the related problem of narcotrafficking.14

Recommendation:The President and the Congress deserve praise for their efforts in Afghanistan so far. Now the United States and the international community should make a long-term commitment to a secure and stable Afghanistan, in order to give the government a reasonable opportunity to improve the life of the Afghan people. Afghanistan must not again become a sanctuary for international crime and terrorism. The United States and the international com- munity should help the Afghan government extend its authority over the country, with a strategy and nation-by-nation commitments to achieve their objectives.
  • This is an ambitious recommendation. It would mean a redoubled effort to secure the country, disarm militias, and curtail the age of war- lord rule. But the United States and NATO have already committed themselves to the future of this region—wisely, as the 9/11 story shows—and failed half-measures could be worse than useless.
  • NATO in particular has made Afghanistan a test of the Alliance’s abil- ity to adapt to current security challenges of the future. NATO must pass this test. Currently, the United States and the international com- munity envision enough support so that the central government can build a truly national army and extend essential infrastructure and min- imum public services to major towns and regions.The effort relies in part on foreign civil-military teams, arranged under various national flags. The institutional commitments of NATO and the United Nations to these enterprises are weak. NATO member states are not following through; some of the other states around the world that have pledged assistance to Afghanistan are not fulfilling their pledges.
  • The U.S. presence in Afghanistan is overwhelmingly oriented toward military and security work. The State Department presence is woe- fully understaffed, and the military mission is narrowly focused on al Qaeda and Taliban remnants in the south and southeast.The U.S. gov- ernment can do its part if the international community decides on a joint effort to restore the rule of law and contain rampant crime and narcotics trafficking in this crossroads of Central Asia.15

We heard again and again that the money for assistance is allocated so rigidly that, on the ground, one U.S. agency often cannot improvise or pitch in to help another agency, even in small ways when a few thousand dollars could make a great difference.

The U.S. government should allocate money so that lower-level officials have more flexibility to get the job done across agency lines, adjusting to the circumstances they find in the field.This should include discretionary funds for expenditures by military units that often encounter opportunities to help the local population.

Saudi Arabia

Saudi Arabia has been a problematic ally in combating Islamic extremism.At the level of high policy, Saudi Arabia’s leaders cooperated with American diplomatic initiatives aimed at the Taliban or Pakistan before 9/11. At the same time, Saudi Arabia’s society was a place where al Qaeda raised money directly from indi- viduals and through charities. It was the society that produced 15 of the 19 hijackers.

The Kingdom is one of the world’s most religiously conservative societies, and its identity is closely bound to its religious links, especially its position as the guardian of Islam’s two holiest sites. Charitable giving, or zakat, is one of the five pillars of Islam. It is broader and more pervasive than Western ideas of charity— functioning also as a form of income tax, educational assistance, foreign aid, and a source of political influence.The Western notion of the separation of civic and religious duty does not exist in Islamic cultures. Funding charitable works is an integral function of the governments in the Islamic world. It is so ingrained in Islamic culture that in Saudi Arabia, for example, a department within the Saudi Ministry of Finance and National Economy collects zakat directly, much as the

U.S. Internal Revenue Service collects payroll withholding tax. Closely tied to zakat is the dedication of the government to propagating the Islamic faith, par- ticularly the Wahhabi sect that flourishes in Saudi Arabia.

Traditionally, throughout the Muslim world, there is no formal oversight mechanism for donations. As Saudi wealth increased, the amounts contributed by individuals and the state grew dramatically. Substantial sums went to finance Islamic charities of every kind.

While Saudi domestic charities are regulated by the Ministry of Labor and Social Welfare, charities and international relief agencies, such as the World Assembly of Muslim Youth (WAMY), are currently regulated by the Ministry of Islamic Affairs.This ministry uses zakat and government funds to spread Wah- habi beliefs throughout the world, including in mosques and schools. Often these schools provide the only education available; even in affluent countries, Saudi-funded Wahhabi schools are often the only Islamic schools. Some Wahhabi-funded organizations have been exploited by extremists to further their goal of violent jihad against non-Muslims. One such organization has been the al Haramain Islamic Foundation; the assets of some branch offices have been frozen by the U.S. and Saudi governments.

Until 9/11, few Saudis would have considered government oversight of charitable donations necessary; many would have perceived it as interference in the exercise of their faith. At the same time, the government’s ability to finance most state expenditures with energy revenues has delayed the need for a modern income tax system.As a result, there have been strong religious, cul- tural, and administrative barriers to monitoring charitable spending. That appears to be changing, however, now that the goal of violent jihad also extends to overthrowing Sunni governments (such as the House of Saud) that are not living up to the ideals of the Islamist extremists.16

The leaders of the United States and the rulers of Saudi Arabia have long had friendly relations, rooted in fundamentally common interests against the Soviet Union during the Cold War, in American hopes that Saudi oil supplies would stabilize the supply and price of oil in world markets, and in Saudi hopes that America could help protect the Kingdom against foreign threats.

In 1990, the Kingdom hosted U.S. armed forces before the first U.S.-led war

against Iraq. American soldiers and airmen have given their lives to help pro- tect Saudi Arabia. The Saudi government has difficulty acknowledging this. American military bases remained there until 2003, as part of an international commitment to contain Iraq.

For many years, leaders on both sides preferred to keep their ties quiet and behind the scenes. As a result, neither the U.S. nor the Saudi people appreci- ated all the dimensions of the bilateral relationship, including the Saudi role in

U.S. strategies to promote the Middle East peace process. In each country, polit- ical figures find it difficult to publicly defend good relations with the other.

Today, mutual recriminations flow. Many Americans see Saudi Arabia as an enemy, not as an embattled ally. They perceive an autocratic government that oppresses women, dominated by a wealthy and indolent elite. Saudi contacts with American politicians are frequently invoked as accusations in partisan polit- ical arguments.Americans are often appalled by the intolerance, anti-Semitism, and anti-American arguments taught in schools and preached in mosques.

Saudis are angry too. Many educated Saudis who were sympathetic to America now perceive the United States as an unfriendly state. One Saudi reformer noted to us that the demonization of Saudi Arabia in the U.S. media gives ammunition to radicals, who accuse reformers of being U.S. lackeys.Tens of thousands of Saudis who once regularly traveled to (and often had homes in) the United States now go elsewhere.17

Among Saudis, the United States is seen as aligned with Israel in its conflict with the Palestinians, with whom Saudis ardently sympathize. Although Saudi Arabia’s cooperation against terrorism improved to some extent after the Sep- tember 11 attacks, significant problems remained. Many in the Kingdom ini- tially reacted with disbelief and denial. In the following months, as the truth became clear, some leading Saudis quietly acknowledged the problem but still did not see their own regime as threatened, and thus often did not respond promptly to U.S. requests for help. Though Saddam Hussein was widely detested, many Saudis are sympathetic to the anti-U.S. insurgents in Iraq, although majorities also condemn jihadist attacks in the Kingdom.18

As in Pakistan,Yemen, and other countries, attitudes changed when the ter- rorism came home. Cooperation had already become significant, but after the bombings in Riyadh on May 12, 2003, it improved much more.The Kingdom openly discussed the problem of radicalism, criticized the terrorists as reli- giously deviant, reduced official support for religious activity overseas, closed suspect charitable foundations, and publicized arrests—very public moves for a government that has preferred to keep internal problems quiet.

The Kingdom of Saudi Arabia is now locked in mortal combat with al Qaeda. Saudi police are regularly being killed in shootouts with terrorists. In June 2004, the Saudi ambassador to the United States called publicly—in the Saudi press—for his government to wage a jihad of its own against the terrorists.“We must all, as a state and as a people, recognize the truth about these criminals,”

he declared, “[i]f we do not declare a general mobilization—we will lose this war on terrorism.”19

Saudi Arabia is a troubled country. Although regarded as very wealthy, in fact per capita income has dropped from $28,000 at its height to the present level of about $8,000. Social and religious traditions complicate adjustment to modern economic activity and limit employment opportunities for young Saudis.Women find their education and employment sharply limited.

President Clinton offered us a perceptive analysis of Saudi Arabia, contend- ing that fundamentally friendly rulers have been constrained by their desire to preserve the status quo. He, like others, made the case for pragmatic reform instead. He hopes the rulers will envision what they want their Kingdom to become in 10 or 20 years, and start a process in which their friends can help them change.20

There are signs that Saudi Arabia’s royal family is trying to build a consensus for political reform, though uncertain about how fast and how far to go. Crown Prince Abdullah wants the Kingdom to join the World Trade Organization to accelerate economic liberalization. He has embraced the Arab Human Develop- ment Report, which was highly critical of the Arab world’s political, economic, and social failings and called for greater economic and political reform.21

Cooperation with Saudi Arabia against Islamist terrorism is very much in the U.S. interest. Such cooperation can exist for a time largely in secret, as it does now, but it cannot grow and thrive there. Nor, on either side, can friend- ship be unconditional.

Recommendation:The problems in the U.S.-Saudi relationship must be confronted, openly. The United States and Saudi Arabia must determine if they can build a relationship that political leaders on both sides are prepared to publicly defend—a relationship about more than oil. It should include a shared commitment to political and eco- nomic reform, as Saudis make common cause with the outside world. It should include a shared interest in greater tolerance and cultural respect, translating into a commitment to fight the violent extrem- ists who foment hatred.

12.3 PREVENT THE CONTINUED GROWTH OF ISLAMIST TERRORISM

In October 2003, reflecting on progress after two years of waging the global war on terrorism, Defense Secretary Donald Rumsfeld asked his advisers:“Are we capturing, killing or deterring and dissuading more terrorists every day than the madrassas and the radical clerics are recruiting, training and deploying

against us? Does the US need to fashion a broad, integrated plan to stop the next generation of terrorists? The US is putting relatively little effort into a long-range plan, but we are putting a great deal of effort into trying to stop terrorists. The cost-benefit ratio is against us! Our cost is billions against the terrorists’ costs of millions.”22

These are the right questions. Our answer is that we need short-term action on a long-range strategy, one that invigorates our foreign policy with the atten- tion that the President and Congress have given to the military and intelligence parts of the conflict against Islamist terrorism.

Engage the Struggle of Ideas

The United States is heavily engaged in the Muslim world and will be for many years to come.This American engagement is resented. Polls in 2002 found that among America’s friends, like Egypt—the recipient of more U.S. aid for the past 20 years than any other Muslim country—only 15 percent of the popu- lation had a favorable opinion of the United States. In Saudi Arabia the num- ber was 12 percent.And two-thirds of those surveyed in 2003 in countries from Indonesia to Turkey (a NATO ally) were very or somewhat fearful that the United States may attack them.23

Support for the United States has plummeted. Polls taken in Islamic coun- tries after 9/11 suggested that many or most people thought the United States was doing the right thing in its fight against terrorism; few people saw popu- lar support for al Qaeda; half of those surveyed said that ordinary people had a favorable view of the United States. By 2003, polls showed that “the bottom has fallen out of support for America in most of the Muslim world. Negative views of the U.S. among Muslims, which had been largely limited to countries in the Middle East, have spread.  Since last summer, favorable ratings for the

U.S. have fallen from 61% to 15% in Indonesia and from 71% to 38% among Muslims in Nigeria.”24

Many of these views are at best uninformed about the United States and, at worst, informed by cartoonish stereotypes, the coarse expression of a fash- ionable “Occidentalism” among intellectuals who caricature U.S. values and policies. Local newspapers and the few influential satellite broadcasters—like al Jazeera—often reinforce the jihadist theme that portrays the United States as anti-Muslim.25

The small percentage of Muslims who are fully committed to Usama Bin Ladin’s version of Islam are impervious to persuasion. It is among the large majority of Arabs and Muslims that we must encourage reform, freedom, democracy, and opportunity, even though our own promotion of these mes- sages is limited in its effectiveness simply because we are its carriers. Muslims themselves will have to reflect upon such basic issues as the concept of jihad, the position of women, and the place of non-Muslim minorities.The United

States can promote moderation, but cannot ensure its ascendancy. Only Mus- lims can do this.

The setting is difficult.The combined gross domestic product of the 22 coun- tries in the Arab League is less than the GDP of Spain. Forty percent of adult Arabs are illiterate, two-thirds of them women. One-third of the broader Mid- dle East lives on less than two dollars a day. Less than 2 percent of the popula- tion has access to the Internet. The majority of older Arab youths have expressed a desire to emigrate to other countries, particularly those in Europe.26 In short, the United States has to help defeat an ideology, not just a group of people, and we must do so under difficult circumstances. How can the United

States and its friends help moderate Muslims combat the extremist ideas?

Recommendation: The U.S. government must define what the mes- sage is, what it stands for.We should offer an example of moral lead- ership in the world, committed to treat people humanely, abide by the rule of law, and be generous and caring to our neighbors. Amer- ica and Muslim friends can agree on respect for human dignity and opportunity. To Muslim parents, terrorists like Bin Ladin have noth- ing to offer their children but visions of violence and death. America and its friends have a crucial advantage—we can offer these parents a vision that might give their children a better future. If we heed the views of thoughtful leaders in the Arab and Muslim world, a moder- ate consensus can be found.

That vision of the future should stress life over death: individual educational and economic opportunity. This vision includes widespread political participa- tion and contempt for indiscriminate violence. It includes respect for the rule of law, openness in discussing differences, and tolerance for opposing points of view.

Recommendation: Where Muslim governments, even those who are friends, do not respect these principles, the United States must stand for a better future. One of the lessons of the long Cold War was that short-term gains in cooperating with the most repressive and brutal governments were too often outweighed by long-term setbacks for America’s stature and interests.

American foreign policy is part of the message. America’s policy choices have consequences. Right or wrong, it is simply a fact that American policy regarding the Israeli-Palestinian conflict and American actions in Iraq are dom- inant staples of popular commentary across the Arab and Muslim world.That does not mean U.S. choices have been wrong. It means those choices must be integrated with America’s message of opportunity to the Arab and Muslim

world. Neither Israel nor the new Iraq will be safer if worldwide Islamist ter- rorism grows stronger.

The United States must do more to communicate its message. Reflecting on Bin Ladin’s success in reaching Muslim audiences, Richard Holbrooke won- dered, “How can a man in a cave outcommunicate the world’s leading com- munications society?” Deputy Secretary of State Richard Armitage worried to us that Americans have been “exporting our fears and our anger,” not our vision of opportunity and hope.27

Recommendation: Just as we did in the Cold War, we need to defend our ideals abroad vigorously. America does stand up for its values. The United States defended, and still defends, Muslims against tyrants and criminals in Somalia, Bosnia, Kosovo, Afghanistan, and Iraq. If the United States does not act aggressively to define itself in the Islamic world, the extremists will gladly do the job for us.

  • Recognizing that Arab and Muslim audiences rely on satellite television and radio, the government has begun some prom- ising initiatives in television and radio broadcasting to the Arab world, Iran, and Afghanistan.These efforts are beginning to reach large audiences. The Broadcasting Board of Gover- nors has asked for much larger resources. It should get them.
  • The United States should rebuild the scholarship, exchange, and library programs that reach out to young people and offer them knowledge and hope.Where such assistance is pro- vided, it should be identified as coming from the citizens of the United States.

An Agenda of Opportunity

The United States and its friends can stress educational and economic oppor- tunity.The United Nations has rightly equated “literacy as freedom.”

  • The international community is moving toward setting a concrete goal—to cut the Middle East region’s illiteracy rate in half by 2010, targeting women and girls and supporting programs for adult literacy.
  • Unglamorous help is needed to support the basics, such as textbooks that translate more of the world’s knowledge into local languages and libraries to house such materials. Education about the outside world, or other cultures, is weak.
  • More vocational education is needed, too, in trades and business skills. The Middle East can also benefit from some of the programs to bridge the digital divide and increase Internet access that have already been developed for other regions of the world.

Education that teaches tolerance, the dignity and value of each individual, and respect for different beliefs is a key element in any global strategy to eliminate Islamist terrorism.

Recommendation: The U.S. government should offer to join with other nations in generously supporting a new International Youth Opportunity Fund. Funds will be spent directly for building and operating primary and secondary schools in those Muslim states that commit to sensibly investing their own money in public education.

Economic openness is essential.Terrorism is not caused by poverty. Indeed, many terrorists come from relatively well-off families.Yet when people lose hope, when societies break down, when countries fragment, the breeding grounds for terrorism are created. Backward economic policies and repressive political regimes slip into societies that are without hope, where ambition and passions have no constructive outlet.

The policies that support economic development and reform also have political implications. Economic and political liberties tend to be linked. Com- merce, especially international commerce, requires ongoing cooperation and compromise, the exchange of ideas across cultures, and the peaceful resolution of differences through negotiation or the rule of law. Economic growth expands the middle class, a constituency for further reform. Successful economies rely on vibrant private sectors, which have an interest in curbing indiscriminate government power.Those who develop the practice of control- ling their own economic destiny soon desire a voice in their communities and political societies.

The U.S. government has announced the goal of working toward a Middle East Free Trade Area, or MEFTA, by 2013.The United States has been seek- ing comprehensive free trade agreements (FTAs) with the Middle Eastern nations most firmly on the path to reform.The U.S.-Israeli FTA was enacted in 1985, and Congress implemented an FTA with Jordan in 2001. Both agree- ments have expanded trade and investment, thereby supporting domestic eco- nomic reform. In 2004, new FTAs were signed with Morocco and Bahrain, and are awaiting congressional approval.These models are drawing the inter- est of their neighbors. Muslim countries can become full participants in the rules-based global trading system, as the United States considers lowering its trade barriers with the poorest Arab nations.

Recommendation: A comprehensive U.S. strategy to counter terror- ism should include economic policies that encourage development, more open societies, and opportunities for people to improve the lives of their families and to enhance prospects for their children’s future.

Turning a National Strategy into a Coalition Strategy

Practically every aspect of U.S. counterterrorism strategy relies on international cooperation. Since 9/11, these contacts concerning military, law enforcement, intelligence, travel and customs, and financial matters have expanded so dra- matically, and often in an ad hoc way, that it is difficult to track these efforts, much less integrate them.

