National Security Case Studies

Total Page:16

File Type:pdf, Size:1020Kb

National Security Case Studies National Security Case Studies Special Case-Management Challenges Robert Timothy Reagan Federal Judicial Center February 22, 2010 This Federal Judicial Center publication was undertaken in furtherance of the Centers statutory mission to develop and conduct education programs for the judicial branch. The views expressed are those of the author and not necessarily those of the Federal Judicial Center. Table of Contents Table of Challenges .......................................................................................................... vii Table of Judges ................................................................................................................. ix Introduction ....................................................................................................................... 1 First World Trade Center Bombing United States v. Salameh (Kevin Thomas Duffy, S.D.N.Y.) and United States v. Abdel Rahman (Michael B. Mukasey, S.D.N.Y.) ............................................................... 2 Challenge: Court Security ......................................................................................... 18 Challenge: Jury Security .......................................................................................... 18 Challenge: Classified Evidence ................................................................................ 19 American Embassies in Kenya and Tanzania United States v. El-Hage (Leonard B. Sand, Kevin Thomas Duffy, and Lewis A. Kaplan, S.D.N.Y.) ............................................................................................................ 20 Challenge: Attorney Client Contacts ....................................................................... 31 Challenge: Mental Health During Detention ............................................................ 32 Challenge: Jury Security .......................................................................................... 33 Challenge: Court Security ........................................................................................ 33 Challenge: Witness Security .................................................................................... 34 Challenge: Religious Accommodation ..................................................................... 34 Challenge: Classified Evidence ................................................................................ 35 Challenge: Classified Arguments ............................................................................. 37 Challenge: Classified Order ..................................................................................... 37 Challenge: Subpoenaing a Cabinet Officer .............................................................. 37 Millennium Bomber United States v. Ressam (John C. Coughenour, W.D. Wash.) ........................................ 39 Challenge: Classified Evidence ................................................................................ 47 Challenge: Examination of Foreign Witnesses ........................................................ 48 Challenge: Court Security ........................................................................................ 48 Challenge: Jury Security ........................................................................................... 49 Challenge: Witness Security .................................................................................... 49 A Would-Be Spy United States v. Regan (Gerald Bruce Lee, E.D. Va.) ..................................................... 50 Challenge: Classified Evidence ................................................................................ 51 Detroit United States v. Koubriti (Gerald E. Rosen, E.D. Mich.) ................................................ 54 Challenge: Jury Security .......................................................................................... 58 Challenge: Sanctioning a Cabinet Officer ................................................................ 59 Challenge: Classified Evidence ................................................................................ 60 Twentieth Hijacker United States v. Moussaoui (Leonie M. Brinkema, E.D. Va.) ......................................... 62 Challenge: Attorney Appointment ........................................................................... 72 iii Challenge: Court Security ........................................................................................ 72 Challenge: Jury Security .......................................................................................... 73 Challenge: Classified Evidence ................................................................................ 73 Challenge: Classified Arguments ............................................................................. 75 Challenge: Closed Proceedings ................................................................................ 77 Challenge: Classified Opinion .................................................................................. 78 Challenge: Terrorist Communications ..................................................................... 78 American Taliban United States v. Lindh (T.S. Ellis III, E.D. Va.) .............................................................. 81 Challenge: Protected National Security Information ............................................... 83 Challenge: Classified Evidence ................................................................................ 85 Challenge: Interviewing Guantánamo Bay Detainees .............................................. 85 Challenge: Witness Security .................................................................................... 86 September 11 Damages In re Terrorist Attacks on September 11, 2001 (Richard Conway Casey and George B. Daniels, S.D.N.Y.) and In re September 11 Litigation and related actions (Alvin K. Hellerstein, S.D.N.Y.) .......................................................................... 87 Challenge: Service of Process on International Terrorists ..................................... 102 Challenge: Classified Evidence .............................................................................. 103 Challenge: Discovery of Sensitive Security Information ....................................... 103 Dirty Bomber Padilla v. Rumsfeld (Michael B. Mukasey, S.D.N.Y.), Padilla v. Hanft and Padilla v. Rumsfeld (Henry F. Floyd, D.S.C.), and United States v. Hassoun (Marcia G. Cooke, S.D. Fla.) ........................................................................................ 