Philip Zelikow

Moderators: Elvis, DrVolin, Jeff

Philip Zelikow

Postby chiggerbit » Wed Apr 22, 2009 8:43 pm

http://www.hks.harvard.edu/visions/publ ... %20Authors

Catastrophic Terrorism:

Elements of a National Policy

By

Ashton B. Carter, John M. Deutch

and Philip D. Zelikow

A Report of

Visions of Governance for the Twenty-First Century

A Project of the John F. Kennedy School of Government

Harvard University



�1998 by the Board of Trustees of Leland Stanford Junior University and the Board of Trustees of Harvard University

This report was made possible in part by the Carnegie Corporation of New York, the John D. and Catherine T. MacArthur Foundation, and the Herbert S. Winokur Public Policy Fund at Harvard University. The statements made and views expressed are solely the responsibility of the authors.

Contents

Foreword: Preventive Defense

Acknowledgments

Catastrophic Terrorism: Elements of a National Policy

Imagining the Transforming Event

Organizing for Success

Intelligence and Warning

Prevention and Deterrence

Crisis and Consequence Management

Acquisition

Conclusion

Notes

About the Authors

About Visions of Governance for the Twenty-First Century

About the Stanford-Harvard Preventive Defense Project



Foreword: Preventive Defense

Through more than four decades of Cold War, American national security strategy was difficult to implement but easy to understand. America was set on a clear course to contain Soviet expansionism anywhere in the world, all the while building a formidable arsenal of nuclear weapons to deter the Soviet Union from using military force against it or its allies. Now, with the end of the Cold War, the underlying rationale for that strategy—the threat from the Soviet Union—has disappeared. What strategy should replace it? Much depends on finding the correct answer to this question.

The world survived three global wars this century. The first two resulted in tens of millions of deaths, but the third—the Cold War—would have been even more horrible than the others had deterrence failed. These three wars trace a path that leads to the strategy needed for the post-Cold War era.

At the end of the First World War, the victorious European allies sought revenge and reparations; what they got was a massive depression and another world war. The United States sought "normalcy" and isolation; what it got was total war and leadership in winning it. Because it failed to prevent and then to deter Germany’s aggression, America was forced to mobilize a second time to defeat it.

At the end of the Second World War, America initially chose a strategy based on prevention. Vowing not to repeat the mistakes made after World War I, the Truman administration created the Marshall Plan, which sought to assist the devastated nations of Europe, friends and foes alike, to rebuild. The Marshall Plan and other examples of the preventive defense strategy, aimed at preventing the conditions that would lead to a future world war, were an outstanding success in Western Europe and in Japan.

But the Soviet Union turned down the Marshall Plan and, instead, persisted in a program of expansion, trying to take advantage of the weakened condition of most of the countries of Europe. The resulting security problem was clearly articulated by George Kennan, who forecast that the wartime cooperation with the Soviet Union would be replaced with a struggle for the heart of Europe and that the United States should prepare for a protracted period of confrontation. Kennan’s analysis was accepted by the Truman administration, which then formulated a strategy that would get us through the Cold War: deterring another global war while containing the Soviet Union’s demonstrated expansionist ambitions. Deterrence supplanted prevention: there was no other choice.

Even deterrence was a departure from earlier American military strategy. The United States had twice previously risen to defeat aggression, but it had not maintained the peacetime military establishment or the engagement in the world to deter World Wars I or II. Marshall and other defense leaders around Truman created the peacetime posture and new security institutions required. In time, as George Kennan had forecast, the Soviet Union disintegrated because of the limitations of its political and economic systems. Deterrence worked.

The result is a world today seemingly without a major threat to the United States, and the U.S. is now enjoying a period of peace and influence as never before. But while this situation is to be savored by the public, foreign policy and defense leaders should not be complacent. This period of an absence of threat challenges these leaders to find the vision and foresight to act strategically, even when events and imminent threats do not compel them to do so.

To understand the dangers and opportunities that will define our nation’s strategy in the new era, we must see the post-Cold War world the way George Marshall looked upon Europe after World War II, and return to prevention. In essence, we now have another chance to realize Marshall’s vision: a world not of threats to be deterred, but a world united in peace, freedom, and prosperity. To realize this vision, we should return to Marshall’s strategy of preventive defense.

Preventive Defense is a concept of defense strategy for the United States in the post-Cold War Era. It stresses the need to anticipate security dangers which, if mismanaged, have the potential to re-create Cold War-scale threats to U.S. interests and survival. The foci of Preventive Defense are: proliferation of weapons of mass destruction, catastrophic terrorism, "loose nukes" and other military technology from the former Soviet Union, Russia’s post-Cold War security identity, and the peaceful rise of China.

Preventive Defense is the most important mission of national security leaders and of the defense establishment. They must dedicate themselves to Preventive Defense while they deter lesser but existing threats—in Iraq and North Korea—and conduct peacekeeping and humanitarian missions—in Bosnia, Haiti, Rwanda, and so on—where aggression occurs but where American vital interests are not directly threatened.

This report is the sixth in a series of Preventive Defense Project reports on key applications of Preventive Defense. We are grateful to our colleagues in the Catastrophic Terrorism Study Group and the Visions of Governance for the Twenty-First Century for their collaboration



Acknowledgments

This report is a product of the Catastrophic Terrorism Study Group, a nine-month long collaboration of faculty from Harvard University, the Massachusetts Institute of Technology, Stanford University, and the University of Virginia. The Group involves experts on national security, terrorism, intelligence, law enforcement, constitutional law, technologies of Catastrophic Terrorism and defenses against them, and government organization and management. The Group is co-chaired by Ashton B. Carter and John M. Deutch, and the project director is Philip D. Zelikow. Organized by the Stanford-Harvard Preventive Defense Project, the work of the Study Group is part of the Kennedy School of Government’s "Visions of Governance for the Twenty-First Century" project, directed by Dean Joseph S. Nye, Jr. and Elaine Kamarck.

While the danger of Catastrophic Terrorism is new and grave, there is much that the United States can do to prevent it and to mitigate its consequences if it occurs. The objective of the Catastrophic Terrorism Study Group is to suggest program and policy changes that can be taken by the United States government in the near term, including the reallocation of agency responsibilities, to prepare the nation better for the emerging threat of Catastrophic Terrorism.

An article based on this report will be published in the journal Foreign Affairs in the November/December 1998 issue.

The authors would like to thank the members of the Catastrophic Terrorism Study Group:

Graham T. Allison, Jr.

Zoe Baird

Vic DeMarines

Robert Gates

Jamie Gorelick

Robert Hermann

Philip Heyman

Fred Ikle

Elaine Kamarck

Ernest May

Matthew Meselson

Joseph S. Nye, Jr.

William J. Perry

Larry Potts

Fred Schauer

J. Terry Scott

Jack Sheehan

Malcom Sparrow

Herbert Winokur

Robert Zoellick

Though practically all of these group members are sympathetic to the conclusions in this report, and some enthusiastically endorse them, none is responsible either for particular opinions expressed here or for the way we have written this report and expressed those judgments.

We would also like to thank the staff who was responsible for organizing the Study Group in addition to assisting in the preparation of this report: Gretchen Bartlett, Lainie Dillon, Hilary Driscoll, Sarah Peterson, and Kristin Schneeman.

Finally, the Study Group is grateful for the support of the Carnegie Corporation of New York, the John D. and Catherine T. MacArthur Foundation, and the Herbert S. Winokur Public Policy Fund at Harvard University.



CATASTROPHIC TERRORISM: ELEMENTS OF A NATIONAL POLICY

Imagining the Transforming Event

We find terrorism when individuals or groups, rather than governments, seek to attain their objectives by means of the terror induced by violent attacks upon civilians. When governments openly attack others, we call it war, to be judged or dealt with according to the laws of war. When governments act in concert with private individuals or groups, the United States government may call it war, or state-sponsored terrorism, and retaliate against both the individuals and the governments. Whatever the label, terrorism is not a new phenomenon in national or international life, although terrorists may be animated by a greater variety of motives than ever before, from international cults like Aum Shinrikyo to the individual nihilism of the Unabomber.