Recommendation: The United States should engage other nations in developing a comprehensive coalition strategy against Islamist terror- ism. There are several multilateral institutions in which such issues should be addressed. But the most important policies should be dis- cussed and coordinated in a flexible contact group of leading coalition governments.This is a good place, for example, to develop joint strate- gies for targeting terrorist travel, or for hammering out a common strategy for the places where terrorists may be finding sanctuary.

Presently the Muslim and Arab states meet with each other, in organizations such as the Islamic Conference and the Arab League.The Western states meet with each other in organizations such as NATO and the Group of Eight sum- mit of leading industrial nations.A recent G-8 summit initiative to begin a dia- logue about reform may be a start toward finding a place where leading Muslim states can discuss—and be seen to discuss—critical policy issues with the lead- ing Western powers committed to the future of the Arab and Muslim world.

These new international efforts can create durable habits of visible cooper- ation, as states willing to step up to their responsibilities join together in con- structive efforts to direct assistance and coordinate action.

Coalition warfare also requires coalition policies on what to do with enemy captives.Allegations that the United States abused prisoners in its custody make it harder to build the diplomatic, political, and military alliances the government will need. The United States should work with friends to develop mutually agreed-on principles for the detention and humane treatment of captured inter- national terrorists who are not being held under a particular country’s criminal laws. Countries such as Britain,Australia, and Muslim friends, are committed to fighting terrorists.America should be able to reconcile its views on how to bal- ance humanity and security with our nation’s commitment to these same goals. The United States and some of its allies do not accept the application of full Geneva Convention treatment of prisoners of war to captured terrorists.Those

Conventions establish a minimum set of standards for prisoners in internal con- flicts. Since the international struggle against Islamist terrorism is not internal, those provisions do not formally apply, but they are commonly accepted as basic standards for humane treatment.

Recommendation: The United States should engage its friends to develop a common coalition approach toward the detention and humane treatment of captured terrorists. New principles might draw upon Article 3 of the Geneva Conventions on the law of armed con- flict. That article was specifically designed for those cases in which the usual laws of war did not apply. Its minimum standards are gen- erally accepted throughout the world as customary international law.

Proliferation of Weapons of Mass Destruction

The greatest danger of another catastrophic attack in the United States will materialize if the world’s most dangerous terrorists acquire the world’s most dangerous weapons. As we note in chapter 2, al Qaeda has tried to acquire or make nuclear weapons for at least ten years. In chapter 4, we mentioned offi- cials worriedly discussing, in 1998, reports that Bin Ladin’s associates thought their leader was intent on carrying out a “Hiroshima.”

These ambitions continue. In the public portion of his February 2004 worldwide threat assessment to Congress, DCI Tenet noted that Bin Ladin con- sidered the acquisition of weapons of mass destruction to be a “religious obli- gation.” He warned that al Qaeda “continues to pursue its strategic goal of obtaining a nuclear capability.”Tenet added that “more than two dozen other terrorist groups are pursuing CBRN [chemical, biological, radiological, and nuclear] materials.”28

A nuclear bomb can be built with a relatively small amount of nuclear mate- rial. A trained nuclear engineer with an amount of highly enriched uranium or plutonium about the size of a grapefruit or an orange, together with com- mercially available material, could fashion a nuclear device that would fit in a van like the one Ramzi Yousef parked in the garage of the World Trade Cen- ter in 1993. Such a bomb would level Lower Manhattan.29

The coalition strategies we have discussed to combat Islamist terrorism should therefore be combined with a parallel, vital effort to prevent and counter the proliferation of weapons of mass destruction (WMD).We recommend sev- eral initiatives in this area.

Strengthen Counterproliferation Efforts. While efforts to shut down Libya’s illegal nuclear program have been generally successful, Pakistan’s illicit trade and the nuclear smuggling networks of Pakistani scientist A.Q. Khan have revealed that the spread of nuclear weapons is a problem of global dimensions. Attempts to deal with Iran’s nuclear program are still underway.Therefore, the

United States should work with the international community to develop laws and an international legal regime with universal jurisdiction to enable the cap- ture, interdiction, and prosecution of such smugglers by any state in the world where they do not disclose their activities.

Expand the Proliferation Security Initiative. In May 2003, the Bush administration announced the Proliferation Security Initiative (PSI): nations in a willing partnership combining their national capabilities to use military, eco- nomic, and diplomatic tools to interdict threatening shipments of WMD and missile-related technology.

The PSI can be more effective if it uses intelligence and planning resources of the NATO alliance. Moreover, PSI membership should be open to non- NATO countries. Russia and China should be encouraged to participate.

Support the Cooperative Threat Reduction Program. Outside experts are deeply worried about the U.S. government’s commitment and approach to securing the weapons and highly dangerous materials still scattered in Russia and other countries of the Soviet Union.The government’s main instrument in this area, the Cooperative Threat Reduction Program (usually referred to as “Nunn-Lugar,” after the senators who sponsored the legislation in 1991), is now in need of expansion, improvement, and resources.The U.S. government has recently redoubled its international commitments to support this program, and we recommend that the United States do all it can, if Russia and other countries will do their part. The government should weigh the value of this investment against the catastrophic cost America would face should such weapons find their way to the terrorists who are so anxious to acquire them.

Recommendation: Our report shows that al Qaeda has tried to acquire or make weapons of mass destruction for at least ten years. There is no doubt the United States would be a prime target. Pre- venting the proliferation of these weapons warrants a maximum effort—by strengthening counterproliferation efforts, expanding the Proliferation Security Initiative, and supporting the Cooperative Threat Reduction program.

Targeting Terrorist Money

The general public sees attacks on terrorist finance as a way to “starve the ter- rorists of money.” So, initially, did the U.S. government.After 9/11, the United States took aggressive actions to designate terrorist financiers and freeze their money, in the United States and through resolutions of the United Nations. These actions appeared to have little effect and, when confronted by legal chal- lenges, the United States and the United Nations were often forced to unfreeze assets.

The difficulty, understood later, was that even if the intelligence commu- nity might “link” someone to a terrorist group through acquaintances or com- munications, the task of tracing the money from that individual to the terrorist group, or otherwise showing complicity, was far more difficult. It was harder still to do so without disclosing secrets.

These early missteps made other countries unwilling to freeze assets or otherwise act merely on the basis of a U.S. action. Multilateral freezing mech- anisms now require waiting periods before being put into effect, eliminating the element of surprise and thus virtually ensuring that little money is actually frozen. Worldwide asset freezes have not been adequately enforced and have been easily circumvented, often within weeks, by simple methods.

But trying to starve the terrorists of money is like trying to catch one kind of fish by draining the ocean. A better strategy has evolved since those early months, as the government learned more about how al Qaeda raises, moves, and spends money.

Recommendation:Vigorous efforts to track terrorist financing must remain front and center in U.S. counterterrorism efforts.The govern- ment has recognized that information about terrorist money helps us to understand their networks, search them out, and disrupt their operations. Intelligence and law enforcement have targeted the rela- tively small number of financial facilitators—individuals al Qaeda relied on for their ability to raise and deliver money—at the core of al Qaeda’s revenue stream. These efforts have worked. The death or capture of several important facilitators has decreased the amount of money available to al Qaeda and has increased its costs and difficulty in raising and moving that money. Captures have additionally pro- vided a windfall of intelligence that can be used to continue the cycle of disruption.

The U.S. financial community and some international financial institutions have generally provided law enforcement and intelligence agencies with extraordinary cooperation, particularly in supplying information to support quickly developing investigations. Obvious vulnerabilities in the U.S. financial system have been corrected.The United States has been less successful in per- suading other countries to adopt financial regulations that would permit the tracing of financial transactions.

Public designation of terrorist financiers and organizations is still part of the fight, but it is not the primary weapon. Designations are instead a form of diplo- macy, as governments join together to identify named individuals and groups as terrorists.They also prevent open fundraising. Some charities that have been identified as likely avenues for terrorist financing have seen their donations

diminish and their activities come under more scrutiny, and others have been put out of business, although controlling overseas branches of Gulf-area char- ities remains a challenge. The Saudi crackdown after the May 2003 terrorist attacks in Riyadh has apparently reduced the funds available to al Qaeda—per- haps drastically—but it is too soon to know if this reduction will last.

Though progress apparently has been made, terrorists have shown consid- erable creativity in their methods of moving money. If al Qaeda is replaced by smaller, decentralized terrorist groups, the premise behind the government’s efforts—that terrorists need a financial support network—may become out- dated. Moreover, some terrorist operations do not rely on outside sources of money and may now be self-funding, either through legitimate employment or low-level criminal activity.30

12.4 PROTECT AGAINST AND PREPARE FOR TERRORIST ATTACKS

In the nearly three years since 9/11, Americans have become better protected against terrorist attack. Some of the changes are due to government action, such as new precautions to protect aircraft.A portion can be attributed to the sheer scale of spending and effort. Publicity and the vigilance of ordinary Americans also make a difference.

But the President and other officials acknowledge that although Americans may be safer, they are not safe. Our report shows that the terrorists analyze defenses.They plan accordingly.

Defenses cannot achieve perfect safety. They make targets harder to attack successfully, and they deter attacks by making capture more likely. Just increas- ing the attacker’s odds of failure may make the difference between a plan attempted, or a plan discarded.The enemy also may have to develop more elab- orate plans, thereby increasing the danger of exposure or defeat.

Protective measures also prepare for the attacks that may get through, con- taining the damage and saving lives.

Terrorist Travel

More than 500 million people annually cross U.S. borders at legal entry points, about 330 million of them noncitizens. Another 500,000 or more enter ille- gally without inspection across America’s thousands of miles of land borders or remain in the country past the expiration of their permitted stay. The challenge for national security in an age of terrorism is to prevent the very few people who may pose overwhelming risks from entering or remaining in the United States undetected.31

In the decade before September 11, 2001, border security—encompassing

travel, entry, and immigration—was not seen as a national security matter. Pub- lic figures voiced concern about the “war on drugs,” the right level and kind of immigration, problems along the southwest border, migration crises origi- nating in the Caribbean and elsewhere, or the growing criminal traffic in humans.The immigration system as a whole was widely viewed as increasingly dysfunctional and badly in need of reform. In national security circles, how- ever, only smuggling of weapons of mass destruction carried weight, not the entry of terrorists who might use such weapons or the presence of associated foreign-born terrorists.

For terrorists, travel documents are as important as weapons.Terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack. To them, international travel presents great danger, because they must surface to pass through regulated channels, present themselves to border security offi- cials, or attempt to circumvent inspection points.

In their travels, terrorists use evasive methods, such as altered and counter- feit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.These can sometimes be detected.

Before 9/11, no agency of the U.S. government systematically analyzed ter- rorists’ travel strategies. Had they done so, they could have discovered the ways in which the terrorist predecessors to al Qaeda had been systematically but detectably exploiting weaknesses in our border security since the early 1990s. We found that as many as 15 of the 19 hijackers were potentially vulnera- ble to interception by border authorities. Analyzing their characteristic travel documents and travel patterns could have allowed authorities to intercept 4 to 15 hijackers and more effective use of information available in U.S. govern-

ment databases could have identified up to 3 hijackers.32

Looking back, we can also see that the routine operations of our immigra- tion laws—that is, aspects of those laws not specifically aimed at protecting against terrorism—inevitably shaped al Qaeda’s planning and opportunities. Because they were deemed not to be bona fide tourists or students as they claimed, five conspirators that we know of tried to get visas and failed, and one was denied entry by an inspector.We also found that had the immigration sys- tem set a higher bar for determining whether individuals are who or what they claim to be—and ensuring routine consequences for violations—it could poten- tially have excluded, removed, or come into further contact with several hijack- ers who did not appear to meet the terms for admitting short-term visitors.33

Our investigation showed that two systemic weaknesses came together in our border system’s inability to contribute to an effective defense against the 9/11 attacks: a lack of well-developed counterterrorism measures as a part of border security and an immigration system not able to deliver on its basic com- mitments, much less support counterterrorism. These weaknesses have been reduced but are far from being overcome.

Recommendation: Targeting travel is at least as powerful a weapon against terrorists as targeting their money. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility.

Since 9/11, significant improvements have been made to create an integrated watchlist that makes terrorist name information available to border and law enforcement authorities. However, in the already difficult process of merging border agencies in the new Department of Homeland Security—“changing the engine while flying” as one official put it34—new insights into terrorist travel have not yet been integrated into the front lines of border security.

The small terrorist travel intelligence collection and analysis program cur- rently in place has produced disproportionately useful results. It should be expanded. Since officials at the borders encounter travelers and their documents first and investigate travel facilitators, they must work closely with intelligence officials.

Internationally and in the United States, constraining terrorist travel should become a vital part of counterterrorism strategy. Better technology and train- ing to detect terrorist travel documents are the most important immediate steps to reduce America’s vulnerability to clandestine entry. Every stage of our bor- der and immigration system should have as a part of its operations the detec- tion of terrorist indicators on travel documents. Information systems able to authenticate travel documents and detect potential terrorist indicators should be used at consulates, at primary border inspection lines, in immigration serv- ices offices, and in intelligence and enforcement units. All frontline personnel should receive some training. Dedicated specialists and ongoing linkages with the intelligence community are also required.The Homeland Security Depart- ment’s Directorate of Information Analysis and Infrastructure Protection should receive more resources to accomplish its mission as the bridge between the frontline border agencies and the rest of the government counterterrorism community.

A Biometric Screening System

When people travel internationally, they usually move through defined chan- nels, or portals.They may seek to acquire a passport.They may apply for a visa. They stop at ticket counters, gates, and exit controls at airports and seaports. Upon arrival, they pass through inspection points.They may transit to another gate to get on an airplane. Once inside the country, they may seek another form of identification and try to enter a government or private facility. They may seek to change immigration status in order to remain.

Each of these checkpoints or portals is a screening—a chance to establish that people are who they say they are and are seeking access for their stated purpose, to intercept identifiable suspects, and to take effective action.

The job of protection is shared among these many defined checkpoints. By taking advantage of them all, we need not depend on any one point in the sys- tem to do the whole job.The challenge is to see the common problem across agencies and functions and develop a conceptual framework—an architec- ture—for an effective screening system.35

Throughout government, and indeed in private enterprise, agencies and firms at these portals confront recurring judgments that balance security, effi- ciency, and civil liberties.These problems should be addressed systemically, not in an ad hoc, fragmented way. For example:

What information is an individual required to present and in what form? A fundamental problem, now beginning to be addressed, is the lack of standardized information in “feeder” documents used in identifying individu- als. Biometric identifiers that measure unique physical characteristics, such as facial features, fingerprints, or iris scans, and reduce them to digitized, numer- ical statements called algorithms, are just beginning to be used.Travel history, however, is still recorded in passports with entry-exit stamps called cachets, which al Qaeda has trained its operatives to forge and use to conceal their ter- rorist activities.

How will the individual and the information be checked? There are many databases just in the United States—for terrorist, criminal, and immigra- tion history, as well as financial information, for instance. Each is set up for dif- ferent purposes and stores different kinds of data, under varying rules of access. Nor is access always guaranteed. Acquiring information held by foreign gov- ernments may require painstaking negotiations, and records that are not yet dig- itized are difficult to search or analyze.The development of terrorist indicators has hardly begun, and behavioral cues remain important.

Who will screen individuals, and what will they be trained to do? A wide range of border, immigration, and law enforcement officials encounter visitors and immigrants and they are given little training in terrorist travel intel- ligence. Fraudulent travel documents, for instance, are usually returned to trav- elers who are denied entry without further examination for terrorist trademarks, investigation as to their source, or legal process.

What are the consequences of finding a suspicious indicator, and who will take action? One risk is that responses may be ineffective or produce no further information. Four of the 9/11 attackers were pulled into secondary bor- der inspection, but then admitted. More than half of the 19 hijackers were flagged by the Federal Aviation Administration’s profiling system when they arrived for their flights, but the consequence was that bags, not people, were

checked. Competing risks include “false positives,” or the danger that rules may be applied with insufficient training or judgment. Overreactions can impose high costs too—on individuals, our economy, and our beliefs about justice.

  • A special note on the importance of trusting subjective judgment: One potential hijacker was turned back by an immigration inspector as he tried to enter the United States. The inspector relied on intu- itive experience to ask questions more than he relied on any objec- tive factor that could be detected by “scores” or a machine. Good people who have worked in such jobs for a long time understand this phenomenon well. Other evidence we obtained confirmed the importance of letting experienced gate agents or security screeners ask questions and use their judgment.This is not an invitation to arbitrary exclusions. But any effective system has to grant some scope, perhaps in a little extra inspection or one more check, to the instincts and dis- cretion of well trained human beings.
Recommendation: The U.S. border security system should be inte- grated into a larger network of screening points that includes our trans- portation system and access to vital facilities, such as nuclear reactors. The President should direct the Department of Homeland Security to lead the effort to design a comprehensive screening system, addressing common problems and setting common standards with systemwide goals in mind. Extending those standards among other governments could dramatically strengthen America and the world’s collective abil- ity to intercept individuals who pose catastrophic threats.

We advocate a system for screening, not categorical profiling. A screening system looks for particular, identifiable suspects or indicators of risk. It does not involve guesswork about who might be dangerous. It requires frontline border officials who have the tools and resources to establish that people are who they say they are, intercept identifiable suspects, and disrupt terrorist operations.

The U.S. Border Screening System

The border and immigration system of the United States must remain a visible manifestation of our belief in freedom, democracy, global economic growth, and the rule of law, yet serve equally well as a vital element of counterterrorism. Inte- grating terrorist travel information in the ways we have described is the most immediate need. But the underlying system must also be sound.

Since September 11, the United States has built the first phase of a biomet- ric screening program, called US VISIT (the United States Visitor and Immi- grant Status Indicator Technology program). It takes two biometric

identifiers—digital photographs and prints of two index fingers—from travel- ers. False identities are used by terrorists to avoid being detected on a watch- list.These biometric identifiers make such evasions far more difficult.

