REPORT OF THE JOINT INQUIRY INTO THE TERRORIST ATTACKS OF . - Senate

1y ago
2 Views
1 Downloads
5.02 MB
838 Pages
Last View : 30d ago
Last Download : 3m ago
Upload by : Carlos Cepeda
Transcription

REPORT OF THE JOINT INQUIRY INTO THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 –BY THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE AND THESENATE SELECT COMMITTEE ON INTELLIGENCE

S. REPT. NO. 107- 351107TH CONGRESS, 2D SESSIONH. REPT. NO. 107-792JOINT INQUIRY INTOINTELLIGENCE COMMUNITY ACTIVITIESBEFORE AND AFTER THE TERRORIST ATTACKS OFSEPTEMBER 11, 2001REPORTOF THEU.S. SENATE SELECT COMMITTEE ON INTELLIGENCEANDU.S. HOUSE PERMANENT SELECT COMMITTEE ONINTELLIGENCETOGETHER WITH ADDITIONAL VIEWSDECEMBER 2002

S. REPT. NO. 107- 351107TH CONGRESS, 2D SESSIONH. REPT. NO. 107-792JOINT INQUIRY INTOINTELLIGENCE COMMUNITY ACTIVITIESBEFORE AND AFTER THE TERRORIST ATTACKS OFSEPTEMBER 11, 2001REPORTOF THEU.S. SENATE SELECT COMMITTEE ON INTELLIGENCEANDU.S. HOUSE PERMANENT SELECT COMMITTEE ONINTELLIGENCETOGETHER WITH ADDITIONAL VIEWSDECEMBER 2002

ForewordThis is the declassified version of the Final Report of the Joint Inquiry that wasapproved and filed with the House of Representatives and the Senate on December 20,2002. With the exception of portions that were released to the public previously (e.g.,the additional views of Members, the GAO Anthrax Report, etc.), this version has beendeclassified by the Intelligence Community prior to its public release. That review wasfor classification purposes only, and does not indicate Intelligence Community agreementwith the accuracy of this report, or concurrence with its factual findings or conclusions.At appropriate points in the report, relevant information that developed after thereport was filed, or that has appeared in other public sources, has been inserted and isdenoted with an asterisk (*) and an accompanying footnote. Where necessary,information that the Intelligence Community has identified as classified for nationalsecurity purposes has been deleted. Such deletions are indicated with brackets and astrikethrough []. In other portions of the report, alternative language thatthe Intelligence Community has agreed is unclassified has been substituted for theoriginal report language which remains classified. Paragraphs that contain alternativelanguage, whether one word or several sentences, have been identified by brackets at thebeginning and end of the paragraph.As a result of these changes to the text, the page numbers at the bottom of eachpage do not match those of the original report. In order to preserve a record of theoriginal pagination, page numbers have been inserted in gray font [page xx] in the text tomark where the corresponding pages begin and end in the original report.

TOP SECRETSUMMARY TABLE OF CONTENTSTable of ContentsMembers of the Joint inquiryJoint Inquiry StaffAbridged Findings and ConclusionsRecommendationsFinal ReportPart One – The Joint Inquiry- The Context- Findings and Conclusions- Factual Findings- Conclusions - Factual Findings- Systemic Findings- Related FindingsPart Two – Narrative – The Attacks of September 11, 2001Part Three – Topics – The Attacks of September 11, 2001Part Four – Finding, Discussion and Narrative Regarding Certain SensitiveNational Security MattersGlossary of Terms and Key NamesAdditional Views of Members of the Joint InquiryAppendicesiTOP SECRET

