15 November 2001
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111408.plt&t=/products/washfile/newsitem.shtml


US Department of State
International Information Programs

Washington File
_________________________________

14 November 2001

CIA's Pillar on Counterterrorism

 (Discusses various instruments of counterterrorism) (2060)

 (This byliner was published in the Office of International Information
 Program's electronic journal "U.S. Foreign Policy Agenda," November
 14. No republication restrictions.)

 The Instruments of Counterterrorism
 By Paul R. Pillar

 (The author is the National Intelligence Officer for Near East and
 South Asia, National Intelligence Council, Central Intelligence
 Agency.)

 Every tool used in the fight against terrorism has something to
 contribute, but also significant limits to what it can accomplish.
 Thus, counterterrorism requires using all the tools available, because
 no one of them can do the job. Just as terrorism itself is
 multifaceted, so too must be the campaign against it.

 Counterterrorism involves far more activities than those that bear the
 "counterterrorist" label. Even before the attacks of 11 September 2001
 made the subject a seemingly all-encompassing concern for the United
 States, it involved the efforts of many different departments and
 agencies. Counterterrorism includes diplomacy designed to harmonize
 the efforts of foreign governments on the subject. It includes the
 investigative work of numerous law enforcement agencies and the
 related legal work of prosecuting terrorist crimes. It involves
 measures by financial regulatory bodies to interrupt terrorist
 funding. As the allied military operations begun over Afghanistan in
 October 2001 remind us, it, at times, includes the use of armed force.
 Information gathering by intelligence agencies is another major part
 of counterterrorism. And all of these functions aimed at actively
 countering terrorist operations are in addition to the many defensive
 measures, taken by the private sector as well as by various levels of
 government, designed to protect against terrorist attacks.

 DIPLOMACY

 Diplomacy is critical to combating modern international terrorism,
 which, in many respects, knows no boundaries. Terrorist groups have
 increasingly spread their reach around the globe. Combating a
 terrorist network like the one that includes Osama bin Laden's
 al-Qaida group requires the cooperative efforts of many countries
 because the network operates in many countries. Effective
 counterterrorist diplomacy is the glue needed to hold these efforts
 into a coherent whole rather than being merely disjointed parts. The
 building of a counterterrorist coalition following the attacks of 11
 September is only the most recent and conspicuous demonstration that
 the United States needs the help of foreign partners in countering
 even those threats directed specifically against the United States.

 Counterterrorist diplomacy is not just the responsibility of
 professional diplomats in foreign ministries. Officials performing
 other specialized, and counterterrorist-related, functions have to
 cooperate extensively with foreign counterparts to do their jobs.
 Regulatory agencies responsible for the security of civil aviation and
 other modes of transportation, for example, have to perform what is,
 in effect, a diplomatic function to accomplish the necessary
 coordination where their security systems intersect with those of
 other countries. Customs and immigration officials must do the same.

 Most of this specialized cooperation is bilateral, but multilateral
 diplomacy also has contributions to make. It can provide broad
 sanction for measures that would have less legitimacy if taken by an
 individual state. The United Nations Security Council has done so, for
 example, with resolutions (beginning with Resolution 1267 in 1999)
 pertaining to the Taliban's support to terrorism based in Afghanistan.
 Multilateral diplomacy -- including resolutions of the U.N. General
 Assembly and a dozen international conventions on terrorism -- also
 strengthens an international norm against terrorism. Some of those
 conventions, such as ones dealing with hijacking of aircraft, also
 provide a basis for practical cooperation on matters where national
 jurisdictions may overlap.

 The limitations of diplomacy as a counterterrorist tool are obvious.
 Terrorists do not change their behavior in direct response to a treaty
 or U.N. resolution. But diplomacy supports all of the other tools,
 whether by broadening the moral force behind them or providing an
 international legal framework for their use.

 CRIMINAL LAW

 The prosecution of individual terrorists in criminal courts has been
 one of the most heavily relied upon counterterrorist tools. The United
 States has placed particular emphasis on it, with the bringing of
 terrorists to justice for their crimes being a longstanding tenet of
 U.S. counterterrorist policy. Non-U.S. courts have also played
 significant roles. A Scottish court sitting in the Netherlands was
 used to try two suspects accused of bombing Pan Am flight 103 in 1988.

 Use of the criminal justice system can help reduce terrorism in
 several ways. Imprisoning a terrorist for life (or executing him)
 obviously prevents him from conducting any more attacks. The prospect
 of being caught and punished may deter other terrorists from attacking
 in the first place. Even if not deterred, the movements of terrorists
 still at large can be impeded by the knowledge that they are wanted
 men. The drama and publicity of a criminal trial may also help to
 sustain public support for counterterrorism, demonstrate a
 government's resolve to go after terrorists, and encourage other
 governments to do the same.

 A limitation of applying the criminal justice system to terrorism is
 that the prospect of being caught and punished does not deter some
 terrorists. That prospect is obviously irrelevant to suicide bombers,
 and perhaps also to other low-level operatives who feel a comparable
 level of commitment and desperation. High-level terrorist leaders --
 who typically stay farther removed from the scene of the crime and are
 more difficult to catch -- may care little about whether the
 underlings are caught.

 Prosecuting a terrorist also poses the practical difficulty of
 assembling sufficient legally admissible evidence to convict him. At
 least in U.S. courts, that is a higher standard than acquiring enough
 information to be fairly sure, from an intelligence or policy
 perspective, that someone is a terrorist. Direct evidence of the
 decisions or orders issued by terrorist leaders is particularly hard
 to come by. The physically dispersed planning and decision making of
 international terrorist groups means many of the actions leading to a
 terrorist attack were taken outside the country where the attack
 occurs and outside the jurisdiction of the lead investigators.

 The need for international cooperation in applying criminal law to
 terrorists is obvious. It involves not only acquisition of evidence
 for use in court but also the extradition or rendition of fugitives to
 stand trial in the country where they are charged.

 FINANCIAL CONTROLS

 The funding that evidently made it possible for the perpetrators of
 the attacks in September to train and travel as they prepared for
 their operation has highlighted efforts to interdict terrorist money.
 The United States uses two types of financial controls to combat
 terrorism: the freezing of assets belonging to individual terrorists,
 terrorist groups, and state sponsors; and the prohibition of material
 support to terrorists. Money is also the subject of the most recent
 multilateral treaty on terrorism: the Convention on the Suppression of
 the Financing of Terrorism, which was opened for signature in January
 2000.

 Cutting off terrorists' funding faces two major challenges. One is
 that -- notwithstanding the importance of financial backing to the
 September hijackers -- most terrorism does not require large-scale
 financing. Less money is involved than in illegal narcotics, arms
 trafficking, and some other transnational criminal activities. The
 other challenge is that the flow of terrorist money is extremely
 difficult to track. False account names, the use of financial
 intermediaries, and commingling of funds for legitimate and
 illegitimate purposes are the rule. Much money gets moved through
 informal arrangements outside any formal banking system.