So far, however, only visitors who acquire visas to travel to the United States are covered. While visitors from “visa waiver” countries will be added to the program, beginning this year, covered travelers will still constitute only about 12 percent of all noncitizens crossing U.S. borders. Moreover, exit data are not uniformly collected and entry data are not fully automated. It is not clear the system can be installed before 2010, but even this timetable may be too slow, given the possible security dangers.36

  • Americans should not be exempt from carrying biometric passports or otherwise enabling their identities to be securely verified when they enter the United States; nor should Canadians or Mexicans. Cur- rently U.S. persons are exempt from carrying passports when return- ing from Canada, Mexico, and the Caribbean. The current system enables non-U.S. citizens to gain entry by showing minimal identifi- cation. The 9/11 experience shows that terrorists study and exploit America’s vulnerabilities.
  • To balance this measure, programs to speed known travelers should be a higher priority, permitting inspectors to focus on greater risks. The daily commuter should not be subject to the same measures as first-time travelers.An individual should be able to preenroll, with his or her identity verified in passage. Updates of database information and other checks can ensure ongoing reliability. The solution, requir- ing more research and development, is likely to combine radio fre- quency technology with biometric identifiers.37
  • The current patchwork of border screening systems, including several frequent traveler programs, should be consolidated with the USVISIT system to enable the development of an integrated system, which in turn can become part of the wider screening plan we suggest.
  • The program allowing individuals to travel from foreign countries through the United States to a third country, without having to obtain a U.S. visa, has been suspended. Because “transit without visa” can be exploited by terrorists to enter the United States, the program should not be reinstated unless and until transit passage areas can be fully secured to prevent passengers from illegally exiting the airport.

Inspectors adjudicating entries of the 9/11 hijackers lacked adequate infor- mation and knowledge of the rules. All points in the border system—from con- sular offices to immigration services offices—will need appropriate electronic access to an individual’s file. Scattered units at Homeland Security and the State

Department perform screening and data mining: instead, a government-wide team of border and transportation officials should be working together.A mod- ern border and immigration system should combine a biometric entry-exit sys- tem with accessible files on visitors and immigrants, along with intelligence on indicators of terrorist travel.

Our border screening system should check people efficiently and welcome friends. Admitting large numbers of students, scholars, businesspeople, and tourists fuels our economy, cultural vitality, and political reach. There is evi- dence that the present system is disrupting travel to the United States. Over- all, visa applications in 2003 were down over 32 percent since 2001. In the Middle East, they declined about 46 percent.Training and the design of secu- rity measures should be continuously adjusted.38

Recommendation: The Department of Homeland Security, properly supported by the Congress, should complete, as quickly as possible, a biometric entry-exit screening system, including a single system for speeding qualified travelers. It should be integrated with the system that provides benefits to foreigners seeking to stay in the United States. Linking biometric passports to good data systems and deci- sionmaking is a fundamental goal. No one can hide his or her debt by acquiring a credit card with a slightly different name.Yet today, a terrorist can defeat the link to electronic records by tossing away an old passport and slightly altering the name in the new one.

Completion of the entry-exit system is a major and expensive challenge. Biometrics have been introduced into an antiquated computer environment. Replacement of these systems and improved biometric systems will be required. Nonetheless, funding and completing a biometrics-based entry-exit system is an essential investment in our national security.

Exchanging terrorist information with other countries, consistent with pri- vacy requirements, along with listings of lost and stolen passports, will have immediate security benefits.We should move toward real-time verification of passports with issuing authorities. The further away from our borders that screening occurs, the more security benefits we gain. At least some screening should occur before a passenger departs on a flight destined for the United States.We should also work with other countries to ensure effective inspection regimes at all airports.39

The international community arrives at international standards for the design of passports through the International Civil Aviation Organization (ICAO). The global standard for identification is a digital photograph; finger- prints are optional.We must work with others to improve passport standards and provide foreign assistance to countries that need help in making the transition.40

Recommendation: The U.S. government cannot meet its own obli- gations to the American people to prevent the entry of terrorists without a major effort to collaborate with other governments. We should do more to exchange terrorist information with trusted allies, and raise U.S. and global border security standards for travel and bor- der crossing over the medium and long term through extensive inter- national cooperation.

Immigration Law and Enforcement

Our borders and immigration system, including law enforcement, ought to send a message of welcome, tolerance, and justice to members of immigrant communities in the United States and in their countries of origin.We should reach out to immigrant communities. Good immigration services are one way of doing so that is valuable in every way—including intelligence.

It is elemental to border security to know who is coming into the country. Today more than 9 million people are in the United States outside the legal immigration system.We must also be able to monitor and respond to entrances between our ports of entry, working with Canada and Mexico as much as pos- sible.

There is a growing role for state and local law enforcement agencies.They need more training and work with federal agencies so that they can cooperate more effectively with those federal authorities in identifying terrorist suspects. All but one of the 9/11 hijackers acquired some form of U.S. identification document, some by fraud. Acquisition of these forms of identification would have assisted them in boarding commercial flights, renting cars, and other nec-

essary activities.

Recommendation: Secure identification should begin in the United States. The federal government should set standards for the issuance of birth certificates and sources of identification, such as drivers licenses. Fraud in identification documents is no longer just a prob- lem of theft. At many entry points to vulnerable facilities, including gates for boarding aircraft, sources of identification are the last oppor- tunity to ensure that people are who they say they are and to check whether they are terrorists.41

Strategies for Aviation and Transportation Security

The U.S. transportation system is vast and, in an open society, impossible to secure completely against terrorist attacks.There are hundreds of commercial airports, thousands of planes, and tens of thousands of daily flights carrying more than half a billion passengers a year. Millions of containers are imported annually through more than 300 sea and river ports served by more than 3,700 cargo and passenger terminals. About 6,000 agencies provide transit services

through buses, subways, ferries, and light-rail service to about 14 million Amer- icans each weekday.42

In November 2001, Congress passed and the President signed the Aviation and Transportation Security Act. This act created the Transportation Security Administration (TSA), which is now part of the Homeland Security Depart- ment. In November 2002, both the Homeland Security Act and the Maritime Transportation Security Act followed.These laws required the development of strategic plans to describe how the new department and TSA would provide security for critical parts of the U.S. transportation sector.

Over 90 percent of the nation’s $5.3 billion annual investment in the TSA goes to aviation—to fight the last war. The money has been spent mainly to meet congressional mandates to federalize the security checkpoint screeners and to deploy existing security methods and technologies at airports.The cur- rent efforts do not yet reflect a forward-looking strategic plan systematically analyzing assets, risks, costs, and benefits. Lacking such a plan, we are not con- vinced that our transportation security resources are being allocated to the greatest risks in a cost-effective way.

  • Major vulnerabilities still exist in cargo and general aviation security. These, together with inadequate screening and access controls, con- tinue to present aviation security challenges.
  • While commercial aviation remains a possible target, terrorists may turn their attention to other modes. Opportunities to do harm are as great, or greater, in maritime or surface transportation. Initiatives to secure shipping containers have just begun. Surface transportation sys- tems such as railroads and mass transit remain hard to protect because they are so accessible and extensive.

Despite congressional deadlines, the TSA has developed neither an integrated strategic plan for the transportation sector nor specific plans for the various modes—air, sea, and ground.

Recommendation: Hard choices must be made in allocating limited resources. The U.S. government should identify and evaluate the transportation assets that need to be protected, set risk-based prior- ities for defending them, select the most practical and cost-effective ways of doing so, and then develop a plan, budget, and funding to implement the effort. The plan should assign roles and missions to the relevant authorities (federal, state, regional, and local) and to pri- vate stakeholders. In measuring effectiveness, perfection is unattain- able. But terrorists should perceive that potential targets are defended. They may be deterred by a significant chance of failure.

Congress should set a specific date for the completion of these plans and hold the Department of Homeland Security and TSA accountable for achiev- ing them.

The most powerful investments may be for improvements in technologies with applications across the transportation modes, such as scanning technolo- gies designed to screen containers that can be transported by plane, ship, truck, or rail. Though such technologies are becoming available now, widespread deployment is still years away.

In the meantime, the best protective measures may be to combine improved methods of identifying and tracking the high-risk containers, operators, and facilities that require added scrutiny with further efforts to integrate intelligence analysis, effective procedures for transmitting threat information to transporta- tion authorities, and vigilance by transportation authorities and the public.

A Layered Security System

No single security measure is foolproof.Accordingly, the TSA must have mul- tiple layers of security in place to defeat the more plausible and dangerous forms of attack against public transportation.

  • The plan must take into consideration the full array of possible enemy tactics, such as use of insiders, suicide terrorism, or standoff attack. Each layer must be effective in its own right. Each must be supported by other layers that are redundant and coordinated.
  • The TSA should be able to identify for Congress the array of poten- tial terrorist attacks, the layers of security in place, and the reliability provided by each layer. TSA must develop a plan as described above to improve weak individual layers and the effectiveness of the layered systems it deploys.

On 9/11, the 19 hijackers were screened by a computer-assisted screening sys- tem called CAPPS. More than half were identified for further inspection, which applied only to their checked luggage.

Under current practices, air carriers enforce government orders to stop cer- tain known and suspected terrorists from boarding commercial flights and to apply secondary screening procedures to others.The “no-fly” and “automatic selectee” lists include only those individuals who the U.S. government believes pose a direct threat of attacking aviation.

Because air carriers implement the program, concerns about sharing intel- ligence information with private firms and foreign countries keep the U.S. gov- ernment from listing all terrorist and terrorist suspects who should be included. The TSA has planned to take over this function when it deploys a new screening system to take the place of CAPPS.The deployment of this sys- tem has been delayed because of claims it may violate civil liberties.

Recommendation: Improved use of “no-fly” and “automatic selectee” lists should not be delayed while the argument about a suc- cessor to CAPPS continues. This screening function should be per- formed by the TSA, and it should utilize the larger set of watchlists maintained by the federal government. Air carriers should be required to supply the information needed to test and implement this new system.

CAPPS is still part of the screening process, still profiling passengers, with the consequences of selection now including personal searches of the individ- ual and carry-on bags.The TSA is dealing with the kind of screening issues that are being encountered by other agencies.As we mentioned earlier, these screen- ing issues need to be elevated for high-level attention and addressed promptly by the government. Working through these problems can help clear the way for the TSA’s screening improvements and would help many other agencies too. The next layer is the screening checkpoint itself. As the screening system tries to stop dangerous people, the checkpoint needs to be able to find danger- ous items. Two reforms are needed soon: (1) screening people for explosives,

not just their carry-on bags, and (2) improving screener performance.

Recommendation: The TSA and the Congress must give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. As a start, each individual selected for spe- cial screening should be screened for explosives. Further, the TSA should conduct a human factors study, a method often used in the private sector, to understand problems in screener performance and set attainable objectives for individual screeners and for the check- points where screening takes place.

Concerns also remain regarding the screening and transport of checked bags and cargo. More attention and resources should be directed to reducing or mit- igating the threat posed by explosives in vessels’ cargo holds. The TSA should expedite the installation of advanced (in-line) baggage-screening equipment. Because the aviation industry will derive substantial benefits from this deploy- ment, it should pay a fair share of the costs.The TSA should require that every passenger aircraft carrying cargo must deploy at least one hardened container to carry any suspect cargo. TSA also needs to intensify its efforts to identify, track, and appropriately screen potentially dangerous cargo in both the aviation and maritime sectors.

The Protection of Civil Liberties

Many of our recommendations call for the government to increase its presence in our lives—for example, by creating standards for the issuance of forms of

identification, by better securing our borders, by sharing information gathered by many different agencies.We also recommend the consolidation of author- ity over the now far-flung entities constituting the intelligence community.The Patriot Act vests substantial powers in our federal government. We have seen the government use the immigration laws as a tool in its counterterrorism effort. Even without the changes we recommend, the American public has vested enormous authority in the U.S. government.

At our first public hearing on March 31, 2003, we noted the need for balance as our government responds to the real and ongoing threat of terrorist attacks. The terrorists have used our open society against us. In wartime, government calls for greater powers, and then the need for those powers recedes after the war ends. This struggle will go on.Therefore, while protecting our homeland, Americans should be mindful of threats to vital personal and civil liberties.This balancing is no easy task, but we must constantly strive to keep it right.

This shift of power and authority to the government calls for an enhanced system of checks and balances to protect the precious liberties that are vital to our way of life.We therefore make three recommendations.

First, as we will discuss in chapter 13, to open up the sharing of informa- tion across so many agencies and with the private sector, the President should take responsibility for determining what information can be shared by which agencies and under what conditions. Protection of privacy rights should be one key element of this determination.

Recommendation: As the President determines the guidelines for information sharing among government agencies and by those agen- cies with the private sector, he should safeguard the privacy of indi- viduals about whom information is shared.

Second, Congress responded, in the immediate aftermath of 9/11, with the Patriot Act, which vested substantial new powers in the investigative agencies of the government. Some of the most controversial provisions of the Patriot Act are to “sunset” at the end of 2005. Many of the act’s provisions are rela- tively noncontroversial, updating America’s surveillance laws to reflect techno- logical developments in a digital age. Some executive actions that have been criticized are unrelated to the Patriot Act.The provisions in the act that facil- itate the sharing of information among intelligence agencies and between law enforcement and intelligence appear, on balance, to be beneficial. Because of concerns regarding the shifting balance of power to the government, we think that a full and informed debate on the Patriot Act would be healthy.

Recommendation:The burden of proof for retaining a particular gov- ernmental power should be on the executive, to explain (a) that the power actually materially enhances security and (b) that there is ade-

quate supervision of the executive’s use of the powers to ensure pro- tection of civil liberties. If the power is granted, there must be ade- quate guidelines and oversight to properly confine its use.

Third, during the course of our inquiry, we were told that there is no office within the government whose job it is to look across the government at the actions we are taking to protect ourselves to ensure that liberty concerns are appropriately considered. If, as we recommend, there is substantial change in the way we collect and share intelligence, there should be a voice within the executive branch for those concerns. Many agencies have privacy offices, albeit of limited scope.The Intelligence Oversight Board of the President’s Foreign Intelligence Advisory Board has, in the past, had the job of overseeing certain activities of the intelligence community.

Recommendation: At this time of increased and consolidated gov- ernment authority, there should be a board within the executive branch to oversee adherence to the guidelines we recommend and the commitment the government makes to defend our civil liberties.

We must find ways of reconciling security with liberty, since the success of one helps protect the other.The choice between security and liberty is a false choice, as nothing is more likely to endanger America’s liberties than the suc- cess of a terrorist attack at home. Our history has shown us that insecurity threatens liberty.Yet, if our liberties are curtailed, we lose the values that we are struggling to defend.

Setting Priorities for National Preparedness

Before 9/11, no executive department had, as its first priority, the job of defend- ing America from domestic attack.That changed with the 2002 creation of the Department of Homeland Security.This department now has the lead respon- sibility for problems that feature so prominently in the 9/11 story, such as pro- tecting borders, securing transportation and other parts of our critical infrastructure, organizing emergency assistance, and working with the private sector to assess vulnerabilities.

Throughout the government, nothing has been harder for officials—exec- utive or legislative—than to set priorities, making hard choices in allocating limited resources.These difficulties have certainly afflicted the Department of Homeland Security, hamstrung by its many congressional overseers. In deliv- ering assistance to state and local governments, we heard—especially in New York—about imbalances in the allocation of money. The argument concen- trates on two questions.

First, how much money should be set aside for criteria not directly related to risk? Currently a major portion of the billions of dollars appropriated for

state and local assistance is allocated so that each state gets a certain amount, or an allocation based on its population—wherever they live.

Recommendation: Homeland security assistance should be based strictly on an assessment of risks and vulnerabilities. Now, in 2004, Washington, D.C., and New York City are certainly at the top of any such list.We understand the contention that every state and city needs to have some minimum infrastructure for emergency response. But federal homeland security assistance should not remain a program for general revenue sharing. It should supplement state and local resources based on the risks or vulnerabilities that merit additional support. Congress should not use this money as a pork barrel.

The second question is, Can useful criteria to measure risk and vulnerabil- ity be developed that assess all the many variables? The allocation of funds should be based on an assessment of threats and vulnerabilities.That assessment should consider such factors as population, population density, vulnerability, and the presence of critical infrastructure within each state. In addition, the federal government should require each state receiving federal emergency prepared- ness funds to provide an analysis based on the same criteria to justify the dis- tribution of funds in that state.

In a free-for-all over money, it is understandable that representatives will work to protect the interests of their home states or districts. But this issue is too important for politics as usual to prevail. Resources must be allocated according to vulnerabilities.We recommend that a panel of security experts be convened to develop written benchmarks for evaluating community needs.We further recommend that federal homeland security funds be allocated in accor- dance with those benchmarks, and that states be required to abide by those benchmarks in disbursing the federal funds.The benchmarks will be imperfect and subjective; they will continually evolve. But hard choices must be made. Those who would allocate money on a different basis should then defend their view of the national interest.

Command, Control, and Communications

The attacks on 9/11 demonstrated that even the most robust emergency response capabilities can be overwhelmed if an attack is large enough. Team- work, collaboration, and cooperation at an incident site are critical to a suc- cessful response. Key decisionmakers who are represented at the incident command level help to ensure an effective response, the efficient use of resources, and responder safety. Regular joint training at all levels is, moreover, essential to ensuring close coordination during an actual incident.

Recommendation: Emergency response agencies nationwide should adopt the Incident Command System (ICS).When multiple agencies or multiple jurisdictions are involved, they should adopt a unified command. Both are proven frameworks for emergency response.We strongly support the decision that federal homeland security funding will be contingent, as of October 1, 2004, upon the adoption and reg- ular use of ICS and unified command procedures. In the future, the Department of Homeland Security should consider making funding contingent on aggressive and realistic training in accordance with ICS and unified command procedures.

The attacks of September 11, 2001 overwhelmed the response capacity of most of the local jurisdictions where the hijacked airliners crashed.While many jurisdictions have established mutual aid compacts, a serious obstacle to multi- jurisdictional response has been the lack of indemnification for mutual-aid responders in areas such as the National Capital Region.

Public safety organizations, chief administrative officers, state emergency management agencies, and the Department of Homeland Security should develop a regional focus within the emergency responder community and pro- mote multi-jurisdictional mutual assistance compacts. Where such compacts already exist, training in accordance with their terms should be required. Con- gress should pass legislation to remedy the long-standing indemnification and liability impediments to the provision of public safety mutual aid in the National Capital Region and where applicable throughout the nation.