What is certainly new is that terrorists may today gain access to weapons of mass destruction (WMD). These can come in a variety of forms: nuclear explosive devices, germ dispensers, poison gas weapons, or even the novel destructive power of computers turned against the societies that rely on them. What is also new is an unprecedented level of national and global interdependence on an invisible infrastructure of energy and information distribution.

Americans were shocked by the tragic results of the August 1998 terrorist attacks against their embassies in Kenya and Tanzania. By comparison with the threat of catastrophic terrorism, we believe that the threat of ordinary terrorism of the kind we have known over the last generation is being taken seriously. The United States government’s commitment to address that danger is fundamentally sound. We are not as confident that the United States government is suitably prepared to address the new threat of catastrophic terrorism that utilizes weapons of mass destruction or intensive cyber-assault.

Long part of Hollywood’s and Tom Clancy’s repertory of nightmarish scenarios, catastrophic terrorism is a real possibility. In theory, the enemies of the United States have motive, means, and opportunity. The U.S. government has publicly announced that terrorist groups are attempting to manufacture chemical weapons and destroyed one such facility operating in the Sudan. As India and Pakistan build up their nuclear arsenals and Russia, storehouse for tens of thousands of weapons and the material to make tens of thousands more, descends toward a future none can foresee, it is not hard to imagine the possibilities. The combination of available technology and lethality has made biological weapons at least as deadly a danger as the better known chemical and nuclear threats. The bombings in East Africa killed hundreds. A successful attack with weapons of mass destruction could certainly kill thousands, or tens of thousands. If the device that exploded in 1993 under the World Trade Center had been nuclear, or the distribution of a deadly pathogen, the chaos and devastation would have gone far beyond our meager ability to describe it.1

Experts combining experience in every quadrant of the national security and law enforcement community all consider this catastrophic threat perfectly plausible today. Technology is more accessible, society is more vulnerable, and much more elaborate international networks have developed among organized criminals, drug traffickers, arms dealers, and money launderers: the necessary infrastructure for catastrophic terrorism. Practically unchallengeable American military superiority on the conventional battlefield pushes this country’s enemies toward the unconventional alternatives.2

Readers should imagine the possibilities for themselves, because the most serious constraint on current policy is lack of imagination. An act of catastrophic terrorism that killed thousands or tens of thousands of people and/or disrupted the necessities of life for hundreds of thousands, or even millions, would be a watershed event in America’s history. It could involve loss of life and property unprecedented for peacetime and undermine Americans’ fundamental sense of security within their own borders in a manner akin to the 1949 Soviet atomic bomb test, or perhaps even worse. Constitutional liberties would be challenged as the United States sought to protect itself from further attacks by pressing against allowable limits in surveillance of citizens, detention of suspects, and the use of deadly force. More violence would follow, either as other terrorists seek to imitate this great "success" or as the United States strikes out at those considered responsible. Like Pearl Harbor, such an event would divide our past and future into a "before" and "after." The effort and resources we devote to averting or containing this threat now, in the "before" period, will seem woeful, even pathetic, when compared to what will happen "after." Our leaders will be judged negligent for not addressing catastrophic terrorism more urgently.

Using imagination, we hope now to find some of the political will that we know would be there later, "after," because this nation prefers prevention to funereal reconstruction. When this threat becomes clear the President must be in a position to activate extraordinary capabilities. The danger of the use of a weapon of mass destruction against the United States or one of its allies is greater at this moment than it was during the Cold War, or at least since 1962. The threat of catastrophic terrorism is therefore a priority national security problem, as well as a major law enforcement concern. The threat thus deserves the kind of attention we now devote to threats of military nuclear attack or of regional aggression, as in the Defense Department’s major regional contingencies that drive our force planning and the resources we devote to defense.

The first enemy of imagination is resignation. Some who contemplate this threat find the prospects so dreadful and various that they despair of doing anything useful and switch off their troubling imagination. They are fatalistic, like someone contemplating the possibility of a solar supernova, and turn their eyes away from the threat. Some thinkers reacted the same way at the dawn of the nuclear age, expecting doom to strike at any hour and disavowing any further interest in the details of deterrence as a hopeless venture. But as in the case of nuclear deterrence, the good news is that more can be done.

We formed a Catastrophic Terrorism Study Group to move beyond a realization of the threat to consider just what can be done about it. This group began meeting in November 1997. We examined other studies that consider this problem. We received information and advice from some current government officials as well as from those who had considered the problem from the perspectives of governments in Great Britain, Israel, Germany, and Russia. We now advance practical proposals for consideration and debate. We avoid a grand solution, preferring to shape "bricks" that strengthen existing structures, consider the very different technical challenges presented by nuclear, biological, chemical, and cyber threats, and provide a foundation for future adaptation and future building.



Organizing for Success

The threat of catastrophic terrorism typifies the new sort of security problem the United States must confront in the post Cold War world. It is transnational, defying ready classification as foreign or domestic, either in origin, participants, or materials. As the World Trade Center incident demonstrated, one group can combine U.S. citizens with resident aliens and foreign nationals, operating in and out of American territory over long periods of time.

The greatest danger may arise if the threat falls into one of the crevasses in our government’s field of overlapping jurisdictions, such as the divide between terrorism that is "foreign" or "domestic;" or terrorism that has "state" or "non-state" sponsors; or terrorism that is classified as a problem for "law enforcement" or one of "national security." The law enforcement/national security divide is especially significant, carved deeply into the topography of American government.

The national security paradigm fosters aggressive, proactive intelligence gathering, presuming the threat before it arises, planning preventive action against suspected targets, and taking anticipatory action. The law enforcement paradigm fosters reactions to information voluntarily provided, post-facto arrests, trials governed by rules of evidence, and general protection for the rights of citizens.

We start with a concept for an overall end-to-end strategy. This has at least four elements: (1) intelligence and warning; (2) prevention and deterrence; (3) crisis and consequence management; and (4) a process for coordinated acquisition of needed materials, equipment, and technology. Throughout, there must be clear guidance about what our institutions should be able to do and definition of the roles and missions of involved agencies at all levels of government.

In an address at the U.S. Naval Academy, President Clinton announced on May 22, 1998, that we must approach the new terrorist challenges of the 21st century "with the same rigor and determination we applied to the toughest security challenges of this century." To that end he signed Presidential Decision Directive (PDD) 62 and appointed a National Coordinator for Security, Infrastructure Protection, and Counterterrorism to "bring the full force of all our resources to bear swiftly and effectively." The National Coordinator and PDD-62, like the predecessor PDD-39, look to "lead agencies" on one or another issue to "identify a program plan with goals and specific milestones." The National Coordinator will produce an annual "Security Preparedness Report," offer budget advice, and lead in the development of guidelines for crisis management.3

We welcome the presidential determination to address the danger of catastrophic terrorism and see no harm in the designation of a responsible White House aide. But we suggest a different emphasis when it comes to solving the difficult problems of shared powers and overlapping authorities.

We place no faith in czars. An unidentified, incautious administration official explained to reporters that "when money was going to the war on drugs, we created a drug czar. Now money is going to counterterrorism, and so we’ll have a czar for that, except this one will have real power."4 A national coordinator may be necessary, but is certainly not sufficient. For better or worse, however, "real power" resides in the executive departments and companies that actually have people, equipment, money, and the capacity to do things. This report thus focuses on building such capabilities, rather than dwelling on coordination at the apex.

"In form," Richard Neustadt explained long ago, "all Presidents are leaders nowadays. In fact this guarantees no more than that they will be clerks. Everybody now expects the man inside the White House to do something about everything. ... But such acceptance ... merely signifies that other men have found it practically impossible to do their jobs without assurance of initiatives from him. ... They find his actions useful in their business. ... A President, these days, is an invaluable clerk. His services are in demand all over Washington. His influence, however, is a very different matter."5

Well before the idea of a terrorism czar had been conceived, James Q. Wilson had noticed that "whenever a political crisis draws attention to the fact that authority in our government is widely shared, the cry is heard for a ‘czar’ to ‘knock heads together’ and ‘lead’ the assault on AIDS, drug abuse, pollution, or defense procurement abuses. Our form of government, to say nothing of our political culture, does not lend itself to czars...."6

Also, most of the expensive functional capabilities that must be brought together to cope with the danger of catastrophic terrorism are capabilities that are needed for other purposes, too, from reconnaissance satellites to National Guardsmen. Unifying these capabilities exclusively for one challenge will not work in practice. The people making decisions about using these capabilities against terrorists should be the same people who must consider the other missions and who can weigh and reconcile competing demands.