 Despite these challenges, more could be accomplished to impede
 terrorists' financial operations. The Treasury Department's Office of
 Foreign Assets Control (OFAC) provides focus and direction for U.S.
 efforts on this subject, but most of the financial activity, even of
 groups targeting the United States, takes place outside U.S.
 jurisdiction. The creation in other governments of offices similar to
 OFAC and the close cooperation of such offices would make a further
 dent in terrorists' financial activity.

 MILITARY FORCE

 Modern, precision-guided munitions have made armed force a less blunt
 and more useful counterterrorist instrument, but one whose use is
 still appropriately rare. Several countries have used military force
 with varying degrees of success over the last three decades to rescue
 hostages. More recently the military instrument has been employed to
 retaliate against terrorist attacks. The United States has used its
 armed forces for retaliation following terrorist attacks by Libya in
 1986, Iraq in 1993, and Osama bin Laden in 1998.

 A military strike is the most forceful possible counterterrorist
 action and thus the most dramatic demonstration of determination to
 defeat terrorists. The major limitation of military force is that
 terrorist assets, unlike conventional military assets, do not present
 large, fixed targets that can readily be destroyed. With the terrorist
 threat now coming much more from groups than from states, there are
 even fewer targets to strike, either to damage terrorist capabilities
 or to deter future terrorism.

 The U.S. and British military operations begun in Afghanistan in
 October go beyond any previous counterterrorist use of military force,
 in that they constitute not just retaliation but an effort to clean
 out the prime source and safe haven of a terrorist network. In their
 goal and scale, they have the potential for having a substantially
 greater effect on terrorism than any previous use of armed force.
 Success in Afghanistan will depend on political as well as military
 chapters of that country's history yet to be written. Even with
 success in Afghanistan, however, the military operations there do not
 directly touch the portions of the al-Qaida network that reside
 elsewhere, and, thus, must be part of a broader counterterrorist
 effort that does address those portions.

 INTELLIGENCE

 The collection and analysis of intelligence is the least visible but
 in some ways the most important counterterrorist tool, and is rightly
 thought of as the "first line of defense" against terrorism. But this
 instrument also has its limitations, chief of which is that the type
 of very specific, tactical intelligence required to thwart terrorist
 plots is rare. That kind of actionable information is difficult to
 collect because it requires penetration of groups that are small,
 suspicious of outsiders, and very careful about their operational
 security.

 Most intelligence about terrorist groups is fragmentary, ambiguous,
 and often of doubtful credibility. Analysis is thus almost as much of
 a challenge as collection. The contribution of intelligence is not so
 much to provide coherent pictures of impending terrorist operations
 but rather a more strategic sense of which groups pose the greatest
 threats, which times and which regions present the greatest dangers,
 and what sorts of targets and tactics are most likely to be used.

 The limitations of counterterrorist intelligence mean it should not be
 relied upon as a foolproof indicator of where threats do and do not
 exist. But the guidance it provides in managing the risks from
 terrorism is invaluable, from decisions on site security to broader
 policy on allocation of counterterrorist resources, as well as being
 essential to the functioning of all the other counterterrorist
 instruments.

 PUTTING IT ALL TOGETHER

 The instruments discussed here must be well coordinated. Used together
 wisely, they produce a whole that is greater than the sum of the
 parts. If not well coordinated, they can work at cross-purposes.
 Enforcement of criminal law may get in the way of intelligence
 collection, for example, and military action could disrupt either law
 enforcement or intelligence gathering.

 The United States accomplishes day-to-day coordination through
 sub-cabinet committees, cross-assignment of personnel, and other
 formal and informal mechanisms centered in the National Security
 Council and involving the Departments of State, Defense, Justice, and
 Treasury, the intelligence agencies, and other elements. The best
 arrangements for coordinating counterterrorism will vary from one
 government to another, but effective coordination should reflect three
 principles. One is that all of the relevant ministries or agencies --
 including those responsible for military affairs, internal security,
 intelligence, and foreign affairs -- need to be involved. Second,
 leadership should come from the center, such as a cabinet office or
 equivalent to the U.S. National Security Council. And third, the
 various offices involved need to develop everyday habits of working
 together that will become second nature and pay off during a crisis.

 Every counterterrorist instrument is difficult to use. Using them well
 together is even more difficult. But using them all is critical in the
 fight against terrorism.

 (The Washington File is a product of the Office of International
 Information Programs, U.S. Department of State. Web site:
 http://usinfo.state.gov)


Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111407.plt&t=/products/washfile/newsitem.shtml 14 November 2001 Raven-Hansen on Rule of Law and Terrorism (Discusses the rule of law in trying terrorists) (2020) (This byliner was published in the Office of International Information Program's electronic journal "U.S. Foreign Policy Agenda," November 14. No republication restrictions.) Bringing Terrorists to Justice Under the Rule of Law By Peter Raven-Hansen (The author is the Glen Earl Weston Research Professor of Law at the George Washington University Law School.) The history of lawless police states leaves little doubt how one would respond to a terrorist attack. The government would declare a national emergency to invoke new "emergency" powers and measures. Already secretly tracking many citizens, the police would expand surveillance in a search for the attackers. They would quickly arrest suspects, potential witnesses, and maybe dissidents and critics as well. The arrested would be held in isolation and possibly abused to make them talk. Finally, the authorities would first secretly decide who is guilty (or who should be called guilty) and afterwards announce that judgment in show trials, followed by execution or long terms of imprisonment. A lawless response would be swift and seemingly efficient because it could be decided personally by one or a few men whose orders are "law" to their underlings. The United States has responded to terrorist attacks with the same tools of criminal justice: surveillance, arrest, detention, and trial. But in a state ruled by law rather than personal fiat, these tools are not crafted by President Bush and his counselors. They were instead authorized by pre-existing laws in the U.S. Constitution, legislation enacted by Congress, and executive regulations. Furthermore, with few exceptions, the only U.S. "emergency powers" are ones given the President by laws which Congress has previously passed, not ones he gives himself because he thinks it necessary. And if the tools provided by law prove to be too slow and cumbersome to meet the terrorist threat, they must be changed by a public legislative process, not by presidential order. SURVEILLANCE The U.S. Constitution protects the people from "unreasonable searches and seizures." To be reasonable, a search -- whether conducted physically in the home or electronically by wiretap or other communications intercept -- must ordinarily be pre-approved by an independent judge on evidence showing that there is probable cause to believe that evidence of a crime will be found. Evidence obtained in violation of these standards can be thrown out of court. But the U.S. Supreme Court has recognized that collecting security intelligence is different from collecting evidence of a crime, partly because it is needed to prevent spying or terrorism and not just to solve completed crimes. Congress has therefore enacted a law permitting independent judges to authorize surveillance for the purpose of collecting foreign intelligence on a lesser showing of probable cause. The government need only show that there is probable cause to believe that the target of the surveillance is a foreign agent or international terrorist. Such foreign intelligence surveillance was already being conducted before the September 11 attacks on the United States, and, indeed, had produced crucial evidence against the terrorists who were ultimately tried for the 1998 bombings of the U.S. embassies in Tanzania and Kenya. But the law before September 11 also restricted some surveillance. U.S. newspapers report, for example, that before September 11 the government was unable to make the showing required to obtain surveillance of one of the men now suspected of participating in the September 11 attacks. In addition, the pre-September 11 foreign surveillance law was technologically obsolete in some respects. It was intended to apply chiefly to traditional telephone wiretaps and was not well suited to e-mail and other means of communications developed since the law was enacted. The Bush administration therefore sought changes in the law from Congress after the September 11 attack. Because the U.S. lawmaking process is public, so was the ensuing debate in Congress and in the U.S. mass media. Defenders of privacy resisted many of the changes sought by the Administration, and proponents of greater security promoted them. In the end, some compromises were made in a new law expanding security surveillance. Yet the new law still falls short of the unrestricted surveillance, which we would expect in a police state. An independent judge must still approve security surveillance, it must still be directed at foreign agents or international terrorists, with special protections for U.S. citizens in many cases, and it is still not open-ended. ARREST AND DETENTION In the first seven weeks of its investigation of the September 11 attacks, the Federal Bureau of Investigation detained over 1,100 persons. But the U.S. Constitution protects a person from unreasonable "seizure" -- arrest and detention -- as well as from unreasonable search. There is no law, which allows general "preventative detention" -- detaining a person indefinitely in order to prevent him from committing a crime in the future -- except for enemy aliens in war. The police may stop someone for questioning only on reasonable suspicion that he has been or is involved in criminal activity and may detain him only temporarily before charging him with a crime. The arrest of most of the 1,100 met this standard, but not because they were reasonably suspected of being involved in the September 11 attack. Instead, they were arrested on suspicion of committing what the U.S. Attorney General called "spitting on the sidewalk": minor crimes like traffic violations, using false identities, or credit card fraud. Detention without bail for persons suspected of such minor crimes is unusual; often even conviction for such crimes carries no jail sentence. Consequently, the "spitting-on-the-sidewalk" detentions have been the subject of growing debate in the media, and defenders of civil liberties have insisted that the government is really embarked on an unprecedented and legally controversial policy of preventative detention to meet the threat of terrorism. Another 200 detainees are aliens who are reasonably suspected of violating their immigration status in the United States, by, for example, overstaying their student visas. Before September 11, however, persons suspected of minor "overstays" were hardly ever detained for more than a short period while they awaited immigration proceedings. The continued detention of such aliens in the September 11 investigation has also been criticized as preventative detention. Nevertheless, there is an essential difference between the wholesale and unrestricted round-up of suspects and dissidents which we would expect in a lawless police state and the September 11 detentions. It is that the U.S. government has been obliged publicly to justify its arrests by law, even if its justifications have been criticized. In addition, the detainees have rights under U.S. law while they are detained. A detainee has the right to call a lawyer, and if the detainee is charged with a crime, he has a right to have a lawyer appointed for him at government expense. The Department of Justice has asserted that each detainee has been informed of this right, although questions remain about how easy it has been for detainees to exercise the right. Detainees also have a right to be protected from physical abuse during their detention. No one has yet credibly complained that this right has been violated. Under the rule of law, it is usually preferable to change law when it no longer meets perceived social needs than to bend it, let alone break it. In fact, the Attorney General did ask Congress for new authority to detain a person indefinitely if he had reason to believe that the person was a terrorist or was likely to commit a terrorist act. Despite the terrorist emergency, Congress rejected that request, doubting that such an expansion of detention authority was necessary or constitutional. Instead, it has given him new but limited authority to detain aliens for short periods before starting immigration proceedings against them. TRIAL The U.S. Constitution guarantees a bundle of important rights to a person charged with a crime. First, and perhaps most important, he has the right to a speedy and public trial. He has the right to confront the witnesses and see the evidence against him. He has a right to a lawyer at the government's expense. He has the right to ask for a jury of impartial ordinary citizens to decide whether the evidence shows his guilt "beyond a reasonable doubt." And he has the right to see any evidence, which the government has found which might show his innocence. These rights were afforded the terrorists who were tried in U.S. courts for the 1993 World Trade Center bombing, the 1995 Oklahoma City bombing, and the 1998 embassy bombings. In the latter case, for example, lawyers for defendants -- indicted along with Osama bin Laden as members of the al-Qaida network -- succeeded during a five-month trial in having some criminal charges dismissed, some surveillance declared unlawful, and some evidence against them thrown out of court. Nevertheless, after hearing 205 