The inability to communicate was a critical element at the World Trade Center, Pentagon, and Somerset County, Pennsylvania, crash sites, where mul- tiple agencies and multiple jurisdictions responded. The occurrence of this problem at three very different sites is strong evidence that compatible and ade- quate communications among public safety organizations at the local, state, and federal levels remains an important problem.

Recommendation: Congress should support pending legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes. Furthermore, high-risk urban areas such as New York City and Washington, D.C., should establish signal corps units to ensure communications connectivity between and among civilian authorities, local first responders, and the National Guard. Federal funding of such units should be given high priority by Congress.

Private-Sector Preparedness

The mandate of the Department of Homeland Security does not end with government; the department is also responsible for working with the private

sector to ensure preparedness.This is entirely appropriate, for the private sec- tor controls 85 percent of the critical infrastructure in the nation. Indeed, unless a terrorist’s target is a military or other secure government facility, the “first” first responders will almost certainly be civilians. Homeland security and national preparedness therefore often begins with the private sector.

Preparedness in the private sector and public sector for rescue, restart, and recovery of operations should include (1) a plan for evacuation, (2) adequate communications capabilities, and (3) a plan for continuity of operations. As we examined the emergency response to 9/11, witness after witness told us that despite 9/11, the private sector remains largely unprepared for a terrorist attack. We were also advised that the lack of a widely embraced private-sector prepared- ness standard was a principal contributing factor to this lack of preparedness.

We responded by asking the American National Standards Institute (ANSI) to develop a consensus on a “National Standard for Preparedness” for the pri- vate sector. ANSI convened safety, security, and business continuity experts from a wide range of industries and associations, as well as from federal, state, and local government stakeholders, to consider the need for standards for pri- vate sector emergency preparedness and business continuity.

The result of these sessions was ANSI’s recommendation that the Commis- sion endorse a voluntary National Preparedness Standard. Based on the exist- ing American National Standard on Disaster/Emergency Management and Business Continuity Programs (NFPA 1600), the proposed National Prepared- ness Standard establishes a common set of criteria and terminology for pre- paredness, disaster management, emergency management, and business continuity programs.The experience of the private sector in the World Trade Center emergency demonstrated the need for these standards.

Recommendation: We endorse the American National Standards Institute’s recommended standard for private preparedness. We were encouraged by Secretary Tom Ridge’s praise of the standard, and urge the Department of Homeland Security to promote its adoption. We also encourage the insurance and credit-rating industries to look closely at a company’s compliance with the ANSI standard in assess- ing its insurability and creditworthiness. We believe that compliance with the standard should define the standard of care owed by a com- pany to its employees and the public for legal purposes. Private-sec- tor preparedness is not a luxury; it is a cost of doing business in the post-9/11 world. It is ignored at a tremendous potential cost in lives, money, and national security.

13

HOW TO DO IT? A DIFFERENT WAY OF ORGANIZING THE GOVERNMENT

As presently configured, the national security institutions of the U.S. government are still the institutions constructed to win the Cold War. The United States confronts a very different world today. Instead of facing a few very dangerous adversaries, the United States confronts a number of less visi- ble challenges that surpass the boundaries of traditional nation-states and call for quick, imaginative, and agile responses.

The men and women of the World War II generation rose to the challenges of the 1940s and 1950s. They restructured the government so that it could protect the country. That is now the job of the generation that experienced 9/11. Those attacks showed, emphatically, that ways of doing business rooted in a dif- ferent era are just not good enough. Americans should not settle for incremen- tal, ad hoc adjustments to a system designed generations ago for a world that no longer exists.

We recommend significant changes in the organization of the government. We know that the quality of the people is more important than the quality of the wiring diagrams. Some of the saddest aspects of the 9/11 story are the out- standing efforts of so many individual officials straining, often without success, against the boundaries of the possible. Good people can overcome bad struc- tures.They should not have to.

The United States has the resources and the people.The government should combine them more effectively, achieving unity of effort.We offer five major recommendations to do that:

  • unifying strategic intelligence and operational planning against Islamist terrorists across the foreign-domestic divide with a National Counterterrorism Center;
  • unifying the intelligence community with a new National Intelli- gence Director;

399

  • unifying the many participants in the counterterrorism effort and their knowledge in a network-based information-sharing system that transcends traditional governmental boundaries;
  • unifying and strengthening congressional oversight to improve qual- ity and accountability; and
  • strengthening the FBI and homeland defenders.

13.1 UNITY OF EFFORT ACROSS THE FOREIGN-DOMESTIC DIVIDE

Joint Action

Much of the public commentary about the 9/11 attacks has dealt with “lost opportunities,” some of which we reviewed in chapter 11.These are often char- acterized as problems of “watchlisting,” of “information sharing,” or of “con- necting the dots.” In chapter 11 we explained that these labels are too narrow. They describe the symptoms, not the disease.

In each of our examples, no one was firmly in charge of managing the case and able to draw relevant intelligence from anywhere in the government, assign responsibilities across the agencies (foreign or domestic), track progress, and quickly bring obstacles up to the level where they could be resolved. Respon- sibility and accountability were diffuse.

The agencies cooperated, some of the time. But even such cooperation as there was is not the same thing as joint action.When agencies cooperate, one defines the problem and seeks help with it.When they act jointly, the problem and options for action are defined differently from the start. Individuals from different backgrounds come together in analyzing a case and planning how to manage it.

In our hearings we regularly asked witnesses:Who is the quarterback? The other players are in their positions, doing their jobs. But who is calling the play that assigns roles to help them execute as a team?

Since 9/11, those issues have not been resolved. In some ways joint work has gotten better, and in some ways worse.The effort of fighting terrorism has flooded over many of the usual agency boundaries because of its sheer quan- tity and energy. Attitudes have changed. Officials are keenly conscious of try- ing to avoid the mistakes of 9/11. They try to share information. They circulate—even to the President—practically every reported threat, however dubious.

Partly because of all this effort, the challenge of coordinating it has multi- plied. Before 9/11, the CIA was plainly the lead agency confronting al Qaeda. The FBI played a very secondary role.The engagement of the departments of Defense and State was more episodic.

  • Today the CIA is still central. But the FBI is much more active, along with other parts of the Justice Department.
  • The Defense Department effort is now enormous. Three of its uni- fied commands, each headed by a four-star general, have counterter- rorism as a primary mission: Special Operations Command, Central Command (both headquartered in Florida), and Northern Command (headquartered in Colorado).
  • A new Department of Homeland Security combines formidable resources in border and transportation security, along with analysis of domestic vulnerability and other tasks.
  • The State Department has the lead on many of the foreign policy tasks we described in chapter 12.
  • At the White House, the National Security Council (NSC) now is joined by a parallel presidential advisory structure, the Homeland Security Council.

So far we have mentioned two reasons for joint action—the virtue of joint planning and the advantage of having someone in charge to ensure a unified effort.There is a third: the simple shortage of experts with sufficient skills.The limited pool of critical experts—for example, skilled counterterrorism analysts and linguists—is being depleted. Expanding these capabilities will require not just money, but time.

Primary responsibility for terrorism analysis has been assigned to the Ter- rorist Threat Integration Center (TTIC), created in 2003, based at the CIA headquarters but staffed with representatives of many agencies, reporting directly to the Director of Central Intelligence.Yet the CIA houses another intelligence “fusion” center: the Counterterrorist Center that played such a key role before 9/11.A third major analytic unit is at Defense, in the Defense Intelligence Agency. A fourth, concentrating more on homeland vulnerabili- ties, is at the Department of Homeland Security.The FBI is in the process of building the analytic capability it has long lacked, and it also has the Terrorist Screening Center.1

The U.S. government cannot afford so much duplication of effort.There are not enough experienced experts to go around.The duplication also places extra demands on already hard-pressed single-source national technical intelligence collectors like the National Security Agency.

Combining Joint Intelligence and Joint Action

A “smart” government would integrate all sources of information to see the enemy as a whole. Integrated all-source analysis should also inform and shape strategies to collect more intelligence.Yet the Terrorist Threat Integration Center, while it has primary responsibility for terrorism analysis, is formally proscribed from hav-

ing any oversight or operational authority and is not part of any operational entity, other than reporting to the director of central intelligence.2

The government now tries to handle the problem of joint management, informed by analysis of intelligence from all sources, in two ways.

  • First, agencies with lead responsibility for certain problems have con- structed their own interagency entities and task forces in order to get cooperation. The Counterterrorist Center at CIA, for example, recruits liaison officers from throughout the intelligence community. The military’s Central Command has its own interagency center, recruiting liaison officers from all the agencies from which it might need help.The FBI has Joint Terrorism Task Forces in 84 locations to coordinate the activities of other agencies when action may be required.
  • Second, the problem of joint operational planning is often passed to the White House, where the NSC staff tries to play this role. The national security staff at the White House (both NSC and new Home- land Security Council staff) has already become 50 percent larger since 9/11. But our impression, after talking to serving officials, is that even this enlarged staff is consumed by meetings on day-to-day issues, sift- ing each day’s threat information and trying to coordinate everyday operations.

Even as it crowds into every square inch of available office space, the NSC staff is still not sized or funded to be an executive agency. In chapter 3 we described some of the problems that arose in the 1980s when a White House staff, constitutionally insulated from the usual mechanisms of oversight, became involved in direct operations. During the 1990s Richard Clarke occa- sionally tried to exercise such authority, sometimes successfully, but often caus- ing friction.

Yet a subtler and more serious danger is that as the NSC staff is consumed by these day-to-day tasks, it has less capacity to find the time and detachment needed to advise a president on larger policy issues. That means less time to work on major new initiatives, help with legislative management to steer needed bills through Congress, and track the design and implementation of the strategic plans for regions, countries, and issues that we discuss in chapter 12. Much of the job of operational coordination remains with the agencies, especially the CIA.There DCI Tenet and his chief aides ran interagency meet- ings nearly every day to coordinate much of the government’s day-to-day work. The DCI insisted he did not make policy and only oversaw its imple- mentation. In the struggle against terrorism these distinctions seem increasingly artificial. Also, as the DCI becomes a lead coordinator of the government’s

operations, it becomes harder to play all the position’s other roles, including that of analyst in chief.

The problem is nearly intractable because of the way the government is cur- rently structured. Lines of operational authority run to the expanding execu- tive departments, and they are guarded for understandable reasons: the DCI commands the CIA’s personnel overseas; the secretary of defense will not yield to others in conveying commands to military forces; the Justice Department will not give up the responsibility of deciding whether to seek arrest warrants. But the result is that each agency or department needs its own intelligence apparatus to support the performance of its duties. It is hard to “break down stovepipes” when there are so many stoves that are legally and politically enti- tled to have cast-iron pipes of their own.

Recalling the Goldwater-Nichols legislation of 1986, Secretary Rumsfeld reminded us that to achieve better joint capability, each of the armed services had to “give up some of their turf and authorities and prerogatives.”Today, he said, the executive branch is “stove-piped much like the four services were nearly 20 years ago.” He wondered if it might be appropriate to ask agencies to “give up some of their existing turf and authority in exchange for a stronger, faster, more efficient government wide joint effort.”3 Privately, other key offi- cials have made the same point to us.

We therefore propose a new institution: a civilian-led unified joint com- mand for counterterrorism. It should combine strategic intelligence and joint operational planning.

In the Pentagon’s Joint Staff, which serves the chairman of the Joint Chiefs of Staff, intelligence is handled by the J-2 directorate, operational planning by J-3, and overall policy by J-5. Our concept combines the J-2 and J-3 functions (intelligence and operational planning) in one agency, keeping overall policy coordination where it belongs, in the National Security Council.

Recommendation: We recommend the establishment of a National Counterterrorism Center (NCTC), built on the foundation of the existing Terrorist Threat Integration Center (TTIC). Breaking the older mold of national government organization, this NCTC should be a center for joint operational planning and joint intelligence, staffed by personnel from the various agencies. The head of the NCTC should have authority to evaluate the performance of the people assigned to the Center.
  • Such a joint center should be developed in the same spirit that guided the military’s creation of unified joint commands, or the shaping of earlier national agencies like the National Reconnaissance Office, which was formed to organize the work of the CIA and several defense agencies in space.

NCTC—Intelligence. The NCTC should lead strategic analysis, pooling all-source intelligence, foreign and domestic, about transna- tional terrorist organizations with global reach. It should develop net assessments (comparing enemy capabilities and intentions against U.S. defenses and countermeasures). It should also provide warning. It should do this work by drawing on the efforts of the CIA, FBI, Homeland Security, and other departments and agencies. It should task collection requirements both inside and outside the United States.

  • The intelligence function (J-2) should build on the existing TTIC structure and remain distinct, as a national intelligence center, within the NCTC. As the government’s principal knowledge bank on Islamist terrorism, with the main responsibility for strategic analysis and net assessment, it should absorb a significant portion of the analytical talent now residing in the CIA’s Counterterrorist Center and the DIA’s Joint Intelligence Task Force—Combatting Terrorism (JITF-CT).

NCTC—Operations. The NCTC should perform joint planning. The plans would assign operational responsibilities to lead agencies, such as State, the CIA, the FBI, Defense and its combatant commands, Homeland Security, and other agencies.The NCTC should not direct the actual execution of these operations, leaving that job to the agen- cies. The NCTC would then track implementation; it would look across the foreign-domestic divide and across agency boundaries, updating plans to follow through on cases.4

  • The joint operational planning function (J-3) will be new to the TTIC structure.The NCTC can draw on analogous work now being done in the CIA and every other involved department of the government, as well as reaching out to knowledgeable officials in state and local agencies throughout the United States.
  • The NCTC should not be a policymaking body. Its operations and planning should follow the policy direction of the president and the National Security Council.

these individuals. Informed by this analysis, the NCTC would then organize and plan the management of the case, drawing on the talents and differing kinds of experience among the several agency represen- tatives assigned to it—assigning tasks to the CIA overseas, to Homeland Security watching entry points into the United States, and to the FBI. If military assistance might be needed, the Special Operations Com- mand could be asked to develop an appropriate concept for such an operation.The NCTC would be accountable for tracking the progress of the case, ensuring that the plan evolved with it, and integrating the information into a warning.The NCTC would be responsible for being sure that intelligence gathered from the activities in the field became part of the government’s institutional memory about Islamist terrorist personalities, organizations, and possible means of attack.

In each case the involved agency would make its own senior man- agers aware of what it was being asked to do. If those agency heads objected, and the issue could not easily be resolved, then the disagree- ment about roles and missions could be brought before the National Security Council and the president.

NCTC—Authorities. The head of the NCTC should be appointed by the president, and should be equivalent in rank to a deputy head of a cabinet department.The head of the NCTC would report to the national intelligence director, an office whose creation we recommend below, placed in the Exec- utive Office of the President.The head of the NCTC would thus also report indirectly to the president.This official’s nomination should be confirmed by the Senate and he or she should testify to the Congress, as is the case now with other statutory presidential offices, like the U.S. trade representative.

  • To avoid the fate of other entities with great nominal authority and little real power, the head of the NCTC must have the right to con- cur in the choices of personnel to lead the operating entities of the departments and agencies focused on counterterrorism, specifically including the head of the Counterterrorist Center, the head of the FBI’s Counterterrorism Division, the commanders of the Defense Department’s Special Operations Command and Northern Com- mand, and the State Department’s coordinator for counterterrorism.5 The head of the NCTC should also work with the director of the Office of Management and Budget in developing the president’s counterterrorism budget.
  • There are precedents for surrendering authority for joint planning while preserving an agency’s operational control. In the international context, NATO commanders may get line authority over forces assigned by other nations. In U.S. unified commands, commanders plan operations that may involve units belonging to one of the serv- ices. In each case, procedures are worked out, formal and informal, to define the limits of the joint commander’s authority.

The most serious disadvantage of the NCTC is the reverse of its greatest virtue. The struggle against Islamist terrorism is so important that any clear-cut cen- tralization of authority to manage and be accountable for it may concentrate too much power in one place. The proposed NCTC would be given the authority of planning the activities of other agencies. Law or executive order must define the scope of such line authority.

The NCTC would not eliminate interagency policy disputes.These would still go to the National Security Council.To improve coordination at the White House, we believe the existing Homeland Security Council should soon be merged into a single National Security Council. The creation of the NCTC should help the NSC staff concentrate on its core duties of assisting the pres- ident and supporting interdepartmental policymaking.

We recognize that this is a new and difficult idea precisely because the authorities we recommend for the NCTC really would, as Secretary Rums- feld foresaw, ask strong agencies to “give up some of their turf and authority in exchange for a stronger, faster, more efficient government wide joint effort.” Countering transnational Islamist terrorism will test whether the U.S. govern- ment can fashion more flexible models of management needed to deal with the twenty-first-century world.

An argument against change is that the nation is at war, and cannot afford to reorganize in midstream. But some of the main innovations of the 1940s and 1950s, including the creation of the Joint Chiefs of Staff and even the construc- tion of the Pentagon itself, were undertaken in the midst of war. Surely the country cannot wait until the struggle against Islamist terrorism is over.

“Surprise, when it happens to a government, is likely to be a complicated, diffuse, bureaucratic thing. It includes neglect of responsibility, but also respon- sibility so poorly defined or so ambiguously delegated that action gets lost.”6 That comment was made more than 40 years ago, about Pearl Harbor.We hope another commission, writing in the future about another attack, does not again find this quotation to be so apt.

13.2 UNITY OF EFFORT IN THE INTELLIGENCE COMMUNITY

In our first section, we concentrated on counterterrorism, discussing how to combine the analysis of information from all sources of intelligence with the joint planning of operations that draw on that analysis. In this section, we step back from looking just at the counterterrorism problem. We reflect on whether the government is organized adequately to direct resources and build the intelligence capabilities it will need not just for countering terrorism, but for the broader range of national security challenges in the decades ahead.

The Need for a Change

During the Cold War, intelligence agencies did not depend on seamless inte- gration to track and count the thousands of military targets—such as tanks and missiles—fielded by the Soviet Union and other adversary states. Each agency concentrated on its specialized mission, acquiring its own information and then sharing it via formal, finished reports.The Department of Defense had given birth to and dominated the main agencies for technical collection of intelli- gence. Resources were shifted at an incremental pace, coping with challenges that arose over years, even decades.