Experience from World War II (such as that of the British Chiefs of Staff Committee or the U.S. Office of War Mobilization) through the Cold War to the present, including the current system of security policymaking the British have devised (after long trial and error) for Northern Ireland, instead counsels us toward a different approach.7 One or another executive agency may be in the lead, but the key is to give responsibility (and accountability) to the people who are in charge of the relevant people and machines; create unglamorous but effective systems for shared decision-making that combine civil, military, and intelligence judgments up and down the chain of command; fashion entities that integrate planning and operational activity at the working level; and focus on the tasks of building up the institutional capacities to do new things. There must be exercises of the entire system to highlight defensive needs, before an incident happens. We turn now to the first crucial task: intelligence and warning.



Intelligence and Warning

Since 1945 the United States has given intense attention to any potentially hostile entity that might deliver weapons of mass destruction against its territory or its allies. The intelligence objectives were straightforward: orientation toward governments and monitoring of weapons development, testing, and deployment. The intelligence task for catastrophic terrorism is complicated by non-state actors, concealed weapons development, and unconventional deployments. In cyber attacks, the delivery of weapons can be entirely electronic.

So the intelligence job is much harder. It is not impossible. The would-be terrorists have problems, too. If states are involved, the organizations tend either to be large and leaky, or small and feckless. If no state is involved, the group may be small, feckless, and pathological, too. These realities form the opportunities for intelligence successes. Even the most formidable Irish terrorist groups took years of experience to acquire their level of professionalism and, for all their skills and training, suffered frequent setbacks in their underground war against British intelligence. Perhaps the most serious recent attempt to carry out an act of catastrophic terrorism was an expertly planned effort to destroy, with a series of simultaneous bomb explosions, the entire electrical power supply for metropolitan London. The attempt was thwarted and British security forces arrested the terrorists.

The U.S. government should seek to have the legal authorities and the capability to monitor—physically and electronically—any group and their potential state sponsors that might justifiably be considered to have a motive and capability to use weapons of mass destruction. The U.S. government should be able to do all that can reasonably be done to detect any use or deployment of such weapons anywhere in the world, by utilizing remote sensing technology and by strengthening and evaluating worldwide sources of information. These would include clandestine collection, open sources such as foreign newspapers and journals or the Internet, and would include better-organized exchanges with key allies and other like-minded states.

Nearly a year before its attack on the Tokyo subway system, the Aum Shinrikyo group had already used the nerve gas, Sarin, in attacks on civilians. Although known to the Japanese news media, the U.S. government did not know. Not only did Washington not know what Japanese law enforcement agencies knew, it is likely that centralized Japanese law enforcement agencies did not know what other local organizations in Japan knew about this prior and well documented use of chemical weapons.

Today the U.S. intelligence community lacks a place to perform "all-source" planning for collecting information, where the possible yields from efforts in overhead reconnaissance, electronic surveillance, clandestine agents, law enforcement databases and informants, and reports from foreign governments, can be sifted and organized for maximum complementary effect. The national security agencies can be proactive. Domestic law enforcement officials understandably are not proactive about intelligence collection but focus their efforts from informants or other collection to investigate suspected criminal actions with the objective of criminal prosecution. Civil liberties properly discourage them from going out and looking for criminals before they have evidence of crime.

On the other hand, domestic law enforcement has many techniques for gathering data, including lawful wiretaps and grand jury investigations. Much of the yield from these efforts is, in turn, closed off to the national security community by law or regulation, to safeguard constitutional rights.8

We believe the U.S. needs a new institution to gather intelligence on terrorism, with particular attention to the threat of catastrophic terrorism. We call this new institution a National Terrorism Intelligence Center. This Center would be responsible for collection management, analysis, dissemination of information, and warning of suspected catastrophic terrorist acts. The Center would need the statutory authority to:

� monitor and provide warning of terrorist threats to relevant agencies of the U.S. government, supporting defense or intelligence operations, as well as law enforcement;

� set integrated collection requirements for gathering information for all the intelligence agencies or bureaus of the U.S. government;

� receive and store all lawfully collected, relevant information from any government agency, including law enforcement wiretaps and grand jury information;

� analyze all forms of relevant information to produce integrated reports that could be disseminated to any agency that needed them, while restricting dissemination of underlying domestic wiretap and grand jury information;

� review planned collection and intelligence programs of all agencies directed toward terrorist targets to determine the adequacy and balance among these efforts in preparation of the President’s proposed budget;

� facilitate international cooperation in counterterrorism intelligence, including the bilateral efforts of individual agencies;

� not manage operational activities or take on the task of general intelligence about the proliferation of weapons of mass destruction (now coordinated in the Director of Central Intelligence Nonproliferation Center);

� be exempt from motions for pretrial discovery in the trials of indicted criminals.9

Since this Center would have constant access to considerable domestic law enforcement information, we believe it should not be located at the Central Intelligence Agency. The highly successful Director of Central Intelligence Counterterrorism Center established in the mid-1980s has a narrower mandate than the National Center that we propose and it would be incorporated into the new National Center. Instead we recommend the National Center be located in the FBI. However, the Center, in our conception, would be responsible to an operating committee, chaired by the Director of Central Intelligence and including the Director of the FBI, the Deputy Secretary of Defense, the Deputy Attorney General, the Deputy Secretary of State, and the Deputy National Security Adviser. The budget would be included within the National Foreign Intelligence Program, which already provides support for the FBI’s National Security Division. Unresolved disputes would go to the National Security Council. The director of the Center would come alternately from FBI and CIA. The major intelligence organizations would all be required to provide a specified number of professionals to the Center, and this number would be exempt from agency personnel ceilings.

The concept of this Center attempts to combine the proactive intelligence gathering approach of the national security agencies, which are not legally constrained in deciding when they may investigate a possible crime, with the investigative resources of law enforcement agencies. We must have an entity that can utilize our formidable but disparate national security and law enforcement resources to analyze transnational problems. This combination should be permitted, consistent with public trust, only in a National Center that has no powers of arrest and prosecution and that establishes a certain distance from the traditional defense and intelligence agencies. The Center would also be subject to oversight from existing institutions, like the federal judiciary, the President’s Foreign Intelligence Advisory Board and the select intelligence committees of the Congress.

There are precedents for creating novel interagency operating institutions that work—the National Reconnaissance Office and the reformed Counterintelligence Center offer relevant illustrations. We are not anxious to create new government institutions. But the problems in information sharing about terrorism are not just products of petty bureaucratic jealousy. They stem from a real question: how do we reconcile the practices of foreign intelligence work with the restrictions that properly limit domestic law enforcement? We believe our proposal offers a possible answer.



Prevention and Deterrence

There are several measures that we believe will contribute to prevention and deterrence of catastrophic terrorism. We suggest three measures here—an international legal initiative to make any development or possession of weapons of mass destruction a universal crime, a National Information Assurance Institute, and stronger federal support to strategic risk analysis of the catastrophic terrorism problem.

Outlawing Terror Weapons

Prevention is intertwined with the concept of deterrence. The U.S. has finally developed a sound, firm, and increasingly credible declaratory policy that criminalizes terrorist activity and supports sanctions, or even the use of force, to thwart an attack or respond. We also believe that the United States must work with other countries to extend the prohibitions against development or possession of weapons of mass destruction. Matthew Meselson and others have recently proposed a convention that would make any individual intentionally involved in biological weapons work liable as an international criminal, prosecutable anywhere, as is the case for pirates or airplane hijackers.10 Defensive work against biological warfare agents would of course be permitted.

