Combating Terrorism: Interagency Framework and Agency Programs to
Address the Overseas Threat (23-MAY-03, GAO-03-165).		 
                                                                 
Coordination of federal programs to combat terrorism overseas	 
became even more critical as a result of the terrorist attacks	 
against the United States on September 11, 2001. In response to  
these attacks, the federal government has taken unprecedented	 
political, diplomatic, legal, law enforcement, financial,	 
military, and intelligence actions to combat terrorism abroad.	 
Among these actions is the publication of a series of new	 
national strategies to combat terrorism. Congress asked that we  
develop baseline information identifying and describing federal  
programs and activities to combat terrorism overseas. As agreed  
with Congresses offices, this report describes the interagency	 
framework and policies for planning and coordinating federal	 
efforts to counter international terrorism. It identifies the	 
relationships between and among the new national strategies to	 
combat terrorism. It also describes the federal programs and	 
activities governmentwide to detect and prevent terrorism,	 
disrupt and destroy terrorist organizations, and respond to	 
terrorist incidents overseas. Finally, it provides detailed	 
matrices of selected departments' programs and activities to	 
combat terrorism overseas. We briefed your staffs previously on  
the preliminary results of our work and, at your request, issued 
an interim report on Combating Terrorism: Department of State	 
Programs to Combat Terrorism Abroad. This report contains the	 
final results of our review.					 
-------------------------Indexing Terms------------------------- 
REPORTNUM:   GAO-03-165 					        
    ACCNO:   A06978						        
  TITLE:     Combating Terrorism: Interagency Framework and Agency    
Programs to Address the Overseas Threat 			 
     DATE:   05/23/2003 
  SUBJECT:   Armed forces abroad				 
	     Combat readiness					 
	     Terrorism						 

******************************************************************
** This file contains an ASCII representation of the text of a  **
** GAO Product.                                                 **
**                                                              **
** No attempt has been made to display graphic images, although **
** figure captions are reproduced.  Tables are included, but    **
** may not resemble those in the printed version.               **
**                                                              **
** Please see the PDF (Portable Document Format) file, when     **
** available, for a complete electronic file of the printed     **
** document's contents.                                         **
**                                                              **
******************************************************************
GAO-03-165

                                       A

Report to Congressional Requesters

May 2003 COMBATING TERRORISM Interagency Framework and Agency Programs to
Address the Overseas Threat

GAO- 03- 165

Transmittal Letter 1 Executive Summary 4

Purpose 4 Background 4 Results in Brief 5 GAO*s Analysis 6 Agency Comments
and Our Evaluation 10

Chapter 1 12

Introduction: Definitions for Terrorism and Combating Terrorism 12

The Threat of Terrorism Overseas 15 Terrorism Overseas

The Federal Government*s Role and Resources for Combating and the Federal

Terrorism Overseas 30 Government*s Role

Objectives, Scope, and Methodology 34 Chapter 2

38 The Interagency

Policies, Plans, and Legislation 38 Roles and Responsibilities of Key
Federal Agencies 52 Framework for

Interagency Coordination Mechanisms 60 Combating Terrorism

Agency Comments and Our Evaluation 64 Overseas

Chapter 3 66

Federal Efforts to Intelligence Gathering and Analysis Help Detect
Terrorist Activities 66

Detect and Prevent Protecting U. S. Government Facilities and Americans
Abroad 77

Terrorism Public Diplomacy Builds International Support for

U. S. Foreign Policy 89 Visa and Border Controls Are Intended to Prevent
Terrorists and

Their Materials from Entering the United States 91 Coalition Capabilities
Are Enhanced through Bilateral Programs

and Activities 105 Agency Comments and Our Evaluation 127

Chapter 4 128

Federal Efforts to Diplomatic Initiatives Strengthen International
Cooperation 128

Law Enforcement Efforts to Disrupt Terrorist Organizations 135 Disrupt and
Destroy

Identifying and Freezing Terrorists* Financial Assets Disrupts Terrorist
Organizations Terrorist Organizations 145 Military Operations Provide
Means to Destroy Terrorist

Organizations 154 Covert Actions Can Be Used to Disrupt and Destroy
Terrorist

Organizations 168 Agency Comments and Our Evaluation 169

Chapter 5 170

Federal Efforts to Advance Preparations for Terrorist Incidents 170

Response to a Terrorist Incident Overseas 173 Respond to Terrorist

Evaluations in the Aftermath of a Terrorist Incident 182 Incidents
Overseas

Agency Comments and Our Evaluation 183 Appendixes

Appendix I: Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas 184

Appendix II: Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas 209

Appendix III: Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas 215

Appendix IV: Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas 225

Appendix V: Matrix of Department of the Treasury Programs and Activities
to Combat Terrorism Overseas 239

Appendix VI: United Nations Protocols, Conventions, and Resolutions
Related to Terrori sm 243

Appendix VII: Organizations Visited or Contacted 249

Appendix VIII: Comments from the Department of Defense 253

Appendix IX: Comments from the U. S. Agency for International Development
254

Appendix X: GAO Contacts and Staff Acknowledgments 255

Related GAO Products 256 Tables Table 1: Fiscal Year 2004 President*s
Request for Funding to

Combat Terrorism Domestically and Overseas (Gross Budget Authority) 32
Table 2: National Strategies Related to Combating Terrorism 43 Table 3:
Goals and Objectives in the National Strategy for

Combating Terrorism 49 Table 4: NSC- Sponsored Interagency Working Groups
Under the

Counterterrorism Security Group to Coordinate Efforts to Combat Terrorism
Overseas 61 Table 5: Selected Members of the Interagency Intelligence
Committee on Terrorism 75

Table 6: U. S. Nonproliferation Assistance Programs 117 Table 7: Federal
Agencies* Roles in Investigating Terrorist- Related

Incidents Overseas 137 Table 8: Reported Extraditions and Renditions of
Terrorists to the

United States, 1987- 2001 140 Table 9: Significant Military Contributions
by Selected Coalition

Partners in and around Afghanistan in Support of Operation Enduring
Freedom 164 Table 10: Department of Defense Programs and Activities to
Combat

Terrorism Overseas 184 Table 11: Department of Homeland Security Programs
and Activities

to Combat Terrorism Overseas 209 Table 12: Department of Justice Programs
and Activities to Combat Terrorism Overseas 215

Table 13: Department of State Programs and Activities to Combat Terrorism
Overseas 225 Table 14: Department of the Treasury Programs and Activities
to

Combat Terrorism Overseas 239 Table 15: UN Conventions and Protocols
Related to Terrorism 243 Table 16: UN Security Council Resolutions Related
to Terrorism 244 Table 17: UN General Assembly Resolutions Related to
Terrorism 246

Figures Figure 1: The Pentagon in Flames Moments after International
Terrorists Crash a Hijacked Aircraft into the Building on

September 11, 2001 14 Figure 2: Total International Terrorist Attacks,
1981- 2001 17

Figure 3: Types of International Terrorist Attacks Against Americans by
Percentage, 1988- 2001 18 Figure 4: Terrorist Attacks Against U. S.
Targets during 2001 by

Type of Targets Attacked 20 Figure 5: Terrorist Attacks Against U. S.
Targets during 2001 by

Region 21 Figure 6: Aftermath of the al Qaeda Terrorist Bombing of the U.
S.

Embassy in Dar es- Salaam, Tanzania, in August 1998 23 Figure 7:
Relationships Between and Among National Strategies

Related to Combating Terrorism Overseas 47 Figure 8: Host Nation Police
Use Buses to Cordon off a U. S.

Embassy during a Heightened Threat Period 81 Figure 9: 2nd Company,
Georgian Commando Battalion, Perform a

Combat Off Load With Members of the U. S. Army*s 10th Special Forces Group
(Airborne) at a Training Range at Krtsanisi, Republic of Georgia 124
Figure 10: U. S. Special Forces Soldier Shows a Filipino Soldier How

to Adjust the Sights on His M- 16 Rifle during Marksmanship Training in
Tipo- Tipo Town, Basilan Island, Philippines 125 Figure 11: UN Security
Council Unanimously Adopts Resolution

1373, Calling for Wide- Ranging International Cooperation to Combat
Terrorism 132 Figure 12: Air Force B- 52H Bomber Drops a Load of M117 750
lb.

Bombs 157 Figure 13: U. S. Special Forces Troops Riding Horseback in

Afghanistan With Members of the Northern Alliance during Operation
Enduring Freedom 158 Figure 14: British Troops Prepare to Board an Oil
Tanker as Part of the Coalition*s Maritime Interception Operations in the

Arabian Sea 160 Figure 15: Camp X- Ray Used as a Temporary Holding
Facility for

Detainees Held at U. S. Naval Air Station Guantanamo Bay, Cuba 162 Figure
16: NATO Member France Provided Six Mirage 2000 Aircraft

to Fly Reconnaissance Missions in Support of Operation Enduring Freedom
166 Figure 17: USS Cole Damaged by a Terrorist Bomb Explosion While

Refueling at the Port of Aden, Yemen 176 Figure 18: Federal Response Teams
That Could Respond to a

Weapons of Mass Destruction Incident Overseas 181

Abbreviations

ATF Bureau of Alcohol, Tobacco, Firearms and Explosives CIA Central
Intelligence Agency CLASS Consular Lookout and Support System DARPA
Defense Advanced Research Projects Agency DOD Department of Defense DOE
Department of Energy FARC Fuerzas Armadas Revolucionarias de Colombia

(Revolutionary Armed Forces of Colombia) FBI Federal Bureau of
Investigation FEMA Federal Emergency Management Agency FEST Foreign
Emergency Support Team FinCEN Financial Crimes Enforcement Network FISA
Foreign Intelligence Surveillance Act FLETC Federal Law Enforcement
Training Center G- 8 Group of Eight GAO U. S. General Accounting Office
ICITAP International Criminal Investigative Training

Assistance Program ILEA International Law Enforcement Academy INS
Immigration and Naturalization Service INTERPOL International Police
Organization NATO North Atlantic Treaty Organization NSC National Security
Council OMB Office of Management and Budget OPDAT Overseas Prosecutorial
Development, Assistance and Training

USAID U. S. Agency for International Development USA PATRIOT Uniting and
Strengthening America by Providing Appropriate Tools Required to Intercept
and Obstruct Terrorism

PDD Presidential Decision Directive RDT& E research, development, test,
and evaluation UN United Nations WMD weapons of mass destruction

This is a work of the U. S. Government and is not subject to copyright
protection in the United States. It may be reproduced and distributed in
its entirety without further permission from GAO. It may contain
copyrighted graphics, images or other materials. Permission from the
copyright holder may be necessary should you wish to reproduce copyrighted
materials separately from GAO*s product.

May 23, 2003 Trans Let mi er t al t t The Honorable Henry J. Hyde Chairman
The Honorable Tom Lantos Ranking Member Committee on International
Relations House of Representatives

The Honorable Christopher Shays Chairman Subcommittee on National
Security, Emerging Threats, and International Relations Committee on
Government Reform House of Representatives Coordination of federal
programs to combat terrorism overseas became even more critical as a
result of the terrorist attacks against the United States on September 11,
2001. In response to these attacks, the federal

government has taken unprecedented political, diplomatic, legal, law
enforcement, financial, military, and intelligence actions to combat
terrorism abroad. Among these actions is the publication of a series of
new national strategies to combat terrorism.

You asked that we develop baseline information identifying and describing
federal programs and activities to combat terrorism overseas. As agreed
with your offices, this report describes the interagency framework and
policies for planning and coordinating federal efforts to counter
international terrorism. It identifies the relationships between and among
the new national strategies to combat terrorism. It also describes the
federal programs and activities governmentwide to detect and prevent
terrorism, disrupt and destroy terrorist organizations, and respond to
terrorist incidents overseas. Finally, it provides detailed matrices of
selected departments* programs and activities to combat terrorism
overseas. We briefed your staffs previously on the preliminary results of
our work and, at your request, issued an interim report on Combating
Terrorism: Department of State Programs to Combat Terrorism Abroad (GAO-
02- 1021, Sept. 6, 2002). This report contains the final results of

our review. The scope of this report was on combating terrorism overseas
and did not include a comprehensive review of homeland security efforts
within the

United States or federal agencies* efforts to combat terrorism
domestically. However, for this report, we did perform limited work on
border security, where homeland security and overseas efforts overlap.
Also, we included certain efforts to combat terrorism overseas that
actually occur within the

United States, such as interagency coordination, intelligence analysis,
and law enforcement investigations and prosecutions. Further, our analysis
was performed before the Department of Homeland Security began operations
in January 2003. Thus, many of the agencies, bureaus, offices, and federal
response teams discussed in this report had not yet transferred to the new
department from the Departments of Health and Human Services, Justice,
Transportation, and the Treasury.

Because of the large number of federal agencies and wide spectrum of
efforts involved in combating terrorism overseas, this *landscape* report
describes the governmentwide framework and programs and activities rather
than evaluating their effectiveness. Therefore, this report contains no
recommendations. We recognize that the effectiveness of the new strategies
and related programs that we describe will only be determined through time
as they are implemented. Some of our recent work on combating terrorism
indicates there are many implementation challenges and we have designated
some of these programs as high risk. Where we have done evaluative work on
relevant programs, we have identified the

appropriate GAO products and summarized their results in footnotes. In
addition, we include a comprehensive list of related GAO products at the
back of this report.

We are sending copies of this report to other interested congressional
committees. We also are sending copies to the Secretaries of Defense,
Energy, Homeland Security, State, Transportation, and the Treasury; and

the Attorney General. In addition, we are sending copies to the Director,
U. S. Agency for International Development; the Director of Central
Intelligence; the Assistant to the President for National Security
Affairs; the Director, Office of Homeland Security; and the Director,
Office of Management and Budget. We will make copies available to other
interested parties upon request. This report also will be available on
GAO*s Web site at http:// www. gao. gov.

If you or your offices have any questions about matters discussed in this
report, please contact me at (202) 512- 6020 or by e- mail at deckerrj@
gao. gov. Contacts and key contributors are listed in appendix X.

Raymond J. Decker, Director Defense Capabilities and Management

Executive Summary Purpose In response to the terrorist attacks of
September 11, 2001, the federal

government has taken unprecedented political, diplomatic, legal, law
enforcement, financial, intelligence, and military actions to combat
terrorism abroad. Combating terrorism is now at the top of the national
security agenda, and many changes have occurred in the government*s
organization and strategies related to these matters. GAO was requested to

produce this report to assist congressional committees with their
responsibilities to oversee federal programs to combat terrorism overseas.
Specifically, this report describes the interagency framework for
planning, executing, and coordinating related federal efforts. In
addition, this report identifies and describes the programs and activities
to detect and prevent terrorist attacks, disrupt and destroy terrorist
organizations, and respond to terrorist incidents.

Given the number of federal agencies and the wide spectrum of activities
involved in combating terrorism overseas, GAO limited its work to
describing the interagency framework and programs and activities and did
not evaluate their effectiveness. While there are several new strategies
to combat terrorism, many of the programs they incorporate are
longstanding. The strategies by themselves, no matter how cohesive and
comprehensive, will not ensure an integrated and effective set of programs
to combat terrorism overseas. The ability to ensure these things will be
determined through time as the strategies and programs are implemented.
Some of GAO*s recent work on combating terrorism demonstrates some of the
challenges ahead.

Background Although agencies have slightly different definitions,
terrorism generally is defined as politically motivated violence to coerce
a government or civilian

population. Efforts to combat terrorism are further broken down into
homeland security activities (those that occur domestically) and combating
terrorism overseas (those that occur abroad)* the topic of this report.
According to the Central Intelligence Agency, the threat of terrorist
attacks against U. S. personnel, facilities, and interests overseas is
greater now than ever before. Terrorists attacking the United States
employ a variety of tactics, target a number of different interests, and
strike in regions throughout the world. The federal government*s role in
combating terrorism overseas includes political, diplomatic, legal, law
enforcement, financial, military, and intelligence efforts. Funding for
combating terrorism overseas has increased about 133 percent, growing from
$4. 9 billion in fiscal year 2001 to $11.4 billion requested in fiscal
year 2004.

In addition, DOD has spent about $30 billion on military operations
overseas against terrorism in the period roughly equivalent to fiscal year
2002.

Results in Brief Combating terrorism overseas falls under an interagency
framework of plans, agency roles, and interagency coordination mechanisms.
In general,

the National Security Council manages this interagency framework. The
President, National Security Council, and federal agencies have published
a series of related directives and new national strategies to guide
federal efforts. To implement the directives and strategies, various
federal agencies are assigned key roles and responsibilities based on
their core missions.

Given the number of agencies involved, there are also a number of
interagency mechanisms to coordinate across agencies in both Washington,
D. C., and overseas. Within this framework, efforts to combat terrorism
overseas can generally be divided into programs and activities to (1)
detect and prevent terrorism, (2) disrupt and destroy terrorist
organizations, and (3) respond to terrorist incidents.

 Efforts to detect and prevent terrorism include activities to gather
intelligence on terrorist threats and organizations, protect facilities
and persons overseas, impact foreign opinion through public diplomacy,
prevent terrorists and their materials from entering the United States,

and improve other countries* capabilities.  Efforts to disrupt and
destroy terrorist organizations can occur in many

ways, to include diplomacy in both bilateral and multilateral forums; law
enforcement efforts to investigate, arrest, and prosecute terrorists;
financial and related measures to eliminate terrorist support; military
actions to destroy terrorists and regimes that harbor them; and covert
operations by intelligence agencies.

 Efforts to respond to an international terrorist incident consist of
advance preparations, managing the crisis and consequences of an attack,
and reviewing incidents to learn lessons and prevent or mitigate future
attacks.

GAO is making no recommendations in this report.

GAO*s Analysis The Interagency Framework

The National Security Council and its Director for Combating Terrorism for
Combating Terrorism

develop and manage the interagency framework for combating terrorism
overseas. This framework consists of presidential directives, national
strategies, and related guidance. For example, the National Security
Council coordinated the overall National Security Strategy of the United

States of America, and the Director for Combating Terrorism coordinated
the National Strategy for Combating Terrorism. There are other
nationallevel strategies related to combating terrorism. Examples of these
include the National Strategy for Homeland Security and the National
Strategy to Combat Weapons of Mass Destruction. The various strategies
were developed for specific and separate purposes. There is a general
hierarchy among these overlapping strategies.

Another key element in the interagency framework for combating terrorism
overseas is the specific roles played by federal organizations and
agencies. Some play a coordinating role, others serve a lead role in
specific areas, and many others have support roles for specific
activities. Some individual agencies have positions designated within them
to lead their

agencies* terrorism- related programs. In addition, individual agencies
have their own strategic plans or develop interagency plans and related
guidance for specific functions. For example, the Department of Justice*s
Strategic Plan for Fiscal Years 2001- 2006 and the Department of State*s
2002 Annual Performance Plan provide department- specific plans and goals

related to terrorism. The interagency framework also consists of
coordinating mechanisms and groups to implement the functions and
activities among all the federal agencies involved. In Washington, D. C.,
the National Security Council plays a major coordinating role by
sponsoring a policy coordinating committee called the Counterterrorism
Security Group that has several subordinate working groups on such topics
as interagency exercises and assistance to other countries. At U. S.
embassies, there are interagency teams that meet to coordinate bilateral
efforts to combat terrorism. Similarly, regional

military commands have interagency coordination groups that coordinate
military operations with non- military tools to combat terrorism.

Efforts to Detect and Gathering and analyzing intelligence outside of the
United States are the

Prevent Terrorism major activities to detect and prevent terrorist
activities overseas and

generally are led by the Central Intelligence Agency. Under the overall
leadership of that agency, U. S. intelligence agencies gather information
on terrorist organizations, monitor terrorist threats, and share
information with other nations. The Departments of State, Justice, and
Defense collect

and analyze intelligence through surveillance programs and liaisons with
foreign police. These intelligence activities support other preventative
efforts, such as protecting U. S. facilities and Americans overseas, and
visa and border controls.

Protecting U. S. facilities and Americans overseas is a major part of
preventing terrorism and is generally led by the Department of State. To
protect U. S. facilities and personnel abroad, State has programs that

include facility security, local guard forces, armored vehicles for
embassy personnel, and Marine Guards to protect sensitive information. The
Department of Defense has separate programs to protect its military forces
against terrorist attacks. For American citizens traveling and living
abroad, the State Department issues public travel warnings and public
announcements and operates warning systems to convey terrorist- related
information. State also uses overseas advisory councils* voluntary

partnerships between State and U. S. businesses* to exchange threat
information with private companies.

Improving the image of the United States to support U. S. foreign policy
is another activity to prevent terrorism. For example, in an attempt to
reduce possible negative perceptions of the United States and foster
greater

understanding of U. S. policy in key international audiences, State
conducts public diplomacy through various media. Similarly, the
Broadcasting Board of Governors conducts international broadcasts to
worldwide audiences to

help support U. S. strategic interests. Keeping terrorists and their
materials out of the United States also helps to prevent terrorism. The
State Department has a role in preventing terrorists from entering the
United States through its visa programs and related efforts to screen out
terrorists. Agencies that have recently transferred from various
departments to the Department of Homeland Security also have a role in
keeping terrorists and their contraband out of the United States. These
include the former Immigration and Naturalization Service, the U. S.
Border Patrol, the former U. S. Customs Service, and the U. S. Coast
Guard, which monitor the border at and between ports of entry.

Improving other countries* capabilities is another part of preventing
terrorism and is generally led by the Department of State. The department
has overall leadership of bilateral relations, including programs to
assist foreign nations. Such programs consist of training, equipment, and
other assistance to improve foreign police and military capabilities.
While the State Department has the overall lead, many of these assistance
programs are implemented in conjunction with the Departments of Defense,
Homeland Security, Justice, Energy, and the Treasury. One example is the
Antiterrorism Assistance program, which is managed by State, but the

training might be delivered by other agencies, such as the Federal Bureau
of Investigation or the U. S. Secret Service. These assistance efforts not
only help to prevent terrorist attacks, they can improve the capabilities
of other

countries to disrupt and destroy terrorists and to respond to terrorist
incidents.

Efforts to Disrupt and Diplomacy and cooperation with other countries, led
by the Department of Destroy Terrorist

State, enables that department and other federal agencies to undertake a
Organizations

number of efforts to combat terrorism. State manages bilateral and
multilateral relationships to leverage opportunities for cooperation among
traditional and emerging allies. At the bilateral level, State helps

orchestrate other nations* support and assistance for U. S. law
enforcement activities, financial operations, and military actions against
terrorists. At the multilateral level, State leads U. S. efforts in the
United Nations and in other international forums to combat terrorism. For
example, State has introduced and coordinated the passage of several
related United Nations Security Council Resolutions to combat terrorism.

Law enforcement efforts are also a key activity to disrupt and destroy
terrorist organizations and generally are led by the Department of Justice
and its Federal Bureau of Investigation. These include efforts, in
conjunction with other nations, to investigate terrorist incidents, make
arrests, arrange for the return of suspects to the United States, and

prosecute alleged terrorists. In such investigations, the Departments of
State and the Treasury and other law enforcement agencies support the
Department of Justice.

Taking action against the financial structure of terrorist organizations
also plays a key role in disrupting and destroying the organizations and
preventing future attacks. Numerous components of the Departments of
State, the Treasury, Homeland Security, Justice, and other agencies

participate in efforts to combat terrorist financing. Activities include

blocking or freezing assets of designated individuals and organizations
linked to terrorism and conducting investigations aimed at identifying,
tracing, and freezing assets tied to terrorist organizations.

Military operations are important in disrupting and destroying terrorist
organizations and generally are led by the Department of Defense with
support at the multilateral level provided by the Department of State.
Operations in Afghanistan bluntly illustrate the devastating nature of

military efforts to attack terrorist organizations. Many of the military
operations are conducted or coordinated with foreign militaries.

Another means of disrupting and destroying terrorists is to strike
secretly at terrorists through covert action, approved by the President
and led by the Central Intelligence Agency.

Efforts to Respond to The federal government takes many advance
preparations in anticipation Terrorist Incidents

of a terrorist attack. For example, each diplomatic post has an Emergency
Action Committee and Emergency Action Plan. The committees are required to
exercise these plans periodically. To improve the governmentwide responses
to a terrorist incident, a number of federal agencies participate in an
interagency exercise program.

Federal efforts to respond to terrorist incidents are organized along a
lead agency concept. The State Department is the lead agency for
responding to the crisis and managing the consequences of a terrorist
incident overseas. In this role, State is responsible for marshaling all
federal assets necessary to respond. The U. S. ambassador would be the on-
scene coordinator for the U. S. response in the foreign nation, as was
done, for example, after the U. S. embassy bombing in Nairobi, Kenya. The
State Department, with the concurrence of the National Security Council,
can lead a rapidly deployable interagency advisory group called the
Foreign Emergency Support Team.

As part of the response to an incident, the Department of Justice, through
the Federal Bureau of Investigation, would lead U. S. law enforcement
investigations in conjunction with local police in the immediate aftermath
of a terrorist incident overseas. Other federal law enforcement agencies*
such as the Bureau of Alcohol, Tobacco, Firearms and Explosives and the
State Department*s Bureau of Diplomatic Security* have expertise to assist
in investigations at the scene of an overseas attack.

Depending on the nature of the threat or incident, other federal agencies
may be called upon to support State in managing the consequences of a
terrorist attack. For example, the Department of State may request that
the Department of Defense provide military support as part of the U. S.
government*s efforts to assist in mitigating the consequences of a
terrorist incident overseas. The Department of State also may request U.
S. military support for the evacuation of embassy staff and other
Americans, should that be necessary in the aftermath of a terrorist
incident. Many of State Department*s efforts for managing the consequences
of a terrorist attack have focused on incidents involving weapons of mass
destruction* those involving chemical, biological, radiological, and
nuclear materials. Several federal agencies could assist the State
Department in responding to

such an incident. For example, the Department of Energy has a Nuclear
Emergency Search Team to provide technical expertise in resolving a
nuclear or radiological terrorist incident.

After a terrorist incident overseas, the Departments of State and Defense
generally conduct reviews of the incident, which identify actions to
prevent or mitigate future attacks. Examples of these include State*s
Accountability Review Boards for the 1998 bombings of two U. S. embassies
in East Africa and Defense*s Task Force on the 1996 bombing of the al-
Khobar Towers

military housing facility in Saudi Arabia. Agency Comments and

GAO provided a draft of the report to several federal agencies in March
Our Evaluation

2003 for their review and comment. Such agencies included the Executive
Office of the President (including the National Security Council, the
Office of Homeland Security, and the Office of Management and Budget); the
Departments of Defense, Energy, Homeland Security, Justice, State,
Transportation, and the Treasury; the Central Intelligence Agency; and the
U. S. Agency for International Development.

The Department of Defense and the U. S. Agency for International
Development provided written comments on a draft of this report. These
comments generally agreed with the accuracy of the report and they are
reproduced in appendixes VIII and IX, respectively. In addition, these
agencies provided technical comments, and we made revisions, as
appropriate. We also received technical comments from the Office of
Management and Budget; the Departments of Justice and State; Bureau of
Alcohol, Tobacco, Firearms and Explosives; the U. S. Secret Service; and
the Bureau for Immigration and Customs Enforcement. We made changes, as
appropriate, based upon these written and oral technical comments.

Our draft report reflected efforts to combat terrorism overseas just prior
to the transfer of certain agencies and functions to the new Department of
Homeland Security in March 2003. Therefore, many of the technical comments
concerned the creation of the new department and the transfer of these
agencies and functions from other departments into the Department of
Homeland Security. The Departments of Energy, Homeland Security,
Transportation, and the Treasury and the CIA had no comments on a draft of
this report.

Introduction: Terrorism Overseas and the

Chapt 1 er Federal Government*s Role Terrorism generally is defined as
politically motivated violence to coerce a government or civilian
population. Within that definition, there is domestic terrorism and
international terrorism, depending on the origin of terrorist groups,
where they launch their attacks, and who their victims are. Efforts to
combat terrorism are further broken down into homeland security activities
(those that occur domestically) and combating terrorism overseas (those
that occur abroad). 1 According to the Central Intelligence Agency (CIA),
the threat of terrorist attacks against U. S. personnel, facilities, and
interests overseas is greater now than ever before. Terrorists capable of
attacking the United States can employ a variety of tactics, can hit a
number of different targets, and can strike in regions throughout the
world. Terrorism overseas is aggravated by a series of interrelated
factors and trends, such as technological advances and alliances with
international crime. The federal government*s role in combating terrorism
overseas includes political, diplomatic, legal, law enforcement,
financial, military, and intelligence efforts. Immediately after the 2001
terrorist attacks, the

Congress passed and the President signed into law an emergency
supplemental appropriation that increased funding to combat terrorism
overseas by at least $2 billion in fiscal year 2002. Funding for combating
terrorism overseas has increased about 133 percent, growing from $4. 9
billion in fiscal year 2001 to $11.4 billion requested in fiscal year
2004. In addition, the Department of Defense (DOD) has spent about $30
billion on military operations against terrorism in the period roughly
equivalent to fiscal year 2002.

Definitions for *Terrorism* generally is defined as politically motivated
violence to coerce Terrorism and

a government or civilian population. However, no single definition of
terrorism has gained universal acceptance by the U. S. government and
Combating Terrorism

federal agencies* definitions of terrorism vary somewhat based on their
functional roles and missions. For example, the Department of State and
the CIA define terrorism as *premeditated, politically motivated violence
perpetrated against noncombatant targets by sub- national groups or

1 In this report, we refer to programs outside of the United States as
combating terrorism

overseas. This term is consistent with how the Executive Office of the
President defines terrorism- related programs to distinguish them from
programs inside the United States* also known as homeland security
programs. For the purposes of this report, we use the terms *overseas* and
*abroad* interchangeably to refer to programs and activities that occur
outside of the United States.

clandestine agents.* 2 The Federal Bureau of Investigation (FBI) defines
it more broadly as *the unlawful use of force and violence against persons
or property to intimidate or coerce a government, the civilian population,
or any segment thereof, in furtherance of political or social objectives.*
3 The FBI definition reflects its mission, identifying a terrorist
incident as a violation of the criminal laws of the United States and a
suspected terrorist would, therefore, be subject to arrest and
prosecution. Finally, DOD defines terrorism as *the calculated use of
violence or the threat of violence to inculcate fear; intended to coerce
or try to intimidate governments or societies in the pursuit of goals that
are generally political, religious, or

ideological.* 4 DOD*s definition of terrorism subsumes both definitions
used by the Department of State and the FBI. This definition was carefully
crafted to distinguish between terrorism and other kinds of violence.

Within the definition of terrorism, there is *domestic terrorism* and
*international terrorism,* depending on the origin of terrorist groups,
where they launch their attacks, and who their victims are. The FBI
defines domestic terrorism as the unlawful use, or threatened use, of
force or violence by a terrorist group or individual based and operating
entirely within the United States or its territories without foreign
direction. The 1995 bombing of the Alfred P. Murrah Federal Building in
Oklahoma City, for example, was an act of domestic terrorism. The State
Department and the CIA define international terrorism as terrorism
involving citizens or the territory of more than one country.
International terrorist acts can occur either inside or outside of the
United States and may transcend national boundaries in terms of the means
by which they are accomplished, the persons they intend to coerce or
intimidate, or the locale in which the

perpetrators operate or seek asylum. The 2001 coordinated terrorist
attacks against the World Trade Center in New York City and the Pentagon
in Washington, D. C., for example, were acts of international terrorism.
Although the attacks occurred within the United States, the perpetrators
came from other countries and many of the World Trade Center victims

2 This definition is derived from 22 U. S. C. S: 2656f( d) (2002).
*Noncombatant* includes not only civilians, but also military personnel
who, at the time of the incident, are unarmed and/ or are not on duty.
State also considers as acts of terrorism attacks on U. S. military
installations or on armed military personnel when a state of military
hostilities does not exist at the incident site, such as terrorist
bombings against U. S. military facilities. Since 1983, the U. S.
government has used this definition for statistical and analytical
purposes.

3 This definition is derived from 28 C. F. R. S: 0.85 (2002). 4 DOD
Directive 2000.12, DOD Antiterrorism/ Force Protection Program, Apr. 13,
1999.

were foreign nationals. Figure 1 shows the aftermath of an international
terrorist attack within the United States.

Figure 1: The Pentagon in Flames Moments after International Terrorists
Crash a Hijacked Aircraft into the Building on September 11, 2001

*Combating terrorism* refers to the full range of policies, strategies,
programs, and activities to counter terrorism both at home and abroad. The
distinction between *homeland security* and *combating terrorism overseas*
is based on where federal efforts to combat terrorism occur. Federal
programs and activities directed against terrorism within the United
States are considered homeland security, which is defined by the

federal government as *a concerted national effort to prevent terrorist
attacks within the United States, reduce America*s vulnerability to

terrorism, and minimize the damage and recover from attacks that do
occur.* 5 This is a new term, used since the terrorist attacks on
September 11, 2001. In contrast, federal programs and activities directed

against terrorism outside of the United States are considered combating
terrorism overseas, which is the subject of this report.

Finally, within the term combating terrorism, some federal agencies make a
further distinction between *antiterrorism* and *counterterrorism* to
describe their programs and activities within the context of their
functional roles and missions. Antiterrorism generally refers to defensive
measures. The Department of State, for example, uses *antiterrorism* in
the context of law enforcement training, border security, critical
infrastructure protection, and embassy security. DOD uses the term
*antiterrorism* to mean the defensive measures, including force
protection, taken to reduce the vulnerability of individuals and property
to terrorist acts. DOD uses the term *counterterrorism* to mean offensive
measures taken to prevent, deter, and respond to terrorism. The FBI,
meanwhile, uses the term *counterterrorism* to refer to the full range of
its activities directed against terrorism, including preventive measures,
incident response, and investigative efforts. Finally, OMB tracks funding
to combat terrorism overseas, but does not include direct military
operations in the figures it reports.

The Threat of International terrorists use a variety of tactics in their
attacks against the

Terrorism Overseas United States. The number of terrorist attacks against
U. S. citizens,

facilities, and interests overseas has declined in recent years, but the
lethality of the attacks has increased. Although terrorists use many
different tactics and methods to attack Americans, bombings are the
predominant type of attack in recent years. While the threat to Americans
varies by region, type of event, and targets attacked, bombing of U. S.
businesses in Latin America constituted the majority of attacks in 2001.
Also, international terrorism is aggravated by a series of interrelated
factors, such as globalization, technological advances, and troubling
trends that include, for example, a shift in terrorists* tactics and the
use of unconventional weapons.

5 See Office of Homeland Security, National Strategy for Homeland
Security, July 16, 2002, p. 2.

Terrorist Organizations Use According to the CIA, the threat of terrorist
attacks against U. S. personnel, Variety of Tactics to Attack

facilities, and interests overseas is greater now than ever before because
of American Targets

the number and types of terrorist organizations, the lethality of
terrorists* Worldwide

tactics, and the ability of terrorists to operate worldwide. Terrorist
organizations that threaten U. S. personnel, facilities, and interests at
home and abroad come primarily from organized groups that have political,
ethnic, or religious agendas; from state sponsors of terrorist
organizations;

and from transnational groups with broader goals. Islamic terrorist
groups, which have become a growing threat in recent years, tend to be
loosely organized, recruit their membership from many different countries,
and obtain support from an informal international network.

Number and Lethality of Attacks Worldwide, the number of international
terrorist attacks has declined in recent years compared to the mid- 1980s.
However, the level of violence and lethality of such attacks have
increased. According to the Department of State, the number of
international terrorist attacks peaked at 666 incidents in 1987 and had
declined to 348 in 2001. Yet, casualties resulting from

international terrorist attacks during 2001 were the highest ever
recorded* 3,572 persons killed and 1,083 injured. Figure 2 shows the total
number of international terrorist attacks over a 21- year period (1981-
2001).

Figure 2: Total International Terrorist Attacks, 1981- 2001

The terrorist attacks against the United States on September 11, 2001,
represented the most lethal international terrorist attack ever. Three of
four separate, but coordinated aircraft hijackings, carried out by the al
Qaeda terrorist network, deliberately destroyed predetermined targets that
represented America*s political, economic, and military strength. (The
fourth hijacked aircraft crashed in Pennsylvania apparently as a result of
the passengers overpowering the terrorists, thus preventing the aircraft
from being used as a missile in the terrorists* plan.) According to
State*s Office of International Information Programs, a total of 3,057
people were killed in these four incidents. 6 Citizens representing 78
different countries perished at the World Trade Center site. These events
clearly demonstrated not only the lethality, but also the global reach of
a terrorist organization 6 This figure includes 2,666 persons killed in
the coordinated terrorist attacks on

September 11, 2001, against the World Trade Center Towers in New York
City, 125 killed in the Pentagon, 92 killed aboard American Airlines
flight 11 that crashed into the North Tower of the World Trade Center, 65
killed aboard United Airlines flight 175 that crashed into the South Tower
of the World Trade Center, 64 killed aboard American Airlines flight 77
that

crashed into the Pentagon, and 45 killed aboard United Airlines flight 93
that crashed in rural Pennsylvania.

beyond any terrorist attack the United States had previously experienced
at home or abroad.

Types of Terrorist Attacks Terrorists employ a wide variety of tactics, to
include violent demonstrations, vandalism, arson, assault, kidnappings,
ambushes, sniper attacks, murder, and attacks with firearms, grenades,
rockets, and bombs. However, bombings are the most common type of attack.
From 1988 to 2001, bombings accounted for 67 percent of all terrorist
attacks against Americans. Figure 3 shows the different types of
international terrorist attacks by percentage that were perpetrated
against Americans over a 14- year period between 1988 and 2001.

Figure 3: Types of International Terrorist Attacks Against Americans by
Percentage, 1988- 2001

Note: "Other" consists of drugging, sabotage, physical harassment, mortar/
landmine, bomb/ rocket hoax, banditry, sit- in, and other/ incidental.

In recent years, the United States and its interests have been the target
of several terrorist bombings overseas, to include the June 1996 truck
bombing of the al- Khobar Towers military housing facility near Dhahran,
Saudi Arabia; the August 1998 truck bombings of the U. S. embassies in Dar
es- Salaam, Tanzania, and in Nairobi, Kenya; and the October 2000 ship
bombing of the guided missile destroyer USS Cole during a refueling stop
in

Aden Harbor, Yemen. In 2001 (the most recent year that data is available),
bombings have become an even more prevalent type of tactic used by
terrorists against U. S. facilities and interests overseas. Of the 219
terrorist attacks against U. S. citizens and facilities overseas during
2001, 207 (or about 95 percent) were carried out by bombing the target.

Type of Targets Attacked Terrorists attack American businesses most
frequently. Of the 228 attacks during 2001 against U. S. targets, 204 (or
more than 89 percent) were against American businesses. U. S. government,
diplomatic, and military targets tend to be more protected and represent
hard targets; American businesses, in contrast, are less protected, making
them soft targets.

Figure 4 shows the number of terrorist attacks against U. S. citizens,
facilities, and interests overseas during 2001 by type of target attacked.

Figure 4: Terrorist Attacks Against U. S. Targets during 2001 by Type of
Targets Attacked

Terrorism Varies by Region, Terrorism* both in the number of attacks and
the nature of the threat* With Most Attacks varies by region. The
overwhelming number of attacks have occurred in Occurring in Latin America

Latin America. Of the 219 terrorist attacks against U. S. citizens and
facilities overseas during 2001, 191 (or 87 percent) were in Latin
America. Figure 5 shows the number of terrorist attacks against U. S.
citizens, facilities, and interests overseas during 2001 by region.

Figure 5: Terrorist Attacks Against U. S. Targets during 2001 by Region

The following sections summarize, by region, the international threat of
terrorism to U. S. citizens and personnel; U. S. business, government, and
military facilities; and U. S. political, economic, and strategic
interests. This information is based on a review of key documents and
interviews with officials in the Departments of State and Defense, U. S.
Central Command, U. S. European Command, U. S. Southern Command, U. S.
Special

Operations Command, and the CIA.

Africa In Africa, terrorism is a persistent and increasing threat to U. S.
and other countries* personnel, facilities, and interests. Most terrorist
attacks in Africa, according to the State Department, stem from internal
civil unrest and spillover from regional wars as African rebel movements
and opposition groups use terrorist tactics to further their political,
social, or economic objectives. For example, insurgent groups have used
terrorist

tactics and attacked civilians in recent years in the Democratic Republic
of the Congo, Liberia, and Sierra Leone. In addition, international
terrorist organizations with Islamic ties, such as al Qaeda and the
Lebanese Hizballah, have established footholds in Africa and exploit the
continent*s permissive operating environment to expand and strengthen
their terrorist networks. The al Qaeda terrorist bombing of the U. S.
embassies in Kenya and Tanzania in August 1998 demonstrated how vulnerable
*lower risk* U. S. diplomatic facilities are on the continent compared
with hardened embassies in the Middle East and elsewhere. Africa*s
ungoverned areas, porous borders, regional conflicts, lax or non- existent
financial systems, and the wide availability of weapons all contribute to
an operating environment where terrorist organizations thrive. Similarly,
terrorist organizations breed and find sanctuary in Africa*s *failed
states,* such as Somalia, or those countries with weak central governments
and poor or nonexistent law enforcement that cannot monitor, let alone
control, the

activities of terrorists and their supporters. Terrorists also are using
the illegal trade in Africa in diamonds both to launder money and to
finance their operations worldwide. 7 Finally, one African nation* Sudan*
has been designated by the State Department as one of seven countries
worldwide that sponsors terrorism. 8 Figure 6 shows the aftermath of the
1998 terrorist bombing of a U. S. embassy in East Africa.

7 For more information on the illegal diamond trade, see U. S. General
Accounting Office,

International Trade: Critical Issues Remain in Deterring Conflict Diamond
Trade, GAO02- 678 (Washington, D. C.: June 14, 2002). We reported that the
nature of diamonds and the operations of the international diamond
industry create opportunities for illicit trade, including trade in
conflict diamonds. We also reported that there are considerable

challenges in establishing a system that will effectively deter this
trade.

Figure 6: Aftermath of the al Qaeda Terrorist Bombing of the U. S. Embassy
in Dar es- Salaam, Tanzania, in August 1998

South Asia South Asia currently represents the primary (but by no means
the only) focus of terrorism directed against the United States. Terrorist
organizations, such as al Qaeda, continue to operate and garner support in
the region. Afghanistan became the first military battleground in the *war
on terrorism* in October 2001. Afghanistan, for example, had been used by
Islamic extremists from around the world as a training ground and base of

operations for their terrorist activities. The al Qaeda leadership used
Afghanistan as a safe haven to recruit and train terrorists, manage

8 State sponsors of terrorism are those countries designated by the
Secretary of State under section 40( d) of the Arms Export Control Act, 22
U. S. C. S: 2780( d). Moreover, each year, under the provisions of section
6( j) of the Export Administration Act of 1979, as amended (50 U. S. C. S:
2405( j)), the Secretary of Commerce, in consultation with the Secretary
of State, provides the Congress with a list of countries that support
international terrorism. The Secretary of State may designate a government
as a state sponsor of terrorism if that government has repeatedly provided
support for acts of international terrorism, invoking economic sanctions.
The seven countries currently on the list are Cuba, Iran, Iraq, Libya,
North Korea, Sudan, and Syria. Various types of sanctions can be imposed
on a government so designated, as discussed in more detail in chapter 4.

worldwide fundraising for the terrorist organization, plan terrorist
operations, and conduct violent anti- American demonstrations to provoke
extremists in other countries to attack U. S. interests worldwide. These
activities culminated in the September 11, 2001, coordinated terrorist
attacks against the United States.

East Asia In East Asia, trafficking in narcotics, persons, and weapons* as
well as organized crime and official corruption* are serious international
crimes that terrorist organizations exploit to finance their operations.
Southeast Asian terrorist organizations that have cells linked to al Qaeda
were discovered in 2001 in Malaysia and Singapore and their activities,
movements, and connections traverse the entire region. Multinational

terrorist organizations and networks operate throughout the region,
highlighting the lack of an effective regional counterterrorism mechanism.
Most terrorist activity in East Asia is related to domestic political
disputes. However, the Abu Sayyaf Group, an Islamic extremist organization
in the Philippines, kidnapped two Americans and killed one of them in
2002. The United States remains concerned about Islamic extremists
operating in and around western China who have received training,
equipment, and inspiration from al Qaeda, the Taliban, and others in
Afghanistan.

Eurasia In Eurasia, the threat against the United States and its interests
stems principally from the ongoing threat posed by al Qaeda- linked
terrorists rather than by the influx of al Qaeda and Taliban fighters
following coalition operations led by the United States in neighboring
Afghanistan. The Islamic Movement of Uzbekistan, which is on the U. S.
foreign terrorist organization list, seeks to overthrow the Uzbek
government and create an Islamic state. Kazakhstan, Kyrgyzstan,
Tajikistan, Turkmenistan, and

Uzbekistan are five of the new U. S. partners in the *war on terrorism*
and have provided the United States with access to their military
facilities for U. S. offensive combat operations and/ or humanitarian
support in Afghanistan. Also of U. S. concern in Eurasia is the linkage
between

terrorism and other international crimes (specifically organized crime and
trafficking in persons and drugs), ethnic separatism, and religious
extremism. U. S. officials remain concerned about routes through Georgia.
The international mujahidin with ties to terrorist organizations move

people, money, and materiel throughout the Caucasus region in support of
separatist fighters in Chechnya, Russia. Finally, the United States is so
concerned about the terrorist threat in the region that it has provided
Georgia with training to help it implement tighter counterterrorism
controls in the Pankisi Gorge. 9 (Chapter 3 discusses U. S. training to
improve other countries* capabilities to combat terrorism.)

Europe In Europe, U. S. diplomatic and military officials remain concerned
about the terrorist threat to U. S. military and diplomatic facilities and
personnel. Potential al Qaeda *sleeper cells* in Germany and elsewhere
continue to pose a threat to U. S. interests. Domestic terrorist
organizations in a number of countries (such as Greece, Italy, Spain,
Turkey, and the United Kingdom) continue to function at varying levels of
effectiveness. A wide- range of groups and individuals use terrorist
tactics to protest globalization, often directing their demonstrations
toward U. S. businesses. In the Balkans, according to the Department of
State, although governments generally are committed to combating
terrorism, terrorists and Islamic extremist groups have exploited
inadequate border security and institutional weaknesses to support their
operations. Also, Middle Eastern nongovernmental organizations identified
as supporting terrorist activities remain in the Balkans, providing
assistance to Islamic extremist groups. Terrorists also exploit some
European countries* liberal asylum laws; open land borders; and weaknesses
in their investigative, prosecutorial, and procedural

processes while using these countries as operational staging areas for
international terrorist attacks. For example, according to the Department
of State, the theft and forgery of passports in Belgium facilitated
terrorists* ability to travel freely. State further reported that, while
in the past, lenient Greek courts reduced sentences of suspected
terrorists and overturned guilty verdicts of terrorist cases, Greek
authorities are using new antiterrorism legislation passed in 2002 to more
successfully prosecute terrorist cases. Greece effectively neutralized its
most lethal terrorist group, Revolutionary Organization 17 November, in
June 2002, and 19 suspected members went on trial in March 2003. According
to the State Department, U. S. and international officials are pleased
with Greek

cooperation on security preparations for the 2004 Olympic Summer Games in
Athens, Greece.

Latin America In Latin America, the transnational threats of terrorism,
drugs and arms trafficking, illegal migration, and international organized
crime are the greatest challenge to U. S. security interests in the
region. 10 These transnational threats are increasingly linked as they
share common infrastructure, transit patterns, corrupting means, and
illicit mechanisms.

9 The Pankisi Gorge is a region in northern Georgia that Russia accuses
Georgia of allowing Chechen terrorists (separatist fighters) and the
international mujahidin to use as a safe haven.

10 Testimony by General Gary Speer (U. S. Army), Acting Commander- in-
Chief, U. S. Southern Command, before the Committee on Armed Services, U.
S. Senate, Mar. 5, 2002.

International terrorists groups have established support bases in some
South American countries that sustain their worldwide operations. For
example, the triborder area where the borders of Argentina, Brazil, and
Paraguay converge continues to be a safe haven for Hizballah* the
Lebanese- based terrorist organization* and other terrorist organizations,
such as HAMAS, where they raise funds to finance their operations through

criminal enterprises. According to the Department of State, there are
unconfirmed reports that al Qaeda support cells and sympathizers also are
scattered throughout Latin America. A Colombian paramilitary organization
has been added to the list of Foreign Terrorist Organizations, and the
Revolutionary Armed Forces of Colombia, known as the FARC (Fuerzas Armadas
Revolucionarias de Colombia), pose a direct threat to U. S. personnel,
facilities, and interests. Terrorist attacks against Columbia*s energy
infrastructure (the Cano Limon- Covenas oil pipeline) has a severe

impact. Even members of the Irish Republican Army were arrested in 2001
for helping the FARC prepare for an urban terror campaign by providing
explosives training. Bombings, kidnappings, extortions, and assassinations
remain the most pervasive terrorism problems in the region. The major
concern for U. S. officials is the nexus or linkage between the illegal
narcotics trafficking and terrorism or narco- terrorism. In addition,
land, maritime, and air smuggling routes and support networks across South
America, Central America, and the Caribbean once used exclusively by
criminals trafficking in illegal narcotics and humans are now being used
by terrorists.

Middle East In the Middle East, the greatest threat to U. S. interests
comes from terrorist groups and state- sponsored terrorist organizations.
Chief among the terrorist groups is Osama bin Laden*s al Qaeda terrorist
organization. According to the Department of State, Syria and Lebanon
refuse to recognize Hizballah, HAMAS, the Palestine Islamic Jihad, and
other

Palestinian rejectionist groups as terrorist organizations, believing that
violent activities by these groups represent legitimate resistance. After
decades of civil war and foreign occupation, Lebanese governmental control
continues to be weak or non- existent in many areas of the country. 11
This environment allows for the smuggling of small arms and explosives and
training activities by terrorist organizations. Financing of terrorist
organizations remains problematic in the Gulf countries. Joint

11 According to the State Department, this is not an issue of the Lebanese
having the capability to enforce its will and choosing not to; it is an
issue of Lebanese governmental incapacity after decades of Israeli and
Syrian occupation of Lebanon.

efforts by the U. S. and Yemeni governments to disrupt and destroy al
Qaeda elements in Yemen have been only partially successful, and al Qaeda
nodes still exist in that country. Protecting U. S. citizens and personnel
and facilities from terrorist attack is a high priority throughout the
region. In addition, force protection of U. S. forces transiting the Suez
Canal in Egypt has increased.

North America In North America, the greatest vulnerability to the United
States is the porous borders with Canada and Mexico. The lack of adequate
border security could allow terrorists to enter the United States
unnoticed or unchallenged to carry out their activities and conduct their
operations. Another threatening factor facing the United States in North
America is a

lack of effective mechanisms by neighboring countries to prevent terrorist
from financing their operations. In Mexico, for example, new measures
taken to counter terrorist financing include monitoring financial
movements, exchanging information on unusual movements of capital, and
more effective steps to combat money laundering.

Factors That Aggravate the The increase in the level and severity of
international terrorism (and other

Threat of Terrorism international crimes) in recent years can be traced to
a series of

interrelated aggravating factors. These factors enable terrorist groups to
operate more effectively. The factors, as identified by the FBI, are as
follows. Reduced International Barriers The post- Cold War landscape
provides terrorists and terrorist organizations

with opportunities to exploit the advantages of reduced or collapsed
political and economic barriers to move people, money, information, and
materiel* including weapons of mass destruction (WMD)* across
international borders.

Global Business Networks The globalization of business networks also
facilitates international terrorism. Like international criminals,
international terrorists take advantage of global commercial, banking,
transportation, and communication systems to plan, finance, and carry out
their operations. Through these networks, terrorists and terrorist
organizations often plan their operations in third countries, some of
which provide safe havens.

Technological Advances Technological advances, particularly in information
technology and communications, also facilitate terrorist organizations*
global reach. Terrorists are becoming more sophisticated in their use of
computer and

telecommunications technology. For example, there is widespread use of
cell phones to plan, coordinate, support, and execute terrorist
operations, making antiterrorism measures challenging. In addition, cyber,
or computer- based, attacks are a real threat to the nation*s critical
computersupported

infrastructures, such as telecommunications, power distribution, financial
services, national defense, and critical government operations. Terrorist
organizations also are adept at using technology for counterintelligence
purposes and for tracking law enforcement activities.

Weak Law Enforcement Institutional shortcomings in foreign countries
exacerbate federal efforts

Institutions to combat the spread of international terrorism (and other
transnational

crimes). According to an interagency working group, local police and the
judicial systems in many countries in which terrorists and terrorist
organizations operate are ineffective. 12 They lack adequate resources,
have limited investigative authorities, or are plagued by corruption. The
working

group reported that many countries have outdated or even nonexistent laws
involving extradition, immigration, asset seizure, anti- money laundering,
computers, and anti- terrorism. According to the interagency working
group, many countries simply do not have adequate resources, training,
equipment, expertise, or the political will to carry out complex,
sustained investigations of international terrorism or to conduct
counterterrorism operations. Terrorists and terrorist organizations take
advantage of these institutional limitations and weaknesses to find and
establish sanctuaries, while governments and law enforcement remain
constrained by national boundaries.

Trends in International In recent years, U. S. intelligence agencies have
identified several important

Terrorism trends in international terrorism. Some of these trends are the
result of

adaptations that terrorist organizations have made in response to the
aggravating factors discussed above. These trends are as follows:

12 See International Crime Threat Assessment (Dec. 2000). This global
assessment was prepared by an interagency working group in support of and
pursuant to the President's International Crime Control Strategy of the
United States (The White House, May 1998).

The interagency working group included representatives from the
Departments of State, the Treasury, Justice, and Transportation; the CIA;
the FBI; Drug Enforcement Administration; U. S. Customs Service; U. S.
Secret Service; Financial Crimes Enforcement Network; National Drug
Intelligence Center; the Office of National Drug Control Policy; and the
National Security Council.

Decline in state- sponsorship of Terrorists have become less dependent on
sponsorship by sovereign states.

terrorism State- sponsors in the past had provided terrorists with a safe
haven and

political, financial, and logistical support. They provided intelligence,
planning, and support for terrorist acts and may have had prior knowledge
of such attacks. However, the threat of sanctions and retaliation have
reduced the willingness of most states to sponsor terrorism. By the late

1990s, according to the Director of Central Intelligence, a completely new
phenomenon had emerged* a terrorist sponsoring a state. The Taliban
actively aided Osama bin Laden by assigning him guards for security,

permitting him to build and maintain terrorist camps, and refusing to
cooperate with efforts by the international community to extradite him. In
return, bin Laden invested vast amounts of money in Taliban projects and
provided hundreds of well- trained fighters to help the Taliban
consolidate and expand its control of Afghanistan. 13

Move to loosely affiliated groups As dependency on state- sponsored
terrorism decreases, terrorist groups operating on their own in loosely
affiliated groups have increased. The resulting transnational and
decentralized structure facilitates terrorists* avoiding detection. In
particular, Islamic terrorist groups tend to be loosely organized, recruit
their membership from many different countries, and obtain support from an
informal international network of like- minded extremists.

Use of unconventional weapons Tactics among international terrorists have
shifted from aircraft hijackings and hostage taking to indiscriminate
terrorist attacks that yield maximum destruction, casualties, and impact.
Although the vast majority of terrorist attacks worldwide continue to be
carried out with conventional weapons, such as firearms and bombs, there
is a concern among U. S. intelligence community officials about terrorists
using unconventional weapons, namely weapons of mass destruction to
include chemical, biological, radiological, or nuclear weapons.

Alliance with transnational crime There has been a coalescence of
terrorism and other transnational crimes, which provides terrorists with
various types of international crime to finance their operations. These
include, for example, illegal immigration, contraband smuggling, visa
fraud, piracy, illegal trafficking in human

13 Written statement for the record by the Director of Central
Intelligence before a Joint Hearing of the Joint Inquiry Committee of the
House Select Committee on Intelligence and Senate Select Committee on
Intelligence, Oct. 17, 2002, p. 5.

beings, diamond smuggling, and tobacco diversion and associated tax fraud.

The Federal The federal government*s role in combating terrorism overseas
involves

Government*s Role and many diplomatic, law enforcement, financial,
military, and intelligence

activities. These roles span numerous departments, agencies, bureaus, and
Resources for

offices. In fact, no single government agency possesses the authority,
Combating responsibility, and capability to effectively detect and prevent
terrorism,

Terrorism Overseas disrupt and destroy terrorist organizations, deny
terrorists safe haven, and

respond to terrorist incidents abroad. Therefore, the federal government
combats terrorism overseas simultaneously on many different fronts by
attempting to coordinate its interagency efforts. The federal government*s
interagency framework for combating terrorism overseas, including federal
agencies* roles and responsibilities and how they coordinate with each
other, is discussed in detail in chapter 2 and other chapters, as
appropriate. The federal government has dedicated substantial resources to
combating terrorism overseas.

Funding of Federal Identifying funding to combat terrorism is inherently
difficult, but the

Programs and Activities to Office of Management and Budget (OMB), as
required by law, has reported

on these funds annually since 1998. 14 Funding to combat terrorism
overseas Combat Terrorism Overseas

only recently has been identified separately from other funding to combat
terrorism (i. e., domestic spending for homeland security). The funding of
federal programs and activities to combat terrorism overseas has increased
dramatically since the terrorist attacks against the United States on
September 11, 2001. Emergency supplemental appropriations increased

funding by $2 billion in fiscal year 2002. Funding for combating terrorism
overseas has increased about 133 percent, growing from $4.9 billion in
fiscal year 2001 to $11. 4 billion requested in fiscal year 2004. In
addition to these amounts, DOD has spent about $30 billion on military
operations against terrorism in the period roughly equivalent to fiscal
year 2002.

Funding to Combat Terrorism Is There are inherent challenges in
identifying federal funding to combat

Difficult to Identify terrorism. First, numerous federal agencies have
some role in combating terrorism. Second, the agencies* budgets often
include both domestic and

overseas components. Third, there are no separate appropriation accounts
14 P. L. 105- 85 S: 1051, Nov. 18, 1997, as amended by P. L. 105- 261 S:
1403, Oct. 17, 1998.

specifically for combating terrorism and the many activities it entails.
Fourth, funding for these programs may be in accounts authorized to fund
programs and activities not specific to combating terrorism.

