SlideShare a Scribd company logo
1 of 142
Securing the United States-Mexico Border:
An On-Going Dilemma
Karina J. Ordóñez
INTRODUCTION
For decades, the United States federal government has
developed and implemented
border security strategies to counter illegal cross-border
activity. While some strategies
have alleviated the influx of illegal immigration to certain
geographic areas, increased
border controls in these locations have made other, less
controlled areas of the border
more vulnerable. Rising crime rates, discarded debris, increased
apprehension rates,
and growing public scrutiny in these less secure areas provide
clear evidence that border
security is at once a social, an economic, and a national security
issue.
Prior to 9/11, the United States Border Patrol (USBP) had
established security efforts
along the international border. Since then, however, the
constant flow of unauthorized
migrants and “the increasing mobility and destructive potential
of modern terrorism has
required the United States to rethink and rearrange
fundamentally its systems for
border…security.”1 Yet, despite the border security efforts of
the Bush Administration
and the United States Department of Homeland Security (DHS),
the problem persists
and continues to worsen, particularly along the Arizona-Sonora
border (ASB). There is a
critical need to rethink border security systems, particularly
along the Southwest border,
that leads observers to ponder: who is primarily responsible for
securing our borders?
What is the USBP doing to secure the border given the
additional threat of terrorism?2
Defining Borders
In order to articulate functional definitions, the “border” refers
to the 2,000 mile geo-
political divide between the United States and Mexico.
However, for purposes of this
paper, the “border” is specifically the international border
between the State of Arizona,
United States and the State of Sonora, Mexico. The 377-mile
Arizona-Sonora Border
(ASB) is a portion of one of the world’s busiest international
boundaries and, as such, an
overwhelming number of cross-border illegal and legal
activities occur there daily.3
Although there is a geo-political border, a full understanding of
the complexities and
dynamics of the ASB requires recognition and analysis of the
communities on both sides
of the border. The economic dependency, and the environmental
and cultural ties
between these border communities, adds a multifaceted dynamic
and dimension to
understanding the ASB. This cultural, social, and economic
region has received
recognition from governments and the public; therefore, to
encompass these intrinsic
interdependencies, the term “border region” was officially
recognized in 1983 in the La
Paz Agreement. The border region includes 100 kilometers (67
miles) north and south
of the geopolitical divide between the United States and
Mexico.4 The border region has
a population of approximately three million people, and it
continues to grow
exponentially as compared to the national average of both the
United States and
Mexico.5 This includes all of the cities, town, communities,
tribes, and counties within
this area, which share common challenges.
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
2
9/11 brought a new dimension to the problem of illegal
immigration with potential
terrorists seeking to enter the country, thereby elevating border
security to a national
priority. The United States government responded to 9/11 with
the creation of DHS, a
department tasked with “preventing terrorist attacks within the
United States, reducing
American’s vulnerability to terrorism and minimizing the
damage and recovery from
attacks that do occur.”6 DHS was created under the Homeland
Security Act of 2002 and
merged twenty-two agencies into one department and ostensibly
one mission. One of
the newly created directorates was Border and Transportation
Security, which abolished
the Immigration and Naturalization Services (INS) and divided
its functions among
Citizenship and Immigrant Services (CIS), Immigration and
Customs Enforcement
(ICE), U.S. Coast Guard (USCG), and Customs and Border
Protection (CBP). While
these units continue to exist within DHS, the directorate of
Border and Transportation
Security was recently disbanded by Secretary Chertoff, in July
2005. Now, CIS processes
legal immigration services and enforces illegal immigration
along with the USCG, ICE,
and CBP. The duties of illegal immigration enforcement are
further divided between
ICE and CBP: ICE enforces immigration law within the interior
of the United States and
CBP, USBP enforces and protects the United States border. The
goal in integrating
customs inspectors, immigration inspectors, and agricultural
inspectors under CBP was
to provide one face at the border and one comprehensive
strategy with a unity of force.
However, USBP – although a unit of CBP – remains distinct,
with its own mission and
force.
By law and according to the National Border Patrol Strategy,
CBP is the
authoritative law enforcement agency charged to protect the
nation’s borders and
ensure that the United States is not penetrated by terrorists,
unauthorized migrants,
human smugglers, human traffickers, drug smugglers, or
contraband.7 Under the
auspices of a new directorate, the priority mission of the USBP
is homeland security,
defined as “nothing less than preventing terrorists and terrorist
weapons – including
potential weapons of mass destruction – from entering the
United States.”8 The priority
mission functionally establishes and maintains operational
control of the United States
border between the ports of entry (POE). On the other hand, it
is CBP’s mission to
control the United States border as a whole. The aftermath of
9/11 caused policy makers
to expand the traditional mission to include preventing terrorists
and terrorist weapons
from entering the United States, in addition to “interdicting
illegal aliens and drugs and
those who attempt to smuggle them across our borders.”9 The
USBP’s area of operation
and responsibility is between land and sea POE, which extends
across 7,000 miles of
border with Canada and Mexico and 12,000 miles of coastal
borders.
Border Strategy, 1994-2004
While the USBP patrols both the northern and southern borders,
90 percent of USBP
resources are deployed along the United States-Mexico Border
(USMB) because it is
considered the focal point for illegal immigration with ninety-
seven percent of all illegal
alien apprehensions.10 The four border states along the USMB
are divided into nine
USBP Sectors: San Diego and El Centro, California; Yuma and
Tucson, Arizona; El Paso
(New Mexico and two counties in Texas); Marfa, Del Rio,
Laredo and McAllen, Texas.
While these four states share a geopolitical and geo-physical
border with Mexico, they
do not share the same topography, climate, or challenges.
Accordingly, the USBP faces
the challenge of developing different operational tactics and
techniques for each sector.
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
3
Tucson Sector represents forty-three percent of the total annual
Southwest USBP’s
apprehensions.11 This percentage indicates that most of the
illegal cross-border activity
occurs within 262 miles of the total 2,000 miles of international
border with Mexico.12
Table 1 indicates that in the past decade the Tucson Sector has
become the most active
in terms of illegal cross-border activity, with a significant
increase in total
apprehensions along the Southwest border: from eight percent in
1993 to forty-three
percent in 2004.
Table 1. United States Border Patrol Apprehension Statistics
1993 – 2004.
From: United States Border Patrol, “Apprehension Statistics
1993 -2004: Data Presented
in Actual Numbers and as a Percentage of Total Southwest
Apprehensions,”
http://www.lawg.org/docs/apprehension%20stats.pdf.
According to the INS, this phenomenon is a tactical dimension
of the INS’ National
Strategic Plan, which accounts for various ways to control the
influx of illegal
immigration in the concentrated border areas of San Diego and
El Paso. In 1994, the
INS focused enforcement efforts in San Diego and El Paso; the
goal was to shift
migrants outside of the urban area, to more open areas, a
strategic and tactical intention
of INS. The intention was not to shift migrants into different
jurisdictions; instead it was
to continue shifting the migrants and break up criminal
networks by gaining control in
the less secure areas over time. As indicated by the USBP Chief
David Aguilar:
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
4
Historically, major CBP Border Patrol initiatives, such as
Operation Hold the
Line, Operation Gatekeeper, and Operation Rio Grande in our
El Paso, San
Diego, and McAllen Sectors, respectively, have had great
border enforcement
impact on illegal migration patterns along the southwest border,
proving that a
measure of control is possible. Together, these border security
operations have
laid the foundation for newer strategies and enforcement
objectives and an
ambitious goal to gain control of our Nation's borders,
particularly our border
with Mexico.13
Border security experts argue that the border security strategy is
at a stage where the
migration flow is concentrated in Arizona. However, this
concentration can be due to
changes in leadership, administrations and a non-continuous
flow of resources to these
less secure areas, leaving the Tucson Sector as the primary
gateway for illegal cross-
border activity along the USMB. The various border operations
mentioned in Chief
Aguilar’s testimony are part of the first phases of the overall
national border security
strategy developed in the early 1990s. DHS is developing and
implementing new
strategies – such as the Arizona Border Control Initiative – to
continue the border
security strategy’s second phase in minimizing the
vulnerabilities along the
international border.
A review of USBP strategy from 1993 to 2004 will help
illuminate how these
particular USBP strategies led to the current challenges faced
by the Arizona Tucson
Sector. The build-up of border enforcement along the USMB
first started in the early
1990s under the Clinton Administration, in response to public
concern about illegal
immigration from Mexico and its effect on public services and
employment in the
United States.14 Experts called for a strategy that would
simultaneously increase tighter
enforcement of United States immigration laws while the North
American Free Trade
Agreement (NAFTA) spurred Mexican economic growth.
Together, these experts
asserted, both would help reduce the flow of illegal immigration
from Mexico to the
United States. Consequently, INS designed several border
security strategies to prevent
illegal cross-border activity. These strategies derived from a
mixture of community
policing theory and a low-intensity warfare concept. In
addition, the challenges along
the border were concentrated, and the need to protect the
international border from
illegal entry caused border security experts to research and
implement new theories.
Border security strategies focused on deterrence by deploying
large numbers of border
patrol agents, increasing the hours of actual border patrolling,
and enhancing border
security technology. These resources were deployed to
strategically designated areas of
the Southwest border with the greatest number of crime and
disorder. During this
period, the San Diego and El Paso sectors represented the
gateways used by 70-80
percent of the unauthorized migrants entering the United
States.15 The strategy made
sense and the demand for federal response resulted in the
implementation of this
strategy with the greatest border security funding appropriation
in United States
history.
Rather than spread the resources across the entire USMB, the
INS “concentrated
border enforcement strategies” were implemented in four
specific segments of the
international border: Operation Hold-the-Line in El Paso, Texas
in 1993, Operation
Gatekeeper in San Diego in 1994, Operation Rio Grande for
South Texas in 1997, and
Operation Safeguard in central Arizona in 1995.16 These
strategies were developed with
the intention of increasing the USBP’s probability of
apprehension to a level that would
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
5
deter potential migrants from crossing into El Paso or San
Diego. Eventually, the intent
was for border crossers to “spread the word” on the difficulty of
entering the United
States (without being apprehended) to potential migrants and
deter them from leaving
their hometowns in Mexico and other countries.
Operation Safeguard began operations in 1999 in Nogales,
Arizona. It was not until
1999 that USBP in Arizona began to participate in the
concentrated border enforcement
strategy. Some experts argue that this was because Arizona
contains extensive natural
hazards, which were perceived as a deterrent to migrants
attempting a clandestine entry
into the United States. Former INS Commissioner Doris
Meissner believed no one
would risk their lives to illegally cross the border in areas of
formidable mountains and
extreme desert temperatures.17 Essentially, “Mother Nature”
would take care of USBP’s
responsibility. However, experts were incorrect in this
assumption, as seen by the
significant loss of life by many migrants attempting to cross in
these geographically
desolate areas.18
A Strategy for the Next Decade
Our nation is still facing a steady increase in the number of
illegal immigrants residing
in our communities along with an increase in the number of
deaths in the desert; both
demonstrate that the current border enforcement system is
flawed.19 Roughly ten years
after the implementation of the INS Strategic Plan, border
security remains a critical
national mission. Throughout this period, the United States has
increased funding for
immigration control and border security initiatives. These
increases have not translated
into a more secure border and are still deemed inadequate to
meet the post-9/11
mission. According to the Search for International Terrorist
Entities (SITE) Institute,
the border enforcement policy was unsuccessful because
“despite extensive surveillance,
the border remains porous because of the stretches of desert it
crosses and Mexico's
established smuggling networks.”20 This premise was a
component of the INS National
Strategic Plan, yet the border remains insecure.
While these border security efforts had a significant impact in
the San Diego and El
Paso Sector, less secure sectors are suffering from the
incomplete multi-phase
implementation of the National Border Strategy. The ASB
current border insecurity
situation is due to the incomplete implementation of the
National Border Strategy Phase
II; insufficient resources continue to be deployed within the
Tucson Sector.
Two main factors contribute to the ever-increasing demands
placed upon border
security resources along the USMB. First, the pressure of
enhanced law enforcement
strategies in certain sectors has resulted in a shift of migrants
from more secure urban
areas to those rural communities that are less protected and
populated.21 For example,
as crime rates dropped in San Diego and El Paso, due to more
concentrated border
security efforts, the Tucson Sector experienced an increase in
illegal activity
supplemented by violent crimes of auto-theft, extortion, rape,
and homicide. Moreover,
on a statewide basis, both Arizona and Sonora are currently
facing higher crime rates.
Arizona ranks first in auto-theft and third in homicide in the
United States, while
Sonora ranks third in homicide in Mexico. 22
Second, Mexico is experiencing an influx of Islamic
migrants.23 Conceivably, as the
United States government increases security measures and
tightens immigration law,
potential terrorists may seek the assistance of human smugglers
to infiltrate the porous
international border. If this proves to be the case, then the
policymakers should ask the
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
6
same question that Arizona Senator Kyl posed on August 27,
2004: “Why wouldn’t those
seeking to attack America be tempted to join the hundreds of
thousands already illegally
entering from Mexico?”24 In fact, intelligence collected from
domestic and international
law enforcement communities indicates that terrorists are
seeking other means to enter
the United States.25 As terrorist organizations continue to
network in Mexico and exploit
sophisticated organized smuggling rings, the USBP could
seemingly be faced with a new
paradigm: human smugglers, colloquially known as Coyotes, as
potential terrorist
partners.
As noted, in the early 1990s the USBP launched a concentrated
border security
strategy in the El Paso and San Diego Sectors causing migrants
and smugglers to move
their operations to less secure sectors along the USMB. The
United States General
Accounting Office report suggests that these strategies showed
positive results for both
sectors. However, the remaining seven sectors along the
Southwest border saw an
increase in illegal cross-border activity, particularly the Tucson
Sector. In 1993, the San
Diego Sector represented 43.6 percent of the Southwest border
apprehensions, and the
El Paso Sector represented 23.6 percent.26 Yet, as the USBP
claimed victory in the San
Diego and El Paso Sectors with a reduction in apprehensions by
6 percent and 72
percent, respectively, the Tucson Sector experienced an increase
of 50 percent.27 This
increase is a clear indication of the balloon effect along the
USMB: the displacement of
illegal cross-border activity to another, less secure, sector of the
international border.
This phenomenon was an intended consequence of the National
Strategic Plan and
demonstrated that the border control efforts in the San Diego
and El Paso Sectors were
working. However, the migrant flow shift was not intended to
stop in the USBP Tucson
Sector; instead, the intent was to continuously shift migrants
from one sector to another
causing disruption of organized smuggling rings. This strategy
derives from the theory
of hot spots and the practice of community-oriented policing.
Place-oriented crime prevention strategies, a component of
community policing, are
commonly used by law enforcement agencies throughout the
United States. The theory
behind place-oriented crime prevention suggests that crime
occurs in clusters, or “hot
spots,” and is not evenly distributed throughout the United
States. As defined by the
United States Department of Justice, Office of Justice
Programs:
A hot spot is an area that has a greater than average number of
criminal or
disorder events, or an area where people have a higher than
average risk of
victimization. This suggests the existence of cool spots –
places or areas with less
than average amount of crime or disorder.28
This phenomenon is used by individuals everyday, evidenced by
the places people tend
to avoid given their probability of victimization. This suggests
that crime is not evenly
distributed. One can deduce that the National Strategic Plan
drew from this theory; this
is evident because resources were focused in the urban areas.
The USBP continues to
implement strategies that are complementary to community
policing. Experts suggest
that this “hot spots” phenomenon is supported by three
complementary theories:
environmental criminology, routine activities, and rational
choice. Environmental
criminology theory explores and analyzes the environment in
which a criminal act is
conducted. The analysis takes into consideration the criminal
interaction with targets,
the opportunities across space and time, and the characteristics
of the area, such as safe
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
7
havens. Routine activities theory is based on the notion that in
the absence of a capable
guardian, crime occurs when the bandit comes into close
proximity of a potential target.
Rational choice theory is based on the belief that bandits are
capable of making their
own decisions and opt to commit crime in order to benefit.
Another interesting analysis that is drawn from community-
policing is that as law
enforcement pressure is applied in “hot spots,” crimes begin to
emerge in “cool spots.”
Experts claim “focused police interventions, such as directed
patrols, proactive arrests,
and problem solving, can produce significant crime prevention
gains at high-crime ‘hot
spots.’”29 In a nutshell, “hot spot” policing suggests that if the
environment is
manipulated (i.e., increased patrols, arrests, etc.), then victims
and offenders have fewer
interactions and bandits have fewer opportunities to commit
crimes, which ultimately
results in a decrease in the crime rate. In addition, once a “hot
spot” is controlled and
crime has decreased, bandits will move to a less patrolled area
to continue their criminal
activities. These criminal migrations are occurring at the
Southwest border.
Apprehension statistics are a clear indication that illegal border
crossers (IBC) have
migrated to areas less patrolled by USBP, such as the Tucson
Sector.
The USBP has focused its resources in the urban areas along the
international border
for a variety of reasons, such as preventing bandits from
interacting with border
community residents and restricting bandits from access to safe
havens or camouflaging
into the community. In addition, the balloon effect experienced
in the Tucson Sector
parallels the concept of “hot spots” in urban areas. Once the
community policing
addresses a “hot spot” crime area, the crime moves into a less
policed area. Similarly,
when the USBP focuses enforcement efforts along the USMB,
migrants and bandits
move into less secured sectors. This shift was the intention of
the USBP’s concentrated
border security strategy. Therefore, USBP was not surprised to
see bandits and
smugglers moving towards the Tucson Sector.
Why, then, isn’t the USBP Tucson Sector prepared to handle the
influx of migrants?
The answer could be a combination of issues – politics,
resources, or the simple notion
that geographical constraints would be a sufficient deterrent for
migrants entering the
United States. The United States government must continue to
develop and implement
timely border security strategies that take into consideration the
movement of illegal
activities along the border in order to successfully secure the
USMB, as described above.
However, the post-9/11 need to protect the United States from
another terrorist attack
requires intelligence analysts to observe for potential emerging
terrorist threats along
the international border and then quickly address these threats
with stealth and
innovation.
One
Solution
: The ASB Model
While the efforts of Congress and the USBP continue, the
illegal immigration problem
persists and becomes increasingly divisive in communities
nationwide. The current
deployment and employment of resources must be revisited to
increase efficiency and
alleviate the challenges along the USMB. The application of
force along the border,
without the proper use of intelligence to modify the use of force
in a timely and adequate
manner along the USMB, could potentially accelerate the
“balloon effect.” The use of
the Arizona-Sonora Border (ASB) model or a similar border
model would allow
strategists to minimize the geographical displacement effects
prior to applying force
along the USMB.
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
8
The ASB model is an analytic model that incorporates factors
relevant to the problem
of illegal cross-border activity in the USBP Tucson Sector.
While a model can never fully
reflect the true complexity of illegal cross-border activity
factors, illegal cross-border
activity has some structural features that lend themselves to
analytical modeling. In
other words, illegal cross-border activity is not a random event;
it exhibits organized
and structured occurrences and can be modeled. The ASB model
is a “plug and play”
model that can assist in forecasting what may occur along the
border within a five day
window, given certain IBCs’ distribution and USBP resource
deployment. The model
does not project actual numbers of IBCs, but rather the success
rate of the USBP as a
function of the infiltration and migration patterns, and the
resources mix. Given a
certain distribution of IBCs, and different migration rates, the
question is: how should
USBP Border Security resources be deployed to be most
effective? Specifically, the
model examines the effect of apprehension rates (which depend
on the resources mix)
on the number of IBCs that successfully evade the USBP.
Given the functional relation,
one can calculate the desired deployment of resources in order
to optimize effectiveness.
The purpose of the ASB model is to assist policymakers and
operational planners to
address the problem of illegal cross-border activity with a
logical and systematic
approach. The mathematical model can help organize, articulate,
and analyze the
essential problems in the USBP Tucson Sector. The ASB model
provides insight into the
complex interdependencies that exist in establishing and
maintaining control of the
international border with Mexico. It captures the interactions
among the location and
intensity of cross-border activities, apprehension rates, and
migration rates. This model
is an attempt to offer a mathematical solution to the problem of
optimal deployment of
border security resources in the USBP Tucson Sector along the
ASB. The appropriate
employment and deployment of border security resources can
minimize illegal cross-
border activity and reduce the border’s vulnerabilities.
CONCLUSION
The ASB model examines illegal cross-border activity situations
in the USBP Tucson
Sector, or any part of it, and forecasts the effectiveness of
USBP border security
resources deployment. Although this model is specific to the
USBP Tucson Sector, it can
be implemented anywhere along the Southwest Border with
minor modifications. The
ASB model demonstrates that by increasing border security
enforcement efforts, it may
augment humanitarian concerns along the USMB. As migrants
move away from high
enforcement areas to low enforcement areas, in other words,
they move away from areas
where the border security enforcement is more effective, and
are thus exposed to greater
natural hazards. Therefore, as operational planners and policy
makers develop new
strategies, these humanitarian concerns and consequences need
to be taken into
consideration in order to reduce deaths in the desert and
improve bi-national relations
with Mexico.
Karina J. Ordóñez is the strategic policy coordinator for the
Arizona Department of Homeland
Security. In this capacity, she is the primary advisor to the
deputy director in matters
pertaining to national policy and serves as the state agency
liaison focusing on public health,
agro-terrorism, bioterrorism, and disaster preparedness. Special
projects in her portfolio
include developing the State Homeland Security Strategy and
the State Infrastructure
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
9
Protection Plan. She is a graduate of the Naval Postgraduate
School’s Center for Homeland
Defense and Security.
1 Office of Homeland Security, National Strategy for Homeland
Security (Washington DC: Government
Printing Office, July 2002), 21.
2 This paper is drawn from Karina J. Ordóñez, Modeling the
U.S. Border Patrol Tucson Sector for the
Deployment and Operations of Border Security Forces, M.A.
thesis, Naval Postgraduate School, 2006.
3 United States Border Patrol, “Apprehension Statistics 1993 -
2004: Data Presented in Actual Numbers
and as a Percentage of Total Southwest Apprehensions” (2005),
http://www.lawg.org/docs/apprehension%20stats.pdf.
4 La Paz Agreement defined the border region as 100 km north
and 100 km south of the United States-
Mexico International border. See “La Paz Agreement,” (August
14, 1983). Text of the La Paz Agreement,
including Annex I-V is available at
http://yosemite.epa.gov/oia/MexUSA.nsf/La+Paz+Agreement+-
+Web?OpenView&ExpandView.
5 United States Bureau of the Census, Annual Estimates of the
Population for Counties of Arizona: April
1, 2000 to July 1, 2004, CO-EST2004-01-04 (Washington DC:
Population Division, United States Census
Bureau, 2005), and El Instituto Nacional de Estadísticas,
Geográfica e Informática (the Mexican Bureau
of Statistics, Geography and Computer Science), Estadísticas de
Población por Estado (Population
Statistics by State), 2000.
6 Office of Homeland Security, National Strategy for Homeland
Security (Washington DC: Government
Printing Office, July 2002), 2.
7 The Labor Appropriation Act of 1924 established the United
States Border Patrol in response to rising
illegal entries particularly along land borders.
8 Robert C. Bonner, National Border Patrol Strategy: Message
from the Commissioner (Washington
DC: United States Customs and Border Protection, Office of
Border Patrol and the Office of Policy and
Planning, September 2004).
9 Ibid.
10 Lisa Seghetti, et al., “Border Security and the Southwest
Border: Background, Legislation, and Issues,”
#RL33106 (Washington, DC: Congressional Research Service,
September 28, 2005): 21.
11 United States Border Patrol. “Apprehension Statistics 1993 -
2004.”
12 The illegal cross-border activity accounted for is the activity
that is observed and interdicted.
13 David Aguilar, United States Border Patrol Chief, testimony
before the House Committee on
Appropriations and Subcommittee on Homeland Security, July
12, 2005.
http://usinfo.state.gov/gi/Archive/2005/Jul/14-680142.html
14 Wayne Cornelius, “Controlling ‘Unwanted’ Immigration:
Lessons from the United States, 1993 – 2004”
(San Diego, CA: University of California Center for
Comparative Immigration Studies, December 2004),
2.
15 Ibid., 6.
16 The majority of resources for Operation Safeguard did not
arrive until 1999.
17 Cornelius, “Controlling ‘Unwanted’ Immigration,” 6.
ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER
HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2
(2008) WWW.HSAJ.ORG
10
18 Bill Vann, “Five Years of Operation Gatekeeper: U.S.
Border Crackdown Deaths Souring,”
International Committee of the Fourth International (ICFI), June
25, 1999,
http://www.wsws.org/articles/1999/jun1999/ins-j25.shtml.
19 Jeffrey Passel, “Unauthorized Migrants: Numbers and
Characteristics,” Pew Hispanic Center, June 14,
2005. http://pewhispanic.org/reports/report.php?ReportID=46
20 Richard B. Schmitt, et al., “U.S. Fears Terrorism Via
Mexico’s Time-Tested Smuggling Routes,” SITE
Institute, September 15, 2004,
http://www.siteinstitute.org/bin/articles.cgi?ID=news18904&Ca
tegory=news&Subcategory=0.
21 This is one theory with regards to the displacement of
migrants along the USMB. An alternative theory
is the economic growth rates experienced in Phoenix and Las
Vegas. These two cities are experiencing a
fast growth rate followed by an increase in construction and
employment. This boom in jobs in Nevada
and Arizona causes the illegal migrant flow to switch to follow
the employment opportunities.
22 Arizona Criminal Justice Commission, Arizona Crime
Trends: A System Review, Statistical Analysis
Center Publication, July 22, 2005,
http://azcjc.gov/pubs/home/Crime_Trends_2005.pdf. Consejo de
Seguridad Publica, “Programa de Mediano Plazo 2004 - 2009:
Seguridad Publica,”
http://www.sonora.gob.mx/biblioteca/documentos/pmp/segurida
d.pdf.
23 A few days after 9/11, Mexican authorities detained 126
undocumented Iraqis in Mexico City. Since all
Middle Easterners are supposed to have a VISA to enter the
country, this presented a new problem for
Mexican authorities: how did these people enter the country?
Centro de Investigaciones Económicas y
Política de Acción Comunitaria, “Guerra Mundial:
Consecuencias Para México,” November 21, 2001,
http://www.ciepac.org/bulletins/200-300/bolec267.htm.
24 Senator Jon Kyl, “Arizona: a ‘Terrorist Corridor?’” Guest
Opinion, The Arizona Conservative, August
27, 2004,
http://www.azconservative.org/Kyl_TerrorismCorridor.htm.
25 Admiral James Loy, United States Department of Homeland
Security deputy secretary, testimony
before the Senate Select Committee on Intelligence, February