witnesses, the jury found beyond a reasonable doubt that defendants were guilty of bombing the U.S. embassies. Despite the government's unbroken record of success in terrorist prosecutions, however, they have not been problem-free. A major drawback in trying terrorists is that some of the evidence against them (or which they are entitled to see) may have been obtained from secret intelligence sources and methods. Disclosure of the evidence may jeopardize such sources and methods. In one terrorism prosecution, for example, the government had to disclose evidence, which had been obtained by an electronic intercept of a communication by the al-Qaida network. Within a short time after the disclosure, the network reportedly stopped using that channel of communication and the intelligence source was lost. The obvious solution to this risk -- keeping the evidence secret from the terrorist defendant and his lawyers -- is prohibited by U.S. law. In non-criminal immigration proceedings to remove suspected terrorist aliens from the United States, however, the government has tried to use secret evidence when it was necessary to protect intelligence sources and methods. This use of secret evidence, however, may also be unlawful. At least three lower courts have rejected immigration decisions in such cases on the ground that using secret evidence violates the right of aliens to the due process of law guaranteed by the Constitution. But these decisions did not dictate whether the government is permitted to use secret evidence in other parts of the country, and the Supreme Court -- which could decide this question for the entire nation -- has not yet done so. Consequently, before September 11, some members of Congress proposed a law which would have prohibited the immigration authorities from using secret evidence. After September 11, the support for such a law has, at least temporarily, evaporated. Courts must therefore continue to decide case by case whether secret evidence can be used in immigration proceedings until the Supreme Court or Congress settles the question. CONCLUSION Bringing terrorists to justice under the rule of law is a slow, cumbersome, inefficient business. It may even be an unsuccessful business, if essential evidence is excluded because it was obtained by unlawful surveillance, if the government decides that it cannot risk disclosure of intelligence sources and methods, or if the proof does not show guilt beyond a reasonable doubt (even though it shows that it is more probable than not that defendant is guilty). But as the Supreme Court once said in deciding to free a terrorist who had been unlawfully tried during the Civil War: "The power of punishment is alone [available] through the means which the laws have provided for that purpose, and if they are ineffectual, there is an immunity from punishment, no matter ... how much ... crimes may have shocked the ... country, or endangered its safety. By the protection of law human rights are secured; withdraw that protection, and they are at the mercy of wicked rulers, or the clamor of an excited people." In its quest for protection from terrorists, the United States will never give up the protection of law.
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111406.plt&t=/products/washfile/newsitem.shtml 14 November 2001 Rand's Hoffman on Terrorism After September 11 (He discusses the changing nature of terrorism) (2090) (This byliner was published in the Office of International Information Program's electronic journal "U.S. Foreign Policy Agenda," November 14. No republication restrictions.) Terrorism and Counterterrorism After September 11th By Bruce Hoffman (The author is the vice president and external affairs director, RAND Corporation Washington Office.) THE 9/11 ATTACKS IN CONTEXT Until September 11th, a total of no more than perhaps 1,000 Americans had been killed by terrorists either in this country or abroad since 1968 -- the year credited with marking the advent of the modern era of international terrorism when the Popular Front for the Liberation of Palestine (PFLP) hijacked an El Al flight on July 23. To put the events of that tragic day further in context, until the attacks on the World Trade Center and Pentagon, no terrorist operation had killed more than 500 persons at one time.(1) Whatever the metric, the enormity and sheer scale of the simultaneous suicide attacks of that day eclipse anything we have previously seen -- either individually or in aggregate. Accordingly, for that reason alone, September 11th argues for nothing less than a re-configuration of both our thinking about terrorism and how we both prepare and organize to counter it. Such a change is amply justified by the unique constellation of operational capabilities evident in that day's tragic attacks: showing a level of planning, professionalism and tradecraft rarely seen among the vast majority of terrorists and terrorist movements we have known.(2) Among the most significant characteristics of the operation were its: -- ambitious scope and dimensions; -- consummate coordination and synchronization; -- professionalism and tradecraft that kept so large an operation so secret; and -- the unswerving dedication and determination of the 19 aircraft hijackers who willingly and wantonly killed themselves, the passengers and crews of the four aircraft they commandeered and the thousands of persons working in or visiting both the World Trade Center and the Pentagon. The significance of the September 11th incidents from a terrorist operational perspective is that simultaneous attacks -- using far more prosaic and arguably conventional means of attack (such as car bombs, for example) -- are relatively uncommon. For reasons not well understood, terrorists typically have not undertaken such coordinated operations. This was doubtless less of a choice than a reflection of the logistical and other organizational hurdles that most terrorist groups are not able to overcome. Indeed, this was one reason why we were so galvanized by the synchronized attacks on the American embassies in Nairobi and Dar es Salaam three years ago. The orchestration of that operation, coupled with its unusually high death and casualty tolls, stood out in a way that, until September 11th, few other terrorist actions had: bringing bin Laden as much renown as infamy in many quarters. During the 1990s, perhaps only one other (presumably unrelated) terrorist incident evidenced those same characteristics of coordination and high lethality: the series of attacks that occurred in Bombay in March 1993, where a dozen or so simultaneous car bombings rocked the city, killing nearly 300 persons and wounding more than 700 others.(3) Indeed, apart from the attacks on the same morning in October 1983 of the U.S. Marine barracks in Beirut and a nearby French paratroop headquarters, and the IRA's near-simultaneous assassination of Lord Mountbatten and remote-control mine attack on British troops in Warrenpoint, Northern Ireland, in 1979, it is hard to recall many other significant incidents reflecting such operational expertise, coordination and synchronization. WHERE WE WENT WRONG IN FAILING TO PREDICT THE 9/11 ATTACKS Accordingly, we were perhaps lulled into believing that mass, simultaneous attacks in general, and those of such devastating potential as we saw in New York and Washington on September 11th were likely beyond most capabilities of most terrorists -- including those directly connected to or associated with Osama bin Laden. The tragic events of that September day demonstrate how profoundly misplaced such assumptions were. In this respect, we perhaps overestimated the significance of our past successes (e.g., in largely foiling most of bin Laden's terrorist operations during the period between the August 1998 embassy bombings and the November 2000 attack on the USS Cole) and the terrorists' own incompetence and propensity for mistakes (e.g., Ahmad Ressam's bungled attempt to enter the United States from Canada in December 1999). Indeed, both more impressive and disturbing is the fact that there was likely considerable overlap in the planning for these attacks and the one last November against the USS Cole in Aden: thus suggesting a multi-track operational and organizational capability to coordinate major, multiple attacks at one time. Attention was also arguably focused too exclusively either on the low-end threat posed by car and truck bombs against buildings or the more exotic high-end threats, involving biological or chemical weapons or cyber-attacks. The implicit assumptions of much of our planning scenarios on mass casualty attacks were that they would involve germ or chemical agents or result from widespread electronic attacks on critical infrastructure and that any conventional or less extensive incident could be addressed simply by planning for the most catastrophic threat. This left a painfully vulnerable gap in our anti-terrorism defenses where a traditional and long-proven tactic -- like airline hijacking -- was neglected in favor of other, less conventional threats and the consequences of using an aircraft as a suicide weapon seem to have been almost completely discounted. In retrospect, it arguably was not the 1995 sarin nerve gas attack on the Tokyo subway and nine attempts to use bio-weapons by Aum that should have been the dominant influence on our counterterrorist thinking, but a 1986 hijacking of a Pan Am flight in Karachi, where the terrorists' intentions were reported to have been to crash it into the center of Tel Aviv, and the 1994 hijacking in Algiers of an Air France passenger plane by terrorists belonging to the Armed Islamic Group (GIA), who similarly planned to crash the fuel-laden aircraft with its passengers into the heart of Paris. The lesson, accordingly, is not that we need to be unrealistically omniscient, but rather that we need to be able to respond across a broad technological spectrum of potential adversarial attacks. We also had long consoled ourselves -- and had only recently begun to question and debate the notion-that terrorists were more interested in publicity than killing and therefore had neither the need nor interest in annihilating large numbers of people. For decades, there was widespread acceptance of the observation made famous by Brian Jenkins in 1975 that, "Terrorists want a lot of people watching and a lot of people listening and not a lot of people dead."