Anatomy of a Terrorist Attack: an In-Depth Investigation Into the 1998 Bombings of the U.S

Total Page:16

File Type:pdf, Size:1020Kb

Anatomy of a Terrorist Attack: an In-Depth Investigation Into the 1998 Bombings of the U.S Anatomy of a Terrorist Attack: An in-Depth Investigation Into the 1998 Bombings of the U.S. Embassies in Kenya and Tanzania 2005-17 About the Matthew B. Ridgway Center The Matthew B. Ridgway Center for International Security Studies at the University of Pittsburgh is dedicated to producing original and impartial analysis that informs policymakers who must confront diverse challenges to international and human security. Center programs address a range of security concerns—from the spread of terrorism and technologies of mass destruction to genocide, failed states, and the abuse of human rights in repressive regimes. The Ridgway Center is affiliated with the Graduate School of Public and International Affairs (GSPIA) and the University Center for International Studies (UCIS), both at the University of Pittsburgh. This working paper is one of several outcomes of Professor William W. Keller’s “Anatomy of a Terrorist Attack” Capstone course from the spring of 2005. Briefing ii iii Briefing iv Anatomy of a Terrorist Attack An In-Depth Investigation Into The 1998 Bombings of the U.S. Embassies in Kenya and Tanzania v Briefing vi Credits Project Coordinators Kevin Bernarding Matthew Schuster Lead Editor Becky Champagne Co-Editors Wayne B. Cobb II Sascha Kaplan Don Morrison Secondary Editors Zachary Beus William Strachan Analysts Juliana Bahus, Tanzania Background Zachary Beus, Kenya Background Don Morrison, Kenya Background David Grimes, al Qaeda Background and GIS Specialist Bryan Mazzolini, Chronology, Events of August 7th, 1998, and Conclusions Kevin Bernarding, The Bomb Factory and Executive Summary Joseph Gealy, Embassy Security Sascha Kaplan, Immediate Aftermath Tom Fitzgerald, U.S. Military Response Kate Worley, U.S. Military Response and Conclusions Matthew Schuster, Financing the Attacks and Executive Summary Sarah EnDyke, Signals and Warning Josh Levin, Signals and Warning and Conclusions Kevin Byrne, Post-event Investigation Wayne B. Cobb II, Criminal Investigation Becky Champagne, International Law and Policy Failures William Strachan, Independent Research vii Briefing Special Thanks We would like to thank: Beverly Brizzi Patricia Hermenault Kelly McDevitt Dr. Janne Nolan U.S. Ambassador Prudence Bushnell Michael Scheuer SA Donald Sachtleben, FBI Explosives Lab A special thanks to our professor: Dr. William W. Keller viii Table of Contents Executive Summary...................................................................................................................... 1 Key Findings on al-Qaeda Operations..................................................................................... 1 Key Findings on U.S. Policy Failures: .................................................................................... 2 Briefing........................................................................................................................................... 4 August 7th, 1998....................................................................................................................... 5 Anatomy of the 1998 Embassy Bombings .............................................................................. 6 The Al Qaeda Chronicle ..........................................................................................................6 U.S. Foreign Policy and Bureaucratic Failure....................................................................... 16 Signals and Warnings—U.S. Intelligence Failure................................................................. 19 Emergency Response and the Immediate Aftermath............................................................. 21 The Investigations.................................................................................................................. 21 The United States Military Response .................................................................................... 23 Conclusions and Lessons Learned......................................................................................... 29 Appendices................................................................................................................................... 31 U.S. Foreign Policy................................................................................................................ 31 Horn of Africa as a Region.................................................................................................... 35 Conditions in Kenya that helped to precipitate the U.S. Embassy bombings ....................... 37 Conditions in Tanzania that helped to precipitate the U.S. Embassy bombings ................... 40 Al Qaeda Background............................................................................................................ 44 Orchestrating the Attack........................................................................................................ 52 Chronology of Events............................................................................................................ 63 Building A Bomb................................................................................................................... 68 Crime Scene Investigation..................................................................................................... 70 Financing and Costs of the 1998 United States Embassy Bombings in East Africa............. 71 The Investigation ................................................................................................................... 