16, 2005.
http://www.dhs.gov/xnews/testimony/testimony_0030.shtm
26 United States General Accounting Office, Border Control:
Revised Strategy is Showing Positive
Results, Report to the Chairman, Subcommittee on Information,
Justice, Transportation and Agriculture,
Committee on Government Operations, House of
Representatives, Washington DC, December 1994: 11.
27 Ibid.
28 Office of Justice Programs, Mapping Crime: Understanding
Hot Spots (Washington DC: United States
Department of Justice, August 2005),
http://www.ojp.usdoj.gov/nij.
29 Ibid.
DHS and DOD Announce Continued Partnership in
Strengthening Southwest Border Security
Release Date:
December 20, 2011
For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010 begin_of_the_skype_highlighting 202-
282-8010 FREE end_of_the_skype_highlighting
WASHINGTON, D.C. - The Department of Defense (DOD) and
the Department of Homeland Security (DHS) today announced
they will continue their critical partnership to further strengthen
the already unprecedented levels of personnel, technology, and
infrastructure along the Southwest border - representing the
Administration's ongoing commitment to secure the border and
facilitate legitimate trade and travel.
Since the summer of 2010, National Guard troops have acted as
a critical support bridge while the Administration brought on
new assets provided by the 2010 supplemental appropriation
dedicated to effective border management and security. To date,
Guardsmen stationed at the border supported civilian law
enforcement on the ground through surveillance and criminal
analysis.
With additional DHS civilian law enforcement assets, including
a record number of U.S. Border Patrol agents, now in place, the
DOD mission at the border will transition as part of a new
strategic approach, adding a number of new multi-purpose aerial
assets equipped with the latest surveillance and reconnaissance
capabilities. Additionally, DOD will provide air mobility
support to the Border Patrol, allowing for faster response
capabilities to a wide range of activities. The deployment of
these new DOD technical assets, along with the additional DHS
personnel on the ground, will enable DOD to reduce the number
of National Guard troops at the Southwest border while
enhancing border security.
The addition of aerial surveillance assets allows the National
Guard to better support DHS by shifting surveillance from fixed
sites to mobile ones that can quickly match the dynamic
environment of the border - a significant enhancement in the
ability to detect and deter illegal activity at the border - and
provide greater support to the thousands of men and women
involved in border security.
The transition to the new DOD/DHS strategic approach will
begin in January, with additional aviation assets in place by
March 1st. The aerial assets, which include both rotary and
fixed-wing, will provide additional benefits including:
· Increased ability to operate in diverse landscapes: Operating
environments differ from sector to sector and even within
sectors. An aerial platform provides a much greater field of
vision for surveillance in places with challenging terrain.
· Additional deterrence: The additional DOD aerial assets,
which establish a greater visible presence from a distance to
individuals attempting to cross the border illegally, coupled
with the Border Patrol boots on the ground, will provide even
greater border deterrence capabilities.
· A faster response time: The air assets will reduce enforcement
response time, enabling Border Patrol officers to quickly move
from one location to another on short notice to meet emerging
threats of illegal activity or incursion. Aircraft also provide the
ability to quickly reach areas in rugged terrain or areas without
roads that were previously difficult to access.
· Flexible and adaptive surveillance as opposed to relying on
fixed sites.
In FY 2011, U.S. Border Patrol apprehensions - a key indicator
of illegal immigration - decreased to 340,252, down 53 percent
since FY 2008 and one fifth of what they were at their peak in
FY 2000. Since 2004, the size of the Border Patrol has doubled
to 21,444.
THE 9/11
COMMISSION
REPORT
Final Report of the
National Commission on Terrorist
Attacks Upon the United States
e xe c ut ive sum mary
Thomas H. Kean
chair
Richard Ben-Veniste
Fred F. Fielding
Jamie S. Gorelick
Slade Gorton
Lee H. Hamilton
vice chair
Bob Kerrey
John F. Lehman
Timothy J. Roemer
James R.Thompson
COMMISSION
MEMBERS
Joanne M. Accolla
Staff Assistant
Alexis Albion
Professional Staff Member
Scott H. Allan, Jr.
Counsel
John A. Azzarello
Counsel
Caroline Barnes
Professional Staff Member
Warren Bass
Professional Staff Member
Ann M. Bennett
Information Control Officer
Mark S. Bittinger
Professional Staff Member
Madeleine Blot
Counsel
Antwion M. Blount
Systems Engineer
Sam Brinkley
Professional Staff Member
Geoffrey Scott Brown
Research Assistant
Daniel Byman
Professional Staff Member
Dianna Campagna
Manager of Operations
Samuel M.W. Caspersen
Counsel
Melissa A. Coffey
Staff Assistant
Lance Cole
Consultant
Marquittia L. Coleman
Staff Assistant
Marco A. Cordero
Professional Staff Member
Rajesh De
Counsel
George W. Delgrosso
Investigator
Gerald L. Dillingham
Professional Staff Member
Thomas E. Dowling
Professional Staff Member
Steven M. Dunne
Deputy General Counsel
Thomas R. Eldridge
Counsel
Alice Falk
Editor
John J. Farmer, Jr.
Senior Counsel & Team Leader
Alvin S. Felzenberg
Deputy for Communications
COMMISSION
STAFF
Philip Zelikow, Executive Director
Christopher A. Kojm, Deputy Executive Director
Daniel Marcus, General Counsel
Lorry M. Fenner
Professional Staff Member
Susan Ginsburg
Senior Counsel & Team Leader
T. Graham Giusti
Security Officer
Nicole Marie Grandrimo
Professional Staff Member
Douglas N. Greenburg
Counsel
Barbara A. Grewe
Senior Counsel, Special Projects
Elinore Flynn Hartz
Family Liaison
Leonard R. Hawley
Professional Staff Member
L. Christine Healey
Senior Counsel & Team Leader
Karen Heitkotter
Executive Secretary
Walter T. Hempel II
Professional Staff Member
C. Michael Hurley
Senior Counsel & Team Leader
Dana J. Hyde
Counsel
John W. Ivicic
Security Officer
Michael N. Jacobson
Counsel
Hunter W. Jamerson
Intern
Bonnie D. Jenkins
Counsel
Reginald F. Johnson
Staff Assistant
R.William Johnstone
Professional Staff Member
Stephanie L. Kaplan
Special Assistant & Managing Editor
Miles L. Kara, Sr.
Professional Staff Member
Janice L. Kephart
Counsel
Hyon Kim
Counsel
Katarzyna Kozaczuk
Financial Assistant
Gordon Nathaniel Lederman
Counsel
Daniel J. Leopold
Staff Assistant
Sarah Webb Linden
Professional Staff Member
Douglas J. MacEachin
Professional Staff Member & Team Leader
Ernest R. May
Senior Adviser
Joseph McBride
Intern
James Miller
Professional Staff Member
Kelly Moore
Professional Staff Member
Charles M. Pereira
Professional Staff Member
John Raidt
Professional Staff Member
John Roth
Senior Counsel & Team Leader
Peter Rundlet
Counsel
Lloyd D. Salvetti
Professional Staff Member
Kevin J. Scheid
Professional Staff Member & Team Leader
Kevin Shaeffer
Professional Staff Member
Tracy J. Shycoff
Deputy for Administration & Finance
Dietrich L. Snell
Senior Counsel & Team Leader
Jonathan DeWees Stull
Communications Assistant
Lisa Marie Sullivan
Staff Assistant
Quinn John Tamm, Jr.
Professional Staff Member
Catharine S.Taylor
Staff Assistant
Yoel Tobin
Counsel
Emily Landis Walker
Professional Staff Member & Family Liaison
Garth Wermter
Senior IT Consultant
Serena B.Wille
Counsel
Peter Yerkes
Public Affairs Assistant
COMMISSION STAFF
THE 9/11
COMMISSION
REPORT
e xe c ut ive sum mary
We p re se nt th e narrat ive of this report and the
recommendations that
flow from it to the President of the United States, the United
States Congress,
and the American people for their consideration. Ten
Commissioners—five
Republicans and five Democrats chosen by elected leaders from
our nation’s
capital at a time of great partisan division—have come together
to present this
report without dissent.
We have come together with a unity of purpose because our
nation demands
it. September 11, 2001, was a day of unprecedented shock and
suffering in the
history of the United States.The nation was unprepared.
A NATION TRANSFORMED
At 8:46 on the morning of September 11, 2001, the United
States became a
nation transformed.
An airliner traveling at hundreds of miles per hour and carrying
some 10,000
gallons of jet fuel plowed into the North Tower of the World
Trade Center in
Lower Manhattan. At 9:03, a second airliner hit the South
Tower. Fire and
smoke billowed upward. Steel, glass, ash, and bodies fell
below.The Twin Towers,
where up to 50,000 people worked each day, both collapsed less
than 90 min-
utes later.
At 9:37 that same morning, a third airliner slammed into the
western face of
the Pentagon. At 10:03, a fourth airliner crashed in a field in
southern
Pennsylvania. It had been aimed at the United States Capitol or
the White
House, and was forced down by heroic passengers armed with
the knowledge
that America was under attack.
More than 2,600 people died at the World Trade Center; 125
died at the
EXECUTIVE
SUMMARY
2 THE 9/11 COMMISSION REPORT
Pentagon; 256 died on the four planes. The death toll surpassed
that at Pearl
Harbor in December 1941.
This immeasurable pain was inflicted by 19 young Arabs acting
at the behest
of Islamist extremists headquartered in distant Afghanistan.
Some had been in
the United States for more than a year, mixing with the rest of
the population.
Though four had training as pilots, most were not well-
educated. Most spoke
English poorly, some hardly at all. In groups of four or five,
carrying with them
only small knives, box cutters, and cans of Mace or pepper
spray, they had
hijacked the four planes and turned them into deadly guided
missiles.
Why did they do this? How was the attack planned and
conceived? How did
the U.S. government fail to anticipate and prevent it? What can
we do in the
future to prevent similar acts of terrorism?
A Shock, Not a Surprise
The 9/11 attacks were a shock, but they should not have come
as a surprise.
Islamist extremists had given plenty of warning that they meant
to kill
Americans indiscriminately and in large numbers. Although
Usama Bin Ladin
himself would not emerge as a signal threat until the late 1990s,
the threat of
Islamist terrorism grew over the decade.
In February 1993, a group led by Ramzi Yousef tried to bring
down the
World Trade Center with a truck bomb. They killed six and
wounded a thou-
sand. Plans by Omar Abdel Rahman and others to blow up the
Holland and
Lincoln tunnels and other New York City landmarks were
frustrated when the
plotters were arrested. In October 1993, Somali tribesmen shot
down U.S. hel-
icopters, killing 18 and wounding 73 in an incident that came to
be known as
“Black Hawk down.”Years later it would be learned that those
Somali tribes-
men had received help from al Qaeda.
In early 1995, police in Manila uncovered a plot by Ramzi
Yousef to blow
up a dozen U.S. airliners while they were flying over the
Pacific. In November
1995, a car bomb exploded outside the office of the U.S.
program manager for
the Saudi National Guard in Riyadh, killing five Americans and
two others. In
June 1996, a truck bomb demolished the Khobar Towers
apartment complex in
Dhahran, Saudi Arabia, killing 19 U.S. servicemen and
wounding hundreds.The
attack was carried out primarily by Saudi Hezbollah, an
organization that had
received help from the government of Iran.
Until 1997, the U.S. intelligence community viewed Bin Ladin
as a fin-
ancier of terrorism, not as a terrorist leader. In February 1998,
Usama Bin
Ladin and four others issued a self-styled fatwa, publicly
declaring that it was
God’s decree that every Muslim should try his utmost to kill
any American,
military or civilian, anywhere in the world, because of
American “occupa-
EXECUTIVE SUMMARY 3
tion” of Islam’s holy places and aggression against Muslims.
In August 1998, Bin Ladin’s group, al Qaeda, carried out near-
simultaneous
truck bomb attacks on the U.S. embassies in Nairobi, Kenya,
and Dar es Salaam,
Tanzania.The attacks killed 224 people, including 12
Americans, and wounded
thousands more.
In December 1999, Jordanian police foiled a plot to bomb hotels
and other
sites frequented by American tourists, and a U.S. Customs agent
arrested Ahmed
Ressam at the U.S. Canadian border as he was smuggling in
explosives intend-
ed for an attack on Los Angeles International Airport.
In October 2000, an al Qaeda team in Aden,Yemen, used a
motorboat filled
with explosives to blow a hole in the side of a destroyer, the
USS Cole, almost
sinking the vessel and killing 17 American sailors.
The 9/11 attacks on the World Trade Center and the Pentagon
were far
more elaborate, precise, and destructive than any of these
earlier assaults. But by
September 2001, the executive branch of the U.S. government,
the Congress,
the news media, and the American public had received clear
warning that
Islamist terrorists meant to kill Americans in high numbers.
Who Is the Enemy?
Who is this enemy that created an organization capable of
inflicting such hor-
rific damage on the United States? We now know that these
attacks were car-
ried out by various groups of Islamist extremists.The 9/11
attack was driven by
Usama Bin Ladin.
In the 1980s, young Muslims from around the world went to
Afghanistan to
join as volunteers in a jihad (or holy struggle) against the
Soviet Union. A
wealthy Saudi, Usama Bin Ladin, was one of them. Following
the defeat of the
Soviets in the late 1980s, Bin Ladin and others formed al Qaeda
to mobilize
jihads elsewhere.
The history, culture, and body of beliefs from which Bin Ladin
shapes and
spreads his message are largely unknown to many Americans.
Seizing on sym-
bols of Islam’s past greatness, he promises to restore pride to
people who con-
sider themselves the victims of successive foreign masters. He
uses cultural and
religious allusions to the holy Qur’an and some of its
interpreters. He appeals
to people disoriented by cyclonic change as they confront
modernity and glob-
alization. His rhetoric selectively draws from multiple
sources—Islam, history,
and the region’s political and economic malaise.
Bin Ladin also stresses grievances against the United States
widely shared in
the Muslim world. He inveighed against the presence of U.S.
troops in Saudi
Arabia, which is the home of Islam’s holiest sites, and against
other U.S. policies
in the Middle East.
Upon this political and ideological foundation, Bin Ladin built
over the
course of a decade a dynamic and lethal organization. He built
an infrastructure
and organization in Afghanistan that could attract, train, and use
recruits against
ever more ambitious targets. He rallied new zealots and new
money with each
demonstration of al Qaeda’s capability. He had forged a close
alliance with the
Taliban, a regime providing sanctuary for al Qaeda.
By September 11, 2001, al Qaeda possessed
• leaders able to evaluate, approve, and supervise the planning
and direc-
tion of a major operation;
• a personnel system that could recruit candidates, indoctrinate
them,
vet them, and give them the necessary training;
• communications sufficient to enable planning and direction of
opera-
tives and those who would be helping them;
• an intelligence effort to gather required information and form
assess-
ments of enemy strengths and weaknesses;
• the ability to move people great distances; and
• the ability to raise and move the money necessary to finance
an attack.
1998 to September 11, 2001
The August 1998 bombings of U.S. embassies in Kenya and
Tanzania established
al Qaeda as a potent adversary of the United States.
After launching cruise missile strikes against al Qaeda targets in
Afghanistan
and Sudan in retaliation for the embassy bombings, the Clinton
administration
applied diplomatic pressure to try to persuade the Taliban
regime in Afghanistan
to expel Bin Ladin. The administration also devised covert
operations to use
CIA-paid foreign agents to capture or kill Bin Ladin and his
chief lieutenants.
These actions did not stop Bin Ladin or dislodge al Qaeda from
its sanctuary.
By late 1998 or early 1999, Bin Ladin and his advisers had
agreed on an idea
brought to them by Khalid Sheikh Mohammed (KSM) called the
“planes oper-
ation.” It would eventually culminate in the 9/11 attacks. Bin
Ladin and his
chief of operations, Mohammed Atef, occupied undisputed
leadership positions
atop al Qaeda.Within al Qaeda, they relied heavily on the ideas
and enterprise
of strong-willed field commanders, such as KSM, to carry out
worldwide ter-
rorist operations.
KSM claims that his original plot was even grander than those
carried out
on 9/11—ten planes would attack targets on both the East and
West coasts of
the United States.This plan was modified by Bin Ladin, KSM
said, owing to its
scale and complexity. Bin Ladin provided KSM with four initial
operatives for
suicide plane attacks within the United States, and in the fall of
1999 training
4 THE 9/11 COMMISSION REPORT
for the attacks began. New recruits included four from a cell of
expatriate
Muslim extremists who had clustered together in Hamburg,
Germany. One
became the tactical commander of the operation in the United
States:
Mohamed Atta.
U.S. intelligence frequently picked up reports of attacks
planned by al Qaeda.
Working with foreign security services, the CIA broke up some
al Qaeda cells.
The core of Bin Ladin’s organization nevertheless remained
intact. In December
1999, news about the arrests of the terrorist cell in Jordan and
the arrest of a
terrorist at the U.S.-Canadian border became part of a
“millennium alert.”The
government was galvanized, and the public was on alert for any
possible attack.
In January 2000, the intense intelligence effort glimpsed and
then lost sight
of two operatives destined for the “planes operation.” Spotted in
Kuala Lumpur,
the pair were lost passing through Bangkok. On January 15,
2000, they arrived
in Los Angeles.
Because these two al Qaeda operatives had spent little time in
the West and
spoke little, if any, English, it is plausible that they or KSM
would have tried to
identify, in advance, a friendly contact in the United States.We
explored suspi-
cions about whether these two operatives had a support network
of accomplices
in the United States. The evidence is thin—simply not there for
some cases,
more worrisome in others.
We do know that soon after arriving in California, the two al
Qaeda oper-
atives sought out and found a group of ideologically like-
minded Muslims with
roots in Yemen and Saudi Arabia, individuals mainly associated
with a young
Yemeni and others who attended a mosque in San Diego. After a
brief stay in
Los Angeles about which we know little, the al Qaeda
operatives lived openly
in San Diego under their true names. They managed to avoid
attracting much
attention.
By the summer of 2000, three of the four Hamburg cell
members had
arrived on the East Coast of the United States and had begun
pilot training. In
early 2001, a fourth future hijacker pilot, Hani Hanjour,
journeyed to Arizona
with another operative, Nawaf al Hazmi, and conducted his
refresher pilot train-
ing there. A number of al Qaeda operatives had spent time in
Arizona during
the 1980s and early 1990s.
During 2000, President Bill Clinton and his advisers renewed
diplomatic
efforts to get Bin Ladin expelled from Afghanistan. They also
renewed secret
efforts with some of the Taliban’s opponents—the Northern
Alliance—to get
enough intelligence to attack Bin Ladin directly. Diplomatic
efforts centered on
the new military government in Pakistan, and they did not
succeed.The efforts
with the Northern Alliance revived an inconclusive and secret
debate about
whether the United States should take sides in Afghanistan’s
civil war and sup-
EXECUTIVE SUMMARY 5
port the Taliban’s enemies. The CIA also produced a plan to
improve intelli-
gence collection on al Qaeda, including the use of a small,
unmanned airplane
with a video camera, known as the Predator.
After the October 2000 attack on the USS Cole, evidence
accumulated that
it had been launched by al Qaeda operatives, but without
confirmation that Bin
Ladin had given the order. The Taliban had earlier been warned
that it would
be held responsible for another Bin Ladin attack on the United
States.The CIA
described its findings as a “preliminary judgment”; President
Clinton and his
chief advisers told us they were waiting for a conclusion before
deciding
whether to take military action.The military alternatives
remained unappealing
to them.
The transition to the new Bush administration in late 2000 and
early 2001
took place with the Cole issue still pending. President George
W. Bush and his
chief advisers accepted that al Qaeda was responsible for the
attack on the Cole,
but did not like the options available for a response.
Bin Ladin’s inference may well have been that attacks, at least
at the level of
the Cole, were risk free.
The Bush administration began developing a new strategy with
the stated
goal of eliminating the al Qaeda threat within three to five
years.
During the spring and summer of 2001, U.S. intelligence
agencies received
a stream of warnings that al Qaeda planned, as one report put it,
“something
very, very, very big.” Director of Central Intelligence George
Tenet told us,“The
system was blinking red.”
Although Bin Ladin was determined to strike in the United
States, as
President Clinton had been told and President Bush was
reminded in a
Presidential Daily Brief article briefed to him in August 2001,
the specific threat
information pointed overseas. Numerous precautions were taken
overseas.
Domestic agencies were not effectively mobilized. The threat
did not receive
national media attention comparable to the millennium alert.
While the United States continued disruption efforts around the
world, its
emerging strategy to eliminate the al Qaeda threat was to
include an enlarged
covert action program in Afghanistan, as well as diplomatic
strategies for
Afghanistan and Pakistan. The process culminated during the
summer of 2001
in a draft presidential directive and arguments about the
Predator aircraft, which
was soon to be deployed with a missile of its own, so that it
might be used to
attempt to kill Bin Ladin or his chief lieutenants. At a
September 4 meeting,
President Bush’s chief advisers approved the draft directive of
the strategy and
endorsed the concept of arming the Predator. This directive on
the al Qaeda
strategy was awaiting President Bush’s signature on September
11, 2001.
Though the “planes operation” was progressing, the plotters had
problems of
6 THE 9/11 COMMISSION REPORT
their own in 2001. Several possible participants dropped out;
others could not gain
entry into the United States (including one denial at a port of
entry and visa
denials not related to terrorism). One of the eventual pilots may
have considered
abandoning the planes operation. Zacarias Moussaoui, who
showed up at a flight
training school in Minnesota, may have been a candidate to
replace him.
Some of the vulnerabilities of the plotters become clear in
retrospect.
Moussaoui aroused suspicion for seeking fast-track training on
how to pilot
large jet airliners. He was arrested on August 16, 2001, for
violations of immi-
gration regulations. In late August, officials in the intelligence
community real-
ized that the terrorists spotted in Southeast Asia in January
2000 had arrived in
the United States.
These cases did not prompt urgent action. No one working on
these late
leads in the summer of 2001 connected them to the high level of
threat report-
ing. In the words of one official, no analytic work foresaw the
lightning that
could connect the thundercloud to the ground.
As final preparations were under way during the summer of
2001, dissent
emerged among al Qaeda leaders in Afghanistan over whether to
proceed. The
Taliban’s chief, Mullah Omar, opposed attacking the United
States. Although
facing opposition from many of his senior lieutenants, Bin
Ladin effectively
overruled their objections, and the attacks went forward.
September 11, 2001
The day began with the 19 hijackers getting through a security
checkpoint sys-
tem that they had evidently analyzed and knew how to
defeat.Their success rate
in penetrating the system was 19 for 19.They took over the four
flights, taking
advantage of air crews and cockpits that were not prepared for
the contingency
of a suicide hijacking.
On 9/11, the defense of U.S. air space depended on close
interaction
between two federal agencies: the Federal Aviation
Administration (FAA) and
North American Aerospace Defense Command (NORAD).
Existing protocols
on 9/11 were unsuited in every respect for an attack in which
hijacked planes
were used as weapons.
What ensued was a hurried attempt to improvise a defense by
civilians who
had never handled a hijacked aircraft that attempted to
disappear, and by a mil-
itary unprepared for the transformation of commercial aircraft
into weapons of
mass destruction.
A shootdown authorization was not communicated to the
NORAD air
defense sector until 28 minutes after United 93 had crashed in
Pennsylvania.
Planes were scrambled, but ineffectively, as they did not know
where to go or
what targets they were to intercept. And once the shootdown
order was given,
EXECUTIVE SUMMARY 7
it was not communicated to the pilots. In short, while leaders in
Washington
believed that the fighters circling above them had been
instructed to “take out”
hostile aircraft, the only orders actually conveyed to the pilots
were to “ID type
and tail.”
Like the national defense, the emergency response on 9/11 was
necessarily
improvised.
In New York City, the Fire Department of New York, the New
York
Police Department, the Port Authority of New York and New
Jersey, the
building employees, and the occupants of the buildings did their
best to
cope with the effects of almost unimaginable events—unfolding
furiously
over 102 minutes. Casualties were nearly 100 percent at and
above the
impact zones and were very high among first responders who
stayed in dan-
ger as they tried to save lives. Despite weaknesses in
preparations for disas-
ter, failure to achieve unified incident command, and inadequate
communi-
cations among responding agencies, all but approximately one
hundred of
the thousands of civilians who worked below the impact zone
escaped,
often with help from the emergency responders.
At the Pentagon, while there were also problems of command
and control,
the emergency response was generally effective. The Incident
Command
System, a formalized management structure for emergency
response in place in
the National Capital Region, overcame the inherent
complications of a
response across local, state, and federal jurisdictions.
Operational Opportunities
We write with the benefit and handicap of hindsight. We are
mindful of the
danger of being unjust to men and women who made choices in
conditions of
uncertainty and in circumstances over which they often had
little control.
Nonetheless, there were specific points of vulnerability in the
plot and
opportunities to disrupt it. Operational failures—opportunities
that were
not or could not be exploited by the organizations and systems
of that
time—included
• not watchlisting future hijackers Hazmi and Mihdhar, not
trailing
them after they traveled to Bangkok, and not informing the FBI
about
one future hijacker’s U.S. visa or his companion’s travel to the
United
States;
• not sharing information linking individuals in the Cole attack
to
Mihdhar;
• not taking adequate steps in time to find Mihdhar or Hazmi in
the
United States;
8 THE 9/11 COMMISSION REPORT
• not linking the arrest of Zacarias Moussaoui, described as
interested in
flight training for the purpose of using an airplane in a terrorist
act, to
the heightened indications of attack;
• not discovering false statements on visa applications;
• not recognizing passports manipulated in a fraudulent manner;
• not expanding no-fly lists to include names from terrorist
watchlists;
• not searching airline passengers identified by the computer-
based
CAPPS screening system; and
• not hardening aircraft cockpit doors or taking other measures
to pre-
pare for the possibility of suicide hijackings.
GENERAL FINDINGS
Since the plotters were flexible and resourceful, we cannot
know whether
any single step or series of steps would have defeated
them.What we can say
with confidence is that none of the measures adopted by the
U.S. govern-
ment from 1998 to 2001 disturbed or even delayed the progress
of the al
Qaeda plot. Across the government, there were failures of
imagination, pol-
icy, capabilities, and management.
Imagination
The most important failure was one of imagination.We do not
believe lead-
ers understood the gravity of the threat.The terrorist danger
from Bin Ladin
and al Qaeda was not a major topic for policy debate among the
public, the
media, or in the Congress. Indeed, it barely came up during the
2000 pres-
idential campaign.
Al Qaeda’s new brand of terrorism presented challenges to U.S.
governmen-
tal institutions that they were not well-designed to meet.
Though top officials
all told us that they understood the danger, we believe there was
uncertainty
among them as to whether this was just a new and especially
venomous version
of the ordinary terrorist threat the United States had lived with
for decades, or
it was indeed radically new, posing a threat beyond any yet
experienced.
As late as September 4, 2001, Richard Clarke, the White House
staffer long
responsible for counterterrorism policy coordination, asserted
that the govern-
ment had not yet made up its mind how to answer the question:
“Is al Qida a
big deal?”
A week later came the answer.
EXECUTIVE SUMMARY 9
Policy
Terrorism was not the overriding national security concern for
the U.S. gov-
ernment under either the Clinton or the pre-9/11 Bush
administration.
The policy challenges were linked to this failure of imagination.
Officials in
both the Clinton and Bush administrations regarded a full U.S.
invasion of
Afghanistan as practically inconceivable before 9/11.
Capabilities
Before 9/11, the United States tried to solve the al Qaeda
problem with the
capabilities it had used in the last stages of the Cold War and its
immediate
aftermath.These capabilities were insufficient. Little was done
to expand or
reform them.
The CIA had minimal capacity to conduct paramilitary
operations with its
own personnel, and it did not seek a large-scale expansion of
these capabilities
before 9/11. The CIA also needed to improve its capability to
collect intelli-
gence from human agents.
At no point before 9/11 was the Department of Defense fully
engaged in
the mission of countering al Qaeda, even though this was
perhaps the most dan-
gerous foreign enemy threatening the United States.
America’s homeland defenders faced outward. NORAD itself
was barely
able to retain any alert bases at all. Its planning scenarios
occasionally consid-
ered the danger of hijacked aircraft being guided to American
targets, but only
aircraft that were coming from overseas.
The most serious weaknesses in agency capabilities were in the
domestic
arena. The FBI did not have the capability to link the collective
knowledge of
agents in the field to national priorities. Other domestic
agencies deferred to
the FBI.
FAA capabilities were weak. Any serious examination of the
possibility
of a suicide hijacking could have suggested changes to fix
glaring vulnera-
bilities—expanding no-fly lists, searching passengers identified
by the
CAPPS screening system, deploying federal air marshals
domestically, hard-
ening cockpit doors, alerting air crews to a different kind of
hijacking pos-
sibility than they had been trained to expect. Yet the FAA did
not adjust
either its own training or training with NORAD to take account
of threats
other than those experienced in the past.
Management
The missed opportunities to thwart the 9/11 plot were also
symptoms of a
broader inability to adapt the way government manages
problems to the new
challenges of the twenty-first century. Action officers should
have been able to