As required by law, OMB has issued an annual report to the Congress since
1998 on federal funding to combat terrorism. This report is to include
such information as a description of the programs and activities, the
amounts to be expended, program priorities, and areas of potential
duplication. 15 The OMB report also has a classified annex providing
additional detail on DOD and intelligence activity funding. The most
recent OMB report, issued in June 2002, provides funding and programmatic
information on 27 federal entities (for example, departments, agencies,
bureaus, and offices) that have budgeted or spent combating terrorism
funds. 16 These entities are responsible for the federal government*s
efforts to combat terrorist activity

both domestically and overseas, including defense against terrorist
incidents involving weapons of mass destruction. Funding to Combat
Terrorism

In the June 2002 report, OMB for the first time separately identified
funds Overseas Now Identified

to combat terrorism domestically (for homeland security) from those to
Separately

combat terrorism overseas. In prior reports, both domestic and overseas
activities were combined. However, as a result of the terrorist attacks on
September 11, 2001, and the emphasis on domestic protection, OMB included
a separate, detailed analysis of homeland security* which OMB defined as
activities to combat terrorism within the United States. For the June 2002
report, OMB defined *overseas combating terrorism* as

activities outside of the United States, excluding direct military
actions, such as the war on terrorism in Afghanistan. Of the $52.74
billion budget requested to combat terrorism in fiscal year 2004, $11.4
billion (or 22 percent) was for combating terrorism overseas. The
remaining $41.35 billion (or 78 percent) was requested for homeland
security

activities (gross budget authority). Table 1 shows the President*s fiscal
15 For an evaluation of OMB*s annual reports, including an assessment of
their usefulness to the Congress, see U. S. General Accounting Office,
Combating Terrorism: Funding Data Reported to Congress Should be Improved,
GAO- 03- 170 (Washington, D. C.: Nov. 26, 2002). We reported on the
difficulties in coordinating budgets to combat terrorism, limitations to
OMB*s annual reports, and recommended ways to improve OMB reporting to the
Congress on programs to combat terrorism.

16 See 2002 Report to Congress on Combating Terrorism, OMB, June 24, 2002.
At the time this report was being prepared, OMB had not issued the 2003
report.

year 2004 budget request to combat terrorism both domestically and
overseas.

Table 1: Fiscal Year 2004 President*s Request for Funding to Combat
Terrorism Domestically and Overseas (Gross Budget Authority)

Dollars in millions

Total fiscal year 2004 Fiscal year 2004 request for

Fiscal year 2004 request for request for combating

homeland security overseas combating

terrorism (domestic and Department or agency (domestic)

terrorism overseas)

Energy $1, 361 $226 $1, 587 Homeland Security 23, 890 a 23, 890 Justice
2,290 a 2,290 National Security b 6,717 8,455 15, 172 State 811 1,555
2,366 Tr easury 91 a 91 International assistance programs 0 1,158 1,158
All other federal agencies 6,187 2 6,189

Total $41,347 $11, 396 $52, 743

Source: GAO analysis of OMB data. a The Departments of Homeland Security,
Justice, and the Treasury have some funds dedicated

to activities to combat terrorism overseas. However, OMB includes these
funds as part of homeland security. b National Security combines DOD and
selected intelligence activities. These figures are combined to

prevent the disclosure of classified intelligence spending. In addition,
the amounts do not include direct military action.

There are several qualifications to the figures reported by OMB. First,
OMB officials said that there is not always a clear distinction between
activities to combat terrorism and other related activities, nor between
domestic activities and overseas activities. The OMB budget examiners must
make judgment calls about how to characterize the funding. For example,
some

combating terrorism missions have multiple purposes and funding for these
missions is co- mingled in accounts that can cover multiple purposes. OMB
reports all of DOD*s military and civilian personnel costs associated with
security as funds to combat terrorism* even if these individuals spend
some portion of their time on security matters not related to combating
terrorism. In contrast, OMB does not report the State Department*s public
diplomacy activities as funds to combat terrorism* even if these
activities have a major terrorism focus. As another example, OMB*s
reported figures

do not capture overseas law enforcement activities from the Departments of
Homeland Security, Justice, and the Treasury. Examples of these activities
include customs, legal and financial attaches stationed overseas,

training and assistance provided to other countries, or these departments*
support to International Law Enforcement Academies around the world. 17
OMB includes the funding of such activities along with homeland security

(domestic) programs of the Departments of Homeland Security, Justice, and
the Treasury. Finally, as stated earlier, OMB*s reported figures for
combating terrorism overseas do not include direct military actions, such
as the war on terrorism in Afghanistan. For the purpose of this report, we
are including military actions against terrorists as part of combating
terrorism overseas. OMB has estimated military operations against
terrorism at $30 billion for the period roughly equivalent to fiscal year
2002. 18

Funding to Combat Terrorism In response to the terrorist attacks on the
United States on September 11,

Overseas Increased 2001, the Congress appropriated a supplemental $40
billion to the

Emergency Response Fund. 19 Of this amount, $12.9 billion was provided for
combating terrorism, including just over $2 billion for combating
terrorism overseas. The remaining $28 billion from that emergency
supplemental

appropriation was made available to other missions, such as recovery
efforts at the World Trade Center Towers in New York City and at the
Pentagon. 20 The President*s Budget requested additional funding for
federal programs and activities to combat terrorism overseas, which
increased from about $4.9 billion in fiscal year 2001 to almost $11.4
billion (or about 133 percent) in the President*s fiscal year 2004 budget
request. 21 17 More details on these activities are provided in chapters 3
and 4.

18 OMB Press Release 2002- 61, Sept. 10, 2002. 19 See 2001 Emergency
Supplemental Appropriations Act for Recovery from and Response to
Terrorist Attacks on the United States (P. L. 107- 38), Sept. 18, 2001. 20
A second supplemental appropriation totaling $29 billion was signed into
law on August 2, 2002. Of that amount, some $14 billion was allocated to
DOD, but none of it was for

combating terrorism overseas, according to OMB. 21 As discussed earlier,
OMB only began reporting the overseas funding for combating terrorism
separately from domestic (homeland security) in its June 2002 report to
the Congress. However, in that report they estimated the overseas funding
for the previous 2

years (fiscal years 2001 and 2002).

While the level of funding for intelligence activities is classified* and
included with DOD funding to prevent the disclosure of classified data*
recent unclassified statements by the Director of Central Intelligence
provide information on the magnitude of increases in intelligence programs
related to terrorism. 22 According to the Director, intelligence funding
to combat terrorism tripled between fiscal years 1990 and 1999. The
Director also said that the percent of the CIA*s budget dedicated to
combating terrorism increased from less than 4 percent in fiscal year 1994
to almost 10 percent in fiscal year 2002.

Objectives, Scope, and Based upon your original requests and in subsequent
discussions with your

Methodology offices, our overall objective was to identify and describe
federal agencies*

programs and activities to combat terrorism overseas. This report
discusses  the federal government*s interagency framework to combat
terrorism overseas (see ch. 2);  federal programs and activities to
detect and prevent terrorism overseas

(see ch. 3);  federal programs and activities to disrupt and destroy
terrorist

organizations overseas (see ch. 4); and  federal programs and activities
to respond to terrorist incidents

overseas (see ch. 5). In addition, the report discusses how federal
agencies coordinate efforts in Washington, D. C., and at U. S. missions
and other locations abroad to combat terrorism overseas. Where
appropriate, it also discusses recent

changes since the September 11, 2001, terrorist attacks. Information on
coordination mechanisms and recent changes is discussed throughout the
report.

In preparing this report, we limited our scope to developing descriptive
information rather than conducting evaluations of individual programs and
activities. This was done, as agreed with our congressional clients,
because

22 See Written Statement for the Record, Director of Central Intelligence,
Before the Joint Inquiry Committee, Oct. 17, 2002.

of the large number of departments, agencies, bureaus, and offices as well
as the multitude of their programs and activities to combat terrorism
overseas. Where we have conducted related evaluative work, we have
identified the appropriate GAO products and their results in footnotes. In
addition, we include a list of related GAO products at the end of this
report.

In addition, to make this report most useful for oversight, we limited our
discussion in this report to unclassified information.

The scope of this report included key federal departments and agencies
with programs and activities to combat terrorism overseas. Review work was
conducted in Washington, D. C., at the Executive Office of the

President, including the National Security Council (NSC), Office of
Homeland Security, and OMB; the Departments of Defense, Energy, Justice,
State, Transportation, and the Treasury; and at the CIA. We also conducted
review work at or met overseas with officials from the Bureau of Alcohol,
Tobacco, Firearms and Explosives (ATF); Defense Intelligence Agency; Drug
Enforcement Administration; the FBI; Federal Law Enforcement Training
Center (FLETC); the former Immigration and Naturalization Service (INS);
USAID; the former U. S. Customs Service; U. S. Coast Guard,

and the U. S. Secret Service. In addition, fieldwork was conducted at the
U. S. Central Command, MacDill Air Force Base, Florida; U. S. European
Command, Patch Barracks, Stuttgart/ Vaihingen, Germany; U. S. Southern
Command, Miami, Florida; U. S. Special Operations Command, MacDill Air

Force Base, Florida; U. S. Embassy in Athens, Greece; and at the
International Law Enforcement Academy (ILEA) in Budapest, Hungary. We
included information on other departments and activities based on

previous and ongoing work by GAO. A complete listing of organizations and
locations visited or contacted is found in appendix VII.

While our scope was generally limited to combating terrorism overseas, we
included programs related to border security, which also are considered
part of homeland security. Also, we included certain efforts to combat
terrorism overseas that actually occur within the United States, such as
interagency coordination, intelligence analysis, and law enforcement
investigations and prosecutions. Our more comprehensive work on homeland
security is summarized in two recent reports. 23 Most of our

23 See U. S. General Accounting Office, Major Management Challenges and
Program Risks: Department of Homeland Security, GAO- 03- 102 (Washington,
D. C.: Jan. 1, 2003) and U. S. General Accounting Office, Homeland
Security: Management Challenges Facing Federal Leadership, GAO- 03- 260
(Washington, D. C.: Dec. 20, 2002).

analysis for this report was performed before the creation of the
Department of Homeland Security in December 2002 and its initial
operations in January 2003. Therefore, when we conducted our review, many
of the agencies, bureaus, offices, and federal response teams

discussed in this report had not yet been transferred to the new
department from the Departments of Health and Human Services, Justice,
Transportation, and the Treasury.

For each objective, we interviewed agency officials, reviewed supporting
programmatic and budgetary documentation, and reviewed prior GAO work.

To identify and describe the federal government*s interagency framework
and policies to combat terrorism overseas and how they have changed since
the terrorist attacks of September 11, 2001, we conducted a qualitative
analysis of: (1) the current interagency framework and policies for
combating terrorism overseas; (2) the relationship between and among
various national strategies to combat terrorism overseas; (3) the roles,
responsibilities, and management structure of the NSC and its Policy
Coordinating Committees for international counterterrorism coordination
and the role of the Office of Homeland Security; (4) the roles,
responsibilities, and management structure of the lead federal agency
(Department of State) for crisis and consequence management of terrorist
incidents overseas and those of support agencies (Departments of Defense,
Justice, and the Treasury, and the intelligence community); (5)
legislation

and agency plans, implementing guidance, concepts of operations, and
contingency plans; and (6) changes in the interagency framework, policies,
and implementing guidance since September 11, 2001.

To identify and describe federal programs and activities to combat
terrorism overseas, we conducted a qualitative analysis of these efforts
in the areas of: (1) preventing and detecting terrorism overseas; (2)
disrupting and destroying terrorist organizations; and (3) responding to a
terrorist incident overseas. To identify and describe how federal agencies
coordinate efforts in Washington, D. C., and at U. S. missions abroad to
combat terrorism overseas, we conducted a qualitative analysis of: (1)
interagency and agencies* roles and responsibilities; (2) interagency
management structures, policies, and procedures to coordinate
international

counterterrorism at headquarters and at a selected U. S. mission abroad;
(3) U. S. missions* roles, responsibilities, management structures, and

procedures to coordinate international counterterrorism with headquarters
elements; and (4) changes in coordination policies and procedures that
resulted from the terrorist attacks of September 11, 2001.

We faced some limitations to our methodology during our review. For
example, the NSC*s National Strategy for Combating Terrorism was released
at the end of our review. In addition, agencies* reorganizations and
creation of the Department of Homeland Security affected the organization,
management structure, roles and missions, programs, and activities of
numerous agencies involved in combating terrorism overseas. Funding to
combat terrorism overseas is not always identified as such and may not be
broken out neatly into specific functions. Additional terrorismrelated
funding was appropriated in addition to funds requested in the President*s
budget, including supplemental appropriations, emergency funding, and
reprogrammed funding from other accounts. Also, there is not always a
clear distinction between programs and activities to combat terrorism and
other transnational crimes, such as money laundering, arms trafficking,
and piracy. Finally, many DOD and intelligence community*s operations,
programs, and activities are classified, which limited what we could
discuss in an unclassified report.

To mitigate these limitations, we relied on other key NSC policy and
planning documents and interviews with key officials until the national
strategy was released. Agencies* reorganization and creation of the
Department of Homeland Security will have more of an impact on combating
domestic terrorism than terrorism overseas. OMB requested that agencies
identify terrorism- related funding and we reviewed that process. We
gathered information, where available, on funding for programs and
activities to combat terrorism overseas. Terrorism is one of many
transnational crimes, which often are used to fund terrorist
organizations* operations. Where appropriate, we identified the nexus or
linkage between terrorism and other transnational crimes. Finally, we
worked with DOD and the CIA to accurately describe the threat and their
counterterrorism programs and activities in an unclassified manner. Given
our efforts to mitigate these factors, we do not believe they had a
material affect on our work.

We performed our review from December 2001 through March 2003 in
accordance with generally accepted government auditing standards.

The Interagency Framework for Combating

Chapt 2 er Terrorism Overseas The interagency framework for combating
terrorism overseas consists of policies and plans, agency roles and
responsibilities, and interagency coordination mechanisms developed and
managed by the NSC and its Director for Combating Terrorism. The policies
and plans are articulated in presidential directives, new national
strategies, annual plans, and operational guidance. These policies and
plans lay out the roles and responsibilities of individual federal
agencies that lead or support specific

functions. In addition, many individual agencies have their own policies
and plans that direct their own activities to combat terrorism overseas.
The interagency framework also includes coordinating mechanisms to
implement combating terrorism functions and activities across federal

agencies. For example, the NSC* which plays a major coordinating role*
sponsors a policy coordination committee called the Counterterrorism
Security Group, which has several subordinate working groups on such
topics as interagency counterterrorism exercises, and assistance to other
countries. Overseas, U. S. embassies and regional military commands
coordinate activities through interagency teams that meet to coordinate
efforts to combat terrorism across agencies. In addition, interagency

coordination is facilitated by personnel exchanges and liaisons among
agencies. The effectiveness of this interagency framework will be
determined through time as the new strategies and programs are
implemented.

Policies, Plans, and U. S. policies and plans for combating terrorism
overseas have developed

Legislation over the past 17 years. These policies and plans consist of
presidential

directives, national- level strategies, and operational guidance. Various
laws also address terrorism.

Subsequent chapters in this report provide details on how agencies are
implementing and coordinating these policies, plans, and legislation.

Policies and Plans in Place According to the Department of State, four
enduring policy principles guide

before Terrorist Attacks of U. S. strategies to combat terrorism overseas.
They are as follows:

September 11, 2001  Make no concessions to terrorists and strike no
deals.

 Bring terrorists to justice for their crimes.

 Isolate and apply pressure on states that sponsor terrorism to force
them to change their behavior.

 Bolster the counterterrorist capabilities of those countries that work
with the United States and require assistance.

One of the earlier executive- level formalization of counterterrorism
policy occurred in 1986 under National Security Decision Directive 207.
This directive was in response to several terrorist attacks on U. S.
facilities and interests overseas in the early 1980s, and focused
primarily on responding to terrorism abroad. It designated the Department
of State as the lead agency for dealing with overseas terrorist incidents,
and designated the FBI as the lead agency for handling domestic terrorist
incidents, unless otherwise specified by the Attorney General. It also set
up an interagency working group on counterterrorism to coordinate efforts
across the different agencies.

The next major presidential directive on terrorism occurred in 1995 under
Presidential Decision Directive (PDD) 39. Following the terrorist bombing
of a federal building in Oklahoma City, this directive had a more domestic
focus, outlining measures to be undertaken by federal agencies to reduce
domestic vulnerabilities to terrorism, deter and respond to terrorist
acts,

and develop capabilities to effectively manage the consequences of a
terrorist attack. The directive designated the Federal Emergency
Management Agency (FEMA) as the lead agency for managing the

consequences of a terrorist incident within the United States. This
directive also detailed the responsibilities of other agencies expected to
provide support when requested by the lead agencies.

Counterterrorism policy was further developed in 1998 through PDDs 62 and
63. PDD 62 further clarified agency roles and responsibilities in
terrorism prevention, terrorist apprehension and prosecution,
transportation security, and protection of critical infrastructure. PDD 63
established critical infrastructure protection as a national goal and

described a strategy for cooperative efforts by government and the private
sector to protect the physical and cyber- based systems essential to the
minimum operations of the government and economy* such as
telecommunications, power distribution, financial services, national
defense, and critical government operations* from physical and cyber

attacks. To help manage these issues, these directives established a
National Coordinator for Security, Infrastructure Protection, and
Counterterrorism. This Coordinator was meant to coordinate relevant

agency programs and activities on behalf of the NSC, as well as take the
lead in providing guidelines for interagency operations.

The previous administration issued a federal strategy for combating
terrorism in 1998* the Attorney General*s Five- Year Interagency
Counterterrorism and Technology Crime Plan. 1 The Congress mandated this
plan, which was intended to serve as a baseline strategy for coordination
of national policy and operational capabilities to combat terrorism both
at home and abroad. 2 It identified several high- level counterterrorism
goals and described the specific tasks of federal agencies in responding
to terrorist incidents. Although primarily domestic in focus, one of the
plan*s five major goals was to facilitate greater international
cooperation to combat terrorism. The Department of Justice issued annual
updates to the Five- Year Plan in 1999 and 2000, which did not revise the
basic plan but tracked agencies* progress in implementing the original
plan. Justice Department officials told us they are no longer providing
annual updates because other interagency plans (discussed later in this
chapter) have been released.

Operational guidance on combating terrorism overseas (i. e., specific
agency roles and actions in a crisis) was drafted in 1996 by the
Department of State. This guidance, known as the International Guidelines,
outlines procedures for deploying emergency support teams and otherwise
coordinating federal operations overseas. Although the NSC did not
formally approve the International Guidelines until January 2001, agencies
had used them in draft form since 1996. Our previous examination of
operations to combat terrorism overseas found that agencies generally
followed the draft International Guidelines when performing their

1 Another earlier and related plan was the International Crime Control
Strategy, released in May 1998. While not specific to terrorism, this plan
had 8 overarching goals and 30 implementing objectives related to
international crime. For more information, see U. S. General Accounting
Office, International Crime Control: Sustained Executive- Level
Coordination of Federal Response Needed, GAO- 01- 629 (Washington, D. C.:
Aug. 13, 2001).

2 Conference Committee Report (House Report 105- 405), Nov. 13, 1997,
accompanying the Fiscal Year 1998 Appropriations Act for the Departments
of Commerce, Justice, and State, the Judiciary, and Related Agencies (P.
L. 105- 119), Nov. 26, 1997.

respective roles in diplomacy, law enforcement, military planning, and
intelligence gathering. 3

Current Policies and Many federal policies and plans changed in the
aftermath of the

Plans Include New Areas September 11, 2001, terrorist attacks. There were
changes in both positions of Responsibility and

and offices to manage terrorism- related programs, and changes through the
National Strategies

publishing of new strategies. New Areas of Responsibilities

The President divided the responsibilities of the National Coordinator
Established

for Security, Infrastructure Protection, and Counterterrorism, created in
PDD 62, among three new areas of responsibility.  Efforts to combat
terrorism domestically. Executive Order 13228, dated

October 8, 2001, created a new Assistant to the President for Homeland
Security, to head a new Office of Homeland Security responsible for
coordinating efforts to combat terrorism inside the United States.
Specific responsibilities included working with departments and

agencies, state and local governments, and private entities to ensure the
adequacy of the National Strategy for Homeland Security. The order
detailed a number of other specific responsibilities for the Office of
Homeland Security. 4

 Efforts to combat terrorism overseas. National Security Presidential
Directive 8, dated October 24, 2001, created a National Director for

3 U. S. General Accounting Office, Combating Terrorism: Issues to Be
Resolved to Improve Counterterrorism Operations, GAO/ NSIAD- 99- 135
(Washington, D. C.: May 13, 1999). We reported that with ongoing
counterterrorism operations, federal agencies had not

completed interagency guidance and resolved command and control issues.
Also, key federal agencies did not capture lessons learned for all field
and tabletop exercises in which they led or participated.

4 For information on the situation leading up to the creation of this
position, including GAO*s recommendations that a similar type of focal
point be established, see U. S. General Accounting Office, Combating
Terrorism: Selected Challenges and Related Recommendations, GAO- 01- 822
(Washington, D. C.: Sept. 20, 2001). We reported on (1) the current
framework for leadership and coordination of federal agencies* efforts to
combat terrorism, (2) progress the federal government made in developing
and implementing a national strategy to combat terrorism domestically, (3)
the federal government*s capabilities to respond to a domestic terrorist
incident, (4) progress the federal government made in helping state and
local emergency responders, and (5) progress made in developing and
implementing a federal strategy for combating cyber- based attacks.

Combating Terrorism, with responsibilities for activities to combat
terrorism overseas. The Director is located in the NSC and reports to the
Assistant to the President for National Security Affairs. Per the
directive, the Director also serves as the Deputy National Security
Advisor for Combating Terrorism. The Director chairs a policy coordination
committee named the Counterterrorism Security Group. While not specified
in the directive, this group has a number of interagency working groups,
which are described later in this chapter. The director also reports to
the Assistant to the President for Homeland

Security on matters relating to global terrorism inside the United States.
 Efforts to protect critical infrastructure. On February 28, 2003, the

President signed Executive Order 13286, which maintained *it is the policy
of the United States to protect against disruption of the operation of
information systems for critical infrastructure and thereby help to

protect the people, economy, essential human and government services, and
national security of the United States, and to ensure that any disruptions
that occur are infrequent, of minimal duration, and manageable, and cause
the least damage possible.* 5 It also stated that *implementation of this
policy includes voluntary public- private partnership, involving corporate
and nongovernmental organizations.* In addition, Executive Order 13286
replaced in its entirety Executive Order 13231, 6 thus dissolving the
President*s Critical Infrastructure Protection Board that was to
coordinate cyber- related federal efforts and programs associated with
protecting the nation*s critical infrastructures, and the board*s chair*
the Special Advisor to the President for Cyberspace Security* and related
staff.

Series of New Strategies A series of new national plans were developed and
published to help guide

Published U. S. policy. Some of these plans* called national strategies*
are specific to

combating terrorism, while others involve terrorism to lesser degrees. The
strategies most directly addressing terrorism are the National Security
Strategy of the United States of America, published in September 2002; the
National Strategy for Homeland Security, published in July 2002; and the

National Strategy for Combating Terrorism, published in 5 The White House,
Executive Order 13286* Amendment of Executive Orders, and Other Actions,
in Connection With the Transfer of Certain Functions to the Secretary of
Homeland Security (Washington, D. C.: Feb. 28, 2003).

6 The White House, Executive Order 13231* Critical Infrastructure
Protection in the Information Age (Washington, D. C.: Oct. 16, 2001).

February 2003. Table 2 summarizes the functions of each of the various
national strategies and how they relate to combating terrorism overseas. 7

Table 2: National Strategies Related to Combating Terrorism Strategy
Description of strategy National Security Strategy of the United This
document provides a broad framework for strengthening U. S. security in
the future. It

States of America

identifies the national security goals of the United States, describes the
foreign policy and Issued by the President, September 2002

military capabilities necessary to achieve those goals, evaluates the
current status of these capabilities, and explains how national power will
be structured to utilize these capabilities. It devotes a chapter to
combating terrorism that focuses on the disruption and destruction of
terrorist organizations, the winning of the *War of Ideas,* the
strengthening of homeland security, and the fostering of cooperation with
allies and international organizations to

combat terrorism.

National Strategy for Homeland Security

This document addresses the threat of terrorism within the United States
by organizing the Issued by the President, July 2002 domestic efforts of
federal, state, local, and private organizations. Although mostly domestic
in focus, this strategy mentions various initiatives related to combating
terrorism overseas,

including: negotiating new international standards for travel documents,
improving security for international shipping containers, enhancing
cooperation with foreign law enforcement agencies, expanding specialized
training and assistance to allies, and increasing the security of
transnational infrastructure. The strategy stresses the importance of
expanding international cooperation in research and development and
enhancing the coordination of incident response. Finally, the strategy
recommends reviewing current international treaties and laws to determine
where improvements could be made.

National Strategy for Combating Terrorism

This document elaborates on the terrorism aspects of the National Security
Strategy of the

Issued by the President, February 2003 United States of America by
expounding on the need to destroy terrorist organizations, win the *War of
Ideas,* and strengthen security at home and abroad. Unlike the National
Strategy for Homeland Security that focuses on preventing terrorist
attacks within the United States,

the National Strategy for Combating Terrorism focuses on identifying and
defusing threats before they reach the borders of the United States. In
that sense, although it has defensive elements, this strategy is an
offensive strategy to complement the defensive National Strategy for
Homeland Security.

7 There are additional national strategies that have some discussion of
terrorism that we have not included. For example, the National Drug
Control Strategy, issued by the President in February 2003, cites the
importance of a unified approach to fighting both drugs and terrorism,
particularly in South America. The 2002 strategy highlighted drug

revenue as a source of funding for 12 of the 28 international terrorist
groups identified by the Department of State.

(Continued From Previous Page)

Strategy Description of strategy National Military Strategy of the United

This document sets the strategic direction for all aspects of the U. S.
Armed Forces. This

States of America

includes force structure, acquisition, and doctrine, as well as the
strategic environment. The Issued by the Chairman of the Joint Chiefs

1997 strategy notes the rising danger of asymmetric threats, such as
terrorism. The strategy of Staff, September 1997 stresses the need for the
military to adapt its doctrine, training, and equipment to ensure a rapid
and effective joint and interagency response to these threats.

There is also a more recent Defense Strategy, which was issued by the
Secretary of Defense in September 2001. This strategy is part of DOD*s
Quadrennial Defense Review and has relatively little discussion of
terrorism.

National Military Strategic Plan for the War

This document provides a framework to guide the conduct of the *war on
terrorism* by U. S. on Terrorism

Armed Forces. It provides specific guidance from which regional
commanders, the military Issued by the Chairman of the Joint Chiefs

services, and other agencies can formulate their own individual action
plans. Individual of Staff, October 2002

regional commands drafted their own campaign plans in response to this
plan. For example, one regional command plans to conduct maritime
interception operations to disrupt terrorists* use of commercial shipping
to transport people and material.

National Strategy to Combat Weapons of

This document presents a national strategy to combat weapons of mass
destruction through Mass Destruction

three major efforts: (1) nonproliferation, (2) counterproliferation, and
(3) consequence Issued by the President, December 2002

management in WMD incidents. The plan addresses the proliferation of
weapons of mass destruction among states, as well as the potential threat
of terrorists using WMD agents.

National Money Laundering Strategy

This document presents a national strategy to combat money laundering and
other financial Issued by the Secretary of the Treasury crimes. The
strategy sets forth an action plan for how law enforcement, regulatory
officials, and the Attorney General, July 2002

the private sector, and the international community could take steps to
make it harder for criminals to launder money generated from their illegal
activities. In addition to addressing general criminal financial
activities, the 2002 strategy presents the government*s plan to attack
financing networks of terrorist entities. The strategy discusses the need
to adapt

traditional methods of combating money laundering to unconventional tools
used by terrorist organizations to finance their operations.

National Strategy to Secure Cyberspace

This document is intended to provide an initial framework for both
organizing and prioritizing Issued by the President, February 2003 efforts
to protect our nation*s critical cyber infrastructures. Also, it is to
provide direction to federal departments and agencies that have roles in
cyberspace security and to identify

steps that state and local governments, private companies and
organizations, and individual Americans can take to improve the nation*s
collective cybersecurity. The strategy is organized according to five
national priorities, with major actions and initiatives identified for
each. These priorities are: (1) a National Cyberspace Security Response
System, (2) a National Cyberspace Security Threat and Vulnerability
Reduction Program, (3) a National Cyberspace Security Awareness and
Training Program, (4) Securing

Governments* Cyberspace, and (5) National Security and International
Cyberspace Security Cooperation. In describing the threats and
vulnerabilities for our nation*s cyberspace, the strategy highlights the
potential for damage to U. S. information systems by criminals,
nationstates,

and terrorists.

(Continued From Previous Page)

Strategy Description of strategy National Strategy for the Physical

This document provides a statement of national policy to remain committed
to protecting Protection of Critical Infrastructures and

critical infrastructures and key assets from terrorist attacks, and it is
based on eight guiding Key Assets

principles, including establishing responsibility and accountability,
encouraging and Issued by the President, February 2003

facilitating partnering among all levels of government and between
government and industry, and encouraging market solutions wherever
possible and government intervention when needed. The strategy also
establishes three strategic objectives. The first is to identify and
assure the protection of the most critical assets, systems, and functions,
in terms of nationallevel public health and safety, governance, and
economic and national security and public confidence. The second is to
assure protection of infrastructures and assets facing specific, imminent
threats. The third is to pursue collaborative measures and initiatives to
assure the protection of other potential targets that may become
attractive over time.

Source: Published national strategies. Note: GAO analysis of published
national strategies.

New Strategies Provide As we have recently testified, we view the new
strategies, and the

Framework framework they provide, as a positive step. 8 The new strategies
are

organized in some hierarchy, share common themes, and cross- reference
each other. The strategies are organized in a hierarchy with the National
Security Strategy of the United States of America providing the
overarching strategy related to national security as a whole, including
terrorism. According to the administration, the National Security Strategy
of the United States of America and the National Strategy for Homeland
Security are top- level strategies that together address U. S. security
both overseas and domestically. According to the administration, these two
strategies establish a framework that takes precedence over all other
national strategies, plans, and programs. Our interpretation of the
hierarchy among strategies is somewhat different from how the
administration has presented it. We do not view the hierarchy as that
absolute because we see the National Strategy for Homeland Security and
the National Strategy for Combating Terrorism as roughly equivalent. These
two strategies provide, respectively, the strategies to combat terrorism
related to defensive domestic issues and offensive overseas issues. 9

Under this hierarchy, the other strategies provide further levels of
detail on the specific functions related to military operations, money
laundering, weapons of mass destruction, cyber security, and protection of
physical infrastructures. Intelligence is one of the critical functions
that cuts across all the other strategies, but does not have a strategy
itself related to 8 For a more detailed discussion and evaluation of these
collective strategies, see U. S.

General Accounting Office, Combating Terrorism: Observations on National
Strategies Related to Terrorism, GAO- 03- 519T (Washington, D. C.: Mar. 3,
2003). In this testimony, we stated that the new strategies show cohesion
in that they are organized in a hierarchy, share common themes, and cross-
reference each other. In addition, the collective strategies are more
comprehensive than the single strategy they replaced. However, we noted
there will be many challenges in implementing these strategies.

9 We recognize that this characterization of the strategies simplifies a
complex relationship among the two. Both strategies contain both defensive
and offensive elements. For example, while we characterize the National
Strategy for Homeland Security as mainly defensive, it includes offensive
initiatives to target and attack terrorist financing, and to track foreign
terrorists and bring them to justice. Similarly, while we characterize the

National Strategy for Combating Terrorism as mainly offensive, it includes
defensive objectives to implement the National Strategy for Homeland
Security and to protect U. S. citizens abroad.

terrorism, according to CIA officials with whom we spoke. Some of these
other strategies contain independent elements beyond national security
that do not overlap with the other strategies. For an example of the
latter, both the National Strategy to Secure Cyberspace and the National
Money

Laundering Strategy include some domestic criminal elements not associated
with national security or terrorism. Also, the National Strategy to Secure
Cyberspace and the National Strategy for the Physical Protection of
Critical Infrastructures and Key Assets make a distinction between threats
to national security and threats to national economic security and
national public health and safety. Further, the National Drug Control
Strategy has relatively little overlap with these other strategies. Figure
7 displays graphically how some of these national strategies fit into

a hierarchy and overlap.

Figure 7: Relationships Between and Among National Strategies Related to
Combating Terrorism Overseas

Notes: GAO analysis of national strategies. This graphic is intended to
show relationships and overlaps among these national strategies. The sizes
and shapes of the boxes are not meant to imply the relative importance of
the strategies.

The various strategies also share common themes. Among the strategies more
relevant to combating terrorism overseas such as the National Security
Strategy of the United States of America, the National Strategy for
Combating Terrorism, the National Strategy to Combat Weapons of Mass
Destruction, and the National Military Strategy of the United States of
America all contain either goals or objectives relating to strengthening
international relationships; strengthening intelligence gathering and
analysis capabilities; and improving capabilities to deter, prevent, and
respond to weapons of mass destruction.

In addition, the strategies have linkages among them in the form of
citations and cross- references from one document to another. At least
half of the strategies cite either the National Security Strategy of the
United States of America or the National Strategy for Homeland Security.
The most extensively linked strategies include the National Security
Strategy of the United States of America, the National Strategy for
Homeland

Security, the National Strategy for Combating Terrorism, and the

National Strategy to Combat Weapons of Mass Destruction. Strategies that
cover topics beyond terrorism, such as criminal law enforcement, are less
extensively linked to these documents. For example, the National Strategy
to Secure Cyberspace and the National Strategy for the Physical Protection
of Critical Infrastructures and Key Assets solely cite each other and the
National Strategy for Homeland Security. The National

Drug Control Strategy and the National Money Laundering Strategy contain
no explicit linkages to any of the other strategies, but are referenced in
the National Strategy for Homeland Security. Some strategies contain broad
themes that are covered in more detail by other strategies, but do not
cite these documents. For instance, although the

National Strategy for Combating Terrorism mentions the topic of terrorist
financing, it does not mention the National Money Laundering Strategy.

Nevertheless, it mentions the National Drug Control Strategy, a document
with considerably less thematic overlap in terms of terrorism. The

National Security Strategy of the United States of America covers many
broad strategic themes, but refers to no other national strategies,
although many of the strategies refer back to it. National Strategy for
Combating

The key strategy for overseas efforts is the National Strategy for

Terrorism

Combating Terrorism, issued in February 2003. According to this strategy,
terrorist groups can be categorized as those that operate primarily within
a single country, those that operate regionally, and those with global
reach. The document*s strategic intent calls for fighting terrorist
organizations of global reach and reducing their scope and capabilities to
the regional and

then local levels. The goal is to reduce the scope of terrorism to make it
more localized, unorganized, and relegated to the criminal domain. The
strategy seeks to accomplish this through four goals and 15 subordinate
objectives. Together, these goals comprise the *4D Strategy* and are shown
in table 3.

Tabl e 3: Goals and Objectives in the National Strategy for Combating
Terrorism

Goal: Defeat terrorist organizations of global reach by attacking their
sanctuaries; leadership command, control, and communications; material
support; and finances.

Objective: Identify terrorists and terrorist organizations. Objective:
Locate terrorists and their organizations. Objective: Destroy terrorists
and their organizations.

Goal: Deny further sponsorship, support, and sanctuary to terrorists by
ensuring that other states accept their responsibilities to take actions
against these international threats within their sovereign territory.

Objective: End the state sponsorship of terrorism. Objective: Establish
and maintain an international standard of accountability with regard to
combating terrorism. Objective: Strengthen and sustain the international
effort to fight terrorism. Objective: Interdict and disrupt material
support for terrorists. Objective: Eliminate terrorists* sanctuaries and
havens.

Goal: Diminish the underlying conditions that terrorists seek to exploit
by enlisting the international community to focus its efforts and
resources on the areas most at risk.

Objective: Partner with the international community to strengthen weak
states and prevent the (re) emergence of terrorism. Objective: Win the War
of Ideas.

Goal: Defend the United States, its citizens, and its interests at home
and abroad by both proactively protecting the homeland and extending
defenses to identify and neutralize the threat as early as possible.

Objective: Implement the National Strategy for Homeland Security.

Objective: Attain domain awareness. Objective: Enhance measures to ensure
the integrity, reliability, and availability of critical physical and
information- based infrastructures at home and abroad.

Objective: Integrate measures to protect U. S. citizens abroad. Objective:
Ensure an integrated incident management capability.

Source: National Strategy for Combating Terrorism, Feb. 2003.

New Strategies Will Not As we have testified, the strategies by
themselves, no matter how cohesive

Guarantee Success and comprehensive, will not ensure an integrated and
effective set of

programs to combat terrorism. 10 The ability to ensure these things will
be determined through time as the strategies are implemented. In addition,
these new strategies reflect a host of long- standing themes and programs.
For example, certain themes and related programs contained in the new
strategies preventing and deterring terrorism, maximizing international
cooperation to combat terrorism, and improving crisis and consequence
planning and management* were included in the Attorney General*s 1998
Five- Year Interagency Counterterrorism and Technology Crime Plan.

Some of the related policies and programs have been in place for decades.
For example, the State Department*s Antiterrorism Assistance program,
which provides assistance to other countries to improve their
capabilities, has existed since 1983. Given that these strategies are
relatively new, GAO has not yet evaluated their implementation, either
individually or

collectively. However, we have done work that demonstrates the federal
government will face many implementation challenges. For example, we have
designated the implementation and transformation of the Department of
Homeland Security* which will have some responsibilities for combating
terrorism overseas* as a high- risk federal activity. 11 We have also
identified cyber security as a high- risk area. 12

Various Laws Address While there is no single, comprehensive federal law
explicitly dealing with

Terrorism terrorism, the Congress passed and the President signed a series
of laws

dealing with various aspects of terrorism before the September 11, 2001,
terrorist attacks. The Congress passed these laws to ensure that the

10 GAO- 03- 519T. 11 We designated the implementation and transformation
of the department as a high risk for three reasons. First, the size and
complexity of the effort make the challenge especially daunting, requiring
sustained attention and time to achieve the department*s mission in an
effective and efficient manner. Second, components being merged into the
department already face a wide variety of existing challenges that must be
addressed. Finally, the

department*s failure to effectively carry out its mission exposes the
nation to potentially very serious consequences. For more details, see
GAO- 03- 102; GAO- 03- 260; and U. S. General Accounting Office,
Highlights of a GAO Forum: Mergers and Transformation: Lessons Learned for
a Department of Homeland Security and Other Federal Agencies, GAO- 03-
293SP (Washington, D. C.: Nov. 14, 2002).

12 See U. S. General Accounting Office, High- Risk Series: Protecting
Information Systems Supporting the Federal Government and the Nation*s
Critical Infrastructures, GAO- 03- 121 (Washington, D. C.: Jan. 1, 2003).

perpetrators of certain terrorist acts are subject to punishment no matter
where the acts occur; require or permit sanctions on countries and
organizations supporting or sponsoring terrorism; delineate agency roles

and responsibilities; and authorize and/ or appropriate funding for
agencies to carry our their responsibilities.

Responding to the September 11, 2001, terrorist attacks, the Congress
passed and the President signed into law legislation affecting the way the
United States combats terrorism overseas and domestically. The Congress
enacted these laws to improve intelligence sharing, enhance airport
security, and strengthen border control, among other goals. To provide the
intelligence community and law enforcement with additional means to fight
terrorism worldwide and prevent future terrorist attacks, the Congress
enacted the Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act. 13
In addition to broadening the definition of *terrorist

activity* and *terrorist organization,* and addressing international money
laundering, the act also authorizes the Secretary of State to share
sensitive visa information with foreign government officials, where
appropriate. In addition, the Congress recently enacted legislation to
implement the obligations of the United States under the International
Convention for the Suppression of the Financing of Terrorism and the
International Convention for the Suppression of Terrorist Bombings. 14

Another major piece of legislation that has greatly impacted the war on
terrorism, both overseas and domestically, is the Homeland Security Act of
2002. 15 The act created the Department of Homeland Security, an agency
whose primary mission includes preventing terrorist attacks within the
United States and reducing the vulnerability of the United States to
terrorism. The act combined many of the federal agencies involved in
combating terrorism into the new department, including those discussed in
this report. 16 In addition, the act contains a number of provisions that

13 P. L. 107- 56, Oct. 26, 2001. 14 Terrorist Bombings Convention
Implementation Act of 2002 (P. L. 107- 197), Jun. 25, 2002. 15 P. L. 107-
296, Nov. 25, 2002. 16 See appendix II for the Matrix of Department of
Homeland Security Programs and Activities to Combat Terrorism Overseas.

encourage the sharing of information between the intelligence and law
enforcement communities. 17 Recent legislation further addressed the
issues of border and aviation security. The Enhanced Border Security and
Visa Entry Reform Act of 2002

increased the number of authorized INS inspectors and support staff to
prevent terrorist suspects from entering the United States. 18 It also
addressed the need for increased interagency data sharing pertaining to
the admission of and ability to remove aliens. The Aviation and
Transportation Security Act created the Transportation Security
Administration within the Department of Transportation to strengthen
security at U. S. national and international airports. 19

Roles and Another key element in the interagency framework for combating
Responsibilities of Key

terrorism overseas is the delineation of roles played by federal
organizations and agencies. Some play a coordinating role, others serve as
Federal Agencies

leads in specific areas, and many others provide various kinds of support.
Some agencies also have positions designated within them to lead their
agencies* terrorism- related programs and have agency- specific plans. The
roles and responsibilities of the key organizations and agencies are

described below. Subsequent chapters provide additional information on
these agencies* roles in the areas of diplomacy, law enforcement,
intelligence, international finance, military operations, and other
activities to combat terrorism overseas. In addition, appendixes provide
further details on selected agencies* programs and activities.

17 For example, Subtitle I of the act, the Homeland Security Information
Sharing Act, requires that, under procedures prescribed by the President,
all appropriate agencies, including the intelligence community, shall
share homeland security information with federal agencies and appropriate
state and local personnel, subject to certain protections.

18 P. L. 107- 173, May 14, 2002. 19 P. L. 107- 71, Nov. 19, 2001.

National Security Council Located within the Executive Office of the
President, the NSC advises and Leads Coordination Across

assists the President on national security and foreign policy. It serves
as a Agencies

forum for the discussion and debate of national security issues between
the President, presidential advisors, and cabinet officials. It is also
the President*s instrument for coordinating policy among government
agencies on crosscutting issues, such as terrorism. Beyond the NSC
principals committee* consisting of secretaries of the cabinet departments
or equivalent heads of independent agencies* the Council is composed of a
professional staff and various policy coordination committees. The policy
coordination committee that deals with terrorism is the Counterterrorism
Security Group. The National Director for Combating Terrorism chairs this
group, which has subordinate working groups discussed later in this
chapter. The NSC is the lead for developing the National Security Strategy
of the United States of America and the National Strategy for Combating
Terrorism* the key strategies that address combating terrorism overseas.

Office of Homeland Security The Office of Homeland Security, also located
within the Executive Office

Coordinates Related of the President, coordinates efforts to detect,
prepare for, prevent, protect

Domestic Issues against, respond to, and recover from terrorist attacks
within the United

States. Similar to NSC, the Office of Homeland Security has several
interagency working groups (called policy coordination committees) to
manage crosscutting issues. 20 Although mainly domestic in scope, the
Office is involved in functions that intersect with combating terrorism
overseas, such as border security. The Director for Homeland Security
heads this office, which developed the National Strategy for Homeland
Security* the key strategy for combating terrorism domestically.

Office of Management The Office of Management and Budget, also located in
the Executive Office and Budget Tracks Funding

of the President, assists the President in overseeing the preparation of
the for Combating Terrorism

federal budget and supervises its administration in Executive Branch 20
For more information on the Office of Homeland Security and its role and
coordination mechanisms related to combating terrorism domestically, see
U. S. General Accounting Office, Homeland Security: Management Challenges
Facing Federal Leadership, GAO- 03- 260 (Washington, D. C.: Dec. 20,
2002). We reported that additional actions to clarify missions and
activities across agencies involved in homeland security will be necessary
and some agencies will need to determine how best to support both homeland
security and nonhomeland security missions. Also, more emphasis on
collaboration and coordination with the state and local governments and
the private sector will be needed to meet overall goals.

agencies. Since 1998, OMB has issued its Annual Report to Congress on
Combating Terrorism, which provides funding and programmatic information
on the federal government*s efforts to combat terrorism and, in the most
recent report, breaks out funding for combating terrorism overseas
separately from homeland security initiatives. The report summarizes data
for three fiscal years-- the most recent prior year, current operating
year, and the President*s budget year request* by department,

agency, and mission area. Department of State Leads

Below the Executive Office of the President, the State Department is the
Overall Efforts Overseas

lead federal agency for U. S. government activities to combat terrorism
overseas. The activities that State leads include diplomatic efforts on
both the bilateral and multilateral levels, protecting U. S. facilities
and personnel abroad, protecting American civilians traveling and working
abroad, limited law enforcement functions, and providing assistance to
other countries to improve their capabilities to combat terrorism. The
State Department also has the lead in responding to terrorist attacks on
U. S. interests overseas. In such a terrorist incident, State would lead
and

coordinate measures to alleviate damage, protect health, and provide
emergency assistance. Other federal agencies would provide support under
State*s direction.

The Coordinator for Counterterrorism* an ambassador rank position* heads
the State Department*s efforts to combat terrorism. The department*s
objectives for combating terrorism are delineated in the State
Department*s 2002 Annual Performance Plan. This plan describes the

State Department*s objective as to reduce international terrorist
incidents, especially against the United States. Key goals in the plan are
to (1) reduce the number of attacks, (2) bring terrorists to justice, (3)
reduce or eliminate state- sponsored terrorist acts, (4) delegitimize the
use of terror as a political tool, (5) enhance the international response,
and (6) strengthen international cooperation and operational capabilities
to counter terrorism.

Department of Justice Leads The Department of Justice has the lead in law
enforcement and criminal

Arrest and Prosecution of matters related to terrorism* both domestically
and overseas. The

Terrorists department has responsibility for investigating, indicting, and
prosecuting

terrorists. In addition, the department administers training for foreign
law enforcement and security services through a variety of programs. These
responsibilities are distributed among a number of components within

Justice. For example, the department*s efforts to prosecute terrorists are

led by the Counterterrorism Section of Justice*s Criminal Division, and
its Office of International Affairs works with the State Department to
negotiate treaties and agreements with other countries that promote
international cooperation, including cooperation in terrorism cases. The
department*s plans and goals for combating terrorism are documented in its
Strategic Plan for Fiscal Years 2001- 2006.

The FBI leads Department of Justice efforts to investigate international
terrorism. Specifically, the FBI is responsible for the apprehension and
rendition of foreign terrorists who are suspected of violating U. S.
statutes. 21 According to the FBI, it also has the primary responsibility
to collect

foreign intelligence and counterintelligence information, including that
related to terrorism, within the United States. In a terrorist incident
overseas, the FBI could support the State Department in resolving the
crisis. Within the FBI, efforts related to international terrorism are led
by the Counterterrorism Division, which has two International Terrorism
Operations Sections that investigate terrorist crimes against U. S.
interests, along with a Terrorism Financing Operations Section that
investigates terrorism financing. In addition, the FBI legal attaches
overseas work with foreign services. The FBI*s strategic plan is currently
under revision to reflect FBI*s recent reorganization, done in part to
reflect new priorities to include terrorism. 22

Other agencies within the department have important roles. For example,
the ATF leads or supports investigations related to firearms and
explosives, including terrorist incidents overseas. This bureau
transferred from the Department of the Treasury to the Department of
Justice in January 2003. Some of the Department of Justice*s functions
related to border security, such as those conducted by the former
Immigration and Naturalization Service, transferred to the new Department
of Homeland Security in March 2003.

21 According to the FBI, in cases where the United States lacks an
extradition treaty, the U. S. government can capture suspected terrorists
through an overseas arrest called a rendition. State*s Office of the
Coordinator for Counterterrorism, in conjunction with State*s Office of
the Legal Adviser, the Department of Justice, and other agencies, would
coordinate State*s role in negotiating and conducting these arrests. Since
1987, there have been 11 reported renditions (see table 8 in ch. 4 for a
complete list of reported extraditions and renditions of terrorists to the
United States between 1987 and 2001).

22 GAO currently has additional work under way to evaluate the FBI*s
efforts to reorganize.

New Department of The new Department of Homeland Security also has
selected

Homeland Security Has responsibilities for combating terrorism overseas.
It has an Office of

Variety of Functions to International Affairs with responsibilities to
promote information and Combat Terrorism

education exchange with foreign nations with respect to best practices and
technologies related to homeland security. The department also has the
responsibility of coordinating the federal government*s lines of
communications with state and local public safety agencies and the general
public, including monitoring threats from terrorists (including
international terrorists) and keeping the nation alerted via the color-
coded Homeland Security Advisory System.

In addition, the Department of Homeland Security assumed many
responsibilities for combating terrorism overseas when certain agencies
and their functions transferred into the department in March 2003. Many of
these responsibilities relate to border security. For example, the U. S.
Customs Service (formerly under the Department of the Treasury) and the
Immigration and Naturalization Service (formerly under the Department of
Justice) and their functions are now part of the department*s Bureau of
Customs and Border Protection and Bureau of Immigration and Customs

Enforcement. The U. S. Coast Guard (formerly under the Department of
Transportation) is responsible for maintaining border security at certain
maritime borders between ports of entry. In addition, the U. S. Coast
Guard tracks suspicious vessels and works with DOD to conduct maritime
interception operations. The Bureau of Immigration and Customs Enforcement
also has some responsibilities to track and investigate terrorist
financing. The Department of Homeland Security has a number of other
functions as well. For example, the U. S. Secret Service (formerly under
the Department of the Treasury) protects the President and certain other
senior officials when they travel abroad. In addition, the department has
several disaster response teams (formerly with a variety of other
department and agencies) that have a domestic mission but could be
deployed abroad in a terrorist incident overseas. Further, the
department*s responsibilities include enhancing the security of the
nation*s cyber and

physical public and private infrastructures essential to national
security, national economic security, and/ or national public health and
safety. Department of the Treasury

The Department of the Treasury has a number of important roles in
Identifies and Blocks

combating terrorism overseas. The department has a key role, working
Terrorist Financing

with other agencies, in efforts to prevent money laundering and to disrupt
and dismantle the financial support of terrorist organizations. The

Financial Crimes Network and the Office of Foreign Assets Control provide
support to the Treasury and other law enforcement agencies in
investigating and freezing terrorist financial assets. Treasury*s plans
for

financial operations against terrorist finances are included in the
National Money Laundering Strategy, issued jointly with the Department of
Justice. Treasury*s Office of International Affairs coordinates the
department*s assistance to other countries. The Department of the Treasury
recently transferred selected agencies and functions to the Departments of
Justice

and Homeland Security, as discussed above. Department of Defense

DOD is the lead agency for military operations against terrorist Leads
Military Operations

organizations and states that sponsor them. If directed by the President,
Against Terrorists

DOD can use military forces to disrupt and destroy terrorist organizations
and operations. DOD also is responsible for protecting its worldwide
forces from terrorist attacks. In a terrorist incident overseas, DOD could
support the State Department in resolving the crisis. DOD has a broad
array of capabilities* from tactical units to transportation assets to

decontamination units* that could help manage a terrorist incident,
including those involving WMD agents. DOD also leads the U. S.
government*s international counterterrorist response exercise program. DOD
agencies are part of the intelligence community and have a mutually
supportive relationship with the CIA. While DOD provides training and
equipment to foreign governments to improve their capabilities to combat
terrorism, the Department of State retains overall statutory authority for
training and equipping foreign personnel.

The Secretary of Defense establishes policy and guidance for DOD*s
operations to combat terrorism overseas. The Secretary of Defense*s senior
policy advisor on terrorism is the Assistant Secretary of Defense for
Special Operations and Low- Intensity Conflict. The Chairman of the Joint
Chiefs of Staff ensures implementation of the Secretary*s guidance by
issuing

direction to combatant commanders, defense agencies, and the military
services as members of the Joint Chiefs of Staff. Within the Joint Staff,
the Chairman has a number of directorates of dedicated staff with
expertise to conduct the war on terrorism, including the Deputy Director
for the War on Terrorism in the Directorate for Strategic Plans and Policy
(J- 5), the War on

Terrorism Branch within the Special Operations Division of the Directorate
for Operations (J- 3), and several elements within the Directorate for
Intelligence (J- 2).

Staff representing the Secretary of Defense and Chairman of the Joint
Chiefs of Staff work together with other agencies to develop and implement
DOD plans and operations. U. S. military forces, in coordination with
other U. S. government agencies and/ or allied forces, carry out
operations. These forces are under the command of one of the geographic or
functional combatant commanders who have specific areas of responsibility.
DOD*s plans to combat terrorism are included in the

National Military Strategic Plan for the War on Terrorism, which is
implemented by the combatant commands* campaign plans.

Department of Energy Has DOE is responsible for responding to radiological
terrorist incidents and

Role in Radiological Issues preventing the proliferation of WMD materials.
DOE*s response programs

consist of special teams that could deploy overseas to follow State
Department*s lead in a terrorist crisis. Specifically, these DOE response
teams could provide threat assessments, search operations, diagnostic and
device assessments, containment relocation and storage of special nuclear

material, and post- incident cleanup. DOE*s non- proliferation programs,
implemented in conjunction with the State Department and other agencies,
provide assistance and training to foreign countries. These programs are
primarily focused on nations in the former Soviet Union and are aimed at
keeping weapons of mass destruction out of the hands of terrorists and
rogue states by preventing the smuggling of nuclear materials.

No single DOE official is in charge of coordinating the department*s
efforts to combat terrorism. However, the Administrator of the
department*s National Nuclear Security Administration is responsible for
supervising

both response and non- proliferation programs. While the department has no
agency specific strategic plan for combating terrorism, the department*s
response teams have contingency and operational plans. According to

officials from the National Nuclear Security Administration, they are
currently developing plans specific to their counterterrorism and
nonproliferation missions.

Central Intelligence Agency The CIA has the lead for gathering, analyzing,
and disseminating

Leads Overseas Intelligence intelligence on foreign terrorist
organizations. This information is used to

Activities produce a wide variety of intelligence products for
policymakers and

operational agencies, ranging from quick- reaction briefings to long- term
research studies. These efforts broadly support diplomatic, legal,
financial, and military operations against terrorism. Additionally, the
CIA Director is

charged with promoting coordination and information sharing between all
intelligence community agencies. 23 The CIA also has the lead for covert
action and other special activities used to disrupt and destroy terrorist
organizations.

CIA efforts to combat terrorism are coordinated in its Counterterrorist
Center, which is located at the agency*s headquarters. The center, which
includes representatives from a number of other federal agencies, is the
CIA*s central coordination center for agency and governmentwide
intelligence activities related to foreign terrorists.

U. S. Agency for USAID has roles in providing immediate emergency
assistance after a

International Development terrorist incident and in providing long- term
assistance to strengthen other

Helps with Disasters and countries* capabilities to combat terrorism.
USAID, working under the

Institution Building leadership of the Department of State, coordinates U.
S. government efforts

to manage the consequences of a terrorist incident. In the aftermath of a
terrorist incident, USAID could respond with humanitarian relief and
rehabilitation activities. Within USAID, the Office of Foreign Disaster
Assistance leads agency efforts to provide such assistance. In addition,
several USAID programs provide assistance to other countries in developing
their law enforcement and judicial systems. For example, USAID supports
programs to (1) train foreign law enforcement,

prosecutors, and judges and (2) assist in rewriting legislation and
criminal sentencing guidelines. These programs, which are discussed in
chapter 3, could help these countries bring terrorists to justice.

Other Federal Agencies Other federal agencies have more limited roles in
combating terrorism Could Provide Specialized

overseas. These agencies generally have a domestic focus, but have unique
Assistance capabilities to provide technical advice or special response
teams. These

23 The intelligence community includes the Office of the Director of
Central Intelligence; Central Intelligence Agency; the National Security
Agency; the National Imagery and Mapping Agency; the National
Reconnaissance Office; the Defense Intelligence Agency and other offices
within the Department of Defense for the collection of specialized
national intelligence through reconnaissance programs and the intelligence
elements of the Army, the Navy, the Air Force, and the Marine Corps; the
FBI; the Department of the Treasury; the Department of Energy; the State
Department*s Bureau of Intelligence and Research; and such other elements
of any department or agency as may be designated by the President or
jointly by the Director of Central Intelligence and the head of the
department or agency concerned.

teams could deploy overseas to support the State Department in managing a
terrorist WMD incident or in other activities related to terrorism. Such
agencies include the following:

 The Department of Health and Human Services has expertise and
capabilities related to the health and medical consequences of terrorist
WMD incidents, particularly biological agents.

 The Department of Veterans Affairs has expertise and capabilities
related to the health and medical consequences of radiological agents.

 The Environmental Protection Agency has expertise and capabilities
related to identifying and cleaning up hazardous materials, including
chemical agents.

Interagency Another part of the interagency framework to combat terrorism
overseas is

Coordination coordination. Interagency coordination is important because
of the large

number of agencies and multiple functions involved. Agencies involved in
Mechanisms combating terrorism participate in various interagency
mechanisms used to coordinate their activities. In Washington, D. C., NSC
policy coordination committees and interagency working groups coordinate
higher- level policy

issues. Overseas, U. S. missions and regional military commands coordinate
their activities through a combination of working groups and operational
plans. Agencies also achieve interagency coordination through personnel
exchanges and cross- agency liaisons.

Subsequent chapters provide more information on how coordination occurs in
the specific functions of diplomacy, intelligence, law enforcement,
financial operations, and military operations against terrorism overseas.

NSC Oversees Interagency Formal interagency coordination of national
policy and operational issues

Coordination in Washington, to combat terrorism overseas occurs through
the NSC. The NSC heads a

D. C. policy coordination committee called the Counterterrorism Security

Group. 24 The group is comprised of high- level representatives (at the 24
The Counterterrorism Security Group was formerly known as the Coordinating
SubGroup of the NSC Deputies* Committee.

assistant secretary level) from key federal agencies that combat terrorism
such as the Departments of State, Justice, and Defense and other agencies,
to include the FBI and the CIA. Other departments or agencies might be
invited to participate in meetings of the group as needed, such as the
Departments of the Treasury, Transportation, Health and Human Services,
Energy, and FEMA. The group develops and tries to reach consensus on
terrorism policy and operational matters and makes recommendations to

the President. The Counterterrorism Security Group has a number of
subordinate interagency working groups that coordinate efforts related to
specific issues in combating terrorism overseas. Table 4 describes these
subordinate groups and their functions.

Table 4: NSC- Sponsored Interagency Working Groups Under the
Counterterrorism Security Group to Coordinate Efforts to Combat Terrorism
Overseas Working group (Chair) Functions of working group

Exercise and Readiness This long- standing group promotes interagency
planning, implementation, and evaluation of exercises Sub- Group.

to combat terrorism. The State Department, the FBI, and FEMA co- chair the
group, taking Chairs: State Department, the responsibility for planning
exercises. The group has regular meetings where agencies address FBI, and
FEMA

interagency issues, plan future exercises, and compare and resolve
schedule conflicts in agency exercises.