75 Criminal Charges................................................................................................................... 78 Intelligence Failures at the U.S. Embassies........................................................................... 82 Ambassador Bushnell ............................................................................................................ 83 Security and Readiness:......................................................................................................... 86 United States Policy Reaction ............................................................................................... 95 Operation Infinite Reach........................................................................................................ 96 Policy Failures and the Pathology of the State Department ................................................ 106 International Law and the UN’s Role in the Global Condemnation of Terror.................... 109 Endnotes..................................................................................................................................... 114 ix Briefing Table of Figures Figure 1: East Africa Map by David Grimes................................................................................. 4 Figure 2: Kenya Schema................................................................................................................ 5 Figure 3: Shifa Plant outlined by red box. ................................................................................... 24 Figure 4: Training camps in Afghanistan .................................................................................... 24 Figure 5: Positioning of American forces in Operation Infinite Reach........................................ 25 Figure 6: A Toyota Dyna similar to the vehicle used in the Nairobi, Kenya Bombing............... 68 Figure 7: A Nissan Atlas Refrigerator Truck similar to the vehicle used in the Dar es Salaam, Tanzania bombing........................................................................................................... 69 x Executive Summary On August 7, 1998 al-Qaeda orchestrated nearly simultaneous suicide bombings on the United States embassies in Nairobi, Kenya and Dar es Saalam, Tanzania, killing 224 people and wounding over 5,000. Many aspects of these attacks are integral to understanding al-Qaeda’s larger campaign against the United States. This document provides a comprehensive overview and analysis of the 1998 bombings. East Africa was an area where Muslims were predominately repressed. Nevertheless, al-Qaeda operations were able to capitalize on the lax border security in the region and found that they were able to carry out their missions effectively. Al-Qaeda began surveillance of the two embassies in early 1993. The information they obtained enabled them to organize and establish the logistics necessary to conduct both attacks. By the mid 1990s al-Qaeda had established an East African cell and the operation was well underway. U.S. foreign policy helped to create conditions favorable to al- Qaeda; Washington largely ignored East Africa and was insensitive to local and regional factors..As a result, al-Qaeda was able to operate virtually unhindered and undetected. Al-Qaeda built an extensive infrastructure of businesses and non-governmental organizations that worked to provide finances, documentation, and legitimate cover for its operations. By 1997, al-Qaeda planning cells were operating efficiently. These cells led the way for the attack unit to begin its systematic process for executing the dual bombings. None of this should have come as a surprise to Washington. U.S. Ambassador to Kenya, Prudence Bushnell, sent cables in late 1997 and well into 1998 stressing the embassy’s vulnerability to attack. Washington largely ignored her warnings, insisting that the embassies were only medium priority threats, and more importantly, failed to recognize al-Qaeda as a determined and effective terrorist organization. There were
Recommended publications
  • Al Qaeda and US Homeland Security After Bin Laden-1
    CERI STRATEGY PAPERS N° 12 – Rencontre Stratégique du 10 novembre 2011 Al Qaeda and U.S. Homeland Security after Bin Laden Rick “Ozzie” NELSON The author is the Director of the Homeland Security and Counterterrorism Program at the Center for Strategic and International Studies, Washington, D.C. Portions of this paper relating to al Qaeda and its affiliates are drawn from The Al Qaeda and Associate Movements (AQAM) Futures Project, a collaboration between the CSIS Homeland Security and Counterterrorism Program and the CSIS Transnational Threats Project. More information on The AQAM Futures Project can be found at http://csis.org/program/future- al-qaeda-and-associated-movements-aqam. Introduction In the past year al Qaeda has suffered a series of staggering blows that have severely damaged the group and will irrevocably alter the way it operates. Last spring, Osama bin Laden was killed in a dramatic raid on his compound in Pakistan, followed by strikes on a number of other prominent al Qaeda leaders, including Anwar al-Awlaki in Yemen, Atiyah Abd al-Rahman in Pakistan, and Fazul Abdullah Mohammed in Somalia, among others1. Further, al Qaeda was caught off-guard by the “Arab Spring” revolutions that broke out across the Middle East and North Africa. These revolutions have since succeeded in toppling several regional strongmen, an avowed goal of al Qaeda that it has been unable to accomplish through terrorism. With al Qaeda’s leaders on the defensive and the efficacy of its ideology threatened by a new generation of political activists, many policymakers are increasingly questioning the future of the group2.