There are already international treaties in which governments promise to restrain their weapons developments—the nuclear Non-Proliferation Treaty, the Biological Weapons Convention, and the Chemical Weapons Convention are the most notable examples. Governments breaking such a treaty violate international law. We are pressing a different idea. Prohibited weapon development would become a universal crime, opening the way to prosecution and extradition of individual offenders wherever they may be found, around the world. This idea utilizes the power of national criminal law against people, not the power of international law against governments. It builds on analogous developments in the law of piracy, treaties declaring the criminality of airplane hijacking, crimes of maritime navigation, theft of nuclear materials, and crimes against diplomats.

We are concerned about the actions of governments, too. Over time, we hope the burden of proof in demonstrating compliance with international conventions must also shift away from those alleging noncompliance to those states or groups whose compliance is in doubt. International norms should adapt so that such states are obliged to reassure those who are worried and to take reasonable measures to prove they are not secretly developing weapons of mass destruction. Failure to supply such proof, or prosecute the criminals living in their borders, should entitle worried nations to take all necessary actions for their self-defense.

National Information Assurance Institute

Cyber-terrorism is a special problem, where private sector cooperation is vital, but elusive. The President’s Commission on Critical Infrastructure Protection (often called the Marsh Commission) stressed that industry was reluctant to deal with these problems on its own because the solutions cost money, the risk is unclear, and they fear heavy-handed government action. On the other hand, although the FBI has created a National Infrastructure Protection Center, which can help identify sites that need help, we do not think FBI, with all its operational duties, is the place to build a bridge with the private sector or harness the significant resources and expertise found on the cyber problem within the Department of Defense. So we propose a National Information Assurance Institute, based within the private, nonprofit sector, that could serve as a kind of industry laboratory with a central focus on cyber protection. Placed in the private sector, the institute would not itself own the infrastructure or be part of the government, but it could deal with both sides. It implements the Marsh Commission’s recommendation, seeking a way for industry to organize itself better to deal with this problem as part of a public-private partnership.

For industry, this institute could become:

� a clearinghouse for sharing information assurance techniques and technology;

� a developer of common techniques and technology for information assurance;

� a trusted repository of proprietary information that poses no competitive threat;

� a single point of contact with the law enforcement, national security, and other agencies of the federal government;

� a resource for training and familiarization of industry personnel with technical best practice and government concerns, policies, and regulations.

For government, this institute could become:

� a channel for sharing sensitive intelligence about threats to information infrastructure;

� a center of technical excellence for developing and improving technology and techniques for protecting critical infrastructure;

� a unified government-industry forum for coordinating federal policy, regulation, and other actions affecting infrastructure providers.

We envision that the institute would be established as a not-for-profit research organization by a group of concerned private companies, universities, and existing not-for-profit laboratories. The institute would be governed by a board of directors drawn from the private sector and academia.

The institute staff could be supplemented by detailees drawn from both industry and government. Industry affiliates would not only include the manufacturers and maintainers of information systems, but also service vendors, their trade associations, and the major companies and trade associations from the power, telecommunications, banking, transportation, oil and gas, water and sewer, and emergency service sectors (including multinational companies, with appropriate protection for circulation of U.S.-only classified information).

This new institute could perform information assurance assessments for industry on a confidential basis. Industry representatives would be educated and trained on technical best practice, threats, and government policies. The institute would receive contracts from government. The institute could sponsor and conduct research on security assessment tools, intrusion detection, recovery, and restoration. As it identifies and develops industry standard best practices, and evaluates the vulnerability of commercial products, we prefer to rely where possible on informal private sector enforcement of these ideas in the marketplace (through insurance rating, for example), rather than formal government regulation. The institute could also perform incident evaluations, create a monitoring center for information assurance, provide on-call assistance, and help industry develop contingency plans for failure.

Risk Analysis

Other than more general policies to keep America’s enemies to a minimum and to prevent anyone from acquiring weapons of mass destruction who does not already possess them, efforts to prevent catastrophic terrorism turn on the interdiction of people and materials and on deterring attacks. A serious U.S. government effort would include development of the capacity to use remote sensing technology to detect, at least from close range, any distinctive and measurable physical properties of nuclear, biological, and chemical weapons or their less commonplace precursor materials and the distribution of this technology in a form that can be used in the field. Aided by international agreements among supplier nations, materials that can be used in weapons of mass destruction would be marked or tagged wherever possible, to enhance detection or post facto identification.

Moreover, the United States should seek to ascertain the identity of every person and the contents of all freight entering its territory or its installations overseas. Though we know this goal obviously cannot be attained in the immediate future, it is a legitimate objective for the long-term. Even imperfect measures can still create the perception, among would-be terrorists, that they or their precious weapon material might run a significant risk of being intercepted. But systematic interdiction efforts require shrewder analysis of where more resources can make a difference.

The allocation of inspection and protective instruments by the government should be guided by risk analysis. This form of analysis is well known to engineers who may analyze a dangerous system to find the key sequences of errors that can lead not just to failure, but to catastrophic failure. Those are the sequences that then command disproportionate engineering attention (to add redundant switches, for example). Not all worries merit equal concern. Engineers refer to a "balanced" design as one where all the components have been designed to be as good as the whole system needs, neither better nor worse.

The role of risk analysis, or strategic analysis for risk control, is to analyze threats and define risks in a natural way (avoiding the temptation to define them in terms of existing agency boundaries or capabilities), to commission further data gathering and analysis to assess relative significance, and then to subdivide acute risks into actionable components where resources can make a difference.11 A systemic approach is needed that encompasses broad area surveillance; specific threat identification; targeted surveillance and warning; prevention, protection, deterrence, interdiction and covert action; consequence management; forensic analysis of a site to determine responsibility, punitive action, and learning lessons.

Analysis, for instance, shows that international border crossings are an important bottleneck in the worldwide movement of criminals. The United States, rather than just looking after the verifiability of its own passports, should organize resources focused on such bottlenecks throughout the world. We can imagine, for instance, a system created, with American funding, to insure that every country’s passports are computer readable, that every passport control officer has such a reader, and that every reader is linked to a database that can validate the status of the document, or indicate the need for further inquiries. The database need not invade the internal files of any government. As is already the case in the private sector, third entities can be created to perform the clearinghouse role, using data supplied by participating governments. Naturally, terrorists could still use documents of non-participating countries, but those would attract just the suspicion such travelers seek to avoid.

Government agencies can do many things reasonably well, but strategic risk analysis is not one of them. We recommend establishing a center for catastrophic terrorism risk analysis, offering a substantial multi-year contract, executed by the FBI, to a not-for-profit research center to perform this sort of analysis, devise and evaluate exercises and tests, and develop concepts of operations for countering catastrophic terrorism. Early in the nuclear era the RAND Corporation played an important part in helping the government think about a new set of security concerns. The Department of Defense has made a start by establishing an advanced concepts office in the newly formed Defense Threat Reduction Agency. But risk analysis will require a national, not just a DOD, focus.



Crisis and Consequence Management

Crisis management for catastrophic terrorism should include the capacity to employ appropriate force and specialized capabilities in any part of the world, endeavoring to minimize collateral damage, and to thwart a possible attack using weapons of mass destruction. Crisis management would include urgent protective efforts, employing every resource at the disposal of federal, state, and local governments. The U.S. government should also acquire capacities and plans for forensic investigation of the site of an attack in order to collect evidence and identify those responsible for further action.

Consequence management is a capacity to deal with the aftermath of an attack. The United States, at all levels of government, must develop the ability to respond effectively within hours, if not minutes, to any use of a weapon of mass destruction—nuclear, biological, chemical, or cyber—against American targets with appropriate and specific measures to mitigate casualties and damage. This is a large order. The needed capabilities include emergency medical care, distributions of protective gear or medications (including vaccines for those not yet exposed to the pathogen12), evacuations, and area quarantines, among other measures. Since these capabilities would need to be on a large scale, extensive preparations are needed to ready them in central locations, be able to mobilize them on sudden notice, be able to transport them where needed, and expect local authorities and caregivers to be ready to receive and use them. The United States must also have emergency plans readied, including redundant or alternative control systems, for sustaining the operation of infrastructure that provides the necessities of life, if this infrastructure comes under attack.