Terrorist Financing Working This group coordinates U. S. government
efforts to identify and deny terrorist financing. It coordinates Group.
policy, strategy, and operations to disrupt terrorist networks by freezing
terrorist accounts. The group Chair: Treasury Department

also helps to develop strategies and activities for working with other
countries. Training and Assistance SubGroup. This group coordinates the
different programs to provide terrorism- related training and assistance
to

foreign governments and their officials. This training can include
technical assistance, classroom Chair: State Department

courses, or field training. The group works to prioritize countries that
should receive assistance. The group reviews assistance programs of the
various agencies to ensure they are properly sequenced, avoid duplication,
and ensure that they are implemented in collaboration with or reinforce
other efforts, as appropriate.

Counterterrorism Finance This is a subgroup of the above Training and
Assistance Sub- Group that focuses on assistance to Training and Technical
other countries to eliminate terrorist funding. The group focuses on
providing related finance training Assistance Working Group.

and technical assistance to a set of priority countries, and attempts to
ensure that the delivery of such Chair: State Department

assistance by different agencies does not conflict and is used effectively
and efficiently. Hostage Crisis Working Group

This group develops and coordinates the U. S. government*s hostage crisis
policy. The group meets on Chair: NSC an emergency basis to monitor and
plan actions related to overseas crises or incidents where

Americans are taken hostage by terrorists. Technical Support Working This
long- standing group conducts the national interagency research and
development program for Group.

combating terrorism. It operates under the policy oversight of the State
Department and the Chair: State Department

management and technical oversight of DOD. This group coordinates research
and development across nine categories of terrorism- related products,
amounting to $165 million in fiscal year 2003.

Source: GAO discussions with NSC and agency officials. Note: Until
recently, there was also a National Strategy Working Group chaired by NSC.
This group was formed to develop, write, and coordinate the National
Strategy for Combating Terrorism. It disbanded when the strategy was
published in February 2003.

Some terrorism- related groups formerly under the NSC have been
transferred to the Office of Homeland Security. For example, the NSC had
interagency working groups related to issues such as WMD consequence
management, aviation security, and assistance to state and local
governments. These functions are now covered by the Office of Homeland
Security, which has its own interagency working groups (called policy
coordination committees) to coordinate these and other domestic issues.
Our work in producing this report did not evaluate the implications of the
new Department of Homeland Security, but it also will participate in some
of these policy coordination committees under the sponsorship of the
Office of Homeland Security.

Coordination Occurs At U. S. embassies overseas, programs to combat
terrorism are coordinated

Overseas through U. S. through various plans and working groups. Each
embassy has a mission

Missions performance plan to coordinate embassy activities across
agencies. The mission performance plans list each embassy*s priorities and
include

implementation and budgeting plans. In cases where combating terrorism is
a priority, the plan might include specific goals and actions to counter
that threat. For example, one embassy has goals to both reduce the threat
of terrorists against Americans in that country and to keep the host
government an active and effective member of the international coalition
against terrorism.

In addition, embassies have a *country team* that can be used to
coordinate efforts to combat terrorism. The country team, which includes
representatives from all of the agencies with representatives at the
embassy, sometimes have subgroups related to terrorism. For example,

selected embassies have country team subgroups dedicated to law
enforcement matters, chaired by the deputy chief of mission. These groups
consist of agency representatives at the embassy with law enforcement
duties, such as the regional security officer, FBI legal attache, Treasury
Department financial attache, and officials from other agencies. The
country teams and their subgroups meet regularly and on an ad hoc basis
for crises or time- sensitive matters. The ambassador works with the
country teams in developing the mission performance plan discussed above.

Regional Military U. S. regional military commands also have plans and
interagency working

Commands also Provide groups to coordinate their military operations with
other agencies to

Interagency Coordination combat terrorism overseas. These regional
commands include the U. S. Central Command, U. S. European Command, U. S.
Southern Command, and

Overseas U. S. Pacific Command. 25 All of these commands have Campaign
Plans and

Theater Security Cooperation Plans to coordinate their activities. The
Campaign Plans are the regional commanders* strategies for implementing
DOD*s National Military Strategic Plan for the War on Terrorism in their

specific geographic area of responsibility. These plans include efforts to
coordinate both military and non- military operations. In addition, the
commands* Theater Security Cooperation Plans lay out strategies for
working with other countries in the region to further U. S. foreign policy
and military goals. Command officials told us that since September 11,
2001, these plans have additional emphasis on coordinating efforts to
combat terrorism with other countries.

These regional commands also have new interagency working groups to help
coordinate activities to combat terrorism across different agencies. DOD
created these interagency groups on an experimental basis right after the
September 11, 2001, terrorist attacks and NSC formally approved them in
January 2002. The working groups coordinate military operations with
nonmilitary activities, to include diplomacy, law enforcement,
intelligence, and others. The groups include representatives from the
Department of State, Department of Justice (including the FBI), Department
of Homeland Security (including the U. S. Secret Service), the
intelligence community (including the Defense Intelligence Agency,
National Security Agency, and National Imagery and Mapping Agency), and
other agencies (including USAID). These interagency working groups include
agencies with longstanding representatives at the commands as well as
newcomers. For example, some of the defense components of the intelligence
community have long had liaisons at the regional commands. In contrast,
law enforcement agencies have only recently assigned staff to the regional
commands on a full- or part- time basis.

25 We did not include the newly created U. S. Northern Command in our
review because of its domestic focus. The Northern Command is responsible
for homeland defense within the United States and at its borders.

Interagency Coordination Agencies also accomplish interagency coordination
and information

also Facilitated via sharing through personnel exchanges and agency
liaisons. Such exchanges

Personnel Exchanges occur at all levels and can be extensive. For example,
the FBI and the CIA

routinely detail senior- level officers to the counterterrorism office of
their counterpart. The Deputy Chief of the CIA*s Counterterrorist Center
is an FBI official, while the Deputy Section Chief in the FBI*s
Counterterrorism Division is a CIA official. Additionally, the staff of
the newly instituted Office of Intelligence at the FBI is headed by a CIA
official and includes 25 staff on detail from the CIA.

The staff exchanges provide a valuable service to both their assigned and
home agencies. Besides contributing their own expertise, part of the job
of these detailees is to provide their agency hosts with timely verbal
briefings,

especially during crisis situations when interagency liaison is critical.
For example, CIA officers detailed to the counterterrorism offices of
other agencies maintain direct contact with their primary assignments at
the CIA*s Counterterrorist Center. State Department political advisors
detailed to U. S. regional military commands help coordinate with both
State Department headquarters in Washington, D. C., and with U. S.
embassies overseas.

Personnel also learn about other agencies by taking orientation and
training courses. One new initiative is a training program where new CIA
chiefs of station are introduced to FBI perspectives and capabilities. New
FBI legal attaches receive reciprocal training at the CIA. Through these
types of initiatives, personnel are able to better understand their

counterparts* roles, responsibilities, and authority and thus promote
better coordination.

Coordination through personnel exchanges also occurs at the international
level. For example, U. S. officials are detailed to international
multilateral organizations, such as the International Police Organization
(INTERPOL) and the North Atlantic Treaty Organization (NATO).

Agency Comments and The Departments of Defense, Justice, and State and
USAID provided Our Evaluation

technical comments on this chapter, generally relating to their roles in
combating terrorism overseas. Based upon these comments, we made
revisions, as appropriate. We also made revisions regarding the creation
of the Department of Homeland Security and the transfer of various
agencies and functions from other departments into that department.

Federal Efforts to Detect and Prevent

Chapt 3 er Terrorism The federal government has an important mission to
protect Americans abroad from terrorist attacks. A critical component in
performing that mission is detecting terrorists and preventing their
attacks against U. S. interests. By protecting Americans abroad, the
federal government helps protect the homeland. Federal efforts to detect
and prevent terrorism involve a wide range of programs and activities.
Efforts to detect terrorism are led by the CIA and the intelligence
community, which gather, analyze, and share intelligence on terrorist
threats. Efforts to protect U. S. interests

abroad are led by the State Department and other agencies, which have
programs to protect U. S. government facilities and personnel as well as
American civilians living, working, and traveling overseas. Preventing
terrorism through public diplomacy is led by the State Department, which
seeks to shape foreign opinion and garner support for U. S. foreign
policy. Efforts to prevent terrorists from entering the United States are
conducted

by several federal agencies, which operate visa and border controls.
Efforts to prevent terrorism also include several agencies* programs to
improve coalition partners* capabilities through training, equipment,
security, and economic assistance, and assistance in providing security
for special international events. This chapter describes the relevant
federal programs

in place and is not an evaluation of their effectiveness. Intelligence

The National Strategy for Combating Terrorism includes objectives to
Gathering and Analysis identify and locate terrorists and terrorist
organizations. There is also an objective to attain domain awareness* the
knowledge of all activities,

Help Detect events, and trends within any specified domain (air, land,
sea, and cyber)

Terrorist Activities that could threaten the United States. Intelligence
gathering and analysis

are key functions toward these objectives. Intelligence gathering and
analysis are critical in detecting terrorist activities and generally are
led by the CIA. Under the overall leadership of that agency, U. S.
intelligence agencies gather information on terrorist organizations,
monitor terrorist threats, and share information with other nations. The
Departments of State and Defense collect and analyze intelligence and
participate in surveillance programs and liaisons with foreign police at
the local level.

These intelligence activities support other preventative efforts, such as
protecting U. S. facilities and Americans overseas, public diplomacy, and
border controls.

Federal efforts to combat terrorism are supported by the work of the U. S.
intelligence community, which is a group of government agencies that play
various roles in intelligence gathering, analysis, and distribution. That
intelligence provides policymakers with valuable information about

terrorist organizations and forms the basis for threat assessments and
warnings. Also, it generally supports operations against terrorist
organizations. In the wake of September 11, 2001, many intelligence
agencies have sought to reduce barriers to the flow of such intelligence
between and within agencies. The CIA and various interagency bodies manage
the coordination of these agencies.

CIA Leads Intelligence The CIA leads the intelligence community in efforts
to collect, analyze,

Community Collection and disseminate information on terrorist incidents
and groups. This

and Analysis of Foreign information and analysis is used to inform
government decision makers

Intelligence from Overseas and supports diplomatic, legal, and military
operations against terrorism. It

can include such things as how terrorist groups are organized, who their
leaders are, what their objectives are, what weapons and tactics they use,
and whether they receive support from state sponsors of terrorism.

Such information is collected through various means. Signals intelligence
can be collected through intercepted communications, radar, and telemetry
signals. Imagery intelligence can be derived from visual photography,
infrared sensors, lasers, and electro- optics. Human intelligence is
collected directly from human sources, sometimes through clandestine
collection operations. Open source intelligence is gathered from media
sources open to the public, such as foreign newspapers or trade journals.
A considerable volume of intelligence information has been produced by the
current military campaign in Afghanistan. According to the CIA, this
information has provided policymakers with a better understanding of al
Qaeda*s leadership, structure, and capabilities.

Raw intelligence on terrorist groups, such as the previous example, is
combined and analyzed by various agencies, but most notably by staff of
the Counterterrorist Center within the CIA. Dissemination of finished
intelligence occurs through various intelligence community products,
including periodicals, daily reports, daily briefings, and warning
memorandums. The products are delivered to national- level policymakers
including the President, Cabinet- and sub- Cabinet- level officers,
Members of Congress, U. S. military commands, and law enforcement
agencies. Some products are short- range, such as the President*s daily
intelligence brief, while more long- range forecasts are made through
National Intelligence Estimates.

FBI Has Key Role in In addition to law enforcement functions, the FBI is
designated as an

Collection and Analysis of intelligence agency by Executive Order 12333. 1
As such, according to the

Foreign Intelligence from FBI, it has the primary responsibility for the
collection of foreign

Domestic Sources intelligence and counterintelligence information within
the United States.

In this role, the FBI monitors the activities of terrorist groups
(including those of foreign origin) operating within the United States.
Within FBI, these activities are coordinated through the FBI*s
Counterterrorism Division. Intelligence information collected by the FBI*s
Counterterrorism Division is used to protect against international
terrorism by identifying terrorist groups, their members, their plans, and
the means by which they communicate and conceal their activities. The FBI
gathers this information through Foreign Intelligence Surveillance Act
investigations, recruited sources, double agents, and undercover
operations. The FBI also monitors the activities of terrorist groups
operating outside the United States. For example, FBI Legal Attaches
overseas acquire and disseminate information on terrorists through liaison
with foreign services. In addition

to using FBI intelligence, the Counterterrorism Division utilizes
intelligence information from other agencies such as the CIA, the Defense
Intelligence Agency, National Security Agency, and the State Department.
Eighteen federal agencies are represented in the division, including the
CIA, the U. S. Secret Service, and the Department of State. The FBI*s
Threat Assessment/ Prevention Unit also assists international terrorism
personnel with assessing the potential threats existing in the short- and
long- term environments. In addition, the FBI*s Office of Intelligence
supports counterterrorism and counterintelligence programs through
strategic and tactical intelligence capacity.

Information from these various sources is collected, analyzed, and shared
with policymakers and investigators. Raw intelligence collected by the
intelligence community also is compared with investigative data
accumulated by the FBI to determine the feasibility and credibility of
threat information received in various venues. The Counterintelligence
Division coordinates investigative matters concerning foreign
counterintelligence, including activities related to investigations into
espionage, overseas

homicide, protection of foreign officials and guests, and nuclear
extortion. The FBI*s goal in these intelligence activities is to assemble
a picture of the threats posed by international terrorist groups and
provide a basis for neutralizing those groups before they commit acts of
terrorism.

1 Executive Order 12333, United States Intelligence Activities, Dec. 4,
1981.

Other Agencies also Have The State Department also has a major role in
gathering, analyzing, and

Important Intelligence Roles disseminating intelligence on terrorist
groups. The department*s Bureau for

Intelligence and Research prepares intelligence reports and related policy
guidance for the Secretary of State and other department officials. In
addition, this bureau provides intelligence products, such as threat
information, to ambassadors at U. S. embassies. This bureau also conducts
foreign public opinion surveys related to terrorism. For example, it
conducted surveys in several Arab countries to gauge public reaction to
the September 11, 2001, terrorist attacks and public perceptions of Osama
bin Laden. The department*s Bureau of Diplomatic Security gathers
information through its contacts with foreign police, security, and
intelligence officials. Through these contacts and related investigations,
this bureau*s regional security officers* located at U. S. embassies* may
be the first to recognize potential terrorist activities and threats. The
bureau

also analyzes terrorist and related threats and publishes their results in

Significant Incidents of Political Violence Against Americans, and

Terrorist Tactics and Security Practices: Lessons Learned and Issues in
Global Crime. In addition, the departments* Coordinator for
Counterterrorism, in conjunction with the intelligence community, studies
terrorist groups and state sponsors of terrorism, and provides a review of
the international terrorism situation in the annual publication Patterns
of Global Terrorism. 2 These publications are disseminated to, among
others, department offices and U. S. embassies for their use in developing
policies and programs to combat terrorism.

DOD also plays a significant role in intelligence collection and analysis.
The Defense Intelligence Agency provides military intelligence to
warfighters, policymakers, and force planners involved in combating
terrorism. The National Security Agency collects and processes foreign

signals intelligence for national leadership and warfighters. The National
Reconnaissance Office coordinates collection and analysis of information
from space and airborne reconnaissance by the CIA and the military
services. In addition, the Army, the Navy, the Air Force, and the Marine
Corps intelligence agencies each collect and process intelligence relevant
to their particular service*s needs. Regional command officials told us
that DOD*s combined intelligence activities are increasingly focused on
protecting deployed military forces, supporting military operations
against

2 The State Department prepares this annual publication for the Congress
as required by 22 U. S. C. S: 2656f (2002).

terrorists, and providing intelligence to other federal agencies that
combat terrorism overseas.

The Department of Homeland Security also has a role in analysis of
information related to terrorism threats because the nation*s critical
cyber and physical infrastructures are vulnerable to attack from
international sources. According to the Homeland Security Act, the
Department of Homeland Security*s Information Analysis and Infrastructure
Protection Directorate is responsible for accessing, receiving, and
analyzing law enforcement information, intelligence information, and other
threat and incident information from respective agencies of federal,
state, and local governments and the private sector and for combining and
analyzing such information to identify and assess the nature and scope of
terrorist threats. 3 The directorate also is tasked with coordinating with
other federal agencies

to administer the Homeland Security Advisory System to provide specific
warning information along with advice on appropriate protective measures
and countermeasures.

Threat Assessments Threat assessments and warnings play a crucial role in
the dissemination

Allow Government to effort, helping to inform and prioritize security
planning. When the threat of

Take Preemptive or terrorism becomes pronounced, warnings are issued to
the public and Preventive Actions

policy community. One of the more visible threat assessments by the
intelligence community is the Homeland Security Advisory System. The
warning function for the counterterrorism community is housed within the
Community Counterterrorism Board, which produces Terrorist Alerts and
Advisories on a need- to- know basis for a wide government audience.

*Strategic warning* is used to describe instances in which the
intelligence community has very broad indications that an attack may occur
but does not have the specifics as to where, when, or how the attack will
be carried out. Strategic warning enables policymakers and government
decision makers to take steps to strengthen anti- terrorist defenses and
initiate other counterterrorist actions. Strategic warnings could include,
for example, the Department of Homeland Security adjusting its threat
levels and DOD adjusting its Force Protection Conditions. *Tactical
warnings* may be issued when the intelligence community has more detailed
information on where, when, or how an attack might be carried out.

3 Section 201, P. L. 107- 296, Nov. 25, 2002.

Tactical warnings can lead to immediate, direct preventive action against
specific individuals who may be involved in the planned attack and to
implement appropriate protective action for specific targets. For
instance, in early September 2002, the State Department was able to act on
credible and specific threat information by closing many U. S. embassies
in Asia and

reviewing their security postures. Intelligence Supports

Intelligence information supports the efforts of other agencies involved
in Diplomatic, Law

combating terrorism overseas. It enhances the diplomatic efforts of the
Enforcement, and

Department of State, for example, by providing essential information to
the Military Actions

TIPOFF database intended to prevent terrorists from obtaining entry visas
into the United States. Intelligence information also augments the
security of U. S. military facilities abroad, for instance through the
CIA*s Counterterrorist Center. The center maintains a liaison staff to
provide military commands worldwide with up- to- date information on the
modus operandi of terrorist groups in their geographic areas of
responsibility. Investigations by the FBI and other law- enforcement
agencies also derive support from intelligence information. Finally,
military operations against

terrorist organizations often rely on intelligence information. For
example, the 1998 cruise missile attack against an al Qaeda training camp
in Afghanistan relied on data from the intelligence community.

Actions undertaken by the U. S. diplomatic, law enforcement, financial,
military, and intelligence communities supported by intelligence
information are discussed further in chapter 4.

Efforts to Reduce Before September 11, 2001, much information sharing was
handled through

Barriers to Information staff detailed to other agencies and interagency
liaison. For example, in

Sharing Within the early 2001, 10 percent of the CIA Counterterrorist
Center*s staff

Federal Government complement had been detailed from outside agencies.
Recent efforts to improve data sharing have focused primarily on data
access and

availability. According to recent testimony by the Director of Central
Intelligence, the State Department currently is working with the CIA to
renovate the current TIPOFF all- source watchlist into a National
Watchlist Center that will serve as a base for all watchlists in the U. S.
government. 4 In

4 Written Statement for the Record of the Director of Central Intelligence
before the Joint Inquiry Committee, Oct. 17, 2002.

the interim, the Community Counterterrorism Board is providing secure
access to State*s current watchlist database via a secure system known as
*CT Link.* Furthermore, the CIA currently is developing a multi- agency,
common repository for classified and unclassified information accessible

to the entire intelligence community as well as to state and local law
enforcement.

To improve intelligence sharing both within and among agencies,
intelligence agencies are reevaluating their own internal data management
procedures. The FBI plans to fully convert to a new data management system
by December 2003 and currently is in the process of consolidating its
various databases. The CIA also is attempting to improve its database
procedures. These improvements include: consolidating terrorist identity
information, lowering the threshold for nominating individuals for

watchlist status, lowering the threshold for dissemination of information
previously regarded as *operational,* and increasing managerial oversight
through periodic reviews of the system. Efforts also are under way to
improve information sharing between members of the intelligence community
and the law enforcement community. The FBI*s Criminal Division develops
evidence for possible prosecution, while the CIA and other intelligence
agencies develop intelligence to assess and counter threats. The
collection and use of intelligence information on individuals for domestic
law enforcement purposes is constrained by the application of
constitutional protections, statutory controls, and rules of evidence. For
instance, to obtain a search warrant in a criminal investigation, the
government, in general, is required to establish probable cause to believe
that an individual has committed, is committing, or is about to commit a
particular predicate offense. 5 The rules are different for domestic
collection of foreign intelligence. In general, the Foreign Intelligence
Surveillance Act of 1978 (FISA) requires that a FISA Court judge find
probable cause to believe that a suspect target is a foreign power or an
agent of a foreign power, and that the places at which the surveillance is
directed are being used, or are about to be used, by a foreign

5 Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (P.
L. 90- 351), Jun. 19, 1968, as amended.

power or an agent of a foreign power. 6 As a result of these different
standards, there are situations in which it is possible to obtain a
foreign intelligence surveillance order that would not satisfy the
standards for a criminal search warrant or electronic surveillance order.
7 FISA has been interpreted as requiring a separation or *wall* that
limits coordination between domestic law enforcement and foreign
intelligence investigations and the use of information collected by
foreign intelligence agents in criminal prosecutions. 8 Various provisions
of the USA PATRIOT Act seek to

improve the sharing of information between the intelligence and law
enforcement communities. 9 For example, the USA PATRIOT Act amended FISA
to provide more flexibility to federal investigators in sharing
information obtained under FISA. 10

International Intelligence U. S. intelligence operations also are
augmented by the efforts of

Sharing and Cooperation U. S. friends and allies. Historically, the United
States often has participated

in beneficial bilateral intelligence cooperation with other countries. The
Director of Central Intelligence formulates policy governing the liaison,
coordination of relationships, and cooperative intelligence arrangements
between members of the intelligence community and the intelligence or
security branches of foreign governments. These relationships can take the
form of reciprocating collection and analysis activities, joint collection
operations, exchange of analysts or technicians, or even training
furnished by the United States in return for services rendered by the
foreign intelligence service. In one such training program, the CIA*s
Counterterrorist Center is involved in training foreign agencies to better
prevent terrorist attacks. According the Director of Central Intelligence,

6 P. L. 95- 511, Oct. 25, 1978, as amended. 7 See U. S. General Accounting
Office, FBI Intelligence Investigations: Coordination Within Justice on
Counterintelligence Criminal Matters Is Limited, GAO- 01- 780 (Washington,
D. C.: July 16, 2001).

8 A second type of *wall* continues to limit the use of foreign
intelligence information in criminal prosecutions. In this respect,
intelligence analysts are concerned that primary sources and methods could
be disclosed, namely in criminal court. This may cause them to release
intelligence information to the FBI for lead purposes only, rather than
fully share

information that could be used for evidentiary purposes. 9 P. L. 107- 56.
For example, see sections 203, 218, and 504.

10 Also see the recent decision of the United States Foreign Intelligence
Surveillance Court of Review In re: Sealed Case No. 02- 001, Nov. 18,
2002, which addresses these issues.

these foreign security services arrest terrorists on the basis of U. S.
intelligence. For example, terrorist groups planning attacks on American
and local interests in Europe were identified and disrupted

through cooperation between the CIA and various European governments.
Intelligence liaison has also greatly augmented U. S. efforts against al
Qaeda.

Coordination Mechanisms Executive responsibility for coordination and
information sharing among

for Intelligence Activities the intelligence community agencies lies with
the Director of Central

Intelligence. 11 The Director serves as the President*s principal
intelligence advisor and serves as both head of the CIA and the greater U.
S. intelligence community. The Director*s coordination duties include
being the intelligence community*s spokesman to the Congress, establishing
services of common concern within the intelligence community, and
promoting common administrative practices* most notably on classification
issues. The Director also has full responsibility for the production,
interagency sharing, and timely dissemination of foreign intelligence
information, and carries the authority to assign specific analytical tasks
to specific intelligence community member agencies. The Director also
governs requirements and priorities for the collection of foreign
intelligence.

Interagency Intelligence The lead forum for coordination of intelligence
activities across agencies is Committee on Terrorism

the Interagency Intelligence Committee on Terrorism. The committee,
established in 1990, advises and assists the Director of Central
Intelligence in coordinating the intelligence community over the long
term. It facilitates the Director*s use of intelligence resources to
resolve long- term policy coordination issues in combating terrorism. It
is composed of representatives of the intelligence, law enforcement, and
regulatory communities, and it also oversees several subcommittees. These
subcommittees conduct research and develop solutions to intelligence
issues, including Intelligence Requirements, Information Handling,
Technical Countermeasures, Training, Warning, and Unconventional Weapons.
Leadership within the committee is provided by the Community
Counterterrorism Board, which serves as the committee*s executive
secretariat. The board also manages *CT Link,* a secure network for
counterterrorism research, coordination, and communication available on 11
See Executive Order 12333, United States Intelligence Activities, Dec. 4,
1981.

the individual desktops of all member agencies. Committee members assess
indications of terrorist threats and share information on the activities
of terrorist groups and countries that sponsor terrorism. Table 5 shows
selected members of the Interagency Intelligence Committee on Terrori sm.

Tabl e 5: Selected Members of the Interagency Intelligence Committee on
Terrorism Organization Organization

Central Intelligence Agency Department of State Department of Defense

Department of Justice  Office of the Secretary of Defense

 Criminal Division  Defense Intelligence Agency

 Federal Bureau of Investigation  National Security Agency

 Bureau of Alcohol, Tobacco, Firearms and Explosives  National
Reconnaissance Office

 Drug Enforcement Administration  National Imagery and Mapping Agency

 U. S. Marshals Service  Defense Information Systems Agency

Department of Transportation  Defense Threat Reduction Agency

 Federal Aviation Administration  Defense Advanced Research Projects
Agency

 White House Communications Agency  Department of Homeland Security

 White House Military Office  U. S. Secret Service

 Joint Chiefs of Staff  U. S. Coast Guard

 Unified Commands  Bureau of Immigration and Customs Enforcement

 U. S. Army  Bureau of Customs and Border Protection

 U. S. Air Force  Federal Emergency Management Agency

 U. S. Marine Corps Environmental Protection Agency

 U. S. Navy Executive Office of the President  Chemical, Biological
Incident Response Force

 National Security Council  Office of Homeland Security  Executive
Office of the Vice President

U. S. Postal Service Federal Reserve Board National Communications System
Nuclear Regulatory Commission Department of Commerce U. S. Capitol Police
Department of Energy Department of Health and Human Services Source: CIA.

Counterterrorist Center at CIA The primary link between the long- term
interagency coordination needs of the Interagency Intelligence Committee
on Terrorism and the more immediate coordination needs of intelligence
operations is the Director of Central Intelligence*s Counterterrorist
Center. The center was established at CIA Headquarters in 1986 to
coordinate intelligence operations across agencies. Many agencies
represented in the center are also members of the Interagency Intelligence
Committee on Terrorism. All information on terrorists is channeled to the
center. This intelligence collection is fused with analysis and
operational capabilities to give the center the speed to seize fleeting
opportunities. The center is, therefore, somewhat unique among
intelligence *centers,* in that it combines intelligence analysis,
planning, operational support, and also serves as a general platform for
carrying out general U. S. counterterrorism policy.

The interagency coordination managed by the Counterterrorist Center is
intended to support U. S. efforts to penetrate, preempt, disrupt, and
ultimately destroy terrorist organizations worldwide. The center carries
out a number of responsibilities against terrorism: analysis, warning, and
activities in support of diplomatic, legal, and military operations
against terrorism. For example, it often plays a key role in the tracking
and rendition of terrorist suspects, usually in concert with the FBI or
foreign law enforcement agencies. The center also prepares intelligence
reports on terrorist groups and countries that support terrorism that are
made available to other intelligence and law enforcement agencies. For
example, the center issues a monthly, classified review of international
terrorism developments and provides other analysis on terrorist groups,
capabilities, or incidents as needed. Smaller units within the center
develop specialized intelligence on specific terrorist groups. As
mentioned earlier, the center makes extensive use of personnel exchanges
to facilitate greater coordination. Counterterrorist Center staff work
closely with other agency counterparts in Washington, D. C., and with
intelligence assets in the field.

Beyond the operational coordination of the Counterterrorist Center and the
long- term coordination initiatives of the Interagency Intelligence
Committee on Terrorism, the intelligence community uses no overarching
strategic plan to coordinate its efforts. There are, however, operational
plans for intelligence campaigns against specific targets, such as Osama
bin Laden.

New Terrorist Threat In January 2003, the President announced the creation
of a Terrorist Threat

Integration Center Integration Center to coordinate intelligence
activities across agencies. The

President instructed the leaders of the FBI, CIA, and Departments of
Defense and Homeland Security to develop the center to merge and analyze
all threat information in a single location. The center is to have access
to all terrorist threat information available to the U. S. government and
will seek to minimize any seams between analysis of terrorism intelligence
collected overseas and in the United States. It is to conduct threat
analysis, institutionalize information sharing across agency lines, and
provide comprehensive threat assessments. The center also is intended to
play a

lead role in tasking the intelligence community to gather intelligence and
it will maintain an up- to- date database of known and suspected
terrorists. It will not conduct intelligence collection or operations. The
Terrorist Threat Integration Center will eventually be collocated with the
Director of Central Intelligence's Counterterrorist Center and the FBI's
Counterterrorism Division to improve collaboration among agencies. However
the Director of Central Intelligence's Counterterrorist Center and the
FBI's Counterterrorism Division will retain their distinctive operational
capabilities. The head of the center will report to the Director of
Central Intelligence. The Director of Central Intelligence will appoint
the head of the center in consultation with the Attorney General, the
Secretaries of Defense and Homeland Security, and the Director of the FBI.
In February 2003, the President announced a plan for implementing the new
center, starting in May 2003.

Protecting The National Strategy for Combating Terrorism includes an
objective to

U. S. Government integrate measures to protect U. S. citizens abroad.
According to the

strategy, the Department of State will take the lead and, in conjunction
with Facilities and

appropriate agencies, partner with industry to establish cost- effective
best Americans Abroad

practices and standards to maximize security. Toward this objective, the
Department of State conducts multifaceted activities in its effort to
prevent terrorist attacks on Americans abroad. For example, to protect U.
S. officials, property, and information abroad, State operates programs
that include local guards for U. S. missions, armored vehicles for embassy
personnel, U. S. Marine security guards to protect sensitive information,

and plans to evacuate Americans in emergencies. DOD has similar programs
to protect its military forces against terrorist attacks. The U. S. Secret
Service and State*s Bureau of Diplomatic Security protect senior U. S.
government officials when traveling overseas. For Americans traveling and
living abroad, State issues public travel warnings and public
announcements and operates warning systems to convey terrorism- related

information. For U. S. businesses and universities operating overseas,
State uses the Overseas Security Advisory Councils* voluntary partnerships
between the State Department and the U. S. private sector* to foster the

exchange of security and threat information, implement security programs,
and provide a forum to address security concerns. These efforts are
coordinated both at the headquarters level in Washington, D. C., and at

individual U. S. missions abroad. U. S. Mission Security The Department of
State*s Bureau of Diplomatic Security is responsible

for providing a secure environment worldwide for the conduct of American
diplomacy. The bureau manages a broad range of programs to create and
maintain appropriate levels of security for more than 50, 000 U. S.
government personnel, staff, and dependents, who work and live at 260
embassies, consulates, and other U. S. missions overseas. The bureau can
dispatch Diplomatic Security teams to threatened overseas missions. At
each U. S. mission, the regional security officer is responsible for
implementing Diplomatic Security measures and coordinating protection with
host government authorities.

The Bureau of Diplomatic Security also reviews standards and risk
management. It develops, evaluates, and applies security standards for a
broad range of categories. These include (1) physical protection for
office and residential buildings, (2) access to communication equipment,
(3) intrusion detection devices, (4) secure conference rooms, and (5)
armored vehicles. These standards are intended to allow the bureau to
identify and address threats posed by terrorism, political violence, human
intelligence, and technical intelligence penetration of facilities.

The bureau uses these elements to target resource allocations to
identified threats at each mission or location. The bureau is required to
provide to the Congress each year a ranking of the U. S. missions abroad
most vulnerable to terrorist attack. 12 These standards also help target
additional security funding to the highest threat missions, as in the case
of Emergency Security

12 See U. S. General Accounting Office, Embassy Construction: Better Long-
Term Planning Will Enhance Program Decision- Making, GAO- 01- 11
(Washington, D. C.: Jan. 22, 2001). In this report, we note that the
Department of State has ranked the more than 180 facilities that it
proposes to replace and/ or provide with major security enhancements into
groups or *bands* of 20 in order from the most vulnerable to the least
vulnerable to terrorist attack.

The ranking, which is provided to the Congress annually, is intended to
serve as a guide for which embassies and consulates State would replace
first.

Supplemental and Worldwide Security Upgrade funds to meet the most
pressing security needs.

The State Department conducts multifaceted activities in an effort to
prevent terrorist attacks against U. S. missions. Following the August
1998 bombings of the U. S. Embassies in Nairobi, Kenya, and Dar es-
Salaam, Tanzania, State upgraded security for all of its missions. As we
have

reported previously, there are a number of U. S. embassy security programs
and activities to prevent terrorism overseas, which generally are managed
by State*s Bureau of Diplomatic Security. 13

Embassy threat assessments This Bureau of Diplomatic Security program
helps the Bureau of Overseas Buildings Operations develop embassy security
measures. The Bureau of Diplomatic Security develops, with other elements
in State, threat assessments that State uses to prioritize which U. S.
missions are most in need of new, safer embassy buildings.

Embassy construction program This Bureau of Overseas Buildings Operations
program is attempting to replace State Department*s less secure facilities
on an accelerated basis with new, secure embassies and consulates that
meet current security standards, such as having a 100- foot setback from
streets surrounding

embassies. State has a 6- year Long- Range Overseas Buildings Plan, which
includes both new construction and the major renovation and rehabilitation
of existing facilities.

Worldwide Security The Bureau of Diplomatic Security and Bureau of
Overseas Buildings

Upgrade Program Operations jointly are responsible for the Worldwide
Security Upgrade Program, which provides a physically secure environment
for all

U. S. government personnel under the jurisdiction of the chief of mission.
The Bureau of Diplomatic Security, through its physical security program,
strengthens building exteriors, lobby entrances, and the walls and fences
around embassies and consulates. 14 Inside an embassy or consulate,
closed- circuit television monitors, explosive- detection devices, walk-
through metal detectors, and hard- line walls and security doors

provide protection. These are intermediate measures* only new embassies
will address all security concerns.

13 See U. S. General Accounting Office, Combating Terrorism: Department of
State Programs to Combat Terrorism Abroad, GAO- 02- 1021 (Washington, D.
C.: Sept. 6, 2002).

Residential Security program The Residential Security program provides for
security upgrades to the residences of U. S. employees assigned to
overseas diplomatic and consular missions. Prior to occupancy, all newly
acquired residential facilities are

equipped with appropriate security features, such as locks, alarms,
shatterresistant window film, and reinforced doors, based on the level of
the threats.

Overseas Protection of The Overseas Protection of Information program
implements a

Information program comprehensive set of information protection programs.
These programs

are intended to protect national security information discussed at
meetings in secure conference rooms or on secure telephones, processed and
stored on computers, and preserved and communicated on paper documents.
This program includes (1) personnel investigations for security
clearances,

(2) courier protection for diplomatic pouches, (3) construction security
and access control equipment, (4) U. S. Marine security guards controlling
access to embassies at 130 U. S. missions overseas, (5) locks for
containers holding classified material, (6) secure conference rooms, (7)
detection and containment of emanations from processing equipment, (8)
counterintelligence investigations and briefings, and

(9) computer security. Surveillance Detection Program The Surveillance
Detection Program utilizes plainclothes security agents

to provide surveillance detection measures around U. S. embassies,
consulates, and residences of embassy employees. The program is used to
identity suspicious activity, such as terrorists* casing embassy
facilities or personnel, and includes capabilities intended to resolve all
suspicious activity.

Local Guard Services Local Guard Services augment host government
resources for protecting overseas diplomatic and consular office
facilities and residences of U. S. government employees and dependents of
all agencies under the chief of mission.

14 The USAID Overseas Management Office is responsible for ensuring
security at all USAID facilities that are not collocated with U. S.
missions (approximately 58 of 95, as of January 2002), although it
coordinates these security arrangements with the Bureau of Diplomatic
Security in Washington and with the regional security officers in country.
Additionally, the Office of Security handles USAID building construction
issues, coordinating extensively with State*s Bureau of Overseas Buildings
Operations, which

constructs buildings for USAID*s tenancy.

Overseas Protective Vehicles The Overseas Protective Vehicles program
provides light and heavy armor vehicles to protect embassy personnel.
Currently, all chief- of- mission vehicles have been ordered and are being
armored and 94 percent of these vehicles already have been delivered to
missions.

Host Nation Security Support Host nations also provide critical support in
preventing terrorist attacks against U. S. missions. Based on its
capabilities* and sometimes willingness* host nation security support
could include, for example, sharing intelligence about threats with the
regional security officer, providing bodyguards for U. S. officials,
stationing local police guards

outside of a U. S. mission, closing roads adjacent to a U. S. mission,
controlling crowds, responding first to a terrorist incident, and
conducting an investigation of a terrorist attack. Figure 8 shows how a
host government provides perimeter security for a U. S. embassy.

Figure 8: Host Nation Police Use Buses to Cordon off a U. S. Embassy
during a Heightened Threat Period

Military Force The threat of terrorism is one of the most pervasive
challenges facing DOD,

Protection Efforts making the protection of U. S. forces against terrorist
attacks a top priority

for the department. 15 The June 1996 truck bombing of the al- Khobar
Towers military housing facility near Dhahran, Saudi Arabia, killing 19
Americans and wounding hundreds of others prompted DOD to reexamine its
programs to protect both its forces and installations overseas. However,
U. S. forces remained vulnerable to terrorist attacks as demonstrated by
the

October 2000 al Qaeda bombing of the USS Cole in Yemen that killed 17 U.
S. sailors.

Overall Management at DOD, The Office of the Assistant Secretary of
Defense for Special Operations and

Joint Staff, and Service Levels Low- Intensity Conflict is responsible for
developing antiterrorism

guidance, providing policy oversight, and ensuring compliance with these
policies. In June 2001, the Principal Deputy Assistant Secretary of
Defense for Special Operations and Low- Intensity Conflict established
standards addressing antiterrorism planning, training requirements,
physical security measures, and related issues. 16 This office had earlier
issued a handbook in

1993 containing detailed guidance on antiterrorism policies and practices,
including guidance on assessment methodology. 17

The Chairman of the Joint Chiefs of Staff and the Deputy Director for
Global Operations in the Joint Chiefs of Staff Directorate for Operations
(J- 3) help implement the policy of the Assistant Secretary by reviewing
services* budgets, developing standards, making vulnerability assessments,
and representing regional commands on force protection issues. The Joint
Staff issued an installation- planning template to help installations
prepare their antiterrorism plans in July 1998 and currently manages the
Integrated Vulnerability Assessment Program. This program has teams, also
consisting

of staff from the Defense Threat Reduction Agency, that travel to military
15 For a more detailed discussion and our evaluation of DOD force
protection efforts, see U. S. General Accounting Office, Combating
Terrorism: Actions Taken but Considerable Risks Remain for Forces
Overseas, GAO/ NSIAD- 00- 181 (Washington, D. C.: July 19, 2000);

Combating Terrorism: Actions Needed to Improve DOD Antiterrorism Program
Implementation and Management, GAO- 01- 909 (Washington, D. C.: Sept. 19,
2001); and

Combating Terrorism: Actions Needed to Guide Services* Antiterrorism
Efforts at Installations, GAO- 03- 14 (Washington, D. C.: Nov. 1, 2002).

16 DOD Instruction 2000.16, DOD Antiterrorism Standards, June 14, 2001. 17
DOD Handbook O- 2000.12- H, Protection of DOD Personnel and Activities
Against Acts of Terrorism and Political Turbulence, Feb. 19, 1993.

installations (including those overseas) to conduct vulnerability
assessments and support installation commanders and local anti- terrorism/
force protection managers in writing force protection and WMD response
plans.

Each military service headquarters is responsible for implementing the DOD
antiterrorism program with assistance from the Joint Staff. Although
regional commands and installations directly implement force protection
policy, service headquarters control funding and personnel resources for
individual installations overseas. The services base their final funding
and staffing decisions on a review of the antiterrorism priorities and
requirements submitted by each combatant commander. The majority of

funding for force protection activities is for personnel, operations, and
maintenance appropriations for each service. The Chairman of the Joint
Chiefs of Staff*s Combating Terrorism Readiness Initiative Fund provides
additional funding. This fund is managed by the Joint Staff and supports
emergency or other unforeseen high- priority combating terrorism needs.
The services also issue regulations, orders and instructions to establish
their own specific antiterrorism policies and standards.

Regional and Installation Regional commands merge and prioritize the
antiterrorism requirements

Commander Responsibilities submitted by their respective installation
commanders. They use this

information to develop general antiterrorism policy for installations in
their geographic areas of responsibility. Such guidance takes precedence
over broader DOD or service guidance from Washington. They also determine
the type of threats their forces face, identifying the money and manpower
needed to achieve sufficient force protection, and work with the services
to provide the necessary resources.

Local installation commanders assume primary responsibility for the
protection of the forces, assets, and installations under their command
from terrorist attacks. They combine, adapt, and implement the force
protection standards established by DOD, combatant commanders, and the

service headquarters into an installation antiterrorism plan. Local
installation commanders, in concert with the installation*s designated
anti- terrorism/ force protection manager, compose a prioritized list of
antiterrorism requirements that they submit to their respective major
commands.

DOD Uses Risk When making these plans and listing their requirements,
installation

Management Approach commanders employ a *risk management* approach. 18
This approach is a

systematic, analytical process to determine the likelihood that a threat
will negatively impact physical assets, individuals, or operations and
identify actions to reduce risk and mitigate the consequences of an
attack. The principles of risk management acknowledge that although risk
generally cannot be eliminated, it can be significantly reduced by
enhancing protection from known or potential threats. Installation
commanders also rely on annual DOD assessments of threat, vulnerability,
and criticality of assets.

 Threat Assessment. This identifies and evaluates potential terrorist
threats on the basis of such factors as threats* capabilities, intentions,
and past activities. It represents a systematic approach to identify
potential threats before they materialize. It is performed by the
services*

investigative and intelligence agencies, which compile and examine all
available information concerning potential terrorist groups and criminal
activity that could affect the installation. The threat assessment may not
adequately capture all emerging threats, even in cases where the
assessment is frequently updated. The risk management approach, therefore,
uses vulnerability and criticality assessments as additional inputs to the
risk management decision- making process.

 Vulnerability Assessment. This identifies weaknesses that may be
exploited by terrorists and suggests options that address those
weaknesses. Teams of multidisciplinary experts in such areas as structural
engineering, physical security, and installation preparedness review the
installation*s antiterrorism program, including antiterrorism plans,
counterintelligence, law enforcement liaison, physical security, and
incident response measures.

 Criticality Assessment. This evaluates and prioritizes assets and
functions to identify which assets and missions are relatively more
important to protect from attack. They might consider a number of factors,
such as importance to the military mission, significance as a target,
accessibility by terrorists, construction, ease of reconstruction, and
monetary value.

18 See GAO- 03- 14.

The risk management approach and these annual assessments form the
foundation of each installation*s antiterrorism plan and support
decisionmaking to improve resource allocations. DOD Personnel at

Some DOD personnel overseas do not fall under the direct command of the
Diplomatic Posts

regional commands. For example, DOD personnel assigned to diplomatic post
would be protected as part of U. S. mission security (discussed in the
previous section). To clarify who is responsible for the protection of
these military personnel, DOD and State have signed a Memorandum of
Understanding, and regional commands have signed over 146 country- level
Memorandums of Agreement with their local U. S. ambassadors.

U. S. Programs and Activities Federal agencies also have programs to
protect senior- level officials from

to Protect Senior- Level terrorism during international travel. The U. S.
Secret Service, which

Officials recently transferred from the Department of the Treasury to the

Department of Homeland Security, provides protection to a limited number
of senior- level U. S. officials (for example, the President) at all
times, which includes travel overseas. In addition, the Secret Service
protects official

representatives of the United States performing special missions abroad.
19 The U. S. Secret Service has advance teams that work with host
countries to coordinate security of these U. S. officials that travel
overseas. In addition, if a protected person attends a special event
abroad, such as a bilateral or multilateral political or athletic event,
then the U. S. Secret Service works with the event security coordinators.
Even in cases where the President is not necessarily going to attend but a
number of other U. S. citizens will, the U. S. Secret Service also
provides consulting to help host nations provide for event security. For
example, the U. S. Secret Service, working with the State Department*s
Bureau of Diplomatic Security, is assisting the Greek and Chinese
governments in preparing for upcoming Olympic Summer Games in Athens in
2004 and Beijing in 2008, respectively. To support this protective
mission, as well as other missions, the U. S. Secret Service maintains 18
offices overseas.

19 The U. S. Secret Service is authorized under 18 U. S. C. S: 3056( a) to
protect the President, Vice President, their immediate families, former
Presidents, visiting heads of state, and other distinguished foreign
visitors as directed by the President, among others.

The U. S. Secret Service also provides security for heads of foreign
governments and other foreign distinguished guests while visiting the
United States. In addition, the U. S. Secret Service provides security for
foreign visitors when they attend certain international events in the
United States. 20 An example would be the 50th anniversary NATO summit
held in Washington, D. C., in April 1999, which included foreign heads of
state, ministers, and military leaders. For this one event, there were
over 1,000 escorts for dignitary motorcades. The U. S. Secret Service,
through its Uniformed Division*s Foreign Mission Branch, provides exterior
security for over 400 foreign diplomatic facilities (embassies,
chanceries, consulates, and ambassador residences) in the Washington, D.
C., area. To support its protective mission, the U. S. Secret Service has
an Intelligence

Division that oversees the identification, assessment, and management of
threats in support of domestic and foreign protectee visits and events of
national significance.

The State Department*s Bureau of Diplomatic Security also provides
protection to senior- level officials during international travel. These
officials are less senior than those protected by the U. S. Secret Service
and include the Secretary of State, Deputy Secretary, selected
ambassadors, and others U. S. officials overseas. Diplomatic Security
agents provide protection to other foreign dignitaries (other than heads
of state and certain others protected by the U. S. Secret Service) when
they visit the United States. These agents participate in more than 150
foreign and domestic dignitary details each year, protecting such diverse
individuals as

the Secretary General of NATO, President of the Palestine National
Authority, and the Dalai Lama. Also, the bureau provides security to
selected foreign officials residing in the United States. These protective
details are based upon the level of threat. The bureau also provides for

security in special international events in the United States. For the
50th anniversary NATO summit (discussed above), the bureau*s Dignitary
Protective Division was part of the security preparations and provided 48
protective details. For the 1996 Olympic Summer Games in Atlanta, the

bureau protected 14 foreign individuals from Israel, India, and Saudi
Arabia.

20 PDD 62 established a process to designate certain special events as
National Security Special Events, which warrant greater federal planning
and protection than other special events. This designation is based upon
the nomination of the National Security Council and certified by the
Attorney General and the Secretary of Homeland Security. In these events,
the U. S. Secret Service, the FBI, and Federal Emergency Management Agency
have specific roles for preventing and responding to a terrorist incident.

According to State Department officials, the Bureau of Diplomatic Security
is providing protective assistance to two heads of government in their own
countries* President Hamid Karzai in Afghanistan and President Alvaro

Uribe Velez in Colombia. According to bureau officials, they are providing
security and/ or advisors and training to these leaders because of the
extreme threat of assassination from terrorist groups and the relatively
weak capabilities for senior official protection in each country.

Protecting American The Department of State has several programs to help
warn Americans

Civilians Living, Working, living and traveling abroad against potential
threats, including those posed

and Traveling Abroad by terrorists. State*s Bureau of Consular Affairs
provides travel warnings,

public announcements, and Consular Information Sheets to American
civilians who are living, working, and traveling abroad. The bureau seeks
to provide important threat warnings and security information to U. S.
citizens and assets abroad in a timely and effective manner based on the
*No Double Standard* policy on dissemination of specific, credible
terrorist

threat information that has not or cannot be countered (i. e., it is the
policy of the U. S. government that official Americans cannot benefit from
receipt of information that might equally apply to the public, but is not
available to the public).

In fiscal year 2001, for example, the bureau issued 64 travel warnings,
134 public announcements, and 189 Consular Information Sheets. The
bureau*s Internet Web site received 117.9 million inquiries, 30.7 million
more than in fiscal year 2000. According to bureau data, 90 percent of the
users found the information helpful. The bureau also held 69 briefings for
stakeholder groups, including international student program participants,
travel agents, and others.

The bureau also maintains a warden system for notifying Americans who have
registered with the U. S. embassy or consulate of potential terrorist
threats. Warden networks consist of telephone- calling trees, e- mails,
fax systems, and other systems, as appropriate. The warden system covers
both U. S. embassy and consulate personnel and other registered Americans.
The system usually works by alerting major employers or compounds with
high concentrations of Americans. It is used for a variety of
communications purposes, from passing out voter information to notifying
wardens and their wards of U. S. embassy evacuations.

The Bureau of Diplomatic Security manages the Overseas Security Advisory
Councils, which provide security support to U. S. businesses and

private- sector organizations worldwide. The councils are a joint effort
between State and the private sector. They foster exchange of security and
threat information, implement security programs, and provide a forum to
address security concerns. Embassy regional security officers coordinate
with council headquarters in Washington, D. C., to set up, develop, and
maintain councils in country. Presently, councils are active in 47
countries worldwide.

Coordination Mechanisms The Department of State is responsible for
maintaining an effective

for Protecting security program at U. S. diplomatic missions worldwide and
for

U. S. Government Facilities coordinating all federal agencies* efforts to
protect U. S. government

and Americans Abroad facilities and Americans abroad. At U. S. missions,
the country team is the

primary coordinating mechanism. It typically consists of the ambassador,
deputy chief of mission, and key functional personnel, including
representatives from other federal agencies represented at the U. S.
mission. The regional security officer has primary coordinating
responsibility for security programs and activities at U. S. missions.

In addition, the Bureau of Diplomatic Security provides security liaison
officers to DOD*s regional military commands: the U. S. Central Command at
MacDill Air Force Base, Florida; U. S. European Command in
StuttgartVaihingen, Germany; U. S. Pacific Command at Camp H. M. Smith,
Hawaii; and U. S. Southern Command in Miami, Florida. These officers
coordinate with the commands on theater threat assessments, contingency
planning, and implementation of Department of State and DOD agreements on
overseas security support.

In Washington, D. C., the Overseas Security Policy Board considers,
develops, coordinates, and promotes standards and agreements in overseas
security operations, programs, and projects, which affect all federal

agencies under an ambassador*s authority abroad. The board, which is
chaired by the Director of State*s Bureau of Diplomatic Security, consists
of representatives from the Departments of Agriculture, Commerce, Defense,
Justice, State, Transportation, and the Treasury; USAID; the CIA;

Peace Corps; Federal Aviation Administration; and OMB. Since 1990, the
board has issued 37 standards for U. S. missions overseas. The standards
address the full spectrum of security programs pertaining to terrorism and
other threats. These standards range from armored vehicles and protective
details for ambassadors to emergency plans and exercises and

residential security.

Public Diplomacy The National Security Strategy of the United States of
America and the

Builds International

National Strategy for Combating Terrorism call for the United States to
wage a *War of Ideas* against international terrorism, through effective
Support for

public diplomacy. Toward these objectives, the State Department and U. S.
Foreign Policy Broadcasting Board of Governors conduct efforts to improve
the image of the United States and support U. S. foreign policy. For
example, to forestall

possible negative perceptions of the United States and foster greater
understanding of U. S. policy for key international audiences, State
conducts public diplomacy through various media. Similarly, the

Broadcasting Board of Governors conducts international broadcasts to
worldwide audiences to help support U. S. strategic interests.

State Department The State Department helps build and influence
international opinion in Programs Promote

support of U. S. foreign policy objectives. Since the terrorist attacks on
the Anti- Terrorism Support

United States on September 11, 2001, State has encouraged international
support for efforts to combat terrorism overseas. For example, its
programs have generated over 240 newspaper, 100 radio, and 150 television
interviews, and over 300 opinion- editorial articles in newspapers either
signed or prepared for U. S. ambassadors. Almost 60 U. S. speakers have
traveled abroad on State- funded programs addressing September 11, 2001-
related issues. U. S. embassies have sponsored over 100 panel discussions
and over 220 speeches on combating terrorism. In addition,

Network of Terrorism, a department- produced print and electronic
pamphlet, is available in 36 languages and 1.3 million print copies are in
circulation.

Broadcasting Board of The Congress passed the United States International
Broadcasting Act of

Governors Promotes 1994 with the goal of reorganizing and consolidating U.
S. international

broadcast efforts. 21 The act created a bipartisan Broadcasting Board of
U. S. Foreign Policy on

Governors (the Board) to oversee and coordinate the efforts of all
Combating Terrorism nonmilitary international broadcasting. The Board
manages the operations of three federal broadcast entities* the Voice of
America, WORLDNET Television and Film Service, and the Office of Cuba
Broadcasting. The board also has supervisory authority over two non-
profit corporations* Radio Free Europe/ Radio Liberty and Radio Free Asia.
These broadcast

21 Title III, P. L. 103- 236, Apr. 30, 1994.

entities reach more than 125 markets worldwide in 65 different languages.
With a fiscal year 2003 appropriated budget of $514 million, the Board
employs 3,400 journalists, producers, technicians, and support personnel
in Washington, D. C., and throughout 90 news bureaus and offices
worldwide.

The Board*s over- arching goal is to reach significant audiences worldwide
in areas of strategic interest to the United States where freedom of the
press does not fully exist. The board*s strategic plan includes an
objective to *pioneer anti- terrorism broadcasting* to counter terrorists
use of media coverage that inflict fear and panic in the public. 22 One
project supporting anti- terrorism is the Middle East Radio Network (known
as *Radio Sawa* in the region) that broadcasts and analyzes news and
explains U. S. policies. Other recent initiatives in the region include
the Afghanistan Radio Network and a service targeted at young adults in
Iran called Radio Farda. Finally, the Congress has approved an initial
round of

funding for a new Middle East Television Network, which is expected to
launch later in 2003.

Coordination of Public The newly created Office of Global Communications
was designed to Diplomacy Activities

coordinate public diplomacy activities, including those related to
terrorism. The Office was established under Executive Order 13283 on
January 21, 2003, and will advise the President, heads of offices within
the Executive Office of the President, and senior government officials on
the most effective means of promoting the interests of the United States
abroad. According to the Executive Order, the office will coordinate
messages that

reflect the strategic communications framework and priorities of the
United States. The office is designed to facilitate the development of a
strategy among federal agencies to help communicate such messages. The
office will coordinate the deployment of *information teams* worldwide in
areas of high global interest and media attention. These teams are
intended to disseminate information to the on- site news media and assist
media

personnel in obtaining access to information, individuals, and events.
Prior to any deployments abroad, the office is to consult with the
Departments of State and Defense and notify the NSC.

22 Marrying the Mission to the Market: Strategic Plan 2002- 2007,
Broadcasting Board of Governors.

Visa and Border Visa and border controls are additional tools that are
designed to help

Controls Are Intended detect and prevent terrorism by keeping terrorists
and their materials out

of the United States. The National Strategy for Homeland Security has an
to Prevent Terrorists

objective to ensure the integrity of borders and prevent the entry of and
Their Materials unwanted persons. It also has an objective to increase the
security of from Entering the international shipping containers. According
to the strategy, of the annual 500 million people who enter the United
States legally, 330 million are not

United States citizens. 23 Some of these non- citizens need visas to enter
the United States.

The Department of State uses various tools to screen visa applicants to
identify potential terrorists. Intelligence and law enforcement agencies
support this visa screening process by maintaining databases and watch
lists of suspected terrorists and making that information available to the

State Department. Factors such as a visa applicant*s country of origin can
affect the level of scrutiny they receive. Visitors from certain countries
(known as visa waiver countries) are not required to have visas because
the Departments of State and Homeland Security have determined that they
represent a low risk. State investigates visa and passport fraud to help
maintain the integrity of travel documents and thus prevent terrorists
from receiving visas or entering the country under false names. Further,
the United States shares a 5, 525- mile border with Canada, a 1,989- mile
border with Mexico, and possesses 95,000 miles of shoreline. The
Department of Homeland Security guards the borders at and between almost
400 ports of entry, seeking to interdict terrorists and their materials at
the border. Finally, international cooperation is an important factor in
strengthening international visa and border controls. For example, the
State Department shares information on suspected terrorists with other
countries to enhance their border controls.

23 The actual number of different travelers into the United States is
unknown because some people enter the country many times a year.

Visa Controls Designed State*s Bureau of Consular Affairs, provides
overall supervision to consular to Keep Terrorists Out of the

officers at U. S. missions overseas. Consular officers adjudicate visa
applications from foreign citizens who wish to visit the United States. 24
United States These consular officers aim to facilitate travel for those
eligible to receive visas and deny visas to those who are ineligible. For
the most common categories of nonimmigrant visas, an applicant must
demonstrate that they (1) have a residence abroad, which they do not
intend to abandon, (2) intend to leave the United States after a limited
period of time, and

(3) intend to engage in legitimate activities related to that nonimmigrant
category. The most common nonimmigrant visas are those for temporary stays
for business or pleasure (79 percent), special worker visas (4.6 percent),
student visas (4.2 percent), and exchange visas (4 percent).

All applicant information is entered into the Consular Consolidated
Database before it is reviewed. The Bureau of Consular Affairs manages
this database. After being entered into the database, applicant
information is reviewed by a consular officer at a U. S. embassy or
consulate. At that point, the consular officer may call the applicant in
for an interview. The consular officer will conduct a name check on all
applicants who ultimately receive a visa. In addition, some applicants may
undergo a special security review if they fall into one of many special
categories of visa applicants. A visa can be refused at any stage after it
is entered into the database.

Besides supporting the bureau*s visa mission, the Consular Consolidated
Database also supports the work of law enforcement agencies. In fiscal
year 2002, for example, the bureau performed numerous searches of
nonimmigrant visa records at the request of federal law enforcement task

forces investigating the terrorist attacks on September 11, 2001. In
addition, the bureau*s Passport Services office provided law enforcement
with 305 records. The bureau used facial recognition software to compare
the photographs on the visa applications of the September 11, 2001,

hijackers in the database against other visa photographs. 24 A visa
enables a person to apply at a port of entry to enter the United States,
but it does not guarantee that a person will be able to enter the United
States. For a more detailed discussion of the nonimmigrant visa
application process, see U. S. General Accounting Office, Border Security:
Visa Process Should Be Strengthened as an Antiterrorism Tool,

GAO- 03- 132NI (Washington, D. C.: Oct. 21, 2002). This report evaluates
the visa process before September 11, 2001, and what changes have been
made since then. It makes several recommendations to strengthen the visa
process.