10 THE 9/11 COMMISSION REPORT
draw on all available knowledge about al Qaeda in the
government.
Management should have ensured that information was shared
and duties were
clearly assigned across agencies, and across the foreign-
domestic divide.
There were also broader management issues with respect to how
top leaders
set priorities and allocated resources. For instance, on
December 4, 1998, DCI
Tenet issued a directive to several CIA officials and the DDCI
for Community
Management, stating: “We are at war. I want no resources or
people spared in
this effort, either inside CIA or the Community.” The
memorandum had little
overall effect on mobilizing the CIA or the intelligence
community. This
episode indicates the limitations of the DCI’s authority over the
direction of the
intelligence community, including agencies within the
Department of Defense.
The U.S. government did not find a way of pooling intelligence
and using
it to guide the planning and assignment of responsibilities for
joint operations
involving entities as disparate as the CIA, the FBI, the State
Department, the
military, and the agencies involved in homeland security.
SPECIFIC FINDINGS
Unsuccessful Diplomacy
Beginning in February 1997, and through September 11, 2001,
the U.S. gov-
ernment tried to use diplomatic pressure to persuade the Taliban
regime in
Afghanistan to stop being a sanctuary for al Qaeda, and to expel
Bin Ladin to
a country where he could face justice. These efforts included
warnings and
sanctions, but they all failed.
The U.S. government also pressed two successive Pakistani
governments to
demand that the Taliban cease providing a sanctuary for Bin
Ladin and his organ-
ization and, failing that, to cut off their support for the Taliban.
Before 9/11, the
United States could not find a mix of incentives and pressure
that would per-
suade Pakistan to reconsider its fundamental relationship with
the Taliban.
From 1999 through early 2001, the United States pressed the
United Arab
Emirates, one of the Taliban’s only travel and financial outlets
to the outside
world, to break off ties and enforce sanctions, especially those
related to air trav-
el to Afghanistan.These efforts achieved little before 9/11.
Saudi Arabia has been a problematic ally in combating Islamic
extremism.
Before 9/11, the Saudi and U.S. governments did not fully share
intelligence
information or develop an adequate joint effort to track and
disrupt the finances
of the al Qaeda organization. On the other hand, government
officials of Saudi
Arabia at the highest levels worked closely with top U.S.
officials in major ini-
tiatives to solve the Bin Ladin problem with diplomacy.
EXECUTIVE SUMMARY 11
Lack of Military Options
In response to the request of policymakers, the military
prepared an array of
limited strike options for attacking Bin Ladin and his
organization from May
1998 onward.When they briefed policymakers, the military
presented both the
pros and cons of those strike options and the associated risks.
Policymakers
expressed frustration with the range of options presented.
Following the August 20, 1998, missile strikes on al Qaeda
targets in
Afghanistan and Sudan, both senior military officials and
policymakers
placed great emphasis on actionable intelligence as the key
factor in recom-
mending or deciding to launch military action against Bin Ladin
and his
organization. They did not want to risk significant collateral
damage, and
they did not want to miss Bin Ladin and thus make the United
States look
weak while making Bin Ladin look strong. On three specific
occasions in
1998–1999, intelligence was deemed credible enough to warrant
planning
for possible strikes to kill Bin Ladin. But in each case the
strikes did not go
forward, because senior policymakers did not regard the
intelligence as suf-
ficiently actionable to offset their assessment of the risks.
The Director of Central Intelligence, policymakers, and military
officials
expressed frustration with the lack of actionable intelligence.
Some officials
inside the Pentagon, including those in the special forces and
the counterterror-
ism policy office, also expressed frustration with the lack of
military action.The
Bush administration began to develop new policies toward al
Qaeda in 2001,
but military plans did not change until after 9/11.
Problems within the Intelligence Community
The intelligence community struggled throughout the 1990s and
up to 9/11 to
collect intelligence on and analyze the phenomenon of
transnational terrorism.
The combination of an overwhelming number of priorities, flat
budgets, an
outmoded structure, and bureaucratic rivalries resulted in an
insufficient
response to this new challenge.
Many dedicated officers worked day and night for years to piece
together the
growing body of evidence on al Qaeda and to understand the
threats.Yet, while
there were many reports on Bin Laden and his growing al Qaeda
organization,
there was no comprehensive review of what the intelligence
community knew
and what it did not know, and what that meant. There was no
National
Intelligence Estimate on terrorism between 1995 and 9/11.
Before 9/11, no agency did more to attack al Qaeda than the
CIA. But there
were limits to what the CIA was able to achieve by disrupting
terrorist activi-
ties abroad and by using proxies to try to capture Bin Ladin and
his lieutenants
in Afghanistan. CIA officers were aware of those limitations.
12 THE 9/11 COMMISSION REPORT
To put it simply, covert action was not a silver bullet. It was
important to
engage proxies in Afghanistan and to build various capabilities
so that if an
opportunity presented itself, the CIA could act on it. But for
more than three
years, through both the late Clinton and early Bush
administrations, the CIA
relied on proxy forces, and there was growing frustration within
the CIA’s
Counterterrorist Center and in the National Security Council
staff with the
lack of results. The development of the Predator and the push to
aid the
Northern Alliance were products of this frustration.
Problems in the FBI
From the time of the first World Trade Center attack in 1993,
FBI and
Department of Justice leadership in Washington and New York
became increas-
ingly concerned about the terrorist threat from Islamist
extremists to U.S. inter-
ests, both at home and abroad.Throughout the 1990s, the FBI’s
counterterror-
ism efforts against international terrorist organizations included
both intelli-
gence and criminal investigations.The FBI’s approach to
investigations was case-
specific, decentralized, and geared toward prosecution.
Significant FBI resources
were devoted to after-the-fact investigations of major terrorist
attacks, resulting
in several prosecutions.
The FBI attempted several reform efforts aimed at strengthening
its ability
to prevent such attacks, but these reform efforts failed to
implement organiza-
tion-wide institutional change. On September 11, 2001, the FBI
was limited in
several areas critical to an effective preventive counterterrorism
strategy. Those
working counterterrorism matters did so despite limited
intelligence collection
and strategic analysis capabilities, a limited capacity to share
information both
internally and externally, insufficient training, perceived legal
barriers to sharing
information, and inadequate resources.
Permeable Borders and Immigration Controls
There were opportunities for intelligence and law enforcement
to exploit al
Qaeda’s travel vulnerabilities. Considered collectively, the 9/11
hijackers
• included known al Qaeda operatives who could have been
watchlisted;
• presented passports manipulated in a fraudulent manner;
• presented passports with suspicious indicators of extremism;
• made detectable false statements on visa applications;
• made false statements to border officials to gain entry into the
United
States; and
• violated immigration laws while in the United States.
EXECUTIVE SUMMARY 13
Neither the State Department’s consular officers nor the
Immigration and
Naturalization Service’s inspectors and agents were ever
considered full partners
in a national counterterrorism effort. Protecting borders was not
a national
security issue before 9/11.
Permeable Aviation Security
Hijackers studied publicly available materials on the aviation
security system
and used items that had less metal content than a handgun and
were most like-
ly permissible.Though two of the hijackers were on the
U.S.TIPOFF terrorist
watchlist, the FAA did not use TIPOFF data.The hijackers had
to beat only one
layer of security—the security checkpoint process. Even though
several hijack-
ers were selected for extra screening by the CAPPS system, this
led only to
greater scrutiny of their checked baggage. Once on board, the
hijackers were
faced with aircraft personnel who were trained to be
nonconfrontational in the
event of a hijacking.
Financing
The 9/11 attacks cost somewhere between $400,000 and
$500,000 to execute.
The operatives spent more than $270,000 in the United States.
Additional
expenses included travel to obtain passports and visas, travel to
the United
States, expenses incurred by the plot leader and facilitators
outside the United
States, and expenses incurred by the people selected to be
hijackers who ulti-
mately did not participate.
The conspiracy made extensive use of banks in the United
States. The
hijackers opened accounts in their own names, using passports
and other iden-
tification documents. Their transactions were unremarkable and
essentially
invisible amid the billions of dollars flowing around the world
every day.
To date, we have not been able to determine the origin of the
money
used for the 9/11 attacks. Al Qaeda had many sources of
funding and a pre-
9/11 annual budget estimated at $30 million. If a particular
source of funds
had dried up, al Qaeda could easily have found enough money
elsewhere to
fund the attack.
An Improvised Homeland Defense
The civilian and military defenders of the nation’s airspace—
FAA and
NORAD—were unprepared for the attacks launched against
them. Given that
lack of preparedness, they attempted and failed to improvise an
effective home-
land defense against an unprecedented challenge.
The events of that morning do not reflect discredit on
operational person-
nel. NORAD’s Northeast Air Defense Sector personnel reached
out for infor-
14 THE 9/11 COMMISSION REPORT
mation and made the best judgments they could based on the
information they
received. Individual FAA controllers, facility managers, and
command center
managers were creative and agile in recommending a nationwide
alert, ground-
stopping local traffic, ordering all aircraft nationwide to land,
and executing that
unprecedented order flawlessly.
At more senior levels, communication was poor. Senior military
and FAA
leaders had no effective communication with each other. The
chain of com-
mand did not function well. The President could not reach some
senior offi-
cials. The Secretary of Defense did not enter the chain of
command until the
morning’s key events were over. Air National Guard units with
different rules
of engagement were scrambled without the knowledge of the
President,
NORAD, or the National Military Command Center.
Emergency Response
The civilians, firefighters, police officers, emergency medical
technicians, and
emergency management professionals exhibited steady
determination and
resolve under horrifying, overwhelming conditions on
9/11.Their actions saved
lives and inspired a nation.
Effective decisionmaking in New York was hampered by
problems in com-
mand and control and in internal communications. Within the
Fire
Department of New York, this was true for several reasons: the
magnitude of
the incident was unforeseen; commanders had difficulty
communicating with
their units; more units were actually dispatched than were
ordered by the
chiefs; some units self-dispatched; and once units arrived at the
World Trade
Center, they were neither comprehensively accounted for nor
coordinated.
The Port Authority’s response was hampered by the lack both of
standard
operating procedures and of radios capable of enabling multiple
commands to
respond to an incident in unified fashion. The New York Police
Department,
because of its history of mobilizing thousands of officers for
major events
requiring crowd control, had a technical radio capability and
protocols more
easily adapted to an incident of the magnitude of 9/11.
Congress
The Congress, like the executive branch, responded slowly to
the rise of
transnational terrorism as a threat to national security. The
legislative branch
adjusted little and did not restructure itself to address changing
threats. Its atten-
tion to terrorism was episodic and splintered across several
committees. The
Congress gave little guidance to executive branch agencies on
terrorism, did not
reform them in any significant way to meet the threat, and did
not systemati-
cally perform robust oversight to identify, address, and attempt
to resolve the
EXECUTIVE SUMMARY 15
many problems in national security and domestic agencies that
became appar-
ent in the aftermath of 9/11.
So long as oversight is undermined by current congressional
rules and reso-
lutions, we believe the American people will not get the
security they want and
need. The United States needs a strong, stable, and capable
congressional com-
mittee structure to give America’s national intelligence agencies
oversight, sup-
port, and leadership.
Are We Safer?
Since 9/11, the United States and its allies have killed or
captured a majority of
al Qaeda’s leadership; toppled the Taliban, which gave al Qaeda
sanctuary in
Afghanistan; and severely damaged the organization.Yet
terrorist attacks contin-
ue. Even as we have thwarted attacks, nearly everyone expects
they will come.
How can this be?
The problem is that al Qaeda represents an ideological
movement, not a
finite group of people. It initiates and inspires, even if it no
longer directs. In this
way it has transformed itself into a decentralized force. Bin
Ladin may be lim-
ited in his ability to organize major attacks from his
hideouts.Yet killing or cap-
turing him, while extremely important, would not end terror.
His message of
inspiration to a new generation of terrorists would continue.
Because of offensive actions against al Qaeda since 9/11, and
defensive
actions to improve homeland security, we believe we are safer
today. But we are
not safe.We therefore make the following recommendations that
we believe can
make America safer and more secure.
RECOMMENDATIONS
Three years after 9/11, the national debate continues about how
to protect our
nation in this new era. We divide our recommendations into two
basic parts:
What to do, and how to do it.
WHAT TO DO? A GLOBAL STRATEGY
The enemy is not just “terrorism.” It is the threat posed
specifically by Islamist
terrorism, by Bin Ladin and others who draw on a long tradition
of extreme
intolerance within a minority strain of Islam that does not
distinguish politics
from religion, and distorts both.
The enemy is not Islam, the great world faith, but a perversion
of Islam.The
16 THE 9/11 COMMISSION REPORT
enemy goes beyond al Qaeda to include the radical ideological
movement,
inspired in part by al Qaeda, that has spawned other terrorist
groups and vio-
lence.Thus our strategy must match our means to two ends:
dismantling the al
Qaeda network and, in the long term, prevailing over the
ideology that con-
tributes to Islamist terrorism.
The first phase of our post-9/11 efforts rightly included military
action to
topple the Taliban and pursue al Qaeda. This work continues.
But long-term
success demands the use of all elements of national power:
diplomacy, intelli-
gence, covert action, law enforcement, economic policy, foreign
aid, public
diplomacy, and homeland defense. If we favor one tool while
neglecting others,
we leave ourselves vulnerable and weaken our national effort.
What should Americans expect from their government? The goal
seems
unlimited: Defeat terrorism anywhere in the world. But
Americans have also
been told to expect the worst: An attack is probably coming; it
may be more
devastating still.
Vague goals match an amorphous picture of the enemy. Al
Qaeda and other
groups are popularly described as being all over the world,
adaptable, resilient,
needing little higher-level organization, and capable of
anything. It is an image
of an omnipotent hydra of destruction.That image lowers
expectations of gov-
ernment effectiveness.
It lowers them too far. Our report shows a determined and
capable group of
plotters.Yet the group was fragile and occasionally left
vulnerable by the mar-
ginal, unstable people often attracted to such causes.The enemy
made mistakes.
The U.S. government was not able to capitalize on them.
No president can promise that a catastrophic attack like that of
9/11 will not
happen again. But the American people are entitled to expect
that officials will
have realistic objectives, clear guidance, and effective
organization. They are
entitled to see standards for performance so they can judge,
with the help of
their elected representatives, whether the objectives are being
met.
We propose a strategy with three dimensions: (1) attack
terrorists and their
organizations, (2) prevent the continued growth of Islamist
terrorism, and (3)
protect against and prepare for terrorist attacks.
Attack Terrorists and Their Organizations
• Root out sanctuaries.The U.S. government should identify and
prior-
itize actual or potential terrorist sanctuaries and have realistic
country
or regional strategies for each, utilizing every element of
national
power and reaching out to countries that can help us.
EXECUTIVE SUMMARY 17
• Strengthen long-term U.S. and international commitments to
the
future of Pakistan and Afghanistan.
• Confront problems with Saudi Arabia in the open and build a
relation-
ship beyond oil, a relationship that both sides can defend to
their citi-
zens and includes a shared commitment to reform.
Prevent the Continued Growth of Islamist Terrorism
In October 2003, Secretary of Defense Donald Rumsfeld asked
if enough was
being done “to fashion a broad integrated plan to stop the next
generation of
terrorists.” As part of such a plan, the U.S. government should
• Define the message and stand as an example of moral
leadership in the
world. To Muslim parents, terrorists like Bin Ladin have
nothing to
offer their children but visions of violence and death. America
and its
friends have the advantage—our vision can offer a better future.
• Where Muslim governments, even those who are friends, do
not offer
opportunity, respect the rule of law, or tolerate differences, then
the
United States needs to stand for a better future.
• Communicate and defend American ideals in the Islamic
world,
through much stronger public diplomacy to reach more people,
including students and leaders outside of government. Our
efforts here
should be as strong as they were in combating closed societies
during
the Cold War.
• Offer an agenda of opportunity that includes support for
public edu-
cation and economic openness.
• Develop a comprehensive coalition strategy against Islamist
terrorism,
using a flexible contact group of leading coalition governments
and
fashioning a common coalition approach on issues like the
treatment
of captured terrorists.
• Devote a maximum effort to the parallel task of countering the
pro-
liferation of weapons of mass destruction.
• Expect less from trying to dry up terrorist money and more
from fol-
lowing the money for intelligence, as a tool to hunt terrorists,
under-
18 THE 9/11 COMMISSION REPORT
stand their networks, and disrupt their operations.
Protect against and Prepare for Terrorist Attacks
• Target terrorist travel, an intelligence and security strategy
that the
9/11 story showed could be at least as powerful as the effort
devoted
to terrorist finance.
• Address problems of screening people with biometric
identifiers across
agencies and governments, including our border and
transportation
systems, by designing a comprehensive screening system that
addresses
common problems and sets common standards. As standards
spread,
this necessary and ambitious effort could dramatically
strengthen the
world’s ability to intercept individuals who could pose
catastrophic
threats.
• Quickly complete a biometric entry-exit screening system, one
that
also speeds qualified travelers.
• Set standards for the issuance of birth certificates and sources
of iden-
tification, such as driver’s licenses.
• Develop strategies for neglected parts of our transportation
security
system. Since 9/11, about 90 percent of the nation’s $5 billion
annual
investment in transportation security has gone to aviation, to
fight the
last war.
• In aviation, prevent arguments about a new computerized
profiling
system from delaying vital improvements in the “no-fly” and
“auto-
matic selectee” lists. Also, give priority to the improvement of
check-
point screening.
• Determine, with leadership from the President, guidelines for
gather-
ing and sharing information in the new security systems that are
need-
ed, guidelines that integrate safeguards for privacy and other
essential
liberties.
• Underscore that as government power necessarily expands in
certain
ways, the burden of retaining such powers remains on the
executive to
demonstrate the value of such powers and ensure adequate
supervision
EXECUTIVE SUMMARY 19
of how they are used, including a new board to oversee the
implemen-
tation of the guidelines needed for gathering and sharing
information
in these new security systems.
• Base federal funding for emergency preparedness solely on
risks and
vulnerabilities, putting New York City and Washington, D.C., at
the
top of the current list. Such assistance should not remain a
program for
general revenue sharing or pork-barrel spending.
• Make homeland security funding contingent on the adoption of
an
incident command system to strengthen teamwork in a crisis,
includ-
ing a regional approach. Allocate more radio spectrum and
improve
connectivity for public safety communications, and encourage
wide-
spread adoption of newly developed standards for private-sector
emer-
gency preparedness—since the private sector controls 85
percent of
the nation’s critical infrastructure.
HOW TO DO IT? A DIFFERENT WAY OF ORGANIZING
GOVERNMENT
The strategy we have recommended is elaborate, even as
presented here very
briefly.To implement it will require a government better
organized than the one
that exists today, with its national security institutions designed
half a century
ago to win the Cold War. Americans should not settle for
incremental, ad hoc
adjustments to a system created a generation ago for a world
that no longer
exists.
Our detailed recommendations are designed to fit together.Their
purpose is
clear: to build unity of effort across the U.S. government. As
one official now
serving on the front lines overseas put it to us: “One fight, one
team.”
We call for unity of effort in five areas, beginning with unity of
effort on the
challenge of counterterrorism itself:
• unifying strategic intelligence and operational planning
against Islamist
terrorists across the foreign-domestic divide with a National
Counterterrorism Center;
• unifying the intelligence community with a new National
Intelligence
Director;
20 THE 9/11 COMMISSION REPORT
• unifying the many participants in the counterterrorism effort
and their
knowledge in a network-based information sharing system that
tran-
scends traditional governmental boundaries;
• unifying and strengthening congressional oversight to improve
quality
and accountability; and
• strengthening the FBI and homeland defenders.
Unity of Effort: A National Counterterrorism Center
The 9/11 story teaches the value of integrating strategic
intelligence from all
sources into joint operational planning—with both dimensions
spanning the
foreign-domestic divide.
• In some ways, since 9/11, joint work has gotten better. The
effort of
fighting terrorism has flooded over many of the usual agency
bound-
aries because of its sheer quantity and energy. Attitudes have
changed.
But the problems of coordination have multiplied. The Defense
Department alone has three unified commands (SOCOM, CENT-
COM, and NORTHCOM) that deal with terrorism as one of their
principal concerns.
• Much of the public commentary about the 9/11 attacks has
focused
on “lost opportunities.” Though characterized as problems of
“watch-
listing,” “information sharing,” or “connecting the dots,” each
of these
labels is too narrow.They describe the symptoms, not the
disease.
• Breaking the older mold of organization stovepiped purely in
execu-
tive agencies, we propose a National Counterterrorism Center
(NCTC) that would borrow the joint, unified command concept
adopted in the 1980s by the American military in a civilian
agency,
combining the joint intelligence function alongside the
operations
work.
• The NCTC would build on the existing Terrorist Threat
Integration
Center and would replace it and other terrorism “fusion centers”
with-
in the government.The NCTC would become the authoritative
knowl-
edge bank, bringing information to bear on common plans. It
should
task collection requirements both inside and outside the United
States.
EXECUTIVE SUMMARY 21
• The NCTC should perform joint operational planning,
assigning lead
responsibilities to existing agencies and letting them direct the
actual
execution of the plans.
• Placed in the Executive Office of the President, headed by a
Senate-
confirmed official (with rank equal to the deputy head of a
cabinet
department) who reports to the National Intelligence Director,
the
NCTC would track implementation of plans. It would be able to
influence the leadership and the budgets of the counterterrorism
operating arms of the CIA, the FBI, and the departments of
Defense
and Homeland Security.
• The NCTC should not be a policymaking body. Its operations
and
planning should follow the policy direction of the president and
the
National Security Council.
Unity of Effort: A National Intelligence Director
Since long before 9/11—and continuing to this day—the
intelligence commu-
nity is not organized well for joint intelligence work. It does not
employ com-
mon standards and practices in reporting intelligence or in
training experts
overseas and at home. The expensive national capabilities for
collecting intelli-
gence have divided management.The structures are too complex
and too secret.
• The community’s head—the Director of Central Intelligence—
has at
least three jobs: running the CIA, coordinating a 15-agency
confeder-
ation, and being the intelligence analyst-in-chief to the
president. No
one person can do all these things.
• A new National Intelligence Director should be established
with two
main jobs: (1) to oversee national intelligence centers that
combine
experts from all the collection disciplines against common
targets—
like counterterrorism or nuclear proliferation; and (2) to oversee
the
agencies that contribute to the national intelligence program, a
task
that includes setting common standards for personnel and
information
technology.
• The national intelligence centers would be the unified
commands of
the intelligence world—a long-overdue reform for intelligence
com-
parable to the 1986 Goldwater-Nichols law that reformed the
organ-
ization of national defense.The home services—such as the CIA,
DIA,
22 THE 9/11 COMMISSION REPORT
EXECUTIVE SUMMARY 23
E
xe
cu
ti
ve
O
ff
ic
e
o
f
th
e
P
re
si
de
n
t
P
O
T
U
S
N
at
io
n
al
I
n
te
lli
ge
n
ce
D
ir
ec
to
r
St
af
f
N
at
io
n
al
C
o
u
n
te
rt
er
ro
ri
sm
C
en
te
r
H
ir
e,
T
ra
in
,A
cq
u
ir
e,
E
qu
ip
&
F
ie
ld
(a
ge
n
ci
es
s
u
pp
o
rt
/
s
ta
ff
t
h
e
N
at
’l
In
te
l
C
en
te
rs
)
D
ep
u
ty
N
ID
F
o
re
ig
n
In
te
lli
ge
n
ce
(C
IA
D
ir
.)
D
ep
u
ty
N
ID
D
ef
en
se
In
te
lli
ge
n
ce
(U
SD
I
n
te
lli
ge
n
ce
)
D
ep
u
ty
N
ID
H
o
m
el
an
d
In
te
lli
ge
n
ce
(F
B
I/
In
te
l
D
ir
.)
N
at
io
n
al
I
n
te
lli
ge
n
ce
C
en
te
rs
(c
o
n
du
ct
“
jo
in
t”
co
lle
ct
io
n
a
n
d
an
al
ys
is
-
i
llu
st
ra
tiv
e)
W
M
D
P
ro
lif
er
at
io
n
In
t’
l
C
ri
m
e
&
N
ar
co
ti
cs
C
h
in
a
/
E
as
t
A
si
a
M
id
dl
e
E
as
t
R
u
ss
ia
/
E
u
ra
si
a
C
IA
C
la
n
de
st
in
e
Se
rv
ic
es
A
ll-
So
u
rc
e
A
n
al
ys
is
O
pe
n
S
o
u
rc
e
A
ge
n
cy
(
n
ew
)
D
IA
N
SA
N
G
A
N
R
O
O
th
er
F
B
I
In
te
l
&
C
T
/
C
I
D
H
S
/
IA
IP
O
th
er
D
H
S
(e
.g
.,
C
B
P,
T
SA
,N
at
’l
L
ab
s,
C
o
as
t
G
u
ar
d,
et
c.
)
U
ni
ty
o
f
E
ffo
rt
i
n
M
an
ag
in
g
In
te
lli
ge
nc
e
NSA, and FBI—would organize, train, and equip the best
intelligence
professionals in the world, and would handle the execution of
intelli-
gence operations in the field.
• This National Intelligence Director (NID) should be located in
the
Executive Office of the President and report directly to the
president,
yet be confirmed by the Senate. In addition to overseeing the
National
Counterterrorism Center described above (which will include
both
the national intelligence center for terrorism and the joint
operations
planning effort), the NID should have three deputies:
• For foreign intelligence (a deputy who also would be the head
of
the CIA)
• For defense intelligence (also the under secretary of defense
for
intelligence)
• For homeland intelligence (also the executive assistant
director for
intelligence at the FBI or the under secretary of homeland
securi-
ty for information analysis and infrastructure protection)
• The NID should receive a public appropriation for national
intelli-
gence, should have authority to hire and fire his or her
intelligence
deputies, and should be able to set common personnel and
informa-
tion technology policies across the intelligence community.
• The CIA should concentrate on strengthening the collection
capabil-
ities of its clandestine service and the talents of its analysts,
building
pride in its core expertise.
• Secrecy stifles oversight, accountability, and information
sharing.
Unfortunately, all the current organizational incentives
encourage
overclassification. This balance should change; and as a start,
open
information should be provided about the overall size of agency
intel-
ligence budgets.
Unity of Effort: Sharing Information
The U.S. government has access to a vast amount of
information. But it has a
weak system for processing and using what it has. The system
of “need to
know” should be replaced by a system of “need to share.”
• The President should lead a government-wide effort to bring
the
24 THE 9/11 COMMISSION REPORT
EXECUTIVE SUMMARY 25
major national security institutions into the information
revolution,
turning a mainframe system into a decentralized network. The
obsta-
cles are not technological. Official after official has urged us to
call
attention to problems with the unglamorous “back office” side
of gov-
ernment operations.
• But no agency can solve the problems on its own—to build the
net-
work requires an effort that transcends old divides, solving
common
legal and policy issues in ways that can help officials know
what they
can and cannot do. Again, in tackling information issues,
America
needs unity of effort.
Unity of Effort: Congress
Congress took too little action to adjust itself or to restructure
the executive
branch to address the emerging terrorist threat. Congressional
oversight for
intelligence—and counterterrorism—is dysfunctional. Both
Congress and the
executive need to do more to minimize national security risks
during transi-
tions between administrations.
• For intelligence oversight, we propose two options: either a
joint com-
mittee on the old model of the Joint Committee on Atomic
Energy
or a single committee in each house combining authorizing and
appropriating committees. Our central message is the same: the
intel-
ligence committees cannot carry out their oversight function
unless
they are made stronger, and thereby have both clear
responsibility and
accountability for that oversight.
Securing the United States-Mexico Border  An On-Going Dilem.docx
Securing the United States-Mexico Border  An On-Going Dilem.docx
Securing the United States-Mexico Border  An On-Going Dilem.docx
Securing the United States-Mexico Border  An On-Going Dilem.docx