    [Show full text]
  • Al Shabaab's American Recruits
    Al Shabaab’s American Recruits Updated: February, 2015 A wave of Americans traveling to Somalia to fight with Al Shabaab, an Al Qaeda-linked terrorist group, was described by the FBI as one of the "highest priorities in anti-terrorism." Americans began traveling to Somalia to join Al Shabaab in 2007, around the time the group stepped up its insurgency against Somalia's transitional government and its Ethiopian supporters, who have since withdrawn. At least 50 U.S. citizens and permanent residents are believed to have joined or attempted to join or aid the group since that time. The number of Americans joining Al Shabaab began to decline in 2012, and by 2014, the Islamic State of Iraq and Syria (ISIS) replaced Al Shabaab as the terrorist group of choice for U.S. recruits. However, there continue to be new cases of Americans attempting to join or aid Al Shabaab. These Americans have received weapons training alongside recruits from other countries, including Britain, Australia, Sweden and Canada, and have used the training to fight against Ethiopian forces, African Union troops and the internationally-supported Transitional Federal Government in Somalia, according to court documents. Most of the American men training with Al Shabaab are believed to have been radicalized in the U.S., especially in Minneapolis, according to U.S. officials. The FBI alleges that these young men have been recruited by Al Shabaab both on the Internet and in person. One such recruit from Minneapolis, 22-year-old Abidsalan Hussein Ali, was one of two suicide bombers who attacked African Union troops on October 29, 2011.
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal #967
    Issue No. 967, 28 December 2011 Articles & Other Documents: Featured Article: U.S. Preparing for Tactical Nuclear Cuts in Future Arms Deal with Russia 1. Iran to Hold War Games in Int'l Waters 2. Iran Rejects US Allegation on Al-Qaeda Operative 3. MP Describes Navy Wargames as Serious Warning to Western Powers 4. 1st VP: No Single Drop of Oil Will Pass through Hormuz Strait if Iran Oil Is Banned 5. 'Speculation of Israel's Nuclear Arms Deters Iran' 6. Iran Warns of Closing Strategic Hormuz Oil Route 7. S. Korea, China to 'Swiftly Reinvigorate' Efforts to Resume Six-Party Talks 8. In New N.Korea Leader, Rare Exposure to World 9. N Korea Likely to Resume Nuclear Game in Spring of 2012: Experts 10. Who Is in Charge of N.Korea's Nuclear Weapons? 11. US Senator Fears N. Korea Might Try to Sell Nuke Materials 12. N.Korea Closer to Nuclear-Tipped Missile: U.S. Expert 13. Pakistani Government Defends Nuclear Program Against Rising Internal Criticism 14. Pakistan, India Come Closer on Nuclear CBMs 15. U.N. Urges Libya to Sell Off Cache of ‘Yellowcake’ Uranium 16. Russia Successfully Test Fires Bulava Missiles 17. Russia Reports 25,000 Undersea Radioactive Waste Sites 18. Medvedev: Test of Much-Heralded New Missile Done 19. Russia Test Launches Stiletto Missile 20. Optimism on Missile Defense Agreement Decreasing 21. U.S. Preparing for Tactical Nuclear Cuts in Future Arms Deal with Russia 22. U.S. Missile Shield Deal with Romania Takes Effect 23. Pentagon’s Conventional Prompt-Strike Effort Takes 2012 Funding Hit 24.
    [Show full text]
  • Al Qaeda's Struggling Campaign in Syria: Past, Present, and Future
    COVER PHOTO FADI AL-HALABI/AFP/GETTY IMAGES APRIL 2018 1616 Rhode Island Avenue NW Al Qaeda’s Struggling Washington, DC 20036 202 887 0200 | www.csis.org Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT Blank APRIL 2018 Al Qaeda’s Struggling Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in November 2015. Former U.S. deputy secretary of defense John J.
