Intelligence and Terrorism in the 1990S O 6.1 1990 O 6.2 1993 O 6.3 1995 O 6.4 1996 O 6.5 1998 O 6.6 1999  7 Intelligence and Terrorism in the 2000S O 7.1 2000

Total Page:16

File Type:pdf, Size:1020Kb

Intelligence and Terrorism in the 1990S O 6.1 1990 O 6.2 1993 O 6.3 1995 O 6.4 1996 O 6.5 1998 O 6.6 1999  7 Intelligence and Terrorism in the 2000S O 7.1 2000 CIA Malone Pyzdick This article deals with activities of the U.S. Central Intelligence Agency (CIA) related to terrorism. Especially after the CIA lost its coordinating role over the entire Intelligence Community (IC), it is impossible to understand US counterterrorism by looking at the CIA alone. Coordinating structures have been created by each president to fit his administrative style and the perceived level of threat. The US has a different counterterrorist structure than other close allies, such as Australia, Canada, France, and the United Kingdom. Each has a structure that fits its particular legal system and culture; there is no ideal solution. A continuing issue is whether there needs to be a domestic intelligence service separate from the FBI, which has had difficulty in breaking away from its law enforcement roots and cooperating with other intelligence services.[1] The National Counterterrorism Center (NCTC)[2] is no longer in the CIA proper, but is in the Office of the Director of National Intelligence (ODNI). NCTC, however, contains personnel from the CIA, Federal Bureau of Investigation (FBI) of the Department of Justice, and other members of the IC. A counterterrorism center did exist in the CIA before the NCTC was established. Given the restrictions of the National Security Act of 1947, which created the CIA but strictly forbade it from having any domestic police authority, the role of the CIA still has multiple dimensions. The National Clandestine Service (NCS) of the CIA can infiltrate or otherwise gain human intelligence (HUMINT) from terrorist organizations, their supporters, or from friendly foreign intelligence services (FIS). The NCS has a covert operations capability that, possibly in combination with military units from the United States Special Operations Command (USSOCOM), may take direct action against terrorist groups outside the United States. Above all, the key CIA counterterror partner is the FBI, which has the domestic operational responsibility for counterterrorism, both domestic intelligence collection and domestic police work. In the highly decentralized police system of the United States, the FBI also provides liaison and operates cooperatively with state and local police agencies, as well as with relevant Federal units. For example, the United States Coast Guard has an important role in preventing terrorist infiltration by sea. Military units have a specialized Counterintelligence Force Protection Source Operations capability to protect their personnel and operations. Contents 1 Intelligence Community view of terrorism o 1.1 Tactics . 1.1.1 Suicide attacks . 1.1.2 Weapons of mass destruction o 1.2 Terrorists by ideology and region 2 Collection approach o 2.1 HUMINT o 2.2 SIGINT o 2.3 IMINT o 2.4 FININT 3 Analytic approach o 3.1 Regular research o 3.2 Virtual station and cross-functional team research o 3.3 Regional analytic operations 4 Intelligence and terrorism in the 1970s o 4.1 1970 o 4.2 1972 o 4.3 1973 o 4.4 1974 o 4.5 1975 o 4.6 1976 o 4.7 1978 o 4.8 1979 5 Intelligence and terrorism in the 1980s o 5.1 1982 o 5.2 1983 . 5.2.1 1983 Beirut barracks bombing o 5.3 1984 . 5.3.1 Kidnapping of CIA Beirut station chief and US response authorizing preemption . 5.3.2 Creation of al-Qaeda . 5.3.3 Support to the Afghan resistance o 5.4 1986 . 5.4.1 Foundation of the Counterterrorist Center o 5.5 Afghanistan and its consequences . 5.5.1 Bin Laden's early years: terrorist financier 6 Intelligence and terrorism in the 1990s o 6.1 1990 o 6.2 1993 o 6.3 1995 o 6.4 1996 o 6.5 1998 o 6.6 1999 7 Intelligence and terrorism in the 2000s o 7.1 2000 . 7.1.1 Clandestine intelligence/covert action o 7.2 2001 . 7.2.1 Covert action . 7.2.1.1 Paramilitary support . 7.2.1.2 Targeted killing in war versus assassination . 7.2.2 Strategic Assessments Branch . 7.2.3 World-Wide Attack Matrix o 7.3 2002 o 7.4 2004 o 7.5 2005 o 7.6 2006 o 7.7 2008 o 7.8 2009 . 