More Related Content

Similar to Securing the United States-Mexico Border An On-Going Dilem.docx

SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docx
SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docxSAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docx
SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docxjeffsrosalyn
 
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018ChadCogan
 
IACHR conducted visit to the United States Southern Border
IACHR conducted visit to the United States Southern BorderIACHR conducted visit to the United States Southern Border
IACHR conducted visit to the United States Southern BorderMarcos Eduardo Villa Corrales
 
The Alliance for Prosperity Plan FINAL
The Alliance for Prosperity Plan FINALThe Alliance for Prosperity Plan FINAL
The Alliance for Prosperity Plan FINALLaura Theresa
 
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docxlorainedeserre
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docxjackiewalcutt
 
Department Of Homeland Security
Department Of Homeland SecurityDepartment Of Homeland Security
Department Of Homeland SecurityTrey
 
Smugglers and vulnerable migrants in central america and mexico final
Smugglers and vulnerable migrants in central america and mexico   finalSmugglers and vulnerable migrants in central america and mexico   final
Smugglers and vulnerable migrants in central america and mexico finalUN Global Pulse
 
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...Economist
 
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...Economist
 

Similar to Securing the United States-Mexico Border An On-Going Dilem.docx (12)

SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docx
SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docxSAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docx
SAIS Review vol. 37 no. 2 (Summer–Fall 2017) © 2018 Johns Hopk.docx
 
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
DoD Housing of Immigrant Detainees: Security Implications 17 July 2018
 
Centro de Atención al Migrante
Centro de Atención al MigranteCentro de Atención al Migrante
Centro de Atención al Migrante
 
IACHR conducted visit to the United States Southern Border
IACHR conducted visit to the United States Southern BorderIACHR conducted visit to the United States Southern Border
IACHR conducted visit to the United States Southern Border
 
The Alliance for Prosperity Plan FINAL
The Alliance for Prosperity Plan FINALThe Alliance for Prosperity Plan FINAL
The Alliance for Prosperity Plan FINAL
 
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx
223Geopolitics, 12223–227, 2007Copyright © Taylor & Fra.docx
 
A Study on Immigration Reform in the U.S.
A Study on Immigration Reform in the U.S.A Study on Immigration Reform in the U.S.
A Study on Immigration Reform in the U.S.
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
 
Department Of Homeland Security
Department Of Homeland SecurityDepartment Of Homeland Security
Department Of Homeland Security
 
Smugglers and vulnerable migrants in central america and mexico final
Smugglers and vulnerable migrants in central america and mexico   finalSmugglers and vulnerable migrants in central america and mexico   final
Smugglers and vulnerable migrants in central america and mexico final
 
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...
Dr. Alejandro Diaz-Bautista, North American Competitiveness Conference 2010 U...
 