106 Challenge: Attorney Client Contacts ..................................................................... 113 Challenge: Mental Health During Detention .......................................................... 114 Challenge: Classified Arguments ........................................................................... 115 Challenge: Witness Security .................................................................................. 115 Challenge: Court Security ...................................................................................... 116 Challenge: Jury Security ........................................................................................ 116 Challenge: Classified Evidence .............................................................................. 116 Challenge: FISA Evidence ..................................................................................... 117 Lackawanna United States v. Goba (William M. Skretny and H. Kenneth Schroeder, Jr., W.D.N.Y.) ...................................................................................................................... 119 Challenge: Classified Evidence .............................................................................. 123 Challenge: Court Security ...................................................................................... 124 Challenge: Religious Accommodation ................................................................... 124 A Plot to Kill President Bush United States v. Abu Ali (Gerald Bruce Lee, E.D. Va.) ................................................. 125 Challenge: Examination of Foreign Witnesses and Witness Security ................... 126 Challenge: Attorney Client Contacts ..................................................................... 128 Challenge: Classified Evidence .............................................................................. 128 iv Challenge: Classified Arguments ........................................................................... 129 Paintball United States v. Royer and United States v. Al-Timimi (Leonie M. Brinkema, E.D. Va.), United States v. Chandia (Claude M. Hilton, E.D. Va.), and United States v. Benkahla (James C. Cacheris, E.D. Va.) ...................................................................... 132 Challenge: Classified Evidence .............................................................................. 139 Challenge: Closed Proceedings .............................................................................. 139 Challenge: Classified Arguments ........................................................................... 140 Challenge: Attorney Client Contacts ..................................................................... 140 Challenge: Religious Accommodation ................................................................... 141 Minneapolis United States v. Warsame (John R. Tunheim, D. Minn.) ..............................................
Recommended publications
  • Highlights of 1997 Accomplishments
    Highlights of 1997 Accomplishments Making America Safe • Continued the Department’s firm policy for dealing with terror- ist acts, focusing on deterrence, quick and decisive investiga- tions and prosecutions, and international cooperation to vigor- ously pursue and prosecute terrorists, both domestic and for- eign. • Continued to prosecute the most violent criminal offenders under the Anti-Violent Crime Initiative, forging unprecedented working relationships with members of local communities, State and local prosecutors, and local law enforcement officials. • Focused enforcement operations on the seamless continuum of drug trafficking, using comprehensive investigative techniques to disrupt, dismantle, and destroy trafficking operations ema- nating from Mexico, Colombia, Asia, Africa, and other coun- tries. • Coordinated multijurisdictional and multiagency investigations to immobilize drug trafficking organizations by arresting their members, confiscating their drugs, and seizing their assets. • Continued to eliminate the many criminal enterprises of organized crime families, including the La Cosa Nostra fami- lies and their associates and nontraditional organized crime groups emanating from the former Soviet Bloc and Asia. • Chaired the High-Tech Subgroup of the P8 focusing on interna- tional trap-and-trace procedures and transborder searches, and represented the United States at the Council of Europe’s Com- mittee of Experts on Crime in Cyberspace, which is drafting an international convention on a wide range of high-tech issues. • Promulgated legislation enacted to effect BOP’s takeover of Lorton prison before 2001 and to transfer D.C. parole jurisdic- tion to the U.S. Parole Commission; further consideration and action are expected on a number of crime-related proposals during the second session of Congress.
    [Show full text]
  • Building a Secure Workforce
    Federal Government Services Building a Secure Workforce Guard against insider threat Michael G. Gelles David L. Brant Brian Geffert Building a Secure Workforce Guard Against Insider Threat Table of Contents Introduction 1 Asset Loss and Insider Threat Defined 2 Other Potential Results of Asset Loss Caused by Insider Threats 3 Understanding the Insider Threat 4 Summary of Findings: Insider Threat 4 Risk Indicators and Characteristics 5 Competing Loyalties 5 Risk of Increased Computing and Networking 6 Risk of Public Information in Private Hands 6 Mitigating Asset Loss: A Series of Interventions and Action Plans 7 Establishing a Workforce Culture to Mitigate Risk 7 The Employee Assistance Program (EAP) a Tactical Mitigation Strategy 8 The Workforce as a Monitor: “Operationalizing” Security Awareness Training 8 Leveraging Human Resources as a Risk Mitigator 9 Risk Management Through Information Access Management 9 Case Reviews 10 Project Initiation 10 Establish a Baseline: The “As-Is State” 10 Case Sampling and Methodology for Review 10 Conduct a Gap Analysis and Profile the “To-Be State” 10 Recommendations for Future Study and Change 11 Appendix A 12 Enterprise Risk Framework and the Insider Threat 12 Risk Equation 13 Appendix B 14 Information Management Framework and the Insider Threat 14 References 16 Contacts 17 i Building a Secure Workforce Guard Against Insider Threat Introduction In today’s evolving and changing global environment, business in the public sector is increasingly more challenging. There is an ongoing need to adapt a more balanced and integrated approach to protecting information and other assets. As the world becomes a virtual community of competitors and predators, an organization’s assets are at greater risk than in the past, when the world was more localized, compartmentalized, and siloed.