Various Databases Are Used to The Consular Lookout and Support System
(CLASS) name check system

Screen for Terrorists is the primary means through which consular officers
determine if a visa applicant is suspected of being a terrorist or could
pose other security

risks. Sources for information in CLASS include the State Department*s
database of visa refusals, the State Department*s interagency watch list
for terrorists, known as TIPOFF, and several other law enforcement and
intelligence sources. CLASS also uses Arabic and Russian/ Slavic language
algorithms to help increase the likelihood that the name check will find a
person*s name if it is in the database. Consular officers must run an
applicant*s name through CLASS before issuing a visa.

The CLASS name check system includes information from the TIPOFF terrorist
watch list, which is managed by State*s Bureau of Intelligence and
Research. This list contains declassified biographical information, such
as name, birth date, or passport number on thousands of suspected
terrorists. This information is drawn from sensitive all- source
intelligence and law

enforcement data provided by the FBI, the CIA, and other intelligence
community agencies. When a consular officer using CLASS receives a TIPOFF
*hit* on an applicant*s name, the officer refers the case to the TIPOFF
staff at the Department of State. The TIPOFF staff will then make
available the classified information supporting the TIPOFF entry to
authorized consular and legal experts within the Department of State, who
then determine whether the evidence is sufficient to deny the visa
request. The consular officer may not issue a visa until the Bureau of
Consular Affairs has responded with its security advisory opinion. TIPOFF
*hits* through the CLASS system are coordinated with the FBI and other
agencies. Foreknowledge of pending terrorist travel has, in the past,
enabled authorities to arrest terrorist suspects at ports of entry, or to
conduct surveillance of them inside the United States.

The Secretary of State, in consultation with the Attorney General, also
updated the Terrorist Exclusion List and the Foreign Terrorist
Organization lists, which designate groups as terrorist organizations.
Members or supporters of these organizations are to be denied entrance at
U. S. ports of entry and deported if found within the United States.

The State Department also strengthened its oversight over visa operations
by instituting new inspection measures. An embassy*s nonimmigrant visa
chief, the visa chief, or the consular section chief is now required to
periodically conduct spot checks of approved visa applications, in
addition to the spot checks for CLASS name check compliance that are
already in place. 25

Level of Visa Screening Varies by Depending on their nationality, a visa
applicant may require a special

Risk Level of Country of Origin security review. Special clearance
procedures and interagency name

checks for visa applicants from certain countries were originally designed
during the Cold War to screen out individuals who could pose a threat to
U. S. interests, primarily through espionage. After the September 11,
2001, terrorist attacks, the Departments of State and Justice revised
these procedures. As a result, all male visa applicants aged 16 through 45
from certain national groups received a 20- day computerized hold on their

applications, during which a visa physically could not be issued. The
application information was then electronically submitted to the FBI for
the actual name check. Once 20 days had passed, the computer unlocked the
applicant case. If a negative response had not been received from either
the State Department or the FBI by this time, then the consular officer
was permitted to issue a visa. This 20- day computerized hold requirement
ended in October 2002, when another program* the Visa Condor program*
became fully functional.

The Visa Condor program is a name check procedure that is initiated when
an applicant fulfills certain classified criteria. To help the consular
officer determine whether Visas Condor criteria have been met, the State
Department, in January 2002, began to require all 16- to 45- year old
males from certain national groups to fill out a supplemental visa
application form. This new form provides additional information such as an
applicant*s travel and educational history, employment information, and
military service. Under the Visas Condor process, the post sends an
applicant*s information to the FBI National Name Check Program, where it
is run against FBI databases. Some of the information in these databases
comes from the FBI*s Foreign Terrorist Tracking Task Force. 26 In the
event of a possible match, the information is sent back to the State
Department. The consular officer cannot issue a visa to an applicant
meeting Visas Condor criteria without an affirmative response from the
Department of State. In

25 See GAO- 03- 132NI.

July 2002, the Visas Condor procedure became mandatory for all applicants
over the age of 16 from countries listed as state sponsors of terrorism.

Visitors from Selected Countries The Visa Waiver Program allows persons to
enter the United States for

Do Not Need Visas tourism or business for 90 days or less without applying
for a visa if they

are a citizen from one of 27 participating countries. 27 Citizens from
participating countries would still be required to have a passport from
their home country and, upon arrival, pass through standard border
controls (discussed below). This program was created to improve U. S.
foreign relations and encourage foreign travel to the United States
without posing a threat to national security. 28 It also allowed the State
Department to perform greater visa screening in high- risk countries,
while scaling back its visa operations in low- risk countries. Country
participation is contingent upon a Department of Homeland Security and
Department of State review of the country*s political, social, and
economic situation; the quality and security of its passport system; its
border controls and immigration laws; its law enforcement policies and
practices; as well as other relevant matters. (Prior to March 1, 2003, the
Department of Justice performed this review with State.) Visa waiver
countries also must have a low

nonimmigrant visa refusal rate for their citizens, the ability to supply
machine- readable passports, and must offer visa- free travel for U. S.
citizens and nationals. The Secretary of Homeland Security, in
consultation with the Secretary of State, may terminate a country*s
participation in the program in the event of an emergency that threatens
U. S. security or law enforcement interests, such as severe economic

26 The FBI Foreign Terrorist Tracking Task Force is composed of personnel
from a range of agencies, including the Department of Justice*s FBI and
the Department of Homeland Security*s Bureau of Immigration and Customs
Enforcement. It coordinates a multi- agency effort to identify, locate,
and deny entry to or remove terrorists and their supporters from the
United States.

27 The 27 countries are Andorra, Australia, Austria, Belgium, Brunei,
Denmark, France, Finland, Germany, Iceland, Ireland, Italy, Japan,
Liechtenstein, Luxembourg, Monaco, the Netherlands, New Zealand, Norway,
Portugal, San Marino, Singapore, Slovenia, Spain, Sweden, Switzerland, and
the United Kingdom.

28 For a more detailed discussion and our evaluation of this program, see
U. S. General Accounting Office, Border Security: Implications of
Eliminating the Visa Waiver Program, GAO- 03- 38 (Washington, D. C.: Nov.
22, 2002). We reported on the process used to assess countries*
eligibility to participate in the Visa Waiver Program and the implications
in

eliminating the program. Such implications could affect U. S. relations
with other countries, U. S. tourism, and State Department resources
abroad; however, the impact on national security is unclear.

collapse or a breakdown of the rule of law within a country. 29
Previously, the Attorney General, in consultation with the Secretary of
State, had this authority. While the Justice Department has not
systematically collected data on how frequently potential terrorists and
other criminals have entered the United States, anecdotal information
indicates that such individuals have entered the United States under the
Visa Waiver Program

as well as with valid U. S. visas. Participating countries must certify by
October 26, 2004, that they have a program to issue tamper- resistant,
machine- readable passports that contain biometric and document
authentication identifiers. 30 This is required by the Enhanced Border

Security Act of 2002, which also conditioned participation on a country*s
timely reporting of its stolen blank passports to the United States. 31

State Department The National Strategy for Homeland Security has an
objective to combat

Investigates Visa and fraudulent travel documents. Toward this objective,
the State Department Passport Fraud

attempts to impede terrorist entry into the United States through its
investigations of visa and passport fraud. The Bureau of Diplomatic
Security investigates more than 3, 500 passport and visa fraud cases
annually, resulting in more than 500 arrests each year. A number of
suspects have been linked to terrorism. The bureau has 450 special agents
in over 160 countries and approximately 700 special agents assigned
throughout the United States. State*s Office of the Inspector General also
conducts visa and passport investigations.

29 GAO- 03- 38. 30 For a more detailed description and evaluation of
biometrics in this context, see U. S. General Accounting Office,
Technology Assessment: Using Biometrics for Border Security, GAO- 03- 174
(Washington, D. C.: Nov. 15, 2002). In this report, we identified

important policy trade- offs between increasing security and the impact on
areas such as privacy, economy, traveler convenience, and international
relations. Also, we reported that biometric technology can play a role in
associating a person with travel documents such as visas and passports.
When used at a border inspection, biometrics can help determine

whether to admit a traveler into the United States. 31 Enhanced Border
Security and Visa Entry Reform Act of 2002 (P. L. 107- 173), May 14, 2002.

Border Controls Attempt to Border controls staffed by officers from the
Department of Homeland

Deter Entry of Terrorists Security also play a role in deterring
terrorists and their materials from

and Their Materials entering the United States. All visitors, whether they
have visas or are

seeking to enter the United States under the Visa Waiver Program, are to
undergo inspections at U. S. ports of entry. The Border Patrol and U. S.
Coast Guard work between U. S. ports of entry to detect and prevent
terrorists and their materials from entering the United States. On March
1, 2003, the Immigration and Naturalization Service, Border Patrol, U. S.
Customs Service and U. S. Coast Guard became part of the new Department of
Homeland Security.

Immigration Controls Department of Homeland Security immigration
inspectors are to conduct a primary inspection of travelers arriving at a
U. S. port of entry. During these inspections, the immigration inspector
observes the applicant, examines their passport, and utilizes automated
databases to judge admissibility. The inspector should either permit
travelers to enter or refer them to secondary inspection, where a more
detailed examination of travel documents or further questioning can be
conducted. People may be refused entry for the same reasons they may be
refused a visa. Immigration inspectors use the Interagency Border
Inspection System* a multi- agency database of lookout information that
alerts inspectors of conditions that may make travelers inadmissible to
the United States. It also provides information about warrants for U. S.
citizens who may be wanted by U. S. law enforcement. Data sharing between
this system and the TIPOFF database began in 1991 and, since then, it has
enabled immigration inspectors to intercept 290 terrorists from 82
countries at 84 different ports of entry. In fiscal year 2001, immigration
inspectors using TIPOFF through the Interagency Border Inspection System
had 86 matches from the terrorism database at ports of entry. Of these, 38
were denied entry and 1 was arrested. During primary inspection, the tools
used by immigration inspectors differ according to type of entry.

 Air Ports of Entry. At the 155 air ports of entry, commercial airline
carriers are required to transmit passenger and crew manifests to
immigration inspectors through the Advance Passenger Information System
for flights into the United States. This information includes a
passenger*s name, date of birth, nationality, and passport number. With
this information, immigration inspectors can analyze intelligence on
passengers before flights arrive and identify passengers who will require

referral to secondary inspection. Immigration inspectors at air ports of
entry have access to the Interagency Border Inspection System.

 Sea Ports of Entry. At the 86 sea ports of entry, primary inspection at
stations equipped with the Interagency Border Inspection System functions
much the same as airports. Where this system is not available, immigration
inspectors board ships with the Portable Automated Lookout System. This
system contains lookout information, which immigration inspectors use to
conduct name checks and examine documents of all aliens aboard a vessel.

 Land Ports of Entry. At the 154 land ports of entry, immigration
inspectors can query the Interagency Border Inspection System with a
traveler*s name, passport, or license plate number. Documents and names of
a vehicle*s driver are checked randomly or when an inspector suspects that
something is wrong.

An immigration inspector can refer a traveler to secondary inspection at
any port of entry. In secondary inspection, inspectors are to review a
traveler*s documents for accuracy and validity and check various databases
for any information that could affect the traveler*s entry, including
criminal history information from the FBI and non- immigrant visa issuance
data

from State Department. An immigration inspector conducting a secondary
inspection can also utilize a fingerprint identification system to
determine whether a traveler has been previously apprehended for an
immigration offense or is wanted by U. S. law enforcement. As mentioned
above, a traveler may be refused entry for the same reasons they can be
denied a visa. 32

A number of new immigration initiatives were started after September 11,
2001. The predominant focus of these initiatives has been to establish
relationships with other countries to coordinate with their border, law
enforcement, and intelligence officials on immigration matters.

 Operation Global Shield. For this operation, the former Immigration and
Naturalization Service deployed *immigration control officers* to a number
of overseas transit points around the world to push out the

32 For a more detailed discussion and our evaluation of INS border
security processes, see GAO- 03- 174 and U. S. General Accounting Office,
Illegal Aliens: INS* Processes for Denying Aliens Entry into the United
States, GAO- 02- 220T (Washington, D. C.: Nov. 13, 2001). In this
testimony, we discussed INS* processes for denying aliens entry at land
and airports of entry, including the expedited removal and credible fear
processes. In addition, see our testimony Weaknesses in Screening Entrants
into the United States, GAO- 03- 438T (Washington, D. C.: Jan. 30, 2003).

U. S. line of defenses against illegal immigration related to terrorism.
These officers, who have no law enforcement authority in these foreign
countries, have an advisory and consultative role. The specific functions
of Operation Global Shield are to disrupt and deter the smuggling of
select aliens, prevent the movement of persons who are security risks,

provide advance notice of passengers warranting closer inspection upon
arrival, collect law enforcement intelligence, cooperate on apprehensions
and prosecutions, and provide training on fraudulent

travel documents.  Operation Southern Focus. For this operation, the
former Immigration

and Naturalization Service deployed special agents and intelligence
analysts abroad to target key smuggling organizations in Latin America and
the Caribbean. These U. S. personnel have been working with authorities in
Mexico, Guatemala, Panama, and the Dominican Republic, as well as other U.
S. personnel stationed overseas to identify, investigate, and prosecute
regional smuggling organizations. According

to officials, undercover operations are ongoing in several areas to
capture key smugglers and return them to the United States.

Customs Controls At ports of entry, Department of Homeland Security
customs inspectors look for illegal materials, such as drugs, currency,
and explosives, whether or not the contraband is intended for terrorism.
While most of the customs inspection equipment was developed and acquired
to detect drugs, the majority of this equipment does not detect specific
substances but detects anomalies in general. For example, X- ray machines
may alert an inspector to something unusual about an item being examined
and, therefore, the possible concealment of materials. 33

The Department of Homeland Security also utilizes export controls to
prevent illegal exporters, terrorist groups, and international criminal
organizations from (1) trafficking in weapons of mass destruction and
their components; (2) obtaining and illegally exporting controlled
commodities, technologies, conventional munitions, and firearms; (3)
exporting stolen property from the United States; and (4) engaging in
financial and other

33 For a more detailed description and evaluation of these efforts, see U.
S. General Accounting Office, Container Security: Current Efforts to
Detect Nuclear Materials, New Initiatives and Challenges, GAO- 03- 297T
(Washington, D. C.: Nov. 18, 2002). In this

testimony, we reported that programs in place to detect certain terrorist
materials were limited in a number of respects and rely heavily on the
availability of quality information for targeting those cargoes posing the
greatest risk.

transactions that support these activities or that violate U. S. sanctions
and embargoes.

A number of new customs initiatives were started after September 11, 2001.
The predominant focus of these initiatives has been to establish
additional lines of security in the supply chain of international
commerce. Examples of these initiatives are below.

 Container Security Initiative. This program, initiated by the former U.
S. Customs Service, seeks to extend customs inspections beyond U. S. ports
of entry rather than waiting for these goods to arrive in U. S. ports for
screening and inspection. Begun in January 2002, its goal is to place U.
S. customs personnel at ports of origin or transit to screen cargo
containers and select high- risk containers for inspection by the host
country*s customs administration. As one of its first steps, the United
States entered into negotiations with governments of the top 20 *mega-
ports* that handle 66 percent of the containers destined for the United
States. As of the end of January 2003, 11 governments representing 16 of
the top 20 mega- ports have signed arrangements, and the United States has
placed customs officers in 2 of these ports. 34 The United States also has
placed customs officers at 3 ports in Canada,

which are not among the top 20 mega- ports. Other elements of the
Container Security Initiative include improving security criteria to
identify high- risk containers, expanding the use of technology in the
United States and foreign ports to examine high- risk containers, and
developing the use of smart and secure containers.

 Customs Trade Partnership Against Terrorism. This program, also
initiated by the former U. S. Customs Service, focuses on efforts by
importers and others to enhance security procedures along their supply
chains in exchange for certain benefits, such as reduced likelihood of
inspections. As part of this initiative, which began in April 2002,
importing businesses, freight forwarders, carriers, and other logistics

providers enter into agreements with the United States to voluntarily
undertake measures that will reduce security vulnerabilities. 34 The 11
governments and their ports are Belgium (port of Antwerp), France (port of
Le Havre), Germany (ports of Bremerhaven and Hamburg), China (port of Hong
Kong), Italy (ports of Genoa and La Spezia), Japan (ports of Tokyo,
Nagoya, Kobe, and Yokahama), the Netherlands (port of Rotterdam),
Singapore, South Korea (port of Pusan), Spain (port of Algeciras), and
United Kingdom (port of Felixstowe). As of January 2003, the Department of
Homeland Security had placed customs officers at the ports of Rotterdam
and Le Havre.

 Project Shield America. This industry outreach program was launched by
the former U. S. Customs Service in December 2001 and seeks the
cooperation of companies involved in the manufacture, sale, and/ or export
of U. S.- origin technology and munitions items in identifying suspicious
or unusual inquiries or orders. Customs agents have visited over 5,000
companies since the inception of Project Shield America and

have initiated dozens of criminal investigations based on information
gathered during these visits.

Border Patrol Between Ports Between U. S. ports of entry, the Department
of Homeland Security*s of Entry

Border Patrol has the mission to detect and apprehend illegal aliens and
smugglers (including potential terrorists). The Border Patrol, formerly
part of the Immigration and Naturalization Service, has a workforce of
about

9,500 agents and is responsible for patrolling about 6,000 miles of
Mexican and Canadian international land borders and 2, 000 miles of
coastal waters surrounding the Florida Peninsula and the island of Puerto
Rico. Agents patrol these borders utilizing various vehicles, including
aircraft, marine vessels, all- terrain vehicles, and horse units. Border
Patrol agents also conduct traffic checks on selected major highways
leading away from the border. They also maintain bike patrols in some
urban areas near ports of entry. In fiscal year 2002, Border Patrol agents
made nearly 1 million apprehensions of aliens attempting to enter or
reside in the country illegally.

Maritime Controls Outside Ports The U. S. Coast Guard, which transferred
from the Department of of Entry

Transportation to the Department of Homeland Security in March 2003,
participates in efforts to detect terrorists and their materials outside
maritime ports of entry. Shortly after the September 11, 2001, terrorist
attacks, the U. S. Coast Guard modified its ship arrival notification
requirements as part of its screening process for identifying and boarding
vessels of special interest or concern. The modification requires all
vessels over 300 gross tons to contact the U. S. Coast Guard 96 hours* up
from 24 hours* before they are scheduled to arrive at a U. S. port. Each
vessel

must provide information on its destination, its scheduled arrival, the
cargo it is carrying, and a roster of its crew. This information, which is
processed and reviewed by the U. S. Coast Guard*s National Vessel Movement
Center,

is used in conjunction with intelligence data to identify *high interest*
vessels. Decisions on appropriate actions to be taken with respect to such
vessels, such as whether to board, escort, or deny entry are based upon
established criteria and procedures.

International Cooperation International cooperation is an essential tool
in restricting terrorist

Efforts to Strengthen Visa movements around the globe. State*s Office of
the Coordinator for

and Border Controls Counterterrorism uses the Terrorist Interdiction
Program to enhance

border security by providing participating foreign governments with a
computerized database that allows border control officials to identify and
detain or track individuals of interest. The program currently is
installed in 2 foreign countries, with another 60 countries under
consideration. State plans to install the program in up to five new
countries per year. Additionally, the USA PATRIOT Act authorizes the
Secretary of State to share sensitive visa information with foreign
government officials where appropriate.

International cooperation is also important in preventing terrorist
materials from entering the United States. As mentioned, the Department of
Homeland Security is working with other countries to place its customs
agents overseas as part of the Container Security Initiative. In addition,
the United States is working with several international organizations in
setting standards and procedures for cargo security.

International Maritime The International Maritime Organization is
responsible for improving

Organization maritime safety, including combating acts of violence or
crimes at sea. Following the September 11, 2001, terrorist attacks, the
organization

started drafting new regulations needed to enhance ship and port security
and to prevent shipping from becoming a target of international terrorism.
The International Maritime Organization adopted port and ship security
measures in December 2002 at its conference of the parties to the
International Convention for the Safety of Life at Sea. 35

World Customs Organization The World Customs Organization is an
independent, intergovernmental body whose mission is to enhance the
effectiveness and efficiency of

35 The International Convention for the Safety of Life at Sea amendments
and its accompanying International Ship and Port Facility Security Code
include a number of measures, such as (1) shipboard automatic identifier
systems; (2) ship- to- shore alert systems; (3) port state control over
ships; (4) continuous maintenance of ship registry, ownership, and
operational control information; and (5) clear responsibilities for threat
assessments and security plans. In November 2002, the President signed the
Maritime Transportation Security Act of 2002 (P. L. 107- 295), Nov. 25,
2002, that, according to the State

Department, tracks very closely with these international measures. The U.
S. Coast Guard currently is developing regulations to implement the
International Convention for the Safety of Life at Sea, International Ship
and Port Facility Security Code, and the Maritime Transportation Security
Act.

customs administrations. In September 2002, the organization established a
task force to develop new guidelines for supply chain security. U. S.
customs agents are participants in this task force, which is scheduled

to complete its work in June 2003. The task force will examine numerous
security related topics, including enhancing in- transit controls,
improving technology, and better data for selecting which cargoes to
inspect.

International Organization The International Organization for
Standardization is another important

for Standardization international body involved in improving supply chain
security. It is a

worldwide nongovernmental federation of national standard bodies from more
than 140 countries that attempts to standardize various activities and
products related to international trade. The organization currently is
participating in a pilot project dealing with electronic seals on cargo
containers.

International Labor Organization The International Labor Organization is a
United Nations (UN) agency that sets requirements for seafarer
identification documents. Such documents are important for checking on the
background of crewmembers who are transporting cargo destined for the
United States. Since February 2002, this organization and the
International Maritime Organization have been working on the issue of
seafarer documents.

UN Subcommittee of Experts on The UN Subcommittee of Experts on
Transportation of Dangerous

Transportation of Materials provides advice on international regulations
concerning the

Dangerous Materials transport of dangerous materials. U. S. Department of
Transportation

delegates to the subcommittee have worked collaboratively with other
governments to develop a consensus on new security requirements.

International Civil The International Civil Aviation Organization is
working to set improved

Aviation Organization security standards for travel documents, such as
passports and visas.

Coordination Mechanisms Border security is an issue that crosses both
homeland security and Related to Border Security

combating terrorism overseas. The Office of Homeland Security (the
domestic equivalent of the NSC with respect to terrorism) coordinates
issues across agencies through a number of policy coordination committees.
The office has a specific policy coordination committee for Key Asset,
Border, Territorial Waters, and Airspace Security. In addition, the
overall strategy for border security is described in the National

Strategy for Homeland Security and includes ensuring the integrity of
borders and preventing the entry of unwanted persons. In addition, the new

Department of Homeland Security serves a coordination role by
consolidating several agencies that were formerly under separate
departments including the Immigration and Naturalization Service,

U. S. Border Patrol, U. S. Customs Service, and U. S. Coast Guard. The new
department has a Directorate of Border and Transportation Security charged
with preventing the entry of terrorists and securing the borders:
territorial waters; ports; terminals; waterways; and air, land, and sea
transportation systems of the United States.

Agencies also attempt to coordinate border security activities by sharing
selected information on their various watch lists. Nine federal agencies
develop and maintain 12 watch lists of suspected and known criminals and
terrorists. 36 As mentioned above, the Department of State provides
information from CLASS to the Interagency Border Inspection System. This
enables State, law enforcement and intelligence agencies, and immigration
officials to share information on individuals who should not receive U. S.
visas. State also provides information on lost and stolen U. S. passports
to the Department of Homeland Security.

Efforts to prevent terrorist materials from entering the United States are
coordinated through an Interagency Container Working Group. This group is
co- chaired by the Departments of Transportation and the Treasury. The
Secretary of Transportation established this group to address the security
issues surrounding the movement of marine cargo containers through the
international transportation system. For example, the group has made
recommendations to improve the security of container transportation. These
recommendations include such measures as improving the coordination of
government and business container security activities, enhancing cargo
data collection, and improving the physical security of containers.

36 For a more detailed description and evaluation of these watch lists,
see U. S. General Accounting Office, Information Technology: Terrorist
Watch Lists Should Be Consolidated to Promote Better Integration and
Sharing, GAO- 03- 322 (Washington, D. C.: Apr. 15, 2003). We reported that
the federal government*s

approach to using watch lists in performing its border security mission is
decentralized and nonstandard and recommended that the Secretary of the
Department of Homeland Security, in collaboration with the heads of other
agencies that have and use watch lists, lead an effort to consolidate and
standardize the federal government*s watch list structures and policies.

Coalition Capabilities One of the enduring policy principles that guides
U. S. strategies to combat

Are Enhanced through terrorism overseas is bolstering the counterterrorist
capabilities of those

countries that work with the United States and require assistance. The
Bilateral Programs

National Security Strategy of the United States of America calls for and
Activities

ensuring that other nations have the political, law enforcement,
financial, and military tools to combat terrorism within their borders. In
addition, the National Strategy for Homeland Security calls for the United
States to help foreign nations combat terrorism. These efforts to improve
other countries* capabilities are another part of preventing terrorism led
by the Department of State. The department has overall leadership of
bilateral relations, including programs to assist foreign nations. Such
programs consist of training, equipment, and other assistance to improve
foreign police and

military capabilities. While State has the overall lead, many of these
assistance programs are implemented in conjunction with the Departments of
Defense, Justice, and the Treasury. For example, the Antiterrorism
Assistance program is managed by State while some training is provided by
other agencies, such as the FBI, Drug Enforcement Administration, and U.
S. Secret Service. Such training by other agencies is provided under the
direction and oversight of the Bureau of Diplomatic Security*s
Antiterrorism Assistance program. These assistance efforts seek to not

only prevent terrorist attacks, but also improve the capabilities of other
countries to disrupt and destroy terrorists and to respond to terrorist
incidents.

Training to Improve Other Many U. S. coalition partners that want to
eliminate terrorism in their own

Countries* Law countries do not have the capability to combat terrorism
effectively in the

Enforcement Capabilities to areas of law enforcement and security. Many
are developing countries

Combat Terrorism that lack human and other resources needed to establish
and maintain an

effective antiterrorism program and infrastructure. U. S. law enforcement
training programs and facilities help build the capacity of coalition
partner nations to combat terrorism overseas and augment their existing
capabilities by providing training, relevant support equipment, and
technical advice. These programs and facilities include the (1)
Antiterrorism Assistance program, (2) International Criminal

Investigative Training Assistance Program (ICITAP), (3) Office of Overseas
Prosecutorial Development, Assistance and Training (OPDAT), (4) Countering
Terrorist Financing, (5) FLETC, and (6) International Law Enforcement
Academies (ILEA).

Antiterrorism Assistance The Bureau of Diplomatic Security*s Office of
Antiterrorism Assistance

Program designs, manages, implements, provides oversight, and evaluates
the

Antiterrorism Assistance program. The program provides training to
approved foreign national participants in five areas: (1) law enforcement,
(2) protection of national leadership, (3) control of borders, (4)
protection of critical infrastructure, and (5) crisis management. Since
its inception in 1983 as a major initiative against international
terrorism, the program through fiscal year 2001 has trained more than
28,000 foreign law enforcement and security personnel representing 124
countries in crisis management, dignitary protection, bomb detection,
airport security, border control, kidnap intervention, terrorist
financing, pipeline security, and response to incidents involving weapons
of mass destruction. These foreign law enforcement and security personnel
can help protect Americans living, working, and traveling abroad, because
they are responsible for taking offensive action against international
terrorist cells and networks that target Americans overseas and in the
United States. They also have the primary responsibility for responding to
and mitigating the impact of terrorist attacks* including those directed
against U. S. targets* that occur in their home countries.

State*s Office of the Coordinator for Counterterrorism provides policy
guidance to the program and ensures that the training assistance reflects
U. S. national objectives and priorities. According to State*s Office of
the Coordinator for Counterterrorism, antiterrorism assistance is
considered on a priority basis for countries that meet one or more of the
following criteria: (1) the country is categorized as a critical or high-
threat for terrorism and cannot adequately protect U. S. facilities and
personnel in the country with their own resources, (2) a substantial U. S.
presence exists in the country, (3) the country is served by a U. S. air
carrier or is the last point of departure for airline flights to the
United States, (4) important bilateral policy interests are at stake, and/
or (5) the country is not in violation of

human rights legislation. Training may be initiated by the U. S.
government or requested by the potential participant government. Once
State makes a policy determination that antiterrorism assistance is
needed, the U. S. mission in that country determines if such assistance is
feasible. A Bureau of Diplomatic Security- led team of experts assesses
the country*s civil police antiterrorism capabilities and identifies
specific training needs.

The team considers five basic areas that are fundamental in any nation*s
defense against terrorism. Collectively, they establish the framework for
determining a country*s ability to deter and/ or respond to terrorist
threats. The team assesses the host government*s ability to (1) enforce
the law, preserve the peace, and protect life and property; (2) protect
its national

leadership, the seat and functions of government, and the resident
diplomatic corps; (3) control its international borders; (4) protect its
critical infrastructure; and (5) manage crises having national
implications.

Finally, State*s Bureau of Democracy, Human Rights, and Labor helps
determine a country*s eligibility to participate in the program based on
the country*s human rights record. U. S. missions abroad screen each
training candidate to ensure that no human rights abusers or foreign
officials involved in corrupt practices are included.

Most of the antiterrorism assistance involves U. S.- based training,
technical consultations, seminars, in- country training, exercises, and
program reviews. Training is tailored to meet a country*s specific needs
in various police and internal security disciplines. While the program
does not provide basic police training, it does provide courses designed
to improve functional police skills, mid- level supervisory skills, and
senior- level management and leadership skills. Training is provided at
various federal, state, local, and private contractor venues in the United
States. In addition, the Antiterrorism Assistance program proposes to
build a Center for

Antiterrorism and Security Training at the U. S. Army*s Aberdeen Proving
Ground, Maryland, which would be a consolidated state- of- the- art
facility for training in antiterrorism disciplines. In addition to meeting
the program*s growing demands for classroom space, the facility, if
approved by the Congress, would include shooting and explosives ranges, a
tactical driving track, and an extensive urban tactical training complex.
Overseas training is conducted in the participant country to help sustain
program effectiveness. Training is done by a variety of federal agencies.
For example, the ATF supports the Antiterrorism Assistance program through
its explosives enforcement officers, who have traveled to more than

43 countries to evaluate foreign governments explosives incidents
countermeasures and response capabilities, and ability to neutralize
explosives threats.

The program also provides non- standard assistance* if there is a
compelling need. Courses, consultations, or advisory assistance to address
significant security threats can include police administration,
management, and organizational effectiveness; police instructor training;
police academy development; judicial security; interview and investigative
techniques; and integrated exercises. Recent technical consultations, for
example, focused with Egypt on explosive detector dogs, with Greece on
security preparations for the 2004 Olympic Summer Games in Athens, and
with Yemen on investigations.

The Antiterrorism Assistance program also provides participant countries
with grants to purchase equipment directly related to the training. For
example, grants might be used to procure airport passenger and baggage
screening equipment, crime scene investigation kits, bomb render- safe
tools, and tactical and communication equipment. To provide control over

the transfer of such equipment, the regional security officer at the U. S.
mission provides the equipment to the appropriate foreign government end-
user( s). Once a participant country has received a significant amount of
assistance and has had sufficient opportunity to incorporate it into its
security operations, State conducts a program review to determine if the
assistance should be expanded, refocused, or curtailed.

The effectiveness of the Antiterrorism Assistance program, according to
the Department of State, rests in its ability to reduce the threat of
terrorism toward U. S. facilities overseas and U. S. personnel living,
working, and traveling abroad. U. S. missions operating in participant
countries experience a close working relationship with the host nation*s
law enforcement and security forces. The program also is intended to
provide the participant country police and security forces with a cadre of
trained officers, familiar with American values and thinking, with whom
the regional security officer and other U. S. mission personnel can rely
on during a crisis. For example, in preparation for the 2004 Olympic
Summer

Games in Athens, Greek law enforcement officials have used the
Antiterrorism Training program and equipment grants to improve their
security preparations by participating in explosive ordnance and vital
installation security training. Antiterrorism Assistance program- trained
explosive detection dogs also are being requested from surrounding
countries to assist the Greek police. These K- 9 units have the potential
to assist with the protection of U. S. interests during the 2004 Olympic
Summer Games.

Mobile Emergency After the terrorist attacks of September 11, 2001,
Antiterrorism Assistance Training Team

program officials realized that key *front line* states in the war on
terrorism often did not have adequate personnel to send anyone to the
United States for training at the program*s U. S.- based facilities.
Pakistan, for example, declined all Antiterrorism Assistance training
offers for months for that reason. In response to the urgency surrounding
training support requirements of *front line* countries, program officials
decided to forego the U. S. training experience and provide more in-
country training, because participants may have to be withdrawn to handle
operational crises. Thus, the program established the Mobile Emergency
Training Team that can be airborne on 72 hours notice to provide this
training in the

participant country. Instructors will be trained in four key disciplines:
VIP protection, critical response team (special weapons and tactics)
operations, bomb disposal operations, and high- risk police patrol/
firearms instructor training.

International Criminal The purpose of ICITAP, which is located in
Justice*s Criminal Division, is to

Investigative Training provide training and development assistance to
foreign police agencies

Assistance Program worldwide in the form of technical advice, training,
mentoring, equipment

donation, and internships with criminal justice organizations. The mission
of ICITAP is to support U. S. foreign policy and criminal justice goals by
helping foreign governments develop the capacity to provide modern
professional law enforcement services based on democratic principles and
respect for human rights. ICITAP also has direct antiterrorism
applications,

which are discussed below. Specific ICITAP activities or projects are
initiated at the request of the NSC, Department of State, and/ or USAID in
agreement with the foreign governments requesting the assistance. Priority
is to be given to countries in transition to democracy, where unique
opportunities exist for major restructuring and refocusing of police and
investigative resources toward establishment of the rule of law.
Currently, ICITAP is managing programs in 18 countries and a regional
program in the Newly Independent States. 37

Although focused primarily on supporting U. S. criminal justice goals
internationally, according to the Department of Justice, ICITAP also has a
number of direct antiterrorism applications to include: (1) infrastructure
development training and technical assistance, (2) criminal investigator
training, (3) training academy development, (4) information acquisition,
management, and analysis, (5) forensics technical assistance and training,
(6) professional responsibility, (7) border control, (8) civil disorder
management and control, and (9) managing significant events.

37 ICITAP*s Newly Independent States Regional Assistance Program includes
Belarus, Georgia, Moldova, Kazakhstan, Kyrgyzstan, Turkmenistan, Ukraine,
and Uzbekistan.

Office of Overseas Prosecutorial Created in 1991, OPDAT provides justice-
sector institution- building

Development, Assistance assistance, including training of foreign judges
and prosecutors in and Training

coordination with various government agencies and U. S. embassies.
Although part of Justice*s Criminal Division, OPDAT programs are funded
principally by the Department of State and USAID. 38

OPDAT programs take place in South America, the Caribbean, Central and
Eastern Europe, Russia, the new independent states of the former Soviet
Union, Africa, the Middle East, Asia, and the Pacific region. In many of
these countries, OPDAT has placed resident legal advisors. The advisors
are experienced prosecutors who are intended to interact with local
justice- sector officials and direct OPDAT assistance projects. These
projects seek to strengthen the legislative and regulatory criminal
justice infrastructure within the host country, and enhance the capacity
of that

country to investigate and prosecute crime more effectively, consistent
with the rule of law. USAID*s Center for Democracy and Governance has an
agreement with Justice that allows USAID missions around the world to
access OPDAT for help in activities such as conducting justice sector
assessments, reviewing laws and legislation, designing rule of law
programs, and providing other technical assistance.

In response to the August 1998 terrorist bombings of the two U. S.
embassies in East Africa* and at the suggestion of State*s Office of the
Coordinator for Counterterrorism, the Bureau of Diplomatic Security*s
Antiterrorism Assistance program sponsored (in cooperation with OPDAT,
Justice*s Counterterrorism Section, and the FBI) the development of the

Financial Underpinnings of Terrorism Program specifically to assist U. S.
coalition partners in identifying and attacking terrorism*s financial
aspects. Because the motive behind terrorist crimes is often political or

ideological rather than financial, terrorists* revenues, expenditures, and
methods of moving funds differ from profit- oriented organized crime
networks. Thus, this program takes a somewhat different approach to
combating money laundering and organized criminal activity. The program
conducts one session for senior policy level officials and a second
session 38 USAID also supports programs to train foreign law enforcement,
prosecutors, and judges

and to assist in rewriting legislation and criminal sentencing guidelines.
USAID missions and State*s Bureau for Democracy, Conflict, and
Humanitarian Assistance have rule- of- law and governance programs in
about 60 of the 85 countries where USAID has a presence.

for front- line investigators, analysts, judges, and prosecutors. Senior
officials receive training on the methods of financing terrorism,
financial investigation as a means of combating terrorism, and legal and
operational

impediments, while the front- line officials conduct practical exercises
and receive training focused on developing best practices for
investigating and prosecuting those engaged in providing financial support
to terrorists. According to OPDAT, sessions to date, for example, have
helped strengthen Philippine money- laundering laws, which enhance the
Philippine*s ability to detect and disrupt terrorist financing; provided
assistance to Azerbaijan on counter- terrorist legislation; and helped
State conduct a counterterrorism assessment in Pakistan.

Working with the State Department*s Office of the Coordinator for
Counterterrorism and the Antiterrorism Assistance program, OPDAT organized
a series of seven seminars in Washington, D. C., to help provide

guidelines to countries in strengthening their counterterrorism
legislation and regulations and in complying with UN Security Council
Resolution 1373. U. S. government experts, as well as presenters from the
United Nations, Australia, Canada, Germany, and the United Kingdom,
conducted the seminars for 36 participating countries. The Office of the
Coordinator

for Counterterrorism and OPDAT also provided a similar seminar in Botswana
in March 2003 to southern African countries.

A key element in protecting Americans against the threat of terrorism is
U. S. assistance to its coalition partners in strengthening their capacity
to investigate terrorist activity and prosecute and adjudicate overseas
terrorist criminal acts, consistent with the rule of law. OPDAT*s
CounterTerrorism Project takes a comprehensive, institution- building
approach seeking to strengthen a country*s capability to investigate,
prosecute, and adjudicate terrorist activity. To meet that goal, OPDAT*s
Counter- Terrorism Project tries to (1) assist the host country in
building or strengthening the legislative and regulatory infrastructure
necessary to address threats from terrorist activity; (2) enhance, through
development of relevant skills, the

capacity 39 of host country officials to counter terrorist groups; (3)
strengthen the capacity of host country to prevent, investigate, and
prosecute terrorist groups through team building, cooperative and regional

39 The term *capacity* means the potential of the host country*s justice
sector human resources* its prosecutors and judges, police and other
investigative personnel, and court and penal system officials.

approaches; and (4) sustain results achieved through the development of
permanent structures.

Countering Terrorist Financing State*s Office of the Coordinator for
Counterterrorism and Bureau for International Narcotics and Law
Enforcement Affairs, along with the Departments of Justice and the
Treasury, have a program called Countering Terrorist Financing. This
program provides training and assistance to foreign governments to
strengthen their financial and regulatory regimes to

reduce terrorist financing. Federal Law Enforcement

The Department of Homeland Security*s FLETC, headquartered in Glynn
Training Center

County (* Glynco*), Georgia, serves as an interagency law enforcement
training organization for federal law enforcement agencies. The center
also provides services to state and local and international law
enforcement agencies. FLETC offers selected, specialized training programs
for foreign law enforcement personnel through its International Programs
Division. These offerings are designed to meet training needs not
generally available to these agencies and to enhance networking and
cooperation throughout the law enforcement community. The Department of
Homeland Security supervises FLETC*s administrative and financial
activities, while FLETC*s partner organizations 40 have considerable input
regarding training issues and operational and functional aspects of the
center. Representatives from these agencies take part in regular
curriculum review and development

conferences as well as the development of FLETC policies and directives.
As administered under FLETC*s International Programs Division, training is
provided at the center through State*s Antiterrorism Assistance program
and overseas through the U. S. government*s Law and Democracy Program and
the International Law Enforcement Academies. To date, law enforcement
officials from the Middle East, Africa, Central and South

America, and Asia have attended antiterrorism courses at the center.
However, since September 11, 2001, the center has placed its emphasis on
training U. S. law enforcement officials at its Glynco, Georgia, facility.
Since that time, training of foreign law enforcement officials is
conducted

primarily overseas through the Law and Democracy Program, 40 Federal
partner organizations are made up of 31 departments and independent
agencies. Selected partner organizations include the Departments of
Defense, Energy, Health and Human Services, Justice, State, and the
Treasury; the CIA; and the Federal Emergency Management Agency, among
others.

Antiterrorism Assistance program, and the International Law Enforcement
Academies.

International Law Much of the technical assistance that the United States
provides to other

Enforcement Academies nations for fighting international crime* including
terrorism* involves

training at law enforcement academies established abroad. International
Law Enforcement Academies provide law enforcement training to foreign
governments. State*s Bureau for International Narcotics and Law
Enforcement Affairs funds and manages the U. S. government*s interagency
regional ILEAs in Europe (in Budapest, Hungary), Southeast Asia (in
Bangkok, Thailand), and Southern Africa (in Gaborone, Botswana) and a
graduate- level ILEA (in Roswell, New Mexico), in a cooperative effort
with the Departments of the Treasury and Justice, including the FBI. In
addition, the bureau plans to establish another regional ILEA in the
Western Hemisphere (in San Jose, Costa Rica). In fiscal year 2003, the
bureau is scheduled to provide law enforcement training to some 12,000
officials,

doubling the number trained in fiscal year 2001. The National Strategy for
Combating Terrorism calls for broadening the scope and strength of the
ILEAs.

To achieve overall coordination of the ILEAs domestically, a Policy Board
was established that is comprised of members from each department and
appointed by the Secretary of State, the Attorney General, and the
Secretary of the Treasury. The mission of these academies has been to
support emerging democracies; help protect U. S. interests through
international cooperation; and promote social, political, and economic
stability by combating crime. ILEAs also are to encourage strong
partnerships among regional countries to address common problems

associated with criminal activities.  ILEA Europe. In 1995, the United
States and the Government of Hungary

cooperated to create the first ILEA in Budapest, Hungary, under FBI
leadership. ILEA Budapest*s purpose is to train law enforcement officers
from Central Europe and the newly independent states of the former Soviet
Union. The academy offers two categories of courses. An 8- week core
course* a personal and professional development program*

focuses on leadership, personnel and financial management issues, ethics,
the rule of law, and management of the investigative process. According to
the State Department, approximately 250 to 300 mid- level police officers
and managers receive this training annually, which is provided by various
U. S. agencies and Hungarian and Western European law enforcement
agencies. Specialized short- term courses provide law

enforcement officers with training on combating various types of crime,
such as organized crime, financial crime, corruption, nuclear smuggling,
illegal migration, and terrorism* including training on prosecuting

criminal cases. According to the State Department, about 850 police,
prosecutors, immigration specialists, and others participate in these
courses annually.

 ILEA Southeast Asia. ILEA Southeast Asia* located in Bangkok, Thailand*
opened in March 1999 under Drug Enforcement Administration leadership.
Like the ILEA Budapest program, the purpose of ILEA Bangkok is to
strengthen regional law enforcement cooperation and improve performance.
According to the State Department, this academy*s curriculum and structure
are similar to those of ILEA Budapest, with the exception of a shorter
core course (6 weeks). In 1999, over 700 law enforcement personnel
representing 10 countries participated in courses at the academy.

 ILEA Southern Africa. In July 2000, the State Department announced an
agreement with the Government of Botswana to establish the ILEA for
Southern Africa in Gaborone, under the leadership of FLETC. Similar in
overall format to the other academies, ILEA Gaborone is to follow the
model developed for ILEAs in Budapest and Bangkok by providing courses on
a wide range of law enforcement skills, including police survival,
forensics, basic case management, fighting organized crime, supervisory
police training, police strategy, narcotics identification and evidence
handling, customs interdiction, illegal migration, and public corruption.
ILEA Gaborone*s curriculum also addresses special topics, such as stolen
vehicles, money laundering, crimes against women, domestic violence,
terrorism, and other critical topics such as human

rights and policing.  ILEA Roswell, New Mexico. In September 2001, State
opened a new

ILEA in Roswell, New Mexico. This new facility, which will be open to
graduates of the regional ILEAs, will offer shorter- term (4 weeks versus
8 weeks) advanced training with a greater focus on an academic versus
practical or operational curriculum.  ILEA Western Hemisphere. Tailored
to the regional needs of officials

from Central and South America and the Dominican Republic, pilot courses
of a new Western Hemisphere ILEA already have been conducted at a
temporary site in Panama. However, activities were

suspended until a permanent location could be selected. State plans to
establish ILEA San Jose in Costa Rica.

U. S. Assistance to The National Strategy to Combat Weapons of Mass
Destruction calls for

Other Countries to active nonproliferation diplomacy. It also discusses
the importance of

Detect Weapons of international cooperation in reducing threats and
controlling nuclear

Mass Destruction materials. Toward these efforts, the United States has a
number of

programs that provide assistance to other countries to prevent the
proliferation of weapons of mass destruction. These nonproliferation
programs are intended to, among other things, keep terrorists from
acquiring and using weapons of mass destruction. Currently, these programs
are divided among several federal agencies including the Departments of
State, Defense, Energy, Homeland Security, and Justice. U. S. assistance
began in the mid- 1990s under DOD*s Cooperative Threat Reduction program
and then expanded to the Departments of State and Energy and other DOD
programs.

The agencies have provided a range of assistance, including installing
security equipment around nuclear facilities, conducting research and
development on nonproliferation and verification technologies, as well as
providing conventional equipment and training. DOE has been leading many
of these efforts. For example, over the last 7 years, Energy has worked
cooperatively with Russia to install modern nuclear security systems at
Russia's nuclear material sites. These security upgrades consist of (1)
physical protection systems, such as fences and metal doors; (2) material
control systems, such as seals attached to nuclear material containers and
badge systems that only allow authorized personnel into areas containing
nuclear material; and (3) material accounting systems, such as inventories
of nuclear material and computerized databases. In addition, Energy*s
National Nuclear Security Administration has been conducting research and
development on new technologies that are

intended to improve U. S. capabilities in nuclear explosion monitoring,
proliferation detection, and response to chemical or biological attacks.
Furthermore, as part of their nonproliferation assistance programs, Energy

and the other five agencies have been providing equipment and training to
Russia and other countries* mostly in Central and Eastern Europe.
Radiation detection equipment is one of the many types of assistance that
the U. S. agencies are providing. Other equipment ranges from simple hand
tools for taking apart and searching different compartments of a vehicle
for

hidden contraband to boats and vehicles for conducting patrols. Similarly,
training ranges from hands- on instruction in using the equipment and
conducting searches to high- level technical exchanges on establishing the
legal and regulatory basis for preventing illicit trafficking and trade in
sensitive goods and materials that terrorists could use in a nuclear
weapon. 41

While the Departments of Defense, Energy, and State receive their own
funding for their assistance programs, the Departments of Homeland
Security and Justice receive their funding from State and/ or DOD. Energy
also receives part of its funding from State. Table 6 lists each specific
U. S. nonproliferation assistance program and activity.

41 For a more detailed discussion and an evaluation of these programs, see
U. S. General Accounting Office, Nonproliferation R & D: NNSA's Program
Develops Successful Technologies, but Project Management Can Be
Strengthened, GAO- 02- 904 (Washington,

D. C.: Aug. 23, 2002). We reported that research areas of the
Nonproliferation and Verification Research and Development Program lack a
formal process to identify users* needs. See U. S. General Accounting
Office, Nuclear Nonproliferation: U. S. Efforts to Help Other Countries
Combat Nuclear Smuggling Need Strengthened Coordination and Planning, GAO-
02- 426 (Washington, D. C.: May 16, 2002). We reported that U. S.
assistance is

not effectively coordinated and lacks an overall governmentwide plan to
guide it, because agencies do not always coordinate their efforts through
an interagency group chaired by the Department of State. U. S. General
Accounting Office, Nuclear Nonproliferation: Security of Russia*s Nuclear
Material Improving; Further Enhancements Needed, GAO- 01- 312 (Washington,
D. C.: Feb. 28, 2001). We reported that hundreds of metric tons of nuclear

material continue to lack improved security systems and no mechanism is in
place to monitor the effectiveness of the systems once they are installed.

Tabl e 6: U. S. Nonproliferation Assistance Programs Agency Program
Activity description

Department of Energy Material Protection, Control, and Accounting Installs
improved security systems for nuclear material at civilian program nuclear
sites, naval fuel sites, and nuclear weapons laboratories

throughout Russia. These security upgrades have consisted of (1) physical
protection systems, such as fences and metal doors; (2) material control
systems, such as seals attached to nuclear material containers and badge
systems that only allow authorized personnel into areas containing nuclear
material; and (3) material accounting systems, such as computerized
databases. In addition, Energy is providing sites with long- term
assistance through equipment warranties, operating procedure development,
and training.

Second Line of Defense program Provides and installs radiation detection
equipment, such as portal monitors, at Russian border crossings, including
a Moscow airport. Energy may expand the program beyond Russia to

include countries of the former Soviet Union. International Export Control
program Provides funds to help countries of the former Soviet Union

control the export of goods and technologies that could be used in the
development of nuclear weapons. The program provides assistance to prevent
legitimate enterprises, such as businesses that were affiliated with the
Soviet Union's nuclear weapons complex, from intentionally or
unintentionally engaging in illicit trade in such goods and technologies.

Nonproliferation and Verification Research Manages projects that cover a
wide spectrum of activities to and Development program improve U. S.
capabilities in the areas of nuclear explosion

monitoring, proliferation detection, and chemical and biological response.
Projects range from manufacturing specialized satellitebased sensors that
detect nuclear explosions to developing and delivering sensor technologies
that detect the spread of nuclear, chemical, and biological weapons,
materials, and technologies

worldwide. Installs radiation detection equipment in countries of the
former Soviet Union (other than Russia) and Central and Eastern Europe.

Department of State Nonproliferation and Disarmament Fund Provides
radiation detection equipment and other assistance for interdicting
nuclear smuggling to the former Soviet Union and Central and Eastern
Europe.

Export Control and Related Border Security Provides radiation detection
equipment, such as vans equipped Assistance program with radiation
detectors, and other assistance for interdicting nuclear smuggling to
countries of the former Soviet Union and Central and Eastern Europe. (The
program took over

Nonproliferation and Disarmament Fund radiation detection assistance
beginning in fiscal year 2002.) Republic of Georgia Border Security and
Provides a wide range of assistance to the Republic of Georgia's Law
Enforcement program border guards and customs service to interdict nuclear
smuggling;

fight other crimes, such as drug smuggling; and develop border
infrastructure.

(Continued From Previous Page)

Agency Program Activity description

Department of Cooperative Threat Reduction program Provides funds to
various countries for the (1) purchase of Defense radiation detection
equipment, such as pedestrian portal monitors

to screen people and (2) handheld radiation detection monitors and other
equipment to enable the countries to better patrol their borders, conduct
searches for smuggled contraband, and equip their border posts.

International Counterproliferation program Provides funds to the
Department of Homeland Security and the FBI for training and equipment for
countries of the former Soviet Union and Central and Eastern Europe.

Department of Homeland Security, Bureau of Customs and Border With funding
provided by the Departments of Defense and State, Protection (formerly run
by the U. S. Customs Service under the provides training and equipment to
customs agencies and border Department of the Treasury)

guards in other countries. The equipment includes radiation pagers (small
detectors that can be worn on a belt to continuously monitor radiation
levels or used as a handheld device to pinpoint the location of
radioactive material detected by a portal monitor) as well as a variety of
other high- and low- technology tools to conduct searches and detect
sensitive goods and materials. Training includes assistance in operating
the x- ray vans equipped

with radiation detectors and providing hands- on instruction in using
equipment to detect nuclear smuggling. Department of Homeland Security, U.
S. Coast Guard Through funding provide by the State Department's Export
Control and Related Border Security Assistance program,

provides assistance for maritime interception of nuclear smuggling to
countries of the former Soviet Union. Assistance provided has included
boats with spare parts and the stationing of an in- country U. S. Coast
Guard advisor.

Department of Justice, Federal Bureau of Investigation Through DOD's
International Counterproliferation program, trains and equips foreign law
enforcement agencies to investigate and respond to actual seizures of
smuggled nuclear or other material. Training has included seminars for
high- level officials and courses on conducting investigations and
managing a crime scene where a seizure has taken place. Equipment provided
as part of the training has included hazardous material suits to make
handling of seized material safer, evidence collection and sampling kits,
and chemical detection equipment.

Source: Departments of Defense, Energy, and State; U. S. Coast Guard; and
the FBI.

U. S. Security and Economic U. S. security and economic assistance
programs, which are managed by

Assistance Seeks to the Department of State, can enhance the capabilities
of coalition partners

Enhance in combating terrorism overseas. Long- standing U. S. security and

Coalition Capabilities economic assistance programs have attempted to
support the *global war

on terrorism* in general and Operation Enduring Freedom in particular.
They include the following:

Foreign Military Financing The Foreign Military Financing program provides
financial grants through the Department of State to foreign governments to
purchase U. S.- made weapons and military training. It is intended to
promote U. S. national security interests by contributing to global and
regional stability, strengthening military support for democratically
elected governments,

and containing transnational threats, including terrorism. As such, the
program can be a key economic assistance tool in supporting U. S.
coalition partners in combating terrorism overseas. The Department of
State provides grants for the acquisition of U. S. defense equipment,
services, and training that enable key allies and friends to improve their
defense capabilities. Improved capabilities are expected to (1) strengthen
multilateral coalitions with the United States and its allies, (2) improve
bilateral military relationships between the United States and the
recipient nations, and (3) allow U. S. friends and allies increased
interoperability with U. S. forces. Many of the grants during fiscal year
2003 will be used to help combat terrorism overseas. For example, grants
will be used to (1) target security requirements linked to the *war on
terrorism* in Jordan, Oman, and Yemen; (2) assist Colombia*s effort to
defend its economy by supporting a brigade to protect its oil pipeline;
(3) support India and Pakistan in their efforts in the war on terrorism;
(4) continue efforts to integrate recent NATO members and sustain support
for Partnership for

Peace countries in Central Europe, the Baltics, the Caucasus (especially
Georgia), and in the Central Asian countries; and (5) sustain the
Philippine*s military capability, particularly in its effort to address
the terrorist threat.

Foreign Military Sales The Foreign Military Sales program is used by the
United States to sell weapons, weapons systems, and military equipment to
foreign countries to maintain close ties with neighbors and key allies,
maintain stable and secure regional partners, and ensure regional
stability. Additionally, State*s Bureau of Political- Military Affairs,
through FMS and other security assistance, helps new members of NATO
upgrade their military capabilities and achieve greater interoperability
with U. S. and other alliance forces and helps to strengthen the security
and defense capabilities of key Central

Asian and Caucasus partners, whose support is crucial to combating
terrorism.

International Military Education The International Military Education and
Training program was established

and Training in 1976 as a low- cost security assistance program intended
to foster the

development of more professional militaries around the world through
training and education of foreign military and civilian personnel. 42 The
program provides training on a grant basis to some 10,000 students

annually from 133 allied and friendly countries. Formal instruction is
provided through more than 2,000 courses taught at about 150 U. S.
military schools and installations. In many of these countries, it is the
only military engagement tool available to the United States. According to
the Department of State, the program advances U. S. interests in
furthering regional stability by enhancing military alliances, building
coalitions, and strengthening efforts to combat terrorism abroad. State
determines the political advisability of providing training to individual
countries and funds the program through its International Affairs budget.
DOD plans and manages the program through its Defense Security and
Cooperation Agency, which works with the various military departments and
unified military commands to implement the program. Coordination of the
program overseas is handled by DOD*s security assistance offices located
in U. S. embassies around the world, which field requests from their host
countries to participate in the program. All foreign applicants are
screened before being admitted to the program. Enhancing military
professionalism is intended to make militaries more efficient, effective,
and interoperable with U. S. and NATO forces as well as regional
coalitions. Also, it seeks to foster a better understanding of democratic
values, including civilian rule of the military, belief in the rule of
law, and respect for internationally recognized civil and human rights.
Finally, the program*s development of professional and personal military-
to- military relationships provide

U. S. access and influence to a critical sector of society that can help
support U. S. access to foreign military bases and facilities* a critical
component in efforts to combat terrorism overseas.

Economic Support Funds Economic Support Funds are used to promote security
and stability overseas, particularly in emergency situations, where the
United States has vested interests. The funds are provided to foreign
nations in grant form, 42 The International Military Education and
Training program was established as part of the

International Security Assistance and Arms Export Control Act of 1976 (22
U. S. C. S: 2751 et seq.), Jun. 30, 1976.

often without restrictions on the money*s use. Though not intended for
military use, the money allows foreign governments to free up other funds
for military use or other purposes. The Economic Support Fund is intended
to promote the economic and political foreign policy interests of the
United States by providing assistance to allies and countries in
transition to democracy, supporting the Middle East peace negotiations,
and financing

economic stabilization programs, frequently in a multi- donor context.
USAID, with overall foreign policy guidance from the Department of State,
implements most Economic Support Fund programs. By promoting economic
growth, good governance, and strong democratic institutions, the Economic
Support Fund is intended to eradicate the economic and political disparity
that often underlies social tension and can lead to radical, violent
reactions against government institutions. Thus, these

economic assistance programs focus on mitigating the root causes of
terrorism.

Peacekeeping Operations In addition to its contributions to UN
peacekeeping operations, the United States maintains a Peacekeeping
Operations program of its own that is designed to promote increased
involvement of regional organizations and some individual countries in
regional and international peacekeeping operations. Peacekeeping
operations support U. S. national interests by promoting human rights,
democracy, and regional security. They facilitate humanitarian responses
to crisis situations. Also, they support the increased involvement of
regional organizations in conflict resolution, multilateral peace
operations, and sanctions enforcement through provision of logistics
support, peacekeeping training, and peacekeeping equipment. The United
States has a strong interest in enhancing the ability of other nations to
lead or participate in voluntary peacekeeping and humanitarian operations
in order to reduce the burden on the United States. Finally, peacekeeping
operations can help address the root causes of terrorism by reducing the
likelihood of hostile interventions by other powers, preventing the
proliferation of small conflicts, facilitating the stability necessary for
the establishment and growth of new market economies, containing the cost
of humanitarian emergencies, and limiting refugee flows. This is
accomplished through the separation of adversaries; facilitation of the
delivery of humanitarian relief; repatriation of refugees and displaced
persons; demobilization, disarmament, and reconciliation of combatants;
and creation of conditions under which political reconciliation may occur
and democratic elections may be held.