The present system for handling terrorist emergencies is based on the FBI or—if overseas—on initiatives by State Department representatives or local military commanders. If an acute threat emerges in the United States, local authorities are expected to alert the local FBI office. The FBI’s special agent in charge would then organize intergovernmental response through activation of a strategic intelligence center in Washington, and a joint operations center and joint public affairs effort in the local area. If there were a WMD threat, the FBI could call on its Weapons of Mass Destruction Operations Unit, which has "Domestic Guidelines" to coordinate with other agencies and, in particular, seek Pentagon assistance.

There is ample legal authority to seek military aid in dealing with such a crisis on U.S. soil. FBI can call upon an existing, though rather small-scale, interdepartmental Domestic Emergency Support Team (or, overseas, a Foreign Emergency Support Team). FBI has its own Hazardous Materials Response Unit. More military assistance would likely come, not from a joint interservice command, but from the Army’s Chemical and Biological Defense Command. If the attack occurred, consequence management would be organized by the Federal Emergency Management Agency (FEMA) under what is called the "Federal Response Plan."

This structure is adequate for responding to ordinary terrorist threats or attacks, or perhaps even small scares related to weapons of mass destruction, as in February 1998 when FBI learned that two suspects in Las Vegas, one of whom had earlier been convicted for fraudulently obtaining bubonic plague virus, might be in possession of some anthrax. The crisis response went well, including coordination with limited Defense Department resources. The suspects turned out not to have any anthrax.

However, if some agency of the U.S. government learned that a large scale WMD attack might actually be imminent, threatening tens of thousands of lives, we expect that this structure for responding would almost instantly be pushed aside. The White House would immediately become involved and would seek to use every bit of power at America’s disposal in order to avert or contain the attack. The operational command structure would need to be capable of directing everything from CIA covert actions to strikes by bombers or missiles, be able to set up interdiction involving ground, sea, and air forces, and be able to mobilize and move thousands of soldiers (active duty, ready reserve, and National Guard) and thousands of tons of freight (in various emergency supplies and support for deployed units). Nor can any of these actions happen quickly unless plans have already been drawn up and units designated to carry them out, with repeated training and exercises to create a readiness to bring the plans to life. In this situation, the Defense Department’s capabilities would immediately become paramount. The FBI does not command such resources and does not plan to command them.

So what is needed is a two-tier structure for response, one for ordinary terrorist incidents that can be managed by federal law enforcement with interagency help, and a second structure readied for the contingency of truly catastrophic terrorist attack. The United States has set up unified combatant commands to prepare for remote but extremely serious contingencies of regional aggression, like U.S. Central Command’s response to Iraq’s 1990 invasion of Kuwait. The United States must also develop a structure that is ready to respond to this new, perhaps even more likely, contingency of the future.

Rather than create a new combatant command, we suggest instead two new offices, one set up within the Office of the Secretary of Defense, and the other created within the existing combatant command, U.S. Atlantic Command, that is already responsible for the security of the American homeland with operational responsibility for the majority of the U.S. armed forces. Our working titles for these offices are Catastrophic Terrorism Response Offices, or CTROs. The new offices would build a capability centered in the federal government but including state and local authorities along with relevant parts of the private sector to respond, once authorized to act by the President and the Secretary of Defense, to validated terrorist threats that would cause massive loss of life (measured in the thousands, i.e., significantly larger than the attack on the federal building in Oklahoma City) or otherwise jeopardize the operation of American government or critical infrastructure necessary to public health or the functioning of the economy. Obviously, the President and his advisors would face a difficult judgment to determine when this threshold has been met, but such judgments are required in other areas of national security policy and they can be made here.

The CTROs would plan and organize for a U.S. response to catastrophic terrorism by all elements of the U.S. government.

They would:

� assess intelligence and warning information in order to alert the National Command Authority of catastrophic terrorist threats;

� set requirements for, among other things, the collection and analysis of intelligence carried out by the proposed National Counterterrorism Intelligence Center;

� define needed resources and assure that resources, procedures, and trained personnel are available at the federal, state, and local level to respond to validated catastrophic threats;

� sponsor training and exercises involving federal, state, and local authorities for responding to catastrophic terrorist attacks;

� task operations by other organizations once activated by the President through the Secretary of Defense (with actual operations being undertaken by line organizations, whether covert actions by the CIA or military operations through the Joint Chiefs of Staff or law enforcement actions by the FBI);

� coordinate international preparedness to join in a multinational response against catastrophic terrorist threats.

The two CTROs should have the legal responsibility to achieve overall U.S. government readiness to respond to catastrophic terrorist threats when asked to do so by the President, acting through the Secretary of Defense. The defense secretary would be the executive agent for both offices and for their budget program, so that the CTROs can program elements in the DOD program budgeting system and have the job of submitting a consolidated catastrophic terrorism response program to the White House for inclusion in the President’s proposed budget. The Congress pointed toward such a goal in the Defense Against Weapons of Mass Destruction Act of 1996 (more commonly known as the Nunn-Lugar-Domenici Amendment, or Nunn-Lugar II) which mandated that DOD train civilian emergency personnel at all levels of government and establish rapid terrorism response teams. Our idea broadens the scope of the initiative and suggests a way to give it a stronger, and more operational, institutional base.13

The Department of Defense would play a strong, supporting role, not the leading one. It has resources and capabilities in dealing with biological and chemical weapons. Its resources would be needed either for crisis or for consequence management, but only as part of a larger national effort.

Why two offices, rather than one? The CTRO centered in the Office of the Secretary of Defense should concentrate on planning and preparedness for preemptive and/or retaliatory strikes, utilizing covert action or the uniformed armed forces. It should draw additional staff from and involve a relatively narrow set of agencies: the Joint Staff, CIA, and FBI. This is a highly secret, delicate activity now done only in an ad hoc manner between CIA and JCS and never with the FBI. But the second office must be prepared to handle a much broader range of activities that affect prevention, containment, and management of the consequences of a catastrophic attack. The number of agencies involved must also be inclusive. This consequence management function must draw on the resources of the National Guard, FEMA, the Department of Health and Human Services, and other federal, state and local agencies. This is a much larger orchestra that we think can be well prepared and conducted, if activated in an emergency, by an integrated structure like U.S. Atlantic Command.

Neither of these new offices need be very large. Their jobs are planning and preparation, not day-to-day intelligence gathering, law enforcement, or combat operations. Yet the work they do will be invaluable, should the crisis ever come.



Acquisition

A national policy must include a concept for buying what is needed. The government is already ordering everything from vaccines to new research, but nearly two dozen agencies have their own separate shopping lists and ways of doing business. All these budget requests eventually arrive in Congress, where the lack of overall acquisition planning creates new difficult choices for the affected committees and budget competition on the Hill. In November 1997 a conference report accompanying appropriations for the Department of Justice correctly warned that "additional emphasis is needed to coordinate efforts among the many participating departments and agencies that have personnel, resources, and expertise to contribute" to the counterterrorism mission.14

We urge the creation of a coordinated, broadly focused, budget program that will plan, coordinate, and track all R & D and acquisition projects intended to improve counterterrorism capabilities, both conventional and unconventional, defensive and offensive, domestic and foreign, including field testing of new operational capabilities. This national counterterrorism acquisition program would be based on a government-wide five-year plan to develop and acquire the needed technology and operational skills. Examples include improved detectors of special materials (like radioactive substances), forensic investigation tools, automated tracking and analysis systems, and improved protective clothing or equipment.

The Clinton administration has already started a significant effort to acquire stockpiles of vaccines, antidotes, and antibiotics, adding to such a program already underway for the U.S. armed forces. Resources are needed for storage, transportation, and shipment of such medications. There is a further need for renewed research into defense against biological weapons, including adaptation to genetic alteration of deadly pathogens in order to defy available vaccines or antidotes. Improved detection devices need to be complemented by specialized laboratories, set up around the country, that can rapidly analyze substances or validate field identifications.