    [Show full text]
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Downloaded from the Internet and Distributed Inflammatory Speeches and Images Including Beheadings Carried out by Iraqi Insurgents
    HUMAN RIGHTS WATCH WORLD REPORT 2006 EVENTS OF 2005 Copyright © 2006 Human Rights Watch All rights reserved. Co-published by Human Rights Watch and Seven Stories Press Printed in the United States of America ISBN-10: 1-58322-715-6 · ISBN-13: 978-1-58322-715-2 Front cover photo: Oiparcha Mirzamatova and her daughter-in-law hold photographs of family members imprisoned on religion-related charges. Fergana Valley, Uzbekistan. © 2003 Jason Eskenazi Back cover photo: A child soldier rides back to his base in Ituri Province, northeastern Congo. © 2003 Marcus Bleasdale Cover design by Rafael Jiménez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: +32 2 732 2009, Fax: +32 2 732 0471 [email protected] 9 rue Cornavin 1201 Geneva Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] Markgrafenstrasse 15 D-10969 Berlin, Germany Tel.:+49 30 259 3060, Fax: +49 30 259 30629 [email protected] www.hrw.org Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice.
    [Show full text]
  • Commission Sensitive Memorandu.M for the Record Interview of Hamdan
    Commission Sensitive Memorandu.m for the Record • Subject: Interview of Hamdan Bin Gharib Al- Shalawi Location: Conference Palace, Riyadh Interviewed by: S A Ja eline Ma ire (FBI-Penttbom) 9/11 Law Enforcement Privacy 9-11 Commission) (OS) Interpreter: 9/11 Law Enforcement Privacy Also present: Col. Jaber (Mabahith) Maj. Khalid (Mabahith) Maj. Habib (Mabahith) Interview Date: October 22~231 2003 MFR Date: October 23, 2003 MPR Prepared By: DS The interview commenced at approximately 10:15 pm. It was led by S/A Maguire, pursuant to an agreement between the Commission and the FBI (which had requested to interview Al-Shalawi back in June but had seen no movement on that request until the Commission asked in late September to interview him as well). DS asked questions after BfA Maguire had concluded her questioning. • Although he was made aware of the availability of an interpreter, Al-Shalawi declined that option and the interview was conducted entirely in Englieh, in which he plainly was fluent. He appeared quite relaxed throughout the 3-hour interview and very intelligent, answering questions apprQpriately without any evident comprehension problems. Background After introductions, Al'-Shalaw1 was asked to provide his professional and educational background. He currently is an Assi~tant Professor in Linguistics at the Imam University and is entering his third year in that position. He received his B.A. from the University in 1413 (Hejira) and found his further education delayed by the Gulf War, during which he remained at the University as a teaching assistant .. cONFLD!lftI1tL • Commission Sensitive , 9/11\""::,;,:,;:::::::::::,::""""""""",,Personal Privacy c::==ve .