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...
Dr. Alejandro Diaz Bautista Presentation U.S. Congress Washington D.C. March ...
 

More from kenjordan97598

You are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxYou are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxkenjordan97598
 
You are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxYou are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxkenjordan97598
 
You are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxYou are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxkenjordan97598
 
You are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxYou are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxkenjordan97598
 
You are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxYou are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxkenjordan97598
 
You are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxYou are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxkenjordan97598
 
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxYou are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxkenjordan97598
 
You are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxYou are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxkenjordan97598
 
You are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxYou are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxkenjordan97598
 
You are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxYou are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxkenjordan97598
 
You are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxYou are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxkenjordan97598
 
You are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxYou are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxkenjordan97598
 
You are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxYou are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxkenjordan97598
 
You are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxYou are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxkenjordan97598
 
You are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxYou are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxkenjordan97598
 
You are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxYou are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxkenjordan97598
 
You are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxYou are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxkenjordan97598
 
You are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxYou are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxkenjordan97598
 
You are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxYou are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxkenjordan97598
 
You are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxYou are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxkenjordan97598
 

More from kenjordan97598 (20)

You are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docxYou are the Nursing Director for the medical-surgical area of a .docx
You are the Nursing Director for the medical-surgical area of a .docx
 
You are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docxYou are the newly appointed director of the Agile County Airport.docx
You are the newly appointed director of the Agile County Airport.docx
 
You are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docxYou are working on an address book database with a table called Cont.docx
You are working on an address book database with a table called Cont.docx
 
You are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docxYou are the new Security Manager for a small bank in Iowa. They are .docx
You are the new Security Manager for a small bank in Iowa. They are .docx
 
You are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docxYou are working in a rural Family Planning Health clinic and a 16 y.docx
You are working in a rural Family Planning Health clinic and a 16 y.docx
 
You are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docxYou are working in a family practice when your newly diagnosed T.docx
You are working in a family practice when your newly diagnosed T.docx
 
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docxYou are working for the Chief of Staff (CoS) for a newly elected Gov.docx
You are working for the Chief of Staff (CoS) for a newly elected Gov.docx
 
You are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docxYou are working at Johnson and Cohen law firm and have recently .docx
You are working at Johnson and Cohen law firm and have recently .docx
 
You are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docxYou are working for a community counseling agency, and you are taske.docx
You are working for a community counseling agency, and you are taske.docx
 
You are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docxYou are working as the software tester for a big enterprise comp.docx
You are working as the software tester for a big enterprise comp.docx
 
You are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docxYou are working as HelpDesk Support for an organization where your u.docx
You are working as HelpDesk Support for an organization where your u.docx
 
You are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docxYou are working as an APRN in your local primary care office. Th.docx
You are working as an APRN in your local primary care office. Th.docx
 
You are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docxYou are the new Public Information Officer (PIO) assigned by the.docx
You are the new Public Information Officer (PIO) assigned by the.docx
 
You are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docxYou are welcome to go to the San Diego Zoo any time you would li.docx
You are welcome to go to the San Diego Zoo any time you would li.docx
 
You are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docxYou are visiting one of your organization’s plants in a poor nation..docx
You are visiting one of your organization’s plants in a poor nation..docx
 
You are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docxYou are to write a four-page (typed, double-spaced) essay addressing.docx
You are to write a four-page (typed, double-spaced) essay addressing.docx
 
You are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docxYou are to write a 7-page Biographical Research Paper of St Franci.docx
You are to write a 7-page Biographical Research Paper of St Franci.docx
 
You are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docxYou are to write a 1050 to 1750 word literature review (in a.docx
You are to write a 1050 to 1750 word literature review (in a.docx
 
You are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docxYou are to take the uploaded assignment and edit it. The title shoul.docx
You are to take the uploaded assignment and edit it. The title shoul.docx
 
You are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docxYou are to use a topic for the question you chose.WORD REQUIRE.docx
You are to use a topic for the question you chose.WORD REQUIRE.docx
 

Recently uploaded

The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 

Recently uploaded (20)