(4) Even despite the events of the mid-1980s-when a series of high-profile and particularly lethal suicide car and truck-bombings were directed against American diplomatic and military targets in the Middle East (in one instance resulting in the deaths of 241 Marines)-- many analysts saw no need to revise these arguments. In 1985, Jenkins, one of the most perspicacious and acute observers of this phenomenon, again noted that, "simply killing a lot of people has seldom been one terrorist objective . . . Terrorists operate on the principle of the minimum force necessary. They find it unnecessary to kill many, as long as killing a few suffices for their purposes."(5) The events of September 11th prove such notions now to be wishful thinking, if not dangerously anachronistic. On that day, bin Laden arguably wiped the slate clean of the conventional wisdom on terrorists and terrorism and, by doing so, ushered in a new era of conflict, more bloody and destructive than before. Finally, bin Laden himself has re-written the history of both terrorism and probably of the post-Cold War era -- which he arguably single-handedly ended on September 11th. At a time when the forces of globalization, coupled with economic determinism, seemed to have submerged the role of the individual charismatic leader of men beneath far more powerful, impersonal forces, bin Laden has cleverly cast himself (admittedly and inadvertently with our assistance) as a David against the American Goliath: one man standing up to the world's sole remaining superpower and able to challenge its might and directly threaten its citizens. To his followers, bin Laden has proven to be the fabled right man in the right place at the right time: possessing the vision, financial resources, organizational skills, and flair for self-promotion to meld together the disparate strands of Islamic fervor, Muslim piety, and general enmity toward the West into a formidable global force. WHAT NEEDS TO BE DONE The concept of proportionality has long governed American counterterrorist policy. Its American proponents argued, and our many allies throughout the world expected, that the American military response would be commensurate with the terrorist attack that provoked it. Thus, in 1986, when the Qadhafi regime was implicated in the bombing of a West Berlin discotheque frequented by American soldiers, the United States retaliated with air strikes directed against Libyan military targets in Tripoli and Benghazi -- including Muammar Qadhafi's living quarters -- in an attempt to eliminate the Libyan leader himself. Similarly, in 1998, when bin Laden was identified as the architect of the massive truck bombings of the American embassies in Kenya and Tanzania, the U.S. launched nearly 100 cruise missiles against his training camps in Afghanistan -- also in hopes of killing him -- as well as against a pharmaceutical factory allegedly linked to bin Laden and believed to be manufacturing chemical weapons in the Sudan. Two Americans had lost their lives in the discotheque bombing and twelve in Nairobi. In the latter case, the response may have been insufficient. But our situation today leaves no room for quibbling. As previously noted, the enormity and sheer scale of the simultaneous suicide attacks on September 11 eclipses anything we have previously seen -- either individually or in aggregate. It calls, unquestionably, for a proportionate response of unparalleled determination and focus such as we see today in our actions both in the United States and abroad, as well as one that utilizes the full range of formidable tools at our disposal --diplomatic, military, and economic. While much attention is currently focused on the military options being exercised in South Asia, they are only one instrument that the United States can bring to bear in the struggle against terrorism. Our efforts need to be fully coordinated, sustained, and prolonged. They will require commitment, political will, and patience. They must have realistic goals and not unduly raise or create false expectations. And, finally, they must avoid cosmetic or "feel-good" physical security measures that contribute only tangentially, if at all, to the enhancement of national as well as international security. In conclusion, it must be appreciated that the struggle against terrorism is never-ending. By the same token, our search for solutions and new approaches must be equally continuous and unyielding, proportional to the threat posed by our adversaries in both innovation and determination. (footnotes) 1. Approximately 440 persons perished in a 1979 fire deliberately set by terrorists at a movie theater in Abadan, Iran. 2. Nor is this a particularly "American-centric" view in reaction to the stunning and tragic events of two months ago. For example, an old friend and colleague, who is one of Israel's leading counterterrorist experts, and who has long experience in military, the government and academe was totally shocked by the September 11th attacks -- specifically, their coordination, daring and lethality -- remarking: "Never could I have imagined that terrorists could or would do that" (telephone conversation, 17 September 2001). I am also reminded of a conversation with a senior, highly decorated Sri Lankan Armed Forces brigade commander and military intelligence operative who once explained in great detail the "difficulties of pulling off even a successful, significant terrorist attack" (discussion, Batticola, Sri Lanka, December 1997) -- not least the four orchestrated suicide aircraft hijackings and crashes that occurred on September 11th. 3. Celia W. Dugger, "Victims of '93 Bombay Terror Wary of U.S. Motives," New York Times, 24 September 2001. 4. Brian Michael Jenkins, "International Terrorism: A New Mode of Conflict" in David Carlton and Carlo Schaerf (eds.), International Terrorism and World Security (London: Croom Helm, 1975), p. 15. 5. Brian Michael Jenkins, The Likelihood of Nuclear Terrorism (Santa Monica, CA: The RAND Corporation, P-7119, July 1985), p. 6.
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111404.plt&t=/products/washfile/newsitem.shtml 14 November 2001 State's Taylor on Counterterrorism Policies (He discusses policies and counterterrorism measures) (1810) (This byliner was published in the Office of International Information Program's electronic journal "U.S. Foreign Policy Agenda," November 14. No republication restrictions.) Terrorism: U.S. Policies and Counterterrorism Measures By Ambassador Francis X. Taylor (The author is the Coordinator for Counterterrorism at the U.S. Department of State.) September 11, 2001 is a day that will redefine history. Before the tragic events of that date occurred, articles appeared in journals and newspapers accusing the U.S. Government of overstating the terrorist threat. This is no longer the case. The terrorist attacks that were launched, on that day in New York, Virginia, and Pennsylvania claimed victims from some 88 nations, from our close neighbors Canada and Mexico to countries as far away as Australia and Zimbabwe, and in large numbers from India and Pakistan. For many countries, including the United States, Britain, Germany, and Switzerland, the horrors of September 11 claimed the most lives of any terrorist incident in their history. For the United States, it was the bloodiest day in America since the 1862 Civil War Battle of Antietam. The attacks may have been conceived as a blow against America, but in reality they were attacks against all of humanity and civilization itself. The war we are waging will be a long struggle with many dimensions. Our goal is to eliminate the international terrorist threat to people, installations, and other interests. We will do this by: -- Smoking out terrorists from their hiding places, -- Draining the swamp where terrorists find safe haven, -- Pressuring states to stop supporting terrorism, -- Preventing planned terrorist attacks, and -- Bolstering the capabilities of our friends and allies to combat terrorism. The nations of the world are banding together to eliminate the terrorism scourge. Numerous multilateral organizations have issued declarations of support -- including the United Nations, the European Union, the Organization of American States, the Organization of African Unity, the Organization of