7.8.1 Forward Operating Base Chapman attack 8 References Intelligence Community view of terrorism Further information: War on Terrorism Further information: CIA transnational human rights actions Further information: CIA transnational anti-terrorism activities Contrary to popular belief, the US intelligence community was dealing with aspects of terrorism long before the September 11, 2001 attacks. Those aspects included the support of guerillas against the Soviets, in Southeast Asia, and other places where the guerrillas' methods may have included terror. In Asia, Latin America, and Africa, the US worked with government to suppress terror. While government research suggests personality traits that may be common to a substantial number of terrorists, terror has few other constants. It certainly is not restricted to Muslims. It has taken place on every continent except Antarctica. In all these cases, intelligence support clearly was necessary. In some of them, clandestine intelligence collection and covert action, by CIA personnel or those they sponsored, dealt with both sides of the terrorist and counterterrorist roles. Many studies of the analysis of, and countermeasures to, terrorism remain classified. Unclassified CIA documents on terrorism go back at least into the late 1970s. At that time, Western Europe often had opposing terrorist groups in the same conflict, such as nationalists and separatists in Northern Ireland, Spanish nationalists and Basque separatists, Turkey,[3] Transnational terrorism was still unusual, with the report noting that the Basque ETA group was active in France as well as Spain. There are relevant observations from government reports by researchers who have various levels of access into the IC, including the Federal Research Division (FRD) and Congressional Research Service of the Library of Congress. A 1999 FRD study examined some changes from terrorists of the past, especially the emergence of terrorist acts carried out by individuals and members of small, ad hoc groups largely unknown to security organizations.[4] Tactics, as well as sources, had changed, with the greater use of suicide attacks and attacks by women and children. A very significant concern was the possible use, by terrorists, of weapons of mass destruction (WMD). Senate Probe of CIA Tactics: The recent investigation of the tactics used by Central Intelligence Agency (CIA) veterans when interrogating detainees is both invasive and unrealistically biased. The Senate has appointed a special committee to look into supposed violations of both the Law of War and the Geneva Convention by the Central Intelligence Agency regarding the treatment of many detainees, both at Guantanamo Bay and in Afghanistan and Iraq. The actions under question were previously approved at the White House level, and also should remain classified and not readily available to the American Public. For those who do not know what is happening with the Central Intelligence Agency, the agents who performed interrogations affiliated with the Iraq and Afghanistan wars are under investigation based on accusations that they violated the Law of War, Geneva Convention and are possibly guilty of torturing detainees. The Senate committee is in the cross- hairs of two Democratic Senators. (Ghosh 2009). The two politicians who seem to have the most interest in the pending investigation are Dianne Feinstein and Patrick Leahy. Things have gotten so dangerous, with the CIA employees drowning in legal garble, their boss has now included full legal-liability insurance in their employment packages. (Zagorin 2008). Over the past several years in both Iraq and Guantanamo Bay, the CIA has come under fire for their interrogation techniques. One of these controversial techniques is water-boarding. Water-boarding is a technique where the prisoner is bound to an inclined board, feet raised and head slightly below the feet. Cellophane is wrapped over the prisoner's face and water is poured over him. Unavoidably, the gag reflex kicks in and a terrifying fear of drowning leads to almost instant pleas to bring the treatment to a halt. The CIA agents were authorized for two sessions per day with the water being applied up to six times for ten seconds. Every thirty days, the agent would have to apply for more approval on this technique and have it authorized by their chain of command. (Stack 2009). While this technique may seem harsh and unlawful it has an amazing success rate and leads the interrogator to important intelligence. The longest water-boarding session on record took only between two and two and a half minutes before breaking the source. The CIA agents also kept meticulous logs of each water boarding session, so that they could not only review and see where they had left off, but also to keep accurate records for use in court and to see how the detainee was responding to it. (Stack 2009). Some former detainees have stated that they underwent torture or the threat of torture in the forms of sexual humiliation, religious humiliation, isolation, intimidation by dogs, and exposure to extreme temperatures of hot and cold, alternating over a period of hours. (Zagorin 2008). Still other documents that have recently been released by the CIA into the hands of President Obama state that the CIA agents kept meticulous records of various forms of interrogations that were used to extract information from detainees such as playing up a man's fear of bugs by putting him into a box with one and also feeding some of the men a liquid diet and keeping them awake for almost a week. (Meyer 2009). The documents also show the legal steps that President Bush took to ensure that the CIA vets would be protected for every technique they used.