Additional Assistance In addition to the security and economic assistance
programs mentioned, through Military- to- Military

DOD provides military- to- military training to other countries to improve
Training

their abilities to prevent and detect terrorism and, if necessary, disrupt
and destroy terrorist organizations. These bilateral programs are part of
the regional commands* Theater Security Cooperation Plans to improve U. S.
allies* capabilities to combat terrorism.

Joint Combined Exchange DOD*s Joint Combined Exchange and Training program
provides

and Training U. S. special operations forces opportunities to develop and
maintain their

skills and to train foreign militaries and other groups to combat
terrorism overseas, among other missions. U. S. special operations forces
generally are organized into small units for military action focused on
strategic or

operational goals. They are tasked with a variety of missions ranging from
training, advising, and organizing foreign groups for unconventional
warfare to training coalition forces for multinational military
operations, including combating terrorism overseas. These missions require
special skills that conventional forces do not have, such as the ability
to speak foreign languages, understand regional cultural and environmental
characteristics, and quickly deploy and operate unsupported in sometimes
hostile or politically sensitive areas. The U. S. Special Operations
Command believes that the best way its forces can train for these types of
missions is to train with the people in the places where they may have to
operate.

In 1991, the Congress clarified DOD*s authority to spend training funds in
connection with special operations forces training overseas with friendly
foreign forces, as long as the primary purpose was to train U. S. forces.
43 Since the enactment of this legislation, such training has commonly
been

referred to as Joint Combined Exchange Training. 44 Special operations
forces are charged with nine principal missions and, on the basis of their
unique capabilities, conduct a variety of other activities. The principal
missions are to (1) train and otherwise assist foreign militaries to
combat insurgency and other threats to stability (foreign internal
defense);

43 National Defense Authorization Act for Fiscal Years 1992 and 1993 (P.
L. 102- 190), Dec. 5, 1991. 44 For a more detailed description and GAO*s
evaluation of the JCET program, see U. S. General Accounting Office,
Military Training: Management and Oversight of Joint Combined Exchange
Training, GAO/ NSIAD- 99- 173 (Washington, D. C.: July 23, 1999). We
reported that DOD had complied with the statutory requirement for
conducting JCETs.

However, DOD had not accurately reported to the Congress the number of
JCETs that were conducted, their costs, or their relationship to
counternarcotics and counterterrorism.

(2) train, advise, and otherwise assist local forces for guerilla warfare
(unconventional warfare); (3) protect against and prevent the spread of
nuclear, chemical, and biological weapons (counterproliferation); (4) use
offensive and defensive measures to prevent or resolve terrorist incidents
(combating terrorism); (5) obtain information concerning capabilities and
activities of actual or potential adversaries (special reconnaissance);
(6) inflict damage on an adversary or recover personnel or material
(direct action); (7) target an adversary*s information system while
defending U. S. systems (information operations); (8) establish, maintain,
or strengthen relations between U. S. and allied governments to facilitate
military operations (civil affairs); and (9) influence attitudes of
foreign audiences (psychological operations). Specific Joint Combined
Exchange and Training operations and activities are classified.

U. S. Special Operations The U. S. European Command initiated the Georgia
Train and Equip

Forces Training for the Republic Program to enhance Georgia*s counter-
terrorism capabilities. The

of Georgia program*s goal is to build strong effective staff organizations
capable of

creating and sustaining standardized operating procedures, training plans,
operational plans, and a property accounting system. The curriculum
consists of performance- oriented training and exercises. The time- phased
training will be conducted by U. S. Special Forces to build upon the
military- to- military relationship developed between the two countries.
The program will consist of command center staff training for members of
the Georgian Ministry of Defense as well as training for units of the Land
Forces Command. Border Guards and other Georgian security agencies will be
included to ensure interoperability among Georgia*s security forces.
Almost 200 Georgians have completed the staff- training phase and about
500 Georgians are completing the light- infantry tactics training.
Military equipment to be provided will include uniform items, small arms
and ammunition, communications gear, training gear, medical gear, fuel,
and construction material.

Figure 9 shows members of 2nd Company, Georgian Commando Battalion,
performing a combat off load at a training range at Krtsanisi, Republic of
Georgia. The U. S. Army*s 10th Special Forces Group (Airborne) is in
Georgia conducting the Georgia Train and Equip Program, which will enhance
Georgian soldiers' abilities in various battlefield techniques.

Figure 9: 2nd Company, Georgian Commando Battalion, Perform a Combat Off
Load With Members of the U. S. Army*s 10th Special Forces Group (Airborne)
at a Training Range at Krtsanisi, Republic of Georgia

U. S. Special Operations Forces The U. S. Pacific Command is assisting the
Republic of the Philippines in

Training for the Philippines developing a counter- terrorist capability
within their armed forces through

the Foreign Military Financing program. The U. S. Pacific Command deployed
a Joint Task Force advisory team to the southern Philippines to begin
preparations. The Joint Task Force advisory team, composed of U. S.
Special Operations personnel is providing training at the command level at
headquarters down through the company level in the field. The

training emphasizes joint operations and tactics to help eliminate
terrorist threats. Training includes counter- terrorism campaign planning,
intelligence fusion, psychological operations, civil- military operations,
and field tactics. U. S. Special Operations personnel completed training
with 25 field companies and provided equipment that included aircraft, U.
S. Coast Guard cutters, and helicopters.

Figure 10 shows a U. S. Special Forces soldier demonstrating to a Filipino
soldier how to adjust the sights on his M- 16 rifle during marksmanship
training in Tipo- Tipo Town, Basilan Island, Philippines. U. S. forces

currently are in the Philippines participating in joint combating-
terrorism training with their Filipino counterparts.

Figure 10: U. S. Special Forces Soldier Shows a Filipino Soldier How to
Adjust the Sights on His M- 16 Rifle during Marksmanship Training in Tipo-
Tipo Town, Basilan Island, Philippines

Source: Jason Carter of the Pacific Stars and Stripes. (c) 2003 Stars and
Stripes.

Assisting Other Countries Some special events overseas, such as
presidential summit meetings with International

and the Olympic games, have international significance and thus may
Security Events

attract terrorist attacks. These international special events receive U.
S. security protection, whether through the U. S. Secret Service providing
protective security to senior U. S. officials, Diplomatic Security
protecting U. S. personnel and facilities, or the military standing by to
respond, if needed, to terrorist incidents involving weapons of mass
destruction or to evacuate Americans.

Unlike domestic special security events, there is no process to coordinate
federal agencies* roles and responsibilities for special security events
held outside of the United States. 45 Nevertheless, the United States can
provide

assistance to other countries for special security events. For example,
the Department of State coordinated and managed federal agencies*
assistance for the 1992 Olympic Summer Games in Barcelona, Spain; the 1994
Olympic Winter Games in Lillehammer, Norway; and the 1994 Commonwealth

Games in Victoria, British Columbia, Canada. For the upcoming 2004 Olympic
Summer Games in Athens, Greece, the Department of State is coordinating
federal agencies* assistance at the headquarters level in

Washington, D. C., and at the U. S. Embassy in Athens, Greece. In
Washington, D. C., the State Department*s Office of the Coordinator for
Counterterrorism and Bureau of Diplomatic Security established an
interagency group and at the U. S. Embassy in Athens, the bureau
established an Olympic Security Coordinator and an Olympic Security
Advisory Team to coordinate federal assistance. The advisory team is
composed of agency officials from DOD, the FBI, the CIA, and the Federal
Aviation Administration. As discussed earlier in this chapter, one
initiative includes counterterrorism training for Greek law enforcement
authorities through State*s Antiterrorism Assistance program.

Security planning for the 2004 Olympic Summer Games in Athens is a
multilateral effort. The Government of Greece requested Olympic security
expertise from seven countries: the United States, the United Kingdom,
France, Spain, Israel, Germany, and Australia. These countries make up the
Olympic Security Advisory Group, which reports to the Greek Minister of
Public Order on security issues at the strategic level. The group also

provides advice on technical support issues at the operational level. The
range of issues includes intelligence, planning, training and exercises,
technology, command and control coordination, and venue security.

45 For domestic situations, PDD 62 created a category of special events
called National Special Security Events, which are events of such
significance that they warrant greater federal planning and protection
than other special events. For these events, the directive reaffirmed the
FBI*s lead federal agency role for crisis management and designated the U.
S. Secret Service as lead federal agency for security design, planning,
and implementation. The directive also reaffirmed the Federal Emergency
Management Agency as responsible for consequence management.

Coordination Mechanisms Programs to assist other countries are coordinated
through a variety of

for Assistance to Enhance forums. For those aimed at improving other
countries* capabilities to

Coalition Capabilities combat terrorism, coordination across agencies is
done in working groups

under the NSC*s Counterterrorism Security Group (discussed in chapter 2).
Specifically, the State Department chairs a Training and Assistance
SubGroup that coordinates the different programs to provide terrorism-
related training and assistance to foreign governments and their
officials. The

group works to prioritize countries that should receive assistance. The
group reviews assistance programs of the various agencies to ensure they
are properly sequenced, avoid duplication, and ensure that they are

implemented in collaboration with or reinforce other efforts as
appropriate. This group has a subordinate group, also chaired by the
Department of State, called the Counterterrorism Finance Training and
Technical Assistance Working Group. This group focuses on providing

related finance training and technical assistance to a set of priority
countries and attempts to ensure that the delivery of such assistance by
different agencies does not conflict and is used effectively and
efficiently. Within the State Department, the Bureau of Diplomatic
Security and the

Office of the Coordinator for Counterterrorism work with other agencies to
decide how to spend Antiterrorism Training Assistance funds. In the field,
the embassy country teams are also involved in coordinating programs

from the various agencies with headquarters and negotiating the assistance
packages with the foreign government. Agency Comments and

The Departments of Defense, Justice, and State and the former Our
Evaluation

Immigration and Naturalization Service provided technical comments on the
matters covered throughout this chapter. Based upon these comments, we
made revisions, as appropriate. We also made revisions (primarily to the
section on border security) based upon the creation of the Department of
Homeland Security and the transfer of various agencies and functions from
other departments into that department.

Federal Efforts to Disrupt and Destroy

Chapt 4 er Terrorist Organizations Federal agencies attempt to disrupt and
destroy terrorist organizations through diplomatic initiatives, law
enforcement efforts, financial operations to freeze assets, military
operations, and covert action. Diplomatic initiatives, led by the
Department of State, strengthen international cooperation and capabilities
through bilateral and multilateral agreements. The State Department*s
diplomatic leadership and agreements allow other agencies to cooperate
more closely with

foreign countries on specific types of efforts. Other multilateral
agreements, including UN resolutions and conventions, also help to
strengthen international cooperation. Law enforcement efforts, led by the
Department of Justice, disrupt terrorist organizations through
investigations, arrests, and prosecutions of terrorists. As a principal
investigative agency of the federal government, the FBI conducts

investigations on acts of terrorism against U. S. persons and property
overseas. Operations to identify and freeze terrorists* financial assets
are conducted by the Departments of the Treasury, Justice, and State and
involve tracking monies, accounts, and wire transfers of terrorist
organizations. Military operations, led by DOD, destroy terrorist
organizations and complement other methods* diplomatic, legal, and
economic* to prevent or disrupt terrorist organizations. DOD and its
coalition partners are conducting Operation Enduring Freedom in
Afghanistan and surrounding regions to destroy al Qaeda and the Taliban
regime. Captured combatants* who are not considered prisoners of war by
the U. S. government* have been detained and interrogated to provide
intelligence information. Finally, covert actions, led by the CIA, have
been used to disrupt and destroy terrorist organizations. This chapter
describes the relevant federal programs in place and is not an evaluation
of their effectiveness.

Diplomatic Initiatives The National Strategy for Combating Terrorism
includes an objective to

Strengthen strengthen and sustain international efforts to combat
terrorism. There is

also an objective to establish and maintain an international standard of
International accountability with regard to combating terrorism. The
strategy also gives

Cooperation the Department of State the lead in developing specific
regional strategies

for combating terrorism overseas, as well as policy action plans to deal
with state sponsors of terrorism. Diplomatic initiatives, led by the
Department of State, are key to achieving these objectives. Such
diplomatic efforts help strengthen international cooperation in the effort
to disrupt and destroy terrorists and their organizations. State helps to
orchestrate other nations* bilateral support to assist the United States
in conducting law enforcement cooperation, financial operations, and
military

operations. State negotiated a number of bilateral and multilateral
agreements with foreign countries to support these operations. State also
solicited international cooperation by actively trying to enlist
multilateral organizations in the fight against terrorism. These efforts
include multilateral agreements and conventions, resolutions, and
international summits involving the United Nations and other international
organizations. Various State Department offices, bureaus, and missions
overseas* in conjunction with other federal agencies* coordinate these
diplomatic initiatives.

U. S. officials, from several agencies at both the headquarters and
overseas, told us that bilateral agreements with individual nations are
the most productive type of cooperation. However, they noted that
multilateral agreements provide an important framework that, in the eyes
of other countries, legitimizes their bilateral cooperation with the
United States.

Bilateral Cooperation The Department of State strengthens international
cooperation through

Supports Variety of agreements, consultations, and negotiations with other
countries to assist

Activities by U. S. other U. S. government agencies in their efforts to
enforce laws, deny Government Agencies

terrorist financing, and carry out military operations against terrorists
and their organizations. The Department of State leads periodic U. S.
delegations* consisting of a number of U. S. agencies* that meet with
other nations to discuss and cooperate on terrorism issues of mutual
bilateral concern. For example, State Department*s Coordinator for
Counterterrorism recently led one of these U. S. delegations to meet with
French officials. Through its diplomacy, the department facilitates
cooperation in a variety of areas.

Law enforcement The Department of State negotiates formal bilateral
agreements to strengthen law enforcement cooperation with other individual
countries. For example, there are a number of law enforcement- related
treaties negotiated by the Department of State, in conjunction with the
Department of Justice, related to legal assistance and extradition. These
agreements

promote increased cooperation with foreign law enforcement authorities for
the exchange of evidence and apprehension of terrorist suspects.

Terrorist financing The Departments of State and the Treasury have worked
with a number of countries on a bilateral basis to strengthen measures to
deny terrorists access to financial support. Since September 11, 2001, the
United States, in conjunction with other countries, designated a number of
individuals and

organizations as sponsors of terrorism. At individual embassies, State
Department economic officers work with their counterparts to improve joint
efforts to disrupt terrorist financing.

Military operations The State Department worked to negotiate a number of
bilateral agreements for military cooperation to combat terrorism. In the
wake of the September 11, 2001, attacks, State worked with DOD to
establish bilateral agreements to support military operations in
Afghanistan and surrounding regions. Ultimately, 89 countries agreed to
provide over- flight rights for U. S. military aircraft and 76 agreed to
provide landing and/ or

bed- down rights for U. S. military aircraft. In addition, 23 countries
agreed to host U. S. and coalition forces involved in military operations
in Afghanistan. These later agreements, reached with neighboring
countries, such as Pakistan and the Central Asian republics, were
particularly significant in that they provided secure staging areas for U.
S. and coalition military forces to carry out their missions. These
bilateral agreements are in addition to other countries actually
conducting military operations with the United States.

Multilateral Cooperation The Department of State works with international
organizations to

through the UN Provides enhance multilateral support to disrupt and
destroy terrorists and their

Political Support for organizations. Foremost of these organizations is
the United Nations. Its

Coalition Efforts Counterterrorism Committee reviews international efforts
to combat

terrorism. The State Department works with the United Nations and its
member states to establish a broad array of resolutions and conventions to
create a multilateral framework for combating international terrorism.
This UN- based multilateral framework falls into three broad categories of
documents or agreements (as described below). Appendix VI provides a

listing of protocols, conventions, and resolutions that the United Nations
has identified as related to terrorism. 1 UN Conventions and Protocols
There are 10 UN conventions and 2 protocols dating back to 1963 that

are related to terrorism. An example of these is the 1997 International
Convention for the Suppression of Terrorist Bombings. The State

1 In addition to those listed in appendix VI, there are other UN efforts
indirectly related to terrorism. According to ATF, these include efforts
to combat illicit trafficking in firearms, ammunition, and explosives used
not only by common criminals but also terrorists. UN efforts include the
UN Protocol Against the Illicit Manufacturing of and Trafficking in
Firearms and the UN Programme of Action on Small Arms and Light Weapons.

Department, through its diplomatic efforts in Washington and around the
world, has urged countries to agree to these conventions and protocols.
Before September 11, 2001, only 2 countries were parties to all 12
instruments. As of November 2002, 16 countries, including the United
States, are a party to each of the 12 conventions and protocols.

UN Security Council Resolutions The UN Security Council consists of 5
permanent members with veto authority (China, France, Russia, the United
States, and the United Kingdom) and 10 rotating members. 2 Under Chapter
VII of the UN Charter, mandatory provisions in resolutions adopted by the
UN Security Council form a legal basis for taking actions against
terrorists. There are numerous UN Security Council Resolutions dating back
to 1970 that are related to terrorism. For example, UN Security Council
1373, which is a wide- ranging measure calling for international
cooperation against terrorist financing. Among other things, this
resolution calls for member nations to report back

on their activities to combat terrorism. According to the National
Strategy for Combating Terrorism, UN Security Council Resolution 1373 is
one example of the United States enlisting the international community to
establish and maintain an international standard of accountability with
regard to combating terrorism.

Figure 11 shows the UN Security Council voting on a terrorism- related
resolution in the aftermath of the terrorist attacks against the United
States on September 11, 2001.

2 The current 10 rotating members of the UN Security Council are Angola,
Bulgaria, Cameroon, Chile, Germany, Guinea, Mexico, Pakistan, Spain, and
Syria.

Figure 11: UN Security Council Unanimously Adopts Resolution 1373, Calling
for Wide- Ranging International Cooperation to Combat Terrorism

UN General Assembly The UN General Assembly consists of the entire
membership, currently

Resolutions numbering 189 nations. Resolutions from the General Assembly
are

adopted based upon the votes of the entire UN membership but, unlike UN
Security Council Resolutions, are not binding. There are numerous UN
General Assembly resolutions dating back to 1972 related to terrorism. An
example of these is UN General Assembly Resolution 39/ 159 from 1984,
which condemned all policies and practices of terrorism between states as
a method of dealing with other states.

State Department Works In addition to the United Nations, the State
Department is working with

With Variety of Other a number of other international organizations to
promote multilateral

International Multilateral cooperation to combat terrorism. The
memberships of these other

Organizations international organizations overlap, with several nations
(including

the United States) belonging to several of them. Examples of these
international organizations and some of their related activities are as
follows.

North Atlantic Treaty The North Atlantic Treaty Organization is a
political and security alliance

Organization of 19 nations from North America and Europe. 3 In the wake of
the

September 11, 2001, terrorist attacks, NATO members invoked Article V* a
collective defense provision of the 1949 Washington Treaty. The provision,
invoked for the first time in NATO*s history, states that an armed attack
on any ally is considered an attack against all. NATO approved eight
measures to expand its options in the campaign against terrorism,
including the deployment of its Standing Naval Forces to the Eastern
Mediterranean Sea and its Airborne Early Warning force.

European Union The European Union is a group of 15 countries forming a
political and economic union. The European Union has taken steps to
improve cooperation between European and U. S. law enforcement officials,
coordination of the freezing of terrorist assets, and to provide a
framework for cooperation on border security issues. The Group of Eight
The Group of Eight (G- 8) is a group of major industrialized democracies

that meet periodically on a number of political, economic, and security
issues. 4 The G- 8 has been an active forum for supporting measures
against terrorists and their organizations. Several of the group*s summits
have resulted in joint declarations that condemn terrorism and pledge to
improve member countries individual and collective efforts to combat
terrorism, including endorsing international recommendations to combat

terrorist financing. The Organization for Security

The Organization for Security and Cooperation in Europe consists of and
Cooperation in Europe

55 nations from Europe, Central Asia, and North America that discuss human
rights, economic development, and security issues. The organization has
incorporated combating terrorism financing into its work plan and agenda,
urging its members to implement certain recommendations to combat
terrorist financing.

3 NATO*s current membership includes Belgium, Canada, the Czech Republic,
Denmark, Estonia, France, Germany, Greece, Hungary, Iceland, Italy,
Luxembourg, the Netherlands, Norway, Poland, Portugal, Spain, Turkey, the
United Kingdom, and the United States. In addition, Bulgaria, Estonia,
Latvia, Lithuania, Romania, Slovakia, and Slovenia have been invited to
begin accession talks to join NATO in May 2004.

4 G- 8 members include Canada, France, Germany, Italy, Japan, Russia, the
United Kingdom, and the United States.

The Organization of American The Organization of American States consists
of 35 nations from the

States Western Hemisphere. The organization adopted the Inter- American

Convention against Terrorism requiring, among other things, that each
signatory state establish a legal and regulatory regime to combat the
financing of terrorism. Parties also agreed to improve controls at banks
and other financial institutions.

Other international groups Other international groups provide collective
support to specific functions related to terrorism. These include the
Financial Action Task Force and the Egmont Group, which both are involved
in disrupting terrorist financing. The membership of these groups overlaps
with many of the other groups

mentioned above. In addition, the State Department has sponsored and/ or
attended a number of international meetings to discuss terrorism outside
the forums described above. An example includes terrorism summits at Sharm
el- Sheikh, Egypt, in 1994. These international summits resulted in
declarations of support for national and international efforts to combat
terrorism.

Coordination Mechanisms The State Department generally is in charge of
efforts to coordinate

for Bilateral and Multilateral diplomatic initiatives related to combating
terrorism overseas. Overall, the

Diplomacy department*s Coordinator for Counterterrorism coordinates both
bilateral

and multilateral initiatives. Within the coordinator*s office, officers
are assigned specific regional areas to coordinate activities. The
department*s regional and functional bureaus also are involved in
coordination of

diplomatic initiatives, as are other federal agencies, as appropriate. For
bilateral diplomatic initiatives, the department*s regional bureaus,
functional bureaus, country desks, and U. S. embassies play a major role
in coordination. For example, U. S. efforts with the Philippines to combat
terrorism would involve the Coordinator for Counterterrorism, the Bureau
of East Asian Affairs, the Bureau of Political Military Affairs, the
Philippines country desk, and the U. S. Embassy in Manila. Other federal
agencies with specific programs would also be involved in coordination,
such as DOD in the case of military assistance to the Philippines related
to combating terrorism. Another example would the Department of Justice*s

involvement in negotiations of bilateral agreements related to mutual
legal assistance or extradition, which is discussed later in this chapter.

For multilateral diplomatic initiatives, the department*s Bureau of
International Organization Affairs, working with the Coordinator for
Counterterrorism, has the lead in coordinating activities with
international

organizations. Similar to regional bureaus, the bureau has individual
desks for individual international organizations. Similar to U. S.
embassies, the United States maintains diplomatic missions to
international organizations, such as the U. S. Mission to the United
Nations in New York; the U. S.

Mission to NATO in Brussels, Belgium; and the U. S. Mission to the
European Union, also in Brussels, Belgium. The department*s Bureau of
International Narcotics and Law Enforcement coordinates multilateral law
enforcement programs, such as the International Law Enforcement Academies.
Again, other federal agencies with specific programs also are involved in
coordination, such as the Department of the Treasury*s programs to disrupt
terrorist financing and DOD*s European Command

involvement in the case of NATO naval support to maritime operations in
the Mediterranean. The State Department also participates in multilateral
negotiations of treaties and other agreements relating to terrorism.

Law Enforcement One of the enduring policy principles that guides U. S.
strategies to combat

Efforts to Disrupt terrorism overseas is to bring terrorists to justice
for their crimes. The National Strategy for Combating Terrorism has an
objective to destroy

Terrorist Organizations terrorists and their organizations, in part, by
expanding law enforcement

efforts to capture, detain, and prosecute known and suspected terrorists.
In addition, the National Strategy for Homeland Security has an objective
to intensify international law enforcement cooperation.

Such law enforcement efforts are led by the Department of Justice and
attempt to disrupt and destroy terrorist organizations overseas. The
Department of Justice, working with the Department of State, will expand,
where appropriate, its law enforcement presence abroad to further
counterterrorism interdiction, investigation, and prosecution. The
Department of State coordinates U. S. efforts to improve international
counterterrorism cooperation, including the diplomatic aspects of law
enforcement. United States law enforcement efforts overseas involve
investigating terrorism- related crimes and the apprehension and
prosecution of terrorists. The Department of Justice, through the FBI,
leads U. S. investigations of terrorist incidents overseas. Such
investigations, although conducted by FBI, are done under the authority of
the ambassador at the relevant U. S. embassy. Depending upon the nature of
the terrorist incident, other federal agencies, such as the State
Department and its embassies, also may participate in or support terrorism
investigations. The Department of Justice, in conjunction with the State
Department, leads the federal government*s efforts to apprehend terrorists
overseas for prosecution. Suspected terrorists who are apprehended
overseas are

brought back to the United States for prosecution through extraditions and
renditions. Foreign governments, through both bilateral and multilateral
devices, provide key assistance with investigations, arrests, and
prosecutions of terrorists. The Department of Justice coordinates its
efforts to combat terrorism overseas through various mechanisms, including
its legal attaches located in U. S. missions overseas, Joint Terrorism
Task Forces, and Anti- Terrorism Task Forces. Efforts to identify,
disrupt, and freeze terrorist assets are a related law enforcement
activity and are covered in more detail in the next section.

Investigations of Terrorist As a principal investigative agency of the
federal government for terrorism

Incidents Overseas Are Led matters, the FBI is responsible for detecting
and investigating acts of

by the FBI terrorism committed against U. S. citizens and property
overseas.

According to the FBI, extraterritorial jurisdiction is the principle that
allows the bureau to expand its investigative authority outside U. S.
borders and deploy FBI personnel to work in conjunction with host
government law enforcement agencies to make arrests and prosecutions. The
FBI undertakes these investigations under the authority of the ambassador
at

the relevant U. S. embassy abroad. According to the FBI, its role in
investigating terrorist crimes overseas was expanded through a series of
congressional acts in the mid- 1980s. For example, the FBI cited the
Comprehensive Crime Control Act of 1984 5 and the Omnibus Diplomatic
Security and Antiterrorist Act of 1986, 6 which expanded the federal
jurisdiction of the United States to terrorist crimes, including hostage
taking, homicide, conspiracy to commit homicide, or physical violence
committed against U. S. national or interest anywhere in the world. The
FBI also noted that the Antiterrorism and Effective Death Penalty Act of
1996 7 granted authority to designate foreign terrorist organizations,
prohibits the providing of material support or resources to a foreign
terrorist organization, and makes it a federal crime to participate in
certain international terrorism activities. These changes were the result
of concerns that terrorists who committed the attacks against U. S.
nationals

5 P. L. 98- 473, Oct. 12, 1984. 6 P. L. 99- 399, Aug. 27, 1986. 7 P. L.
104- 132, Apr. 24, 1996, as amended.

overseas would escape justice and flee to countries that oppose the United
States.

Other Federal Law Depending upon the nature of a terrorist incident, other
federal agencies

Enforcement Agencies also may participate in or support terrorism
investigations overseas. For

Support Terrorism example, several agencies in the Department of the
Treasury might support

Investigations the FBI in conducting overseas investigations and in
combating terrorism. Table 7 shows key federal investigative agencies that
have a role in investigating acts of terrorism overseas.

Table 7: Federal Agencies* Roles in Investigating Terrorist- Related
Incidents Overseas Federal agency Agency role

Department of Justice Leads law enforcement and criminal matters related
to terrorism both domestically and overseas. Responsible for
investigating, indicting, and prosecuting terrorists.

Department of Justice, Federal Bureau of Leads efforts to investigate
terrorist crimes domestically and overseas. Responsible Investigation for
the apprehension, extradition, and rendition of foreign terrorists who are

suspected of violating U. S. statutes. Department of Justice, Bureau of
Alcohol,

Investigates terrorist bombings and explosive blasts overseas using its
International Tobacco, Firearms and Explosives (formerly under

Response Team and explosive experts. Special agents with post- blast
expertise, the Department of the Treasury)

forensic chemists, and bomb technicians are used to overcome difficulties
inherent in investigations of large- scale fire or explosives crime
scenes.

Department of State, Bureau of Diplomatic Leads investigations of selected
incidents involving U. S. diplomatic facilities and/ or Security
personnel. Participates in investigations of terrorist incidents against
U. S. diplomatic

personnel and other persons under its protection. Also investigates
passport and visa fraud. Department of the Treasury, Financial Crimes
Supports lead investigative agencies in determining actual or suspected
terrorist Enforcement Network financial transactions and money laundering.

Department of Homeland Security, Bureau of Investigates suspected
terrorists or materials crossing U. S. borders, including illegal Customs
and Border Protection (includes parts of

movement of arms, munitions, and WMD components. Also investigates
violations former U. S. Customs Service under the of economic sanctions,
embargoes, and money laundering related to financing Department of the
Treasury)

designated international terrorist organizations. Department of Homeland
Security, Bureau of

Investigates cases of terrorists crossing U. S. borders. Also, it
investigates cases of Immigration and Customs Enforcement (includes

terrorists using transnational smuggling organizations, using illicit
document parts of former Immigration and Naturalization

vendors, and entering the United States illegally. Has officers stationed
intermittently Service under the Department of Justice) for flexible
periods of time at key choke point airports to disrupt the smuggling and
trafficking of persons, including terrorists, to the United States.

(Continued From Previous Page)

Federal agency Agency role

Department of Homeland Security, United States Investigates terrorists'
threats against officials under its protective mission overseas, Secret
Service (formerly under the Department of

including the President and Vice President. the Treasury)

Department of Defense Investigates acts of terrorism committed against DOD
personnel or facilities overseas. Source: Departments of Defense, Justice,
State, and the Treasury.

Note: GAO analysis of agency documents.

United States Works With In conducting terrorist investigations, the
United States works with other

Other Countries in countries to gather or share evidence. Much information
and evidence are

Conducting Investigations exchanged informally through law enforcement
channels. When a formal request for assistance is necessary, and where
there is no bilateral treaty, executive agreement, or applicable
multilateral convention with another

country, the United States often must rely upon letters rogatory to obtain
international assistance. A letter rogatory is a request from a judicial
official in one country to a judicial official in another country seeking
assistance. Letters rogatory usually include background on the nature and
targets of the criminal investigation, relevant facts about the case or
investigation, the type of assistance needed, statutes alleged to have
been

violated, and a promise of reciprocity. Department of Justice officials
said that they prefer to use the more modern, more reliable, and more
expeditious Mutual Legal Assistance Treaty process than the more
cumbersome letters rogatory process. Mutual Legal Assistance Treaties
strengthen law enforcement by permitting direct communication between
appropriate executive branch law enforcement officials in the United
States and foreign countries rather than relying upon

the letters rogatory process with its judge- to- judge communications
transmitted through the diplomatic channel. Mutual Legal Assistance
Treaties provide for the exchange of valuable evidence, often in a form
that is admissible at trial. They enable the Justice Department to obtain
foreign

financial records, obtain statements or testimony of foreign witnesses,
conduct search and seizure of foreign evidence, and in some cases, freeze
and recover the forfeiture of proceeds of U. S. crimes committed abroad.
The Department of State, in conjunction with the Department of Justice, is
responsible for negotiating the treaties. Once a Mutual Legal Assistance
Treaty is in force, the Department of Justice is responsible for making
specific requests to other countries for assistance under the treaty. As
of January 2003, the United States had bilateral Mutual Legal Assistance
Treaties covering 47 foreign jurisdictions. In addition, many modern

multilateral law enforcement conventions, including those dealing with
terrorism and terrorist financing, contain broad mutual legal assistance
articles.

Return of Overseas The Department of Justice, in coordination with the
Department of State,

Terrorists via Extraditions is responsible for obtaining the arrest and
return of accused persons who

and Renditions commit acts of terrorism against U. S. persons and property
overseas. The

United States sometimes uses extradition treaties to obtain custody of
accused terrorists. Extradition treaties provide for the request by one
party to the treaty to the other party for the arrest and surrender of a
person accused or convicted of a crime in the country making the request.
The Department of Justice is currently working with the Department of
State to renegotiate a number of extradition treaties to further broaden
their coverage of terrorist- related crimes. Modern extradition treaties
contain a *dual criminality* clause, which makes any offense considered a
crime in both countries extraditable under the treaty. Thus, such modern
treaties provide for growth and development in the criminal law, so that
when countries criminalize new activity (including terrorist activity),
those new crimes will be extraditable without the need to renegotiate the
existing treaty. Often, before an alleged terrorist can be formally
extradited to the United States, a number of factors must exist.
Specifically:

 An extradition treaty must usually be in force between the United States
and the country in which the fugitive terrorist is located.

 The extradition treaty must cover the crime or crimes for which the
terrorist is wanted in the United States (either because it is an offense
*listed* in the treaty, or because it meets the *dual criminality*
requirement set out in the treaty; i. e., it is considered a crime in both
countries).

 All requirements of the applicable extradition treaty must have been met
(for example, the quantum of evidence required by the treaty has been
provided in the formal extradition documents).

 The fugitive terrorist is otherwise extraditable (e. g., a national of a
third country).

Once the extradition proceedings in the foreign country are complete and
the fugitive terrorist is ready for surrender, the Justice Department
sends escort agents, usually from the United States Marshals Service, to
collect

and return the fugitive to the United States. As shown below in table 8,
the U. S. government has obtained the extradition of six terrorists
operating overseas since 1987, one of the most recent being an accused
terrorist who was extradited from Germany in December 1998 for his role in
the August 1998 U. S. Embassy bombings in East Africa. As of January 2002,
the United States had extradition treaties in force with more than 100
foreign jurisdictions.

The United States also can obtain custody of an individual without the
formalities of an extradition treaty by agreeing to have the host nation
render the individual to the United States for trial or deport the
individual out of the country. The United States used renditions in 11
cases since 1987 to obtain custody of suspected terrorists operating
overseas. As shown in table 8, the most recent reported rendition used by
the United States to

apprehend a suspected terrorist was in September 2001 when a terrorist
suspect was taken into custody from an undisclosed country for
perpetrating the hijacking of Pan American flight 73 in Karachi, Pakistan.
That individual will stand trial in the United States for the terrorist
attack in which 22 persons, including two U. S. citizens, were killed and
at least 100 persons were injured. Table 8 shows reported extraditions and
renditions of terrorist suspects to the United States over the last 15
years, as reported by the State Department and the FBI.

Table 8: Reported Extraditions and Renditions of Terrorists to the United
States, 1987- 2001 Extradition or Month and year Name and crime( s)
rendition Country

September 1987 Viken Tcharkhutian Extradition Greece (May 1982 bombing of
an Air Canada aircraft) September 1987 Fawaz Younis

Rendition Cyprus (June 1985 hijacking of a Royal Jordanian Airlines
aircraft)

January 1991 Khalid al Jawary Extradition Italy (March 1973 bombing of
three vehicles in New York City) March 1993 Mahmoud Abu Halima

Extradition Egypt (February 1993 bombing of the World Trade Center in New
York City)

July 1993 Mohammed Ali Rezaq Rendition Nigeria (November 1985 hijacking of
Egyptair flight 648)

(Continued From Previous Page)

Extradition or Month and year Name and crime( s) rendition Country

February 1995 Ramzi Ahmed Yousef Extradition Pakistan (January 1995 Far
East bomb U. S. airlines plot; February 1993 bombing of the World Trade
Center in New York City)

April 1995 Abdul Hakim Murad Rendition Philippines (January 1995 Far East
U. S. airlines bomb plot) August 1995 Eyad Mahmoud Ismail Najim

Extradition Jordan (February 1993 bombing of the World Trade Center in New
York City)

December 1995 Wali Khan Amin Shah Rendition Country not disclosed (January
1995 Far East U. S. airlines bomb plot) September 1996 Tsutomu Shirosaki

Rendition Country not disclosed (May 1986 attack on the U. S. Embassy in
Jakarta, Indonesia)

June 1997 Mir Aimal Kansi Rendition Country not disclosed (January 1993
shooting at CIA headquarters in Langley, Virginia)

June 1998 Mohammed Rashid Rendition Country not disclosed (August 1982
bombing of a Pan American aircraft) August 1998 Mohamed Rashed Daoud al-
Owhali Rendition Kenya

(August 1998 bombing of the U. S. Embassy in Nairobi, Kenya)

August 1998 Mohamed Sedeek Odeh Rendition Kenya (August 1998 bombing of
the U. S. Embassy in Nairobi, Kenya)

December 1998 Mamdouh Mahmud Salim Extradition Germany (August 1998
bombing of the U. S. Embassy in Nairobi, Kenya)

October 1999 Khalfan Khamis Mohamed Rendition South Africa (August 1998
bombing of the U. S. Embassy in Dar es- Salaam, Tanzania)

September 2001 Zayd Hassan Abd al- Latif Masud al- Safarini Rendition
Country not disclosed (1986 hijacking of Pan American flight 73 in
Karachi, Pakistan) Source: Patterns of Global Terrorism 2001, Department
of State, May 2002 and Terrorism in the United States, 1999, the FBI,
1999. There may be additional renditions since September 11, 2001, that
have not been reported because they are classified.

INTERPOL is a multilateral organization that, among other things,
facilitates the arrest of terrorist suspects to bring them to the United
States (or elsewhere) for trial. INTERPOL was established to promote
international police cooperation to help officers from different police
forces, countries, languages, and cultures work with each other to solve
crimes. Although INTERPOL has a world headquarters in Lyon, France, every
member country has its own INTERPOL office called a National

Central Bureau. This bureau is the single point- of- contact for foreign
governments requiring assistance with overseas investigations. Each member
country employs its own officers to operate on its own territory in
accordance with its own national laws. INTERPOL provides criminal

intelligence with its member countries and plays a number of roles in
information exchange, such as encouraging member countries to use shared
automated systems and issuing international wanted notices for fugitives.
When the whereabouts of a suspected terrorist is unknown or the United
States seeks an immediate arrest of a terrorist suspect, the Department of
Justice can request their arrest through a *Red Notice.* These notices are
issued through INTERPOL with the intent to follow up

with an extradition. While law enforcement authorities in some countries
are authorized to make an immediate arrest of a suspected terrorist based
on a Red Notice, other countries require an official provisional arrest or
formal extradition request.

Rewards for Justice The State Department*s Rewards for Justice Program
provides a tool to law

Program Leads to Arrests enforcement for arresting and prosecuting
terrorist suspects. The program was established under the 1984 Act to
Combat International Terrorism 8 and

and Prosecutions is administered by the Department of State*s Bureau of
Diplomatic Security.

The program generally offers rewards up to $5 million for information that
leads to the arrest or conviction in any country of any individual for
conspiring, aiding, abetting, or committing an act of international
terrorism against U. S. persons or property or the prevention,
frustration, or favorable resolution of such an act. The USA PATRIOT Act
of 2001 authorizes the Secretary of State to offer or pay rewards of
greater than $5 million if the Secretary determines that a greater amount
is necessary to combat terrorism or to defend the United States against
terrorist acts. The Secretary authorized a reward of up to $25 million for
information leading to the capture of Osama bin Laden and other key al
Qaeda leaders.

Information provided through the Rewards for Justice Program has been used
to apprehend and arrest suspected terrorists. In the past 7 years, the
United States has paid over $9.5 million to 23 individuals who provided
credible information leading to the arrest of international terrorists.
The program played a significant role in the arrest of a suspected
terrorist in February 1995 for the bombing of the World Trade Center in
1993. In

8 P. L. 98- 533, Oct. 19, 1984.

addition, the program provided key information about a planned terrorist
attack against airline ticket counters. As a result, the United States and
the host nation prevented the terrorist act from being carried out.

Department of Justice Suspected terrorists apprehended and arrested
overseas for crimes Prosecutes Suspected

committed against U. S. citizens or interests are prosecuted in the United
Terrorists

States by the Department of Justice. The U. S. Attorney for the District
of Columbia, together with the Department of Justice*s Counterterrorism
Section, ordinarily prosecute the offense. In some cases, the prosecutions
are led by other U. S. Attorneys. For example, on October 18, 2001, the
Department of Justice successfully prosecuted four al Qaeda members in the
Southern District of New York for their roles in the bombings of two U. S.
Embassies in Kenya and Tanzania, which killed 224 persons, including

12 U. S. citizens. The court sentenced the four suspects to life in
prison. Coordination Mechanisms

Investigations of terrorist incidents, including those related to
international for Law Enforcement terrorism, are coordinated through the
National Joint Terrorism Task Force. This task force serves as a
coordinating mechanism for sharing information on suspected terrorists,
including those of foreign origin. It

operates out of the FBI*s Strategic Information Operations Center in
Washington, D. C. In addition, such investigations also are coordinated
through the FBI*s 66 local Joint Terrorism Task Forces. The FBI
established

these task forces to coordinate law enforcement efforts among federal,
state, and local law enforcement agencies. Depending on the nature of
terrorist activities in each location, the task forces may include

representatives from other federal agencies such as the ATF, CIA, the
Department of Homeland Security (to include the U. S. Secret Service, U.
S. Coast Guard, the Bureau of Immigration and Customs Enforcement, and the
Bureau of Customs and Border Protection) and the State

Department*s Bureau of Diplomatic Security. One of the most robust Joint
Terrorism Task Forces is in Washington, D. C., which has representatives
from 15 federal agencies. These task forces serve as the coordinating
mechanisms that combine the international and national investigative
resources of the federal government with the street- level expertise of
local

law enforcement agencies. This *cop- to- cop* relationship enables law
enforcement agencies to share information on suspected terrorists,
including those of foreign origin.

To coordinate strategic long- term planning and policy in areas related to
national security efforts to combat terrorism, the Department of Justice
established the National Security Coordination Council. 9 In areas related
to prosecutions, the Department of Justice also established Anti-
Terrorism Task Forces to integrate and coordinate the anti- terrorism
activities in each of the judicial districts within the United States. The
task forces are comprised of federal prosecutors from the U. S. Attorney*s
Office, members

of the federal law enforcement agencies, as well as the primary state and
local enforcement officials in each district. They are intended to serve
as a national network that coordinates closely with the Joint Terrorism

Task Forces in the collection, analysis, and dissemination of information.
The Anti- Terrorism Task Forces also are intended to develop the U. S.
investigative and prosecution strategy in terrorism cases. Overseas,
coordination within the federal government and with foreign governments is
led by the Department of Justice, in coordination with Justice officials
stationed at U. S. embassies. The FBI has legal attaches at overseas posts
that work closely with law enforcement agencies of the

host country on common crime problems. They also play a large role in
facilitating the international battle against terrorism by enlisting the
cooperation of foreign law enforcement, enabling the arrest of U. S.
terrorist suspects, and solving crimes against U. S. citizens. For
example, in the aftermath of the August 1998 bombings of two U. S.
embassies in

East Africa, the FBI was able to take immediate steps to initiate a joint
investigation with local law enforcement authorities and to preserve the
crime scene and critical evidence. The legal attaches also played a key
role in the investigation, in that they were the first FBI agents to
arrive in Nairobi, Kenya, and Dar es- Salaam, Tanzania, in the immediate
aftermath of the terrorist bombings. The legal attaches also assist in
coordinating investigations with federal law enforcement overseas by
disseminating information to key U. S. federal agencies stationed abroad.
They routinely share information on investigations with liaisons serving
with DOD components overseas. Currently, there are FBI legal attaches
stationed at 45 overseas posts, and additional positions have been
approved. They sometimes serve multiple countries in a region. For
example, the legal attache at the U. S. Embassy in Athens not only covers
Greece but also Turkey, Cyprus, Lebanon, Syria, and Jordan.

9 This is separate from the NSC, which is part of the Executive Office of
the President and was discussed in more detail in chapter 2.

The State Department*s regional security officers at U. S. embassies also
play a key role overseas in coordinating with federal law enforcement
agencies and with foreign governments. These officers, part of the
department*s Bureau of Diplomatic Security, are stationed at all U. S.
embassies. The regional security officers work with foreign law

enforcement officials at the national, regional, and local level. They
often serve as liaisons when other federal law enforcement agencies
request assistance with investigations. They play a particularly important
role at U. S. embassies not served by FBI legal attaches. They also work
with

foreign officials to monitor terrorist threats in the host country, and
take preemptive measures as appropriate. For example, if the threat level
increases against U. S. interests in a particular country, the regional
security officer could request that local police forces adopt a higher
threat posture around the U. S. embassy.

Identifying and The National Security Strategy of the United States of
America calls for

Freezing Terrorists* the United States to work with its allies to disrupt
the financing of

terrorism by identifying and blocking the sources of funding for
terrorists Financial Assets

and denying them access to the international financial system. In
addition, Disrupts Terrorist

the National Strategy for Combating Terrorism includes an objective to
Organizations interdict and disrupt material support for terrorists,
including their financial support. Moreover, one of the enduring policy
principles that guides U. S. strategies to combat terrorism overseas is
isolating and applying pressure on states that sponsor terrorism to force
them to change their behavior. The Departments of State, the Treasury,
Homeland Security,

and Justice conduct activities to deny terrorists and their sponsors
access to financial assets. In some cases, the federal government
designates terrorists and terrorist organization before the Departments of
the Treasury, Justice, and State attempt to deny them financing and
financial services. The United States also works with several
international organizations to disrupt terrorist financing. Coordination
occurs through interagency working groups or operations sponsored by the
NSC and various departments. As of November 2002, the government reported
that

over $113 million in terrorist related assets had been frozen, including
$35 million in the United States and $78 million in other countries.

Designation of Terrorist As a prelude to freezing terrorist assets, the U.
S. government can designate Organizations and Their

a terrorist organization as a Foreign Terrorist Organization and the
states, Sponsors and Supporters

organizations, and individuals that sponsor or support them as
Statesponsors Permits Action to Block

of terrorism, or organizations or individuals that support terrorism,
respectively. Different processes exist for designating such Assets

organizations and states and those who support them. Those processes and
related sanctions are described below.

Foreign Terrorist Organizations Under the authority provided by the
Antiterrorism and Effective Death Penalty Act of 1996, as amended by the
USA PATRIOT Act of 2001, the Secretary of State, in consultation with the
Attorney General and the Secretary of the Treasury, designates foreign
terrorist organizations. 10 The Secretary is authorized to designate an
organization as a foreign terrorist organization if it is (1) a foreign
organization, (2) the organization engages in terrorist activity or
retains the capability and intent to engage in terrorist activity or
terrorism, 11 and (3) the terrorist activity or terrorism of the
organization threatens the security of U. S. nationals or the national
security of the United States. Designating these organizations allows the
Treasury to block the assets of these organizations in U. S. financial
institutions. It also makes it a crime to knowingly provide funds and
other forms of material support to the designated groups and allows the
blocking of visas for their

members without having to show that the individual was involved in
specific terrorist activities. As of April 2003, 36 groups had been
designated as foreign terrorist organizations.

State Sponsors of Terrorism The Secretary of State designates a government
as a State Sponsor of Terrorism if that government has repeatedly provided
support for acts of international terrorism. The United States imposes
various sanctions on designated state sponsors of terrorism, such as (1) a
ban on defense- related exports and sales, (2) certain controls over
exports of dual use items, (3) restrictions on foreign assistance, and (4)
imposition of financial and

other restrictions, including U. S. opposition to loans by or other use of
funds by the World Bank and other international financial institutions and
amendments to the Foreign Sovereign Immunities Act to lift sovereign
immunity in civil litigation in U. S. courts. The Secretary of State has

10 P. L. 104- 132, Apr. 24, 1996, as amended. 11 For the purposes of this
designation, *terrorist activity* as defined in 8 U. S. C. 1182( a)( 3)(
B) (the Immigration and Nationality Act) or *terrorism* as defined in 22
U. S. C. 2656f( d)( 2).

designated seven countries as State Sponsors of Terrorism: Cuba, Iran,
Iraq, Libya, North Korea, Sudan, and Syria. All of these countries have
held such a designation for several years.

Organizations and Individuals Executive Order 13224 establishes policies
and procedures for designating

That Support Terrorism terrorists, their organizations, and others who
provide financial support or

other services to them. 12 The executive order authorizes the Department
of the Treasury, in consultation with the Department of State and the
Attorney General, to block assets of individuals and organizations
supporting terrorists in any financial institution in the United Sates or
assets held by any U. S. person. As of September 2002, provisions under
Executive Order 13224 had identified 236 organizations and individuals
that support terrorism.

Department of the Treasury Since PDD 39 in June 1995, the Secretary of the
Treasury has been Efforts to Identify, Track,

responsible for identifying and blocking terrorist financing. These
efforts and Block Terrorist

were stepped up after the terrorist attacks of September 11, 2001, when
the Financial Assets

President signed Executive Order 13224. This order directed the Secretary
of the Treasury, in consultation with the Secretary of State and the
Attorney General, to deny financing and financial services to terrorists
and terrorist organizations. The executive order authorizes the blocking
of assets of

those designated individuals and organizations linked to global terrorism.
It also prohibits transactions with designated terrorist groups, leaders,
and corporate and charitable fronts. The Department of the Treasury also
is

working with key federal agencies in implementing key statutory provisions
of the USA PATRIOT Act to permit more information sharing among law
enforcement entities and financial institutions. A number of organizations
within the Department of the Treasury are involved in these efforts.

12 Executive Order 13224 *Blocking Property and Prohibiting Transactions
with Persons Who Commit, Threaten to Commit, or Support Terrorism,* Sept.
23, 2001.

Executive Office for Terrorist The Executive Office for Terrorist
Financing and Financial Crimes was

Financing and Financial Crimes created in March 2003 and assumed selected
functions of the former Office

of Enforcement. 13 The office is charged with coordinating Treasury
Department*s efforts to combat terrorist financing both in the United
States and abroad. The new office is responsible for the following
specific duties: (1) developing and implementing U. S. government
strategies to combat terrorist financing domestically and internationally,
(2) developing and

implementing the National Money Laundering Strategy, (3) participating in
the department*s development and implementation of U. S. government
policies and regulations in support of the USA PATRIOT Act, (4) joining in

representation of the United States in international bodies dedicated to
fighting terrorist financing, and (5) developing U. S. government policies
related to financial crimes. The office will work with other Treasury
elements to include the International Affairs Task Force on Terrorism, the
Office of Foreign Assets Control, and the Financial Crimes Enforcement
Network (all described below).

International Affairs Terrorist The International Affairs Terrorist
Financing Task Force works with other

Financing Task Force countries in an effort to implement and improve
mechanisms for blocking

terrorist assets globally and thereby deny terrorists access to formal and
informal financial systems. The task force tracks global progress in
blocking terrorist assets and attempts to coordinate these efforts with

various international organizations. Office of Foreign Assets Control The
Office of Foreign Assets Control administers economic sanctions and

embargo programs against specific foreign countries or groups (including
designated terrorists, terrorist organizations, state sponsors, and
individuals supporting those organizations) to further U. S. foreign
policy and national security objectives. The office imposes control on
financial transactions and freezes foreign assets, denying the targeted
country, individual, or organization.

Financial Crimes Enforcement The Financial Crimes Enforcement Network
(FinCEN) has a mission is to

Network (1) support law enforcement investigative efforts and foster
interagency

and global cooperation against domestic and international financial crimes
13 The Department of the Treasury*s Office of Enforcement had been
responsible for the policy, development, guidance, and coordination of
Treasury*s law enforcement entities to combat money laundering, including
terrorists financing. The office had also been involved in negotiating
international agreements to engage in joint law enforcement operations and

exchange financial information and records.

and (2) provide U. S. policymakers with strategic analyses of domestic and
worldwide money- laundering developments, trends, and patterns. The
network supports law enforcement investigations to prevent and detect
terrorist financing, money laundering and other financial crimes.

Department of Homeland The new Department of Homeland Security also has a
role in tracking

Security Has Role Related to terrorist financing and conducting related
investigations. The department*s Terrorist Financing

Bureau of Immigration and Customs Enforcement and the U. S. Secret Service
are involved in these activities. Bureau of Immigration and

The Bureau of Immigration and Customs Enforcement, consisting in part of
Customs Enforcement

the former U. S. Customs Service, has a mission to target current
terrorist funding sources and identify possible future sources. The bureau
has a multi- agency entity called Operation Green Quest to bring together
federal agency expertise across departments and bureaus to identify
systems, individuals, and organizations that serve as sources of terrorist
funding. According to Operation Green Quest officials, their
investigations have resulted in a number of arrests, indictments,
convictions, and seizures. Operation Green Quest is working in tandem with
other federal law

enforcement agencies in pursuing several specific cases related to
terrorist financing. U. S. Secret Service The U. S. Secret Service is
responsible for enforcement of laws relating to

securities of the United States and financial crimes. Its efforts to
combat international terrorism rest primarily on the investigation of
counterfeiting of currency and securities.

Department of Justice and The Department of Justice and the FBI also have
efforts under way to

the FBI also Track and disrupt terrorist financing. According to the
department, the FBI has the

Investigate Terrorist Assets lead in law enforcement and criminal matters
related to terrorism, and

terrorist financing is one element of overall terrorist investigations and
prevention efforts. There are two major organizations within the
department that are involved in these efforts.

Terrorist Financing Task Force The Department of Justice established a
Terrorist Financing Task Force to coordinate the terrorist financing
enforcement efforts. Within Justice*s Criminal Division, the task force
works with prosecutors around the country as well as with the FBI*s
Foreign Terrorist Tracking Task Force and

Terrorist Financing Operation Section to disrupt groups and individuals
representing terrorist threats.

Terrorist Financing Operations In response to the events of September 11,
2001, the FBI established the

Section interagency Terrorist Financing Operations Section within its

Counterterrorism Division to work jointly with the law enforcement and
intelligence communities to identify, investigate, disrupt, dismantle, and
prosecute, as appropriate, terrorist- related financial and fund- raising
activities. With access to FBI and CIA intelligence and criminal databases
and connectivity to terrorism investigations, the section is a focal point
for efforts to identify and target terrorist financing. According to the
FBI, the Terrorist Financing Operations Section brings the bureau*s
financial expertise to bear in identifying terrorist financing methods and
movement of money into and out of the United States in support of
terrorist activity. The section works with other agencies and partners in
the law

enforcement, intelligence, financial, and international sectors. To help
prevent terrorist attacks, the section developed a centralized terrorist
financial database to identify potential terrorist- related activity in
the United States and abroad. This database is utilized in conjunction
with a number of initiatives, which include working with the financial
sector in developing predictive models and conducting data mining analysis
to

facilitate a proactive approach in identifying previously unknown
*sleeper* terrorist suspects. According to the FBI, information developed
by the section is shared within the law enforcement and intelligence
community.

International Cooperation The Departments of State, the Treasury, and
Justice work with other

to Identify and Freeze countries on a bilateral and multilateral basis to
identify and freeze

Terrorist Assets terrorist assets. At the State Department, the Office of
the Coordinator for

Counterterrorism and the Office of International Narcotics and Law
Enforcement have the lead in coordinating capacity building to combat
terrorist financing in other countries. Offices from other agencies lend
their expertise on a bilateral and multilateral basis to provide technical
assistance and training to countries to assist these countries in meeting
international standards to combat terrorist financing. For example, the
Treasury*s Office of International Affairs takes the lead in working with
other countries. Treasury*s Office of Technical Assistance is working with
a number of countries to assess their capabilities and provide technical
support to disrupt terrorist financing. In another example, the Department
of Justice*s Asset Forfeiture and Money Laundering Section provides
assistance to other countries in drafting money- laundering legislation.
Types of U. S. government technical assistance and training cover both the

legal aspects (from drafting laws and implementing regulations to training
prosecutors and judges) and financial aspects (from developing financial
intelligence units to conducting financial investigations). Additional
information on training and assistance was provided in chapter 3.

As of November 2002, 208 countries and jurisdictions have pledged their
support for the financial war on terrorism and 165 countries and
jurisdictions have issued orders in force to freeze terrorist assets.
Since

September 11, 2001, the international community has frozen millions of
dollars in terrorist- related assets under UN Security Council Resolutions
1267, 1390, 1373, and 1455. Other countries improved their legal and
regulatory systems to help block terrorist funds.

On a bilateral basis, U. S. embassy officials representing the Departments
of State, the Treasury, and Justice work with individual host countries on
matters of terrorist financing. State economic officers, Treasury
financial attaches, and FBI legal attaches all play roles in this type of
bilateral

cooperation. In 2002, the State Department required that each U. S.
embassy establish a Terrorist Financing Task Forces, an initiative to
further coordinate the activities of these agencies. The Department of
Homeland Security*s Bureau of Immigration and Customs Enforcement
(formerly

U. S. Customs Service) provides expertise on import/ export issues. The
Embassy*s Deputy Chief of Mission generally leads these task forces.

On a multilateral basis, the U. S. government works with several
international organizations, to increase international cooperation to
combat terrorist financing. Examples of these include:

United Nations Several UN Security Council Resolutions call on UN member
states to take actions against terrorist financing. Resolution 1373 is the
broadest of these and it, among other things, obligates member states to
prevent and suppress the financing of terrorist acts, freeze funds and
other financial assets or economic resources of persons who commit or
attempt to commit terrorist acts, and criminalize the collection or
provision of funds intended for use in carrying out terrorist acts. In
addition, UN Security Council Resolution 1455 requires member states to
continue sanctions against the Taliban, Osama bin Laden, and al Qaeda. It
requires states to implement sanctions to include freezing economic
resources, preventing the supply or sale of weapons, and preventing
members of al Qaeda or the Taliban from entering or traveling through
their territories.

Financial Action Task Force The Financial Action Task Force is another
international group that cooperates in efforts against terrorist financing
and support. The task force* consisting of 31 members* has served as the
preeminent multilateral organization to combat money laundering since
1989. The Financial Action Task Force established a Terrorist Financing
Working Group, which is co- chaired by Spain and the United States
(through the Department of the Treasury). The working group is to identify
members that will need assistance to come into compliance with the
recommendations on terrorist financing. The task force issued eight
special recommendations on terrorist financing, requiring all members to
(1) ratify the UN International Convention for the Suppression of the
Financing of Terrorism and implement relevant UN Security Council
Resolutions against terrorist financing; (2) criminalize the financing of
terrorism, terrorist acts, and terrorist organizations; (3) freeze and
confiscate terrorist assets; (4) require financial institutions to report
suspicious transactions linked to terrorism; (5) provide the widest
possible assistance to other countries* law enforcement and regulatory
authorities for terrorist financing investigations; (6) impose anti- money
laundering requirements on alternative remittance systems; (7) require
financial institutions to include accurate and meaningful originator
information in money transfers; and (8) ensure that non- profit
organizations cannot be misused to finance terrorism. The task force also
requires members to provide closer scrutiny of transactions with non-
cooperative countries and prohibits financial transactions with these
members* jurisdictions.