The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 

Securing the United States-Mexico Border An On-Going Dilem.docx

  • 1. Securing the United States-Mexico Border: An On-Going Dilemma Karina J. Ordóñez INTRODUCTION For decades, the United States federal government has developed and implemented border security strategies to counter illegal cross-border activity. While some strategies have alleviated the influx of illegal immigration to certain geographic areas, increased border controls in these locations have made other, less controlled areas of the border more vulnerable. Rising crime rates, discarded debris, increased apprehension rates, and growing public scrutiny in these less secure areas provide clear evidence that border security is at once a social, an economic, and a national security issue. Prior to 9/11, the United States Border Patrol (USBP) had established security efforts along the international border. Since then, however, the constant flow of unauthorized migrants and “the increasing mobility and destructive potential of modern terrorism has required the United States to rethink and rearrange fundamentally its systems for border…security.”1 Yet, despite the border security efforts of the Bush Administration
  • 2. and the United States Department of Homeland Security (DHS), the problem persists and continues to worsen, particularly along the Arizona-Sonora border (ASB). There is a critical need to rethink border security systems, particularly along the Southwest border, that leads observers to ponder: who is primarily responsible for securing our borders? What is the USBP doing to secure the border given the additional threat of terrorism?2 Defining Borders In order to articulate functional definitions, the “border” refers to the 2,000 mile geo- political divide between the United States and Mexico. However, for purposes of this paper, the “border” is specifically the international border between the State of Arizona, United States and the State of Sonora, Mexico. The 377-mile Arizona-Sonora Border (ASB) is a portion of one of the world’s busiest international boundaries and, as such, an overwhelming number of cross-border illegal and legal activities occur there daily.3 Although there is a geo-political border, a full understanding of the complexities and dynamics of the ASB requires recognition and analysis of the communities on both sides of the border. The economic dependency, and the environmental and cultural ties between these border communities, adds a multifaceted dynamic and dimension to understanding the ASB. This cultural, social, and economic region has received recognition from governments and the public; therefore, to
  • 3. encompass these intrinsic interdependencies, the term “border region” was officially recognized in 1983 in the La Paz Agreement. The border region includes 100 kilometers (67 miles) north and south of the geopolitical divide between the United States and Mexico.4 The border region has a population of approximately three million people, and it continues to grow exponentially as compared to the national average of both the United States and Mexico.5 This includes all of the cities, town, communities, tribes, and counties within this area, which share common challenges. ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 2 9/11 brought a new dimension to the problem of illegal immigration with potential terrorists seeking to enter the country, thereby elevating border security to a national priority. The United States government responded to 9/11 with the creation of DHS, a department tasked with “preventing terrorist attacks within the United States, reducing American’s vulnerability to terrorism and minimizing the damage and recovery from attacks that do occur.”6 DHS was created under the Homeland Security Act of 2002 and
  • 4. merged twenty-two agencies into one department and ostensibly one mission. One of the newly created directorates was Border and Transportation Security, which abolished the Immigration and Naturalization Services (INS) and divided its functions among Citizenship and Immigrant Services (CIS), Immigration and Customs Enforcement (ICE), U.S. Coast Guard (USCG), and Customs and Border Protection (CBP). While these units continue to exist within DHS, the directorate of Border and Transportation Security was recently disbanded by Secretary Chertoff, in July 2005. Now, CIS processes legal immigration services and enforces illegal immigration along with the USCG, ICE, and CBP. The duties of illegal immigration enforcement are further divided between ICE and CBP: ICE enforces immigration law within the interior of the United States and CBP, USBP enforces and protects the United States border. The goal in integrating customs inspectors, immigration inspectors, and agricultural inspectors under CBP was to provide one face at the border and one comprehensive strategy with a unity of force. However, USBP – although a unit of CBP – remains distinct, with its own mission and force. By law and according to the National Border Patrol Strategy, CBP is the authoritative law enforcement agency charged to protect the nation’s borders and ensure that the United States is not penetrated by terrorists, unauthorized migrants,
  • 5. human smugglers, human traffickers, drug smugglers, or contraband.7 Under the auspices of a new directorate, the priority mission of the USBP is homeland security, defined as “nothing less than preventing terrorists and terrorist weapons – including potential weapons of mass destruction – from entering the United States.”8 The priority mission functionally establishes and maintains operational control of the United States border between the ports of entry (POE). On the other hand, it is CBP’s mission to control the United States border as a whole. The aftermath of 9/11 caused policy makers to expand the traditional mission to include preventing terrorists and terrorist weapons from entering the United States, in addition to “interdicting illegal aliens and drugs and those who attempt to smuggle them across our borders.”9 The USBP’s area of operation and responsibility is between land and sea POE, which extends across 7,000 miles of border with Canada and Mexico and 12,000 miles of coastal borders. Border Strategy, 1994-2004 While the USBP patrols both the northern and southern borders, 90 percent of USBP resources are deployed along the United States-Mexico Border (USMB) because it is considered the focal point for illegal immigration with ninety- seven percent of all illegal alien apprehensions.10 The four border states along the USMB are divided into nine USBP Sectors: San Diego and El Centro, California; Yuma and
  • 6. Tucson, Arizona; El Paso (New Mexico and two counties in Texas); Marfa, Del Rio, Laredo and McAllen, Texas. While these four states share a geopolitical and geo-physical border with Mexico, they do not share the same topography, climate, or challenges. Accordingly, the USBP faces the challenge of developing different operational tactics and techniques for each sector. ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 3 Tucson Sector represents forty-three percent of the total annual Southwest USBP’s apprehensions.11 This percentage indicates that most of the illegal cross-border activity occurs within 262 miles of the total 2,000 miles of international border with Mexico.12 Table 1 indicates that in the past decade the Tucson Sector has become the most active in terms of illegal cross-border activity, with a significant increase in total apprehensions along the Southwest border: from eight percent in 1993 to forty-three percent in 2004. Table 1. United States Border Patrol Apprehension Statistics
  • 7. 1993 – 2004. From: United States Border Patrol, “Apprehension Statistics 1993 -2004: Data Presented in Actual Numbers and as a Percentage of Total Southwest Apprehensions,” http://www.lawg.org/docs/apprehension%20stats.pdf. According to the INS, this phenomenon is a tactical dimension of the INS’ National Strategic Plan, which accounts for various ways to control the influx of illegal immigration in the concentrated border areas of San Diego and El Paso. In 1994, the INS focused enforcement efforts in San Diego and El Paso; the goal was to shift migrants outside of the urban area, to more open areas, a strategic and tactical intention of INS. The intention was not to shift migrants into different jurisdictions; instead it was to continue shifting the migrants and break up criminal networks by gaining control in the less secure areas over time. As indicated by the USBP Chief David Aguilar: ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 4 Historically, major CBP Border Patrol initiatives, such as Operation Hold the
  • 8. Line, Operation Gatekeeper, and Operation Rio Grande in our El Paso, San Diego, and McAllen Sectors, respectively, have had great border enforcement impact on illegal migration patterns along the southwest border, proving that a measure of control is possible. Together, these border security operations have laid the foundation for newer strategies and enforcement objectives and an ambitious goal to gain control of our Nation's borders, particularly our border with Mexico.13 Border security experts argue that the border security strategy is at a stage where the migration flow is concentrated in Arizona. However, this concentration can be due to changes in leadership, administrations and a non-continuous flow of resources to these less secure areas, leaving the Tucson Sector as the primary gateway for illegal cross- border activity along the USMB. The various border operations mentioned in Chief Aguilar’s testimony are part of the first phases of the overall national border security strategy developed in the early 1990s. DHS is developing and implementing new strategies – such as the Arizona Border Control Initiative – to continue the border security strategy’s second phase in minimizing the vulnerabilities along the international border. A review of USBP strategy from 1993 to 2004 will help illuminate how these
  • 9. particular USBP strategies led to the current challenges faced by the Arizona Tucson Sector. The build-up of border enforcement along the USMB first started in the early 1990s under the Clinton Administration, in response to public concern about illegal immigration from Mexico and its effect on public services and employment in the United States.14 Experts called for a strategy that would simultaneously increase tighter enforcement of United States immigration laws while the North American Free Trade Agreement (NAFTA) spurred Mexican economic growth. Together, these experts asserted, both would help reduce the flow of illegal immigration from Mexico to the United States. Consequently, INS designed several border security strategies to prevent illegal cross-border activity. These strategies derived from a mixture of community policing theory and a low-intensity warfare concept. In addition, the challenges along the border were concentrated, and the need to protect the international border from illegal entry caused border security experts to research and implement new theories. Border security strategies focused on deterrence by deploying large numbers of border patrol agents, increasing the hours of actual border patrolling, and enhancing border security technology. These resources were deployed to strategically designated areas of the Southwest border with the greatest number of crime and disorder. During this period, the San Diego and El Paso sectors represented the gateways used by 70-80
  • 10. percent of the unauthorized migrants entering the United States.15 The strategy made sense and the demand for federal response resulted in the implementation of this strategy with the greatest border security funding appropriation in United States history. Rather than spread the resources across the entire USMB, the INS “concentrated border enforcement strategies” were implemented in four specific segments of the international border: Operation Hold-the-Line in El Paso, Texas in 1993, Operation Gatekeeper in San Diego in 1994, Operation Rio Grande for South Texas in 1997, and Operation Safeguard in central Arizona in 1995.16 These strategies were developed with the intention of increasing the USBP’s probability of apprehension to a level that would ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 5 deter potential migrants from crossing into El Paso or San Diego. Eventually, the intent was for border crossers to “spread the word” on the difficulty of entering the United States (without being apprehended) to potential migrants and deter them from leaving
  • 11. their hometowns in Mexico and other countries. Operation Safeguard began operations in 1999 in Nogales, Arizona. It was not until 1999 that USBP in Arizona began to participate in the concentrated border enforcement strategy. Some experts argue that this was because Arizona contains extensive natural hazards, which were perceived as a deterrent to migrants attempting a clandestine entry into the United States. Former INS Commissioner Doris Meissner believed no one would risk their lives to illegally cross the border in areas of formidable mountains and extreme desert temperatures.17 Essentially, “Mother Nature” would take care of USBP’s responsibility. However, experts were incorrect in this assumption, as seen by the significant loss of life by many migrants attempting to cross in these geographically desolate areas.18 A Strategy for the Next Decade Our nation is still facing a steady increase in the number of illegal immigrants residing in our communities along with an increase in the number of deaths in the desert; both demonstrate that the current border enforcement system is flawed.19 Roughly ten years after the implementation of the INS Strategic Plan, border security remains a critical national mission. Throughout this period, the United States has increased funding for immigration control and border security initiatives. These increases have not translated
  • 12. into a more secure border and are still deemed inadequate to meet the post-9/11 mission. According to the Search for International Terrorist Entities (SITE) Institute, the border enforcement policy was unsuccessful because “despite extensive surveillance, the border remains porous because of the stretches of desert it crosses and Mexico's established smuggling networks.”20 This premise was a component of the INS National Strategic Plan, yet the border remains insecure. While these border security efforts had a significant impact in the San Diego and El Paso Sector, less secure sectors are suffering from the incomplete multi-phase implementation of the National Border Strategy. The ASB current border insecurity situation is due to the incomplete implementation of the National Border Strategy Phase II; insufficient resources continue to be deployed within the Tucson Sector. Two main factors contribute to the ever-increasing demands placed upon border security resources along the USMB. First, the pressure of enhanced law enforcement strategies in certain sectors has resulted in a shift of migrants from more secure urban areas to those rural communities that are less protected and populated.21 For example, as crime rates dropped in San Diego and El Paso, due to more concentrated border security efforts, the Tucson Sector experienced an increase in illegal activity supplemented by violent crimes of auto-theft, extortion, rape,
  • 13. and homicide. Moreover, on a statewide basis, both Arizona and Sonora are currently facing higher crime rates. Arizona ranks first in auto-theft and third in homicide in the United States, while Sonora ranks third in homicide in Mexico. 22 Second, Mexico is experiencing an influx of Islamic migrants.23 Conceivably, as the United States government increases security measures and tightens immigration law, potential terrorists may seek the assistance of human smugglers to infiltrate the porous international border. If this proves to be the case, then the policymakers should ask the ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 6 same question that Arizona Senator Kyl posed on August 27, 2004: “Why wouldn’t those seeking to attack America be tempted to join the hundreds of thousands already illegally entering from Mexico?”24 In fact, intelligence collected from domestic and international law enforcement communities indicates that terrorists are seeking other means to enter the United States.25 As terrorist organizations continue to network in Mexico and exploit sophisticated organized smuggling rings, the USBP could
  • 14. seemingly be faced with a new paradigm: human smugglers, colloquially known as Coyotes, as potential terrorist partners. As noted, in the early 1990s the USBP launched a concentrated border security strategy in the El Paso and San Diego Sectors causing migrants and smugglers to move their operations to less secure sectors along the USMB. The United States General Accounting Office report suggests that these strategies showed positive results for both sectors. However, the remaining seven sectors along the Southwest border saw an increase in illegal cross-border activity, particularly the Tucson Sector. In 1993, the San Diego Sector represented 43.6 percent of the Southwest border apprehensions, and the El Paso Sector represented 23.6 percent.26 Yet, as the USBP claimed victory in the San Diego and El Paso Sectors with a reduction in apprehensions by 6 percent and 72 percent, respectively, the Tucson Sector experienced an increase of 50 percent.27 This increase is a clear indication of the balloon effect along the USMB: the displacement of illegal cross-border activity to another, less secure, sector of the international border. This phenomenon was an intended consequence of the National Strategic Plan and demonstrated that the border control efforts in the San Diego and El Paso Sectors were working. However, the migrant flow shift was not intended to stop in the USBP Tucson Sector; instead, the intent was to continuously shift migrants
  • 15. from one sector to another causing disruption of organized smuggling rings. This strategy derives from the theory of hot spots and the practice of community-oriented policing. Place-oriented crime prevention strategies, a component of community policing, are commonly used by law enforcement agencies throughout the United States. The theory behind place-oriented crime prevention suggests that crime occurs in clusters, or “hot spots,” and is not evenly distributed throughout the United States. As defined by the United States Department of Justice, Office of Justice Programs: A hot spot is an area that has a greater than average number of criminal or disorder events, or an area where people have a higher than average risk of victimization. This suggests the existence of cool spots – places or areas with less than average amount of crime or disorder.28 This phenomenon is used by individuals everyday, evidenced by the places people tend to avoid given their probability of victimization. This suggests that crime is not evenly distributed. One can deduce that the National Strategic Plan drew from this theory; this is evident because resources were focused in the urban areas. The USBP continues to implement strategies that are complementary to community policing. Experts suggest that this “hot spots” phenomenon is supported by three complementary theories:
  • 16. environmental criminology, routine activities, and rational choice. Environmental criminology theory explores and analyzes the environment in which a criminal act is conducted. The analysis takes into consideration the criminal interaction with targets, the opportunities across space and time, and the characteristics of the area, such as safe ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 7 havens. Routine activities theory is based on the notion that in the absence of a capable guardian, crime occurs when the bandit comes into close proximity of a potential target. Rational choice theory is based on the belief that bandits are capable of making their own decisions and opt to commit crime in order to benefit. Another interesting analysis that is drawn from community- policing is that as law enforcement pressure is applied in “hot spots,” crimes begin to emerge in “cool spots.” Experts claim “focused police interventions, such as directed patrols, proactive arrests, and problem solving, can produce significant crime prevention gains at high-crime ‘hot spots.’”29 In a nutshell, “hot spot” policing suggests that if the environment is
  • 17. manipulated (i.e., increased patrols, arrests, etc.), then victims and offenders have fewer interactions and bandits have fewer opportunities to commit crimes, which ultimately results in a decrease in the crime rate. In addition, once a “hot spot” is controlled and crime has decreased, bandits will move to a less patrolled area to continue their criminal activities. These criminal migrations are occurring at the Southwest border. Apprehension statistics are a clear indication that illegal border crossers (IBC) have migrated to areas less patrolled by USBP, such as the Tucson Sector. The USBP has focused its resources in the urban areas along the international border for a variety of reasons, such as preventing bandits from interacting with border community residents and restricting bandits from access to safe havens or camouflaging into the community. In addition, the balloon effect experienced in the Tucson Sector parallels the concept of “hot spots” in urban areas. Once the community policing addresses a “hot spot” crime area, the crime moves into a less policed area. Similarly, when the USBP focuses enforcement efforts along the USMB, migrants and bandits move into less secured sectors. This shift was the intention of the USBP’s concentrated border security strategy. Therefore, USBP was not surprised to see bandits and smugglers moving towards the Tucson Sector. Why, then, isn’t the USBP Tucson Sector prepared to handle the
  • 18. influx of migrants? The answer could be a combination of issues – politics, resources, or the simple notion that geographical constraints would be a sufficient deterrent for migrants entering the United States. The United States government must continue to develop and implement timely border security strategies that take into consideration the movement of illegal activities along the border in order to successfully secure the USMB, as described above. However, the post-9/11 need to protect the United States from another terrorist attack requires intelligence analysts to observe for potential emerging terrorist threats along the international border and then quickly address these threats with stealth and innovation. One Solution : The ASB Model While the efforts of Congress and the USBP continue, the illegal immigration problem persists and becomes increasingly divisive in communities nationwide. The current deployment and employment of resources must be revisited to increase efficiency and
  • 19. alleviate the challenges along the USMB. The application of force along the border, without the proper use of intelligence to modify the use of force in a timely and adequate manner along the USMB, could potentially accelerate the “balloon effect.” The use of the Arizona-Sonora Border (ASB) model or a similar border model would allow strategists to minimize the geographical displacement effects prior to applying force along the USMB. ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 8 The ASB model is an analytic model that incorporates factors relevant to the problem of illegal cross-border activity in the USBP Tucson Sector. While a model can never fully
  • 20. reflect the true complexity of illegal cross-border activity factors, illegal cross-border activity has some structural features that lend themselves to analytical modeling. In other words, illegal cross-border activity is not a random event; it exhibits organized and structured occurrences and can be modeled. The ASB model is a “plug and play” model that can assist in forecasting what may occur along the border within a five day window, given certain IBCs’ distribution and USBP resource deployment. The model does not project actual numbers of IBCs, but rather the success rate of the USBP as a function of the infiltration and migration patterns, and the resources mix. Given a certain distribution of IBCs, and different migration rates, the question is: how should USBP Border Security resources be deployed to be most effective? Specifically, the model examines the effect of apprehension rates (which depend on the resources mix) on the number of IBCs that successfully evade the USBP. Given the functional relation, one can calculate the desired deployment of resources in order
  • 21. to optimize effectiveness. The purpose of the ASB model is to assist policymakers and operational planners to address the problem of illegal cross-border activity with a logical and systematic approach. The mathematical model can help organize, articulate, and analyze the essential problems in the USBP Tucson Sector. The ASB model provides insight into the complex interdependencies that exist in establishing and maintaining control of the international border with Mexico. It captures the interactions among the location and intensity of cross-border activities, apprehension rates, and migration rates. This model is an attempt to offer a mathematical solution to the problem of optimal deployment of border security resources in the USBP Tucson Sector along the ASB. The appropriate employment and deployment of border security resources can minimize illegal cross- border activity and reduce the border’s vulnerabilities. CONCLUSION
  • 22. The ASB model examines illegal cross-border activity situations in the USBP Tucson Sector, or any part of it, and forecasts the effectiveness of USBP border security resources deployment. Although this model is specific to the USBP Tucson Sector, it can be implemented anywhere along the Southwest Border with minor modifications. The ASB model demonstrates that by increasing border security enforcement efforts, it may augment humanitarian concerns along the USMB. As migrants move away from high enforcement areas to low enforcement areas, in other words, they move away from areas where the border security enforcement is more effective, and are thus exposed to greater natural hazards. Therefore, as operational planners and policy makers develop new strategies, these humanitarian concerns and consequences need to be taken into consideration in order to reduce deaths in the desert and improve bi-national relations with Mexico.
  • 23. Karina J. Ordóñez is the strategic policy coordinator for the Arizona Department of Homeland Security. In this capacity, she is the primary advisor to the deputy director in matters pertaining to national policy and serves as the state agency liaison focusing on public health, agro-terrorism, bioterrorism, and disaster preparedness. Special projects in her portfolio include developing the State Homeland Security Strategy and the State Infrastructure ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 9 Protection Plan. She is a graduate of the Naval Postgraduate School’s Center for Homeland Defense and Security.
  • 24. 1 Office of Homeland Security, National Strategy for Homeland Security (Washington DC: Government Printing Office, July 2002), 21. 2 This paper is drawn from Karina J. Ordóñez, Modeling the U.S. Border Patrol Tucson Sector for the Deployment and Operations of Border Security Forces, M.A. thesis, Naval Postgraduate School, 2006. 3 United States Border Patrol, “Apprehension Statistics 1993 - 2004: Data Presented in Actual Numbers and as a Percentage of Total Southwest Apprehensions” (2005), http://www.lawg.org/docs/apprehension%20stats.pdf. 4 La Paz Agreement defined the border region as 100 km north and 100 km south of the United States- Mexico International border. See “La Paz Agreement,” (August 14, 1983). Text of the La Paz Agreement, including Annex I-V is available at http://yosemite.epa.gov/oia/MexUSA.nsf/La+Paz+Agreement+- +Web?OpenView&ExpandView. 5 United States Bureau of the Census, Annual Estimates of the Population for Counties of Arizona: April
  • 25. 1, 2000 to July 1, 2004, CO-EST2004-01-04 (Washington DC: Population Division, United States Census Bureau, 2005), and El Instituto Nacional de Estadísticas, Geográfica e Informática (the Mexican Bureau of Statistics, Geography and Computer Science), Estadísticas de Población por Estado (Population Statistics by State), 2000. 6 Office of Homeland Security, National Strategy for Homeland Security (Washington DC: Government Printing Office, July 2002), 2. 7 The Labor Appropriation Act of 1924 established the United States Border Patrol in response to rising illegal entries particularly along land borders. 8 Robert C. Bonner, National Border Patrol Strategy: Message from the Commissioner (Washington DC: United States Customs and Border Protection, Office of Border Patrol and the Office of Policy and Planning, September 2004). 9 Ibid. 10 Lisa Seghetti, et al., “Border Security and the Southwest
  • 26. Border: Background, Legislation, and Issues,” #RL33106 (Washington, DC: Congressional Research Service, September 28, 2005): 21. 11 United States Border Patrol. “Apprehension Statistics 1993 - 2004.” 12 The illegal cross-border activity accounted for is the activity that is observed and interdicted. 13 David Aguilar, United States Border Patrol Chief, testimony before the House Committee on Appropriations and Subcommittee on Homeland Security, July 12, 2005. http://usinfo.state.gov/gi/Archive/2005/Jul/14-680142.html 14 Wayne Cornelius, “Controlling ‘Unwanted’ Immigration: Lessons from the United States, 1993 – 2004” (San Diego, CA: University of California Center for Comparative Immigration Studies, December 2004), 2. 15 Ibid., 6. 16 The majority of resources for Operation Safeguard did not
  • 27. arrive until 1999. 17 Cornelius, “Controlling ‘Unwanted’ Immigration,” 6. ORDÓÑEZ, SECURING THE U.S.-MEXICO BORDER HOMELAND SECURITY AFFAIRS, SUPPLEMENT NO. 2 (2008) WWW.HSAJ.ORG 10 18 Bill Vann, “Five Years of Operation Gatekeeper: U.S. Border Crackdown Deaths Souring,” International Committee of the Fourth International (ICFI), June 25, 1999, http://www.wsws.org/articles/1999/jun1999/ins-j25.shtml. 19 Jeffrey Passel, “Unauthorized Migrants: Numbers and Characteristics,” Pew Hispanic Center, June 14, 2005. http://pewhispanic.org/reports/report.php?ReportID=46 20 Richard B. Schmitt, et al., “U.S. Fears Terrorism Via
  • 28. Mexico’s Time-Tested Smuggling Routes,” SITE Institute, September 15, 2004, http://www.siteinstitute.org/bin/articles.cgi?ID=news18904&Ca tegory=news&Subcategory=0. 21 This is one theory with regards to the displacement of migrants along the USMB. An alternative theory is the economic growth rates experienced in Phoenix and Las Vegas. These two cities are experiencing a fast growth rate followed by an increase in construction and employment. This boom in jobs in Nevada and Arizona causes the illegal migrant flow to switch to follow the employment opportunities. 22 Arizona Criminal Justice Commission, Arizona Crime Trends: A System Review, Statistical Analysis Center Publication, July 22, 2005, http://azcjc.gov/pubs/home/Crime_Trends_2005.pdf. Consejo de Seguridad Publica, “Programa de Mediano Plazo 2004 - 2009: Seguridad Publica,” http://www.sonora.gob.mx/biblioteca/documentos/pmp/segurida d.pdf. 23 A few days after 9/11, Mexican authorities detained 126 undocumented Iraqis in Mexico City. Since all