the Islamic Conference, the Asia-Pacific Economic Cooperation forum -- and many others have expressed their strong solidarity. I recently traveled to Brussels where I met with the North Atlantic Council. I made the case that the al-Qaida organization led by Osama bin Laden was responsible for what happened on the 11th of September. I traced the history of this organization, its recent activities, and the events that occurred just prior to and just after the 11th. In response, NATO Secretary General Lord Robertson stated that the facts contained in the briefing were "clear and compelling" and point "conclusively to an al-Qaida role in the attacks." As a result of the briefing, NATO concluded that the attacks were directed from abroad and will "therefore be regarded as an action covered by Article V of the Washington Treaty, which states that an armed attack on one or more of the allies in Europe or North America shall be considered an attack against them all." This was the first time Article V was invoked in the history of the NATO alliance. NATO allies have agreed to provide the United States with the wide range of assistance that we had requested. This includes unlimited use of their airspace, base facilities, seaports, logistics, extra security for U.S. forces in Europe, intelligence sharing, and early warning aircraft. AWACS surveillance planes belonging to NATO are currently patrolling the skies over America as a result of the Article V invocation. The Organization of American States invoked the Rio Treaty, which also covers collective self-defense. OAS foreign ministers, meeting in Lima, Peru on the day of the attacks, were the first to condemn them. The Organization of the Islamic Conference -- the most important and comprehensive grouping of Muslim states, 56 in all -- strongly condemned the savage September 11 attacks and unequivocally declared that terrorism is never sanctioned by Islam. We believe the face of terror is not the true face of Islam. Terrorism is a perversion of religion, and those who hijacked our airplanes on September 11 also hijacked the faith they claim. Other nations, great and small, have made pledges and contributions to what is a global response to a global attack. We have received numerous offers of diplomatic, political, police, intelligence, and military support. We have what amounts to a coalition of coalitions, with some nations forging ahead to deny terrorists access to banking systems, for example, and other nations more active in other areas. Individual members are dedicated and are holding steady. Our challenge will be to hold the coalitions together until the campaign is successful. FORGING THE TOOLS TO FIGHT TERROR This campaign will be unlike others we have fought. The battles are as likely to be fought in small conference rooms among bankers, at border crossing points, or in forensic laboratories as over the skies of some hostile power. Our victories will be counted in the drying up of financing, the withering of political support, the rounding up of terrorist cells -- not in the conquest of foreign land. TERRORIST FUNDING The September 11 terrorists apparently had enough money to make their preparations many months, if not years, in advance. Funding is a critical element in recruiting supporters and launching large-scale terrorist operations. We need to dry up terrorist fundraising and money transfers. The first shot in the war against terrorism was fired on September 24 when President Bush signed executive order 13224. This shot froze the assets of 27 terrorists, terrorist organizations, and terrorist financiers associated with al-Qaida and blocks U.S. transactions with such persons or entities. The Executive Order was later amended to include 39 additional names of persons and organizations known to conduct or financially support terrorism. In addition, the assets of all 22 of the FBI's Most Wanted Terrorists are now subject to this blocking order. Additional names will be added in the months ahead. A previous Executive Order, in effect since 1995 and renewed each year since, includes such groups as Hizballah and HAMAS, as well as al-Qaida, that represent a terrorist threat to the Middle East peace negotiations. On September 28 the U.N. Security Council unanimously adopted resolution 1373, which is binding on all states under international law. This resolution goes to the heart of how terrorism operates. It obliges all member states to deny financing, support, and safe haven to terrorists. It will also expand information sharing among U.N. members to combat international terrorism. A Security Council follow-up mechanism has been set up to monitor compliance on a continuous basis. This effort has already yielded results. The United States has frozen some $4 million and is reviewing many other accounts. We have received reports of millions of additional dollars being frozen around the world. Other nations are still seeking to identify terrorist assets that they have pledged to block. In all, 111 nations -- more than half the world -- have acted to choke off the oxygen of money for terrorists, and this is only the beginning. Another important tool in countering terrorist fundraising is formally designating groups as Foreign Terrorist Organizations, or FTOs. Designation of FTOs makes it a criminal offense for persons subject to U.S. jurisdiction to knowingly contribute funds or other material support to such groups. U.S. law also allows freezing of the groups' assets and denial of visas for their leaders and other members. Secretary of State Colin Powell designated 28 such groups, including al-Qaida, in early October. Using tools like these, we have urged other countries to tighten up their own laws and regulations to curb terrorist fundraising and money transfers. Great Britain already has done so, and countries such as Canada, Greece, India, and the Philippines have new laws or proposed counterterrorism legislation in various stages of consideration. In addition, the administration is making ratification of the 12 U.N. conventions against terrorism a high priority. These cover a range of activities, such as hijacking, hostage taking, bombing, and terrorism financing. The conventions form a strong legal framework for fighting terrorism. OTHER MEASURES There are a number of other tools that we have been using to counter terrorism, and we are sharpening and improving them in this new struggle. We are utilizing training-related programs to help combat terrorism overseas and thus help protect Americans living and traveling abroad. The State Department's Antiterrorism Training Assistance (ATA) program in which we train foreign security and law enforcement officials is a pillar of this effort. The program not only provides training but also helps promote our policies and improve our contacts with foreign officials to achieve our counterterrorism goals. We have trained more than 20,000 officials from over 100 countries to date. We are hoping for additional funding for the ATA program in the wake of the September 11 attacks to permit us to accelerate the pace of this training. We also have developed a Terrorist Interdiction Program (TIP), which utilizes sophisticated computer data base systems and improved communications to help identify potential terrorists who try to cross international borders. This program will be most effective in countries that are major transportation hubs. The Department's contribution to the interagency counterterrorism research and development program, the Technical Support Working Group, also helps to make advances in explosives detection and other areas and bolster our cooperative R&D efforts with other key allies. We have proposed increasing our "Rewards for Justice" program, which pays up to $5 million for information that prevents a terrorist attack or results in the arrest of a terrorist. This important program saves lives and puts terrorists behind bars. Many challenges lie ahead. Maintaining the international coalition will be one. However, in the months that have elapsed since these nations proclaimed their solidarity against terrorism, the coalition has gotten stronger. Another challenge will be to counter the notion held in some quarters that Osama bin Laden is some type of hero and that the United States is somehow the aggressor. I believe, that, through active public diplomacy, we can effectively convey the message that bin Laden is evil, and his actions are a manifestation of evil. Moreover, the United States has no designs on foreign real estate. We are not an invading force. But we will forcefully attack the terrorist network that represents a threat to us all. The horrific events of September 11 require a broad based, long-term strategic campaign, in concert with the nations of the world that abhor terrorism. Together we will root out and bring to justice those that use terrorism. We are in for a long haul. As President Bush has told the world: "Whether we bring our enemies to justice, or bring justice to our enemies, justice will be done."