Egmont Group The Egmont Group is an international group that cooperates in
efforts against terrorist financing and support. There are 69 members,
with each member designating one of its agencies as its Financial
Intelligence Unit to act as a central resource for collecting information
and cooperating with the other Egmont members. For the United States, the
Department of the Treasury has designated FinCEN as the Financial
Intelligence Unit. The intelligence units work collectively to (1)
eliminate impediments to information exchange, (2) make terrorist
financing a form of suspicious activity to be reported by all financial
sectors to their respective intelligence unit, and (3) undertake joint
studies of money laundering vulnerabilities, especially those having some
bearing on terrorism. The intelligence units foster interagency global
cooperation in the efforts to combat international financial crimes. This
includes sharing information on training and expertise with foreign law
enforcement officials. FinCEN maintains country specific expertise of
financial crimes, promotes the development of Financial Intelligence Units
in other countries, and facilitates investigative exchanges with them.

International Organization of International cooperation related to money
laundering also occurs through

Supreme Audit Institutions the International Organization of Supreme Audit
Institutions, which

represents 184 UN member nations* top accountability organizations related
to government audit and oversight. The U. S. General Accounting Office and
its counterparts from all parts the world are working cooperatively to
improve their oversight capacity for government departments and regulatory
financial institutions. This work takes the

form of publishing and disseminating standards and guidelines in critical
areas such as auditing, internal control, financial reporting, information
technology, and public debt. In addition, the organization recently

established a task force charged with studying the national audit offices*
role in helping prevent and detect money laundering and sharing
information and experiences with each other. The organization also has
established partnerships with organizations such as the World Bank and the
International Federation of Accountants to strengthen its impact in these
areas.

Coordination Mechanisms At the strategy and policy level, interagency
coordination of U. S. for Efforts to Disrupt

government efforts to deny terrorists financing is intended to occur
Terrorist Financing and

through a NSC- sponsored working group chaired by the Department of the
Support

Treasury. The interagency group helps to coordinate operations to disrupt
terrorist networks by freezing terrorist accounts and seizing assets. The
interagency group also helps to develop strategies and activities to deny
terrorist financing with other countries. The highest- level interagency
planning document is the National Money Laundering Strategy. The
Departments of the Treasury and Justice jointly published this July 2002
strategy. The strategy sets forth an action plan for how law enforcement,
regulatory officials, the private sector, and the international community
could take steps to make it harder for criminals to launder money
generated from their illegal activities. In addition to addressing general
criminal financial activities, the 2002 strategy presents the government*s
plan to attack financing networks of terrorist entities. The strategy

discusses the need to adapt traditional methods of combating money
laundering to unconventional tools used by terrorist organizations to
finance their operations.

At the operations level, interagency coordination occurs through the
Department of Homeland Security*s Operation Green Quest and the FBI*s
Terrorist Financing Operations Section and Joint Terrorism Task Forces.
These organizations, particularly Operation Green Quest and the Terrorist
Financing Operations Section, were established to investigate and pursue

terrorist cells and networks, including the financing of such networks.
They act as both operational units and coordination mechanisms by pooling
information and expertise from participating agencies, such as the
Department of Homeland Security*s Bureau of Immigration and Customs

Enforcement and U. S. Secret Service; the Department of Justice*s FBI and
ATF; the Department of the Treasury*s Internal Revenue Service, FinCEN,
and Office of Foreign Assets Control; and the CIA.

Overseas coordination occurs at U. S. embassies through recently
established Terrorist Financing Task Forces. The U. S. embassy*s deputy
chief of mission leads these task forces with important roles also being
played by Department of State economic officers, Department of the
Treasury financial attaches, FBI legal attaches, and Department of
Homeland Security customs attaches.

Military Operations The National Strategy for Combating Terrorism includes
objectives to Provide Means to

destroy terrorists and their organizations and to deny them sanctuaries
and havens. According to the strategy, the intelligence community, in
Destroy Terrorist

conjunction with the Departments of State and Defense, will conduct an
Organizations

annual review and assessment of international terrorist sanctuaries and
develop plans to address them. Military operations, led by DOD, provide a
means to meet these objectives that complement other means* political,
diplomatic, legal, economic, and financial. Following the coordinated
terrorist attacks against the United States on September 11, 2001, DOD has
deployed forces worldwide in military operations against terrorists and
their supporters. As part of those deployments, DOD led Operation Enduring
Freedom with its coalition partners to disrupt and destroy global

terrorist organizations. U. S. Special Operations Forces worked on the
ground in Afghanistan with the Northern Alliance to help coordinate naval
and air attacks against the Taliban regime and al Qaeda in Afghanistan. U.
S. and coalition maritime interception operations disrupt terrorist
organizations* transport of terrorists and shipping of materiel and
illegal contraband to help support their operations. Members of al Qaeda
and Taliban forces captured during Operation Enduring Freedom have been
designated as combatants without prisoner of war status and are being
detained by the United States and its coalition partners for interrogation
and potential prosecution. A number of military contributions made by the
U. S. coalition partners helped support Operation Enduring Freedom. Some
of these contributions included aircraft to support the air campaign over
Afghanistan, ground troops inside the country, including special
operations

forces, and naval forces dispatched to the North Arabian Gulf and Indian
Ocean.

DOD Deployed Worldwide According to the Chairman of the Joint Chiefs of
Staff, U. S. forces now

in Military Operations are deployed to an unprecedented number of
locations in the wake of

the September 11, 2001, terrorist attacks. 14 One of the most visible
Against Terrorists and Their

deployments relate to operations in and around Afghanistan, discussed
Supporters

in more detail below. In addition, military forces have been deployed on
missions related to terrorism in a number of other countries, including
Colombia, Cuba, Georgia, the Philippines, and Yemen.

DOD Leads Operation Following the attacks on September 11, 2001, the
Secretary of Defense Enduring Freedom and

directed the preparation of *credible military options* to respond to
Topples Taliban Regime international terrorism. The U. S. Central Command*
DOD*s regional military command whose area of responsibility includes
Afghanistan and surrounding geographic areas* devised a plan to destroy
the al Qaeda network inside Afghanistan along with the Taliban regime,
which was harboring and protecting terrorists. On October 7, 2001, 26 days
after the attacks on the World Trade Center in New York City and the
Pentagon, Operation Enduring Freedom was launched on a global scale as a
broad and sustained campaign to disrupt and destroy terrorists and
terrorist organizations. According to the Secretary of Defense, the
objectives of the military operations were as follows:

 Make clear to the Taliban leaders and their supporters that harboring
terrorists is unacceptable and carries a price.

 Acquire intelligence to facilitate future operations against al Qaeda
and the Taliban regime that harbors the terrorists.

 Develop relationships with groups in Afghanistan that oppose the Taliban
regime and the foreign terrorists that they support.

 Make it increasingly difficult for the terrorists to use Afghanistan
freely as a base of operations.

14 Posture Statement of General Richard B. Myers, Chairman of the Joint
Chiefs of Staff, before the Committee on Armed Services, House of
Representatives, February 5, 2003.

 Alter the military balance over time by denying to the Taliban the
offensive systems that hamper the progress of various opposition forces.

 Provide humanitarian relief to Afghans suffering oppressive living
conditions under the Taliban regime.

Military operations were conducted in Afghanistan in conjunction with U.
S. coalition with the goal of removing the Taliban from power and
destroying the al Qaeda network within Afghanistan. U. S. forces and its
coalition partners combined operations with the Northern Alliance fighters
(primarily from the Tajik and Uzbek ethnic groups) and the Southern
Alliance fighters in the defeating the Taliban forces.

A series of bombing sorties were launched against the Taliban*s air
defense, command and control, and mobility capabilities. U. S. Special
Operations Forces on the ground worked with the Northern Alliance fighters
to identify targets for a coordinated air attack. Long- range air strikes
using advanced laser- guided weapons were launched from aircraft carriers
in the Arabian Sea, Indian Ocean, and from regional land bases. U. S.
Navy, Marine, and Air Force pilots delivered in excess of 18,000
munitions, of which more than 10,000 were precision- guided bombs. As
shown in

figure 12, B- 52 long- range bombers launched from Diego Garcia (a British
archipelago in the Indian Ocean) also were used during the air campaign.

Figure 12: Air Force B- 52H Bomber Drops a Load of M117 750 lb. Bombs

U. S. forces conducted surveillance of Afghanistan and the movement of
enemy forces through a combination of intelligence assets. U. S. Special
Operations Forces on the ground provided human intelligence while manned
and unmanned surveillance aircraft patrolled the skies, providing
information on sites, facilities, and troop concentrations. Figure 13
shows U. S. Special Operations Forces adapting to their environment by
riding on horseback to conduct operations in northern Afghanistan.

Figure 13: U. S. Special Forces Troops Riding Horseback in Afghanistan
With Members of the Northern Alliance during Operation Enduring Freedom

These operations have resulted in the destruction of the Taliban regime,
although U. S. forces continue to locate and engage remaining pockets of
terrorists and their supporters to improve security and stability in
Afghanistan. According to U. S. Central Command officials, many al Qaeda
members, including their operational planners, facilitators, and
logisticians, have been captured or killed. In addition, al Qaeda training

facilities in Afghanistan have been destroyed, command and control
capabilities have been disrupted, and the remaining al Qaeda leaders are
on the run.

As of April 2003, according to the U. S. Central Command, the initial
objectives of Operation Enduring Freedom to destroy the base of the al
Qaeda terrorist organization in Afghanistan and replace the Taliban regime
that supported al Qaeda largely have been met. Combined Joint Task Force
180, which took direct control of operations in Afghanistan in June 2002,
continues this mission. It also is conducting operations to ensure that
Afghanistan will not again be a safe haven for terrorists and to
facilitate the reintroduction of Afghanistan into the community of
nations.

The U. S. Central Command*s operations in Afghanistan have been
complemented by cooperative efforts with Pakistan to eliminate the al
Qaeda organization in that country. According to the U. S. Central
Command, these efforts have led to the capture of hundreds of al Qaeda and
Taliban members, including very senior members of the al Qaeda
organization. This cooperation continues to degrade the al Qaeda
organization and is a critical component in the terrorist organization*s
destruction.

DOD and U. S. Coast Guard The National Strategy for Combating Terrorism
includes an objective to

Conduct Maritime interdict and disrupt material support for terrorists. As
part of this

Interception Operations objective, U. S. military forces, in conjunction
with coalition partners,

conduct maritime interception operations to disrupt shipping by terrorist
organizations. According to the Chairman of the Joint Chiefs of Staff, the
President approved expanded maritime interception operations in July 2002,
authorizing commanders to stop, board, and search merchant ships
identified to be transporting terrorists and/ or terrorist- related
material. 15 These operations have been concentrated in the areas of
responsibility of

the U. S. European Command and U. S. Central Command. In support of
Operation Enduring Freedom, U. S. naval forces conducted maritime
interception operations with a number of coalition partners. Operations by
the U. S. European Command include NATO maritime and air forces. These
operations resulted in more than 16, 000 vessels being queried and about
200 vessels being boarded and searched. One operation led to the detention

15 Posture Statement of General Richard B. Myers, Chairman of the Joint
Chiefs of Staff, before the Committee on Armed Services, House of
Representatives, Feb. 5, 2003.

of four suspected al Qaeda members in the Gulf of Oman as navy vessels and
aircraft from Canada, France, Italy, and the Netherlands targeted,
intercepted, and boarded two vessels. The four captured al Qaeda members
were transported to the detainee facility at Bagram Air Base, Afghanistan.
Figure 14 shows coalition forces conducting such operations in the Arabian
Sea.

Figure 14: British Troops Prepare to Board an Oil Tanker as Part of the
Coalition*s Maritime Interception Operations in the Arabian Sea

The U. S. Coast Guard also participates in maritime interception
operations. In its role as a military service, the U. S. Coast Guard
supports regional military commands, which have requested and received U.
S. Coast Guard cutters to conduct such operations. A 1995 Memorandum of
Agreement between the Departments of Defense and Transportation identified
the appropriate roles, missions, and functions of the U. S. Coast Guard to
support the national military and naval strategies of the United States.
The agreement recognized that the U. S. Coast Guard maintains many
proficiencies and platforms directly applicable to maritime interception
operations and that is it appropriate and desirable for the U. S. Coast
Guard

to participate in such operations. To accomplish its missions to combat
terrorism, both domestic and overseas, the U. S. Coast Guard developed a

U. S. Coast Guard Maritime Strategy for Homeland Security. This strategy
puts a premium on identifying and intercepting threats well before they
reach U. S. shores by conducting layered, multi- agency, maritime security
operations that include surveillance and reconnaissance, tracking, and
interception.

Detainees Held by DOD for Throughout the military operations in
Afghanistan, U. S. forces and military

Intelligence Gathering coalition partners captured over 5,000 Taliban and
al Qaeda forces and

confiscated laptop computers and cell phones. DOD holds some al Qaeda
fighters who had information about operational methodology and future
operations in Kandahar and Bagram, Afghanistan. DOD transported other
detainees to detention facilities at Naval Air Station Guantanamo Bay,
Cuba. Over 500 detainees from 44 countries were transported to

Guantanamo Bay. Figure 15 shows part of the newly constructed detention
facility at Naval Air Station Guantanamo Bay, Cuba.

Figure 15: Camp X- Ray Used as a Temporary Holding Facility for Detainees
Held at U. S. Naval Air Station Guantanamo Bay, Cuba

The U. S. Southern Command activated Joint Task Force 160 to staff the
maximum- security installation and provide security and support functions
at Naval Air Station Guantanamo Bay. The detainees, originally housed in
the wire enclosures at Camp X- Ray, are now housed in a more permanent

facility, known as Camp Delta. The U. S. Southern Command also established
Joint Task Force 170 to coordinate U. S. military and government agency
interrogation efforts in support of Operation Enduring Freedom. A Joint
Interagency Interrogation Facility was established to support
interrogations focused on intelligence collection, force protection, and
planned terrorist activities. These efforts also support law enforcement
agencies and military tribunal efforts.

The detainees are not considered to be prisoners of war. The President
determined that the Geneva Convention of 1949 applies to the conflict with
the Taliban in Afghanistan because Afghanistan is a state and signatory of
the Geneva Convention. However, the President determined that the Taliban
detainees do not have prisoner of war status because they fail to meet the
criteria under article 4 of the Geneva Convention. For example,

throughout combat in Afghanistan, the Taliban did not wear distinctive
signs, insignias, symbols, or uniforms, and were not organized into
military units with identifiable chains- of- command. In addition, the
President determined that the Geneva Convention of 1949 does not apply to
al Qaeda detainees because they are considered to be a non- state
terrorist network.

DOD*s Military Order issued on November 13, 2001, permits military
commissions to try non- U. S. citizens accused of terrorism against the
United States and DOD has announced procedural draft guidelines for

those commissions. Non- U. S. citizens selected by the President, to
include al Qaeda and Taliban members, those involved in acts of
international terrorism against the United States, and those members or
actors who knowingly harbor such terrorist may be tried. According to the
order, the

Secretary of Defense will appoint members to each commission, which will
have three to seven members. One commission member the presiding officer
will ensure discipline and the decorum and dignity of the

proceedings. As of March 2003, no trials have been held. Coalition
Partners Support

Following the attacks on September 11, 2001, the Department of State led
U. S. Military Operations efforts to build a coalition to support the
global war on terrorism. About 90 nations made contributions to Operation
Enduring Freedom including intelligence, personnel, equipment, and
military assets. In the U. S. Central

Command*s area of responsibility, coalition partners deployed more than
16,000 troops. In Afghanistan, coalition partners contributed more than
8,000 troops to both Operation Enduring Freedom and to the UN- mandated
International Security Assistance Force in Kabul, which represented over

half of the 15,000 non- Afghan forces in Afghanistan. 16 Some 9 countries
provided ground forces to serve in Afghanistan and 21 countries deployed
forces to support the International Security Assistance Force in
Afghanistan. Other key military contributions included support to aircraft
in the air campaign over Afghanistan, ground troops inside Afghanistan,
including special operations forces, and naval forces dispatched to the
North Arabian Gulf and Indian Ocean for maritime surveillance and
interception operations. Table 9 summarizes the military contributions
made by selected coalition partners to support Operation Enduring Freedom.
These contributions are in addition to the basing and overflight
agreements negotiated by the State Department and discussed under
diplomatic initiatives at the beginning of this chapter.

Tabl e 9: Significant Military Contributions by Selected Coalition
Partners in and around Afghanistan in Support of Operation Enduring
Freedom Type of operations Contributions in support of Operation Enduring
Freedom Ground operations

Special operations forces Australia, Canada, Denmark, Germany, New
Zealand, Norway, and the United Kingdom deployed special operations forces
in Afghanistan and surrounding regions to perform the full spectrum of
missions.

Infantry support Canada, France, Italy, Pakistan, Turkey, and the United
Kingdom deployed infantry and equipment in Afghanistan and surrounding
regions to perform security and combat operations.

Naval operations

Maritime interception Australia, Canada, France, Italy, the Netherlands,
Poland, and the United Kingdom deployed operations ships, aircraft, and
forces in the Arabian Gulf and surrounding areas to support maritime
interception operations. Logistical support Japan, India, and Poland
deployed ships for logistical support, such as refueling and escort
assistance.

Combat operations France, Italy, Turkey, and the United Kingdom deployed
ships to support combat operations in the region. Denmark and the
Netherlands also deployed naval ships to relieve U. S. units in the U. S.
Southern Command.

16 UN Security Council Resolution 1386 (Dec. 20, 2001) authorized the
establishment of the International Security Assistance Force to provide
assistance and maintain security in Kabul, Afghanistan, and its
surrounding areas.

(Continued From Previous Page)

Type of operations Contributions in support of Operation Enduring Freedom
Air operations

Combat air patrol Denmark, France, and Norway deployed fighter aircraft in
Afghanistan and surrounding regions to support combat air patrol missions.
Australia deployed fighter aircraft to perform combat air patrol missions
at Diego Garcia in support of the U. S. Pacific Command. The Czech
Republic and the United Kingdom deployed personnel and aircraft in support
NATO airborne warning and control systems missions.

Strategic airlift Belgium, Canada, Denmark, France, and Norway deployed
aircraft in Afghanistan and surrounding regions to support strategic
airlift operations. Japan also deployed aircraft to support re- supply and
transport requirements within the U. S. Pacific Command*s area of
responsibility.

Logistical support Australia, France, the Netherlands, New Zealand,
Norway, Turkey, and the United Kingdom deployed aircraft to Afghanistan
and surrounding regions to conduct logistical support, including aerial
refueling.

Surveillance and reconnaissance France and United Kingdom deployed
aircraft in Afghanistan and surrounding regions to provide support to
intelligence, surveillance, and reconnaissance missions.

Other support

Mine clearing operations Denmark, Jordan, Norway, Poland, and the United
Kingdom deployed personnel and equipment in Afghanistan to conduct mine
clearing missions.

Civil- military support Belgium, Denmark, Finland, France, Germany,
Greece, Italy, Netherlands, New Zealand, Norway, Portugal, Romania, Spain,
Sweden, Turkey, and the United Kingdom deployed civil military personnel,
aircraft, and equipment to support the UN International Security
Assistance Force in Afghanistan.

Humanitarian support Belgium, the Czech Republic, Denmark, Finland,
France, Germany, Jordan, Kyrgyzstan, the Netherlands, Norway, Portugal,
Russia, South Korea, Spain, Sweden, Turkmenistan, and the United Kingdom
provided humanitarian support to Afghanistan.

Consequence Bulgaria, the Czech Republic, and the United Kingdom provided
consequence management management support teams (nuclear, biological, and
chemical teams) in Afghanistan and surrounding regions. Source: DOD.

Note: GAO analysis of DOD data.

Forces from NATO countries played a key role in the effort to end
Afghanistan*s role as a safe haven for terrorists and terrorist
organizations by providing direct and indirect military support to the
United States. As shown above, NATO members providing support included
Belgium, Bulgaria, Canada, the Czech Republic, Denmark, France, Germany,
Greece, Italy, the Netherlands, Norway, Poland, Portugal, Spain, Turkey,
and the United Kingdom. In addition, forces under direct NATO control were
deployed to support U. S. forces. For example, NATO deployed five airborne
warning and control systems aircraft to the continental United States to
patrol the skies and free up similar U. S. aircraft for missions over
Afghanistan. The alliance also sent its Standing Naval Force to the

Mediterranean Sea to establish a NATO presence in the region. NATO*s
support in the region helped provide enhanced intelligence sharing, access

to ports and airfields, increased security for U. S. bases on allied
territory, and backfill for selected U. S. and allied military assets
withdrawn from NATO*s area of responsibility. Figure 16 shows aerial
reconnaissance support provided by a NATO country.

Figure 16: NATO Member France Provided Six Mirage 2000 Aircraft to Fly
Reconnaissance Missions in Support of Operation Enduring Freedom

Coordination Mechanisms At the headquarters level, military operations are
coordinated at DOD.

for Military Operations Within the Joint Staff*s various directorates for
intelligence, operations,

logistics, and planning, there are sections dedicated to military
operations against terrorism. For example, the Joint Staff*s Directorate
for Planning (J- 5) has a special section for planning the worldwide
campaign against

terrorism. This section developed DOD*s National Military Strategic Plan
for the War on Terrorism. DOD currently coordinates its worldwide,
military operations through various regional and functional commands. The
regional commands* responsible for a specific geographic area of

responsibility* include the U. S. Central Command, the U. S. European
Command, the U. S. Northern Command, the U. S. Pacific Command, and the U.
S. Southern Command. 17 DOD*s functional commands include the U. S. Joint
Forces Command, the U. S. Special Operations Command, U. S. Strategic
Command, U. S. Space Command, and U. S. Transportation Command. The U. S.
Special Operations Command is preparing to take a lead role in the war on
terrorism in future operations and will transition from a *supporting* to
a *supported* command in this role. As discussed previously, the State
Department*s Bureau of Political- Military Affairs and

various regional bureaus are involved in headquarters coordination of
military operations with other countries, particularly when diplomatic
negotiations are required to obtain coalition support. At the field level,
military operations are coordinated by DOD*s regional commands. Depending
on the operation, the regional and functional commands are either
*supported commands* (having the lead for that operation) or *supporting
commands* (providing support to the lead command). For example, for
operations in Afghanistan, the U. S. Central Command was the supported
command, in charge of planning and executing operations. It got help from
supporting commands to include the

U. S. Transportation Command (which supplies airlift), the U. S. Special
Operations Command (which supplies special operations forces), and other
commands. These commands also have subordinate headquarters or forward
operating bases overseas to coordinate military operations in the field.

The regional commands also coordinate their activities through interagency
working groups and various plans. DOD created interagency working groups
following the September 11, 2001, terrorist attacks on the United States
and they include agencies representing diplomacy, intelligence, and law
enforcement. Some of the agencies had long- standing

liaisons at the commands, while other agencies established liaisons for
the first time. An example of a long- standing liaison would be State
Department political advisors with the rank of ambassador, who help the
commands coordinate diplomatic activities with the department in
Washington, D. C., and with U. S. embassies in the command*s area of
responsibility. Regional military commands also have command- specific

17 The U. S. Northern Command became operational in October 2002. Its
focus is on homeland security and, therefore, was not covered in this
report on efforts to combat terrorism overseas.

campaign plans to implement DOD*s National Military Strategic Plan for the
War on Terrorism in their geographic area of responsibility. They also
have Theater Security Cooperation Plans to lay out the command*s
strategies for working with other countries in the region to further U. S.
foreign policy and military goals.

Covert Actions Can Another tool that can be used to disrupt and destroy
terrorist organizations

is covert action by the intelligence community. 18 By executive order and
Be Used to Disrupt

statute, the CIA specifically is authorized to initiate such actions that
are and Destroy Terrorist

individually authorized by the President. 19 Other federal agencies and
Organizations

departments also may be tasked to support covert action, with a separate
presidential authorization. The Intelligence Authorization Act of 1991
allows the President to authorize covert actions if they are necessary to
support the foreign policy objectives of the United States. According to
the

act, any new covert action must be justified according to this standard in
a written finding that the President must submit to the House and Senate
Select Committees on Intelligence, unless the President determines that it
is necessary to limit access to the finding to meet extraordinary
circumstances affecting vital U. S. interests. This finding must specify
the government agencies participating in the action, can never be
retroactive, and may not authorize any action that would violate the U. S.
Constitution or U. S. statute. In extraordinary circumstances, the
President may restrict access to findings to certain congressional
officials, but such reasons for

the restriction must be submitted to the committees. Finally, the
President must notify the committees of any significant change to a
previously approved covert action. The Congress has supported such actions
in the

past, urging the President to *use all necessary means, including covert
action, to disrupt, dismantle and destroy infrastructure used by
international terrorists, including overseas terrorist training facilities
and safe havens.* 20

18 Covert action is an operation designed to influence governments,
events, organizations, or persons in support of foreign policy in a manner
that is not necessarily attributable to the United States. It may include
political, economic, propaganda, or paramilitary activities.

19 Executive Order 12333, Dec. 4, 1981 and P. L. 102- 88, Aug. 14, 1991.
20 P. L. 104- 132 S: 324, Apr. 24, 1996.

The Director of Central Intelligence, in discussing covert actions in an
unclassified forum, provided several examples of CIA efforts to disrupt
terrorist organizations. 21 By 1993, the U. S. intelligence community
already had recognized al Qaeda as a significant threat and began
operations to reduce its capabilities. These efforts included hitting al
Qaeda*s infrastructure, working with foreign security services, disrupting
and

weakening Osama bin Laden*s businesses and finances, and recruiting or
exposing operatives. By 1999, these efforts had coalesced into a concerted
offensive disruption campaign against the al Qaeda network. During the
millennium threat period, CIA and FBI disruption operations identified 36
terrorist agents and successfully targeted 21. A parallel operation in
East Asia led to the arrest or detention of 45 members of Hizballah.
Later, during the Ramadan threat period (winter of 2000), terrorist cells
planning attacks on U. S. and foreign military and civilian targets in the
Persian Gulf were broken up and their equipment seized. This equipment
included hundreds of pounds of explosives as well as anti- aircraft
missiles. The operation also netted proof that some Islamic charitable
organizations had been either hijacked or created to provide support to
terrorists operating in other countries. Finally, in the spring and summer
of 2001, the CIA helped break up a terrorist cell in Jordan, disrupted a
plan to attack U. S. facilities in Yemen in concert with a foreign
partner, and mounted a broad disruption

effort that substantially delayed attacks, including one planned on the U.
S. military in Europe.

Agency Comments and The Departments of Defense, Justice, and State and ATF
provided technical

Our Evaluation comments on the matters covered throughout this chapter.
Based upon

these comments, we made revisions as appropriate. We also made revisions
(primarily to the sections on law enforcement and terrorist financing)
based upon the creation of the Department of Homeland Security and the
transfer of various agencies and functions from the Department of the
Treasury into that department.

21 These unclassified examples are from the Written Statement for the
Record of the Director of Central Intelligence before the Joint Inquiry
Committee, Oct. 17, 2002.

Federal Efforts to Respond to Terrorist

Chapt 5 er Incidents Overseas The National Strategy for Combating
Terrorism includes an objective to ensure a fully integrated incident
management capability. In addition, the

National Strategy for Homeland Security calls for the United States to
improve international cooperation in response to terrorist attacks.
Further, the National Strategy to Combat Weapons of Mass Destruction calls
for

the United States to be prepared to manage the consequences of a WMD
attack, including those that occur overseas. Federal efforts to respond to
terrorist incidents overseas consist of actions taken before, during, and
after a terrorist incident. Advance preparations include contingency plans
and exercises in anticipation of terrorist attacks. Incident response is
managed by the State Department through interagency task forces at
agencies* headquarters, the ambassador at a U. S. embassy, and special
emergency support teams. The FBI leads law enforcement aspects of crisis
management to investigate incidents and obtain evidence for prosecution.
The State Department, in conjunction with USAID and other agencies,

manages the consequences of an attack* including those involving WMD
agents. After a terrorist attack, federal agencies review the incident to
determine whether security procedures were followed, establish
accountability within the government, and provide lessons learned to

prevent or mitigate future attacks. This chapter describes the relevant
federal programs in place and is not an evaluation of their effectiveness.

Advance Preparations In anticipation of terrorist incidents overseas, the
federal government takes

for Terrorist Incidents a number of preparations in advance. The State
Department requires that

overseas posts prepare and exercise emergency contingency plans. In
addition, a number of other agencies participate in exercises* generally
sponsored by DOD* to test their responses to an overseas terrorist
incident.

Contingency Planning at As lead agency for interagency coordination of
international terrorist

Overseas Posts incidents, the Department of State has prepared a variety
of contingency

arrangements and plans in the event of a terrorist attack. State*s
Emergency Planning Handbook serves as a consolidated source of guidance
for overseas posts on how to plan for and deal with emergencies abroad.
The handbook explains post mechanisms for crisis management, identifies
post emergency management responsibilities, discusses emergency and crisis
management mechanisms within State and with other U. S. government
agencies; highlights the kinds of information the post will need to plan
for specific emergencies; and provides

action- oriented checklists that posts may use to ensure rapid, clear, and
complete responses in emergencies.

Every diplomatic post overseas is required to have an operative Emergency
Action Plan designed to provide procedures on how to deal with foreseeable
contingencies specific to the post. The post plan is written by members of
the Emergency Action Committee, which translate guidance issued by State
into a post- specific action plan for managing a crisis event.

The ambassador establishes the Emergency Action Committee and designates
personnel responsible for specific crisis- related functions. Every U. S.
diplomatic post is required to have an Emergency Action Committee.

Exercises Practice Incident PDD 39 requires key federal agencies to
maintain well- exercised

Response capabilities to combat terrorism. Exercises test and validate
policies and

procedures, test the effectiveness of response capabilities, increase the
confidence and skill levels of personnel, and identify strengths and
weaknesses in responses before they arise in actual incidents.

The State Department conducts internal exercises at overseas posts to test
their Emergency Action Committees and Emergency Action Plans, and to
generally prepare them for crisis management. The department conducts
exercises designed to expose posts to issues of decision- making,
contingency planning, implementation of plans and formulation, and
interpretation and coordination of policy. These exercises may cover a
wide range of contingencies related to terrorism, such as hostage

barricades, terrorist threats, and bombings. The State Department has been
running these at post exercises since 1983. In addition to these
departmentled exercises, the post- level Emergency Action Committee is to
prepare, execute, and evaluate post- level crisis exercises. These
exercises are designed to test individuals* understanding of their roles
under all

foreseeable crises. They seek to identify gaps or ambiguities in the plan
or in department guidance.

The Department of State, in conjunction with other federal agencies, also
coordinates an interagency exercise program to combat terrorism overseas.
1 Coordination of the exercises program is done through NSC*s
Counterterrorism Security Group and its Exercise and Readiness Subgroup.
The interagency exercise program is designed to strengthen the U. S.
government*s overall ability to deal with terrorist attacks. On an annual
basis, about four to six full- scale interagency overseas field exercises
are conducted. The exercises involve the actual movement of response teams
in a scenario that simulates a realistic overseas terrorist

incident. In addition, tabletop exercises are held periodically to
practice the coordination and management of a terrorism crisis without the
expense of actually deploying special teams of people. The scenarios and
agencies differ from exercise to exercise to develop and improve U. S.
capabilities to deal with a variety of situations. Some exercises are
conducted in overseas location with host government participation.

DOD sponsors many interagency exercises to prepare for terrorist incidents
overseas. For example, every year DOD sponsors no- notice interagency
field exercises. These exercises require regional commanders to execute
their own response plans and test interagency interoperability. DOD also
sponsors periodic senior- level interagency tabletop exercises. These
exercises emphasized interagency coordination among agency

officials for a crisis incident. DOD*s exercises also have included the
Departments of State, Health and Human Services, and Energy; the FBI; the
Environmental Protection Agency; and USAID.

DOD also has exercises for its forces outside the interagency exercise
program. Some require the regional commander to exercise all levels of
their response capabilities* tabletop sessions with their staff, response
forces, and integration with Special Operations Forces. In addition, DOD
runs exercises related to evacuations of U. S. diplomatic personnel and

1 For a more detailed description and evaluation of these exercises, see
GAO/ NSIAD- 99- 135 and U. S. General Accounting Office, Combating
Terrorism: Analysis of Federal Counterterrorist Exercises, GAO/ NSIAD- 99-
157BR (Washington, D. C.: June 25, 1999). In this report, we reported that
federal agencies had increased the number of counterterrorism exercises,
but only a few included no- notice deployments of personnel and equipment.
More than two- thirds of the exercises had WMD scenarios, while others had
more likely scenarios involving conventional arms and explosives. Also,
very few exercises dealt with the likely situation of both crisis and
consequence management occurring simultaneously. Also, we found that State
Department used DOD- and DOE- led exercises to practice its leadership
role. These exercises were well developed and enhanced the preparedness of
the federal government to respond to terrorist incidents overseas.

other Americans. Some of these may include some participation of other
agencies. For example, since 1991, the State Department has participated
in the U. S. Marine Corps* Special Operations Capable Exercise Program to
help train Marine Expeditionary Units in Noncombatant Evacuation
Operations.

Response to a Terrorist PDD 39 divided incident response into crisis
management and consequence

Incident Overseas management. Crisis management includes efforts to stop a
terrorist

attack, respond to the attack itself, and arrest and prosecute terrorists.
Consequence management includes efforts to provide medical treatment and
emergency services and evacuate people from dangerous areas. When
terrorist attacks occur without threat warning, crisis and consequence
management will be concurrent activities. The presidential decision
directive specified that the Department of State is the lead federal
agency for interagency coordination of international terrorist incidents,
to include both crisis and consequence management. 2 The State Department
is to manage the incident through interagency task forces at headquarters
and through the ambassador at the appropriate U. S. embassy. The
Department of Justice, through the FBI, would lead the law enforcement
aspects of crisis management, potentially deploying its response teams to
investigate incidents and obtain evidence for prosecution purposes. As the
lead agency for a terrorist incident, State also is responsible for
marshaling the federal assets necessary to manage the consequences of an
attack. A number of other federal agencies have response teams that can be
deployed overseas to support the response. State, in conjunction with
other agencies, has capabilities and contingency plans for WMD incidents
the kind of incident most likely to overwhelm host government
capabilities.

Incident Management at In managing a crisis overseas, the Department of
State coordinates

Headquarters operations through its 24- hour global Operations Center at
the department

in conjunction with the NSC. During a crisis, the department*s Operations
Center establishes a 24- hours task force to coordinate the flow of 2 For
international incidents, the distinction between crisis management and
consequence management is less significant than for domestic incidents. In
a domestic incident, the FBI

leads crisis management and FEMA leads consequence management. As a
domestic incident progresses, federal leadership in an incident can
transfer from the FBI to FEMA. In an international incident, the State
Department leads both crisis and consequent

management, thus there is no transfer of command from one agency to
another.

communication and instructions between the department, relevant agencies
involved, overseas posts, and foreign governments. The task force would be
chaired by the Coordinator for Counterterrorism and would

include relevant State bureaus as well as other U. S. government agencies.
The global watch is the initial point of contact for posts experiencing
emergency crises overseas. The 24- hour global watch and crisis management
support staff is maintained within the Operations Center.

Incident Management at In an overseas incident, the ambassador* working
with the Emergency

Overseas Posts Action Committee* would act as the on- scene coordinator
for the U. S. government. Interagency and State Department teams could
provide assistance. For example, the Department of State can deploy an
interagency Foreign Emergency Support Team (FEST) in coordination

with the NSC to assist the host government and the ambassador at the post.
The FEST primarily is an advisory team and serves as the single point- of-
contact for the ambassador in coordinating all U. S. government

support during a terrorist incident. The FEST will not enter the host
country unless requested by the ambassador, with the host government*s
permission. Depending upon the type of incident overseas and the host

governments* capabilities, the FEST can be tailored with expertise to
manage the crisis. The FEST can tailor its team to include experts on
managing specific types of WMD incidents, such as nuclear, biological, and
chemical threats. For example, the FEST can provide (1) guidance on

terrorist policy and incident management, (2) dedicated secure
communications to support the U. S. embassy throughout the incident, and
(3) special expertise and equipment not otherwise available, including a
professional hostage negotiations adviser. According to the National
Strategy for Combating Terrorism, the Departments of State and Defense
(and other relevant agencies) will ensure adequate staffing for the FEST.
Procedures for deploying the FEST are outlined in the interagency
International Guidelines, which were issued in January 2001.

State also maintains its own security response teams that can deploy in
anticipation of a terrorist crisis. The Bureau of Diplomatic Security has
Mobile Training Teams and Security Support Teams to respond to increased
threats or critical security needs at posts. These teams can provide
special training or assistance to plan or implement a draw down or

evacuate post personnel. These teams are to provide supplemental support
to regional security officers and stand ready for immediate deployments to
any post worldwide.

Law Enforcement Crisis management has an important law enforcement
function, including

Investigations for Overseas efforts to gather evidence, and arrest and
prosecute terrorists. PDD 39 and

Incidents PDD 62 affirmed the role of the Department of Justice, through
the FBI, to

coordinate the efforts of law enforcement agencies in preventing terrorist
attacks and investigating those attacks when they occur in international
waters or against U. S. persons and interests overseas.

According to the FBI, the bureau has a number of capabilities it can
deploy overseas to coordinate large scale investigations. In cases when an
incident occurs overseas, the FBI initially deploys its legal attaches to
respond to the crime scene to communicate initial reports to the FBI*s
main deployment team. In the interim, an advance team will depart from
Washington, D. C., and will include (1) a command element, (2) an
investigative component, (3) logistics personnel, (3) Critical Incident

Response Group, (4) physical security specialists to report on the
continuing threat to responding FBI personnel, and (5) communicators. And,
if needed and allowed by the host nation, the FBI will deploy a Rapid
Deployment Team overseas to provide additional investigative support,
including language specialists and expert forensics personnel from an FBI
laboratory. The Rapid Deployment Teams were established following the 1998
bombings of the two U. S. embassies in Kenya and Tanzania so that more
capabilities and additional personnel could be deployed to crime scenes in
nations that are receptive to joint investigations. Based on the needs at
the incident site and with the concurrence of the host nation, the FBI
will deploy additional agents to assist with the investigation. Figure 17
shows the damage inflicted to the USS Cole by a terrorist bomb explosion.
The FBI deployed its response teams to Aden to investigate the bombing.

Figure 17: USS Cole Damaged by a Terrorist Bomb Explosion While Refueling
at the Port of Aden, Yemen

As discussed in chapter 4, other federal agencies may assist the FBI in
its terrorism investigations overseas. For example, the ATF has
significant explosives investigation capability, which can support FBI
investigations of bombings. When needed, the bureau can deploy its
International Response Team to help gather evidence and identify the cause
and origin of an explosion or fire.

Managing the Consequences PDD 39 affirmed State as the lead agency for
consequence management of a Terrorist Incident

overseas, responsible for ensuring that the U. S. government is prepared
to respond to a foreign incident. Consequence management predominantly is
an emergency management function and includes efforts to provide medical
treatment and emergency services, evacuate people from dangerous areas,
and restore services. The responsibility for managing the consequences of
a terrorist incident remains with the host nation, although

the United States may provide assistance under certain circumstances. If
the ambassador determines that the host government is unable to cope with
managing the incident without outside help, the United States can

provide assistance if it is requested and it is in U. S. interests to
provide it. A foreign consequence management event is an incident that
occurs abroad and involves chemical, biological, radiological, or nuclear
contamination. It is not limited to a terrorist incident; it also can be
caused by a war, natural cause, or accident. In other words, a consequence
management event is not defined by how the release of a WMD agent
occurred, only that a release occurred. The terrorist bombings of the USS
Cole and the U. S. embassies in East Africa, for example, were not foreign
consequence management events. In addition, a foreign consequence
management event must threaten to overwhelm existing host- nation response
capabilities and prompt a host- nation request for immediate international
assistance. According to the Department of State, the release of chemical,
biological, radiological, or nuclear contaminants is required by
international

agreements to be reported, regardless of how the agent was released.
Finally, consequence management of an incident is the sole responsibility
of the host nation. The United States may be asked to provide assistance
only.

Depending upon the type of incident overseas, the Department of State may
also deploy a Consequence Management Support Team. The team is tailored to
meet the specific emergency situation or condition in the host country and
may deploy as an integral part of the NSC- directed FEST. The team leader
normally would be from State*s Bureau of Political- Military Affairs and
would be responsible for coordinating consequence management activities
and for keeping the ambassador informed about ongoing relief activities.
The team leader serves as a primary liaison between the ambassador, FEST,
and team*s technical experts. The team

also would coordinate U. S. government consequence management activities
with the authorities of the host country. According to the Department of
State, the Consequence Management Support Team deployed several times,
most recently to the Persian Gulf, but had not yet deployed with the FEST.

Role of USAID PDD 39 designated USAID*s Office of Foreign Disaster
Assistance as the lead agency for coordinating the U. S. government
humanitarian relief and rehabilitation activities overseas for incidents
involving weapons of mass destruction. The office facilitates a
coordinated U. S. government response for an incident through the U. S.
ambassador in support of the affected host

country. The office responds to these incidents at the request of the U.
S. ambassador to the affected country and works through the host nation,
U. S. government, international organizations, other donor governments,
and nongovernmental organizations. In a crisis incident overseas, the
State Coordinator for Counterterrorism may request an

Office of Foreign Disaster Assistance representative to deploy as part of
the FEST and assist in the development of a consequence management
strategy for the humanitarian response. Also, if necessary, the office
will provide guidance and liaison to the Bureau of Political- Military
Affairs- led Consequence Management Support Team and work in conjunction
with the team in the development of a humanitarian strategy.

The Office of Foreign Disaster Assistance can respond to virtually any
type of disaster abroad, including a terrorist incident. USAID is the
focal point for U. S. government disaster relief and humanitarian
assistance overseas.

After a U. S. ambassador*s disaster declaration, the Office of Foreign
Disaster Assistance can respond with humanitarian relief items or by
providing funds to the United Nations, international organizations, or
local and international non- governmental organizations to perform
humanitarian relief activities. The office can also provide damage and
needs assessment specialists and a wide variety of disaster management
consultants, should the post require them. The office has stockpiles of
basic disaster relief items, such as tents, plastic sheeting, and
blankets. These stockpiles are strategically located around the world and
can be used to provide humanitarian assistance in the event of a terrorist
incident, as is the procedure for any other humanitarian disaster that
overwhelms local

capacity. These stockpiles are used frequently, and due to changing stock
levels, the office determines how to best support a specific disaster and
when to release stockpile material. To help manage the humanitarian relief
activities on the ground, the office can deploy its Disaster Assistance
Response Team to carry out sustained response activities in the field and
a Response Management Team in Washington, D. C., that is responsible for
providing support to the Disaster Assistance Response Team and assisting
with the information management and coordination of the event from an
interagency operations center. The activities of these teams will vary
depending upon the type, size, and complexity of the disaster.

Role of DOD Is Unique If ongoing military operations permit, DOD supports
the Department of State for crisis and consequence management functions
overseas in the event of a terrorist incident. DOD is unique in that it
has the greatest depth and breadth of worldwide response capabilities.
Specific types of support include threat assessments, technical advice,
operational support, tactical

support, and transportation. In the event of a terrorist incident
overseas, DOD also provides force protection to the Department of State.
DOD and State have memorandums of understanding on the coordination and
implementation of plans for the protection of U. S. citizens abroad in
emergencies, and on the protection and evacuation of U. S. citizens and

designated aliens abroad. A pending or actual terrorist crisis may require
the evacuation of U. S. government employees, as well as other Americans
in the area. These evacuations* known as Noncombatant Evacuation
Operations* may be necessary in the face of continued terrorist attacks or
in an attack involving weapons of mass destruction. DOD support for the
Department of State for a foreign consequence management operation is not
automatic and is either approved or disapproved by the Secretary of
Defense. DOD assets, albeit unique and robust compared to those of other
U. S. government agencies, are finite. According to DOD, ongoing military
operations may preclude DOD support for a foreign consequence management
operation.

Weapons of Mass Destruction U. S. government efforts to provide
consequence management overseas have focused on WMD incidents, which are
the most likely to overwhelm host nation capabilities. In PDD 39, the
President directed the State Department, in coordination with DOD and
USAID*s Office of Foreign Disaster Assistance, to develop a plan to
provide assistance to foreign populations that are victims of terrorist
WMD attacks. In response, the State*s Bureau of Political- Military
Affairs wrote draft guidelines for a consequence management response to an
international WMD incident. The guidelines provide a framework of planning
guidance for all types of deliberate or accidental chemical, biological,
radiological, or nuclear incidents. They outline operational concepts for
a U. S. response overseas and provide a foundation for operational plans
and procedures. They also identify procedures by which the United States,
partner nations, host nations, and international response agencies can
most effectively unify and synchronize their response actions. The
guidelines require that State (along with the Departments of Defense,
Energy, and Health and Human Services

and USAID) maintain the capability to respond rapidly to any incident when
approved by the NSC. The response would be authorized subject to the
concurrence of the ambassador and host government.

The guidelines also identify various federal response teams and detail
their deployment and employment considerations. As discussed above, State
maintains a standing Consequence Management Support Team

that would manage the consequences of a WMD emergency overseas. The
Consequence Management Support Team, through its USAID representative,
would coordinate all U. S. government consequence management activities
with the appropriate authorities of the host country, as well as the
international organizations, private voluntary organizations, and non-
government organizations that may be involved in the emergency. The same
federal agencies that would provide consequence management in

a domestic WMD incident could also respond overseas. While some of these
agencies have a more domestic focus, they have unique capabilities that
could be deployed overseas. 3 Figure 18 shows federal agency response
teams that could be called upon in an overseas WMD incident. Several of
these response teams transferred into the Department of Homeland Security
on March 1, 2003, from a variety of other departments.

3 For more details on these teams, see U. S. General Accounting Office,
Combating Terrorism: Federal Response Teams Provide Varied Capabilities;
Opportunities Remain to Improve Coordination, GAO- 01- 14 (Washington, D.
C.: Nov. 30, 2000). We reported that federal response teams do not
duplicate one another; however, agencies lack a coherent

framework to develop and evaluate budget requirements for teams. Because
most response teams have multiple missions, federal agencies do not track
the resources for their teams based on their roles in combating terrorism.

Figure 18: Federal Response Teams That Could Respond to a Weapons of Mass
Destruction Incident Overseas

Evaluations in the After a terrorist attack, the federal government
reviews the facts leading

Aftermath of a up to the incident. These reviews are done to determine
whether security

procedures were followed; to establish accountability within the Terrorist
Incident

government, if appropriate; and to provide lessons learned to prevent or
mitigate future attacks.

Reviewing Terrorist The Secretary of State convenes an Accountability
Review Board in cases

Incidents Against involving acts of terrorism against U. S. diplomatic
installations and

Diplomatic Posts personnel abroad that involve serious injury, loss of
life, or significant

destruction of property. 4 These boards investigate the facts and
circumstances surrounding the damage to determine whether security
measures systems and procedures were adequate and implemented. The boards
also propose recommendations aimed at saving lives and improving security
systems and procedures, including those aimed at improving crisis
management. Each board consists of five members four appointed by the
Secretary of State and one appointed by the Director of Central
Intelligence.

State convened two Accountability Review Boards following the August 1998
bombings of the U. S. Embassies in Nairobi, Kenya, and Dar es- Salaam,
Tanzania, to examine the facts and circumstances surrounding the near
simultaneous bombings. The boards examined a number of security measures
and procedures including (1) whether the incidents were security related,
(2) whether security systems and procedures were

adequate and implemented properly, (3) the impact of intelligence and
information availability, (4) whether any employee of the U. S. government
or member of uniformed services breached his or her duty, and (5) whether
any other facts or circumstances in these cases may be relevant to
security management of U. S. missions abroad.

4 Required by the 1986 Omnibus Diplomatic and Anti- Terrorism Act (P. L.
99- 399), Aug. 27, 1986.

Reviewing Incidents DOD also has convened ad hoc commissions to evaluate
terrorist incidents

Against Military Targets aimed at its overseas military facilities. For
example, following the June

1996 truck bombing of the al- Khobar Towers military housing facility near
Dhahran, Saudi Arabia, the Secretary of Defense directed a task force to
assess facts and circumstances surrounding the attack, including the
security policies, infrastructures, and systems. 5 The Secretary also
asked the team to recommend measures to minimize casualties and damage
from such attacks in the future. The task force*s report made a number of
recommendations to improve security at military facilities overseas.

Past Incidents Studied to In addition to reviewing individual incidents,
the State Department*s Provide Lessons Learned

Bureau of Diplomatic Security analyses numerous past incidents and related
exercises to provide more general lessons learned. Since 1987, the bureau
has analyzed various threats and incidents, including terrorist attacks,
and published its results. This annual publication, done with the
assistance of other federal agencies, is called Political Violence Against
Americans. It focuses on major incidents based upon, among other things,
their lethality, property damage, and use of unusual tactics or weapons.
The publication is designed to provide a comprehensive picture of
political violence against U. S. interests. In addition, the bureau
conducts an annual longer- term analysis covering a number of years that
provide lessons learned in crisis management. 6 These promote awareness of
basic crisis management principles.

Agency Comments and The Departments of Defense and State and USAID
provided technical

Our Evaluation comments on the matters covered throughout this chapter.
Based upon

these comments, we made revisions, as appropriate. We also made revisions
(primarily to the figure on WMD response teams) based upon the creation of
the Department of Homeland Security and the transfer of various response
teams and functions into that department.

5 The Downing Assessment Task Force, also known as the Downing Commission
because it was headed by General Wayne Downing, issued its report on Aug.
30, 1996. 6 For example, see U. S. Department of State, Bureau of
Diplomatic Security, Lessons Learned in Crisis Management 1983- 1994, Feb.
1995, and Terrorist Tactics and Security Practices: Lessons Learned and
Issues in Global Crime, 1994.

Appendi xes Matrix of Department of Defense Programs

Appendi I x and Activities to Combat Terrorism Overseas The Department of
Defense (DOD) supports the Department of State, which is the lead federal
agency for coordinating U. S. government efforts to combat terrorism
overseas. Within the department, the military services as well as multiple
offices and agencies manage various programs and activities to combat
terrorism abroad. DOD also works with other U. S. government agencies,
foreign government military organizations and agencies, and international
organizations in carrying out these programs and activities. Some of these
activities directed at combating terrorism overseas (e. g., coordination)
may actually occur in the United States.

Appendix I identifies and describes the following:  the strategic
framework of DOD*s efforts to combat terrorism overseas;  DOD*s programs
and activities to detect and prevent terrorism overseas;  DOD*s programs
and activities to disrupt and destroy terrorist

organizations overseas; and  DOD*s programs and activities to respond to
terrorist incidents

overseas.

Tabl e 10: Department of Defense Programs and Activities to Combat
Terrorism Overseas Department of Defense office or military service
Program or activity Description of program or activity

STRATEGIC FRAMEWORK Agency head*s role in combating terrorism

Office of the Secretary of The Secretary of Defense is The Secretary of
Defense is responsible for supporting (1) the lead Defense the principal
defense policy federal agency* the Department of State* in responding to a
terrorist advisor to the President.

incident overseas, (2) the Department of Justice (through the Federal
Bureau of Investigation (FBI)) for crisis management of a domestic The
Office of the Secretary of

terrorist incident, and (3) the Federal Emergency Management Agency
Defense is the principal staff

(FEMA) for consequence management of a domestic terrorist incident.
element of the Secretary of Defense in the exercise of policy development,
planning,

resource management, fiscal, and program evaluation responsibilities.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Special agency official or office in charge of combating terrorism

Office of the Assistant Special operations and

Serves as the principal staff assistant and advisor to the Secretary of
Secretary of Defense for

low- intensity conflict Defense and to the Under Secretary of Defense for
Policy for the broad Special Operations and LowIntensity spectrum of
combating terrorism policy and support. Conflict

Office of the Assistant to the Civil support Serves as the focal point for
the coordination of DOD efforts in Secretary of Defense for

preparation for requests from civilian agencies on weapons of mass
Homeland Defense

destruction (WMD) consequence management. The Assistant to the Secretary
of Defense for Homeland Defense provides civilian oversight for the Joint
Task Force for Civil Support.

Chairman of the Joint Chiefs Principal military advisor to

Serves as the principal advisor and focal point to the Secretary of of
Staff the President, Secretary of Defense for all DOD antiterrorism
issues. Defense, and the National Security Council

Office of the Under Secretary Acquisition, technology, and Responsible for
the development, application, testing, and evaluation of of Defense for
Acquisition, logistics new and commercial- off- the- shelf technology for
combating terrorism. Technology and Logistics

Office of the Assistant Command, control,

Provides policy guidance and oversight for information, information
Secretary of Defense for communications, and

technology and physical security programs, security and investigative
Command, Control, intelligence

matters, counterintelligence, DOD foreign counterintelligence,
Communications, and intelligence, and information operations programs.
Intelligence Office of the Assistant

Reserve affairs Provides policy direction and oversight of the military
departments* Secretary of Defense for

Reserve Component readiness/ training policies and funding for Reserve
Reserve Affairs

Component domestic and overseas combating terrorism preparedness. The
Assistant Secretary of Defense for Reserve Affairs also exercises policy
direction and oversight for the Domestic Preparedness Program. Office of
the Assistant

Health affairs Supports the federal interagency process with medical
research and Secretary of Defense (Health

development programs and interfaces with the National Disaster Medical
Affairs)

System. Service Secretaries

Military services Establish and provide resources for combating terrorism
programs, (Secretaries of the Army, the

incorporating existing physical security, base defense, and law Navy, and
the Air Force)

enforcement initiatives, which address terrorism as a potential threat to
DOD elements and personnel, to include the Reserve Components.

Office of the Assistant to the Domestic Preparedness

Develops and implements the Domestic Preparedness Program*s *first
Secretary of Defense for

Program and Consequence responder* training and exercise missions and
manages the Homeland Defense

Management Program Consequence Management Program Integration Office.
Integration Office

Commanders of the Command policies and

Establish command policies and programs for the protection of all forces
combatant commands programs (military, civilian, and family members) and
facilities in their area of

responsibility to include assigned personnel, those under operational
control, and individuals that fall under memorandums of understanding.
Joint Task Force for Civilian Support to civilian agencies Responsible,
through the Commander, Joint Forces Command, for Support marshalling the
capabilities of the Armed Forces in support of civilian

agencies responding to domestic consequence management contingencies
involving weapons of mass destruction.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Directors of defense agencies Providing resources for

The directors establish and provide resources for combating terrorism and
field activities combating terrorism programs programs, incorporating
existing physical security programs with

antiterrorism awareness, which address terrorism as a potential threat to
DOD elements and personnel.

Agency plans or strategies to combat terrorism

Chairman of the Joint Chiefs

National Military Strategy of

Sets the strategic direction for all aspects of the Armed Forces for 3- 5
of Staff the United States of America years. This document includes
objectives, force structure, capabilities,

(Sept. 1997) and the strategic environment. The most recent strategy
(issued in September 1997) notes the rising danger of asymmetric threats,
including terrorism. It stresses the need for the military to adapt its
doctrine, training, and equipment to ensure a rapid and effective joint
and interagency response to these threats.

Chairman of the Joint Chiefs

National Military Strategic

Provides the strategic framework to guide the conduct of the global war of
Staff Plan for the War on Terrorism on terrorism by the U. S. Armed
Forces. This classified plan discusses

(Oct. 19, 2002) the strategic environment and outlines national guidance
to (1) defeat terrorists and terrorist organizations; (2) deny
sponsorship, support, and sanctuary to terrorists; (3) diminish the
underlying conditions that permit terrorism; and (4) defend the United
States, its citizens, and its interests at home. This plan also provides
defense guidance, including the national defense strategy and concept for
the global war on terrorism. It

lays out the strategic approach for the war on terrorism, identifies
strategic military objectives, and provides the strategic military
approach to carry out the war on terrorism over an extended period of
time. The plan addresses planning for and establishing administrative and
logistics systems and command and control for each contingency.

Rather than prescribing specific battle plans or future operations, the
plan provides combatant commanders with principles for planning their
military operations as well as specific tasks and initiatives to combat
terrorism overseas. Also, it provides a framework from which regional
commanders, the military services, and other agencies can formulate their
own individual action plans. In response to this plan, individual

regional commands have drafted their own classified campaign plans to
combat terrorism overseas.

Office of the Assistant Combating Terrorism Program Includes all actions*(
1) antiterrorism (defensive measures taken Secretary of Defense for

to reduce vulnerability to terrorist acts), (2) counterterrorism Special
Operations and

(offensive measures taken to prevent, deter, and respond to terrorism),
Low- Intensity Conflict

(3) terrorism consequence management (preparation for and response to the
consequences of a terrorist incident/ event), and (4) intelligence support
(collection and dissemination of terrorism- related information as

the first line of defense)* taken to oppose terrorism throughout the
entire threat spectrum, to include terrorist use of weapons of mass
destruction and/ or high explosives.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Office of the Assistant DOD Directive 2000.12, DOD

This directive (1) changes the name of the DOD Combating Terrorism
Secretary of Defense for

Antiterrorism/ Force

Program to the DOD Antiterrorism/ Force Protection Program, Special
Operations and LowIntensity

Protection Program (Apr. 13, (2) updates DOD policies and assigns
responsibilities for implementing Conflict

1999) the program, (3) authorizes publication of DOD standards and related

guidance, (4) establishes the Chairman of the Joint Chiefs of Staff as the
principal advisor and focal point for antiterrorism/ force protection
issues, and (5) defines antiterrorism/ force protection responsibilities
of the military departments, commanders of the combatant commands, and
defense agencies.

This directive also establishes DOD policy, among other things, (1) to
protect DOD elements and personnel from terrorist acts, (2) that
antiterrorism/ force protection is the commander*s responsibility, (3) to

maintain a Combating Terrorism Readiness Initiatives Fund to respond to
emergent, unforeseen requirements, and (4) to comply with the *No Double
Standard* policy on dissemination of specific, credible terrorist threat
information that has not or cannot be countered (i. e., it is the policy
of the U. S. government that official Americans cannot benefit from
receipt of information that might equally apply to the public, but is not
available to the public).

Also, this directive established the Antiterrorism Coordination Committee
and its Senior Steering Group to reduce vulnerabilities to terrorist
attacks. Both act as a clearinghouse for policy recommendations and
facilitate coordinating antiterrorism/ force protection actions and
taskings.