We summarized the resulting organization of the intelligence community in chapter 3. It is outlined below.

  • National Reconnaissance Office (NRO), which develops, acquires, and launches space systems for intelligence collection
  • Other national reconnaissance programs

Departmental intelligence agencies:

  • Defense Intelligence Agency (DIA) of the Department of Defense
  • Intelligence entities of the Army, Navy, Air Force, and Marines
  • Bureau of Intelligence and Research (INR) of the Depart- ment of State
  • Office of Terrorism and Finance Intelligence of the Depart- ment of Treasury
  • Office of Intelligence and the Counterterrorism and Coun- terintelligence Divisions of the Federal Bureau of Investiga- tion of the Department of Justice
  • Office of Intelligence of the Department of Energy
  • Directorate of Information Analysis and Infrastructure Pro- tection (IAIP) and Directorate of Coast Guard Intelligence of the Department of Homeland Security

The need to restructure the intelligence community grows out of six prob- lems that have become apparent before and after 9/11:

  • Structural barriers to performing joint intelligence work. National intelli- gence is still organized around the collection disciplines of the home agencies, not the joint mission. The importance of integrated, all- source analysis cannot be overstated. Without it, it is not possible to “connect the dots.” No one component holds all the relevant infor- mation.

By contrast, in organizing national defense, the Goldwater- Nichols legislation of 1986 created joint commands for operations in the field, the Unified Command Plan.The services—the Army, Navy, Air Force, and Marine Corps—organize, train, and equip their peo- ple and units to perform their missions. Then they assign personnel and units to the joint combatant commander, like the commanding general of the Central Command (CENTCOM). The Goldwater- Nichols Act required officers to serve tours outside their service in order to win promotion.The culture of the Defense Department was

transformed, its collective mind-set moved from service-specific to “joint,” and its operations became more integrated.7

  • Lack of common standards and practices across the foreign-domestic divide.The leadership of the intelligence community should be able to pool infor- mation gathered overseas with information gathered in the United States, holding the work—wherever it is done—to a common stan- dard of quality in how it is collected, processed (e.g., translated), reported, shared, and analyzed. A common set of personnel standards for intelligence can create a group of professionals better able to oper- ate in joint activities, transcending their own service-specific mind-sets.
  • Divided management of national intelligence capabilities. While the CIA was once “central” to our national intelligence capabilities, following the end of the Cold War it has been less able to influence the use of the nation’s imagery and signals intelligence capabilities in three national agencies housed within the Department of Defense: the National Security Agency, the National Geospatial-Intelligence Agency, and the National Reconnaissance Office. One of the lessons learned from the 1991 Gulf War was the value of national intelligence systems (satellites in particular) in precision warfare. Since that war, the department has appropriately drawn these agencies into its trans- formation of the military. Helping to orchestrate this transformation is the under secretary of defense for intelligence, a position established by Congress after 9/11. An unintended consequence of these devel- opments has been the far greater demand made by Defense on tech- nical systems, leaving the DCI less able to influence how these technical resources are allocated and used.
  • Weak capacity to set priorities and move resources.The agencies are mainly organized around what they collect or the way they collect it. But the priorities for collection are national. As the DCI makes hard choices about moving resources, he or she must have the power to reach across agencies and reallocate effort.
  • Too many jobs.The DCI now has at least three jobs. He is expected to run a particular agency, the CIA. He is expected to manage the loose confederation of agencies that is the intelligence community. He is expected to be the analyst in chief for the government, sifting evi- dence and directly briefing the President as his principal intelligence adviser. No recent DCI has been able to do all three effectively. Usu- ally what loses out is management of the intelligence community, a difficult task even in the best case because the DCI’s current author- ities are weak.With so much to do, the DCI often has not used even the authority he has.
  • Too complex and secret. Over the decades, the agencies and the rules sur- rounding the intelligence community have accumulated to a depth that practically defies public comprehension.There are now 15 agen- cies or parts of agencies in the intelligence community.The commu- nity and the DCI’s authorities have become arcane matters, understood only by initiates after long study. Even the most basic information about how much money is actually allocated to or within the intelligence community and most of its key components is shrouded from public view.

The current DCI is responsible for community performance but lacks the three authorities critical for any agency head or chief executive officer: (1) control over purse strings, (2) the ability to hire or fire senior managers, and (3) the ability to set standards for the information infrastructure and personnel.8

The only budget power of the DCI over agencies other than the CIA lies in coordinating the budget requests of the various intelligence agencies into a single program for submission to Congress.The overall funding request of the 15 intelligence entities in this program is then presented to the president and Congress in 15 separate volumes.

When Congress passes an appropriations bill to allocate money to intelli- gence agencies, most of their funding is hidden in the Defense Department in order to keep intelligence spending secret.Therefore, although the House and Senate Intelligence committees are the authorizing committees for funding of the intelligence community, the final budget review is handled in the Defense Subcommittee of the Appropriations committees.Those committees have no subcommittees just for intelligence, and only a few members and staff review the requests.

The appropriations for the CIA and the national intelligence agencies— NSA, NGA, and NRO—are then given to the secretary of defense.The sec- retary transfers the CIA’s money to the DCI but disburses the national agencies’ money directly. Money for the FBI’s national security components falls within the appropriations for Commerce, Justice, and State and goes to the attorney general.9

In addition, the DCI lacks hire-and-fire authority over most of the intelligence community’s senior managers. For the national intelligence agencies housed in the Defense Department, the secretary of defense must seek the DCI’s concur- rence regarding the nomination of these directors, who are presidentially appointed. But the secretary may submit recommendations to the president with- out receiving this concurrence.The DCI cannot fire these officials.The DCI has even less influence over the head of the FBI’s national security component, who is appointed by the attorney general in consultation with the DCI.10

Combining Joint Work with Stronger Management

We have received recommendations on the topic of intelligence reform from many sources. Other commissions have been over this same ground.Thought- ful bills have been introduced, most recently a bill by the chairman of the House Intelligence Committee Porter Goss (R-Fla.), and another by the rank- ing minority member, Jane Harman (D-Calif.). In the Senate, Senators Bob Graham (D-Fla.) and Dianne Feinstein (D-Calif.) have introduced reform pro- posals as well. Past efforts have foundered, because the president did not sup- port them; because the DCI, the secretary of defense, or both opposed them; and because some proposals lacked merit.We have tried to take stock of these experiences, and borrow from strong elements in many of the ideas that have already been developed by others.

Recommendation:The current position of Director of Central Intel- ligence should be replaced by a National Intelligence Director with two main areas of responsibility: (1) to oversee national intelligence centers on specific subjects of interest across the U.S. government and

(2) to manage the national intelligence program and oversee the agencies that contribute to it.

First, the National Intelligence Director should oversee national intelligence centers to provide all-source analysis and plan intelligence operations for the whole government on major problems.

  • One such problem is counterterrorism. In this case, we believe that the center should be the intelligence entity (formerly TTIC) inside the National Counterterrorism Center we have proposed. It would sit there alongside the operations management unit we described ear- lier, with both making up the NCTC, in the Executive Office of the President. Other national intelligence centers—for instance, on counterproliferation, crime and narcotics, and China—would be housed in whatever department or agency is best suited for them.
  • The National Intelligence Director would retain the present DCI’s role as the principal intelligence adviser to the president.We hope the president will come to look directly to the directors of the national intelligence centers to provide all-source analysis in their areas of responsibility, balancing the advice of these intelligence chiefs against the contrasting viewpoints that may be offered by department heads at State, Defense, Homeland Security, Justice, and other agencies.

Second, the National Intelligence Director should manage the national intelligence program and oversee the component agencies of the intelligence community. (See diagram.)11

  • The National Intelligence Director would submit a unified budget for national intelligence that reflects priorities chosen by the National Security Council, an appropriate balance among the varieties of tech- nical and human intelligence collection, and analysis. He or she would receive an appropriation for national intelligence and apportion the funds to the appropriate agencies, in line with that budget, and with authority to reprogram funds among the national intelligence agen- cies to meet any new priority (as counterterrorism was in the 1990s). The National Intelligence Director should approve and submit nom- inations to the president of the individuals who would lead the CIA, DIA, FBI Intelligence Office, NSA, NGA, NRO, Information Analy- sis and Infrastructure Protection Directorate of the Department of Homeland Security, and other national intelligence capabilities.12
  • The National Intelligence Director would manage this national effort with the help of three deputies, each of whom would also hold a key position in one of the component agencies.13
    • foreign intelligence (the head of the CIA)
    • defense intelligence (the under secretary of defense for intelli- gence)14
    • homeland intelligence (the FBI’s executive assistant director for intelligence or the under secretary of homeland security for information analysis and infrastructure protection)

Other agencies in the intelligence community would coordinate their work within each of these three areas, largely staying housed in the same departments or agencies that support them now.

Returning to the analogy of the Defense Department’s organiza- tion, these three deputies—like the leaders of the Army, Navy, Air Force, or Marines—would have the job of acquiring the systems, training the people, and executing the operations planned by the national intelligence centers.

And, just as the combatant commanders also report to the secre- tary of defense, the directors of the national intelligence centers—e.g., for counterproliferation, crime and narcotics, and the rest—also would report to the National Intelligence Director.

  • The Defense Department’s military intelligence programs—the joint military intelligence program (JMIP) and the tactical intelligence and related activities program (TIARA)—would remain part of that department’s responsibility.

Executive Office of the President

POTUS

National Intelligence Director

Staff National

Counterterrorism Center

Hire,Train, Acquire, Equip & Field

(agencies support / staff the Nat’l Intel Centers)

National Intelligence Centers

(conduct “joint” collection and analysis – illustrative)

Deputy NID Foreign Intelligence

(CIA Dir.)

CIA

Clandestine Services All-Source Analysis

Open Source

Agency (new)

DIA NSA NGA NRO

Other

FBI

Intel & CT / CI

DHS / IAIP

Other DHS (e.g., CBP,TSA, Nat’l

Labs, Coast Guard, etc.)

WMD

Proliferation

China / East Asia

Unity of Effort in Managing Intelligence

  • The National Intelligence Director would set personnel policies to establish standards for education and training and facilitate assignments at the national intelligence centers and across agency lines. The National Intelligence Director also would set information sharing and information technology policies to maximize data sharing, as well as policies to protect the security of information.
  • Too many agencies now have an opportunity to say no to change.The National Intelligence Director should participate in an NSC execu- tive committee that can resolve differences in priorities among the agencies and bring the major disputes to the president for decision.

The National Intelligence Director should be located in the Executive Office of the President. This official, who would be confirmed by the Senate and would testify before Congress, would have a relatively small staff of several hun- dred people, taking the place of the existing community management offices housed at the CIA.

In managing the whole community, the National Intelligence Director is still providing a service function.With the partial exception of his or her responsi- bilities for overseeing the NCTC, the National Intelligence Director should support the consumers of national intelligence—the president and policymak- ing advisers such as the secretaries of state, defense, and homeland security and the attorney general.

We are wary of too easily equating government management problems with those of the private sector. But we have noticed that some very large private firms rely on a powerful CEO who has significant control over how money is spent and can hire or fire leaders of the major divisions, assisted by a relatively modest staff, while leaving responsibility for execution in the operating divisions. There are disadvantages to separating the position of National Intelligence Director from the job of heading the CIA. For example, the National Intelli- gence Director will not head a major agency of his or her own and may have a weaker base of support. But we believe that these disadvantages are out-

weighed by several other considerations:

  • The National Intelligence Director must be able to directly oversee intel- ligence collection inside the United States.Yet law and custom has coun- seled against giving such a plain domestic role to the head of the CIA.
  • The CIA will be one among several claimants for funds in setting national priorities.The National Intelligence Director should not be both one of the advocates and the judge of them all.
  • Covert operations tend to be highly tactical, requiring close attention. The National Intelligence Director should rely on the relevant joint

mission center to oversee these details, helping to coordinate closely with the White House.The CIA will be able to concentrate on build- ing the capabilities to carry out such operations and on providing the personnel who will be directing and executing such operations in the field.

  • Rebuilding the analytic and human intelligence collection capabili- ties of the CIA should be a full-time effort, and the director of the CIA should focus on extending its comparative advantages.
Recommendation: The CIA Director should emphasize (a) rebuild- ing the CIA’s analytic capabilities; (b) transforming the clandestine service by building its human intelligence capabilities; (c) developing a stronger language program, with high standards and sufficient financial incentives; (d) renewing emphasis on recruiting diversity among operations officers so they can blend more easily in foreign cities; (e) ensuring a seamless relationship between human source col- lection and signals collection at the operational level; and (f) stress- ing a better balance between unilateral and liaison operations.

The CIA should retain responsibility for the direction and execution of clan- destine and covert operations, as assigned by the relevant national intelligence center and authorized by the National Intelligence Director and the president. This would include propaganda, renditions, and nonmilitary disruption. We believe, however, that one important area of responsibility should change.

Recommendation: Lead responsibility for directing and executing paramilitary operations, whether clandestine or covert, should shift to the Defense Department.There it should be consolidated with the capabilities for training, direction, and execution of such operations already being developed in the Special Operations Command.
  • Before 9/11, the CIA did not invest in developing a robust capability to conduct paramilitary operations with U.S. personnel. It relied on proxies instead, organized by CIA operatives without the requisite military training.The results were unsatisfactory.
  • Whether the price is measured in either money or people, the United States cannot afford to build two separate capabilities for carrying out secret military operations, secretly operating standoff missiles, and secretly training foreign military or paramilitary forces. The United States should concentrate responsibility and necessary legal authori- ties in one entity.
  • The post-9/11 Afghanistan precedent of using joint CIA-military teams for covert and clandestine operations was a good one. We believe this proposal to be consistent with it. Each agency would con- centrate on its comparative advantages in building capabilities for joint missions.The operation itself would be planned in common.
  • The CIA has a reputation for agility in operations.The military has a reputation for being methodical and cumbersome.We do not know if these stereotypes match current reality; they may also be one more symptom of the civil-military misunderstandings we described in chapter 4. It is a problem to be resolved in policy guidance and agency management, not in the creation of redundant, overlapping capabili- ties and authorities in such sensitive work.The CIA’s experts should be integrated into the military’s training, exercises, and planning. To quote a CIA official now serving in the field:“One fight, one team.”
Recommendation: Finally, to combat the secrecy and complexity we have described, the overall amounts of money being appropriated for national intelligence and to its component agencies should no longer be kept secret. Congress should pass a separate appropriations act for intelligence, defending the broad allocation of how these tens of bil- lions of dollars have been assigned among the varieties of intelligence work.

The specifics of the intelligence appropriation would remain classified, as they are today. Opponents of declassification argue that America’s enemies could learn about intelligence capabilities by tracking the top-line appropria- tions figure.Yet the top-line figure by itself provides little insight into U.S. intel- ligence sources and methods. The U.S. government readily provides copious information about spending on its military forces, including military intelli- gence.The intelligence community should not be subject to that much disclo- sure. But when even aggregate categorical numbers remain hidden, it is hard to judge priorities and foster accountability.

13.3 UNITY OF EFFORT IN SHARING INFORMATION

Information Sharing

We have already stressed the importance of intelligence analysis that can draw on all relevant sources of information. The biggest impediment to all-source analysis—to a greater likelihood of connecting the dots—is the human or sys- temic resistance to sharing information.

The U.S. government has access to a vast amount of information. When databases not usually thought of as “intelligence,” such as customs or immigra-

tion information, are included, the storehouse is immense. But the U.S. gov- ernment has a weak system for processing and using what it has. In interviews around the government, official after official urged us to call attention to frus- trations with the unglamorous “back office” side of government operations.

In the 9/11 story, for example, we sometimes see examples of information that could be accessed—like the undistributed NSA information that would have helped identify Nawaf al Hazmi in January 2000. But someone had to ask for it. In that case, no one did. Or, as in the episodes we describe in chapter 8, the information is distributed, but in a compartmented channel. Or the infor- mation is available, and someone does ask, but it cannot be shared.

What all these stories have in common is a system that requires a demon- strated “need to know” before sharing.This approach assumes it is possible to know, in advance, who will need to use the information. Such a system implic- itly assumes that the risk of inadvertent disclosure outweighs the benefits of wider sharing.Those Cold War assumptions are no longer appropriate.The cul- ture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty to the information—to repay the taxpayers’ investment by making that information available.

Each intelligence agency has its own security practices, outgrowths of the Cold War.We certainly understand the reason for these practices. Counterin- telligence concerns are still real, even if the old Soviet enemy has been replaced by other spies.

But the security concerns need to be weighed against the costs. Current security requirements nurture overclassification and excessive compartmenta- tion of information among agencies. Each agency’s incentive structure opposes sharing, with risks (criminal, civil, and internal administrative sanctions) but few rewards for sharing information. No one has to pay the long-term costs of over- classifying information, though these costs—even in literal financial terms— are substantial.There are no punishments for not sharing information.Agencies uphold a “need-to-know” culture of information protection rather than pro- moting a “need-to-share” culture of integration.15

Recommendation: Information procedures should provide incentives for sharing, to restore a better balance between security and shared knowledge.

Intelligence gathered about transnational terrorism should be processed, turned into reports, and distributed according to the same quality standards, whether it is collected in Pakistan or in Texas.

The logical objection is that sources and methods may vary greatly in dif- ferent locations.We therefore propose that when a report is first created, its data be separated from the sources and methods by which they are obtained. The

report should begin with the information in its most shareable, but still mean- ingful, form. Therefore the maximum number of recipients can access some form of that information. If knowledge of further details becomes important, any user can query further, with access granted or denied according to the rules set for the network—and with queries leaving an audit trail in order to deter- mine who accessed the information. But the questions may not come at all unless experts at the “edge” of the network can readily discover the clues that prompt to them.16

We propose that information be shared horizontally, across new networks that transcend individual agencies.