Recommended publications
  • Himalayan Journal of Humanities and Cultural Studies Open Access
    Himalayan Journal of Humanities and Cultural Studies Open Access Research Article War on Terrorism Advances New World Order Timothy Spearman *Corresponding Author Abstract: Historically, empires have expanded very often under the pretext of civilizing the world beyond their borders with the self-righteous conviction that they were inoculating themselves Timothy Spearman against barbarism, extending the boundaries of the civilized, while assimilating the heathen and infidel under their rubric, the locus behind Pax Romana, Rule Britannia and now Pax Americana. Article History Received: 29.10.2020 Accepted: 21.11.2020 Keywords: War, Terrorism, New World, Pax Romana . Published: 25.11.2020 Citations: Timothy Spearman; (2020);War on Terrorism Advances New World Order. Hmlyn J Human Cul Stud, 1(2) 37-54. INTRODUCTION While Victorian England‘s empire building was done under the pretext of civilizing the rest of the world, it paradoxically meted out such barbarism and brutality as to beggar belief. In India alone, through their brutal extraction policies, the British were responsible for the deaths of an estimated ten to twenty million Indians in the late nineteenth century. Rather than responding to endemic famine in central and south India in the 1880s by reducing taxes, the British maintained them at a steady level, continued massive exports of food products and other necessities out of the country, while providing no relief to the starving people unless they worked. In some labor camps it is documented that the British actually provided the workers with less rations than were given to the prisoners of the Nazi concentration camps of Dachau and Buchenwald.i Yet despite this appalling human rights record, the British continue to justify their former colonial subjugation of the Indians today by claiming to have given them their parliamentary system of government and civil service, gifts for which the Indians are apparently supposed to be grateful.
    [Show full text]
  • 1 9 11 Synthetic Terror Webst
    9 11 Synthetic Terror Made in USA By: Webster Griffin Tarpley ISBN: 0930852311 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 I THE MYTH OF THE TWENTY-FIRST CENTURY In some ways she was far more acute than Winston, and far less susceptible to Party propaganda. Once when he happened in some connection to mention the war against Eurasia, she startled him by saying casually that in her opinion the war was not happening. The rocket bombs which fell daily on London were probably fired by the Government of Oceania itself, "just to keep the people frightened." Orwell, 1984, 127. With the publication of the Report of the Commission to Investigate Terrorist Attacks upon the United States (also known as the Kean-Hamilton Commission after its chairman and vice-chairman), the pattern of cover-up and incompetence on the part of the officially constituted investigative agencies of the United States Government is complete. Since September 11, 2001, no part of the United States Government has offered a convincing, coherent, or complete explanation of the events of that day, and of other events related to them. Indeed, no US government agency has ever so much as proposed to prove the truth of the official account, not even in the way the Warren Commission attempted to demonstrate the veracity of its version of the Kennedy assassination.
    [Show full text]
  • Maine Woods-Spring 2002
    THE MAINE WOODS “In wildness is the A Publication of the Forest Ecology Network preservation of the world.” Henry David Thoreau Volume Six Number One • Spring 2002 Free Eastern Marsh Spring Brook in Cutler. Photo by Paul Donahue “Only after the last tree has been cut down. Only after the last river The Forest Ecology Network’s Herbicide Project - page 3 has been poisoned. Only after the last fish has been caught. Only Update on Forestry Herbicides - page 4 then you will find that money cannot be eaten.” What Everyone Should Know About Roadside Herbicides - page 5 Cree Indian Proverb What Everyone Should Know About Utiltity Herbicide Use - page 6 Legal Right to Emit 20,000 Pounds of Air Pollution Purchased - page 8 Forest Ecology Network Bush Rollbacks Threaten National Forests - page 9 P.O. Box 2218 NON-PROFIT ORG. Mercury Pollution - An Environmental Health Tragedy - page 10 US POSTAGE PAID Augusta, ME 04338 AUGUSTA, ME How Corporte Law Inhibits Social Responsibility - page 12 http://www.powerlink.net/fen PERMIT NO. 75 The California Heritage Tree Preservation Act - page 14 [email protected] Luna - 17 Months Since Being Cut, and Still Doing Well - page 15 Model Forestry and Right-of-Way Herbicide Ordinances - page 16 More Oil Wars - The Bush-Cheney Oligarchy’s Energy Policy - page 18 Something Stinks in Maine - Fighting Toxic Sludge - page 24 THE MAINE WOODS - Spring 2002 PAGE 1 A Voice in the Wilderness by Jonathan Carter DISPENSERS OF POISON Some fifteen years ago in late August I set out with big corporate producers (Monsanto and Dupont) of these friends to canoe the Dead River from below Grand toxic chemicals continue a disinformation campaign in Falls to the Forks.