Attorney General Janet Reno warned Congress of the extraordinary acquisition requirements that would be created by a serious policy to cope with the threat of catastrophic terrorism. In April 1998 she explained that "we may need to develop an approach which will permit the government to accelerate the normal procurement procedures to quickly identify and deploy new technologies and substances needed to thwart terrorist threats and respond to terrorist acts. These procedures would be used not only to purchase medications and other needed tools, but also, in some instances, to borrow medications or tools from, or to enter into effective partnerships with, both academia and industry."15 To us, this statement is a call for an interdepartmental acquisition program that draws on Defense Department expertise. Despite its limitations, the Defense Department still has the best track record in the government for successful sponsorship of technological development and rapid, large-scale procurement.

This proposed acquisition program would be quite separate from other, also worthwhile, acquisition programs for cooperative threat reduction (like the Nunn-Lugar programs for the former Soviet Union), efforts to counter narcotics trafficking or organized crime, and nonproliferation activities; its focus would be counterterrorism. An effective interdepartmental committee system is needed for this acquisition program to be successful.

We suggest a National Counter-Terrorism Acquisition Council that would be chaired by the undersecretary of defense for acquisition and technology. Such an acquisition council should include representatives from other departments, including top subcabinet officials from Justice, Energy, Treasury, State, and Health and Human Services, as well as the deputy director of FBI, the deputy director of CIA for science and technology, and the director of the Federal Emergency Management Agency.

This acquisition council would need to oversee the field-testing and evaluation of new capabilities with participation of several concerned agencies. Some agencies might worry about Defense usurpation of their procurement decisions. Instead we think it is just these agencies that should want a national program. Defense will already be acquiring vast quantities of equipment for its own needs. Suppliers will naturally configure themselves around this demand. Civilian agencies need a way to be sure that their particular requirements are also taken into account.

We suggest that the Defense Department establish an initial program with more than $100 million to fund the development of some technology ideas that would offer benefits across the government. Where appropriate, the acquisition council would designate lead agency responsibilities. The acquisition council can also facilitate easier sharing of technology, tactics, and material from one agency to another. Further, this council can provide a point of contact for international program and technology sharing with other nations. It can provide government-wide procedures controlling access to especially sensitive projects within the national counterterrorism program. Although the program would be executed by various departments, the acquisition council would still be held responsible for monitoring the progress of each program element and should be expected to report annually on progress to both the President and to the Congress.16



Conclusion

Our group’s deliberations started from the premise that catastrophic terrorism poses a first-order threat to our nation’s future. We then asked, in effect: if we had a serious national policy to deal with this threat, what would our government be organized and able to do? In 1940 and 1941 the U.S. government imagined what kind of forces it would have in order to wage a global war. The answers were so far beyond existing reality that we can imagine all the wry smiles and shaking heads that must have been seen in Washington offices as the planning papers made their rounds. Similar cycles occurred in the Cold War. For example, the notion of an intelligence system founded on photographic surveillance from the upper atmosphere, or outer space, seemed outrageously far-fetched in 1954, when the U-2 program was born. The films and cameras alone seemed to be an overwhelming hurdle. A few years later the U-2s were flying; six years later satellites were doing the job. Similar stories can be told about the strange and remarkable history of intercontinental missile guidance or about how the U.S. and its allies developed the capability to move more than a half-million troops and thousands of armored fighting vehicles and their supporting infrastructure to the Persian Gulf within a few months, from both Europe and North America.

Our government can deal with new challenges. But first we must imagine success. Then we must organize ourselves to attain it.



Notes

1. For a careful, dispassionate evaluation, see Richard A. Falkenrath, Robert D. Newman & Bradley Thayer, America’s Achilles Heel: Nuclear, Biological, Chemical Terrorism and Covert Attack (Cambridge: MIT Press, 1998). On the increasingly fragile and interconnected infrastructure and on the cyber threat, see also the Report of the President’s Commission on Critical Infrastructure Protection (also known as the Marsh Commission, for its chairman), Critical Foundations: Protecting America’s Infrastructures, Washington, DC, October 1997.

2. The most detailed and credible threat scenarios, based on close analysis of specific vulnerabilities, should not be published at all. These would be indispensable but quite sensitive documents to be prepared by relatively small groups of knowledgeable officials and expert consultants.

3. Address by President Clinton, May 22, 1998; White House Fact Sheet on PDD-62; all distributed by the White House Press Office.

4. Roberto Suro & Dana Priest, "Plan to Overhaul Anti-Terrorism Strategy Would Boost NSC’s Role," Washington Post, March 24, 1998, p. A7; see also M.J. Zuckerman, "Anti-terror ‘czar’ to coordinate $7B effort," USA Today, May 4, 1998, p. 1A.

5. Richard E. Neustadt, Presidential Power and the Modern Presidents: The Politics of Leadership from Roosevelt to Reagan (New York: Free Press, 5th ed., 1990), p. 7.

6. James Q. Wilson, Bureaucracy: What Government Agencies Do and Why They Do It (New York: Basic Books, 1989), pp. 271-72.

7. See Maurice Matloff, Strategic Planning for Coalition Warfare, 1943-1944 (Washington: U.S. Army, 1959); John Ehrman, Grand Strategy: August 1943-September 1944 (London: HMSO, 1956); Herman M. Somers, Presidential Agency: The Office of War Mobilization and Reconversion (Cambridge: Harvard University Press, 1950). On the Northern Ireland example, see Philip Zelikow, "Policing Northern Ireland (A): A Question of Primacy," and "Policing Northern Ireland (B): A Question of Balance," Kennedy School of Government Case Program, Harvard University, 1994.

8. Philip Heymann has been especially helpful to us in understanding the legal capabilities and limits affecting counterterrorist investigations. For his survey of the legal and policy dilemmas associated with countering terrorism, see Philip B. Heymann, Terrorism and America: A Commonsense Strategy for a Democratic Society (Cambridge: MIT Press, 1998).

9. These motions seek to find whether the police or prosecutors have any information, not already disclosed, that may tend to show the innocence of the defendant. Even if statutes are amended, under our proposal the arresting agency and prosecutor’s office would remain subject to such discovery motions, which the Supreme Court considers an aspect of constitutionally mandated due process of law. Since the Center would not itself carry out law enforcement operations or make prosecutorial decisions, it should be exempted from such discovery, although any information it chooses to provide to police or prosecutors would then be discoverable under the procedures specified in the current Classified Information Protection Act.

10. For a summary, see Philip Heymann, Matthew Meselson & Richard Zeckhauser, "Criminalize the Traffic in Terror Weapons," Washington Post, April 15, 1998, p. A19; a detailed copy of the proposal is available from Meselson. Development of biological weapons is distinguishable from the necessary work to develop defenses against such weapons.

11. We are especially indebted to Malcolm Sparrow for his thinking on this subject, which we have abridged.

12. Vaccines may be useful after exposure to anthrax, however, and smallpox (for different reasons).

13. The FBI has also been given funds for training local "first responders" to an emergency. FBI must be involved in the effort, but based on training plans that fully integrate what Defense and other federal agencies can and are doing. These useful but fragmentary efforts indicate the case for an office like the one we suggest.

14. Conference Report 105-405 for FY 1998 Appropriations to the Departments of Commerce, Justice, State, the Judiciary, and Related Agencies, November 13, 1997.

15. Statement of Attorney General Reno, Hearings of the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information and the Select Committee on Intelligence, "The Threat of Chemical and Biological Weapons," April 22, 1998.