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111403.plt&t=/products/washfile/newsitem.shtml 14 November 2001 Powell on September 11th Terrorist Attacks (He discusses the nature of coalition building) (1030) (This byliner was published in the Office of International Information Program's electronic journal "U.S. Foreign Policy Agenda," November 14. No republication restrictions.) Seizing the Moment By Colin L. Powell (The author is U.S. Secretary of State.) The mass murders that were committed on September 11 under the direction of Osama bin Laden and his al-Qaida network have united the world against international terrorism. Some 80 countries lost citizens in the attacks. From our shared grief and shared resolve can come new opportunities not only to defeat terrorism, but also to work with other nations on a range of important issues of global concern. A host of countries and international organizations have answered President Bush's call for a worldwide coalition to combat terrorism -- among them NATO, the European Union, the Organization of American States, the Association of Southeast Asian Nations, the Organization of African Unity, the Arab League, the Organization of the Islamic Conference, and the U.N. General Assembly and Security Council. Indeed, the Security Council unanimously adopted an historic resolution obliging all 189 U.N. member states to stop terrorist travel, money flows, planning and other support, and to cooperate in bringing terrorists to justice. International terrorism poses a multidimensional threat. Our coalition must use every tool of statecraft to defeat it. Some countries will take part in the military response against those involved in the atrocities of September 11. Others, while not participating directly in military action, will provide logistical support or access to bases and staging areas or overflight rights. And many will contribute to humanitarian efforts to help the millions of innocent Afghans who have suffered under the Taliban regime -- a regime which seems to care more about Osama bin Laden and his terrorists than its own starving citizens. Coalition members also will work to disrupt and destroy terrorist networks by sharing intelligence and other critical information, cooperating in law enforcement, and cutting off terrorists' financial lifelines. This will be a long, hard campaign, measured in years and fought on many fronts. For such an effort, our coalition will have the flexibility to evolve. And the very process of participating in this great global campaign against terrorism may well open the door for us to strengthen or reshape international relationships and expand or establish areas of cooperation. Already, our alliances in Europe, Asia and the Western Hemisphere have been reinvigorated by invocations of the collective defense provisions of the NATO, ANZUS and Rio Treaties. Russian President Vladimir Putin's reaction to September 11 marked the beginning of a new period in our bilateral relationship, one in which a new spirit of cooperation on counterterrorism may also make many of the tough issues on the agenda more resolvable. Indeed, in the wake of 11 September, it has become clear that not only is the Cold War over, but the post-Cold War period is also over. China has also contributed meaningfully to this unprecedented global effort. I am confident that as we advance our counterterrorism cooperation with China we will be in a stronger position to sustain meaningful consultations with the leadership in Beijing on other subjects of importance to us. We have also seized opportunities to improve our relations with Pakistan and India. President Musharaff of Pakistan made the strategic decision to end his government's support of the Taliban. As a result of the actions taken by Pakistan in support of our campaign, we can see the beginning of a strengthened relationship that will grow and thrive in the years ahead. Well before September 11, President Bush made it clear that putting our relationship with India on a higher plane is one of his highest priorities. With the strong support we have received from the Indian government since September 11, we are seizing the opportunity to accelerate the pace of change. Our improved relations with these two South Asian rivals may now present an opportunity for both countries to explore new ways of thinking about stability on the Subcontinent. The millions of our fellow Americans of the Islamic faith, and the ten Muslim nations who lost citizens in the September 11 attacks, need no convincing that the killers and their accomplices pervert Islam when they use it to justify their appalling crimes. Out of a deep sense of shared humanity, and a chilling appreciation of common vulnerability to terrorism, we see new scope to strengthen our relations with the Islamic world. In this global campaign, the United States welcomes the help of any country or party that is genuinely prepared to work with us, but we will not relax our standards and we will continue to advance our fundamental interests in human rights, accountable government, free markets, non-proliferation and conflict resolution, for we believe that a world of democracy, opportunity, and stability is a world in which terrorism cannot thrive. Throughout the campaign against international terrorism, the dedicated men and women of the State Department at our posts abroad and here in Washington will be on the front lines just as surely as those who wear the uniform. We will not let terrorism hijack American foreign policy. The President has urged the American people to get back to the business of their daily lives. So too, the United States will continue to pursue a full international agenda -- from promoting good governance to cooperating with other countries to stem the HIV/AIDS pandemic, establish a post-Cold War strategic framework, launch a new trade round, and foster peace in the Middle East. Terrorism has cast a shadow across the globe. But the global resolve to defeat it has never been greater and the prospects for international cooperation across a broad range of issues has never been brighter. As President Bush said the other day when he visited the State Department: "Out of this evil will come good. Through our tears we see opportunities to make the world better for generations to come. And we will seize them."
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01111402.plt&t=/products/washfile/newsitem.shtml 14 November 2001 State's Bigler on U.S. Antiterrorism Assistance Program (25,000 foreign police, security forces trained) (1920) (This byliner was published in the Office of International Information Program's electronic journal "U.S. Foreign Policy Agenda," November 14. No republication restrictions.) Many Countries Benefit from U.S. Antiterrorism Training By Alan O. Bigler (The author is the director of the Antiterrorism Assistance Program of the Diplomatic Security Service at the U.S. Department of State.) The U.S. Antiterrorism Assistance Program (ATA) is actively training foreign police and security forces throughout the world to combat, deter, and solve terrorist crimes in their countries. In the process the program is improving both bilateral and international cooperation in the fight against terrorism. Since its inception, ATA has trained over 25,000 students from 117 different countries, which has had a sizable impact in the fight against international terrorism. In the year 2000 alone, ATA trained 2,741 students from 42 countries (conducting 117 courses in 20 different subject categories), initiated programs in five new countries, participated in 11 technical consultations and conferences, conducted five program evaluations, and performed 20 needs assessments. In the coming years, especially in light of the recent horrific terrorist attacks in New York and Washington, ATA will undergo a major program expansion and is planning accordingly. During the early 1980s following several serious terrorist incidents throughout the world, it became evident that in countries where such incidents had occurred, many local police and security forces lacked the necessary expertise and equipment to deter and respond in an effective manner. Therefore in 1983, the U.S. Congress authorized the establishment of a special program designed to enhance the antiterrorism skills of friendly countries by providing training and equipment necessary to deter and counter terrorist threats. Congress established the Antiterrorism Assistance Program under an amendment to the Foreign Assistance Act of 1961, which provides its legislative mandate and assigns responsibility for its administration to the State Department's Bureau of Diplomatic Security (DS). DS Agents, who are sworn federal law enforcement officers, serve as the Regional Security Officer (RSO) at U.S. embassies and other diplomatic missions throughout the world. In this capacity, they are responsible for the security of U.S. facilities and personnel inside the embassy compound, and for ensuring the safety of personnel beyond its walls, including all U.S. citizens that may travel to or visit that country. In order to manage these responsibilities, an RSO must establish and maintain close contacts and working relationships with the host country's security officials, who are tasked with providing external protection and support to the U.S. embassy and staff under long-established diplomatic protocols. Where gaps in a country's capability are noted, the ATA can offer expert assistance. NEEDS ASSESSMENT IS FIRST STEP At the embassy's request, and with the concurrence of the Department of State and with the consent of the host country, ATA will send a team of subject matter experts (SMEs) to