  • 29. Middle Easterners are supposed to have a VISA to enter the country, this presented a new problem for Mexican authorities: how did these people enter the country? Centro de Investigaciones Económicas y Política de Acción Comunitaria, “Guerra Mundial: Consecuencias Para México,” November 21, 2001, http://www.ciepac.org/bulletins/200-300/bolec267.htm. 24 Senator Jon Kyl, “Arizona: a ‘Terrorist Corridor?’” Guest Opinion, The Arizona Conservative, August 27, 2004, http://www.azconservative.org/Kyl_TerrorismCorridor.htm. 25 Admiral James Loy, United States Department of Homeland Security deputy secretary, testimony before the Senate Select Committee on Intelligence, February 16, 2005. http://www.dhs.gov/xnews/testimony/testimony_0030.shtm 26 United States General Accounting Office, Border Control: Revised Strategy is Showing Positive Results, Report to the Chairman, Subcommittee on Information, Justice, Transportation and Agriculture, Committee on Government Operations, House of Representatives, Washington DC, December 1994: 11.
  • 30. 27 Ibid. 28 Office of Justice Programs, Mapping Crime: Understanding Hot Spots (Washington DC: United States Department of Justice, August 2005), http://www.ojp.usdoj.gov/nij. 29 Ibid. DHS and DOD Announce Continued Partnership in Strengthening Southwest Border Security Release Date: December 20, 2011 For Immediate Release Office of the Press Secretary Contact: 202-282-8010 begin_of_the_skype_highlighting 202- 282-8010 FREE end_of_the_skype_highlighting WASHINGTON, D.C. - The Department of Defense (DOD) and the Department of Homeland Security (DHS) today announced they will continue their critical partnership to further strengthen the already unprecedented levels of personnel, technology, and infrastructure along the Southwest border - representing the Administration's ongoing commitment to secure the border and
  • 31. facilitate legitimate trade and travel. Since the summer of 2010, National Guard troops have acted as a critical support bridge while the Administration brought on new assets provided by the 2010 supplemental appropriation dedicated to effective border management and security. To date, Guardsmen stationed at the border supported civilian law enforcement on the ground through surveillance and criminal analysis. With additional DHS civilian law enforcement assets, including a record number of U.S. Border Patrol agents, now in place, the DOD mission at the border will transition as part of a new strategic approach, adding a number of new multi-purpose aerial assets equipped with the latest surveillance and reconnaissance capabilities. Additionally, DOD will provide air mobility support to the Border Patrol, allowing for faster response capabilities to a wide range of activities. The deployment of these new DOD technical assets, along with the additional DHS personnel on the ground, will enable DOD to reduce the number of National Guard troops at the Southwest border while enhancing border security. The addition of aerial surveillance assets allows the National Guard to better support DHS by shifting surveillance from fixed sites to mobile ones that can quickly match the dynamic environment of the border - a significant enhancement in the ability to detect and deter illegal activity at the border - and
  • 32. provide greater support to the thousands of men and women involved in border security. The transition to the new DOD/DHS strategic approach will begin in January, with additional aviation assets in place by March 1st. The aerial assets, which include both rotary and fixed-wing, will provide additional benefits including: · Increased ability to operate in diverse landscapes: Operating environments differ from sector to sector and even within sectors. An aerial platform provides a much greater field of vision for surveillance in places with challenging terrain. · Additional deterrence: The additional DOD aerial assets, which establish a greater visible presence from a distance to individuals attempting to cross the border illegally, coupled with the Border Patrol boots on the ground, will provide even greater border deterrence capabilities. · A faster response time: The air assets will reduce enforcement response time, enabling Border Patrol officers to quickly move from one location to another on short notice to meet emerging threats of illegal activity or incursion. Aircraft also provide the ability to quickly reach areas in rugged terrain or areas without roads that were previously difficult to access. · Flexible and adaptive surveillance as opposed to relying on fixed sites. In FY 2011, U.S. Border Patrol apprehensions - a key indicator of illegal immigration - decreased to 340,252, down 53 percent
  • 33. since FY 2008 and one fifth of what they were at their peak in FY 2000. Since 2004, the size of the Border Patrol has doubled to 21,444. THE 9/11 COMMISSION REPORT Final Report of the National Commission on Terrorist Attacks Upon the United States e xe c ut ive sum mary Thomas H. Kean chair
  • 34. Richard Ben-Veniste Fred F. Fielding Jamie S. Gorelick Slade Gorton Lee H. Hamilton vice chair Bob Kerrey John F. Lehman Timothy J. Roemer James R.Thompson COMMISSION MEMBERS Joanne M. Accolla
  • 35. Staff Assistant Alexis Albion Professional Staff Member Scott H. Allan, Jr. Counsel John A. Azzarello Counsel Caroline Barnes Professional Staff Member Warren Bass Professional Staff Member Ann M. Bennett Information Control Officer Mark S. Bittinger Professional Staff Member Madeleine Blot Counsel Antwion M. Blount Systems Engineer Sam Brinkley Professional Staff Member Geoffrey Scott Brown Research Assistant Daniel Byman Professional Staff Member
  • 36. Dianna Campagna Manager of Operations Samuel M.W. Caspersen Counsel Melissa A. Coffey Staff Assistant Lance Cole Consultant Marquittia L. Coleman Staff Assistant Marco A. Cordero Professional Staff Member Rajesh De Counsel George W. Delgrosso Investigator Gerald L. Dillingham Professional Staff Member Thomas E. Dowling Professional Staff Member Steven M. Dunne Deputy General Counsel Thomas R. Eldridge Counsel
  • 37. Alice Falk Editor John J. Farmer, Jr. Senior Counsel & Team Leader Alvin S. Felzenberg Deputy for Communications COMMISSION STAFF Philip Zelikow, Executive Director Christopher A. Kojm, Deputy Executive Director Daniel Marcus, General Counsel Lorry M. Fenner Professional Staff Member Susan Ginsburg Senior Counsel & Team Leader T. Graham Giusti Security Officer
  • 38. Nicole Marie Grandrimo Professional Staff Member Douglas N. Greenburg Counsel Barbara A. Grewe Senior Counsel, Special Projects Elinore Flynn Hartz Family Liaison Leonard R. Hawley Professional Staff Member L. Christine Healey Senior Counsel & Team Leader Karen Heitkotter Executive Secretary Walter T. Hempel II Professional Staff Member C. Michael Hurley Senior Counsel & Team Leader Dana J. Hyde Counsel John W. Ivicic Security Officer Michael N. Jacobson Counsel Hunter W. Jamerson
  • 39. Intern Bonnie D. Jenkins Counsel Reginald F. Johnson Staff Assistant R.William Johnstone Professional Staff Member Stephanie L. Kaplan Special Assistant & Managing Editor Miles L. Kara, Sr. Professional Staff Member Janice L. Kephart Counsel Hyon Kim Counsel Katarzyna Kozaczuk Financial Assistant Gordon Nathaniel Lederman Counsel Daniel J. Leopold Staff Assistant Sarah Webb Linden Professional Staff Member Douglas J. MacEachin
  • 40. Professional Staff Member & Team Leader Ernest R. May Senior Adviser Joseph McBride Intern James Miller Professional Staff Member Kelly Moore Professional Staff Member Charles M. Pereira Professional Staff Member John Raidt Professional Staff Member John Roth Senior Counsel & Team Leader Peter Rundlet Counsel Lloyd D. Salvetti Professional Staff Member Kevin J. Scheid Professional Staff Member & Team Leader Kevin Shaeffer Professional Staff Member Tracy J. Shycoff Deputy for Administration & Finance
  • 41. Dietrich L. Snell Senior Counsel & Team Leader Jonathan DeWees Stull Communications Assistant Lisa Marie Sullivan Staff Assistant Quinn John Tamm, Jr. Professional Staff Member Catharine S.Taylor Staff Assistant Yoel Tobin Counsel Emily Landis Walker Professional Staff Member & Family Liaison Garth Wermter Senior IT Consultant Serena B.Wille Counsel Peter Yerkes Public Affairs Assistant COMMISSION STAFF
  • 42. THE 9/11 COMMISSION REPORT e xe c ut ive sum mary We p re se nt th e narrat ive of this report and the recommendations that flow from it to the President of the United States, the United States Congress, and the American people for their consideration. Ten Commissioners—five Republicans and five Democrats chosen by elected leaders from our nation’s capital at a time of great partisan division—have come together to present this report without dissent.
  • 43. We have come together with a unity of purpose because our nation demands it. September 11, 2001, was a day of unprecedented shock and suffering in the history of the United States.The nation was unprepared. A NATION TRANSFORMED At 8:46 on the morning of September 11, 2001, the United States became a nation transformed. An airliner traveling at hundreds of miles per hour and carrying some 10,000 gallons of jet fuel plowed into the North Tower of the World Trade Center in Lower Manhattan. At 9:03, a second airliner hit the South Tower. Fire and smoke billowed upward. Steel, glass, ash, and bodies fell below.The Twin Towers, where up to 50,000 people worked each day, both collapsed less than 90 min- utes later. At 9:37 that same morning, a third airliner slammed into the
  • 44. western face of the Pentagon. At 10:03, a fourth airliner crashed in a field in southern Pennsylvania. It had been aimed at the United States Capitol or the White House, and was forced down by heroic passengers armed with the knowledge that America was under attack. More than 2,600 people died at the World Trade Center; 125 died at the EXECUTIVE SUMMARY 2 THE 9/11 COMMISSION REPORT Pentagon; 256 died on the four planes. The death toll surpassed that at Pearl Harbor in December 1941.
  • 45. This immeasurable pain was inflicted by 19 young Arabs acting at the behest of Islamist extremists headquartered in distant Afghanistan. Some had been in the United States for more than a year, mixing with the rest of the population. Though four had training as pilots, most were not well- educated. Most spoke English poorly, some hardly at all. In groups of four or five, carrying with them only small knives, box cutters, and cans of Mace or pepper spray, they had hijacked the four planes and turned them into deadly guided missiles. Why did they do this? How was the attack planned and conceived? How did the U.S. government fail to anticipate and prevent it? What can we do in the future to prevent similar acts of terrorism? A Shock, Not a Surprise The 9/11 attacks were a shock, but they should not have come as a surprise. Islamist extremists had given plenty of warning that they meant
  • 46. to kill Americans indiscriminately and in large numbers. Although Usama Bin Ladin himself would not emerge as a signal threat until the late 1990s, the threat of Islamist terrorism grew over the decade. In February 1993, a group led by Ramzi Yousef tried to bring down the World Trade Center with a truck bomb. They killed six and wounded a thou- sand. Plans by Omar Abdel Rahman and others to blow up the Holland and Lincoln tunnels and other New York City landmarks were frustrated when the plotters were arrested. In October 1993, Somali tribesmen shot down U.S. hel- icopters, killing 18 and wounding 73 in an incident that came to be known as “Black Hawk down.”Years later it would be learned that those Somali tribes- men had received help from al Qaeda. In early 1995, police in Manila uncovered a plot by Ramzi Yousef to blow
  • 47. up a dozen U.S. airliners while they were flying over the Pacific. In November 1995, a car bomb exploded outside the office of the U.S. program manager for the Saudi National Guard in Riyadh, killing five Americans and two others. In June 1996, a truck bomb demolished the Khobar Towers apartment complex in Dhahran, Saudi Arabia, killing 19 U.S. servicemen and wounding hundreds.The attack was carried out primarily by Saudi Hezbollah, an organization that had received help from the government of Iran. Until 1997, the U.S. intelligence community viewed Bin Ladin as a fin- ancier of terrorism, not as a terrorist leader. In February 1998, Usama Bin Ladin and four others issued a self-styled fatwa, publicly declaring that it was God’s decree that every Muslim should try his utmost to kill any American, military or civilian, anywhere in the world, because of American “occupa-
  • 48. EXECUTIVE SUMMARY 3 tion” of Islam’s holy places and aggression against Muslims. In August 1998, Bin Ladin’s group, al Qaeda, carried out near- simultaneous truck bomb attacks on the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania.The attacks killed 224 people, including 12 Americans, and wounded thousands more. In December 1999, Jordanian police foiled a plot to bomb hotels and other sites frequented by American tourists, and a U.S. Customs agent arrested Ahmed Ressam at the U.S. Canadian border as he was smuggling in explosives intend- ed for an attack on Los Angeles International Airport. In October 2000, an al Qaeda team in Aden,Yemen, used a
  • 49. motorboat filled with explosives to blow a hole in the side of a destroyer, the USS Cole, almost sinking the vessel and killing 17 American sailors. The 9/11 attacks on the World Trade Center and the Pentagon were far more elaborate, precise, and destructive than any of these earlier assaults. But by September 2001, the executive branch of the U.S. government, the Congress, the news media, and the American public had received clear warning that Islamist terrorists meant to kill Americans in high numbers. Who Is the Enemy? Who is this enemy that created an organization capable of inflicting such hor- rific damage on the United States? We now know that these attacks were car- ried out by various groups of Islamist extremists.The 9/11 attack was driven by Usama Bin Ladin. In the 1980s, young Muslims from around the world went to
  • 50. Afghanistan to join as volunteers in a jihad (or holy struggle) against the Soviet Union. A wealthy Saudi, Usama Bin Ladin, was one of them. Following the defeat of the Soviets in the late 1980s, Bin Ladin and others formed al Qaeda to mobilize jihads elsewhere. The history, culture, and body of beliefs from which Bin Ladin shapes and spreads his message are largely unknown to many Americans. Seizing on sym- bols of Islam’s past greatness, he promises to restore pride to people who con- sider themselves the victims of successive foreign masters. He uses cultural and religious allusions to the holy Qur’an and some of its interpreters. He appeals to people disoriented by cyclonic change as they confront modernity and glob- alization. His rhetoric selectively draws from multiple sources—Islam, history, and the region’s political and economic malaise.
  • 51. Bin Ladin also stresses grievances against the United States widely shared in the Muslim world. He inveighed against the presence of U.S. troops in Saudi Arabia, which is the home of Islam’s holiest sites, and against other U.S. policies in the Middle East. Upon this political and ideological foundation, Bin Ladin built over the course of a decade a dynamic and lethal organization. He built an infrastructure and organization in Afghanistan that could attract, train, and use recruits against ever more ambitious targets. He rallied new zealots and new money with each demonstration of al Qaeda’s capability. He had forged a close alliance with the Taliban, a regime providing sanctuary for al Qaeda. By September 11, 2001, al Qaeda possessed • leaders able to evaluate, approve, and supervise the planning
  • 52. and direc- tion of a major operation; • a personnel system that could recruit candidates, indoctrinate them, vet them, and give them the necessary training; • communications sufficient to enable planning and direction of opera- tives and those who would be helping them; • an intelligence effort to gather required information and form assess- ments of enemy strengths and weaknesses; • the ability to move people great distances; and • the ability to raise and move the money necessary to finance an attack. 1998 to September 11, 2001 The August 1998 bombings of U.S. embassies in Kenya and Tanzania established al Qaeda as a potent adversary of the United States. After launching cruise missile strikes against al Qaeda targets in
  • 53. Afghanistan and Sudan in retaliation for the embassy bombings, the Clinton administration applied diplomatic pressure to try to persuade the Taliban regime in Afghanistan to expel Bin Ladin. The administration also devised covert operations to use CIA-paid foreign agents to capture or kill Bin Ladin and his chief lieutenants. These actions did not stop Bin Ladin or dislodge al Qaeda from its sanctuary. By late 1998 or early 1999, Bin Ladin and his advisers had agreed on an idea brought to them by Khalid Sheikh Mohammed (KSM) called the “planes oper- ation.” It would eventually culminate in the 9/11 attacks. Bin Ladin and his chief of operations, Mohammed Atef, occupied undisputed leadership positions atop al Qaeda.Within al Qaeda, they relied heavily on the ideas and enterprise of strong-willed field commanders, such as KSM, to carry out worldwide ter- rorist operations.
  • 54. KSM claims that his original plot was even grander than those carried out on 9/11—ten planes would attack targets on both the East and West coasts of the United States.This plan was modified by Bin Ladin, KSM said, owing to its scale and complexity. Bin Ladin provided KSM with four initial operatives for suicide plane attacks within the United States, and in the fall of 1999 training 4 THE 9/11 COMMISSION REPORT for the attacks began. New recruits included four from a cell of expatriate Muslim extremists who had clustered together in Hamburg, Germany. One became the tactical commander of the operation in the United States: Mohamed Atta.
  • 55. U.S. intelligence frequently picked up reports of attacks planned by al Qaeda. Working with foreign security services, the CIA broke up some al Qaeda cells. The core of Bin Ladin’s organization nevertheless remained intact. In December 1999, news about the arrests of the terrorist cell in Jordan and the arrest of a terrorist at the U.S.-Canadian border became part of a “millennium alert.”The government was galvanized, and the public was on alert for any possible attack. In January 2000, the intense intelligence effort glimpsed and then lost sight of two operatives destined for the “planes operation.” Spotted in Kuala Lumpur, the pair were lost passing through Bangkok. On January 15, 2000, they arrived in Los Angeles. Because these two al Qaeda operatives had spent little time in the West and spoke little, if any, English, it is plausible that they or KSM
  • 56. would have tried to identify, in advance, a friendly contact in the United States.We explored suspi- cions about whether these two operatives had a support network of accomplices in the United States. The evidence is thin—simply not there for some cases, more worrisome in others. We do know that soon after arriving in California, the two al Qaeda oper- atives sought out and found a group of ideologically like- minded Muslims with roots in Yemen and Saudi Arabia, individuals mainly associated with a young Yemeni and others who attended a mosque in San Diego. After a brief stay in Los Angeles about which we know little, the al Qaeda operatives lived openly in San Diego under their true names. They managed to avoid attracting much attention. By the summer of 2000, three of the four Hamburg cell members had
  • 57. arrived on the East Coast of the United States and had begun pilot training. In early 2001, a fourth future hijacker pilot, Hani Hanjour, journeyed to Arizona with another operative, Nawaf al Hazmi, and conducted his refresher pilot train- ing there. A number of al Qaeda operatives had spent time in Arizona during the 1980s and early 1990s. During 2000, President Bill Clinton and his advisers renewed diplomatic efforts to get Bin Ladin expelled from Afghanistan. They also renewed secret efforts with some of the Taliban’s opponents—the Northern Alliance—to get enough intelligence to attack Bin Ladin directly. Diplomatic efforts centered on the new military government in Pakistan, and they did not succeed.The efforts with the Northern Alliance revived an inconclusive and secret debate about whether the United States should take sides in Afghanistan’s civil war and sup-
  • 58. EXECUTIVE SUMMARY 5 port the Taliban’s enemies. The CIA also produced a plan to improve intelli- gence collection on al Qaeda, including the use of a small, unmanned airplane with a video camera, known as the Predator. After the October 2000 attack on the USS Cole, evidence accumulated that it had been launched by al Qaeda operatives, but without confirmation that Bin Ladin had given the order. The Taliban had earlier been warned that it would be held responsible for another Bin Ladin attack on the United States.The CIA described its findings as a “preliminary judgment”; President Clinton and his chief advisers told us they were waiting for a conclusion before deciding whether to take military action.The military alternatives
  • 59. remained unappealing to them. The transition to the new Bush administration in late 2000 and early 2001 took place with the Cole issue still pending. President George W. Bush and his chief advisers accepted that al Qaeda was responsible for the attack on the Cole, but did not like the options available for a response. Bin Ladin’s inference may well have been that attacks, at least at the level of the Cole, were risk free. The Bush administration began developing a new strategy with the stated goal of eliminating the al Qaeda threat within three to five years. During the spring and summer of 2001, U.S. intelligence agencies received a stream of warnings that al Qaeda planned, as one report put it, “something very, very, very big.” Director of Central Intelligence George
  • 60. Tenet told us,“The system was blinking red.” Although Bin Ladin was determined to strike in the United States, as President Clinton had been told and President Bush was reminded in a Presidential Daily Brief article briefed to him in August 2001, the specific threat information pointed overseas. Numerous precautions were taken overseas. Domestic agencies were not effectively mobilized. The threat did not receive national media attention comparable to the millennium alert. While the United States continued disruption efforts around the world, its emerging strategy to eliminate the al Qaeda threat was to include an enlarged covert action program in Afghanistan, as well as diplomatic strategies for Afghanistan and Pakistan. The process culminated during the summer of 2001 in a draft presidential directive and arguments about the Predator aircraft, which
  • 61. was soon to be deployed with a missile of its own, so that it might be used to attempt to kill Bin Ladin or his chief lieutenants. At a September 4 meeting, President Bush’s chief advisers approved the draft directive of the strategy and endorsed the concept of arming the Predator. This directive on the al Qaeda strategy was awaiting President Bush’s signature on September 11, 2001. Though the “planes operation” was progressing, the plotters had problems of 6 THE 9/11 COMMISSION REPORT their own in 2001. Several possible participants dropped out; others could not gain entry into the United States (including one denial at a port of entry and visa denials not related to terrorism). One of the eventual pilots may
  • 62. have considered abandoning the planes operation. Zacarias Moussaoui, who showed up at a flight training school in Minnesota, may have been a candidate to replace him. Some of the vulnerabilities of the plotters become clear in retrospect. Moussaoui aroused suspicion for seeking fast-track training on how to pilot large jet airliners. He was arrested on August 16, 2001, for violations of immi- gration regulations. In late August, officials in the intelligence community real- ized that the terrorists spotted in Southeast Asia in January 2000 had arrived in the United States. These cases did not prompt urgent action. No one working on these late leads in the summer of 2001 connected them to the high level of threat report- ing. In the words of one official, no analytic work foresaw the lightning that could connect the thundercloud to the ground.
  • 63. As final preparations were under way during the summer of 2001, dissent emerged among al Qaeda leaders in Afghanistan over whether to proceed. The Taliban’s chief, Mullah Omar, opposed attacking the United States. Although facing opposition from many of his senior lieutenants, Bin Ladin effectively overruled their objections, and the attacks went forward. September 11, 2001 The day began with the 19 hijackers getting through a security checkpoint sys- tem that they had evidently analyzed and knew how to defeat.Their success rate in penetrating the system was 19 for 19.They took over the four flights, taking advantage of air crews and cockpits that were not prepared for the contingency of a suicide hijacking. On 9/11, the defense of U.S. air space depended on close interaction between two federal agencies: the Federal Aviation
  • 64. Administration (FAA) and North American Aerospace Defense Command (NORAD). Existing protocols on 9/11 were unsuited in every respect for an attack in which hijacked planes were used as weapons. What ensued was a hurried attempt to improvise a defense by civilians who had never handled a hijacked aircraft that attempted to disappear, and by a mil- itary unprepared for the transformation of commercial aircraft into weapons of mass destruction. A shootdown authorization was not communicated to the NORAD air defense sector until 28 minutes after United 93 had crashed in Pennsylvania. Planes were scrambled, but ineffectively, as they did not know where to go or what targets they were to intercept. And once the shootdown order was given, EXECUTIVE SUMMARY 7
  • 65. it was not communicated to the pilots. In short, while leaders in Washington believed that the fighters circling above them had been instructed to “take out” hostile aircraft, the only orders actually conveyed to the pilots were to “ID type and tail.” Like the national defense, the emergency response on 9/11 was necessarily improvised. In New York City, the Fire Department of New York, the New York Police Department, the Port Authority of New York and New Jersey, the building employees, and the occupants of the buildings did their best to cope with the effects of almost unimaginable events—unfolding furiously
  • 66. over 102 minutes. Casualties were nearly 100 percent at and above the impact zones and were very high among first responders who stayed in dan- ger as they tried to save lives. Despite weaknesses in preparations for disas- ter, failure to achieve unified incident command, and inadequate communi- cations among responding agencies, all but approximately one hundred of the thousands of civilians who worked below the impact zone escaped, often with help from the emergency responders. At the Pentagon, while there were also problems of command and control, the emergency response was generally effective. The Incident Command System, a formalized management structure for emergency response in place in the National Capital Region, overcame the inherent complications of a response across local, state, and federal jurisdictions. Operational Opportunities
  • 67. We write with the benefit and handicap of hindsight. We are mindful of the danger of being unjust to men and women who made choices in conditions of uncertainty and in circumstances over which they often had little control. Nonetheless, there were specific points of vulnerability in the plot and opportunities to disrupt it. Operational failures—opportunities that were not or could not be exploited by the organizations and systems of that time—included • not watchlisting future hijackers Hazmi and Mihdhar, not trailing them after they traveled to Bangkok, and not informing the FBI about one future hijacker’s U.S. visa or his companion’s travel to the United States; • not sharing information linking individuals in the Cole attack to
  • 68. Mihdhar; • not taking adequate steps in time to find Mihdhar or Hazmi in the United States; 8 THE 9/11 COMMISSION REPORT • not linking the arrest of Zacarias Moussaoui, described as interested in flight training for the purpose of using an airplane in a terrorist act, to the heightened indications of attack; • not discovering false statements on visa applications; • not recognizing passports manipulated in a fraudulent manner; • not expanding no-fly lists to include names from terrorist watchlists; • not searching airline passengers identified by the computer- based
  • 69. CAPPS screening system; and • not hardening aircraft cockpit doors or taking other measures to pre- pare for the possibility of suicide hijackings. GENERAL FINDINGS Since the plotters were flexible and resourceful, we cannot know whether any single step or series of steps would have defeated them.What we can say with confidence is that none of the measures adopted by the U.S. govern- ment from 1998 to 2001 disturbed or even delayed the progress of the al Qaeda plot. Across the government, there were failures of imagination, pol- icy, capabilities, and management. Imagination The most important failure was one of imagination.We do not believe lead- ers understood the gravity of the threat.The terrorist danger from Bin Ladin
  • 70. and al Qaeda was not a major topic for policy debate among the public, the media, or in the Congress. Indeed, it barely came up during the 2000 pres- idential campaign. Al Qaeda’s new brand of terrorism presented challenges to U.S. governmen- tal institutions that they were not well-designed to meet. Though top officials all told us that they understood the danger, we believe there was uncertainty among them as to whether this was just a new and especially venomous version of the ordinary terrorist threat the United States had lived with for decades, or it was indeed radically new, posing a threat beyond any yet experienced. As late as September 4, 2001, Richard Clarke, the White House staffer long responsible for counterterrorism policy coordination, asserted that the govern- ment had not yet made up its mind how to answer the question: “Is al Qida a
  • 71. big deal?” A week later came the answer. EXECUTIVE SUMMARY 9 Policy Terrorism was not the overriding national security concern for the U.S. gov- ernment under either the Clinton or the pre-9/11 Bush administration. The policy challenges were linked to this failure of imagination. Officials in both the Clinton and Bush administrations regarded a full U.S. invasion of Afghanistan as practically inconceivable before 9/11. Capabilities Before 9/11, the United States tried to solve the al Qaeda problem with the
  • 72. capabilities it had used in the last stages of the Cold War and its immediate aftermath.These capabilities were insufficient. Little was done to expand or reform them. The CIA had minimal capacity to conduct paramilitary operations with its own personnel, and it did not seek a large-scale expansion of these capabilities before 9/11. The CIA also needed to improve its capability to collect intelli- gence from human agents. At no point before 9/11 was the Department of Defense fully engaged in the mission of countering al Qaeda, even though this was perhaps the most dan- gerous foreign enemy threatening the United States. America’s homeland defenders faced outward. NORAD itself was barely able to retain any alert bases at all. Its planning scenarios occasionally consid- ered the danger of hijacked aircraft being guided to American