    [Show full text]
  • The War on Freedom: How and Why America Was Attacked, September 11Th, 2001
    1 How and Why America was Attacked, September 11th, 2001 Nafeez Mosaddeq Ahmed Tree of Life Publications Joshua Tree, California A Media Messenger Book A Public Interest Initiative of the Institute for Policy Research & Development The War on Freedom: How and Why America was Attacked, September 11th, 2001 www.Thewaronfreedom.com, http://groups.yahoo.com/group/WarOnFreedom Copyright © 2002 Nafeez Mosaddeq Ahmed Executive Director, Institute for Policy Research & Development Suite 414, 91 Western Road, Brighton, East Sussex, BN1 2NW, United Kingdom, E-mail: [email protected], Web: www.globalresearch.org. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, written, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the copyright owner. “Backword” Copyright © 2002 John Leonard Edited & Published by Tree of Life Publications, PO Box 126, Joshua Tree, CA 92252 E-mail: [email protected], Web: www.treeoflifebooks.com In cooperation with Media Monitors Network, www.mediamonitors.net Cover Design Michael Mursell, a fish in sea PO Box 22398, London, W13 9XL, England [email protected] International Standard Book Number (ISBN): 0-930852-40-0 Library of Congress Catalog Number: 2002107291 A Media Messenger Book Printed in the United States of America by BooksJustBooks.com First printing, June 2002 Unabridged edition. 3 Critical acclaim for THE WAR ON FREEDOM “This riveting and thoroughly documented study is a ‘must’ resource for everyone seeking to understand the attack on the World Trade Center of New York on September 11, 2001 and ‘America’s New War’ since.
    [Show full text]
  • GRAHAM Well, Thank You Very Much. I'm Looking Forward to This Conversation
    GRAHAM Well, thank you very much. I'm looking forward to this conversation. JON Excellent. OK, I'm going to read your bio for everyone. Senator Bob Graham is the former two-term governor of Florida and served for 18 years in the United States Senate. This, combined with 12 years in the Florida legislature, for a total of 38 years of public service. As governor and Senator, Bob Graham was a centrist committed to bringing his colleagues together behind programs that serve the broadest public interest. He was recognized by the people of Florida when he received an 83 percent approval ranking as he concluded eight years as Governor. Bob Graham retired from public service in January 2005, following his Presidential campaign in 2003. He has written four books, including a nonfiction book Intelligence Matters, a novel Keys to the Kingdom, drawing on his experiences as chair of the Senate Intelligence Committee, and America the Owner's Manual: A Guide to Effective Citizenship, written while he was a senior fellow at the Harvard Kennedy School of Government. Since leaving the Senate in 2005, Graham has been chair of the Congressional Commission on the Prevention of Weapons of Mass Destruction, a member of the Congressional Financial Crisis Inquiry Commission, and co-chair of the Presidential Commission on the BP Deepwater Horizon Oil Spill. A Phi Beta Kappa graduate of the University of Florida and Harvard Law School, he established the Center for Public Service at the University of Florida to enhance civic engagement and prepare the next generation of public and civic leaders.