conduct an extensive and thorough needs assessment of the country's security and police forces. Drawing experts from federal, state and even local law enforcement agencies, ATA sends teams to provide a critical look at the host nation's key security and law enforcement units. In conducting a needs assessment visit, the experts will frequently meet with senior government and police officials, visit various units, talk to members of the police, and witness capabilities demonstrations in order to determine the type of training and equipment the country will need to meet its particular terrorist threat. The assessment team considers five basic areas, which are seen as fundamental in any nation's defense against terrorism. Collectively they establish the framework for determining a country's ability to deter and respond to terrorist threats. In general terms, this framework involves the government's ability to: -- Enforce the law, preserve the peace, and protect life and property; -- Protect its national leadership, the seat and functions of government, and its resident diplomatic corps, including that of the United States; -- Control its international borders; -- Protect its critical infrastructure; and -- Manage crises that have national implications. Upon return, the SMEs compile a report that is presented to ATA's Training Board for review. In addition, a comprehensive country plan is developed that outlines a specific program of training courses and equipment for that country. Specific assistance is designed to meet identified needs in a variety of police and internal security disciplines. This assistance program is intended to improve functional police skills, mid-level supervision, senior-level management and leadership. TRAINING IN FUNCTIONAL CATEGORIES Essentially, ATA training is divided into four separate functional categories: Crisis Prevention, Crisis Management, Crisis Resolution, and Investigations. Each of these four categories contains a number of courses. For example, training in the category of Investigations is provided through a number of specialized courses, two of which are Post-Blast Investigations and Terrorist Crime Scene Investigations, while training in the category of Crisis Resolution could be in the form of a course in Hostage Negotiations. The bulk of antiterrorism training is provided in the form of highly specialized courses conducted in the United States at one of ATA's several training locations. Course lengths vary from two to five weeks depending on the subject. Typically, class sizes are held to no more than 24 students. Professional instructors teach courses with simultaneous interpretation into the country's native language by highly experienced interpreters. In addition, course materials are translated into the native language and alphabet, providing students with reference materials they can retain for future use after their return. In addition to the standard package of courses available, ATA also provides specialized training, consultations, and advisory assistance to address significant security threats. Based on specific, compelling needs, this assistance is often in the form of police administration, management and planning, police instructor training, judicial security, and modern interview and investigative techniques. ATA also provides limited amounts of specialized equipment. The majority of this equipment is incidental to the courses provided. For example, students who attend the bomb disposal course are given render-safe tools during their training, which they return home with. In addition, where there is a compelling need, and when funds are available, ATA is authorized to provide specialized equipment to meet pressing needs. Although it is presently limited in scope, ATA hopes to expand its equipment grant program in the future to meet the specific needs of its participant nations. HUMAN RIGHTS A country's human rights record is a critical element for ATA participation. In full compliance with the Leahy Act, the State Department's Bureau of Democracy, Human Rights, and Labor participates in determining a country's eligibility for participation. Assistance may be suspended if the country's record of human rights practices falls below acceptable standards. U.S. embassies scrupulously screen proposed training candidates to ensure that no abusers of human rights or officials involved in corrupt practices are permitted to attend training. In addition, ATA instruction incorporates and stresses human rights values and practices in its courses through teaching modern and humane treatment of suspects and members of the general public encountered during police operations. NEW INITIATIVES ANTI-KIDNAPPING In response to a widespread problem of kidnapping for ransom in Colombia and several other Latin American countries, ATA is developing a comprehensive anti-kidnapping training program. The new training program will begin with a kidnapping incident management course that brings together expert instructors with extensive experience in the field to teach a country's security forces, police and government agencies how to manage an incident of kidnapping for ransom. ATA anticipates there will be a great deal of interest in this type of training. PIPELINE SECURITY In response to concerns expressed by several Central Asian countries, ATA is developing a course that will teach energy pipeline security. Given the vast petroleum resources in the region, and the need for an extensive pipeline network for export, the governments of this region are increasingly concerned with their security. ATA hopes to have a pilot course available within the near future to help address their concerns. COUNTERING WEAPONS OF MASS DESTRUCTION (WMD) A major new area of training for ATA addresses the problems of managing the effects of a terrorist attack using chemical, biological, or radioactive materials, which are referred to as WMD. Such attacks present significant problems that are new, different, and of much greater scope than terrorist incidents involving conventional weapons. Courses have been developed and implemented to train foreign "first responders" -- police officers, firefighters, paramedics, and emergency room staff -- to cope with the complications of responding to terrorist attacks using chemical, biological, or radioactive weapons. These types of attacks can be more deadly than the 1998 massive truck bombs that destroyed the U.S. embassies in East Africa and the recent attacks on the World Trade Center in New York and the Pentagon. The ATA "first responder" program mirrors the U.S. Government's domestic program. As much as possible, the training and equipment will be the same as that provided to first responders in the United States. TERRORIST FINANCING The ATA program, working with experts in other agencies, is developing programs to help foreign officials to counter terrorist fund raising. In recent years, international terrorist organizations have relied less and less on state sponsors for their financing and other material support. However, many of these groups have founded charities and service organizations as fronts through which they seek contributions from people who believe they are for legitimate purposes. Some terrorist groups also operate legitimate businesses as front companies to raise money or facilitate transfers. A course designed to teach investigators how to trace, follow and link terrorist groups with their funds has been developed and was presented to a test country in July 2001. This pilot course was very well received and should become available for general offering. ATA RESULTS AND IMPACT ATA training provides the participant country police and security forces with a cadre of trained officers familiar with American values and thinking, on whom the RSO and other U.S. officials can rely in times of crisis. ATA training has also been widely credited with increasing the confidence, and in turn, the professionalism of students who have completed the training. In many countries, follow-up program reviews have determined that these officers have not only grown in skill and confidence, but also have advanced beyond their peers in promotion and stature due to the knowledge and training gained from their ATA training. In addition to providing individual students with enhanced training, there are numerous examples where ATA training has directly thwarted or solved several major terrorist incidents or major crimes. For example, in one country, ATA-trained police, using the techniques they learned during Surveillance Detection training, arrested two terrorists with a bomb in their possession outside the home of a judge. In another, an ATA-trained Police Crisis Response Team was deployed to the presidential palace of a country during an attempted coup d'etat, thus thwarting an overthrow of the government. In still another, a graduate of the ATA course in Police Crisis Management was called upon to respond to a crisis situation at a nightclub that was firebombed with 13 people killed and numerous others injured. This officer attributes his ATA training in crisis management as key to his ability to handle the subsequent panic and confusion of the situation. CONNECTING WITH ATA To learn more about ATA, the program office operates its own Internet Web site, which can be found at http://www.diplomaticsecurity.org.