  • 73. targets, but only aircraft that were coming from overseas. The most serious weaknesses in agency capabilities were in the domestic arena. The FBI did not have the capability to link the collective knowledge of agents in the field to national priorities. Other domestic agencies deferred to the FBI. FAA capabilities were weak. Any serious examination of the possibility of a suicide hijacking could have suggested changes to fix glaring vulnera- bilities—expanding no-fly lists, searching passengers identified by the CAPPS screening system, deploying federal air marshals domestically, hard- ening cockpit doors, alerting air crews to a different kind of hijacking pos- sibility than they had been trained to expect. Yet the FAA did not adjust either its own training or training with NORAD to take account of threats
  • 74. other than those experienced in the past. Management The missed opportunities to thwart the 9/11 plot were also symptoms of a broader inability to adapt the way government manages problems to the new challenges of the twenty-first century. Action officers should have been able to 10 THE 9/11 COMMISSION REPORT draw on all available knowledge about al Qaeda in the government. Management should have ensured that information was shared and duties were clearly assigned across agencies, and across the foreign- domestic divide. There were also broader management issues with respect to how top leaders
  • 75. set priorities and allocated resources. For instance, on December 4, 1998, DCI Tenet issued a directive to several CIA officials and the DDCI for Community Management, stating: “We are at war. I want no resources or people spared in this effort, either inside CIA or the Community.” The memorandum had little overall effect on mobilizing the CIA or the intelligence community. This episode indicates the limitations of the DCI’s authority over the direction of the intelligence community, including agencies within the Department of Defense. The U.S. government did not find a way of pooling intelligence and using it to guide the planning and assignment of responsibilities for joint operations involving entities as disparate as the CIA, the FBI, the State Department, the military, and the agencies involved in homeland security. SPECIFIC FINDINGS
  • 76. Unsuccessful Diplomacy Beginning in February 1997, and through September 11, 2001, the U.S. gov- ernment tried to use diplomatic pressure to persuade the Taliban regime in Afghanistan to stop being a sanctuary for al Qaeda, and to expel Bin Ladin to a country where he could face justice. These efforts included warnings and sanctions, but they all failed. The U.S. government also pressed two successive Pakistani governments to demand that the Taliban cease providing a sanctuary for Bin Ladin and his organ- ization and, failing that, to cut off their support for the Taliban. Before 9/11, the United States could not find a mix of incentives and pressure that would per- suade Pakistan to reconsider its fundamental relationship with the Taliban. From 1999 through early 2001, the United States pressed the United Arab Emirates, one of the Taliban’s only travel and financial outlets
  • 77. to the outside world, to break off ties and enforce sanctions, especially those related to air trav- el to Afghanistan.These efforts achieved little before 9/11. Saudi Arabia has been a problematic ally in combating Islamic extremism. Before 9/11, the Saudi and U.S. governments did not fully share intelligence information or develop an adequate joint effort to track and disrupt the finances of the al Qaeda organization. On the other hand, government officials of Saudi Arabia at the highest levels worked closely with top U.S. officials in major ini- tiatives to solve the Bin Ladin problem with diplomacy. EXECUTIVE SUMMARY 11 Lack of Military Options In response to the request of policymakers, the military
  • 78. prepared an array of limited strike options for attacking Bin Ladin and his organization from May 1998 onward.When they briefed policymakers, the military presented both the pros and cons of those strike options and the associated risks. Policymakers expressed frustration with the range of options presented. Following the August 20, 1998, missile strikes on al Qaeda targets in Afghanistan and Sudan, both senior military officials and policymakers placed great emphasis on actionable intelligence as the key factor in recom- mending or deciding to launch military action against Bin Ladin and his organization. They did not want to risk significant collateral damage, and they did not want to miss Bin Ladin and thus make the United States look weak while making Bin Ladin look strong. On three specific occasions in 1998–1999, intelligence was deemed credible enough to warrant planning
  • 79. for possible strikes to kill Bin Ladin. But in each case the strikes did not go forward, because senior policymakers did not regard the intelligence as suf- ficiently actionable to offset their assessment of the risks. The Director of Central Intelligence, policymakers, and military officials expressed frustration with the lack of actionable intelligence. Some officials inside the Pentagon, including those in the special forces and the counterterror- ism policy office, also expressed frustration with the lack of military action.The Bush administration began to develop new policies toward al Qaeda in 2001, but military plans did not change until after 9/11. Problems within the Intelligence Community The intelligence community struggled throughout the 1990s and up to 9/11 to collect intelligence on and analyze the phenomenon of transnational terrorism. The combination of an overwhelming number of priorities, flat budgets, an
  • 80. outmoded structure, and bureaucratic rivalries resulted in an insufficient response to this new challenge. Many dedicated officers worked day and night for years to piece together the growing body of evidence on al Qaeda and to understand the threats.Yet, while there were many reports on Bin Laden and his growing al Qaeda organization, there was no comprehensive review of what the intelligence community knew and what it did not know, and what that meant. There was no National Intelligence Estimate on terrorism between 1995 and 9/11. Before 9/11, no agency did more to attack al Qaeda than the CIA. But there were limits to what the CIA was able to achieve by disrupting terrorist activi- ties abroad and by using proxies to try to capture Bin Ladin and his lieutenants in Afghanistan. CIA officers were aware of those limitations. 12 THE 9/11 COMMISSION REPORT
  • 81. To put it simply, covert action was not a silver bullet. It was important to engage proxies in Afghanistan and to build various capabilities so that if an opportunity presented itself, the CIA could act on it. But for more than three years, through both the late Clinton and early Bush administrations, the CIA relied on proxy forces, and there was growing frustration within the CIA’s Counterterrorist Center and in the National Security Council staff with the lack of results. The development of the Predator and the push to aid the Northern Alliance were products of this frustration. Problems in the FBI From the time of the first World Trade Center attack in 1993, FBI and Department of Justice leadership in Washington and New York
  • 82. became increas- ingly concerned about the terrorist threat from Islamist extremists to U.S. inter- ests, both at home and abroad.Throughout the 1990s, the FBI’s counterterror- ism efforts against international terrorist organizations included both intelli- gence and criminal investigations.The FBI’s approach to investigations was case- specific, decentralized, and geared toward prosecution. Significant FBI resources were devoted to after-the-fact investigations of major terrorist attacks, resulting in several prosecutions. The FBI attempted several reform efforts aimed at strengthening its ability to prevent such attacks, but these reform efforts failed to implement organiza- tion-wide institutional change. On September 11, 2001, the FBI was limited in several areas critical to an effective preventive counterterrorism strategy. Those working counterterrorism matters did so despite limited intelligence collection
  • 83. and strategic analysis capabilities, a limited capacity to share information both internally and externally, insufficient training, perceived legal barriers to sharing information, and inadequate resources. Permeable Borders and Immigration Controls There were opportunities for intelligence and law enforcement to exploit al Qaeda’s travel vulnerabilities. Considered collectively, the 9/11 hijackers • included known al Qaeda operatives who could have been watchlisted; • presented passports manipulated in a fraudulent manner; • presented passports with suspicious indicators of extremism; • made detectable false statements on visa applications; • made false statements to border officials to gain entry into the United States; and • violated immigration laws while in the United States. EXECUTIVE SUMMARY 13
  • 84. Neither the State Department’s consular officers nor the Immigration and Naturalization Service’s inspectors and agents were ever considered full partners in a national counterterrorism effort. Protecting borders was not a national security issue before 9/11. Permeable Aviation Security Hijackers studied publicly available materials on the aviation security system and used items that had less metal content than a handgun and were most like- ly permissible.Though two of the hijackers were on the U.S.TIPOFF terrorist watchlist, the FAA did not use TIPOFF data.The hijackers had to beat only one layer of security—the security checkpoint process. Even though several hijack- ers were selected for extra screening by the CAPPS system, this led only to
  • 85. greater scrutiny of their checked baggage. Once on board, the hijackers were faced with aircraft personnel who were trained to be nonconfrontational in the event of a hijacking. Financing The 9/11 attacks cost somewhere between $400,000 and $500,000 to execute. The operatives spent more than $270,000 in the United States. Additional expenses included travel to obtain passports and visas, travel to the United States, expenses incurred by the plot leader and facilitators outside the United States, and expenses incurred by the people selected to be hijackers who ulti- mately did not participate. The conspiracy made extensive use of banks in the United States. The hijackers opened accounts in their own names, using passports and other iden- tification documents. Their transactions were unremarkable and essentially
  • 86. invisible amid the billions of dollars flowing around the world every day. To date, we have not been able to determine the origin of the money used for the 9/11 attacks. Al Qaeda had many sources of funding and a pre- 9/11 annual budget estimated at $30 million. If a particular source of funds had dried up, al Qaeda could easily have found enough money elsewhere to fund the attack. An Improvised Homeland Defense The civilian and military defenders of the nation’s airspace— FAA and NORAD—were unprepared for the attacks launched against them. Given that lack of preparedness, they attempted and failed to improvise an effective home- land defense against an unprecedented challenge. The events of that morning do not reflect discredit on operational person- nel. NORAD’s Northeast Air Defense Sector personnel reached
  • 87. out for infor- 14 THE 9/11 COMMISSION REPORT mation and made the best judgments they could based on the information they received. Individual FAA controllers, facility managers, and command center managers were creative and agile in recommending a nationwide alert, ground- stopping local traffic, ordering all aircraft nationwide to land, and executing that unprecedented order flawlessly. At more senior levels, communication was poor. Senior military and FAA leaders had no effective communication with each other. The chain of com- mand did not function well. The President could not reach some senior offi- cials. The Secretary of Defense did not enter the chain of
  • 88. command until the morning’s key events were over. Air National Guard units with different rules of engagement were scrambled without the knowledge of the President, NORAD, or the National Military Command Center. Emergency Response The civilians, firefighters, police officers, emergency medical technicians, and emergency management professionals exhibited steady determination and resolve under horrifying, overwhelming conditions on 9/11.Their actions saved lives and inspired a nation. Effective decisionmaking in New York was hampered by problems in com- mand and control and in internal communications. Within the Fire Department of New York, this was true for several reasons: the magnitude of the incident was unforeseen; commanders had difficulty communicating with their units; more units were actually dispatched than were
  • 89. ordered by the chiefs; some units self-dispatched; and once units arrived at the World Trade Center, they were neither comprehensively accounted for nor coordinated. The Port Authority’s response was hampered by the lack both of standard operating procedures and of radios capable of enabling multiple commands to respond to an incident in unified fashion. The New York Police Department, because of its history of mobilizing thousands of officers for major events requiring crowd control, had a technical radio capability and protocols more easily adapted to an incident of the magnitude of 9/11. Congress The Congress, like the executive branch, responded slowly to the rise of transnational terrorism as a threat to national security. The legislative branch adjusted little and did not restructure itself to address changing threats. Its atten- tion to terrorism was episodic and splintered across several
  • 90. committees. The Congress gave little guidance to executive branch agencies on terrorism, did not reform them in any significant way to meet the threat, and did not systemati- cally perform robust oversight to identify, address, and attempt to resolve the EXECUTIVE SUMMARY 15 many problems in national security and domestic agencies that became appar- ent in the aftermath of 9/11. So long as oversight is undermined by current congressional rules and reso- lutions, we believe the American people will not get the security they want and need. The United States needs a strong, stable, and capable congressional com- mittee structure to give America’s national intelligence agencies
  • 91. oversight, sup- port, and leadership. Are We Safer? Since 9/11, the United States and its allies have killed or captured a majority of al Qaeda’s leadership; toppled the Taliban, which gave al Qaeda sanctuary in Afghanistan; and severely damaged the organization.Yet terrorist attacks contin- ue. Even as we have thwarted attacks, nearly everyone expects they will come. How can this be? The problem is that al Qaeda represents an ideological movement, not a finite group of people. It initiates and inspires, even if it no longer directs. In this way it has transformed itself into a decentralized force. Bin Ladin may be lim- ited in his ability to organize major attacks from his hideouts.Yet killing or cap- turing him, while extremely important, would not end terror. His message of inspiration to a new generation of terrorists would continue.
  • 92. Because of offensive actions against al Qaeda since 9/11, and defensive actions to improve homeland security, we believe we are safer today. But we are not safe.We therefore make the following recommendations that we believe can make America safer and more secure. RECOMMENDATIONS Three years after 9/11, the national debate continues about how to protect our nation in this new era. We divide our recommendations into two basic parts: What to do, and how to do it. WHAT TO DO? A GLOBAL STRATEGY The enemy is not just “terrorism.” It is the threat posed specifically by Islamist terrorism, by Bin Ladin and others who draw on a long tradition of extreme intolerance within a minority strain of Islam that does not distinguish politics
  • 93. from religion, and distorts both. The enemy is not Islam, the great world faith, but a perversion of Islam.The 16 THE 9/11 COMMISSION REPORT enemy goes beyond al Qaeda to include the radical ideological movement, inspired in part by al Qaeda, that has spawned other terrorist groups and vio- lence.Thus our strategy must match our means to two ends: dismantling the al Qaeda network and, in the long term, prevailing over the ideology that con- tributes to Islamist terrorism. The first phase of our post-9/11 efforts rightly included military action to topple the Taliban and pursue al Qaeda. This work continues. But long-term
  • 94. success demands the use of all elements of national power: diplomacy, intelli- gence, covert action, law enforcement, economic policy, foreign aid, public diplomacy, and homeland defense. If we favor one tool while neglecting others, we leave ourselves vulnerable and weaken our national effort. What should Americans expect from their government? The goal seems unlimited: Defeat terrorism anywhere in the world. But Americans have also been told to expect the worst: An attack is probably coming; it may be more devastating still. Vague goals match an amorphous picture of the enemy. Al Qaeda and other groups are popularly described as being all over the world, adaptable, resilient, needing little higher-level organization, and capable of anything. It is an image of an omnipotent hydra of destruction.That image lowers expectations of gov- ernment effectiveness.
  • 95. It lowers them too far. Our report shows a determined and capable group of plotters.Yet the group was fragile and occasionally left vulnerable by the mar- ginal, unstable people often attracted to such causes.The enemy made mistakes. The U.S. government was not able to capitalize on them. No president can promise that a catastrophic attack like that of 9/11 will not happen again. But the American people are entitled to expect that officials will have realistic objectives, clear guidance, and effective organization. They are entitled to see standards for performance so they can judge, with the help of their elected representatives, whether the objectives are being met. We propose a strategy with three dimensions: (1) attack terrorists and their organizations, (2) prevent the continued growth of Islamist terrorism, and (3) protect against and prepare for terrorist attacks.
  • 96. Attack Terrorists and Their Organizations • Root out sanctuaries.The U.S. government should identify and prior- itize actual or potential terrorist sanctuaries and have realistic country or regional strategies for each, utilizing every element of national power and reaching out to countries that can help us. EXECUTIVE SUMMARY 17 • Strengthen long-term U.S. and international commitments to the future of Pakistan and Afghanistan. • Confront problems with Saudi Arabia in the open and build a relation- ship beyond oil, a relationship that both sides can defend to their citi-
  • 97. zens and includes a shared commitment to reform. Prevent the Continued Growth of Islamist Terrorism In October 2003, Secretary of Defense Donald Rumsfeld asked if enough was being done “to fashion a broad integrated plan to stop the next generation of terrorists.” As part of such a plan, the U.S. government should • Define the message and stand as an example of moral leadership in the world. To Muslim parents, terrorists like Bin Ladin have nothing to offer their children but visions of violence and death. America and its friends have the advantage—our vision can offer a better future. • Where Muslim governments, even those who are friends, do not offer opportunity, respect the rule of law, or tolerate differences, then the United States needs to stand for a better future. • Communicate and defend American ideals in the Islamic world,
  • 98. through much stronger public diplomacy to reach more people, including students and leaders outside of government. Our efforts here should be as strong as they were in combating closed societies during the Cold War. • Offer an agenda of opportunity that includes support for public edu- cation and economic openness. • Develop a comprehensive coalition strategy against Islamist terrorism, using a flexible contact group of leading coalition governments and fashioning a common coalition approach on issues like the treatment of captured terrorists. • Devote a maximum effort to the parallel task of countering the pro- liferation of weapons of mass destruction. • Expect less from trying to dry up terrorist money and more from fol-
  • 99. lowing the money for intelligence, as a tool to hunt terrorists, under- 18 THE 9/11 COMMISSION REPORT stand their networks, and disrupt their operations. Protect against and Prepare for Terrorist Attacks • Target terrorist travel, an intelligence and security strategy that the 9/11 story showed could be at least as powerful as the effort devoted to terrorist finance. • Address problems of screening people with biometric identifiers across agencies and governments, including our border and transportation systems, by designing a comprehensive screening system that addresses
  • 100. common problems and sets common standards. As standards spread, this necessary and ambitious effort could dramatically strengthen the world’s ability to intercept individuals who could pose catastrophic threats. • Quickly complete a biometric entry-exit screening system, one that also speeds qualified travelers. • Set standards for the issuance of birth certificates and sources of iden- tification, such as driver’s licenses. • Develop strategies for neglected parts of our transportation security system. Since 9/11, about 90 percent of the nation’s $5 billion annual investment in transportation security has gone to aviation, to fight the last war. • In aviation, prevent arguments about a new computerized
  • 101. profiling system from delaying vital improvements in the “no-fly” and “auto- matic selectee” lists. Also, give priority to the improvement of check- point screening. • Determine, with leadership from the President, guidelines for gather- ing and sharing information in the new security systems that are need- ed, guidelines that integrate safeguards for privacy and other essential liberties. • Underscore that as government power necessarily expands in certain ways, the burden of retaining such powers remains on the executive to demonstrate the value of such powers and ensure adequate supervision EXECUTIVE SUMMARY 19
  • 102. of how they are used, including a new board to oversee the implemen- tation of the guidelines needed for gathering and sharing information in these new security systems. • Base federal funding for emergency preparedness solely on risks and vulnerabilities, putting New York City and Washington, D.C., at the top of the current list. Such assistance should not remain a program for general revenue sharing or pork-barrel spending. • Make homeland security funding contingent on the adoption of an incident command system to strengthen teamwork in a crisis, includ- ing a regional approach. Allocate more radio spectrum and improve connectivity for public safety communications, and encourage wide-
  • 103. spread adoption of newly developed standards for private-sector emer- gency preparedness—since the private sector controls 85 percent of the nation’s critical infrastructure. HOW TO DO IT? A DIFFERENT WAY OF ORGANIZING GOVERNMENT The strategy we have recommended is elaborate, even as presented here very briefly.To implement it will require a government better organized than the one that exists today, with its national security institutions designed half a century ago to win the Cold War. Americans should not settle for incremental, ad hoc adjustments to a system created a generation ago for a world that no longer exists. Our detailed recommendations are designed to fit together.Their purpose is clear: to build unity of effort across the U.S. government. As one official now
  • 104. serving on the front lines overseas put it to us: “One fight, one team.” We call for unity of effort in five areas, beginning with unity of effort on the challenge of counterterrorism itself: • unifying strategic intelligence and operational planning against Islamist terrorists across the foreign-domestic divide with a National Counterterrorism Center; • unifying the intelligence community with a new National Intelligence Director; 20 THE 9/11 COMMISSION REPORT • unifying the many participants in the counterterrorism effort and their knowledge in a network-based information sharing system that
  • 105. tran- scends traditional governmental boundaries; • unifying and strengthening congressional oversight to improve quality and accountability; and • strengthening the FBI and homeland defenders. Unity of Effort: A National Counterterrorism Center The 9/11 story teaches the value of integrating strategic intelligence from all sources into joint operational planning—with both dimensions spanning the foreign-domestic divide. • In some ways, since 9/11, joint work has gotten better. The effort of fighting terrorism has flooded over many of the usual agency bound- aries because of its sheer quantity and energy. Attitudes have changed. But the problems of coordination have multiplied. The Defense Department alone has three unified commands (SOCOM, CENT- COM, and NORTHCOM) that deal with terrorism as one of their
  • 106. principal concerns. • Much of the public commentary about the 9/11 attacks has focused on “lost opportunities.” Though characterized as problems of “watch- listing,” “information sharing,” or “connecting the dots,” each of these labels is too narrow.They describe the symptoms, not the disease. • Breaking the older mold of organization stovepiped purely in execu- tive agencies, we propose a National Counterterrorism Center (NCTC) that would borrow the joint, unified command concept adopted in the 1980s by the American military in a civilian agency, combining the joint intelligence function alongside the operations work. • The NCTC would build on the existing Terrorist Threat Integration Center and would replace it and other terrorism “fusion centers” with-
  • 107. in the government.The NCTC would become the authoritative knowl- edge bank, bringing information to bear on common plans. It should task collection requirements both inside and outside the United States. EXECUTIVE SUMMARY 21 • The NCTC should perform joint operational planning, assigning lead responsibilities to existing agencies and letting them direct the actual execution of the plans. • Placed in the Executive Office of the President, headed by a Senate- confirmed official (with rank equal to the deputy head of a cabinet department) who reports to the National Intelligence Director, the
  • 108. NCTC would track implementation of plans. It would be able to influence the leadership and the budgets of the counterterrorism operating arms of the CIA, the FBI, and the departments of Defense and Homeland Security. • The NCTC should not be a policymaking body. Its operations and planning should follow the policy direction of the president and the National Security Council. Unity of Effort: A National Intelligence Director Since long before 9/11—and continuing to this day—the intelligence commu- nity is not organized well for joint intelligence work. It does not employ com- mon standards and practices in reporting intelligence or in training experts overseas and at home. The expensive national capabilities for collecting intelli- gence have divided management.The structures are too complex and too secret. • The community’s head—the Director of Central Intelligence—
  • 109. has at least three jobs: running the CIA, coordinating a 15-agency confeder- ation, and being the intelligence analyst-in-chief to the president. No one person can do all these things. • A new National Intelligence Director should be established with two main jobs: (1) to oversee national intelligence centers that combine experts from all the collection disciplines against common targets— like counterterrorism or nuclear proliferation; and (2) to oversee the agencies that contribute to the national intelligence program, a task that includes setting common standards for personnel and information technology. • The national intelligence centers would be the unified commands of the intelligence world—a long-overdue reform for intelligence com-
  • 110. parable to the 1986 Goldwater-Nichols law that reformed the organ- ization of national defense.The home services—such as the CIA, DIA, 22 THE 9/11 COMMISSION REPORT EXECUTIVE SUMMARY 23 E xe cu ti ve O ff ic e
  • 134. ge nc e NSA, and FBI—would organize, train, and equip the best intelligence professionals in the world, and would handle the execution of intelli- gence operations in the field. • This National Intelligence Director (NID) should be located in the Executive Office of the President and report directly to the president, yet be confirmed by the Senate. In addition to overseeing the National Counterterrorism Center described above (which will include both the national intelligence center for terrorism and the joint operations planning effort), the NID should have three deputies:
  • 135. • For foreign intelligence (a deputy who also would be the head of the CIA) • For defense intelligence (also the under secretary of defense for intelligence) • For homeland intelligence (also the executive assistant director for intelligence at the FBI or the under secretary of homeland securi- ty for information analysis and infrastructure protection) • The NID should receive a public appropriation for national intelli- gence, should have authority to hire and fire his or her intelligence deputies, and should be able to set common personnel and informa- tion technology policies across the intelligence community. • The CIA should concentrate on strengthening the collection capabil-
  • 136. ities of its clandestine service and the talents of its analysts, building pride in its core expertise. • Secrecy stifles oversight, accountability, and information sharing. Unfortunately, all the current organizational incentives encourage overclassification. This balance should change; and as a start, open information should be provided about the overall size of agency intel- ligence budgets. Unity of Effort: Sharing Information The U.S. government has access to a vast amount of information. But it has a weak system for processing and using what it has. The system of “need to know” should be replaced by a system of “need to share.” • The President should lead a government-wide effort to bring the 24 THE 9/11 COMMISSION REPORT
  • 137. EXECUTIVE SUMMARY 25 major national security institutions into the information revolution, turning a mainframe system into a decentralized network. The obsta- cles are not technological. Official after official has urged us to call attention to problems with the unglamorous “back office” side of gov- ernment operations. • But no agency can solve the problems on its own—to build the net- work requires an effort that transcends old divides, solving common legal and policy issues in ways that can help officials know what they can and cannot do. Again, in tackling information issues, America
  • 138. needs unity of effort. Unity of Effort: Congress Congress took too little action to adjust itself or to restructure the executive branch to address the emerging terrorist threat. Congressional oversight for intelligence—and counterterrorism—is dysfunctional. Both Congress and the executive need to do more to minimize national security risks during transi- tions between administrations. • For intelligence oversight, we propose two options: either a joint com- mittee on the old model of the Joint Committee on Atomic Energy or a single committee in each house combining authorizing and appropriating committees. Our central message is the same: the intel- ligence committees cannot carry out their oversight function unless they are made stronger, and thereby have both clear responsibility and accountability for that oversight.