    [Show full text]
  • 9/11 Whistleblower Michael Springmann Revealed That 14 out of 19 Hijacker Visas Came out of One Office in the US Consulate in Jeddah, Saudi Arabia
    9/11 Whistleblower Michael Springmann Revealed that 14 Out of 19 Hijacker Visas Came out of One Office in the US Consulate in Jeddah, Saudi Arabia J. Michael Springmann, who worked for the State Department, issued visas from 1987 to 1989 from the US Jeddah consulate in Saudi Arabia. He says his job was threatened when he refused to issue visas to suspicious characters. He later learned that the Jeddah consulate was being used by the CIA to issue visas to associates of Osama bin Laden who was creating the predecessor to al-Qaeda – for training in the US against the Soviet Union. The US Jeddah consulate had a history of issuing visas to terrorists at the request of the CIA, and Jeddah was the same office that issued 14 out of 19 of the visas that were used by the alleged hijackers on 9/11. -GEG TRANSCRIPT In the days after September 11th, 2001, while the toxic dust was still settling on Lower Manhattan, details began to emerge about the terrorists who had allegedly hijacked the fateful 9/11 flights. Names and pictures were released to the public and broadcast around the world. Ziad Jarrah. Hani Hanjour. Marwan al-Shehhi. Mohamed Atta. Even before the official story had begun to coalesce, the foreign faces and unfamiliar names flashing across the screens seared themselves into the consciousness of a traumatized public and left little doubt: This attack was the work of Muslim terrorists. But at the same time, information began to come out that created problems for this narrative. Reports of these devout Muslim fundamentalists drinking alcohol and partying in strip clubs.
    [Show full text]
  • 41 U.S. Counter-Terrorism and Intelligence Agency Veterans Challenge the Official Account of 9/11 by Alan Miller, [email protected]
    41 U.S. Counter-Terrorism and Intelligence Agency Veterans Challenge the Official Account of 9/11 by Alan Miller, [email protected] Official Account of 9/11: “Terribly Flawed,” “Laced with Contradictions,” “a Joke,” “a Cover-up” May 18, 2009 – More than 40 U.S. Counter-Terrorism and Intelligence Agency veterans have severely criticized the official account of 9/11 and most have called for a new investigation. It is outrageous that most Americans are entirely unaware of their publicly stated concerns -- a direct result of the refusal of national print and broadcast news organizations to cover this extremely important issue. There is no denying the credibility of these individuals or their loyalty to their country as demonstrated by their years of service collecting and analyzing information and planning and carrying out operations critical to the national security of the United States. These 41 individuals formerly served in the U.S. State Department, the National Security Agency, the Central Intelligence Agency, the Federal Bureau of Investigation, the Federal Aviation Administration, U.S. Customs and Border Protection and the branches of the U.S. Military. They are listed below by their branch of service. U.S. State Department Terrell E. Arnold, MA – Former Deputy Director of Counter- Terrorism and Emergency Planning, U.S. State Department. Mr. Arnold is a leading expert on terrorism and counter-terrorism and the author of several books on the subjects. In an extensive article in July 2007, Mr. Arnold wrote, “Washington leadership keeps the American people fixated on the events of 9/11. They have brought us no closer than we were on September 12, 2001, to resolving how it was executed and by what enemy.
    [Show full text]
  • Zeitgeist: the Movie Companion Source Guide
    ZEITGEIST: THE MOVIE COMPANION SOURCE GUIDE This material is protected by the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Part One: The Greatest Story Ever Told DIRECTOR’S NOTE: Zeitgeist: The Movie - Part 1: “The Greatest Story Ever Told” presents historical data relating to the astronomi- cal/astrological origins of the Judeo-Christian theology (which can be extended to Islam as well), along with the understanding that these respective stories, beliefs & traditions are really an adaptation-extension of prior Pagan beliefs. In other words, evidence shows that these modern religions are really composites of earlier religions with their stories and symbolisms “borrowed” as the new traditions evolved. Of course, believers of theistic religions have a inherent, self-preserving interest to disagree with such a notion, for it brings their reli- gion out of the context of the supernatural and novel - and into the context of a singular, serial intellectual evo- lution of information where many religions begin to share a common symbolic and literary basis. From such a perspective, naturally, the idea that “Jesus” or “Osiris” or “Dionysus” were real, supernatural figures of a larger order metaphysic becomes a distant reality. Regardless, this section isn’t really about whether “God” exists or any such issue - it is about the firm reality that religions have been borrowing and building upon each other, while the central origin of these theologies almost always comes back to stellar and solar fascination, in part. When we track these literary/ritual characteristics, we find that most religions of the world have been spawned from the interpretation/misinterpretation of the natural world and its dynamic phenomena.