TOP SECRETPART ONE—FINDINGS AND CONCLUSIONSSectionPageI. The Joint Inquiry . 1II. The Context . 3III. Findings and Conclusions . 6A.B.C.D.Factual Findings .Conclusion - Factual Findings Systemic Findings .Related Findings .63333117PART TWO—NARRATIVE—THE ATTACKS OF SEPTEMER 11, 2001 128I. The Plot Unfolds for the Attacks of September 11, 2001 . 128A.B.C.D.E.F.G.The al-Qa’ida Roots of the September 11 Attacks . 128The Springboards for the Attack—Germany and Malaysia 131The Principals Arrive in the United States -- January 2000 through April 2001.135The Supporting Hijackers Arrive--April to June 2001 137Final Organization of the Attacks 139Financing of the Attacks . 140Execution of the Attacks . 141II. Pentagon Flight Hijackers Khalid al-Mihdhar, Nawaf al-Hazmi and Salim al-Hazmi. 143A. The Malaysia Meeting and Identification of Khalid al-Mihdhar and Salimand Nawaf al-Hazmi — First Watchlist Opportunity . . 143B. Khalid al-Mihdhar and Nawaf al-Hazmi Travel to the United States — SecondWatchlist Opportunity . 147C. Khalid al-Mihdhar Leaves the United States and Nawaf al-Hazmi Applies fora Visa Extension 148D. The Attack on USS Cole and the Identification of Khallad—Third WatchlistOpportunity . 148E. The June 11, 2001 FBI/CIA Meeting and Khalid al-Mihdhar’s Return to theUnited States . 150F. The Watchlisting of Khalid al-Mihdhar and Nawaf al-Hazmi 151G. The Search for Khalid al-Mihdhar . 152iiTOP SECRET

TOP SECRETH. The Case Against Bin Ladin 154III. NSA Communications Intercepts Related to Khalid al-Mihdhar, Nawaf andSalim al-Hazmi . . 155IV. Nawaf al-Hazmi and Khalid al-Mihdhar Had Numerous Contacts With an ActiveFBI Informant . 157A. Background .B. Informant’s Relationship with Two Hijackers C. Questions About the Informant’s Credibility .158159162V. Associates of the September 11 Terrorists in the United States . 168A. U.S. Intelligence Community Knowledge of Support Networks Prior toSeptember 11. 171B. Persons Known to the FBI With Whom September 11 Hijackers May HaveAssociated in the United States . 172a. Omar al-Bayoumi . . 172b. Osama Bassnan 175c. [Imam]* . . 178d. [Business Manager] 179e. [Business Owner] . . 180f. [An Individual] . . 181e. [An Individual]. . 182VI. Germany—Investigation of the Hamburg Cell . 183VII. The Hijackers’ Visas . 187VIII. The Rising Threat and the Context of the September 11 Attacks 190A.B.C.D.E.F.A New Breed of Terrorists . 191Emergence of Usama Bin Ladin and al-Qa’ida . 194Attributes of Bin Ladin’s Terrorist Operations . 196Intelligence about Bin Ladin’s Intentions to Strike Inside the United States . 198Indications of a Possible Terrorist Attack in Spring and Summer 2001 . 203Intelligence Information on Possible Terrorist Use of Airplanes as Weapons 209IX. The Development of U.S. Counterterrorism Policy Before September 11 215*The identities of several individuals whose activities are discussed in this report have been deleted by the JointInquiry. While the FBI has provided the Joint Inquiry with these names and those names are contained in theclassified version of this final report, the Joint Inquiry has decided to delete them from this unclassified version dueto the as yet unresolved nature of much of the information regarding their activities.iiiTOP SECRET