    [Show full text]
  • Surprise, Intelligence Failure, and Mass Casualty Terrorism
    SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM by Thomas E. Copeland B.A. Political Science, Geneva College, 1991 M.P.I.A., University of Pittsburgh, 1992 Submitted to the Graduate Faculty of The Graduate School of Public and International Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2006 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Thomas E. Copeland It was defended on April 12, 2006 and approved by Davis Bobrow, Ph.D. Donald Goldstein, Ph.D. Dennis Gormley Phil Williams, Ph.D. Dissertation Director ii © 2006 Thomas E. Copeland iii SURPRISE, INTELLIGENCE FAILURE, AND MASS CASUALTY TERRORISM Thomas E. Copeland, PhD University of Pittsburgh, 2006 This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors – failures of public policy leadership, analytical challenges, organizational obstacles, and the inherent problems of warning information – contribute to intelligence failure. This study applies existing theories of surprise and intelligence failure to case studies of five mass casualty terrorism incidents: World Trade Center 1993; Oklahoma City 1995; Khobar Towers 1996; East African Embassies 1998; and September 11, 2001. A structured, focused comparison of the cases is made using a set of thirteen probing questions based on the factors above. The study concludes that while all four factors were influential, failures of public policy leadership contributed directly to surprise. Psychological bias and poor threat assessments prohibited policy makers from anticipating or preventing attacks. Policy makers mistakenly continued to use a law enforcement approach to handling terrorism, and failed to provide adequate funding, guidance, and oversight of the intelligence community.
    [Show full text]
  • The American Woman 1987-88: a Report in Depth. INSTITUTION Congressional Caucus for Women's Issues, Washington, DC
    DOCUMENT RESUME ED 293 737 SO 018 577 AUTHOR Rix, Sara E., Ed. TITLE The American Woman 1987-88: A Report in Depth. INSTITUTION Congressional Caucus for Women's Issues, Washington, DC. Women's Research and Education Inst. REPORT NO ISBN-0-393-30388-8 PUB DATE 87 NOTE 350p. AVAILABLE FROMW. W. Norton and Company, 500 Fifth Avenue, New York, NY 10110 (paperback, $7.95; ISBN-0-393-02384-2, hardcover, $18.95). PUB TYPE Books (010) Reports Descriptive (141) EDRS PRICE MF01/PC14 Plus Postage. DESCRIPTORS American Studies; *Economic Change; *Economic Status; *Females; Feminism; *Social Change; *Social Status; United States History; Womens Education; Womens Studies IDENTIFIERS *Political Implications ABSTRACT This book is the first edition of what is to be an annual report on the status of women in the United states. It presents information concerning changes in U.S. women's roles and analyzes the social and political consequences of these changes. This premier edition provides a broad overview of how women's lives have changed dur'.ng the 20th century, with special emphasis on their roles in families and in the U.S. economy. Chapter titles and authors include: (1) "Women in Twentieth Century America: An Overview" (S. M. Evans); (2) "Women and the Family" (A. Cherlin); (3) "Women and the Economy" (N. Barrett); (4) "The Women's Movement in Recent American Politics" (M. L. Palley); and (5) "1986 in Review" (A. J. Stone). A section entitled "Women in Brief" includes a series of chapters that describe women in relation to business, the military, science, broadcasting, sports, unions, education, theatre, and reproduction alternatives and options and the status of black, latino, and immigrant women.
    [Show full text]
  • Works’ (Just Not in Moderation)
    Repression ‘Works’ (just not in moderation) Yuri M. Zhukov University of Michigan Abstract Why does government violence deter political challengers in one con- text, but inflame them in the next? This paper argues that repression increases opposition activity at low and moderate levels, but decreases it in the extreme. There is a threshold level of violence, where the op- position becomes unable to recruit new members, and the rebellion unravels – even if the government kills more innocents. We show this result logically, with a mathematical model of coercion, and empir- ically, with micro-level data from Chechnya and a meta-analysis of sub-national conflict dynamics in 156 countries. The data suggest that a threshold exists, but the level of violence needed to reach it varies. Many governments, thankfully, are unable or unwilling to go that far. We explore conditions under which this threshold may be higher or lower, and highlight a fundamental trade-off between reducing gov- ernment violence and preserving civil liberties. Keywords: repression, political violence, mass killing, conflict, meta-analysis, threshold effect Word count: 11,869 DRAFT This version: November, 2018 1 Repression is violence that governments use to stay in power. When confronting behavioral challenges to their authority, governments often respond by threatening, detaining and killing suspected dissidents and rebels. The coercive purpose of these actions is to compel challengers to stop their fight, and to deter others from joining it. The intensity of repres- sion can vary greatly. To reestablish control in Chechnya after 1999, for example, the Russian government used a range of methods, from targeted killings to shelling and indiscriminate sweeps.