    [Show full text]
  • Dear Friends and Loved Ones, Today, Nov 22, 2013, Is the 50Th Anniversary of the Assassination of President John F. Kennedy. A
    Dear Friends and Loved Ones, Today, Nov 22, 2013, is the 50th anniversary of the assassination of President John F. Kennedy. About 6 years ago, quite by accident, I took a passing interest in the assassination of JFK. My research into the assassination of JFK took me on a path into the dark underbelly of the CIA, and from there, I traced a web of criminality that ran throughout the huge sections of federal government, the political power structure, and the business interests that control our country. As I researched more, I learned that the criminal network behind JFK’s assassination did not retire after his killing. Instead, the need to cover up past crimes has motivated them to commit more crimes in a never ending cycle that continues to this present day. I have tracked this criminal network through time, and I have learned that this cabal has been the most significant political force in the United States for the last 50 years. Yet most people don’t have any idea that it exists. My research project has grown to be a major interest in my life. I have a total of 180 books on the topics of the JFK assassination and the ensuing actions of the criminal cabal that seized control of our government. 70 of these books I have read cover to cover, and the rest I have either read a particular section or skimmed. I have dozens and dozens of books on my “to read” list, as I am continually researching different strands of government criminality.
    [Show full text]
  • Visas for Al Qaeda
    This is Guns and Butter. I think it’s bigger than I even suspected. I had thought originally that it was a small, rogue operation and as time went by and I talked to people and started researching the book I saw that it was bigger than ever. Given the pushback and the blocking of people, I really think that it goes wider and deeper than even I suspect. I think one of the reasons for this is that nobody wants to believe the entire government is corrupt from top to bottom, that you can talk about Edward Snowden or Tom Drake or William Binney and the very focused, very tightly organized situations for a particular person for a particular item. What I’m saying is that the United States of America and all of the branches – the executive, the judicial, and the legislative – know about this and are covering up essentially state sponsored terrorism, and nobody wants to hear this. Nobody wants to go any deeper in it than I’ve got. I'm Bonnie Faulkner. Today on Guns and Butter, J. Michael Springmann. Today'- s show: Visas for Al Qaeda. Michael Springmann is a former diplomat in the State Department’s Foreign Service, with postings to Germany, India, Saudi Ara- bia, and the Bureau of Intelligence and Research in Washington, D.C. He was Chief of the Non-Immigrant Visa Section in Jeddah, Saudi Arabia, from 1987 to 1989. In his position in Jeddah, he was routinely overruled by superiors when he denied visa applications submitted by unqualified travelers to the United States.
    [Show full text]
  • A Citizens' Critique: the 9/11 Commission Process
    A Citizens’ Critique: The 9/11 Commission Process 9/11 CitizensWatch P.O. Box 772 Washington, DC 20044 [email protected] www.911citizenswatch.org A Citizens’ Critique Commission weaknesses: Families and public push for an investigation Comparison to earlier investigations The Joint Inquiry and “intelligence failure” PL 107-306 – The Commission Legislation Obstacles, limited time and funding Obstruction from White House and executive agencies Conflicts of interest: Chairman Thomas Kean Vice Chairman Lee Hamilton Commissioner Richard Ben-Veniste Commissioner Jamie Gorelick Commissioner James R. Thompson Commissioner Fred F. Fielding Executive Director, Phillip Zelikow Senior Counsel, Dietrich Snell Flawed premises: Procedures: Presidential testimony Lack of transparency Public hearings and alternate witnesses Lack of accountability Bush administration secrecy Evidence destroyed, concealed Release of evidence Credibility and public acceptance: Congressional oversight Assumptions and conclusions Investigative teams Unasked and unanswered questions Omissions and Contradictions: Historical context Afghanistan, Carter and Brezezinksi The Roots of Al-Qaeda Suspects and plot Foreknowledge and Forewarnings “Intelligence failure” or breach of procedure?: John O’Neill Planes as weapons threat and White House response, caught unawares? NORAD/FAA Response PNAC and New Pearl Harbor Strategy of tension Anthrax attacks Commission policy recommendations: Centralization of intelligence functions, White House “czar” Foreign and Domestic Policy
    [Show full text]