Office of the Assistant DOD Instruction 2000.16,

This instruction (1) reissues DOD Instruction 2000.16, DOD

Secretary of Defense for

DOD Antiterrorism Standards Antiterrorism Standards (Jan. 8, 2001), (2)
updates policy Special Operations and

(June 14, 2001) implementation, (3) assigns responsibilities, (4)
prescribes procedures

Low- Intensity Conflict under DOD Directive 2000.12, DOD Antiterrorism/
Force Protection

Program, for protection of personnel and assets from acts of terrorism,
and (5) assists DOD components in implementing this instruction and DOD
Directive 2000. 12. It references DOD Instruction 5210.84, Security of DOD
Personnel at U. S. Missions Abroad, which provides guidance for the
security of DOD personnel at overseas locations. It also refers to
specific guidance for DOD elements and personnel under the

responsibility of the Department of State in the Memorandum of
Understanding Between the Department of State and the Department of
Defense on Overseas Security Support. Finally, it refers to specific
common criteria and minimum construction standards to mitigate
antiterrorism vulnerabilities and terrorist threats. This instruction
reaffirms DOD*s policy to (1) protect DOD personnel,

their families, installations, facilities, information, and other material
resources from terrorist acts; (2) establish primary standards for
antiterrorism efforts; and (3) provide commanders at all levels with the
authority to enforce security measures and the responsibility for
protecting persons and property under their control.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Office of the Assistant DOD Instruction 2000.14,

This instruction establishes policy, assigns responsibility, and
prescribes Secretary of Defense for

DOD Combating Terrorism

procedures under DOD Directive 0- 2000.12, DOD Combating Terrorism

Special Operations and

Program Procedures Program, for implementation and use in the DOD
Antiterrorism Program. Low Intensity Conflict

(June 15, 1994) This instruction establishes DOD policy to (1) protect DOD
personnel and their families, facilities, and other material resources
from terrorist acts and, in the event of a terrorist attack, to respond
with properly trained, organized, and equipped personnel (including local
law enforcement or host nation assets) to terminate the incident or reduce
the effects of the attack; (2) provide guidance on the conduct of DOD
personnel and their families if seized by terrorists; (3) ensure actions
to combat terrorism outside of the United States will comply with
applicable Status of Forces Agreements, other international agreements,
and memoranda of understanding, as well as coordinate with the U. S.
embassy and host nation; and (4) coordinate defense attache and

security assistance organization antiterrorism programs overseas with the
chief of mission at the U. S. embassy and comply with Department of State
standards.

Office of the Under Secretary Unified Facilities Criteria Sets standards
to minimize the possibility of mass casualties in buildings of Defense for
Acquisition, 4- 010- 01, DOD Minimum

or portions of buildings owned, leased, privatized, or otherwise occupied,
Technology and Logistics

Antiterrorism Standards for

managed, or controlled by DOD. The standards provide a level of Buildings
(July 31, 2002) protection against terrorist attacks for all inhabited DOD
buildings where no known threat of terrorist activity currently exists.

Office of the Under Secretary Unified Facilities Criteria Identifies the
minimum standoff distances and separation for new and of Defense for
Acquisition, 4- 010- 10, DOD Minimum

existing buildings and expeditionary and temporary structures. Technology
and Logistics

Antiterrorism Standoff Distances for Buildings (July 31, 2002)

Office of the Under Secretary DOD Directive 5200.8,

Outlines the requirements of DOD*s physical security program. of Defense
for Policy Security of DOD Installations

Commanders at the unit, activity, installation, and major command levels

and Resources (Apr. 25, use the standards outlined in this and other
guidance documents to 1991)

determine their physical security equipment requirements. Office of the
Under Secretary

DOD Regulation 5200.8- R, This regulation, in accordance with DOD
Directive 5200.8, Security of

of Defense for Policy Physical Security Program DOD Installations and
Resources, prescribes DOD policies and (May 13, 1991) minimum standards
for the physical protection of DOD personnel, installations, operations,
and assets. The physical security program involves both active and passive
measures designed to prevent unauthorized access to personnel, equipment,
installations, material, and documents, and to safeguard them against
espionage, sabotage, damage, and theft. The regulation provides policy and
guidance on installation access and circulation control, security of
weapons systems and platforms, protection of bulk petroleum products,
security of communications systems, and security of material.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Assistant to the Secretary of DOD Directive 3150.3,

This directive (1) reissues DOD Directive 3150.3, Survivability and

Defense (Atomic Energy) Nuclear Force Security and Security (S2) of
Nonstrategic Nuclear Forces (NSNF), to add strategic

Survivability (S2) (Aug. 16, nuclear weapons and forces to the existing
DOD Nonstrategic Nuclear 1994)

Forces Program and update policy and responsibilities for nuclear force
survivability and security; (2) describes the DOD program to develop
concepts, procedures, equipment, facilities, and training programs that
ensure the survivability and security of nuclear weapons systems
throughout the threat spectrum, including terrorism; and (3) requires the
military services to maintain nuclear force survivability and security
programs.

Assistant Secretary of DOD Directive

This manual is a classified document. Defense for Command,

C- 5210. 41- M, Nuclear

Control, Communications, and Weapon Security Manual (U) Intelligence

(Apr. 1994) Assistant Secretary of

DOD Regulation 5200.1- R, This regulation implements Executive Order
12958, Classified National

Defense for Command,

Information Security Program Security Information, within DOD and
establishes the DOD Information Control, Communications, and (Jan. 14,
1997)

Security Program to promote proper and effective classification,
Intelligence

protection, and downgrading of official information requiring protection
and the declassification of information no longer requiring such
protection. Office of the Assistant

DOD Worldwide Combating Serves as a continuing forum to communicate
guidance, exchange Secretary of Defense for

Terrorism Conference ideas, and generate policy recommendations that will
reduce DOD Special Operations and

vulnerability to terrorism. The 2001 conference established seven Low-
Intensity Conflict

working groups (Intelligence, Operations, Policy, Research and
Development, Consequence Management, Resources, and Interagency
Community).

Assistant Secretary of DOD Directive 5240.2, DOD

This directive, among other things, (1) integrates DOD Defense for
Command,

Counterintelligence (May 22, counterintelligence capabilities and
coordination procedures into a Control, Communications, and 1997)

national counterintelligence structure under the direction of the National
Intelligence

Security Council (NSC) under Presidential Decision Directive/ NSC- 24, U.
S. Counterintelligence Effectiveness; (2) establishes and maintains a
comprehensive, integrated, and coordinated counterintelligence effort
within DOD; (3) assigns responsibilities for the direction, management,
coordination, and control of DOD counterintelligence activities; and (4)
establishes the Defense Counterintelligence Board.

This directive establishes DOD policy that, among other things,
counterintelligence activities be undertaken to detect, identify, assess,
exploit, and counter or neutralize the intelligence collection efforts,
other intelligence activities, sabotage, terrorist activities, and
assassination efforts of foreign powers, organizations, or persons
directed against

DOD, its personnel, information, materiel, facilities, and activities.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Assistant Secretary of DOD Instruction 5240.10,

This instruction (1) establishes policies, assigns responsibilities, and
Defense for Command,

DOD Counterintelligence prescribes procedures to ensure that the
counterintelligence Control, Communications, and Support to Unified and

requirements of the combatant commanders of the Unified and Specified
Intelligence

Specified Commands Commands are met under the parameters established by
law, Executive (Apr. 8, 1992) order, and DOD directives and (2) provides
general principles for the command relationships and support requirements
between the counterintelligence organizations of the military departments
and the Unified and Specified Commands during peacetime, exercises,
contingencies, and through the spectrum of armed conflict.

This instruction establishes DOD policy that, among other things, the
counterintelligence mission is provided to all DOD components with the
necessary counterintelligence support (the functions of collection and
production, operations, and investigations) to gather information and
conduct activities to protect against espionage and other intelligence
activities, sabotage, international terrorist activities, or
assassinations

conducted for, or on behalf of, foreign powers, organizations, or persons.

DETECT AND PREVENT TERRORISM ABROAD Antiterrorism/ force protection

Local commander Antiterrorism/ Force Protection Defensive measures (to
include force protection) used to reduce the (defensive measures)
vulnerability of individuals and property to terrorist acts, to include
limited response and containment by local military forces. Combatant
commanders, military services, and defense agencies, working in close
cooperation with the intelligence community and law enforcement agencies,
will use all authorized means to deter, detect, defend, respond to, and
mitigate terrorist attacks. These antiterrorist measures include increased
security and vigilance for key personnel, installations, and equipment.
Established Antiterrorism Coordination Committee and its Senior Steering
Group.

Antiterrorism/ force protection categories

Local commander Physical security equipment Any item, device, or system
that is used primarily for the protection of assets, personnel,
information, or facilities, to include alarms, sensors, protective
lighting and their control systems and the assessment of the

reliability, accuracy, timeliness, and effectiveness of those systems,
such as (1) exterior surveillance and/ or intrusion detection systems
(wide- area security and surveillance systems); (2) lighting systems; (3)
access controls and alarm systems; (4) residential security equipment; (5)
equipment for executive protection, to include added doors, increased
ballistic protection at offices and residences, personal body armor and
protective equipment, and armored vehicles; and (6) detection devices
(under vehicle surveillance systems) and

canine systems.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Local commander Physical security site Facility improvements using
operations and maintenance or military improvements construction funding,
new construction, or new construction design, whose purpose is to protect
DOD assets, personnel, or information from terrorist threats. The
improvements may include walls, fences, barricades, or other fabricated or
natural impediments used to restrict, limit, delay, or deny entry into a
DOD installation or facility. Improvements may include (1) primary
facility modifications/ features that include special structural
improvements to walls, doors, windows, and ceilings; interior barriers;
and any land acquisition for standoff distances; (2) supporting facility
modification/ features, such as site improvements in fencing, perimeter/
area lighting, blast mitigation barriers, vehicle barriers, and special
landscaping; (3) safe havens; (4) evacuation

facilities; and (5) surveillance platforms. Local commander Physical
security

Includes all personnel who manage physical security programs, management
and planning resources, and assets, such as headquarters staff and
headquarters

staff elements performing such functions. Local commander Security forces/
technicians Personnel and operating costs associated with protective
forces whose

primary or supporting mission is to safeguard assets, personnel, and
information. Security forces/ technicians include personnel engaged in
such activities as (1) dedicated response forces and security forces; (2)
locksmiths; (3) perimeter, installation, or facility access control; (3)
inspection and maintenance of barriers and security system components; (4)
antiterrorism training for security forces; and

(5) antiterrorism awareness programs and training. Local commander Law
enforcement Personnel and operating costs associated with any law
enforcement

activity, such as (1) protective service details, including advance work;
(2) response forces; and (3) military police.

Local commander Security and investigative Includes DOD criminal
investigative resources, conduct of vulnerability matters assessments
(periodic high- level reviews and physical security

assessments), security and intelligence activities, and any
crossdiscipline security functions, such as (1) terrorism investigations;
(2) executive antiterrorism training; (3) surveillance and
countersurveillance teams; (4) protective service details, including
advance work; (5) route surveys; (6) antiterrorism awareness programs and
training; and (7) Joint Staff Integrated Vulnerability Assessments.

Local commander Research, development, test, Includes any RDT& E resources
expended in the area of antiterrorism and evaluation (RDT& E) and force
protection to provide new and enhanced capabilities to combat

terrorism. The two primary programs are the Counterterror Technical
Support Program and the Physical Security Equipment Development Program.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Technical Support Working Counterterror Technical A fast- track research
and development program for advanced Group Support Program technologies
and state- of- the- art prototype equipment that addresses

both interagency and international combating terrorism requirements. The
Technical Support Working Group (TSWG)* the research and development arm
of the National Security Council*s (NSC) Interagency Working Group on
Counterterrorism* provides resources and program management. The
Department of State provides policy oversight to TSWG, which is co-
chaired by the Departments of Defense and Energy and the FBI. TSWG
consists of over 50 federal government organizations that identify
operational needs and coordinate research

and development for combating terrorism. Typical TSWG projects include (1)
stand- off explosive detection of terrorist devices, (2) large vehicle
bomb countermeasures (detect and disable), (3) entry point screening, (4)
structural blast mitigation, (5) national infrastructure

assurance and protection, and (6) advanced sensor detection and defeat.

Physical Security Equipment Physical Security Equipment

A research and development program designed to support the rapid Action
Group Development Program acquisition and quick field integration of
state- of- the- art security

technology to deployed forces, in particular commercial off- the- shelf
equipment. The Physical Security Equipment Action Group funds and provides
resources to the program. The group consists of representatives from the
Army, the Navy, the Air Force, the Joint Staff, and the Defense Threat
Reduction Agency. The program evaluates, develops, and integrates
equipment and systems related to (1) intrusion

detection, (2) entry control, (3) access control, (4) waterside security,
(5) delay/ denial, (6) interior and exterior robotics, and (7) explosive
detection systems. Vulnerability assessments

Chairman of the Joint Chiefs Integrated Vulnerability

Ensures that commanders at all levels have an accurate awareness of of
Staff Assessment Team the existing vulnerabilities and readiness of
antiterrorism programs within their command. The assessments assist
commanders in implementing risk management practices when allocating
resources in a uniform and complementary fashion that are adaptable to
changing terrorist threats. Approximately 96 assessments are planned for
fiscal year 2003.

Antiterrorism activities

Office of the Deputy Assistant Chemical, biological, and

Based on an assessment by the Strategic Deterrence Joint Warfighting
Secretary of Defense for radiological monitoring,

Capabilities Assessment, a monitoring, detection, and identification
Chemical and Biological

detection, and identification package was developed for protection of the
Pentagon and other Defense

strategic U. S. sites within the United States and in forward threat
areas, including Northeast Asia and Southwest Asia. Equipment is to detect
chemical and radiological agents. Systems include the Automatic Chemical
Agent Detection Alarm and the Personnel and Vehicle Entry Radiological
Detectors. According to DOD, detection capability for biological agents
currently is limited to *detect to treat.* Emphasis is placed on
monitoring, sampling, confirmatory analysis, and medical

surveillance through such systems as Portal Shield, Joint Bio Point
Detection System, Portable Bio Aerosol Sampler, Dry Filter Units, and
Polymerase Chain Reaction Identification Devices.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Military security assistance

Defense Security Cooperation Foreign Military Financing The Department of
State provides grants to foreign governments for the Agency acquisition of
U. S. defense equipment, services, and military training,

which enable key U. S. allies and friends to improve their defense
capabilities. It promotes U. S. national security interests by
contributing to global and regional stability, strengthening military
support for democratically elected governments, and containing
transnational threats, including terrorism. This security assistance is a
key tool in

supporting U. S. coalition partners in combating terrorism overseas. It
reduces the likelihood of conflict and war that could threaten the United
States. The Department of State*s Bureau of Political- Military Affairs
sets policy for the program, while the Defense Security Cooperation Agency
manages the program on a day- to- day basis. Security assistance offices
within U. S. embassies abroad play a key role in managing the program
within recipient countries.

Defense Security Cooperation Foreign Military Sales A U. S. security
assistance program used to sell defense articles or Agency services to
authorized governments. The program is used to maintain close ties with
neighbors and key allies, maintain stable and secure

regional partners, and ensure regional stability. This program helps
countries, such as the new members of the North Atlantic Treaty
Organization (NATO), upgrade their military capabilities and achieve
greater interoperability with U. S. and other alliance forces. Also, it
helps strengthen the security and defense capabilities of recipient
countries, whose support is crucial to combating terrorism. These
countries

include, for example, the new U. S. Central Asian and Caucasus partners in
the war on terrorism. The Department of State*s Bureau of
PoliticalMilitary Affairs approves foreign military sales, while security
assistance offices at U. S. embassies abroad promote the sale of U. S.-
produced

defense items and carry out most of the tasks associated with foreign
military sale cases. An implementing agency within DOD the Army, the Navy,
the Air Force, or the Defense Logistics Agency, depending upon the type of
item being considered negotiates the terms of the sale. The Defense
Security Cooperation Agency buys the items from U. S. manufacturers for
the recipient country.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Defense Security and International Military Serves as a low- cost security
assistance program intended to foster the Cooperation Agency Education and
Training development of more professional militaries around the world
through training and education of foreign military and civilian personnel.
The program provides training on a grant basis to some 10, 000 students
annually from 133 allied and friendly countries. Formal instruction is
provided through more than 2,000 courses taught at about 150 U. S.
military schools and installations. The program advances U. S. interests

in furthering regional stability by enhancing military alliances, building
coalitions, and strengthening efforts to combat terrorism abroad.

DOD plans and manages the program through the Defense Security and
Cooperation Agency, which works with the various military departments and
unified military commands to implement the program. Coordination of the
program overseas is handled by DOD*s security assistance offices located
in U. S. embassies around the world, which field requests from their host
countries to participate in the program.

Enhancing military professionalism is intended to make militaries more
efficient, effective, and interoperable with U. S. and NATO forces as well
as regional coalitions. Also, it fosters a better understanding of

democratic values, including civilian rule of the military, belief in the
rule of law, and respect for internationally recognized civil and human
rights. Finally, the program*s development of professional and personal
militaryto- military relationships provide U. S. access and influence to a
critical sector of society that can help support U. S. access to foreign
military bases and facilities* a critical component in efforts to combat
terrorism

overseas.

Embassy security

U. S. Marine Corps Protection of information at U. S. Marine security
guards control access to 130 U. S. embassies and U. S. diplomatic missions

missions worldwide. overseas

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Military training (with foreign governments)

U. S. Special Operations Joint Combined Exchange

Provides U. S. special operations forces opportunities to develop and
Command and Training maintain their skills and to train foreign militaries
and other groups

to combat terrorism overseas, among other missions. U. S. special
operations forces are tasked with nine principal missions to (1) train and
otherwise assist foreign militaries to combat insurgency and other threats
to stability (foreign internal defense); (2) train, advise,

and otherwise assist local forces for guerilla warfare (unconventional
warfare); (3) protect against and prevent the spread of nuclear, chemical,
and biological weapons (counterproliferation); (4) use offensive and
defensive measures to prevent or resolve terrorist incidents (combating
terrorism); (5) obtain information concerning capabilities and activities
of actual or potential adversaries (special reconnaissance); (6) inflict
damage on an adversary or recover personnel or material (direct action);
(7) target an adversary*s information system while defending U. S. systems
(information operations); (8) establish, maintain, or strengthen

relations between U. S. and allied governments to facilitate military
operations (civil affairs); and (9) influence attitudes of foreign
audiences (psychological operations). Specific Joint Combined Exchange and
Training operations and activities are classified. U. S. European Command
Republic of Georgia Train and Enhances the Republic of Georgia*s counter-
terrorism capabilities. The

Equip Program program*s goal is to build strong effective staff
organizations capable of creating and sustaining standardized operating
procedures, training plans, operational plans, and a property accounting
system. The curriculum consists of performance- oriented training and
exercises. The time- phased training will be conducted by U. S. Special
Forces to build

upon the military- to- military relationship developed between the two
countries. The program will consist of command center staff training for
members of the Georgian Ministry of Defense as well as training for units
of the Land Forces Command. Border guards and other Georgian security
agencies will be included to ensure interoperability among Georgia*s
security forces. Almost 200 Georgians have completed the staff- training
phase and about 500 are completing the light- infantry tactics training.
Military equipment to be provided will include uniform

items, small arms and ammunition, communications gear, training gear,
medical gear, fuel, and construction material.

U. S. Pacific Command U. S. Special Operations Develops a counter-
terrorist capability within the Philippines armed Forces Training for the

forces through the Foreign Military Financing program. The U. S. Pacific
Philippines

Command deployed a Joint Task Force advisory team to the southern
Philippines to begin preparations. It is composed of U. S. Special
Operations personnel and provides training at the command level at
headquarters through the company level in the field. The training
emphasizes joint operations and tactics to help eliminate terrorist

threats. Training includes counterterrorism campaign planning,
intelligence fusion, psychological operations, civil- military operations,
and filed tactics. U. S. Special Operations personnel completed training
with 25 field companies and provided equipment that included aircraft,

Coast Guard cutters, and helicopters.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Special Operations U. S. Special Operations

U. S. Special Forces trained approximately 200 Yemeni military forces in
Command Forces Training for Yemen counterterrorism tactics.

Border security U. S. Air Force Combat Air Patrols Provides protection of
U. S. air space. DISRUPT AND DESTROY TERRORIST ORGANIZATIONS ABROAD
Counterterrorism

Office of the Assistant Counterterrorism (offensive Offensive measures
taken to prevent, deter, and respond to terrorism. Secretary of Defense
for

measures) The Nunn- Cohen Amendment of the Goldwater- Nichols Act of 1986
Special Operations and Low established the (1) U. S. Special Operations
Command, (2) Assistant Intensity Conflict

Secretary of Defense for Special Operations/ Low- Intensity Conflict, (3)
coordinating board for low- intensity conflict within the NSC, and (4)
created a new Major Force Program for special operations forces

resources. Also, the act included counterterrorism activity for special
operations.

Counterterrorism categories

U. S. Special Operations Special Operations Forces U. S. Special
Operations Forces conduct offensive counterterrorism Command measures and
operations directed at preventing, deterring, and

responding to terrorist acts against U. S. interests worldwide. U. S.
Special Operations Forces receive the most advanced and diverse training
available and exercise continually, often with foreign counterparts, to
maintain proficiency and develop new skills. Regional Special Operations
Special Operations Forces

Regional Special Operations Commands are subordinate unified Commands and
Geographic Combatant commands assigned to the Geographic Combatant
Commands. The Commands

Regional Special Operations Commands plan, prepare, and conduct special
operations, including counterterrorism, within the Geographic Combatant
Commander*s area of responsibility. The Regional Special Operations
Commands also provide a trained, operationally ready, and deployable Joint
Special Operations Task Force headquarters that can respond rapidly to
terrorism using forces assigned permanently or temporarily to the
Geographic Combatant Commander.

U. S. Army Special Operations Special Operations Forces The command is
responsible to the U. S. Special Operations Command Command for the
readiness of Special Forces, Rangers, special operations aviation

units, psychological operations units, and civil affairs personnel for
deployment worldwide in support of unified combatant commanders. The
command is headquartered at Fort Bragg, N. C., and has both active and

U. S. Army Reserve special operations forces. Naval Special Warfare
Special Operations Forces The command is responsible to the U. S. Special
Operations Command Command for the readiness of active and reserve naval
special warfare forces. The command deploys SEAL, Special Boat, SEAL
Delivery Vehicle teams, and other Naval Special Warfare Detachments
worldwide and

administratively supports forward- based naval special warfare units. The
command is located at the Coronado Naval Amphibious Base in Coronado,
Calif.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Air Force Special Special Operations Forces The command is
responsible to the U. S. Special Operations Command Operations Command for
the readiness of Air Force active, reserve, and National Guard special
operations forces for deployment worldwide. The command consists of three
special operations wings, two special operations groups, and one

special tactics group. The command is located at Hurlburt Field, Fla. U.
S. Air Force Transportation support to the

Provides transport capability to the Foreign Emergency Support Team
Foreign Emergency Support

(FEST) through use of two C- 32B (Boeing 757- 200) aircraft. The U. S. Air
Team

Force supports worldwide operations to select U. S. government agencies on
the recommendation of the Deputies Committee and approval by the Secretary
of Defense. Office of the Assistant

RDT& E Like the antiterrorism component, the counterterrorism component
has Secretary of Defense for

two RDT& E programs as well: (1) Counterterror Technical Support Special
Operations and

Program (renamed the Combating Terrorism Technology Support Low- Intensity
Conflict Program) and (2) Counterproliferation Support to Special
Operations Forces program. Program management is provided by the Combating

Terrorism Technology Support Office, which is staffed through the U. S.
Navy. Office of the Assistant

Counterterror Technical Originally established to help fund research and
development Secretary of Defense for

Support Program (renamed activities of the TSWG, this program was renamed
and enlarged to Special Operations and Low the Combating Terrorism

fund its international component and to better focus DOD*s research
Intensity Conflict

Technology Support Program) and development efforts on counterterrorism,
which includes

countermeasures for weapons of mass destruction. In addition to the
research and development initiatives discussed above, this program also
encompasses counterterrorism requirements. Projects include (1) improved
audio and video surveillance of terrorists; (2) advanced night vision
capabilities; (3) through- wall- imaging capability for use by tactical
forces; (4) small, hand- held gamma and neutron radiation

detector; and (5) diagnostic equipment for improvised devices. Office of
the Assistant

Counterproliferation Support A specialized RDT& E program to develop and
demonstrate special Secretary of Defense for to Special Operations Forces
operations forces unique devices. These projects enable Special Special
Operations and Low Operations Forces and special mission units to detect,
disable, and Intensity Conflict

neutralize weapons of mass destruction and their associated facilities
under the direction of a geographic combatant commander in support of a
Chairman of the Joint Chiefs of Staff Concept Plan. These devices are
employed by Special Operations Forces units with direct application to the
nation*s efforts to counter the spread of weapons of mass destruction.
Efforts include (1) defeat of hard and deeply buried targets; (2)
explosive ordnance disposal (biological, chemical, and nuclear); and (3)
maritime efforts to prevent the spread of WMD technology or systems

using the sea lanes.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Defense Advanced Research Counterterrorism research

Conducts research and development on ways to counter asymmetric Projects
Agency and development threats and an unconventional, yet highly lethal
attack by a loosely

organized group of transnational terrorists or other factions seeking to
influence U. S. policy. Such attacks occur using equipment that has a
smaller mass, exhibit fewer observables, and are more lethal than a
conventional military attack. Consequently, such evidence is more
difficult to detect, correlate, and understand. Specific needs include the
capability to (1) automatically recognize and identify humans at a
distance; (2) detect an enemy agent conducting surveillance of a U. S.
target; (3) automatically discover, extract, and link together sparse
evidence of a group*s intentions and activities from vast amounts of
classified and unclassified information and sources that lead to the

discovery of additional relationships and patterns of activity that
correspond to unusual events, potential threats, or planned attacks; (4)
more precisely model the beliefs and organizational behavior of small
terrorist groups to better simulate and wargame such adversaries; and

(5) provide more effective collaborative reasoning and decision aids to
improve the speed and effectiveness of teams of analysts and decision
makers in ever- changing situations.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Military operations

U. S. Central Command Operation Enduring Freedom Since the coordinated
terrorist attacks against the United States on September 11, 2001, the U.
S. Central Command has been conducting Operation Enduring Freedom with its
coalition partners, which now number 51 other countries, to disrupt and
destroy global terrorist

organizations. The initial focus of Operation Enduring Freedom was on
Afghanistan to destroy the base of the al Qaeda terrorist organization and
replace the Taliban regime that supported al Qaeda. These objectives
largely have been met in Afghanistan. Combined Joint Task Force 180 (see
below), which took direct control of operations in Afghanistan in June
2002, continues this mission. It also is conducting operations to ensure
that Afghanistan will not again be a safe haven for terrorists and to
facilitate the reintroduction of Afghanistan into

the community of nations. The U. S. Central Command*s operations in
Afghanistan have been complemented by cooperative efforts with Pakistan to
eliminate the al Qaeda organization in Pakistan. According to the U. S.
Central Command, these efforts have led to the capture of hundreds of al
Qaeda and Taliban members, including very senior members of the al Qaeda

organization. This cooperation continues to degrade the al Qaeda
organization and is a critical component in its ultimate defeat. Operation
Enduring Freedom also involves numerous other activities, including
bilateral cooperation with most of the countries within the U. S. Central
Command*s area of responsibility, Maritime Interception Operations to
intercept al Qaeda movement and communications, and maintaining a quick
strike capability against fleeing al Qaeda targets within the command*s
area of responsibility. Maritime Interception Operations involve a high-
level of coalition cooperation. The entire Maritime Interdiction Operation
in the Horn of Africa region is a coalition operation under Combined Task
Force 150.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Central Command Combined Joint Task Force To detect, disrupt, and
defeat terrorists who pose an imminent threat to Horn of Africa coalition
partners in the Horn of Africa region (Kenya, Somalia, Ethiopia,

Sudan, Eritrea, Djibouti, and Yemen). In November 2002, Combined Joint
Task Force Horn of Africa was established to carry out Operation Enduring
Freedom in that portion of the U. S. Central Command*s area of
responsibility that previously was conducted directly by the command.
Particular attention is focused on U. S. cooperation with Yemen.

The Combined Joint Task Force Horn of Africa acts on credible intelligence
to attack, destroy, and/ or capture terrorists and their support networks
in the region. It also works with host nations to deny the reemergence of
terrorist cells and activities by supporting international agencies
working to enhance long- term stability for the region. Currently,

the headquarters element has about 400 members representing each military
service, civilian personnel, and coalition force representatives afloat
aboard the USS Mount Whitney, which operates in the Gulf of Aden. An
additional 900 personnel are stationed ashore at Camp Lemonier in
Djibouti. The headquarters element will transition ashore to Camp
Lemonier, Djibouti, in the spring of 2003.

U. S. Central Command Combined Joint Task Force Constitutes a flotilla of
coalition warships from France, Germany, Spain, 150 the United Kingdom,
and the United States in searching for terrorist

operatives and contraband while patrolling the Red Sea, Gulf of Aden, and
Indian Ocean areas around the Horn of Africa. Combined Joint Task Force
150 is based in Djibouti.

U. S. Central Command Combined Joint Task Force Serves as the forward
headquarters of the primary U. S. force in 180 Afghanistan. Combined Joint
Task Force 180 is located at Bagram Airfield outside of Kabul,
Afghanistan. (See Operation Enduring Freedom above.)

U. S. Central Command Operation Iraqi Freedom Ongoing operations in Iraq
are designed to eliminate potential sources of weapons of mass destruction
for international terrorists as well as eliminating the regime a long-
time supporter of terrorism. As part of Operation Iraqi Freedom, a group
directly related to al Qaeda in northern Iraq already has been largely
eliminated. The full impact of successful operations in Iraq in the war on
terrorism will not be known until the operation is over. However, as a
result of the operations, the U. S. Central Command expects to
significantly enhance its ability to defeat

international terrorism.

Intelligence on terrorist groups and threat assessments

Defense Intelligence Agency Intelligence Support to Collection, analysis,
and dissemination of all- source intelligence on Combating Terrorism
(first line terrorist groups and activities intended to protect, deter,
preempt, or of defense)

counter the terrorist threat to U. S. personnel, forces, critical
infrastructures, and interests.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

DOD National Foreign Intelligence This program has two mission areas: (1)
Support to Military Program Operations, Force Protection, and (2) Support
to Law Enforcement, Counterterrorism. The Support to Military Operations,
Force Protection, mission area includes the personnel and funding for
intelligence activities associated with protecting lives and property,
reducing risks, and expanding opportunities for operation success through
early detection and

definition of threats to U. S. forces. Its focus is on gathering
information on terrorist activities aimed at U. S. personnel, forces,
critical infrastructures, and interests.

The Support to Law Enforcement, Counterterrorism, mission area includes
the personnel and funding for intelligence activities associated with
gathering information on any foreign terrorist activity aimed at U. S.
personnel or interests, in support of a well- coordinated use of
diplomatic,

intelligence, law enforcement, and military assets. U. S. Army, Deputy
Chief of

Tactical Counterintelligence Defense intelligence support to combating
terrorism includes personnel Staff for Intelligence,

and funding associated with U. S. Army and U. S. Marine Corps tactical
Counterintelligence/ Human counterintelligence resources, U. S. Army
security and intelligence Intelligence Division, and U. S. activities,
Tactical Intelligence and Related Activities, and Joint Military Marine
Corps, Headquarters,

Intelligence Program activities. Intelligence Department, Director of
Intelligence

Counterintelligence activities include, for example, (1) terrorism
investigations, (2) surveillance and countersurveillance teams, (3)
counterterrorism analysis and production, (4) force protection source

operations, (5) threat assessments, (6) counterterrorism collection, (7)
route surveys, and (8) intelligence staff support to deployed task forces.

U. S. Army Counterintelligence activities Conducts comprehensive and
coordinated counterintelligence activities worldwide to detect, identify,
assess, counter, neutralize, and/ or exploit threat intelligence and
international terrorist collection efforts and activities. The U. S.
Army*s counterintelligence mission is to support force protection and
antiterrorism efforts. It supports the command*s

responsibility to protect personnel, equipment, and facilities against
foreign intelligence services and international terrorist threats. The U.
S. Army*s Deputy Chief of Staff for Intelligence, Counterintelligence/
Human

Intelligence Division has management oversight of the U. S. Army*s
program. U. S. Marine Corps Counterintelligence activities Collects,
produces, and disseminates counterintelligence information

and conducts activities to protect commands against espionage, other
intelligence activities, sabotage, assassinations, or terrorist activities
conducted by or on behalf of foreign governments, foreign organizations,
or foreigners. Counterterrorism support is provided to the service, joint

combatant, and operational commanders through counterintelligence
investigations; operations; collections and reporting; and analysis,
production, and dissemination. The Director of Intelligence, Intelligence
Department, Headquarters, U. S. Marine Corps, Washington, D. C., provides
program and policy guidance.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

RESPOND TO TERRORIST INCIDENTS ABROAD Terrorism consequence management a

U. S. Army, Office of the Terrorism Consequence Terrorism consequence
management is an emerging component in Director, Operations,

Management Response DOD*s efforts to combat terrorism. DOD focuses its
terrorism Readiness, and Mobilization; consequence management activities
in two areas: (1) installation Military Support Division,

preparedness and (2) support to the lead federal agency. Under this
Operation Directorate; and the component, DOD brings to the interagency
arena a wide variety of U. S. Army Soldier and

unique warfighting technical and operational support capabilities that
Biological Chemical could be used to provide assistance to state and local
authorities, if Command, Aberdeen Proving

requested by the lead federal agency. DOD*s response assets are found
Ground, Md. in both its Active and Reserve Components. DOD*s role is to
support the lead federal agency: the Department of State for terrorist
incidents U. S. Marine Corps, Marine

overseas, the Department of Justice (through the FBI) for crisis Corps
Systems Command, management of domestic terrorist incidents, and FEMA for
consequence Quantico, Va.

management of domestic terrorist incidents. DOD*s focus is to provide
assistance using its unique resources and capabilities, which are not U.
S. Navy, Combatant

found in the other federal agencies. These include the ability to mass
Commander, Atlantic

mobilize and provide extensive logistical support. Because DOD*s assets
Command, Norfolk, Va.

are structured, manned, and equipped for a warfighting mission, the
Secretary of Defense must first determine that DOD*s special capabilities
U. S. Air Force, Readiness and

and expertise are both necessary and critical to respond to an act of
Installation Support Division,

terrorism and that the provision of such assistance will not adversely the
Air Force Deputy Chief of Staff

military preparedness of the U. S. Armed Forces. for Installations and
Logistics, and Force Protection Division,

In foreign consequence management, DOD cooperates closely with the Office
of the Air Force

Department of State. Regional combatant commands are conducting Surgeon
General

exercises of their functional consequence management plans, both in
combined capacity with partner nations in their areas of responsibility
Assistant Secretary of

and with interagency counterparts. Defense for Health Affairs, Services*
Surgeon General*s

Offices, and local commanders

Terrorism consequence management- installation preparedness

Office of the Assistant Deputy Secretary of Defense

Establishes the DOD policy to protect personnel on military installations
Secretary of Defense for

Memorandum, Preparedness

and DOD- owned or leased facilities against chemical, biological, Special
Operations and LowIntensity

of U. S. Military Installations

radiological, nuclear, and high- yield explosive attacks; to respond to
Conflict

and Facilities Worldwide

these attacks with trained and equipped emergency responders; and Against
Chemical, Biological,

to ensure installations are able to continue critical operations during
Radiological, Nuclear, and an attack and to resume essential operations
after an attack. The High- Yield Explosive Attack memorandum also
promulgated the actions necessary to accomplish (Sept. 5, 2002)

this policy in terms of (1) installation preparedness, (2) personnel
protection, (3) concept of operations, (4) standards and guidelines, and
(5) budget and programs.

Military services Installation First Response This was a new initiative in
fiscal year 2001. The military services Preparedness were directed to
develop requirements, train personnel, and procure

equipment for first response preparedness at DOD installations and
facilities.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Army Deputy Chief of Installation Preparedness

Conducts a complete assessment of U. S. Army installations WMD Staff for
Operations and Plans Program (planned) preparedness. Also included are
training, exercise, and equipment packages to prepare installation first
responders for WMD incidents on and off post. The Director of Operations,
Readiness, and Mobilization is the U. S. Army*s Action Agent for this
program.

U. S. Navy First Responder Provides planning, training, medical equipment,
and non- medical Preparedness equipment for personnel who will respond to
chemical, biological, and radiological incidents.

U. S. Air Force Disaster Response Force Provides planning, training,
exercise, and response equipment for the Disaster Response Force to
respond to a WMD incident. First responders include security forces, fire
department, medical personnel, and Explosive Ordnance Disposal personnel.
The U. S. Air Force program includes conducting and evaluating training
and exercises for

base and headquarters personnel, support for formal and supplemental
training courses, developing and evaluating response plans, and other
associated activities required to implement the WMD Threat Response
Program. Only 11 U. S. Air Force installations will be funded over 7 years
(beginning in fiscal year 2001). Defense Advanced Research

RDT& E Like the antiterrorism and counterterrorism components, the
Projects Agency consequence management component has its own RDT& E
programs:

(1) Counterterror Technical Support Program and (2) Defense Advanced
Research Projects Agency (DARPA) Biological Warfare Defense Program.

Defense Advanced Research Counterterror Technical Research and development
initiatives to support all facets of combating Projects Agency Support
Program terrorism. Projects that specifically address consequence
management

requirements include (1) protective clothing, (2) forensics equipment for
on- scene analysis, (3) responder databases, and (4) urban modeling.

Defense Advanced Research Biological Warfare Defense

Applied research program to develop and demonstrate technologies to
Projects Agency Program thwart the use of biological warfare agents
(including bacterial, viral, and

bio- engineered organisms and toxins) by both military and terrorist
opponents (against U. S. assets at both home and abroad). DARPA*s primary
strategy is to create technologies applicable to broad classes of
pathogens and toxins. The program is focused on supporting the warfighter;
however, many of the technologies also have applicability as

a supporting element of DOD*s combating terrorism activities. Projects
include (1) real- time environmental sensing; (2) external protection
(including novel methods of protection, air and water purification, and
decontamination); (3) consequence management tools; (4) advanced medical
diagnostics for the most virulent pathogens and their molecular
mechanisms; (5) pre- and post- exposure medical

countermeasures; and (6) pathogen genomic sequencing. The program
collaborates with pharmaceutical, biotechnology, government, and academic
centers of excellence. The program also is closely coordinated with the
Defense Threat Reduction Agency, the Food and Drug Administration, the
Centers for Disease Control and Prevention, the Department of Energy
(DOE), and the intelligence

community.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

DOD terrorism consequence management support to lead federal agency and
response assets

DOD Joint Task Force for Civil Plans and carries out military assistance
to civil authorities for Support consequence management of WMD incidents.
It supports the lead

federal agency, establishes command and control of designated DOD forces,
and provides military assistance to civil authorities to save lives,
prevent human suffering, and provide temporary critical life support. It
consists of a headquarters element with an operational focus, but has no
assigned forces. The Joint Task Force for Civil Support could deploy
overseas 60 dedicated personnel, who are located at Fort Monroe, Va.

U. S. Army Chemical- Biological Rapid Coordinates and integrates DOD*s
technical assistance for the detection, Response Team neutralization,
containment, dismantlement, and disposal of weapons of

mass destruction containing chemical, biological, or related materials.
Assists first responders in dealing with consequence management.
Operational control is exercised by the (1) supported commander, (2) Joint
Special Operations Task Force, (3) Joint Task Force for Civil Support, or
(4) Response Task Force. The Chemical- Biological Rapid Response Team
could deploy overseas 14 dedicated personnel. They are located at Aberdeen
Proving Grounds, Md.

Defense Threat Reduction Defense Nuclear Advisory Provides unique nuclear-
related technical assistance to the Response Agency Team Task Force or the
lead federal agency. Teams consist of health physicists, radiation
physicians, legal advisors, and other related

professionals. The team can deploy within 4 hours. Defense Threat
Reduction Consequence Management

Assists other DOD organizations in matters involving weapons of mass
Agency Advisory Team destruction and radiological accidents and incidents.
The agency

maintains a deployable Consequence Management Advisory Team that provides
technical, consequence management planning, weapons effects modeling,
general counsel, public affairs, and health physics expertise to augment
commanders* staffs. The team also has a reachback capability to more
robust technical resources within the agency. The team is a formal part of
the Joint Forces Command Joint Technical

Augmentation Cell for continental United States consequence management
response. It also augments the Joint task Force- Civil Support for U. S.-
based response. Because team members are assigned additional full- time
duties within the Defense Threat Reduction Agency, no dedicated manpower
is associated with this team.

U. S. Air Force Radiological Assessment A rapidly deployable team with the
personnel and equipment necessary Team to respond to accidents or
incidents involving radioactive materials. The team can provide in- depth
technical assistance in identifying the immediate health risks associated
with radiological threats. The team is located at Brooks Air Force Base,
Tex., and could deploy within 72 hours.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Army 52 nd Ordnance Group Provides military explosive ordnance
disposal/ bomb squad units to (Explosive Ordnance defeat or mitigate the
hazards from conventional, nuclear, or chemical Disposal) military
munitions and weapons of mass destruction. Three Explosive Ordnance
Disposal companies have unique counter booby trap equipment and are
trained to operate specialized equipment provided by the Department of
Energy (DOE) for diagnostics and rendersafe/

mitigation of a nuclear device. The 52 nd Ordnance Group*s three companies
could be deployed overseas. They are located in San Diego, Calif.; San
Antonio, Tex.; and at Fort Belvoir, Va.

U. S. Army Technical Escort Unit Provides worldwide, no- notice capability
to provide advice, detection, field sampling, field verification,
assessment, monitoring, render- safe, decontamination, recovery,
packaging, transportation, and escort of weaponized and non- weaponized
chemical and biological materials, devices, or hazards. The Technical
Escort Unit has approximately 190

military and civilian personnel that could be deployed overseas. They are
located at Aberdeen Proving Grounds, Md.; Fort Belvoir, Va.; Pine Bluff
Arsenal, Ark.; and Dugway Proving Grounds, Utah. U. S. Army Edgewood
Chemical and Provides on- site laboratory capability to analyze chemical
safety

Biological Forensic Analytical materials, foreign chemical warfare agents,
and other hazardous Center Modular On- site

industrial chemicals. The laboratory consists of a series of transportable
Laboratory

modules that contain analytical instruments and their own electrical
generators. Five personnel accompany the laboratory, including chemists
and sampling technicians. The on- site laboratory can be deployed within 4
hours. U. S. Army U. S. Army Medical Research

Provides the primary source of medical information dealing with the
Institute of Chemical Defense, management of chemical warfare agent
casualties for the federal Medical Chemical Biological

government. The team assists the WMD incident commander by Advisory Team
identifying the medical implications to military and/ or civilian
operations and advising on the initial and long- term management of
chemical casualties at the incident site. The team also supervises the
collection of

biological samples (bodily fluids) for subsequent verification of chemical
agent exposure that can be used to facilitate confirmation, diagnosis, and
treatment.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Army U. S. Army Medical Research Conducts research to develop
strategies, products, procedures, and Institute of Infectious

training programs for medical defense against biological warfare threats
Diseases

and infectious diseases. Also, it develops vaccines, drugs, diagnostic
tests, and medical management procedures to protect military personnel
against biological attack or endemic infectious diseases. It provides
medical and scientific experts and technical guidance to commanders on the
prevention and treatment of hazardous diseases and management of
biological casualties. It serves as DOD*s reference center for the
identification of biological agents. Primary capabilities are technical
expertise, extensive laboratory facilities, and the Aeromedical Isolation
Team, which is a rapid response unit that can deploy to any area of the

world to transport and provide patient care under high containment of
contagious and dangerous diseases. The team has a limited capability,
equipment, and staff and is not geared to handle mass casualties. No
personnel are assigned directly to the Aeromedical Isolation Team. When
deployed, the team would consist of two elements, each capable of
transporting only one patient. The institute is located at Fort Detrick,

Md. U. S. Army Special Medical Augmentation Provides technical advice in
the detection, neutralization, and

Response Team Nuclear/ containment of chemical, biological, or
radiological hazardous materials Biological/ Chemical

in a terrorist event. The Special Medical Augmentation Response Team
Nuclear/ Biological/ Chemical has six teams, located at various sites,
which could be deployed overseas. Six members per team have these
collateral duties.

U. S. Army Special Medical Augmentation Provides a rapid response
evacuation unit to any area of the world to Response Team Aero transport
and provide patient care under conditions of biological Medical Isolation

containment to service members or U. S. civilians exposed to certain
contagious and highly dangerous diseases. The Special Medical Augmentation
Response Team Aero- Medical Isolation includes approximately 20 personnel
who have this collateral duty that could be deployed overseas. They are
stationed at Fort Detrick, Md.

U. S. Army Radiological Advisory Medical Assists and furnishes
radiological health hazard guidance to the on Team scene commander, U. S.
Army Response Task Force (discussed below),

or local medical authorities at an incident site and the installation
medical authority. The Radiological Advisory Medical Team has 8- 10
personnel who have these collateral duties and could be deployed overseas.
They are located at Walter Reed Army Medical Center in Washington, D. C.
U. S. Army and U. S. Navy Radiological Control Teams Provides radiological
monitoring support and advice to the U. S. Army Response Task Force
(discussed above). The teams are capable of

deploying within several hours. The teams are located at Fort Monmouth, N.
J., and Norfolk, Va.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

U. S. Marine Corps Chemical- Biological Incident A highly trained, rapid
response force that is capable of providing Response Force consequence
management for terrorist- initiated chemical and biological attacks to
mitigate the effects of multiple/ mass casualty incidents. It also
provides force protection in the event of a terrorist incident,
domestically

or overseas. Capabilities include threat identification, casualty
extraction, personnel decontamination, and medical triage/ treatment/
stabilization. The force also maintains an information *reach- back*
capability to chemical/ biological subject matter and disaster response
experts for consultation. The Marine Corps Systems Command at Quantico,
Va., manages the program. The force is a national asset that operationally
falls under the Joint Forces Command. The Chemical- Biological Incident

Response Force has 373 dedicated personnel who could be deployed overseas.
They are located at Indian Head, Md. U. S. Navy U. S. Navy Environmental
and

Provides doctors, industrial hygienists, environmental health officers,
Preventive Medical Unit,

microbiologists, preventive medical technicians, and other related
Chemical, Biological, professional who could be deployed in response to an
incident. Teams Radiological, Environmental

remain on alert for a rapid response and can advise the Chemical/ Defense
Response Team

Biological Rapid Response Team and local public health authorities and
augment other Chemical/ Biological Rapid Response Team medical assets. U.
S. Navy U. S. Navy Medical Research

Provides a transportable biological field laboratory that is capable of
Institute rapid identification of biological warfare agent. With a team of
two

operators, the laboratory can be ready to deploy within 4 hours. Assistant
Secretary of

Response Teams Provide short- duration medical augmentation to federal and
defense Defense (Health Affairs) agencies responding to disaster,
humanitarian, and emergency incidents. Response Teams are composed of
medical experts who can be deployed to assist in emerging medical
situations. Such situations include medical operational threat assessment
and risk communication; surveillance; investigation; intervention and
control of occupational

environmental illnesses, injuries, and disease; advance diagnostic
testing; and health hazard assessments and surveillance detection and
identification of chemical, biological, radiological, or environmental
agents. Management oversight is provided by the Assistant Secretary of

Defense (Health Affairs), each military service*s Office of the Surgeon
General, and military installation commanders, who act as host to tenant
commands.

(Continued From Previous Page)

Department of Defense office or military service Program or activity
Description of program or activity

Military assistance to other countries for international special security
events

Regional military International special security

Provides a military response, if needed, to a terrorist incident overseas
commanders events involving weapons of mass destruction or to evacuate
Americans during

an international special security event, such as a presidential summit
meeting or the Olympic Games. For example, DOD representatives participate
in the Olympic Security Advisory Team at the U. S. Embassy in Athens to
coordinate federal assistance to the Government of Greece in preparation
for the 2004 Olympic Summer games in Athens. The team provides advice to
the Greek Ministry of Public Order on security issues at the strategic
level and advice on technical support issues at the

operational level. Issues include intelligence, planning, training and
exercises, technology, command and control coordination, and Olympic venue
security. Source: DOD.

Notes: Although DOD*s terrorism consequence management response assets are
geared primarily to respond to a domestic terrorist incident if requested
by the Department of Justice through the FBI or by FEMA, these same assets
could be deployed overseas to respond to an international terrorist
incident if requested by the Department of State.

For a detailed description of military service- specific categories of
equipment, activities financed, program management, planned activities,
funding, and personnel levels, see Office of the Secretary of Defense,
Congressional Report: DOD Combating Terrorism Activities, January 14,
2000, and Combating Terrorism Activities, Fiscal Year 2003 Budget
Estimates, March 2002.

a The response to a terrorist incident involves managing the immediate
crisis as well as its consequences. *Crisis management* involves efforts
to prevent and deter a terrorist attack, protect public health and safety,
arrest terrorists, and gather evidence for criminal prosecution.
*Consequences management* involves efforts to provide medical treatment
and emergency services, evacuate people from dangerous areas, and restore
government services.

Matrix of Department of Homeland Security Programs and Activities to
Combat Terrorism

Appendi I I x Overseas The Department of Homeland Security is primarily
focused on combating terrorism within the United States. However, for
selected overseas activities, it supports the Department of State, which
is the lead federal agency for coordinating U. S. government efforts to
combat terrorism overseas. Within the department, multiple bureaus,
offices, and agencies manage various programs and activities to combat
terrorism abroad. Department of Homeland Security also works with other U.
S. government agencies, foreign government organizations and agencies, and
international organizations in carrying out these programs and activities.
Some of these activities directed at combating terrorism overseas (e. g.,
coordination) may actually occur in the United States.

Appendix II identifies and describes the following:  the strategic
framework of Homeland Security*s efforts to combat

terrorism overseas;  Homeland Security*s programs and activities to
detect and prevent

terrorism overseas;  Homeland Security*s programs and activities to
disrupt and destroy

terrorist organizations overseas; and  Homeland Security*s programs and
activities to respond to terrorist

incidents overseas.

Tabl e 11: Department of Homeland Security Programs and Activities to
Combat Terrorism Overseas Department of Homeland Security office or bureau
Program or activity Description of program or activity STRATEGIC FRAMEWORK
Special agency official or office in charge of counterterrorism

Secretary of Homeland Serves as head of the

Responsible for preventing terrorist attacks within the United States and
Security department reducing vulnerability to those attacks. The Secretary
also is responsible for minimizing damage and assisting in the recovery
from terrorist attacks

that occur within the United States.

(Continued From Previous Page)

Department of Homeland Security office or bureau Program or activity
Description of program or activity Agency plans or strategies to combat
terrorism

Department of Homeland

National Strategy for

The strategy addresses the threat of terrorism within the United States,
but Security Homeland Security does mention various initiatives related to
combating terrorism overseas.

(September 2002) These initiatives include (1) negotiating new
international standards for travel documents, (2) improving security for
international shipping containers, (3) enhancing cooperation with foreign
law enforcement agencies, (4) expanding specialized training and
assistance to allies, and (5) increasing the security of transnational
infrastructure. The strategy stresses the importance of expanding
international cooperation in research

and development and enhancing the coordination of incident response.
Finally, the strategy recommends reviewing current international treaties
and law to determine where improvements could be made.

DETECT AND PREVENT TERRORISM ABROAD Critical infrastructure protection

Information Analysis and Implementation of the Helps implement Department
of Homeland Security critical infrastructure Infrastructure Protection
Homeland Security Act of

protection responsibilities in (1) developing a comprehensive national
plan Directorate

2002 for securing the key resources and critical infrastructure of the
United States; (2) recommending measures to protect the key resources and

critical infrastructure of the United States in coordination with other
federal agencies and in cooperation with state and local government
agencies and authorities, the private sector, and other entities; and (3)
disseminating, as appropriate, information analyzed by the department both
within the

department and to other federal agencies, state and local government
agencies, and private sector entities to assist in the deterrence,
prevention, preemption of, or response to terrorist attacks.

The Homeland Security Act of 2002 created the directorate within the new
department and transferred to it the functions, personnel, assets, and
liabilities of several existing organizations with critical infrastructure
protection responsibilities, including the National Infrastructure
Protection Center (other than the Computer Investigations and Operations
Section)

and the Critical Infrastructure Assurance Office.

Law enforcement training (with foreign governments)

Federal Law Enforcement Glynn County (* Glynco*),

Serves as an interagency law enforcement training organization for federal
Training Center Georgia, facility law enforcement agencies. The center
provides facilities, equipment, and

support services for conducting training of federal law enforcement
personnel. It also has a reimbursable program to accommodate the training
requirements of various federal agencies, state, local, and foreign law
enforcement personnel on a space- available basis. As a result of
increased domestic interest in training, it does not have the capacity to
train foreign

nationals at its Glynn County (* Glynco*), Georgia, facility.

(Continued From Previous Page)

Department of Homeland Security office or bureau Program or activity
Description of program or activity

Federal Law Enforcement International Programs

Under agreement with the Department of State, the Federal Law Training
Center Division Enforcement Training Center*s (FLETC) International
Programs Division provides specialized training focused in three areas:
(1) the U. S. government*s Law and Democracy Program, with a focus on
white- collar crime, illegal narcotics, and building democratic
institutions; (2) Antiterrorism Assistance program, with a focus on
combating international terrorism; and (3) International Law Enforcement
Academies (ILEA), with a focus on law enforcement skills.

Recently, the division*s focus has been on ILEA training, including
leading assessments to identify training needed by participating countries
and teaching the rule of law. The division also has focused on bilateral
programs with specific countries. FLETC instructors teach needed skills/
techniques in, for example, money laundering and investigations.
Presently, FLETC is finalizing a course on the Financing of Terrorism,
which will soon be offered to foreign nationals. Since its inception in
1994, FLETC has helped train 1, 900 law enforcement officials representing
34 countries.

Bureau of Customs and Nunn- Lugar Cooperative

Provides basic and specialized border control training and equipment to
Border Protection Threat Reduction Program customs and law enforcement
agencies with a focus on Russia, Belarus, Kazakhstan, and the Ukraine.
This program is funded through the Department of Defense.

Bureau of Customs and Project Amber Provides basic border control training
and advanced courses on Border Protection cross- country tracking,
targeting of high- risk shipments, and proper

utilization of Department of State- provided x- ray vans to detect nuclear
materials.

Bureau of Customs and Service Counter- proliferation

Cooperative effort with the Department of Defense that provides border
Border Protection Program control training and equipment, including large
consignments of high- and

low- tech interdiction and detection tools and advanced investigative
techniques.

Bureau of Customs and Export Control/ Border Provides on- site technical
assistance by 13 customs advisors in 9 offices Border Protection Security
Program who cover 25 countries. Focuses on delivery of training, technical

assistance, and equipment; coordinates the delivery of assistance from
other federal agencies; and fosters host country interagency cooperation
and cross- border and regional cooperation.

Border Security Bureau of Immigration and Customs Air and Marine
Responsible for protecting the nation*s borders and the American people
Customs Enforcement Interdiction from smuggling of narcotics and other
contraband terrorist activity with an integrated air and marine
interdiction force.

(Continued From Previous Page)

Department of Homeland Security office or bureau Program or activity
Description of program or activity

Bureau of Customs and Operation Shield America Cooperative initiative with
American companies to help prevent Border Protection international
terrorist groups from obtaining sensitive U. S. technology, weapons, and
equipment. Operating internationally, customs attache

offices have begun reaching out to foreign law enforcement counterparts to
help raise awareness among businesses in their countries. Operation Shield
America tracks inquiries and orders for technology to be shipped

outside the United States; ensures export specialists know export controls
and follow appropriate screening and licensing; ensures employees
understand certain technologies are restricted from export; and
investigates suspicious customers attempting to obtain sensitive
technologies.

Bureau of Customs and Advanced Passenger

Provides mandatory information on arriving airline passengers that is
Border Protection Information System submitted to the immigration
inspectors for review. Failure to transmit

arriving passenger data could result in penalties ranging from monetary
fines for the pilot up to the revocation of landing rights for the
airline. Bureau of Customs and

Automated Manifest System Provides extensive data to customs inspectors on
the shipping industry, its Border Protection patterns, and all who
participate. Customs officials report that they receive information on 98
percent of all containers entering the United States.

Bureau of Customs and Trade Partnership Against

Cooperative agreement to work with the trade community to improve border
Border Protection Terrorism security. Based on a model designed to prevent
smuggling of illegal drugs,

the initiative was proposed to improve security along the entire supply
chain, from the factory floor, to foreign vendors, to U. S. ports of
entry.

Bureau of Customs and Smart Border Declaration Cooperative agreement
between the United States and Canada whereby Border Protection customs
officials in both countries target and pre- screen cargo headed to

each country. The agreement focuses on four areas: (1) secure flow of
people, (2) goods, (3) investments in technology to expedite trade and
minimize threats, and (4) coordination and information sharing to defend
common borders. A similar agreement is being negotiated between the

United States and Mexico. Bureau of Customs and

NEXUS Program Allows low- risk Canadian and U. S. citizens to travel
across the U. S. Canadian Border Protection border with minimal customs or
immigration processing by either

country. This is a pilot program. Bureau of Customs and

Container Security Initiative Protects the use of ocean- going sea
containers in international trade. Border Protection Initially the focus
will be on the largest ports of entry and focus on prescreening of cargo
prior to shipment to the United States. The initiative is expected to (1)
establish criteria for identifying high- risk containers, (2) prescreen
containers before they are shipped to the United States, (3) use
technology to pre- screen high- risk containers, and (4) develop and use
smart/ secure containers.

U. S. Coast Guard Maritime border controls The U. S. Coast Guard
participates in efforts to detect terrorists and their between ports of
entry materials outside maritime ports of entry. The U. S. Coast Guard has
a

National Vessel Movement Center that identifies and tracks *high interest*
vessels. Decisions on appropriate actions to be taken with respect to such
vessels, such as whether to board, escort, or deny entry are based upon
established criteria and procedures.

(Continued From Previous Page)

Department of Homeland Security office or bureau Program or activity
Description of program or activity

U. S. Border Patrol Land border controls The U. S. Border Patrol has the
mission to detect and apprehend illegal between ports of entry aliens and
smugglers between U. S. ports of entry. The Border Patrol is

responsible for patrolling about 6,000 miles of Mexican and Canadian
international land borders and 2, 000 miles of coastal waters surrounding
the Florida Peninsula and the island of Puerto Rico. Agents patrol these
borders utilizing various vehicles, including aircraft, marine vessels,
allterrain vehicles, and horse units.