  • The current system is structured on an old mainframe, or hub-and- spoke, concept. In this older approach, each agency has its own data- base. Agency users send information to the database and then can retrieve it from the database.
  • A decentralized network model, the concept behind much of the information revolution, shares data horizontally too. Agencies would still have their own databases, but those databases would be searchable across agency lines. In this system, secrets are protected through the design of the network and an “information rights management” approach that controls access to the data, not access to the whole net- work.An outstanding conceptual framework for this kind of “trusted information network” has been developed by a task force of leading professionals in national security, information technology, and law assembled by the Markle Foundation. Its report has been widely dis- cussed throughout the U.S. government, but has not yet been con- verted into action.17
  • No one agency can do it alone. Well-meaning agency officials are under tremendous pressure to update their systems. Alone, they may only be able to modernize the stovepipes, not replace them.
  • Only presidential leadership can develop government-wide concepts and standards. Currently, no one is doing this job. Backed by the Office of Management and Budget, a new National Intelligence Director empowered to set common standards for information use throughout the community, and a secretary of homeland security who helps

extend the system to public agencies and relevant private-sector data- bases, a government-wide initiative can succeed.

  • White House leadership is also needed because the policy and legal issues are harder than the technical ones. The necessary technology already exists. What does not are the rules for acquiring, accessing, sharing, and using the vast stores of public and private data that may be available. When information sharing works, it is a powerful tool. Therefore the sharing and uses of information must be guided by a set of practical policy guidelines that simultaneously empower and constrain officials, telling them clearly what is and is not permitted.

“This is government acting in new ways, to face new threats,” the most recent Markle report explains.“And while such change is necessary, it must be accomplished while engendering the people’s trust that privacy and other civil liberties are being protected, that businesses are not being unduly burdened with requests for extraneous or useless information, that taxpayer money is being well spent, and that, ultimately, the network will be effective in protect- ing our security.”The authors add: “Leadership is emerging from all levels of government and from many places in the private sector.What is needed now is a plan to accelerate these efforts, and public debate and consensus on the goals.”18

13.4 UNITY OF EFFORT IN THE CONGRESS

Strengthen Congressional Oversight of Intelligence and Homeland Security

Of all our recommendations, strengthening congressional oversight may be among the most difficult and important. So long as oversight is governed by current congressional rules and resolutions, we believe the American people will not get the security they want and need.The United States needs a strong, stable, and capable congressional committee structure to give America’s national intelligence agencies oversight, support, and leadership.

Few things are more difficult to change in Washington than congressional committee jurisdiction and prerogatives. To a member, these assignments are almost as important as the map of his or her congressional district.The Amer- ican people may have to insist that these changes occur, or they may well not happen. Having interviewed numerous members of Congress from both par- ties, as well as congressional staff members, we found that dissatisfaction with congressional oversight remains widespread.

The future challenges of America’s intelligence agencies are daunting.They include the need to develop leading-edge technologies that give our policy-

makers and warfighters a decisive edge in any conflict where the interests of the United States are vital. Not only does good intelligence win wars, but the best intelligence enables us to prevent them from happening altogether.

Under the terms of existing rules and resolutions the House and Senate intelligence committees lack the power, influence, and sustained capability to meet this challenge.While few members of Congress have the broad knowl- edge of intelligence activities or the know-how about the technologies employed, all members need to feel assured that good oversight is happening. When their unfamiliarity with the subject is combined with the need to pre- serve security, a mandate emerges for substantial change.

Tinkering with the existing structure is not sufficient. Either Congress should create a joint committee for intelligence, using the Joint Atomic Energy Committee as its model, or it should create House and Senate committees with combined authorizing and appropriations powers.

Whichever of these two forms are chosen, the goal should be a structure— codified by resolution with powers expressly granted and carefully limited— allowing a relatively small group of members of Congress, given time and reason to master the subject and the agencies, to conduct oversight of the intel- ligence establishment and be clearly accountable for their work. The staff of this committee should be nonpartisan and work for the entire committee and not for individual members.

The other reforms we have suggested—for a National Counterterrorism Center and a National Intelligence Director—will not work if congressional oversight does not change too. Unity of effort in executive management can be lost if it is fractured by divided congressional oversight.

Recommendation: Congressional oversight for intelligence—and counterterrorism—is now dysfunctional. Congress should address this problem.We have considered various alternatives: A joint committee on the old model of the Joint Committee on Atomic Energy is one. A single committee in each house of Congress, combining authoriz- ing and appropriating authorities, is another.
  • The new committee or committees should conduct continuing stud- ies of the activities of the intelligence agencies and report problems relating to the development and use of intelligence to all members of the House and Senate.
  • We have already recommended that the total level of funding for intel- ligence be made public, and that the national intelligence program be appropriated to the National Intelligence Director, not to the secre- tary of defense.19
  • We also recommend that the intelligence committee should have a subcommittee specifically dedicated to oversight, freed from the con- suming responsibility of working on the budget.
  • The resolution creating the new intelligence committee structure should grant subpoena authority to the committee or committees. The majority party’s representation on this committee should never exceed the minority’s representation by more than one.
  • Four of the members appointed to this committee or committees should be a member who also serves on each of the following addi- tional committees:Armed Services, Judiciary, Foreign Affairs, and the Defense Appropriations subcommittee. In this way the other major congressional interests can be brought together in the new commit- tee’s work.
  • Members should serve indefinitely on the intelligence committees, without set terms, thereby letting them accumulate expertise.
  • The committees should be smaller—perhaps seven or nine members in each house—so that each member feels a greater sense of respon- sibility, and accountability, for the quality of the committee’s work.

The leaders of the Department of Homeland Security now appear before 88 committees and subcommittees of Congress. One expert witness (not a mem- ber of the administration) told us that this is perhaps the single largest obstacle impeding the department’s successful development. The one attempt to con- solidate such committee authority, the House Select Committee on Home- land Security, may be eliminated.The Senate does not have even this.

Congress needs to establish for the Department of Homeland Security the kind of clear authority and responsibility that exist to enable the Justice Depart- ment to deal with crime and the Defense Department to deal with threats to national security.Through not more than one authorizing committee and one appropriating subcommittee in each house, Congress should be able to ask the secretary of homeland security whether he or she has the resources to provide reasonable security against major terrorist acts within the United States and to hold the secretary accountable for the department’s performance.

Recommendation: Congress should create a single, principal point of oversight and review for homeland security. Congressional leaders are best able to judge what committee should have jurisdiction over this department and its duties. But we believe that Congress does have the obligation to choose one in the House and one in the Senate, and that this committee should be a permanent standing committee with a nonpartisan staff.

Improve the Transitions between Administrations

In chapter 6, we described the transition of 2000–2001. Beyond the policy issues we described, the new administration did not have its deputy cabinet offi- cers in place until the spring of 2001, and the critical subcabinet officials were not confirmed until the summer—if then. In other words, the new adminis- tration—like others before it—did not have its team on the job until at least six months after it took office.

Recommendation: Since a catastrophic attack could occur with lit- tle or no notice, we should minimize as much as possible the disrup- tion of national security policymaking during the change of administrations by accelerating the process for national security appointments. We think the process could be improved significantly so transitions can work more effectively and allow new officials to assume their new responsibilities as quickly as possible.
  • Before the election, candidates should submit the names of selected members of their prospective transition teams to the FBI so that, if necessary, those team members can obtain security clearances imme- diately after the election is over.
  • A president-elect should submit lists of possible candidates for national security positions to begin obtaining security clearances immediately after the election, so that their background investigations can be complete before January 20.
  • A single federal agency should be responsible for providing and main- taining security clearances, ensuring uniform standards–including uniform security questionnaires and financial report requirements, and maintaining a single database.This agency can also be responsible for administering polygraph tests on behalf of organizations that require them.
  • A president-elect should submit the nominations of the entire new national security team, through the level of under secretary of cabi- net departments, not later than January 20. The Senate, in return, should adopt special rules requiring hearings and votes to confirm or reject national security nominees within 30 days of their submission. The Senate should not require confirmation of such executive appointees below Executive Level 3.
  • The outgoing administration should provide the president-elect, as soon as possible after election day, with a classified, compartmented list that catalogues specific, operational threats to national security; major military or covert operations; and pending decisions on the pos-

sible use of force. Such a document could provide both notice and a checklist, inviting a president-elect to inquire and learn more.

13.5 ORGANIZING AMERICA’S DEFENSES IN THE UNITED STATES

The Future Role of the FBI

We have considered proposals for a new agency dedicated to intelligence col- lection in the United States. Some call this a proposal for an “American MI- 5,” although the analogy is weak—the actual British Security Service is a relatively small worldwide agency that combines duties assigned in the U.S. government to the Terrorist Threat Integration Center, the CIA, the FBI, and the Department of Homeland Security.

The concern about the FBI is that it has long favored its criminal justice mission over its national security mission. Part of the reason for this is the demand around the country for FBI help on criminal matters. The FBI was criticized, rightly, for the overzealous domestic intelligence investigations dis- closed during the 1970s.The pendulum swung away from those types of inves- tigations during the 1980s and 1990s, though the FBI maintained an active counterintelligence function and was the lead agency for the investigation of foreign terrorist groups operating inside the United States.

We do not recommend the creation of a new domestic intelligence agency. It is not needed if our other recommendations are adopted—to establish a strong national intelligence center, part of the NCTC, that will oversee coun- terterrorism intelligence work, foreign and domestic, and to create a National Intelligence Director who can set and enforce standards for the collection, pro- cessing, and reporting of information.

Under the structures we recommend, the FBI’s role is focused, but still vital. The FBI does need to be able to direct its thousands of agents and other employees to collect intelligence in America’s cities and towns—interviewing informants, conducting surveillance and searches, tracking individuals, work- ing collaboratively with local authorities, and doing so with meticulous atten- tion to detail and compliance with the law.The FBI’s job in the streets of the United States would thus be a domestic equivalent, operating under the U.S. Constitution and quite different laws and rules, to the job of the CIA’s opera- tions officers abroad.

Creating a new domestic intelligence agency has other drawbacks.

  • The FBI is accustomed to carrying out sensitive intelligence collec- tion operations in compliance with the law. If a new domestic intel- ligence agency were outside of the Department of Justice, the process of legal oversight—never easy—could become even more difficult.

Abuses of civil liberties could create a backlash that would impair the collection of needed intelligence.

  • Creating a new domestic intelligence agency would divert attention of the officials most responsible for current counterterrorism efforts while the threat remains high. Putting a new player into the mix of federal agencies with counterterrorism responsibilities would exacer- bate existing information-sharing problems.
  • A new domestic intelligence agency would need to acquire assets and personnel.The FBI already has 28,000 employees; 56 field offices, 400 satellite offices, and 47 legal attaché offices; a laboratory, operations center, and training facility; an existing network of informants, coop- erating defendants, and other sources; and relationships with state and local law enforcement, the CIA, and foreign intelligence and law enforcement agencies.
  • Counterterrorism investigations in the United States very quickly become matters that involve violations of criminal law and possible law enforcement action. Because the FBI can have agents working criminal matters and agents working intelligence investigations con- cerning the same international terrorism target, the full range of inves- tigative tools against a suspected terrorist can be considered within one agency. The removal of “the wall” that existed before 9/11 between intelligence and law enforcement has opened up new opportunities for cooperative action within the FBI.
  • Counterterrorism investigations often overlap or are cued by other criminal investigations, such as money laundering or the smuggling of contraband. In the field, the close connection to criminal work has many benefits.

Our recommendation to leave counterterrorism intelligence collection in the United States with the FBI still depends on an assessment that the FBI—if it makes an all-out effort to institutionalize change—can do the job.As we men- tioned in chapter 3, we have been impressed by the determination that agents display in tracking down details, patiently going the extra mile and working the extra month, to put facts in the place of speculation. In our report we have shown how agents in Phoenix, Minneapolis, and New York displayed initiative in pressing their investigations.

FBI agents and analysts in the field need to have sustained support and ded- icated resources to become stronger intelligence officers. They need to be rewarded for acquiring informants and for gathering and disseminating infor- mation differently and more broadly than usual in a traditional criminal inves-

tigation. FBI employees need to report and analyze what they have learned in ways the Bureau has never done before.

Under Director Robert Mueller, the Bureau has made significant progress in improving its intelligence capabilities. It now has an Office of Intelligence, overseen by the top tier of FBI management. Field intelligence groups have been created in all field offices to put FBI priorities and the emphasis on intel- ligence into practice. Advances have been made in improving the Bureau’s information technology systems and in increasing connectivity and informa- tion sharing with intelligence community agencies.

Director Mueller has also recognized that the FBI’s reforms are far from complete. He has outlined a number of areas where added measures may be necessary. Specifically, he has recognized that the FBI needs to recruit from a broader pool of candidates, that agents and analysts working on national secu- rity matters require specialized training, and that agents should specialize within programs after obtaining a generalist foundation.The FBI is developing career tracks for agents to specialize in counterterrorism/counterintelligence, cyber crimes, criminal investigations, or intelligence. It is establishing a program for certifying agents as intelligence officers, a certification that will be a prerequi- site for promotion to the senior ranks of the Bureau. New training programs have been instituted for intelligence-related subjects.

The Director of the FBI has proposed creating an Intelligence Directorate as a further refinement of the FBI intelligence program.This directorate would include units for intelligence planning and policy and for the direction of ana- lysts and linguists.

We want to ensure that the Bureau’s shift to a preventive counterterrorism posture is more fully institutionalized so that it survives beyond Director Mueller’s tenure.We have found that in the past the Bureau has announced its willingness to reform and restructure itself to address transnational security threats, but has fallen short—failing to effect the necessary institutional and cul- tural changes organization-wide.We want to ensure that this does not happen again. Despite having found acceptance of the Director’s clear message that counterterrorism is now the FBI’s top priority, two years after 9/11 we also found gaps between some of the announced reforms and the reality in the field. We are concerned that management in the field offices still can allocate peo- ple and resources to local concerns that diverge from the national security mis- sion.This system could revert to a focus on lower-priority criminal justice cases over national security requirements.

Recommendation: A specialized and integrated national security workforce should be established at the FBI consisting of agents, ana- lysts, linguists, and surveillance specialists who are recruited, trained, rewarded, and retained to ensure the development of an institutional

culture imbued with a deep expertise in intelligence and national security.

  • The president, by executive order or directive, should direct the FBI to develop this intelligence cadre.
  • Recognizing that cross-fertilization between the criminal justice and national security disciplines is vital to the success of both missions, all new agents should receive basic training in both areas. Furthermore, new agents should begin their careers with meaningful assignments in both areas.
  • Agents and analysts should then specialize in one of these disciplines and have the option to work such matters for their entire career with the Bureau. Certain advanced training courses and assignments to other intelligence agencies should be required to advance within the national security discipline.
  • In the interest of cross-fertilization, all senior FBI managers, includ- ing those working on law enforcement matters, should be certified intelligence officers.
  • The FBI should fully implement a recruiting, hiring, and selection process for agents and analysts that enhances its ability to target and attract individuals with educational and professional backgrounds in intelligence, international relations, language, technology, and other relevant skills.
  • The FBI should institute the integration of analysts, agents, linguists, and surveillance personnel in the field so that a dedicated team approach is brought to bear on national security intelligence operations.
  • Each field office should have an official at the field office’s deputy level for national security matters.This individual would have management oversight and ensure that the national priorities are carried out in the field.
  • The FBI should align its budget structure according to its four main programs—intelligence, counterterrorism and counterintelligence, criminal, and criminal justice services—to ensure better transparency on program costs, management of resources, and protection of the intelligence program.20
  • The FBI should report regularly to Congress in its semiannual pro- gram reviews designed to identify whether each field office is appro- priately addressing FBI and national program priorities.
  • The FBI should report regularly to Congress in detail on the qualifi- cations, status, and roles of analysts in the field and at headquarters. Congress should ensure that analysts are afforded training and career opportunities on a par with those offered analysts in other intelligence community agencies.
  • The Congress should make sure funding is available to accelerate the expansion of secure facilities in FBI field offices so as to increase their ability to use secure email systems and classified intelligence product exchanges. The Congress should monitor whether the FBI’s information-sharing principles are implemented in practice.

The FBI is just a small fraction of the national law enforcement commu- nity in the United States, a community comprised mainly of state and local agencies.The network designed for sharing information, and the work of the FBI through local Joint Terrorism Task Forces, should build a reciprocal rela- tionship, in which state and local agents understand what information they are looking for and, in return, receive some of the information being developed about what is happening, or may happen, in their communities. In this rela- tionship, the Department of Homeland Security also will play an important part.

The Homeland Security Act of 2002 gave the under secretary for informa- tion analysis and infrastructure protection broad responsibilities. In practice, this directorate has the job to map “terrorist threats to the homeland against our assessed vulnerabilities in order to drive our efforts to protect against terrorist threats.”21 These capabilities are still embryonic. The directorate has not yet developed the capacity to perform one of its assigned jobs, which is to assim- ilate and analyze information from Homeland Security’s own component agencies, such as the Coast Guard, Secret Service, Transportation Security Administration, Immigration and Customs Enforcement, and Customs and Border Protection.The secretary of homeland security must ensure that these components work with the Information Analysis and Infrastructure Protection Directorate so that this office can perform its mission.22

Homeland Defense

At several points in our inquiry, we asked, “Who is responsible for defending us at home?” Our national defense at home is the responsibility, first, of the Department of Defense and, second, of the Department of Homeland Secu- rity.They must have clear delineations of responsibility and authority.

We found that NORAD, which had been given the responsibility for defending U.S. airspace, had construed that mission to focus on threats com- ing from outside America’s borders. It did not adjust its focus even though the intelligence community had gathered intelligence on the possibility that ter-

rorists might turn to hijacking and even use of planes as missiles.We have been assured that NORAD has now embraced the full mission. Northern Com- mand has been established to assume responsibility for the defense of the domestic United States.

Recommendation: The Department of Defense and its oversight committees should regularly assess the adequacy of Northern Com- mand’s strategies and planning to defend the United States against military threats to the homeland.

The Department of Homeland Security was established to consolidate all of the domestic agencies responsible for securing America’s borders and national infrastructure, most of which is in private hands. It should identify those elements of our transportation, energy, communications, financial, and other institutions that need to be protected, develop plans to protect that infra- structure, and exercise the mechanisms to enhance preparedness. This means going well beyond the preexisting jobs of the agencies that have been brought together inside the department.