TOP rism as an Intelligence Priority 216Growing Importance in the Clinton Administration 216Uncertainty During the Transition . 217The George W. Bush Administration . 218Competing Priorities 219Policy Measures to Fight Terrorism 220The Law Enforcement Approach 222Disruptions and Renditions 225Afghanistan as a Terrorist Sanctuary . 226The Intelligence Community . 229The Declaration of War . 230The Intelligence Community’s Response . 231Shortcomings in the Intelligence Community’s Response 232The President and Senior Policy Advisor Responsibility . 234Lack of an Integrated Response . 236The Intelligence Community’s Failure to Establish a Coordinated DomesticFocus before September 11 . 241Q. Steps Taken to Fight International Terrorism at Home . 243R. Lack of Focus on the Domestic Threat . 243S. Limited Counterterrorism Contributions by Other Intelligence CommunityMembers . 247PART THREE – TOPICS – THE ATTACKS OF SEPTEMBER 11, 2001 250I. Counterterrorism Resources . 250A.B.C.D.E.F.G.H.Joint Inquiry Resource Review Methodology and Limitations . 251Overall Intelligence Community Funding . 254Resources Dedicated to Counterterrorism . 256Personnel Shortages 260a. Personnel Concerns at CIA 261b. Personnel Concerns at NSA . 262c. Personnel Concerns at FBI 263Counterterrorism and the Competition for Scarce Resources 264Policymaker Criticism of Intelligence Community Budget Allocations 266Reliance on Supplemental Funding for Counterterrorism . 267How Easily Can Money Be Moved? . 269II. Foreign Liaison . 270A. Efforts to Improve Foreign Liaison 271B. Benefits of Foreign Liaison 272C. Disadvantages of Relying on Foreign Liaison Services . 274ivTOP SECRET

TOP SECRETD.E.F.G.Liaison Service Problems with the United States . 275Coordination of Foreign Liaison 276Additional Challenges for the FBI Overseas . 278Progress after September 11, 2001. 278III. Covert Action and Military Operations Against Bin Ladin . . . 279A.B.C.D.E.F.Background . 279Authorities to Conduct Covert Action Against Bin Ladin . 281Additional Operational Challenges and Constraints . 291CIA Covert Action Against Bin Ladin [Prior to September 11, 2001]. . 294Use of [] Against Bin Ladin. . 300Use of U.S. Military Force Against Bin Ladin 303IV. Strategy to Disrupt Terrorist Funding 308A. Financial Tracking before September 11 308B. Financial Tracking after September 11 . 309V. Khalid Shaykh Mohammed (KSM): The Mastermind of September 11 . 309A.B.C.D.E.F.G.H.KSM’s Links to Terrorist Attacks before September 11 310The Hunt for KSM . 311Finding KSM and Building the Case . 311[] . 312Link to al-Qa’ida Discovered . 313The Emphasis on Renditions . 313KSM’s U.S. Connection . 314The Hunt for KSM Continues . 315VI. The FBI’s Investigation of Zacarias Moussaoui Before September 11 . 315VII. The Phoenix Electronic Communication (EC) . 325A.B.C.D.E.F.The Phoenix EC . 325Headquarters’ Response to the Phoenix EC 327New York FBI Office Action in Connection with the Phoenix EC 329Handling of Phoenix EC Indicates FBI Headquarters Weaknesses 329Links from the Phoenix EC to September 11 . 332Previous FBI Focus on Suspected Terrorists at U.S. Flight Schools . 333VIII. Strategic Analysis 336A. The Intelligence Community’s Lack of Strategic Analysis 336B. Analyst Qualifications and Training . 339C. Analysts’ Access to Information . 341vTOP SECRET