    [Show full text]
  • The Question of Afghanistan and Its Impact on US Relations with Pakistan
    1 Draft, Please Do Not Copy without Explicit Permission from Author The Question of Afghanistan and its Impact on U.S. Relations with Pakistan: The Need for Pragmatic Engagement Abstract: Relations between the U.S. and Pakistan have always been cyclical, oscillating from collaboration and friendship to noncooperation and enmity. A core reason for this is a failure by consecutive American administration to understand the nature of the Pakistani political system, in which social groups are central. Accordingly, U.S. policymakers have expectations and make demands that often manifest through the rubric of democracy promotion. The paper identifies two key obstacles to democracy promotion in Pakistan: ungoverned territories and social identity groups. The section examines these elements in respect to Afghanistan. The reason for that is because the second section expands the argument by shifting attention to U.S. policymakers who appear to have place Afghanistan at the heart of U.S. engagement in South Asia. In doing so, it is argue that as long as Afghanistan remains key to U.S. national security concerns, American interaction with Pakistan remains limited because the relations are not about the U.S. and Pakistan per se, but rather on how Pakistan can help the U.S. meet its national security interests in Afghanistan. Students of history and politics quickly learn that nothing is certain nor absolute, as even definite and incontrovertible evidence may obscure deeper complexities that define inter-state relations, as far too often, common interests trump values. This may explain why foreign policy analysis tends to be grounded in case studies, and less in theoretical scrutiny.
    [Show full text]
  • How to Find a Word, Words, Or a Sentence in This Pdf's
    How to find a word, words, or a sentence in this Pdf’s First you need to download the Pdf or the Pdf’s on your computer. Ones you have clicked on a Pdf title, after a while, you will see the Pdf opening. Download-speed depends on your internet speed and your computer. If the Pdf is downloaded and you see it open, save it on your computer in a new folder that you made for it. You can download as many Pdf’s as you want and save them in that folder. If you downloaded all of them in one folder, then you can also look for a word or more in all that Pdf’s at once. To start a search, you have two possibilities: 1. Searching in one Pdf. Open the Pdf, on the top you have a menu, click on “Edit” and select “Find” for a word in this Pdf. Click on next to see the next place in that Pdf. 2. Searching in one or more Pdf’s. Open one Pdf, click on “Edit”, go to “Advanced search” A window will open. Make your choice “current document” or “All Pdf documents in” If you made the choice “All documents in”, click on the arrow right on the bar below it. There you can look for the place on your computer where you have the Pdf-Folder. If you don’t see the folder click on “Browse for location” and find the folder on your computer, then click on it once. This is the place where the search will be done.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • BBC TV\S Panorama, Conflict Coverage and the Μwestminster
    %%&79¶VPanorama, conflict coverage and WKHµ:HVWPLQVWHU FRQVHQVXV¶ David McQueen This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. %%&79¶VPanorama, conflict coverage and the µ:HVWPLQVWHUFRQVHQVXV¶ David Adrian McQueen A thesis in partial fulfilment of the requirements of Bournemouth University for the degree of Doctor of Philosophy August 2010 µLet nation speak peace unto nation¶ RIILFLDO%%&PRWWRXQWLO) µQuaecunque¶>:KDWVRHYHU@(official BBC motto from 1934) 2 Abstract %%&79¶VPanoramaFRQIOLFWFRYHUDJHDQGWKHµ:HVWPLQVWHUFRQVHQVXV¶ David Adrian McQueen 7KH%%&¶VµIODJVKLS¶FXUUHQWDIIDLUVVHULHVPanorama, occupies a central place in %ULWDLQ¶VWHOHYLVLRQKLVWRU\DQG\HWVXUSULVLQJO\LWLVUHODWLYHO\QHJOHFWHGLQDFDGHPLF studies of the medium. Much that has been written focuses on Panorama¶VFRYHUDJHRI armed conflicts (notably Suez, Northern Ireland and the Falklands) and deals, primarily, with programmes which met with Government disapproval and censure. However, little has been written on Panorama¶VOHVVFRQWURYHUVLDOPRUHURXWLQHZDUUeporting, or on WKHSURJUDPPH¶VPRUHUHFHQWKLVWRU\LWVHYROYLQJMRXUQDOLVWLFSUDFWLFHVDQGSODFHZLWKLQ the current affairs form. This thesis explores these areas and examines the framing of war narratives within Panorama¶VFRYHUDJHRIWKH*XOIFRQIOLFWV of 1991 and 2003. One accusation in studies looking beyond Panorama¶VPRUHFRQWHQWLRXVHSLVRGHVLVWKDW