Recommendation: The Department of Homeland Security and its oversight committees should regularly assess the types of threats the country faces to determine (a) the adequacy of the government’s plans—and the progress against those plans—to protect America’s critical infrastructure and (b) the readiness of the government to respond to the threats that the United States might face.

. . .

We look forward to a national debate on the merits of what we have recom- mended, and we will participate vigorously in that debate.

COMMON ABBREVIATIONS

CAP combat air patrol

CAPPS Computer Assisted Passenger Prescreening System

CENTCOM Central Command

CIA Central Intelligence Agency

CONR Continental U.S. NORAD Region

CSG Counterterrorism Security Group

CTC Counterterrorist Center

DIA Defense Intelligence Agency

DCI Director of Central Intelligence

ESU Emergency Service Unit (NYPD)

FAA Federal Aviation Administration

FBI Federal Bureau of Investigation

FDNY Fire Department of New York

FFTC Florida Flight Training Center

FISA Foreign Intelligence Surveillance Act

FISC Foreign Intelligence Surveillance Court

INS Immigration and Naturalization Service

ISID Inter-Services Intelligence Directorate (Pakistan)

JCS Joint Chiefs of Staff

JI Jemaah Islamiah

JTTF Joint Terrorism Task Force

KSM Khalid Sheikh Mohammed

Legat legal attaché

MAK Mektab al Khidmat

MON memorandum of notification

NEADS Northeast Air Defense Sector

NCTC National Counterterrorism Center

NGO nongovernmental organization

NMCC National Military Command Center

429

NORAD North American Aerospace Defense Command NTSB National Transportation Safety Board

NSA National Security Agency

NSC National Security Council

NSPD national security policy directive

NYPD New York Police Department

OEM Office of Emergency Management (New York City)

OFAC Office of Foreign Assets Control

OIPR Office of Intelligence Policy and Review

OMB Office of Management and Budget

PAPD Port Authority Police Department

PDD presidential decision directive

PEOC Presidential Emergency Operations Center

SEC Securities and Exchange Commission

TSA Transportation Security Administration

TTIC Terrorist Threat Integration Center

UBL Usama Bin Ladin

WMD weapons of mass destruction

WTC World Trade Center

WTO World Trade Organization

TABLE OF NAMES

U.S. OFFICIALS

Madeleine Albright Secretary of State, 1997–2001

Charles Allen Assistant Director of Central Intelligence for Col-

lection, 1998–

Richard Armitage Deputy Secretary of State, 2001–

Larry Arnold Commander, First Air Force and Commander of

the Continental U.S. North American Aero- space Defense Command (NORAD) Region, 1997–2002

John Ashcroft Attorney General, 2001–

Monte Belger Acting Deputy Administrator, Federal Aviation

Administration 1997–2002

Samuel “Sandy” Berger National Security Advisor, 1997–2001; Deputy

National Security Advisor 1993–1997

J. Cofer Black Director, DCI Counterterrorist Center, 1999–2002 Joshua Bolten White House Deputy Chief of Staff, 2001–2003 Robert “Bear” Bryant Deputy Director, Federal Bureau of Investigation,

1997–1999

George H.W. Bush 41st President of the United States, 1989–1993;

Vice President, 1981–1989

George W. Bush 43rd President of the United States, 2001– Andrew Card, Jr. White House Chief of Staff, 2001– Richard B. Cheney Vice President of the United States, 2001–

Richard Clarke National Counterterrorism Coordinator, NSC,

1997–2001

William J. Clinton 42nd President of the United States, 1993–2001 William Cohen Secretary of Defense, 1997–2001

431

Roger Cressey NSC counterterrorism official, 1999–2001 Ralph Eberhart Commander in Chief, NORAD and U.S. Space

Command, 2000–

Tommy Franks Commander, U.S. Central Command (CENT-

COM), 2001–2003

Louis Freeh Director, Federal Bureau of Investigation, 1993–2001 Scott Fry Director of Operations for the Joint Chiefs of

Staff, 1998–2000

Jane Garvey Administrator, Federal Aviation Administration,

1997–2002

Newt Gingrich Speaker of the House, 1995–1999 Rudolph Giuliani Mayor, City of New York, 1994–2001

John Gordon Deputy Director of Central Intelligence, 1997–2000 Al Gore, Jr. Vice President of the United States,1993–2001 Scott Gration Fry’s Chief Information Operations Officer,

2000–2001

Stephen Hadley Deputy National Security Advisor, 2001– Dennis Hastert Speaker of the House, 1999–

Karl Inderfurth Assistant Secretary of State for South Asia, 1997–2001

Donald Kerrick Deputy National Security Advisor, 2000–2001 Zalmay Khalilzad NSC Senior Director for Near East and South

Asia and Special Envoy to Afghanistan, 2001–2003

Anthony Lake National Security Advisor, 1993–1997 Trent Lott Senate Majority Leader, 1996–2001

Mary McCarthy NSC senior director for intelligence, 1998–2001 John McLaughlin Deputy Director of Central Intelligence,

2000–2004

William Milam U.S. Ambassador to Pakistan, 1998–2001 Norman Mineta Secretary of Transportation, 2001–

Robert Mueller Director, Federal Bureau of Investigation, 2001– Richard Myers Chairman of the Joint Chiefs, September 2001–;

Joint Chiefs Vice Chairman, 2000–2001

John O’Neill FBI Special Agent in Charge for National Secu-

rity, New York Field Office, 1997–2001; Chief of Security of the World Trade Center, killed on 9/11

Paul O’Neill Secretary of the Treasury, 2001–2002

James Pavitt Deputy Director of Operations, CIA, 1999–2004

Thomas Pickard Acting Director, Federal Bureau of Investigation,

June 25, 2001–September 4, 2001

Thomas Pickering Under Secretary of State, 1997–2000 Colin Powell Secretary of State, 2001–

Ronald Reagan 40th President of the United States, 1981–1989 Janet Reno Attorney General, 1993–2001

Condoleezza Rice National Security Advisor, 2001–

Bill Richardson Ambassador to the United Nations, 1997–1998 Thomas Ridge First Secretary of Homeland Security, 2003–;

Homeland Security Advisor, 2001–2003 Bruce Riedel Senior Director for Near East and South Asia,

NSC, 1997–2001

Christina Rocca Assistant Secretary of State for South Asia, 2001– Michael Rolince FBI Section Chief, International Terrorism Oper-

ations Section, 1998–2002 Donald Rumsfeld Secretary of Defense, 2001–

Peter Schoomaker Commander, Special Operations Command, 1997–2000

Gary Schroen CIA Station Chief, Islamabad, 1996–1999 Michael Sheehan Counterterrorism Coordinator, U.S. Department

of State, 1998–2000

Hugh Shelton Chairman of the Joint Chiefs of Staff, 1997–2001 Walter Slocombe Under Secretary of Defense for Policy, 1994–2001 James Steinberg Deputy National Security Advisor, 1996–2000 Strobe Talbott Deputy Secretary of State, 1994–2001

George Tenet Director of Central Intelligence, 1997–2004 Larry Thompson Deputy Attorney General, 2001–2003

Dale Watson Executive Assistant Director for Counterterrorism

and Counterintelligence, FBI, 2001–2002 Paul Wolfowitz Deputy Secretary of Defense, 2001–

Anthony Zinni Commander, U.S. Central Command (CENT-

COM), 1997–2000

OTHERS

Abdullah bin Abdul Aziz Crown Prince and de facto regent of Saudi Ara-

bia, 1995–

Mohdar Abdullah Yemeni; student in San Diego who assisted two 9/11 hijackers

Sayf al Adl Egyptian; high-ranking member of al Qaeda mili- tary committee

Mahmud Ahmed Director General of Pakistan’s Inter-Services

Intelligence Directorate, 1999–2001 Mohammed Farrah Somali warlord who challenged U.S. presence in

Aidid Somalia in the early 1990s (deceased)

Ali Abdul Aziz Ali (a.k.a.Ammar al Baluchi) Pakistani; KSM’s nephew;

financial and travel facilitator for 9/11 plot Ahmad Khalil Ibrahim Iraqi intelligence officer who allegedly met with

Samir al Ani Atta in Prague, Czech Republic; currently in

U.S. custody

Mohamed Atta Egyptian; tactical leader of 9/11 plot;

pilot/hijacker (AA 11) (deceased)

Mohammed Atef (a.k.a. Abu Hafs al Masri) Egyptian; al Qaeda mili-

tary commander (deceased)

Tawfiq bin Attash (a.k.a. Khallad,Waleed bin Attash) Yemeni; senior

al Qaeda operative connected to the U.S. embassy bombings, the USS Cole attack, and the 9/11 attacks; currently in U.S. custody

Anwar Aulaqi U.S. citizen; Imam at Rabat mosque (San Diego,

CA) and later at Dar al Hijra mosque (Falls Church,VA), who associated with two 9/11 hijackers

Abdullah Azzam Palestinian; founder of the Maktab al Khidmat,

which provided logistical support to mujahi- deen in Afghanistan (deceased)

Jamal al Badawi Yemeni; co-conspirator arrested in Yemen for the USS Cole attack

Said Bahaji German son of Moroccan immigrant; Hamburg cell associate

Saeed al Baluchi Saudi; candidate 9/11 hijacker

Fayez Banihammad Emirati; 9/11 hijacker (UA 175) (deceased) Abu Ubaidah al Banshiri Egyptian; al Qaeda military commander until

1996 (deceased)

Abu Bara al Yemeni (a.k.a. Abu al Bara al Ta’izi, Suhail Shurabi, and

Barakat) Yemeni; potential suicide bomber in original 9/11 plot

Ramzi Binalshibh Yemeni; Hamburg cell member; coordinator for

9/11 plot; currently in U.S. custody Omar Hassan Ahmed President of Sudan, 1989–

al Bashir

Abu Bakar Bashir Indonesian; spiritual leader and founder of Jemaah

Islamiya, al Qaeda–affiliated terrorist group in Southeast Asia

Omar al Bayoumi Saudi; assisted two 9/11 hijackers in San Diego,

CA

Khalil Deek U.S. citizen; created electronic version of Encyclo-

pedia of Jihad; believed to be involved in millen-

nium plot to destroy tourist landmarks in Jor- dan

Caysan Bin Don (a.k.a Isamu Dyson, a.k.a Clayton Morgan) U.S.

citizen; met two 9/11 hijackers in Los Angeles and San Diego, CA

Zakariya Essabar Moroccan; Hamburg cell associate

Jamal Ahmed Mohamed Sudanese; al Qaeda member who defected to the al Fadl United States in 1996

Ahmed al Ghamdi Saudi; 9/11 hijacker (UA 175) (deceased)

Ali Abd al Rahman al (a.k.a. Abu Bakr al Azdi) Saudi; candidate 9/11 Faqasi al Ghamdi hijacker; currently in U.S. custody

Hamza al Ghamdi Saudi; 9/11 hijacker (UA 175) (deceased) Saeed al Ghamdi Saudi; 9/11 hijacker (UA 93) (deceased) Saeed (“Jihad”) al Saudi; candidate 9/11 hijacker

Ghamdi

Hassan Ghul Pakistani; al Qaeda facilitator; currently in U.S.

custody

Abu Hafs al Masri see Mohammed Atef

Abu Hafs al Mauritani Mauritanian; senior al Qaeda theologian

Wadi al Hage U.S. citizen; al Qaeda operative; Bin Ladin’s per-

sonal assistant; convicted in embassy bomb- ings trial

Mushabib al Hamlan Saudi; candidate 9/11 hijacker

Hani Hanjour Saudi; 9/11 pilot/hijacker (AA 77) (deceased) Mustafa al Hawsawi Saudi; al Qaeda media committee member; finan-

cial and travel facilitator for 9/11 plot Nawaf al Hazmi Saudi; 9/11 hijacker (AA 77) (deceased) Salem al Hazmi Saudi; 9/11 hijacker (AA 77) (deceased) Ahmad al Haznawi   Saudi; 9/11 hijacker (UA 93) (deceased)

Gulbuddin Hekmatyar Afghani; founder and leader of the Hizb-e-Islami,

a Taliban opposition group; Prime Minister of Afghanistan, 1993–1994; 1996

Saddam Hussein President of Iraq, 1979-2003

Zein al Abideen (a.k.a. Abu Zubaydah) Palestinian; al Qaeda asso Mohamed Hussein ciate; currently in U.S. custody

Abu Hajer al Iraqi see Mamdouh Mahmud Salim

Riduan Isamuddin (a.k.a. Hambali) Indonesian; operational leader of

Jemaah Islamiya; currently in U.S. custody

Ziad Jarrah Lebanese; 9/11 pilot/hijacker (UA 93) (deceased)

Abderraouf Jdey (a.k.a. Faruq al Tunisi) Tunisian/Canadian; candi- date 9/11 hijacker

Mohamed al Kahtani Saudi; candidate 9/11 hijacker; currently in U.S.

custody

Mir Amal Kansi Pakistani; extremist who killed two CIA em-

ployees at CIA headquarters in Virginia in 1993 (executed)

Hamid Karzai Interim Leader and later President of Afghanistan,

Dec. 2001–

Younis Khalis Afghani; leader of Hizb-e-Islami; hosted UBL

upon his return to Afghanistan in 1996

Khallad see Tawfiq bin Attash

Wali Khan Amin Shah (a.k.a. Osama Asmurai) Turkmen; early associate of

Usama Bin Ladin; convicted in Manila air (Bojinka) plot

Ibn al Khattab Saudi; mujahid leader in Chechnya L’Houssaine Kherchtou (a.k.a. Joe the Moroccan, Abu Talal) Moroccan;

former al Qaeda member who broke with Bin Ladin and became a U.S. government informant

Usama Bin Ladin (UBL) Saudi; head of al Qaeda

Ibn al Shaykh al Libi   Libyan; head of jihadist training camp in Afghan-

istan

Ahmed al Nami Saudi; 9/11 hijacker (UA 93) (deceased) Sheikh Saeed al Masri Egyptian; head of al Qaeda finance committee

Ahmed Shah Massoud Leader of Afghanistan’s Northern Alliance, a Tal-

iban opposition group (assassinated Sept. 9, 2001)

Khalid al Mihdhar Saudi; 9/11 hijacker (AA 77) (deceased)

Khalid Sheikh (KSM) (a.k.a. Mukhtar) Pakistani; mastermind of Mohammed 9/11 attacks; currently in U.S. custody

Majed Moqed Saudi; 9/11 hijacker (AA 77) (deceased) Mounir el Motassadeq Moroccan; Hamburg cell associate

Zacarias Moussaoui French; arrested in the U.S. in connection with the 9/11 attacks

Hosni Mubarak President of Egypt, 1981– Pervez Musharraf Leader of Pakistan, 1999–

Abdelghani Mzoudi Moroccan; Hamburg cell associate Qutaybah al Najdi Saudi; candidate 9/11 hijacker

Abd al Rahim al Nashiri  (a.k.a. Mullah Bilal) Saudi; mastermind of USS

Cole attack; currently in U.S. custody

Mullah Mohammed Leader of Afghanistan’s Taliban, which ruled most Omar of the country from 1996 to 2001

Abdul Aziz al Omari Saudi; 9/11 hijacker (AA 11) (deceased) Muammar Qadhafi Leader of Libya, 1970–

Fahd al Quso Yemeni; al Qaeda co-conspirator arrested in

Yemen for the USS Cole attack

Sayyid Qutb Egyptian writer; member of Muslim Brotherhood

(deceased)

Eyad al Rababah Jordanian;Virginia resident who helped Hazmi and Hanjour

Abd al Rahim Ghulum (a.k.a. Abu Rahmah) Saudi; al Qaeda member Rabbani who worked closely with KSM in Karachi and

assisted many of the 9/11 hijackers Sheikh Omar Abdel (a.k.a. the Blind Sheikh) Egyptian cleric;

Rahman convicted for crimes related to 1993 World Trade Center bombing and 1995 plots against other NY landmarks

Saud al Rashid Saudi; candidate 9/11 hijacker

Ahmed Ressam (a.k.a. Benni Antoine Noris) Algerian; convicted

in millennium plot to bomb Los Angeles Inter- national Airport

Mamdouh Mahmud (a.k.a. Abu Hajer al Iraqi) Iraqi; chief procurement Salim officer for al Qaeda in Sudan; arrested in con-

nection with 1998 embassy bombings Yazeed al Salmi Saudi; briefly a housemate of a 9/11 hijacker in

San Diego

Abdul Rasul Sayyaf Afghani; head of the Hizbul-Ittihad El-Islami, and

KSM’s mentor

Aysel Senguen German; fiancée of 9/11 hijacker Jarrah Nawaz Sharif Pakistani Prime Minister, 1990–1993,

1997–1999

Marwan al Shehhi Emirati; 9/11 pilot/hijacker (UA 175)

(deceased)

Mohand al Shehri Saudi; 9/11 hijacker (UA 175) (deceased) Wail al Shehri Saudi; 9/11 hijacker (AA 11) (deceased) Waleed al Shehri Saudi; 9/11 hijacker (AA 11) (deceased)

Mohamedou Ould Slahi  (a.k.a. Abu Musab) Mauritanian; recruited 9/11

hijackers in Germany

Yazid Sufaat Malaysian; member of Jemaah Islamiya Satam al Suqami Saudi; 9/11 hijacker (AA 11) (deceased)

Madani al Tayyib Saudi; former head of al Qaeda finance committee Zuhair al Thubaiti Saudi; candidate 9/11 hijacker

Fahad al Thumairy Saudi; Imam of King Fahd mosque in Los Ange-

les; accredited diplomat at Saudi Consulate in Los Angeles

Hassan al Turabi Sudan’s longtime hard-line ideological leader and

Speaker of the country’s National Assembly

during the 1990s

Prince Turki bin Faisal Saudi intelligence chief prior to 9/11

Ramzi Yousef (a.k.a. Abdul Basit) Pakistani; convicted master-

mind of and co-conspirator in 1993 WTC bombing and Manila air (Bojinka) plots

Khalid Saeed Ahmad Saudi; candidate 9/11 hijacker al Zahrani

Mohammed Haydar German citizen from Syria; jihadist; possible Zammar recruiter of Hamburg cell members

Ayman al Zawahiri Egyptian; UBL’s deputy and leader of Egyptian

Islamic Jihad terrorist group

Hamdan Bin Zayid Emirati; Minister of State for Foreign Affairs of

the United Arab Emirates

Abu Zubaydah see Zein al Abideen Mohamed Hussein

APPENDIX C COMMISSION HEARINGS

The Commission held 12 public hearings during the course of its investiga- tion, convening for a total of 19 days and receiving testimony from 160 wit- nesses. The following is a list of hearings and witnesses in order of their appearance. All witnesses appearing during the 2004 calendar year testified under oath.