16. A useful analogy for such an acquisition program, on a smaller scale, is the Technical Support Working Group, which develops counterterrorism equipment for use by all agencies of the federa
chiggerbit
 
Posts: 8594
Joined: Tue May 10, 2005 12:23 pm
Blog: View Blog (0)

Postby chiggerbit » Wed Apr 22, 2009 9:56 pm

http://www.sourcewatch.org/index.php?ti ... D._Zelikow
Philip D. Zelikow

Philip D. Zelikow is Executive Director of the National Commission on Terrorist Attacks Upon the United States, otherwise known as the 9-11 Commission.
Member, Global Development Program Advisory Panel, Gates Foundation [1]
Advisory Board, America Abroad Media


There's a raft of evidence to suggest that Zelikow has personal, professional and political reasons not to see the commission hold Rice and other Bush officials accountable for pre-9/11 failings, and may be the de facto swing vote for Republicans on the panel.[1] Here are just a few of them:
He and Rice worked closely together in the first Bush White House as aides to former National Security Adviser Brent Scowcroft. Zelikow was director of European security affairs, and Rice was senior director of Soviet and East European affairs, as well as special assistant to the president. Rice reportedly hired Zelikow. Both started in 1989 and left in 1991.
A few years after leaving the White House, Zelikow and Rice wrote a book together called, "Germany Unified and Europe Transformed: A Study in Statecraft."
The two associated again when Zelikow directed the Aspen Strategy Group [2], a foreign-policy strategy body co-chaired by Rice's mentor Scowcroft. Rice, along with Dick Cheney and Paul Wolfowitz, were members.
Zelikow also directed the Markle Foundation's Task Force on National Security in the Information Age [3]under co-chairman James Barksdale, a Bush adviser and major Bush-Cheney donor. A 9/11 commissioner, Republican Sen. Slade Gorton, also served with Zelikow on the task force. (Interestingly, the pair serves together on yet another panel - The National Commission on Federal Election Reform - with Gorton acting as vice-chairman and Zelikow as executive director.)
After the 2000 election, Zelikow and Rice were reunited when George W. Bush named him to his transition team for the National Security Council. Rice reportedly asked Zelikow to help organize the NSC under the Scowcroft model, which was insular and steeped in Cold War worldview.
Former White House terrorism czar Richard Clarke says he briefed not only Rice and Hadley, but also Zelikow about the growing al-Qaida threat during the transition period. Zelikow sat in on the briefings, he says.
A month after the 9/11 al-Qaida attacks, President Bush appointed Zelikow to the President's Foreign Intelligence Advisory Board, which is chaired by Scowcroft.
Zelikow's regular job, the one he'll return to after the commission releases it final report in late July, is director of the Miller Center of Public Affairs at the University of Virginia. The center is dedicated to the study of the presidency, and maintains contact with the Bush White House, which fought the creation of the commission.
Kristen Breitweiser, a 9/11 widow, insists Zelikow has a "clear conflict of interest." And she suspects he is in touch with Bush's political adviser, Rove, which she says would explain why the White House granted him, along with just one other commission official, the greatest access to the intelligence briefing Bush got a month before the 9/11 suicide hijackings.

Phillip David Zelikow was appointed to the President's Foreign Intelligence Advisory Board (PFIAB) on October 8, 2001, by President George Walker Bush.

Zelikow has served as Director of the University of Virginia's Miller Center of Public Affairs since 1998. He is also White Burkett Miller Professor of History. He was director for European security affairs at the National Security Council from 1989 to 1991. In this position, Zelikow advised current PFIAB Chairman Brent Scowcroft and President George Herbert Walker Bush "on European issues, including the unification of Germany and the multinational coalition against Iraq."[4]

"After serving in government with the Navy, the State Department, and the National Security Council, he taught at Harvard before assuming his present post in Virginia to direct the nation's largest research center on the American presidency. He was a member (2001-2003) of the President's Foreign Intelligence Advisory Board and served as executive director of the National Commission on Federal Election Reform, chaired by former Presidents Jimmy Carter and Gerald R. Ford, as well as the executive director of the Markle Foundation Task Force on National Security in the Information Age.

"Zelikow's books include The Kennedy Tapes (with Ernest May), Germany Unified and Europe Transformed (with Condoleezza Rice), and the rewritten Essence of Decision (with Graham Allison). Zelikow has also been the director of the Aspen Strategy Group, a policy program of the Aspen Institute."

He is also a member of the Council on Foreign Relations.[5]

According to Melvin Goodman, Zelikow "headed a case study project at Harvard and took hundreds of thousands of dollars from the CIA. He used CIA documentation and produced case studies that exonerated the CIA from any charges of politicization of intelligence, particularly with regard to the Soviet Union." [6]

from Emad Mekay for IPS, 29 March 2004:
"Why would Iraq attack America or use nuclear weapons against us? I'll tell you what I think the real threat (is) and actually has been since 1990 -- it's the threat against Israel," Zelikow told a crowd at the University of Virginia on Sep. 10, 2002, speaking on a panel of foreign policy experts assessing the impact of 9/11 and the future of the war on the al-Qaeda terrorist organisation.
"And this is the threat that dare not speak its name, because the Europeans don't care deeply about that threat, I will tell you frankly. And the American government doesn't want to lean too hard on it rhetorically, because it is not a popular sell," said Zelikow.
The statements are the first to surface from a source closely linked to the Bush administration acknowledging that the war, which has so far cost the lives of nearly 1200 U.S. troops and thousands of Iraqis, was motivated by Washington's desire to defend the Jewish state.

On 2007-08-24, Glenn Greenwald reported on his Salon blog that Zelikow was working as a lobbyist employed by Former Iraqi Prime Minister Allawi (and future Prime Minister Hopeful) to discredit Iraqi Prime Minister Maliki and appeared on programs as an expert on Iraq criticising Maliki while withholding his conflict of interest and also worked as a consultant to the White House on Iraq at the time the White House began disparaging Maliki.

According to James Petras (2008): "The key figure in and around the Bush Administration who actively promoted a ‘new Pearl Harbor ’ and was at least in part responsible for the policy of complicity with the 9/11 terrorists was Philip Zelikow. Zelikow, a prominent Israel-Firster, is a government academic, whose expertise was in the nebulous area of ‘catastrophic terrorism’ – events which enabled US political leaders to concentrate executive powers and violate constitutional freedoms in pursuit of offensive imperial wars and in developing the ‘public myth’. Philip Shenon’s book, The Commission: The Uncensored History of the 9/11 Investigation pinpoints Zelikow’s strategic role in the Bush Administration in the lead up to 9/11, the period of ‘complicit neglect’, in its aftermath, the offensive global war period, and in the government’s cover-up of its complicity in the terror attack." [2]
[edit]
Resources and articles
[edit]
Related Sourcewatch articles
[edit]
References
↑ Program Advisory Panels Announced by the Bill & Melinda Gates Foundation, Bill & Melinda Gates Foundation, accessed December 9, 2007.
↑ Provocations as Pretexts for Imperial War: From Pearl Harbor to 9/11, Global Research, accessed May 28, 2008.

Blogs that mention this article
An Anthrax Commission?
Truth y Dissent

Source: Technorati (view all)
chiggerbit
 
Posts: 8594
Joined: Tue May 10, 2005 12:23 pm
Blog: View Blog (0)

Postby chiggerbit » Wed Apr 22, 2009 10:24 pm

Background from this week's current events (besides the fact that Rep Jane Harman was caught on tape discussing a quid pro quo with AIPAC):

~Obama gave the go-ahead for the release of four of five new torture memos from the Bush administration
http://hosted.ap.org/dynamic/stories/U/ ... TE=DEFAULT
;
~Rahm Emanuel stated on Sunday talk show that the administration would not be prosecuting anyone with regards to torture; and since Sunday Obama has back-tracked on that position, and is now saying that there might maybe possibly be prosecutions afterall.
http://hosted.ap.org/dynamic/stories/U/ ... TE=DEFAULT

~Philip Zelikow suddenly feels a need to explain what his advice to the administration really meant.

In Zelikow's own words:

http://shadow.foreignpolicy.com/posts/2 ... _dissenter

The OLC "torture memos": thoughts from a dissenter
Tue, 04/21/2009 - 9:17am

By Philip Zelikow

I first gained access to the OLC memos and learned details about CIA's program for high-value detainees shortly after the set of opinions were issued in May 2005. I did so as Secretary of State Condoleezza Rice's policy representative to the NSC Deputies Committee on these and other intelligence/terrorism issues. In the State Department, Secretary Rice and her Legal Adviser, John Bellinger, were then the only other individuals briefed on these details. In compliance with the security agreements I have signed, I have never discussed or disclosed any substantive details about the program until the classified information has been released.