TOP SECRETD. Language Skills . 343IX. Views of Outside Experts on the Intelligence Community 345A.B.C.D.E.Setting Priorities . 346Strategy and Organization . 346Should a Strong Director of National Intelligence Be Established? . 347Should the Same Person be both DNI and Director of the CIA? 348Counterterrorism Within the United States and Creation of a DomesticIntelligence Agency 349F. A Legislative Charter for the Intelligence Community . 353G. Respect for the Rule of Law . 353X. Information Sharing 354A. Information Sharing Between Intelligence Agencies and within the FederalGovernment . 355a. National Security Agency . 355b. The Central Intelligence Agency . 357c. The Federal Bureau of Investigation . 357d. The Department of State . 359e. The Federal Aviation Administration (FAA) and the TransportationSecurity Administration (TSA) . 360B. Information Sharing Between Intelligence Agencies and State and LocalOfficials . 361C. Additional Information Sharing Problems . 362D. The Wall - Barriers Between Law Enforcement and Intelligence . 363XI. Technology Gaps . 368A. Technology Gaps at NSA . 368B. [] . . 388C. [] . 388D. [] . 389E. [] . 389F. Selection and Filtering for [] Communications 371G. Analyst Tools . 371H. Collection Platforms 372XII. Technical Collection of Terrorist Communications . 373A. NSA’s Organizational Structure for Collecting Terrorist Communications 374B. Signals Intelligence (SIGINT) and the September 11 Attacks . 374C. A Chronological Review of NSA Collection Efforts Against al-Qa’ida 376D. Technical Collection Problems and Limits at NSA 379a. Difficulties of Gaining Actionable Intelligence on al-Qa’ida . 380viTOP SECRET

TOP SECRETE.F.G.H.b. Difficulties in Adjusting to Terrorist Targets 381c. Problems Keeping Pace with [] Advancesbefore September 11 . 381Insufficient Resources for Counterterrorism at NSA . 382Technical Collection at CIA 384NSA/CIA Disputes over [] Collection . . 384Technical Collection at FBI . 385XIII. Human Intelligence (HUMINT) Collection 385A. CIA Human Intelligence Collection . 386B. DIA Human Intelligence Collection . 390C. FBI Human Intelligence Collection . 391XIV. Summary of Joint Inquiry Review of Anthrax Attacks 393PART FOUR—FINDING, DISCUSSION AND NARRATIVE REGARDINGCERTAIN SENSITIVE NATIONAL SECURITY MATTERS . 395GLOSSARY . 423Additional Views of Members . 436AppendicesviiTOP SECRET

TOP SECRETSenate Select Committee on Intelligence(SSCI)107th CongressMembershipBob Graham, D - Florida, ChairmanRichard C. Shelby, R - Alabama, Vice ChairmanDEMOCRATSREPUBLICANSCarl Levin, MichiganJon Kyl, ArizonaJohn D. Rockefeller, West VirginiaJames M. Inhofe, OklahomaDianne Feinstein, CaliforniaOrrin Hatch, UtahRon Wyden, OregonPat Roberts, KansasRichard J. Durbin, IllinoisMike DeWine, OhioEvan Bayh, IndianaFred Thompson, TennesseeJohn Edwards, North CarolinaRichard Lugar, IndianaBarbara Mikulski, MarylandAl Cumming, Staff DirectorWilliam Duhnke,Minority Staff DirectorviiiTOP SECRET

TOP SECRETHouse Permanent Select Committee on Intelligence(HPSCI)107th CongressMembershipPorter J. Goss, R - Florida, ChairmanNancy Pelosi, D - California, Ranking DemocratREPUBLICANSDEMOCRATSDoug Bereuter, NebraskaSanford D. Bishop, GeorgiaMichael N. Castle, DelawareJane Harman, CaliforniaSherwood L. Boehlert, New YorkGary A. Condit, CaliforniaJim Gibbons, NevadaTim Roemer, IndianaRay LaHood, IllinoisSilvestre Reyes, TexasRandy “Duke” Cunningham, CaliforniaLeonard L. Boswell, IowaPeter Hoekstra, MichiganCollin C. Peterson, MinnesotaRichard Burr, North CarolinaBud Cramer, AlabamaSaxby Chambliss, GeorgiaTerry Everett, AlabamaTimothy R. Sample, Staff DirectorMichael W. Sheehy,Democratic CounselixTOP SECRET