FIRST PUBLIC HEARING

Alexander Hamilton Customs House, New York, N.Y. March 31–April 1, 2003

The Honorable George Pataki, Governor, State of New York

The Honorable Michael R. Bloomberg, Mayor, City of New York

The Experience of the Attack

Harry Waizer, survivor, Cantor Fitzgerald, LP

David Lim, Police Department, Port Authority of New York and New Jersey Lee Ielpi, Fire Department of New York (retired)

Lieutenant Colonel Brian Birdwell, United States Army Craig Sincock, United States Army (retired)

Representatives of the Victims Stephen Push, Families of September 11 Mary Fetchet,Voices of September 11 Mindy Kleinberg, September 11 Advocates Allison Vadhan, Families of Flight 93

The Attackers, Intelligence, and Counterterrorism Policy

Daniel Byman, Georgetown University Abraham D. Sofaer, Hoover Institution Brian Jenkins, RAND Corporation

Magnus Ranstorp, University of St. Andrews

439

Borders, Money, and Transportation Security

Glenn Fine, Inspector General, U.S. Department of Justice Lee Wolosky, Boies, Schiller & Flexner LLP

Gerald Dillingham, Director, Civil Aviation Issues, General Accounting Office

Law Enforcement, Domestic Intelligence, and Homeland Security

Michael Wermuth, RAND Corporation

Steven Brill, Author, After: How America Confronted the September 12 Era

Zoë Baird, Markle Foundation

Randy Larsen, ANSER Institute for Homeland Security

Immediate Response to the Attacks

Shawn Kelley, Assistant Chief, Arlington County Fire Department William Baker, American Society of Civil Engineers

Ken Holden, Commissioner, New York City Department of Design and Construction

SECOND PUBLIC HEARING

Congress and Civil Aviation Security

Hart Senate Office Building,Washington, D.C. May 22–23, 2003

Congressional Oversight Representative Nancy Pelosi (D-Calif.) Senator John McCain (R-Az.)

Senator Joseph Lieberman (D-Conn.)

Intelligence Oversight and the Joint Inquiry

Senator Bob Graham (D-Fla.) Senator Richard Shelby (R-Ala.) Representative Porter Goss (R-Fla.)

Representative Jane Harman (D-Calif.)

Affected Constituencies

Senator Charles Schumer (D-N.Y.) Senator Hillary Rodham Clinton (D-N.Y.) Senator Jon Corzine (D-N.J.)

Senator Frank Lautenberg (D-N.J.) Representative Jerrold Nadler (D-N.Y.) Representative Christopher Shays (R-Conn.)

State of the System: Civil Aviation Security on September 11

Jane Garvey, former Administrator, Federal Aviation Administration Kenneth Mead, Inspector General, Department of Transportation James May, Air Transport Association of America

Bogdan Dzakovic, Civil Aviation Security Inspector, Transportation Security Agency

September 11, 2001: The Attacks and the Response

The Honorable Norman Mineta, Secretary of Transportation Major General Craig McKinley, Commander, 1st Air Force and the

Continental United States NORAD Region (CONR)

Lieutenant General Mike Canavan (retired), former Associate Administrator for Civil Aviation Security, Federal Aviation Administrator

Reforming Civil Aviation Security: Next Steps

Stephen McHale, Deputy Administrator,Transportation Security Agency Major General O.K. Steele (retired), former Associate Administrator for

Civil Aviation Security, Federal Aviation Administration

Mary Schiavo, former Inspector General, Department of Transportation

THIRD PUBLIC HEARING

Terrorism, al Qaeda, and the Muslim World Russell Senate Office Building,Washington, D.C. July 9, 2003

Al Qaeda

Rohan Gunaratna, Institute for Defence and Strategic Studies Mamoun Fandy, United States Institute of Peace

Marc Sageman, University of Pennsylvania

States and Terrorism

Laurie Mylroie, American Enterprise Institute Judith Yaphe, National Defense University

Murhaf Jouejati, Middle East Institute and George Washington University Mark Gasiorowski, Louisiana State University

The Challenge within the Muslim World Rachel Bronson, Council on Foreign Relations Steven Emerson,The Investigative Project Gilles Kepel, Institute of Political Studies, Paris

Dennis Ross,Washington Institute for Near East Policy

FOURTH PUBLIC HEARING

Intelligence and the War on Terrorism

Russell Senate Office Building,Washington, D.C. October 14, 2003

Leadership of U.S. Intelligence

James R. Schlesinger, former Director of Central Intelligence and Secretary of Defense

John M. Deutch, former Director of Central Intelligence and Deputy Secretary of Defense

Intelligence and National Security Policy

James B. Steinberg,The Brookings Institution and former Deputy National Security Advisor

Warning of Transnational Threats

Richard Kerr, former Deputy Director of Central Intelligence

Mary O. McCarthy, former National Intelligence Officer for Warning, Central Intelligence Agency

John Gannon, Staff Director, House Select Committee on Homeland Security

FIFTH PUBLIC HEARING

Private/Public Sector Partnerships for Emergency Preparedness Drew University, Madison, N.J.

November 19, 2003

Highlights of New Jersey’s Public/Private Sector Partnerships

The Honorable James E. McGreevey, Governor, State of New Jersey

The Challenge of Private Sector Preparedness

John Degnan,The Chubb Corporation

Skyscraper Safety Issues from 9/11 Family Members

Monica Gabrielle, Skyscraper Safety Campaign Sally Regenhard, Skyscraper Safety Campaign

Public/Private Initiatives Since 9/11

Michael F. Byrne, Director, Office of National Capital Region Coordination, Department of Homeland Security

Dennis J. Reimer, Oklahoma National Memorial Institute for Prevention of Terrorism

Richard A. Andrews, National Center for Crisis and Continuity Coordination

Private Sector Experience on 9/11

William Y.Yun, Fiduciary Trust Company International

Standards for Emergency Management and Business Continuity

Glenn Corbett, John Jay College of Criminal Justice

Randall Yim, Director, National Preparedness Team, General Accounting Office

Future Strategies for Private Sector Preparedness William G. Raisch, Greater New York Safety Council Peter R. Orszag,The Brookings Institution

James Haviaris, Rockefeller Group Development Corporation Thomas Susman, Ropes & Gray

SIXTH PUBLIC HEARING

Security and Liberty

Russell Senate Office Building,Washington, D.C. December 8, 2003

Intelligence Collection within the United States

Larry D.Thompson, former Deputy Attorney General of the United States Philip B. Heymann, former Deputy Attorney General of the United States Stephen J. Schulhofer, New York University, School of Law

Protecting Privacy, Preventing Terrorism

Judith A. Miller, former General Counsel, Department of Defense Stewart A. Baker, former General Counsel, National Security Agency Marc Rotenberg, Electronic Privacy Information Center

Preventive Detention: Use of Immigration Laws and Enemy Combatant Des- ignations to Combat Terrorism

Jan Ting,Temple University

Khaled Medhat Abou El Fadl, UCLA School of Law

David Martin, University of Virginia School of Law and former General Counsel, Immigration and Naturalization Service, Department of Justice

Government Organization and Domestic Intelligence

The Honorable William P. Barr, former Attorney General of the United States John J. Hamre, former Deputy Secretary of Defense

John MacGaffin, former Associate Deputy Director for Operations, Central Intelligence Agency

SEVENTH PUBLIC HEARING

Borders,Transportation, and Managing Risk Hart Senate Office Building,Washington, D.C. January 26–27, 2004

The Border Security System Prior to September 11

Mary A. Ryan, former Assistant Secretary for Consular Affairs, Department of State

Doris Meissner, former Commissioner, Immigration and Naturalization Service, Department of Justice

An Incident in Florida

Jose E. Melendez-Perez, Inspector, Customs and Border Protection, Department of Homeland Security

Visas and Watchlisting Today

Maura Harty, Assistant Secretary for Consular Affairs, Department of State Russell E.Travers, Deputy Director, Information Sharing and Knowledge

Management Department,Terrorist Threat Integration Center, Central Intelligence Agency

Donna A. Bucella, Director,Terrorist Screening Center, Federal Bureau of Investigation

The Response to September 11 on the Borders

James Ziglar, former Commissioner, Immigration and Naturalization Service, Department of Justice

Robert C. Bonner, Commissioner, Customs and Border Protection, Department of Homeland Security

Peter F.Verga, Principal Deputy Assistant Secretary for Homeland Defense, Department of Defense

Aviation Security on 9/11: The Regulators

Jane F. Garvey, former Administrator, Federal Aviation Administration Cathal L.“Irish” Flynn, former Associate Administrator of Civil Aviation

Security, Federal Aviation Administration

Claudio Manno, Assistant Administrator for Intelligence,Transportation Security Administration

Aviation Security on 9/11: The Airlines

Edmond L. Soliday, former Vice President of Safety, Quality Assurance, and Security, United Airlines

Andrew P. Studdert, former Chief Operating Officer, United Airlines Gerard J. Arpey, Chief Executive Officer, American Airlines

Timothy J. Ahern,Vice President–DFW Hub, and former Vice President of Safety, Security, and Environmental, American Airlines

Acts of Courage in the Sky

Nydia Gonzalez, Manager, Southeast Reservations Center, American Airlines

Risk Management after September 11

James M. Loy, Deputy Secretary, Department of Homeland Security

EIGHTH PUBLIC HEARING

Counterterrorism Policy

Hart Senate Office Building,Washington, D.C. March 23–24, 2004

Diplomacy

The Honorable Madeleine K. Albright, former Secretary of State The Honorable Colin L. Powell, Secretary of State

The Military

The Honorable William S. Cohen, former Secretary of Defense The Honorable Donald H. Rumsfeld, Secretary of Defense

Intelligence Policy

The Honorable George J.Tenet, Director of Central Intelligence

National Policy Coordination

The Honorable Samuel R. Berger, former Assistant to the President for National Security Affairs

Richard A. Clarke, former National Coordinator for Counterterrorism, National Security Council

Richard L. Armitage, Deputy Secretary of State

NINTH PUBLIC HEARING

Hart Senate Office Building,Washington, D.C. April 8, 2004

The Honorable Condoleezza Rice, Assistant to the President for National Security Affairs

TENTH PUBLIC HEARING

Law Enforcement and Intelligence

Hart Senate Office Building,Washington, D.C. April 13–14, 2004

Law Enforcement, Counterterrorism, and Intelligence Collection in the United States Prior to 9/11

The Honorable Louis J. Freeh, former Director, Federal Bureau of Investigation The Honorable Janet Reno, former Attorney General of the United States

Threats and Responses in 2001

Thomas J. Pickard, former Acting Director, Federal Bureau of Investigation Ambassador J. Cofer Black, former Director, Counterterrorism Center,

Central Intelligence Agency

The Honorable John Ashcroft, Attorney General of the United States

The Performance of the Intelligence Community

The Honorable George J.Tenet, Director of Central Intelligence

Preventing Future Attacks Inside the United States

John O. Brennan, Director,Terrorist Threat Integration Center, Central Intelligence Agency

Lieutenant General Patrick M. Hughes, Assistant Secretary for Information Analysis, Department of Homeland Security

John S. Pistole, Executive Assistant Director for Counterterrorism and Counterintelligence, Federal Bureau of Investigation

James L. Pavitt, Deputy Director of Operations, Central Intelligence Agency

FBI Leadership and Initiatives Post-9/11

The Honorable Robert S. Mueller III, Director, Federal Bureau of Investigation Maureen Baginski, Executive Assistant Director for Intelligence,

Federal Bureau of Investigation

ELEVENTH PUBLIC HEARING

Emergency Response

New School University, New York, N.Y. May 18–19, 2004

Alan Reiss, former Director,World Trade Center, Port Authority of New York and New Jersey

Joseph Morris, former Chief, Port Authority of New York and New Jersey Police Department

Bernard B. Kerik, former Commissioner, New York Police Department Thomas Von Essen, former Commissioner, Fire Department of New York Richard Sheirer, former Director, New York City Office of

Emergency Management

Raymond W. Kelly, Commissioner, New York Police Department Nicholas Scoppetta, Commissioner, Fire Department of New York

Joseph F. Bruno, Director, New York City Office of Emergency Management The Honorable Rudolph W. Giuliani, former Mayor, City of New York Dennis Smith, Author, Report from Ground Zero

Jerome M. Hauer, former Commissioner, New York City Office of Emergency Management

Edward P. Plaugher, Chief, Arlington County Fire Department The Honorable Michael R. Bloomberg, Mayor, City of New York The Honorable Thomas J. Ridge, Secretary of Homeland Security

TWELFTH PUBLIC HEARING

The 9/11 Plot and National Crisis Management National Transportation Safety Board Conference Center,

Washington, D.C. June 16–17, 2004

Al Qaeda

Mary Deborah Doran, Special Agent, Federal Bureau of Investigation Patrick J. Fitzgerald, U.S. Attorney for the Northern District of Illinois CIA Officials

Outline of the 9/11 Plot

Jacqueline Maguire, Special Agent, Federal Bureau of Investigation James N. Fitzgerald, Special Agent, Federal Bureau of Investigation

Adam B. Drucker, Supervisory Special Agent, Federal Bureau of Investigation CIA Officials

Military Response on 9/11

General Richard B. Myers, United States Air Force, Chairman, Joint Chiefs of Staff

Admiral (select) Charles Joseph Leidig, United States Navy,

Deputy Director for Operations, National Military Command Center General Ralph E. Eberhart, United States Air Force, Commander,

North American Aerospace Defense Command (NORAD) and United States Northern Command

Major General Larry Arnold, United States Air Force (retired),

former Commander, Continental United States NORAD Region (CONR)

FAA Response on 9/11

Monte R. Belger, former Acting Deputy Administrator, Federal Aviation Administration

Jeff Griffith, former Deputy Director, Air Traffic Control, Federal Aviation Administration

John S.White, former Facility Manager, Air Traffic Control Systems Command Center, Federal Aviation Administration

Benedict Sliney, Operations Manager, New York Terminal Radar Approach Control, Federal Aviation Administration

NOTES

For simplicity, we have adopted the following citation conventions in these endnotes.

Dozens of government agencies and other entities provided the Commis- sion with more than 2.5 million pages of documents and other materials, including more than 1,000 hours of audiotapes. In general, we cite docu- ments and other materials by providing the agency or entity of origin, the type of document (e.g., memo, email, report, or record), the author and recip- ient, the title (in quotes) or a description of the subject, and the date.We use the following abbreviations for the agencies and entities that produced the bulk of these documents: AAL—American Airlines; CIA—Central Intelli- gence Agency; DCI—Director of Central Intelligence; DHS—Department of Homeland Security; DOD—Department of Defense; DOJ—Department of Justice; DOS—Department of State; DOT—Department of Transporta- tion; EPA—Environmental Protection Agency; FAA—Federal Aviation Administration; FBI—Federal Bureau of Investigation; FDNY—Fire Department of NewYork; GAO—General Accounting Office; INS—Immi- gration and Naturalization Service; NEADS—Northeast Air Defense Sec- tor; NSA—National Security Agency; NSC—National Security Council; NTSB—National Transportation Safety Board; NYPD—New York Police Department; OEM—Office of Emergency Management, City of NewYork; PANYNJ or Port Authority—Port Authority of New York and New Jersey; PAPD—Port Authority Police Department; SEC—Securities and Exchange Commission; Treasury—Department of Treasury; TSA—Transportation Security Administration; UAL—United Air Lines; USSS—United States Secret Service.

Interviews, meetings, briefings, and site visits conducted by Commission- ers or by members of the Commission staff are cited, for example, as “George Tenet interview (Jan. 22, 2004).” Testimony by witnesses at one of the Com-

449

mission’s 12 public hearings is cited as “Condoleezza Rice testimony, Apr. 8, 2004.”Written statements for the record provided by witnesses at one of our public hearings are cited as “Thomas Ridge prepared statement, May 19, 2004.”

At the request of intelligence community agencies (including the FBI), we use the first name and last initial, only the first name, or in a few instances an alias or title when referring to working-level employees in those agencies. At the request of several intelligence agencies, we cite most reports from the CIA and other intelligence agencies generically as “Intelligence report,” fol- lowed by a description of the subject and date. In a few instances in which we were given access to highly sensitive documents or information, we cite generically to documents or information provided to the Commission.

Our investigation built on the work of many others, including the Joint Inquiry of the Senate Select Committee on Intelligence and the House Per- manent Select Committee on Intelligence into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, which we refer to as the “Joint Inquiry.”We cite as “Joint Inquiry report, Dec. 2002” the Report of the U.S. Senate Select Committee on Intelligence and U.S. House Permanent Select Committee on Intelligence, S. Rep. No. 107-351,

H.R. Rep. No. 107-792, 107th Cong., 2d sess. (2002), indicating “classified version” where appropriate.Testimony presented during hearings conducted by the Joint Inquiry is cited as “Joint Inquiry testimony of George Tenet, Oct. 17, 2002,” indicating “closed hearing” where appropriate.We cite interviews conducted by the Joint Inquiry staff as “Joint Inquiry interview of Cofer Black,” with the date of the interview.

Another major source for our investigation were the thousands of inter- views conducted by the Federal Bureau of Investigation during its investiga- tion of the 9/11 attacks, which it refers to as “Penttbom.” FBI agents write up their interviews on forms called 302s, which we cite as “FBI report of investigation, interview of John Smith, Oct. 4, 2001,” using the date of the interview.We cite interviews conducted by other agencies by agency name and date of the interview; for example, an interview conducted by the Department of Justice Office of Inspector General is cited as “DOJ Inspec- tor General interview of Mary Jones, July 9, 2002.”