    [Show full text]
  • THE POLITICS of REPRODUCTION FORMATIONS: ADOPTION, KINSHIP, and CULTURE Emily Hipchen and John Mcleod, Series Editors the Politics of Reproduction
    THE POLITICS OF REPRODUCTION FORMATIONS: ADOPTION, KINSHIP, AND CULTURE Emily Hipchen and John McLeod, Series Editors The Politics of Reproduction Adoption, Abortion, and Surrogacy in the Age of Neoliberalism Edited by Modhumita Roy and Mary Thompson THE OHIO STATE UNIVERSITY PRESS COLUMBUS Copyright © 2019 by Th e Ohio State University. Th is edition licensed under a Creative Commons Attribution-NonCommercial-NoDerivs License. Library of Congress Cataloging-in-Publication Data is available online at catalog.loc.gov. Cover design by Nathan Putens Text design by Juliet Williams Type set in Adobe Minion Pro Th e paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials. ANSI Z39.48-1992. We dedicate this volume to the memory of our fathers, Richard E. Thompson Jr. (1924–2011) and Birendra Narayan Roy (1926–2011), and to our mothers, Barbara J. Thompson and Pranati Roy, with love and thanks. CONTENTS Acknowledgments ix INTRODUCTION MODHUMITA ROY AND MARY THOMPSON 1 CHAPTER 1 Precarity and Disaster in Jesmyn Ward’s Salvage the Bones: A Reproductive Justice Reading MARY THOMPSON 25 CHAPTER 2 Privileging God the Father: The Neoliberal Theology of the Evangelical Orphan Care Movement VALERIE A. STEIN 42 CHAPTER 3 White Futures: Reproduction and Labor in Neoliberal Times HEATHER MOONEY 61 CHAPTER 4 One Woman’s Choice Is Another Woman’s Disobedience: Seguro Popular and Threats to Midwifery in Mexico ROSALYNN VEGA 82 CHAPTER 5 The Work/Life
    [Show full text]
  • Race, Migration, and Chinese and Irish Domestic Servants in the United States, 1850-1920
    An Intimate World: Race, Migration, and Chinese and Irish Domestic Servants in the United States, 1850-1920 A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Andrew Theodore Urban IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Advised by Donna Gabaccia and Erika Lee June 2009 © Andrew Urban, 2009 Acknowledgements While I rarely discussed the specifics of my dissertation with my fellow graduate students and friends at the University of Minnesota – I talked about basically everything else with them. No question or topic was too large or small for conversations that often carried on into the wee hours of the morning. Caley Horan, Eric Richtmyer, Tim Smit, and Aaron Windel will undoubtedly be lifelong friends, mahjong and euchre partners, fantasy football opponents, kindred spirits at the CC Club and Mortimer’s, and so on. I am especially grateful for the hospitality that Eric and Tim (and Tank the cat) offered during the fall of 2008, as I moved back and forth between Syracuse and Minneapolis. Aaron and I had the fortune of living in New York City at the same time in our graduate careers, and I have fond memories of our walks around Stuyvesant Park in the East Village and Prospect Park in Brooklyn, and our time spent with the folks of Tuesday night. Although we did not solve all of the world’s problems, we certainly tried. Living in Brooklyn, I also had the opportunity to participate in the short-lived yet productive “Brooklyn Scholars of Domestic Service” (AKA the BSDS crew) reading group with Vanessa May and Lara Vapnek.
    [Show full text]
  • The Al Qaeda Network a New Framework for Defining the Enemy
    THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product.
    [Show full text]
  • 9-11 and Terrorist Travel- Full
    AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views.
    [Show full text]