TOP SECRETJOINT HOUSE/SENATE INQUIRY STAFF*Eleanor HillRick CinquegranaDirectorDeputy DirectorDavid BartonAnn BennettDaniel BymanMichael DavidsonGeorge EllardRahul GuptaKay HoltJohn IvicicMichael JacobsonEverette JordanMiles KaraJohn KeefeThomas KelleyDana LesemannPatti LitmanArthur MennaLewis MoonPatricia RavalgiAlonzo RobertsonRobert RosenwaldMichael SmithCatherine Williams*As of December 1, 2002. In addition, a substantial contribution to the development and direction of the JointInquiry was made by the Staff’s first Staff Director, Britt Snider. Other original members of the staff includedCatherine Lotrionte, who left the staff in the summer of 2002.xTOP SECRET

TOP SECRETABRIDGED FINDINGS AND CONCLUSIONSFACTUAL FINDINGS1. Finding: While the Intelligence Community had amassed a great deal of valuableintelligence regarding Usama Bin Ladin and his terrorist activities, none of it identified thetime, place, and specific nature of the attacks that were planned for September 11, 2001.Nonetheless, the Community did have information that was clearly relevant to theSeptember 11 attacks, particularly when considered for its collective significance.2. Finding: During the spring and summer of 2001, the Intelligence Community experienceda significant increase in information indicating that Bin Ladin and al-Qa’ida intended tostrike against U.S. interests in the very near future.3. Finding: Beginning in 1998 and continuing into the summer of 2001, the IntelligenceCommunity received a modest, but relatively steady, stream of intelligence reporting thatindicated the possibility of terrorist attacks within the United States. Nonetheless, testimonyand interviews confirm that it was the general view of the Intelligence Community, in thespring and summer of 2001, that the threatened Bin Ladin attacks would most likely occuragainst U.S. interests overseas, despite indications of plans and intentions to attack in thedomestic United States.4. Finding: From at least 1994, and continuing into the summer of 2001, the IntelligenceCommunity received information indicating that terrorists were contemplating, amongother means of attack, the use of aircraft as weapons. This information did not stimulateany specific Intelligence Community assessment of, or collective U.S. Government reactionto, this form of threat.5. Finding: Although relevant information that is significant in retrospect regarding theattacks was available to the Intelligence Community prior to September 11, 2001, theCommunity too often failed to focus on that information and consider and appreciate itscollective significance in terms of a probable terrorist attack. Neither did the IntelligenceCommunity demonstrate sufficient initiative in coming to grips with the new transnationalthreats. Some significant pieces of information in the vast stream of data being collectedwere overlooked, some were not recognized as potentially significant at the time andtherefore not disseminated, and some required additional action on the part of foreigngovernments before a direct connection to the hijackers could have been established. For allthose reasons, the Intelligence Community failed to fully capitalize on available, andpotentially important, information. The sub-findings below identify each category of thisinformation.TOP SECRETxi

TOP SECRET[Terrorist Communications in 1999]5.a. [During 1999, the National Security Agency obtained a number ofcommunications – none of which included specific detail regarding the time, place ornature of the September 11 attacks -- connecting individuals to terrorism who wereidentified, after September 11, 2001, as participants in the attacks that occurred onthat day.]Malaysia Meeting and Travel of al-Qa’ida Operativesto the United States5.b. The Intelligence Community acquired additional, and highly significant,information regarding Khalid al-Mihdhar and Nawaf al-Hazmi in early 2000.Critical parts of the information concerning al-Mihdhar and al-Hazmi lay dormantwithin the Intelligence Community for as long as eighteen months, at the very timewhen plans for the September 11 attacks were proceeding. The CIA missed repeatedopportunities to act based on information in its possession that these two Bin Ladinassociated terrorists were traveling to the United States, and to add their names towatchlists.[Terrorist Communications in Spring 2000]5.c. [In January 2000, after the meeting of al-Qa’ida operatives in Malaysia, Khalidal-Mihdhar and Nawaf al-Hazmi entered the United States [].Thereafter, the Intelligence Community obtained information indicating that anindividual named “Khaled” at an unknown location had contacted a suspectedterrorist facility in the Middle East. The Intelligence Community reported some ofthis information, but did not report all of it. Some of it was not reported because itwas deemed not terrorist-related. It was not until after September 11, 2001 that theIntelligence Community determined that these contacts had been made from futurehijacker Khalid al-Mihdhar while he was living within the domestic United States.][Two Hijackers Had Numerous Contacts With an Active FBI Informant]5.d. [This Joint Inquiry confirmed that these same two future hijackers, Khalid alMihdhar and Nawaf al-Hazmi, had numerous contacts with a long time FBIcounterterrorism informant in California and that a third future hijacker, HaniHanjour, apparently had more limited contact with the informant. In mid- to late2000, the CIA already had information indicating that al-Mihdhar had a multipleentry U.S. visa and that al-Hazmi had in fact traveled to Los Angeles, but the two hadnot been watchlisted and information suggesting that two suspected terrorists couldwell be in the United States had not yet [page xiii] been given to the FBI. The SanDiego FBI field office that handled the informant in question, did not receive thatTOP SECRETxii