Having been the executive director of the 9/11 Commission, I'm aware of what some of these captives did. The Commission wondered how captives were questioned (for details on that, see this previously disclosed report), and the matter is now the subject of a federal criminal investigation by special prosecutor John Durham. Nonetheless, the evidence against most -- if not all -- of the high-value detainees remains damning. But the issue is not about who or what they are. It is about who or what we are.

Based on what had earlier been released, I have offered some general views on "Legal Policy for a Twilight War." With the release of these OLC memos, I can add three more sets of comments, each of which could be developed at much greater length.

1. The focus on water-boarding misses the main point of the program.

Which is that it was a program. Unlike the image of using intense physical coercion as a quick, desperate expedient, the program developed "interrogation plans" to disorient, abuse, dehumanize, and torment individuals over time.

The plan employed the combined, cumulative use of many techniques of medically-monitored physical coercion. Before getting to water-boarding, the captive had already been stripped naked, shackled to ceiling chains keeping him standing so he cannot fall asleep for extended periods, hosed periodically with cold water, slapped around, jammed into boxes, etc. etc. Sleep deprivation is most important.

2. Measuring the value of such methods should be done professionally and morally before turning to lawyers.

A professional analysis would not simply ask: Did they tell us important information? Congress is apparently now preparing to parse the various claims on this score -- and that would be quite valuable.

But the argument that they gave us vital information, which readers can see deployed in the memos just as they were deployed to reassure an uneasy president, is based on a fallacy. The real question is: What is the unique value of these methods?

For this analysis, the administration had the benefit of past U.S. government treatment of high-value detainees in its own history (especially World War II and Vietnam) and substantial, painful lessons from sympathetic foreign governments. By 2005, the Bush administration also had the benefit of what amounted to a double-blind study it had inadvertently conducted, comparing methods that had evolved in Iraq (different Geneva-based rules, different kinds of teams) and the methods the CIA had developed, with both sets being used to against hardened killers.

Opponents should not overstate their side either. Had a serious analysis been conducted beforehand (it apparently was not), my rough guess is that it might have found that physical coercion can break people faster, with some tradeoff in degraded and less reliable results.

Which underscores the importance of moral analysis. There is an elementary distinction, too often lost, between the moral (and policy) question -- "What should we do?" -- and the legal question: "What can we do?" We live in a policy world too inclined to turn lawyers into surrogate priests granting a form of absolution. "The lawyers say it's OK." Well, not really. They say it might be legal. They don't know about OK.

3. The legal opinions have grave weaknesses.

Weakest of all is the May 30 opinion, just because it had to get over the lowest standard -- "cruel, inhuman, or degrading" in Article 16 of the Convention Against Torture. That standard was also being codified in the bill Senator John McCain was fighting to pass. It is also found in Common Article 3 of the Geneva Conventions, a standard that the Supreme Court ruled in 2006 does apply to these prisoners. Violation of Common Article 3 is a war crime under federal law (18 U.S.C. section 2441), a felony punishable by up to life imprisonment. (The OLC opinions do not discuss this law because in 2005 the administration also denied the applicability of Common Article 3.)

The OLC holds, rightly, that the United States complies with the international standard if it complies with the comparable body of constitutional prohibitions in U.S. law (the 5th, 8th, and 14th Amendments). Many years earlier, I had worked in that area of the law. I believed that the OLC opinions (especially the May 30 one) presented the U.S. government with a distorted rendering of relevant U.S. law.

At the time, in 2005, I circulated an opposing view of the legal reasoning. My bureaucratic position, as counselor to the secretary of state, didn't entitle me to offer a legal opinion. But I felt obliged to put an alternative view in front of my colleagues at other agencies, warning them that other lawyers (and judges) might find the OLC views unsustainable. My colleagues were entitled to ignore my views. They did more than that: The White House attempted to collect and destroy all copies of my memo. I expect that one or two are still at least in the State Department's archives.

Stated in a shorthand way, mainly for the benefit of other specialists who work these issues, my main concerns were:
the case law on the "shocks the conscience" standard for interrogations would proscribe the CIA's methods;
the OLC memo basically ignored standard 8th Amendment "conditions of confinement" analysis (long incorporated into the 5th amendment as a matter of substantive due process and thus applicable to detentions like these). That case law would regard the conditions of confinement in the CIA facilities as unlawful.
the use of a balancing test to measure constitutional validity (national security gain vs. harm to individuals) is lawful for some techniques, but other kinds of cruel treatment should be barred categorically under U.S. law -- whatever the alleged gain.

The underlying absurdity of the administration's position can be summarized this way. Once you get to a substantive compliance analysis for "cruel, inhuman, and degrading" you get the position that the substantive standard is the same as it is in analogous U.S. constitutional law. So the OLC must argue, in effect, that the methods and the conditions of confinement in the CIA program could constitutionally be inflicted on American citizens in a county jail.

In other words, Americans in any town of this country could constitutionally be hung from the ceiling naked, sleep deprived, water-boarded, and all the rest -- if the alleged national security justification was compelling. I did not believe our federal courts could reasonably be expected to agree with such a reading of the Constitution.
chiggerbit
 
Posts: 8594
Joined: Tue May 10, 2005 12:23 pm
Blog: View Blog (0)

Postby chiggerbit » Mon May 04, 2009 6:55 pm

http://tpmcafe.talkingpointsmemo.com/ta ... -contr.php

Zelikow Goes Into Damage Control Mode
By gazo - February 12, 2008, 6:34PM

Former 9/11 Commission Chief Philip Zelikow has gone on the Democracy Now! radio show to answer serious allegations of misconduct raised in Philip Shenon's new book, including revelations that Zelikow repeatedly spoke to both Rove and Condi while leading the commission, that he pressured members to minimize criticism of Condi and link 9/11 with Iraq, and that he ordered his secretary not to keep phone logs.

He refuses to flatly deny his former secretary's claims that he called
her into his office and told her not to keep logs of his phone calls,
instead insisting that nobody on
the Commission kept phone logs. He says Max Cleland resigned for "very
personal reasons" and deflects further enquiries to "either Max or Tom
Daschle or the commissioners involved". And he more or less denies
everything else in Sheldon's book with a standard line: "Go ask the
people who were on the commission."

It doesn't seem to bother
Zelikow too much that the information which formed the cornerstone of
his Commission's findings was based on information extracted by
torture. What bothers him is whether or not he is the one who is going
to be blamed for this huge mess.

NBC analysis shows that "more than a quarter of all footnotes in the
9/11 Commission Report refer to controversial interrogation techniques". This suggests that information extracted by torture formed the foundation for the official explanation for 911
. And now the Pentagon want to execute the prisoners who provided that information, before they can have their day in a free and fair court!

Zelikow repeatedly insists that he did have concerns about prisoners being tortured for information, and boasts that he pressured the administration (unsuccessfully) to let him talk directly with the prisoners. He says he has always advocated bringing the prisoners involved to trail:


"I've
been an advocate both inside and outside of the government of bringing
these people to trial in every possible way. And perhaps a little bit
due to my efforts, a couple of years ago the President decided that
those people would be brought out of the black sites and brought to
trial. And my hope is that when they are eventually brought to trial,
we'll have a chance to gather more information, perhaps through a more
adversarial process, and check on some of the assertions."


But this bit of damage control does not synch up very well with what Zelikow told the Annual Lecture, Houston Journal of International Law, on April 26, 2007. On that occasion, he insisted that "good intelligence can be gained by physically tormenting captives".

He said improved interrogation methods have been developed through "a process of painful trial and error"! He said it was " tempting for some local governments to let the Americans do the distasteful things that protect their people too." He called for such governments to abandon the rule of "traditional" law. And he argued in favour of "the quite defensible policy of renditions".

Now he's a hero of the resistance, doggedly pressuring the White House on torture??? Is this the same guy???
chiggerbit
 
Posts: 8594
Joined: Tue May 10, 2005 12:23 pm
Blog: View Blog (0)



Return to Data & Research Compilations

Who is online

Users browsing this forum: No registered users and 7 guests