    [Show full text]
  • The Open Door How Militant Islamic Terrorists Entered and Remained in the United States, 1993-2001 by Steven A
    Center for Immigration Studies The Open Door How Militant Islamic Terrorists Entered and Remained in the United States, 1993-2001 By Steven A. Camarota Center for Immigration Studies Center for 1 Center Paper 21 Center for Immigration Studies About the Author Steven A. Camarota is Director of Research at the Center for Immigration Studies in Wash- ington, D.C. He holds a master’s degree in political science from the University of Pennsyl- vania and a Ph.D. in public policy analysis from the University of Virginia. Dr. Camarota has testified before Congress and has published widely on the political and economic ef- fects of immigration on the United States. His articles on the impact of immigration have appeared in both academic publications and the popular press including Social Science Quarterly, The Washington Post, The Chicago Tribune, Campaigns and Elections, and National Review. His most recent works published by the Center for Immigration Studies are: The New Ellis Islands: Examining Non-Traditional Areas of Immigrant Settlement in the 1990s, Immigration from Mexico: Assessing the Impact on the United States, The Slowing Progress of Immigrants: An Examination of Income, Home Ownership, and Citizenship, 1970-2000, Without Coverage: Immigration’s Impact on the Size and Growth of the Population Lacking Health Insurance, and Reconsidering Immigrant Entrepreneurship: An Examination of Self- Employment Among Natives and the Foreign-born. About the Center The Center for Immigration Studies, founded in 1985, is a non-profit, non-partisan re- search organization in Washington, D.C., that examines and critiques the impact of immi- gration on the United States.
    [Show full text]
  • Improving Counterterrorism and Law Enforcement Cooperation Between the United States and the Arab Gulf States
    Improving Counterterrorism and Law Enforcement Cooperation between the United States and the Arab Gulf States Thomas Warrick and Joze Pelayo Scowcroft Middle East Security Initiative The Atlantic Council’s Scowcroft Middle East Security Initiative honors the legacy of Brent Scowcroft and his tireless efforts to build a new security architecture for the region. Our work in this area addresses the full range of security threats and challenges including the danger of interstate warfare, the role of terrorist groups and other nonstate actors, and the underlying security threats facing countries in the region. Through all of the Council’s Middle East programming, we work with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region. You can read more about our programs at www.atlanticcouncil.org/ programs/middle-east-programs/. Task Force on Mideast Counterterrorism – Law Enforcement Cooperation ■ Javed Ali, Towsley Policymaker in Residence, Gerald R. Ford School of Public Policy, University of Michigan ■ Kirsten Fontenrose, Director, Scowcroft Middle East Security Initiative, Atlantic Council ■ Daniel L. Glaser, Principal, Financial Integrity Network ■ Bernard Hudson, Nonresident Fellow, Belfer Center for Science and International Affairs ■ Michael McGarrity, Vice President Global Risk Services, Global Guardian ■ Pamela G. Quanrud, Former Director, C-ISIL Coalition, US Department of State ■ Todd Rosenblum, Nonresident Senior Fellow, Scowcroft Center
    [Show full text]
  • Al Qaeda Finances and Funding to Affiliated Groups
    Al Qaeda Finances and Funding to Affiliated Groups Strategic Insights, Volume IV, Issue 1 (January 2005) by Victor Comras Strategic Insights is a monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are those of the author(s) and do not necessarily represent the views of NPS, the Department of Defense, or the U.S. Government. For a PDF version of this article, click here. This paper provides a case study of al Qaeda finances and funding to affiliated groups. It is based in large part on my observations and experience as one of five international monitors charged by the UN Security Council to oversee the effectiveness of the measures adopted by the Security Council against al Qaeda and the Taliban. Some of the material in this paper is drawn directly from the five reports our monitoring group made to the Security Council during my tenure.. Considerable mystery and intrigue still surrounds the al Qaeda terrorist network and its sources of funding. We know more today than we did three years ago about its financial tools and structure, but we still have not identified much of its sources of supply and funding. And much of what we know may only be conjecture. The CIA has estimated, for example, that it cost Al Qaeda’ some $30 million a year to sustain itself during the period preceding 9/11, but the agency is still not sure what al Qaeda needs or expends today. And we still do not know with any precision just how much, and from whom, al Qaeda raises its money, or how it allocates it.[1] The roots of al Qaeda’s financial network, we believe, trace back directly to the extensive recruitment and financing networks established to support anti-Soviet jihad activities in Afghanistan.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]