TOP SECRETinformation or any of the other intelligence information pertaining to al-Mihdhar andal-Hazmi, prior to September 11, 2001. As a result, the FBI missed the opportunity totask a uniquely well-positioned informant -- who denies having any advanceknowledge of the plot --- to collect information about the hijackers and their planswithin the United States].The Phoenix Electronic Communication5.e. On July 10, 2001, an FBI Phoenix field office agent sent an “ElectronicCommunication” to 4 individuals in the Radical Fundamentalist Unit (RFU) and twopeople in the Usama Bin Ladin Unit (UBLU) at FBI headquarters, and to two agentson International Terrorism squads in the New York Field Office. In thecommunication, the agent expressed his concerns, based on his first-hand knowledge,that there was a coordinated effort underway by Bin Ladin to send students to theUnited States for civil aviation-related training. He noted that there was an“inordinate number of individuals of investigative interest” in this type of training inArizona and expressed his suspicion that this was an effort to establish a cadre ofindividuals in civil aviation who would conduct future terrorist activity. The PhoenixEC requested that FBI Headquarters consider implementing four recommendations: accumulate a list of civil aviation university/colleges around the country;establish liaison with these schools;discuss the theories contained in the Phoenix EC with the Intelligence Community; andconsider seeking authority to obtain visa information concerning individuals seeking toattend flight schools.However, the FBI headquarters personnel did not take the action requested by the Phoenixagent prior to September 11, 2001. The communication generated little or no interest ateither FBI Headquarters or the FBI’s New York field office.The FBI Investigation of Zacarias Moussaoui5.f. In August 2001, the FBI’s Minneapolis field office, in conjunction with the INS,detained Zacarias Moussaoui, a French national who had enrolled in flight training inMinnesota. FBI agents there also suspected that Moussaoui was involved in ahijacking plot. FBI Headquarters attorneys determined that there was not probablecause to obtain a court order to [page xiv] search Moussaoui’s belongings under theForeign Intelligence Surveillance Act (FISA). However, personnel at FBIHeadquarters, including the Radical Fundamentalism Unit and the National SecurityLaw Unit, as well as agents in the Minneapolis field office, misunderstood the legalstandard for obtaining an order under FISA. As a result, FBI Minneapolis FieldOffice personnel wasted valuable investigative resources trying to connect theChechen rebels to al-Qa’ida. Finally, no one at the FBI apparently connected theMoussaoui investigation with the heightened threat environment in the summer ofTOP SECRETxiii

TOP SECRET2001, the Phoenix communication, or the entry of al-Mihdhar and al-Hazmi into theUnited States.Hijackers In Contact With Persons of FBI Investigative Interestin the United States5.g. The Joint Inquiry confirmed that at least some of the hijackers were not asisolated during their time in the United States as has been previously suggested.Rather, they maintained a number of contacts both in the United States and abroadduring this time period. Some of those contacts were with individuals who wereknown to the FBI, through either past or, at the time, ongoing FBI inquiries andinvestigations. Although it is not known to what extent any of these contacts in theUnited States were aware of the plot, it is now clear that they did provide at leastsome of the hijackers with substantial assistance while they were living in thiscountry.Hijackers’ Associates in Germany5.h. [Since 1995, the CIA had been aware of a radical Islamic presence in Germany,including individuals with connections to Usama Bin Ladin. Prior to September 11,2001, the CIA had unsuccessfully sought additional information on individuals whohave now been identified as associates of some of the hijackers.]Khalid Shaykh Mohammad5.i. Prior to September 11, the Intelligence Community had information linkingKhalid Shaykh Mohammed (KSM), now recognized by the Intelligence Communityas the mastermind of the attacks, to Bin Ladin, to terrorist plans to use aircraft asweapons, and to terrorist activity in the United States. The Intelligence Community,however, relegated Khalid Shaykh Mohammed (KSM) to rendition target statusfollowing his 1996 indictment in connection with the Bojinka Plot and, as a[page xv] result, focused primarily on his location, rather than his activities and placein the al-Qa’ida hierarchy. The Community also did not recognize the significance ofreporting in June 2001 concerning KSM’s active role in sending terrorists to theUnited States, or the facilitation of their activities upon arriving in the United States.Collection efforts were not targeted on information about KSM that might havehelped better understand al-Qa’ida’s plans and intentions, and KSM’s role in theSeptember 11 attacks was a surprise to the Intelligence Community.TOP SECRETxiv

TOP SECRET[Terrorist Communications in September 2001]5.j. [In the period from September 8 to September 10, 2001 NSA intercepted, but didnot translate or disseminate until after September 11, some communications thatindicated possible impending terrorist activity.]CONCLUSION – FACTUAL FINDINGSIn short, for a variety of reasons, the Intelligence Community failed to capitalize on both theindividual and collective significance of available information that appears relevant to the events ofSeptember 11. As a result, the Community missed opportunities to disrupt the September 11th plot bydenying entry to or detaining would-be hijackers; to at least try to unravel the plot throughsurveillance and other investigative work within the United States; and, finally, to generate aheightened state of alert and thus harden the homeland against attack.No one will ever know what might have happened had more connections been drawn betweenthese disparate pieces of information. We will never definitively know to what extent the Communitywould have been able and willing to exploit fully all the opportunities that may have emerged. Theimportant point is that the Intelligence Community, for a variety of reasons, did not bring together andfully appreciate a range of information that could have greatly enhanced its chances of uncovering andpreventing Usama Bin Ladin’s plan to attack these United States on September 11, 2001.SYSTEMIC FINDINGSOur review of the events surrounding September 11 has revealed a number of systemicweaknesses that hindered the Intelligence Community’s counterterrorism efforts before September11. If not addressed, these weaknesses will continue to undercut U.S. counterterrorist efforts. Inorder to minimize the possibility of attacks like September 11 in the future, effective solutions tothose problems need to be developed and fully implemented as soon as possible.[page xvi]1. Finding: Prior to September 11, the Intelligence Community was neither well organizednor equipped, and did not adequately adapt, to meet the challenge posed by global terroristsfocused on targets within the domestic United States. Serious gaps existed between thecollection coverage provided by U.S. foreign and U.S. domestic intelligence capabilities. TheU.S. foreign intelligence agencies paid inadequate attention to the potential for a domesticattack. The CIA’s failure to watchlist suspected terrorists aggressively reflected a lack ofemphasis on a process designed to protect the homeland from the terrorist threat. As aresult, CIA employees failed to watchlist al-Mihdhar and al-Hazmi. At home, thecounterterrorism effort suffered from the lack of an effective domestic intelligencecapability. The FBI was unable to identify and monitor effectively the extent of activity byal-Qa’ida and ot

before and after the terrorist attacks of september 11, 2001 _ report of the u.s. senate select committee on intelligence and u.s. house permanent select committee on intelligence together with additional views december 2002

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.