DISRUPT AND DESTROY TERRORIST ORGANIZATIONS ABROAD Law enforcement
Investigations

Bureau of Immigration and Customs Attaches Work closely with host
government customs services and other law Customs Enforcement enforcement
agencies to coordinate law enforcement actions domestically

and internationally against terrorists cells and networks. Bureau of
Immigration and

Operation Global Shield Immigration Control Officers deployed at transit
points around the world to Customs Enforcement serve as the front line of
defense against those individuals who might well cause harm to the
security of the United States. The control officers work closely with host
country government agencies to gather law enforcement

intelligence and information on migrant smuggling and trafficking
organizations. Bureau of Immigration and

Operation Oasis Operation is directed at identifying, detecting, and
halting the illegal Customs Enforcement exportation of unreported currency
to terrorist activity.

Bureau of Immigration and Customs investigations Responsible for
investigating a range of issues including terrorist financing, Customs
Enforcement export enforcement, money laundering, smuggling, fraud, and
cyber crimes.

U. S. Secret Service Investigates terrorists* Investigates terrorists*
threats against officials under its protective mission threats overseas,
including the President and Vice President.

Identifying, freezing, and seizing terrorist organizations* assets

Bureau of Immigration and Operation Green Quest Multi- agency financial
enforcement initiative intended to augment existing Customs Enforcement
counter- terrorist efforts by bringing the full scope of the government's

financial expertise to bear against systems, individuals, and
organizations that serve as sources of terrorist funding. Operation Green
Quest is aimed at identifying, freezing, and seizing the accounts and
assets of terrorist organizations that pose a threat to the United States
and other nations.

U. S. Secret Service Investigates Responsible for enforcing laws related
to securities of the United States financial crimes and financial crimes.
Its efforts to combat international terrorism rest

primarily on the investigation of counterfeiting of currency and
securities.

(Continued From Previous Page)

Department of Homeland Security office or bureau Program or activity
Description of program or activity Military Operations

U. S. Coast Guard Maritime interception Conducts maritime interception
operations. In its role as a military service, operations the U. S. Coast
Guard supports regional military commands, which have requested and
received U. S. Coast Guard cutters to conduct such operations. To
accomplish its missions to combat terrorism, both domestic and overseas,
the U. S. Coast Guard is developing a U. S. Coast Guard Maritime Strategy
for Homeland Security. This strategy puts a premium on identifying and
intercepting threats well before they reach U. S. shores by conducting
layered, multi- agency, maritime security operations that include

surveillance and reconnaissance, tracking, and interception.

Protection of Americans abroad

U. S. Secret Service Protection of senior officials Responsible for the
security of the President and Vice President, as well as overseas other
designated individuals under its protective mission overseas.

RESPOND TO TERRORIST INCIDENTS ABROAD Crisis and consequence management
domestic and abroad a

Department of Homeland Emergency Response Includes a number of response
teams with unique capabilities that are Security Teams primarily used in a
domestic capacity, but could respond overseas to a

terrorist incident. Source: Department of Homeland Security.

a The response to a terrorist incident involves managing the immediate
crisis as well as its consequences. *Crisis management* involves efforts
to prevent and deter a terrorist attack, protect public health and safety,
arrest terrorists, and gather evidence for criminal prosecution.
*Consequences management* involves efforts to provide medical treatment
and emergency services, evacuate people from dangerous areas, and restore
government services.

Matrix of Department of Justice Programs and

Appendi I I I x Activities to Combat Terrorism Overseas The Department of
Justice supports the Department of State, which is the lead federal agency
for coordinating U. S. government efforts to combat terrorism overseas.
Within the department, multiple bureaus and offices manage various
programs and activities to combat terrorism abroad. The Department of
Justice also works with other U. S. government agencies, foreign
government law enforcement organizations and agencies, and multinational
organizations in carrying out these programs and activities.

For many of these activities, there may be no clear boundary between
combating terrorism domestically and overseas. Some of these activities
directed at combating terrorism overseas (e. g., coordination) may
actually

occur in the United States. Appendix III identifies and describes the
following:  the strategic framework of Justice*s efforts to combat
terrorism

overseas;  Justice*s programs and activities to detect and prevent
terrorism

overseas;  Justice*s programs and activities to disrupt and destroy
terrorist

organizations overseas; and  Justice*s programs and activities to respond
to terrorist incidents

overseas.

Tabl e 12: Department of Justice Programs and Activities to Combat
Terrorism Overseas Department of Justice office or bureau Program or
activity Description of program or activity STRATEGIC FRAMEWORK Agency
head*s role in counterterrorism

Justice, Attorney General Head of the Department of Represents the United
States in legal matters related to terrorism and Justice and chief law
gives advice and opinions to the President and to the heads of the
enforcement officer of the

executive departments of the government. Also, the Attorney General,
federal government

through the Department of Justice, has the lead federal role for crisis
management in a domestic terrorist incident and a support role to the
Department of State during a terrorist incident overseas.

Special agency official or office in charge of counterterrorism

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

Justice, Deputy Assistant Criminal Division,

This section is responsible for the design, implementation, and support
Attorney General Counterterrorism Section of law enforcement efforts to
combat international terrorism, including legislative initiatives and
policies. This includes investigating and prosecuting suspected terrorists
for acts of terrorism against U. S. interests worldwide. Justice, U. S.
Attorney District Anti- Terrorism Task Forces Integrates and coordinates
the anti- terrorism activities in each of the Offices judicial districts
within the United States. The task forces are comprised

of federal prosecutors from the U. S. Attorneys Office, members of federal
law enforcement agencies, as well as the primary state and local
enforcement officials in each district. They serve as part of a national
network that coordinates closely with the Joint Terrorism Task Forces in
the collection, analysis, and dissemination of information. The
AntiTerrorism Task Forces also develop the U. S. investigative and
prosecution strategy throughout the country.

Justice, Deputy Attorney National Security Coordinates policy, resource
allocation, operations, long- term planning, General Coordination Council
and information sharing related to national security efforts to combat
terrorism. Membership includes the Deputy Attorney General, who

heads up the council, Director of the Federal Bureau of Investigation
(FBI), and other department officials.

Agency plans or strategies to combat terrorism

Justice, U. S. Attorney General Five- Year Interagency

Serves as a baseline strategy for coordination of national policy and
Counterterrorism and

operational capabilities to combat terrorism in the United States and

Technology Crime Plan (Sept. against American interests overseas. 1999)

Justice, U. S. Attorney General Strategic Plan for Fiscal Years

Provides a multi- year plan for carrying out the department*s mission. The

2001- 2006 (Sept. 2000) plan is oriented toward achieving the vision of
securing equal justice for all, enhancing respect for the rule of law, and
making America a safer and less violent nation. The plan includes goals,
objectives, and strategies for the next 5 years. It also describes key
interagency

programs and summarizes the external factors that may affect goal
achievement. Justice, U. S. Attorney General National Money Laundering

The strategy includes, for the first time, a comprehensive national plan
to

Strategy, jointly issued by the attack the financing of terrorist groups.
Goal 2 of the Strategy focuses Attorney General and the

law enforcement and regulatory resources on identifying terrorist
Secretary of the Treasury in

financing networks by (1) implementing a multi- pronged operational July
2002 strategy to combat terrorist financing, (2) identifying and targeting
the methods used by terrorists financiers, and (3) improving international

efforts to dismantle terrorist financial networks. The strategy is an
interagency plan, which draws on the expertise and resources of the
Departments of Justice and the Treasury, and other federal agencies as
well as foreign partners and the private sector. FBI Strategic Plan 1998-
2003 Concentrates on specific 5- year strategic goals and key functional

(May 1998) strategies in areas related to operations, intelligence,
information technology, applied science and engineering, management, and
state and local services. The plan guides the direction, priorities, and
resources of the FBI. The plan currently is under revision to reflect the

FBI*s recent reorganization, done in large part to provide additional
resources to combat terrorism.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity DETECT AND PREVENT TERRORISM ABROAD Law enforcement
training (with foreign governments)

FBI International Law Trains law enforcement officers from Central Europe
and the newly Enforcement Academy

independent states of the former Soviet Union. The academy provides (ILEA)

specialized short- term courses and an 8- week professional development
Budapest, Hungary

program focusing on law enforcement issues, rule of law, investigation
process, leadership, and ethics. It also serves as a cooperative effort
between the Departments of State, Justice, and the Treasury. FBI, Training
Division International Training and

Conducts worldwide in- country training through the International Training
Assistance Unit and Assistance Unit for foreign law enforcement entities.
The unit responds to training requests from the legal attaches for foreign
police agencies. The training emphasizes crisis management and major case
management as well as the investigation of transnational organized

crime groups. The training also enhances the FBI*s international
investigative mission by creating *cop- to- cop* relationships with
foreign law enforcement agencies. Justice, Criminal Division,

International Criminal Provides training and development assistance to
police organizations International Training and Investigative Training

worldwide. The training also helps foreign governments develop the
Development Programs Assistance Program

capacity to provide modern professional law enforcement services based on
democratic principles and respect for human rights. Activities include the
development of police forces in the context of international peacekeeping
operations and enhancing the capabilities of existing police organizations
in emerging democracies.

Justice, Criminal Division, Office of Overseas

Provides justice- sector institution building assistance, including
training International Training and Prosecutorial Development of foreign
judges and prosecutors, in coordination with various Development Programs

Assistance and Training government agencies and U. S. embassies. The
training is intended to strengthen the legislative and regulatory criminal
justice infrastructure within the host country, and enhance the capacity
of the country to

investigate and prosecute crime more effectively, consistent with the rule
of law.

Bureau of Alcohol, Tobacco, International Programs

Trains foreign nationals in conjunction with the Department of State*s
Firearms and Explosives Branch training Bureau of International Narcotics
and Law Enforcement Affairs and/ or

Bureau of Diplomatic Security*s Antiterrorism Assistance program. Programs
include: International Post Blast Investigation, International Firearms
and Explosives Identification, Tax and Revenue Training, and Explosives
Detection Canine Training. The branch also serves as technical and legal
experts with the Department of State on the negotiation of several
international instruments.

The ATF currently is establishing a Center for Explosive Research and
Training in Virginia. The ATF anticipates that training supplied there for
domestic and international law enforcement officials will become part of
the international fight against terrorism and violent crime.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity Border security (including visa processing issues)

Justice National Security Entry- Exit Tracks up to 200, 000 foreign
visitors each year and stops suspected Registration System terrorists
prior to entry into the United States. The system verifies

visitor*s activities and whereabouts while in the country. Future plans
will include efforts to track up to 35 million foreign visitors entering
the United States annually. The system has three components that include

(1) fingerprinting and photographing at the border, (2) periodic
registration of aliens who stay in the United States 30 days or more, and
(3) exit controls that will help the Immigration and Naturalization
Service (INS) to remove those aliens who overstay their visas.

Justice Foreign Terrorist Tracking Coordinates a multi- agency effort to
identify, locate, and deny entry to, or Task Force remove terrorists and
their supporters from, the United States. The task

force includes a number of agencies, including the FBI, INS, and the U. S.
Customs Service.

DISRUPT AND DESTROY TERRORIST ORGANIZATIONS ABROAD Law enforcement
cooperation

FBI, Executive Assistant Office of Law Enforcement

Establishes relationships and enhances information sharing with state
Director for Law Enforcement

Coordination and local police professionals. In addition, helps the FBI
tap into the Services

strengths and capabilities of its partners. FBI, Counterterrorism

National Joint Terrorism Task Serves as the national coordinating
mechanism for sharing information Division Force on suspected terrorists,
including those of foreign origin. Also, it

complements the local Joint Terrorism Task Forces to improve collaboration
and information sharing with other federal, state, and local agencies. The
task force operates out of the FBI*s Strategic Information Operation
Center in Washington, D. C.

FBI, Field Offices Joint Terrorism Task Forces Serves as a coordinating
mechanism that combines the international and national investigative
resources of the federal government with the street- level expertise of
local law enforcement agencies. This *cop- tocop* relationship enables law
enforcement agencies to share information on suspected terrorists,
including those of foreign origin. One of the most robust Joint Terrorism
Task Forces is in Washington, D. C., which has representatives from 15
federal agencies. Throughout its field offices, the FBI has 56 task forces
in place.

Justice, Criminal Division Terrorist Financing Task Force Coordinates the
terrorist financing enforcement efforts within Justice*s Criminal
Division. The task force works with prosecutors around the country as well
as with the FBI*s Foreign Terrorist Tracking Task Force and Terrorist
Financing Operation Section to disrupt groups and individuals representing
terrorist threats.

FBI, Executive Assistant International Operations Promotes relations with
both foreign and domestic law enforcement Director for Law Enforcement

agencies and security services and facilitates investigative activities.
Services

Also provides managerial support of the Legal Attache Program.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

FBI, International Operations Legal Attache Program Provides Senior
Special Agents stationed at U. S. missions overseas who work closely with
law enforcement agencies of host countries on common crime problems. They
also play a large role in facilitating the international battle against
terrorism by enlisting the cooperation of foreign law enforcement,
enabling the arrest of U. S. terrorist suspects, and solving crimes
against U. S. citizens.

Legal Attaches also assist in coordinating investigations with federal law
enforcement overseas by disseminating information to officials of key U.
S. federal agencies stationed abroad. They routinely share information on
investigations with liaisons serving with Department of Defense (DOD)
components overseas. The FBI currently operates 44 legal attache offices
worldwide.

Justice, Criminal Division, Negotiates bilateral and

In conjunction with the Department of State, the Office of International
Office of International Affairs multilateral agreements Affairs negotiates
extradition and mutual legal assistance treaties with

foreign governments. As of July 2002, the United States had bilateral
Mutual Legal Assistance Treaties covering 46 jurisdictions and over a 120
extradition treaties in force with foreign jurisdictions.

Justice U. S. National Central Bureau Represents the United States as a
member of INTERPOL. It facilitates of the International Criminal
international law enforcement cooperation by transmitting law Police
Organization

enforcement- related information between the National Central Bureaus
(INTERPOL)

of INTERPOL, member countries, and U. S. law enforcement agencies. It also
coordinates information relevant to international investigations and
identifies patterns and trends in criminal activities.

Bureau of Alcohol, Tobacco, Law enforcement cooperation Works directly and
in cooperation with other agencies to enforce federal Firearms and
Explosives laws and regulations related to firearms, explosives, and fire-
related

violent crimes.

Law enforcement investigations

FBI, Counterterrorism Lead agency in charge of

As principal investigative agency of the federal government, it serves as
Division investigating international

lead agency for international counterterrorism investigations. The FBI
terrorist incidents

has extraterritorial jurisdiction to expand its investigative authority
outside U. S. borders. Its investigations include incidents involving
bombings, hostage taking, homicides of U. S. citizens overseas, sabotage,
and extortion by threatening the use of weapons of mass destruction.

Justice Attorney General Guidelines Establishes prediction levels and
limits on international counterterrorism for FBI Foreign Intelligence

investigations involving U. S. persons or foreign nationals overseas.
Collection and Foreign Counter- intelligence Investigations

FBI National Crime Information Provides the names and identifying
information of terrorist suspects Center Database under domestic and
international investigations. The data is accessible to state and local
law enforcement officers.

FBI Integrated Automated Provides the capability to search and match
fingerprints of suspected Fingerprint

terrorists against millions of fingerprints contained in the criminal
Identification System fingerprint repository.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

FBI National Center for the Provides investigative and operational support
functions to federal, state, Analysis of Violent Crime local, and foreign
law enforcement agencies investigating unusual or repetitive violent
crimes. The center also can provide support through expertise and
consultation for non- violent matters related to national security.

Justice, Criminal Division, Mutual legal assistance

Provides for the exchange of evidence between parties to a treaty, often
Office of International Affairs treaties in a form that is admissible at
trial. The treaties enable the Department of

Justice to obtain foreign financial records and testimonial statements of
foreign witnesses. In addition, they allow for the search and seizure of
foreign evidence, and, in some cases, the right to freeze and recover the
forfeiture of proceeds.

Justice, Criminal Division, Letters rogatory Letters rogatory are requests
that come from judicial officials in one Office of International Affairs
country to judicial officials in another country seeking assistance with
an investigation. The letters usually include background on the nature and

targets of the criminal investigation, relevant facts about the case or
investigation, type of assistance needed, statutes alleged to have been
violated, and a promise of reciprocity.

Bureau of Alcohol, Tobacco, International Programs

Combats the illegal movement of firearms, explosives, and ammunition
Firearms and Explosives Branch to prevent such arms from being used to
commit acts of terrorism,

among other international crime. The responsibilities of the International
Programs Branch include: (1) supervising and coordinating the utilization
of ATF Country Attaches in support of International Trafficking in Arms
Investigations, (2) developing international firearms programs and policy,
(3) performing/ conducting international firearms trafficking assessments,
and (4) and performing/ conducting firearms trafficking studies

concerning foreign countries. According to the ATF, since September 11,
2001, its International Programs Branch has been inundated with requests
for assistance from numerous foreign law enforcement agencies. Most of
these requests have been for assistance in the area of explosives
investigations, explosives tracing, and post- blast evidence recovery.

Law enforcement renditions and extraditions Justice, Criminal Division,
Extradition treaties Enables parties to a treaty to obtain custody of
accused terrorists. The Office of International Affairs agreement provides
for the request of one party to the treaty to the other

party for the arrest and surrender of an individual accused or convicted
of a crime in a country making the request. Modern extradition treaties
contain a *dual criminality* clause, which makes any offense considered

a crime in both countries extraditable. FBI Renditions Escort agents
apprehend and obtain custody of suspected terrorists

without the formalities of an extradition treaty. This occurs when the
asylum nation agrees to render the individual to the United States for
trial or deports the individual out of the country. Justice, U. S.
Marshals

Extraditions- prisoner custody Escort agents apprehend and transport
suspected terrorists to the Service and transportation United States for
prosecution once the extradition proceedings in a

foreign country are complete and the suspected terrorist is ready for
surrender.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity Law enforcement arrests and prosecutions

Justice, Criminal Division, Prosecutions Prosecutes suspected terrorists
for acts of terrorism against U. S. citizens Counterterrorism Section or
interests through the Department of Justice, Criminal Division*s

Terrorism Section.

Intelligence on terrorist groups and threat assessments

FBI, Executive Assistant Counterterrorism Division Centralizes operational
and analytical functions to combat terrorism on Director for
Counterterrorism

three fronts: (1) international terrorism operations both within the
United and Counterintelligence

States and in support of extraterritorial investigations, (2) domestic
terrorism operations, and (3) countermeasures relating to both
international and domestic terrorism. The division enhances the level of
analytical support to the counterterrorism program, increases the
capability to electronically share information and intelligence, and
creates additional field office capacity to respond to terrorist issues.
Includes the National Joint Terrorism Task Force and the *Flying Squads.*

FBI, Counterterrorism *Flying Squads* Enables agents with specific
counterterrorism knowledge to rapidly Division access knowledge and
expertise in the field to ensure it is relayed to FBI

headquarters for analysis. FBI, Counterterrorism

Information Integration Improves interagency terrorism- related
information sharing by facilitating Division Initiative the warehousing of
law enforcement and public safety agencies data in a

single secure database. Also facilitates terrorism information sharing
between the FBI and the law enforcement and public safety communities.

FBI, Counterterrorism Terrorist Financing

The Terrorist Financing Operations Section works jointly with the law
Division Operations Section enforcement and intelligence communities to
identify, investigate, disrupt,

dismantle, and prosecute as appropriate, terrorist- related financial and
fund- raising activities. According to the FBI, the Terrorist Financing
Operations Section brings the bureau*s financial expertise to bear in
identifying terrorist financing methods and movement of money into and out
of the United States in support of terrorist activity. FBI, Executive
Assistant

Counter- intelligence Division Coordinates investigative matters
concerning foreign counterintelligence, Director for Counterterrorism
including activities related to investigations into espionage, overseas
and Counterintelligence

homicide, protection of foreign officials and guests, and nuclear
extortion. The division also works with other government agencies and the
private sector to identify and protect U. S. secrets from being
compromised by foreign agents and spies. FBI, Counterintelligence

Counter- Espionage Section Manages espionage investigations and evaluates
and prioritizes all Division existing espionage cases to ensure effective
allocation of human resources and expertise. FBI, Executive Assistant

Office of Intelligence Serves as a strategic and tactical intelligence and
analytical mechanism Director for Counterterrorism

for pulling information from various sources. Also supports and
Counterintelligence

counterterrorism and counterintelligence programs through strategic and
tactical intelligence initiatives. In addition, the office ensures
intelligence within the law enforcement and intelligence communities in
cases when it is appropriate to do so.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

FBI, Counterterrorism Threat Assessment/

Assesses the potential threats existing in short- and long- term Division
Prevention Unit environments, both domestically and outside the United
States. The unit

also determines the feasibility and credibility of threat information by
comparing intelligence collected by the intelligence community with
investigative information. FBI, Counterterrorism

National Threat Warning Provides threat warning information to the law
enforcement and Division System intelligence communities. The system also
enables the FBI to

communicate threat information directly to U. S. citizens. FBI Terrorism
Watch List Serves as a single integrated listing of suspected terrorists
who are of

interest to FBI investigations. The watch list is accessible to the law
enforcement and intelligence communities. Information is derived from the
Joint Terrorism Task Force investigations, the intelligence community,
DOD, and foreign governments.

FBI, Counterterrorism Publishes annual report on

The annual report, Terrorism in the United States, is published to provide
Division, Counterterrorism

Terrorism in the United States a comprehensive picture of the security
threats that American citizens Threat Assessment and and interests have
encountered in the United States. Warning Unit

FBI, Counterintelligence Awareness of national

Serves as the public voice of the FBI for espionage, counterintelligence,
Division security issues and response counterterrorism, economic
espionage, cyber and physical infrastructure protection, and all national
security issues. It also provides unclassified national security threat
and warning information via e- mail to U. S. corporate physical and
information security directors and executives, law

enforcement, and other government agencies. FBI, Counterterrorism

National Infrastructure Serves as the focal point for interagency efforts
to warn of and respond Division Protection Center to cyber intrusions,
both in the United States and overseas. The center also gathers
information on threats to the infrastructure and provides the

principal means of facilitating the coordination of the federal
government*s response to the incident. The center*s programs have been
established in each of the FBI*s field office divisions.

FBI, Counterterrorism Information Sharing and Increases security for the
nation*s critical infrastructures through a two Division Analysis Center
way sharing of information with the private sector. The center was

established through the National Infrastructure Protection Center to
enhance private sector cooperation and trust and information sharing.

Bureau of Alcohol, Tobacco, National Firearms Tracing

Traces crime guns taken into police custody in the United States as well
Firearms and Explosives Center as U. S.- source firearms recovered in
foreign countries. The center is an effort to curb the flow of illegal
firearms. Bureau of Alcohol, Tobacco,

Transnational Intelligence In response to the terrorist attacks of
September 11, 2001, the ATF Firearms and Explosives Branch created the
Transnational Intelligence Branch to manage the classified intelligence it
received. The Department of the Treasury determines the requirements and
classifications.

RESPOND TO TERRORIST INCIDENTS ABROAD Crisis and consequence management
domestic and abroad a

FBI, Counterterrorism WMD Operations Unit Coordinates the interagency
threat assessment process and determines Division the (1) credibility of
the threat received, (2) immediate concerns involving health and safety of
the responding personnel, and (3) requisite level of

response warranted by the federal government.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

FBI Strategic Information and Serves as a focal point for information
management, coordination, and Operations Center operational support. The
center provides the facilities, information

systems, and communications equipment to support special events and crisis
operations. Also, during major crises, investigations, or special events,
the center is fully activated as a headquarters command center.

FBI, Executive Assistant Laboratory Division Provides forensic and
technical services to federal, state, and local law Director for Law
Enforcement

enforcement agencies. The division collects and conducts analysis of
Services

physical evidence ranging from biological materials to explosives. Through
its trained teams of FBI Special Agents and support personnel, it can
assist international law enforcement agencies with large- scale
investigations and disasters.

FBI, Executive Assistant Investigative Technologies Provides technical and
tactical services in support of investigators and Director for Law
Enforcement Division the intelligence community. Some of the services
provided by the division include electronic surveillance, physical
surveillance, cyber technology, and wireless radio communication. The
division also is working on developing new investigative technologies and
techniques as well as

training the agents and personnel with the new technologies. FBI,
Laboratory Division,

Mobile Crime Laboratory Provides the capability to collect and analyze a
range of evidence at the Enforcement Services crime scene. The laboratory
also has analytical instrumentation for rapid

screening and triage of explosives and other trace evidence recovered at
the crime scene. FBI, Laboratory Division,

Flyaway Laboratory Provides the capacity to rapidly respond to criminal
acts involving the Enforcement Services use of chemical or biological
agents with the mobile, self- contained lab. The laboratory allows for the
safe collection of hazardous materials, sample preparation, storage, and
analysis in a field setting.

FBI, Laboratory Division Explosives Unit Examines evidence associated with
bombings, including the identification and function of the components used
in the construction of the explosive device. The unit also performs
chemical analysis to help identify the type of explosive used in the
device.

FBI, Laboratory Division Firearms Unit Examines evidence related to
firearm and ammunition components. The division also provides support with
investigations involving the collection, preservation, and processing of
evidence at crime scenes. If needed, the unit can serve as a liaison with
international forensic laboratories.

FBI, Laboratory Division, Evidence Response Team FBI Special Agents who
specialize in conducting major evidence Enforcement Services recovery
operations. The unit is the laboratory representative to the

Critical Incident Response Group. The unit responds to crisis situations
and coordinates the mobilization of the Emergency Response Team. FBI,
Enforcement Services,

Critical Incident Response This group facilities the rapid response to and
the management Critical Incident Response

Group of crisis incidents. The group deploys investigative specialists to
Group

respond to terrorist activities, hostage taking, child abductions, and
other high- risk repetitive violent crimes.

FBI, Enforcement Services, Crisis Negotiation Unit Maintains an immediate
operational response capability to conduct and Critical Incident Response

manage on- scene negotiations during any significant crisis event in Group
which the FBI is involved. The unit deploys overseas to assist in the
management of kidnapping situations involving U. S. citizens.

(Continued From Previous Page)

Department of Justice office or bureau Program or activity Description of
program or activity

FBI, Enforcement Services, Crisis Management Unit Operationally supports
FBI field and headquarters entities during critical Critical Incident
Response

incident or major investigations. The unit conducts crisis management
Group

training and related activities for the FBI, and other international,
federal, state, and local agencies or department. It also conducts several
regional field- training exercises each year. FBI, Enforcement Services,

Rapid Deployment Logistics Coordinates administrative and logistical
matters for deploying the Rapid Critical Incident Response

Unit Deployment Team. The unit also coordinates military and commercial
Group airlift deployment requirements for the Crisis Incident Response
Group and other FBI entities. In addition, it coordinates all Rapid Start
Information Management System matters in support of major investigations
and operations.

FBI Rapid Deployment Team Provides the capability to deploy large numbers
of personnel to crime scenes in nations that are receptive to ongoing
joint investigations. The team enables the FBI to arrive on the scene with
pre- constituted investigative, administrative, and logistical support
elements needed to conduct a major investigation. The teams are designed
to be fully deployed in response to bombings of U. S. interests and are
augmented by a cadre of special agent bomb technicians. Evidence Response
Teams and security specialists also join the team.

FBI, Enforcement Services, Hostage Rescue Team Conducts rescues of U. S.
persons and others held illegally by a hostile Critical Incident Response

force, either terrorist or criminal in nature. The team is capable of
Group

performing other law enforcement activities related to dive searches,
hurricane relief operations, dignitary protection missions, and tactical
surveys. And, on occasion, the team pre- positions itself in support of
special security events.

FBI, Enforcement Services, Hazardous Materials

Provides the capability to safely and effectively respond to incidents
Laboratory Division Response Unit involving the use of hazardous
materials. The unit also develops

technical proficiency and readiness procedures for crime scene and
evidence- related operations.

Bureau of Alcohol, Tobacco, International Incident

Responds with investigative assistance and laboratory support to assist
Firearms and Explosives Response Team foreign law enforcement authorities
and governments in responding to

explosives and fire incidents. The response team was created in 1993 with
the Department of State as a result of the 1993 bombing of the U. S.
Embassy in Buenos Aires, Argentina. The response team is in a constant
state of readiness. Since 1993, it has been deployed 22 times. Source:
Departments of State, Defense, Justice, and the Treasury.

a The response to a terrorist incident involves managing the immediate
crisis as well as its consequences. *Crisis management* involves efforts
to prevent and deter a terrorist attack, protect public health and safety,
arrest terrorists, and gather evidence for criminal prosecution.
*Consequences management* involves efforts to provide medical treatment
and emergency services, evacuate people from dangerous areas, and restore
government services.

Matrix of Department of State Programs and

Appendi V I x Activities to Combat Terrorism Overseas The Department of
State is the lead federal agency for coordinating U. S. government efforts
to combat terrorism overseas. Within the department, multiple bureaus and
offices manage various programs and activities to combat terrorism abroad.
State also works with other U. S. government agencies, foreign government
agencies, and international organizations in carrying out these programs
and activities. Some of these activities directed at combating terrorism
overseas (e. g., coordination) may actually occur in the United States.

Appendix IV identifies and describes the following:  the strategic
framework of State*s efforts to combat terrorism overseas;  State*s
programs and activities to detect and prevent terrorism overseas; 
State*s programs and activities to disrupt and destroy terrorist

organizations overseas; and  State*s programs and activities to respond
to terrorist incidents

overseas.

Table 13: Department of State Programs and Activities to Combat Terrorism
Overseas Department of State office or bureau Program or activity
Description of program or activity

STRATEGIC FRAMEWORK Agency head*s role in counterterrorism

Office of the Secretary Directs State Department, the The Secretary of
State is responsible for the coordination of all U. S. lead U. S. agency
for civilian departments and agencies that provide counterterrorism
counterterrorism activities

assistance overseas. The Secretary also is responsible for the abroad

management of all U. S. bilateral and multilateral relationships intended
to promote activities to combat terrorism abroad.

Since the September 11, 2001, terrorist attacks on the United States, the
Office of the Secretary has made its counterterrorism activities a top
priority. The Office helps manage the U. S. *war on terrorism* by (1)
building the global coalition against terrorism; (2) building diplomatic

support for military operations in Afghanistan and other countries; (3)
helping coordinate intelligence to detect terrorist networks; (4) imposing
economic sanctions to reduce terrorist financing; (5) supporting
international law enforcement efforts to identify, arrest, and bring
terrorists to justice; and (6) leading multinational efforts through the
United Nations (UN) and other organizations to reduce the terrorist
threat.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Special agency official or office in charge of counterterrorism

Office of the Coordinator for Coordinates all State

Coordinates U. S. overseas counterterrorism policy and response to
Counterterrorism Department counterterrorism

international terrorist incidents that take place outside of U. S.
territory. activities and leads U. S. government efforts to improve
Engages in bilateral, multilateral, and public diplomacy to deter
terrorism

counterterrorism cooperation through a policy of making no concessions to
terrorists, prosecuting or

with foreign governments extraditing international terrorists, opposing
state- sponsored terrorism,

and curbing terrorist resources. Provides the lead in conducting
interagency bilateral counterterrorism consultation with about 20 foreign
governments and participates in multilateral negotiations and meetings.

Identifies and develops justification for the U. S. government*s biennial
designation of foreign terrorist organizations.

Chairs the State Department's terrorism task forces to coordinate
responses to major international terrorist incidents, including those that
may occur domestically. Coordinates U. S. counterterrorism research and
development, including consultations and cooperation with selected
countries.

Each U. S. ambassador Responsible for the full array See below for
descriptions of counterterrorism activities at U. S. missions. of
counterterrorism activities at each U. S. mission

Agency plans or strategies to combat terrorism

Office of the Secretary State Department*s Annual The State Department*s
2002 Annual Performance Plan highlights its Performance Plan
counterterrorism objective to *reduce international terrorist incidents,
especially against the United States.* Key goals are to (1) reduce the
number of attacks, (2) bring terrorists to justice, (3) reduce or
eliminate

state- sponsored terrorist acts, (4) delegitimize the use of terror as a
political tool, (5) enhance the international response, and (6) strengthen
international cooperation and operational capabilities to counter
terrorism.

U. S. embassies Mission Performance Plan Lists each embassy*s priorities
and includes implementation and (ambassador) budgeting plans. If
counterterrorism activities are an embassy priority,

then the plan should include specific goals and actions to counter the
threat.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

DETECT AND PREVENT TERRORISM ABROAD Military security assistance

Bureau of Political- Military Regional security and arms Supports the war
on terrorism and Operation Enduring Freedom with Affairs controls to
enhance regional

security assistance programs such as (1) foreign military financing,
stability

(2) foreign military sales, (3) International Military Education and
Training, and (4) peacekeeping operations. For Operation Enduring Freedom,
Political- Military Affairs stated that arms transfers and security
assistance policies have enhanced

cooperation with the states of the region and influenced operations in
Afghanistan. For example, arms transfers helped enhance security
cooperation with such key U. S. strategic partners as Egypt, Saudi Arabia,
Bahrain, and the United Arab Emirates.

Embassy security

Bureau of Diplomatic Responsible for providing a

Manages a broad range of programs to create and maintain the Security
secure environment for the highest appropriate levels of security possible
for more than 50, 000 conduct of American

U. S. government personnel, staff, and dependents who work and live at
diplomacy worldwide

260 embassies, consulates, and other missions overseas. Diplomatic
Security can dispatch its teams to threatened overseas missions.
Diplomatic Security activities include protection of the Secretary of
State and other high- level U. S. government officials on official
government business abroad. At each U. S. mission, the regional security
officer is responsible for implementing the Bureau*s security measures and
coordinating protection with host government authorities.

Diplomatic Security Review of standards and risk Develops, evaluates, and
applies security standards for a broad range of management categories.
These include (1) physical protection for office and residential

buildings, (2) access to communication equipment, (3) intrusion detection
devices, (4) secure conference rooms, and (5) armored vehicles. These
standards are intended to allow Diplomatic Security to identify and
address threats posed by terrorism, political violence, human
intelligence, and technical intelligence penetration of facilities.
Diplomatic Security uses these elements to target resource allocations to
identified threats at each mission or location. Diplomatic Security is
required to provide to the Congress each year a ranking of the U. S.
missions abroad most vulnerable to terrorist attack. These standards also
help target additional security funding to the highest threat missions, as
in the case of Emergency Security Supplemental and Worldwide Security
Upgrade

funds to meet the most pressing security needs. Bureau of Overseas

Embassy construction Replaces State Department*s less secure facilities on
an accelerated Buildings Operations program basis with new, secure
embassies and consulates. State has a 6- year Long- Range Overseas
Buildings Plan, which includes both new construction and the major
renovation and rehabilitation of existing facilities.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Diplomatic Security Embassy construction Participates with Overseas
Buildings Operations in developing embassy program security measures.

Develops, with other elements in State, threat assessments that it uses to
prioritize which U. S. missions are most in need of new, safer embassy
buildings. Diplomatic Security and

Worldwide Security Upgrade Provides a physically secure environment for
all U. S. government Overseas Buildings

Program personnel under the jurisdiction of the Chief of Mission.
Diplomatic Operations

Security, through the physical security program, strengthens building
exteriors, lobby entrances, and the walls and fences around embassies and
consulates. Inside an embassy or consulate, closed- circuit television
monitors, explosive- detection devices, walk- through metal detectors, and
hard- line walls and security doors provide protection. Diplomatic
Security and Overseas Buildings Operations have joint responsibility for
this program.

Diplomatic Security Residential security Provides for security upgrades to
the residences of U. S. employees assigned to overseas diplomatic and
consular missions. Prior to occupancy, all newly acquired residential
facilities are equipped with appropriate security features, such as locks,
alarms, shatter- resistant window film, and reinforced doors, based on the
level of the threats to be addressed. Diplomatic Security Overseas
Protection of Implements a comprehensive set of information protection
programs.

Information These programs are intended to protect national security
information discussed at meetings in secure conference rooms or on secure
telephones, processed and stored on computers, and preserved and

communicated on paper documents. This program includes (1) personnel
investigations for security clearances, (2) courier protection for
diplomatic pouches, (3) construction security and access control
equipment, (4) U. S. Marine security guards controlling access to
embassies at 130 U. S. missions overseas, (5) locks for containers holding
classified material,

(6) secure conference rooms, (7) detection and containment of emanations
from processing equipment, (8) counterintelligence investigations and
briefings, and (9) computer security.

Diplomatic Security Surveillance Detection Utilizes plainclothes security
agents to provide surveillance detection Program measures around U. S.
embassies, consulates, and residences of

embassy employees. The program is used to identity suspicious activity,
such as terrorists* *casing* of embassy facilities or personnel, and
includes capabilities intended to resolve all suspicious activity.

Diplomatic Security Local Guard Services Augments host government
resources for protecting overseas diplomatic and consular office
facilities and residences of U. S. government employees and dependents of
all agencies under the Chief of Mission.

Diplomatic Security Overseas Protective Vehicles Provides light and heavy
armor vehicles to protect embassy personnel. One hundred percent of the
Chief of Mission vehicles have been ordered and are in the armoring phase,
with 94 percent delivered to missions.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Diplomatic Security Security Liaison Officers Provides Security Officers
to selected DOD Unified Commands (U. S. Central Command, MacDill Air Force
Base, Florida; U. S. European Command, Stuttgart- Vaihingen, Germany; and
U. S. Pacific Command, Camp H. M. Smith, Hawaii). These officers
coordinate with the commands on theater threat assessments, contingency
planning, and implementation of Department of State and Department of
Defense

(DOD) agreements on overseas security support.

Warnings to and information- sharing with Americans abroad

Bureau of Consular Affairs Travel warnings, public Ensures that important
threat warnings and security information reach announcements, and

U. S. citizens and assets abroad in a timely and effective manner.
Consular Information Sheets

In 2001, Consular Affairs issued 64 travel warnings, 134 public
announcements, and 189 Consular Information Sheets. Consular Affairs*
Internet Web site received 117.9 million inquiries, 30.7 million more than
in fiscal year 2000. According to Consular Affairs data, 90 percent of the
users found the information helpful. Consular Affairs also held 69
briefings for stakeholder groups, including international student program
participants, travel agents, and others.

Consular Affairs Warden system for notifying Notifies Americans who have
registered with the U. S. embassy or registered Americans of

consulate of potential terrorist threats. Warden networks consist of
threats

telephone- calling trees, e- mails, fax systems, and other systems, as
appropriate. The warden system covers both U. S. embassy and consulate
personnel and other registered Americans. The system usually works by
alerting major employers or compounds with high concentrations of
Americans. It is used for a variety of communications purposes, from
passing out voter information to notifying wardens and their wards of U.
S. embassy evacuations.

Diplomatic Security Overseas Security Advisory Provides security support
to U. S. businesses and private- sector Council organizations worldwide
through Overseas Security Advisory Councils.

A joint effort between State and the private sector, Overseas Security
Advisory Councils foster the exchange of security and threat information
and implementation of security programs and provides a forum to address
security concerns. Regional security officers coordinate with Overseas
Security Advisory Council headquarters to set up, develop, and maintain
councils in country. Overseas Security Advisory Councils

coordinate with U. S. embassies and are active in 47 countries.

Law enforcement training (with foreign governments)

Diplomatic Security Antiterrorism Assistance Provides training to approved
foreign national participants in five areas: law enforcement, protection
of national leadership, control of borders, protection of critical
infrastructure, and crisis management. Antiterrorism

Assistance has trained 28, 000 foreign national participants from 124
countries since its inception. Diplomatic Security Antiterrorism
Assistance*s Antiterrorism Assistance proposes to build the Center for
Antiterrorism proposed Center for

and Security Training, a consolidated facility for training in various
Antiterrorism and Security

antiterrorism disciplines. Training

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Diplomatic Security Antiterrorism Assistance*s Provides quick in- country
training to allied nations. Mobile Emergency Training Team

Bureau for International International Law

Provides law enforcement to foreign governments. International Narcotics
Narcotics and Law

Enforcement Academy and Law Enforcement Affairs manages the U. S.
government*s Enforcement Affairs interagency regional International Law
Enforcement Academies (Budapest, Hungary; Bangkok, Thailand; Gaborone,
Botswana; and Roswell, New Mexico), in conjunction with the Departments of
the Treasury and Justice, including the FBI. In fiscal year 2003,
International Narcotics and Law Enforcement Affairs is scheduled to
provide law enforcement training to 12,000 officials, doubling the number
trained in fiscal year 2001.

International Narcotics and Law enforcement and police Provides training
and technical assistance to foreign law enforcement Law Enforcement
Affairs science personnel to combat crime and advance U. S. interests in
international

counterterrorism cooperation. Law enforcement and police science training
is managed and funded by International Narcotics and Law Enforcement
Affairs and carried out by the Departments of Justice and the Treasury,
among other federal agencies. The International Criminal Investigative
Training Assistance Program (ICITAP) and the Office of Overseas
Prosecutorial Development and Training are examples of these types of
programs.

Office of the Coordinator for Countering terrorist financing Provides,
with the Departments of Justice and the Treasury, training and
Counterterrorism and

assistance to foreign governments to strengthen their financial and
International Narcotics and

regulatory regimes to reduce terrorist financing. Law Enforcement Affairs

Border security (including visa processing issues)

Consular Affairs Visas Processes applications for visas from foreign
citizens who wish to visit the United States. Consular Affairs is to
facilitate travel for those eligible to receive visas and to deny visas to
those who are ineligible. A visa enables

a person to apply at a port of entry to enter the United States, but it
does not guarantee that a person will be able to enter the United States.

Consular Affairs Consular Consolidated Supports the antiterrorist task
forces since September 11, 2001. In fiscal Database (visa data, including
year 2002, Consular Affairs performed numerous searches of visa
photographs)

records and photographs at the request of federal law enforcement task
forces investigating the terrorist attacks. In addition, Passport Services
provided law enforcement with 305 records. Consular Affairs used facial
recognition software to compare the photographs on the visa applications
of the September 11 hijackers in the database against other visa
photographs. According to State, the review found no evidence that

the hijackers had applied for visas using different names. Bureau of
Intelligence and

TIPOFF program Manages the TIPOFF program, a database of sensitive
intelligence Research and law enforcement information contributed by the
Central Intelligence

Agency (CIA), National Security Agency, and the FBI. TIPOFF contains
information on some 68, 000 suspected terrorists and international
organized crime figures. TIPOFF alerts consular officers at U. S.
embassies and INS officers at ports of entry when potential

terrorists try to enter the United States.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Consular Affairs/ Visa TIPOFF to impede terrorist Uses TIPOFF in the visa
program to identify and stop potential terrorists Services entry into the
United States trying to enter the United States. In fiscal year 2001,
Consular Affairs

indicated that there had been 178 TIPOFF matches for visa applicants; of
those, 81 were denied, 14 abandoned their applications, and 4 withdrew
their applications. TIPOFF, used by the INS, yielded 86 matches from the
terrorism database at ports of entry in fiscal year 2001. Of these, 38 of

the individuals were denied entry, and 1 was arrested. Diplomatic Security
Investigation of visa and

Impedes terrorist entry into the United States. Diplomatic Security
passport fraud investigates more than 3,500 passport and visa fraud cases
annually,

resulting in more than 500 arrests each year. A number of suspects have
been linked to terrorism. Diplomatic Security has 450 special agents in
over 160 countries and approximately 700 special agents assigned
throughout the United States. Office of the Coordinator for

Terrorist Interdiction Program Enhances border security by providing
participating foreign governments Counterterrorism with a computerized
database that allows border control officials to identify and detain or
track individuals of interest. The Terrorist

Interdiction Program currently is installed in 2 foreign countries, with
another 60 countries under consideration. The Program is scheduled to be
installed in up to five new countries per year.

Office of the Inspector Investigation of visa and

Conducts visa and passport investigations. The Office of the Inspector
General passport fraud General conducted several joint investigations with
the INS in fiscal year

2001. In one case, the Office found that defendants took in $21 million by
defrauding the visa program.

Public Diplomacy

Office of International Build international support for

Influence international opinion in support of U. S. foreign policy
objectives. Information Programs U. S. foreign policy Since the September
11, 2001, terrorist attacks, the Office of

International Information Programs has encouraged international support
for the war on terrorism. For example, its initiatives have generated over
240 newspaper, 100 radio, and 150 television interviews, and over 300
opinion- editorial articles in newspapers either signed or prepared for
ambassadors. Almost 60 U. S. speakers have traveled abroad on Office of
International Information Programs- funded programs addressing September
11- related issues. U. S. embassies have sponsored over

100 panel discussions and over 220 speeches on the issue. In addition,
Network of Terrorism, an Office of International Information Programs-
produced print and electronic pamphlet, is available in 36 languages, and
1.3 million print copies are in circulation.

DISRUPT AND DESTROY TERRORIST ORGANIZATIONS ABROAD Military operations

Political- Military Affairs State*s primary liaison with the Facilitates
Defense- State actions concerning military operations. Department of
Defense

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Political- Military Affairs Supporting U. S. military war Assists in
developing and maintaining the global military coalition against on
terrorism terrorism and serves as main point of contact for coalition
matters.

Assists in negotiating with foreign governments for deployment orders,
requests for coalition forces, fly- over rights, and bed- down rights.
Between September 11, 2001, and the end of January 2002, PoliticalMilitary
Affairs processed 120 deployment orders and 72 requests for coalition
forces in support of Operation Enduring Freedom in Afghanistan.

Political- Military Affairs Political Advisor to U. S. Political- Military
Affairs provides personnel to DOD and the principal regional military
commands military commands to improve cooperation between State and the U.
S. military. For example, the Political Advisor at the U. S. Central
Command

provides liaison services between State, the command, and the
representatives of the 31 nations located at U. S. Central Command
headquarters that provide assets for Operation Enduring Freedom.

International relations

Office of the Secretary Worldwide diplomatic support Received offers of
military assistance for the war on terrorism from for war on terrorism and

136 countries. Operation Enduring Freedom

Secured over- flight rights from 89 countries. Secured landing rights for
U. S. military aircraft from 76 countries. Secured NATO support to invoke
article V of the NATO charter, which states that an attack on one is an
attack on all.

Developed new U. S. relationships with key countries against terrorism. U.
S. embassies Bilateral diplomatic support for

Implements the above activities of the Office of the Secretary, in support
(ambassador) war on terrorism and of the war on terrorism and Operation
Enduring Freedom.

Operation Enduring Freedom

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Bureau of International Works with international Develops and implements
U. S. counterterrorism policy in the UN and Organization Affairs
organizations on other international organizations, serving as State*s
primary liaison. counterterrorism issues

Helped craft and aided in the adoption of United Nations Security Council
Resolution (UNSCR) 1373, obligating all member nations to fight terrorism
and report to the Security Council on their counterterrorism efforts.

Assisted in the creation of a UN Counterterrorism Committee to oversee the
implementation of UNSCR 1373. Through bilateral and multilateral efforts,
International Organization Affairs encourages all nations to comply with
UNSCR 1373 and has offered the services of the U. S. government to other
nations to aid in their compliance.

Assisted with resolutions extending UN sanctions on (1) al Qaeda and the
Taliban, (2) Iraq (including gaining passage of new *smart sanctions*),
(3) Libya, and (4) certain African regimes, including those whose
activities benefit terrorists.

Assisted in the lifting of UN sanctions on Sudan, which has cooperated
with the international community and the United States in its war on
terrorism.

Aided in the UN International Atomic Energy Association*s reevaluation of
its response to the threat of nuclear terrorism. Assisted in the UN
International Civil Aviation Organization*s passing an antiterrorism
resolution. Office of the Coordinator for

Reduce the flow of money and Blocks terrorism- related financing. The
Office of the Coordinator for Counterterrorism,

other material support to Counterterrorism, with the concurrence of the
Departments of Justice International Narcotics and

terrorists. and the Treasury, designates foreign terrorist organizations,
individuals, Law Enforcement Affairs, and and groups for a variety of
purposes, including to block terrorism- related the Economic Bureau, in
financing. The Economic Bureau is responsible for leading the effort to
coordination with the build international coalition support to also block
these assets. According Department of the Treasury

to State, since September 11, 2001, the United States has blocked and
other agencies $34.3 million in terrorist- related assets.

Office of the Legal Adviser Negotiates international Pursues extradition
and mutual legal assistance treaties with foreign agreements governments
and works with the UN and with other nations in drafting multilateral
agreements, treaties, and conventions on counterterrorism. Office of the
Legal Adviser Works with Department of

Works closely with the Department of Justice*s Office of International
Justice on international law

Affairs on specific cases and on building consensus on broad enforcement
issues international counterterrorism and crime issues.

Office of the Legal Adviser Drafts U. S. counterterrorism The Office of
the Legal Adviser works with the Office of the Coordinator related
legislation for Counterterrorism, the Economic Bureau, and the Department
of Justice when U. S. legislation is needed to combat terrorism abroad.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Law enforcement

Diplomatic Security and Law enforcement cooperation Cooperates with local
intelligence, security, and law enforcement entities Regional Security
Officer to track and capture terrorists in country and to block attempted
terrorist

attacks on U. S. citizens and U. S. assets abroad. Diplomatic Security
Investigations of terrorist

Conducts investigations of terrorist incidents involving U. S. diplomatic
incidents personnel and other persons under its protection. These
investigations are conducted for the purpose of preventing or deterring
future incidents. Diplomatic Security supports the FBI in its extra-
territorial investigations into the criminal prosecution of the
perpetrators.

Office of the Coordinator for Coordinates State*s role in Captures
suspected terrorists overseas. In cases where the United Counterterrorism
negotiating and conducting

States lacks an extradition treaty, the U. S. government can capture
renditions

suspected terrorists through an overseas arrest called a rendition. The
Office of the Coordinator for Counterterrorism, in conjunction with the
Office of the Legal Adviser, the Department of Justice, and other
agencies, would coordinate State*s role in negotiating and conducting
these arrests. Since 1987, there have been 11 reported renditions.

Diplomatic Security Rewards for Justice Program Provides payments for
information leading to the arrest and prosecution of individuals involved
in international terrorism and for information that thwarts a terrorist
attack. Rewards have been offered for terrorists involved in the September
11, 2001, terrorist attacks, the African embassy bombings, and the USS
Cole bombing. The program awards payments of up to $25 million for this
information. In fiscal year 2001, State spent $113,000 for cases
concerning terrorist acts, $1. 7 million for cases concerning narcotics
traffickers, and $14,000 for cases concerning war crimes. In the past 7
years, the United States has paid over $9. 5 million to 23 individuals who
provided credible information leading to the arrest of international
terrorists.

Intelligence on terrorist groups and threat assessments

Intelligence and Research Intelligence support for Prepares intelligence
reports for the Secretary of State, department Secretary of State and for
U. S. officials, and ambassadors at U. S. missions. Monitors
governmentwide missions

intelligence activities to ensure their compatibility with U. S.
counterterrorism foreign policy objectives. Seeks to expand interagency
data sharing on known terrorist suspects. Intelligence and Research
Intelligence assessments and Conducted the first public opinion survey
inside Taliban- controlled policy guidance Afghanistan to determine public
reaction to the Taliban government.

Results were used in U. S. counterterrorism briefings to State, the NSC,
the CIA, DOD, and U. S. Central Command officials. Conducted *flash
surveys* immediately after September 11, 2001, in Syria, Jordan, Lebanon,
the United Arab Emirates, Saudi Arabia, Kuwait, and the Palestinian
Authority to gauge Arab public reaction to the attacks on the United
States and public perceptions of Osama bin Laden for use in policy
formulation.

Intelligence and Research Electronic Read- and- Burn Provides intelligence
products, especially threat information, to chiefs of Pilot Project
mission who could not previously receive this type of highly classified

material.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Office of the Coordinator for Studies terrorist groups

Publishes an unclassified report called Patterns of Global Terrorism, as

Counterterrorism worldwide called for under 22, U. S. C. S: 2656f (a).

Diplomatic Security Publishes annual security The annual reports,
Significant Incidents of Political Violence against

reports Americans and Terrorist Tactics and Security Practices: Lessons
Learned, and Issues in Global Crime, are intended to provide a
comprehensive picture of the broad spectrum of political violence and
security threats to American citizens and interests abroad.

Diplomatic Security and Threat and intelligence

Interacts with police and intelligence contacts in other countries. A
Regional Security Officer assessments mission*s regional security officer
often is the first to recognize, through

investigative work, possible terrorist activities. Diplomatic Security
agents frequently are requested to follow up on leads for other law
enforcement agencies not represented at the mission. Intelligence
information sharing (with foreign governments) Diplomatic Security and

Information sharing and Cooperates with foreign governments and their law
enforcement and Regional Security Officer cooperation with host country

security forces in sharing threat and security information. governments

Conducts extensive liaison with foreign police and security and
intelligence services, which allows regional security officers to assist
other U. S. government law enforcement agencies. Such activities include
criminal record checks, tracing fugitives, interviewing informants and
suspects, and processing extradition requests.

RESPOND TO TERRORIST INCIDENTS ABROAD Crisis and consequence management
domestic and abroad a

Office of the Coordinator for Headquarters leadership of Serves as the
lead for crisis and consequence management in directing Counterterrorism
the U. S. government response

the U. S. government response to a terrorist incident overseas. The Office
to a terrorist incident overseas

of the Coordinator for Counterterrorism would lead a task force and work
through the State Department Operations Center (discussed below). State
Department

Headquarters task force for State*s Operations Center maintains a 24- hour
global watch and crisis Operations Center coordinating the U. S.
management support staff. The watch is the initial point of contact for
government response to a

posts experiencing emergency crises, including terrorist attacks. In a
terrorist incident overseas

crisis, the Operations Center would establish a 24- hour task force to
coordinate the flow of communications and instructions between the
Department of State, other involved agencies, overseas posts, and foreign
governments. This task force would be led by the Office of the Coordinator
for Counterterrorism and, in addition to relevant State

Department bureaus, may include other U. S. government agencies with
action responsibilities.

U. S. embassies Serves as the U. S. In a given country, the ambassador
would act as the on- scene (ambassador) government on- scene coordinator
in a terrorist incident. The ambassador would lead the coordinator for
terrorist

Emergency Action Committee to manage the response. The ambassador
incidents overseas

could request a Foreign Emergency Support Team (discussed below) for
assistance and to help coordinate the U. S. government*s interagency
response.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Office of the Coordinator for Foreign Emergency Support

In coordination with the NSC, the Office of the Coordinator for
Counterterrorism Team to provide on- scene

Counterterrorism would lead an interagency Foreign Emergency Support
support Team to assist the ambassador and host government to manage a
terrorist incident. The team is advisory and will not enter the host
country unless requested by the ambassador, with the host government*s
permission. The team provides the ambassador a single point of contact

to coordinate all U. S. government on- scene support during a terrorist
incident. Each team is tailored to the specific incident and can provide
guidance on terrorist policy and incident management, dedicated secure
communications, and special expertise.

Diplomatic Security Special Diplomatic Security Deploys its Mobile Support
Teams and Security Support Teams to teams to assist and

respond to increased threats or critical security needs at U. S. missions
in investigate crisis situations crisis, including providing special
training or draw down/ evacuation assistance. These teams provide
supplemental support to regional security officers and stand ready for
immediate deployment to any U. S. mission where conditions require the
reestablishment of a secure environment.

Political- Military Affairs Consequence Serves as the lead for consequence
management in directing the U. S. management; Consequence government
response to a terrorist incident outside of U. S. territory. The
Management Support Team

U. S. government provides assistance overseas when a U. S. ambassador has
determined that the host government is unable to cope with a problem, when
the host government seeks U. S. assistance, and when it is in the U. S.
interest to provide such assistance.

Provides a standing Consequence Management Support Team designed to help
manage the consequence of a WMD emergency overseas. The multi- agency team
is tailored to manage the specific emergency situation or conditions of
the host nation. The team coordinates and facilitates the flow of critical
requirements and information necessary to respond, advise, and assist
foreign government and U. S. decision makers. The team would deploy as an
integral part of FEST operations and would take the lead for the
consequence management response.

Overseas Buildings Emergency Response Team Helps secure embassy grounds
and restore communications following a Operations crisis. Consular Affairs
Medical needs Assists American victims with medical needs. Also, assists
in the process

of identifying victim remains, notifying the next of kin, and shipping
home the remains.

Consular Affairs Liaison with U. S. citizens Provides assistance for
Americans stranded overseas by the closure of under duress U. S. air
space. Consular Affairs Liaison with foreign nationals

Provided assistance to New York City officials handling the deaths of in
the United States foreign nationals in the September 11, 2001, terrorist
attack on the World Trade Center. Works with the Department of Justice to
address foreign embassy concerns regarding the large number of aliens
detained on a variety of charges as part of the war on terrorism.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

Planning and exercises at headquarters and abroad

Office of the Coordinator for Counterterrorism Security Manages the
interagency exercise program for combating terrorism Counterterrorism
Group, Exercise and

overseas and coordinates these exercises with other departments. The
Readiness Subgroup

exercise program is designed to strengthen the U. S. government*s ability
to deal with terrorist attacks.

Office of the Coordinator for International Senior Officials

Conducts Senior Policy Workshops with friendly foreign governments.
Counterterrorism Workshops These workshops are generally tabletop
simulations with no actual physical deployment of troops. Coordinates
training programs to help other countries develop and coordinate responses
to a WMD event.

Political- Military Affairs Contingency planning Has responsibility for
preparing U. S. forces, foreign governments, and international
organizations to manage the consequences of a chemical, biological,
radiological, or nuclear incident overseas.

Political- Military Affairs Consequence management Sponsors consequence
management exercises, in conjunction with other exercises U. S. government
agencies. Exercises can be directed at select

department and agency components, for example, regional military commands,
the Centers for Disease Control and Prevention, or partner nations.

Diplomatic Security Emergency Planning Serves as a consolidated source of
guidance for overseas missions on Handbook how to plan for and deal with
emergencies abroad. The handbook is used as the principal reference when a
mission prepares its Emergency Action Plan. U. S. embassies Emergency
Action Committee Every foreign service mission is required to have an
Emergency Action

Committee. In organizing for emergency action, the Chief of Mission
establishes a committee and designates personnel responsible for specific
crisis- related functions. The Emergency Action Committee is responsible
for developing and testing the mission*s Emergency Action Plan.

U. S. embassies Emergency Action Plan Every foreign service mission
requires an Emergency Action Plan, which is written by members of the
Emergency Action Committee and provides mission- specific procedures for
responding to terrorist and other crises. The plan translates worldwide
guidance for dealing with emergencies into a mission- specific action
plan.

Foreign Service Institute Emergency Action Committee Trains Emergency
Action Committee members in their emergency action exercises plan using
various scenarios. Exercises are designed to expose mission officials to
issues of decision- making, contingency planning, implementation of plans,
and interpretation and coordination of policy.

Deputy Chief of Mission and Emergency Action Committee/

Tests its Emergency Action Plan to prepare for management of crises,
Regional Security Officer Emergency Action Plan including terrorist
attacks. The Emergency Action Committee at each

exercises mission is responsible for periodic drills, including their
preparation, execution, and evaluation.

(Continued From Previous Page)

Department of State office or bureau Program or activity Description of
program or activity

U. S. embassies Plans and coordinates The Secretary of State is
responsible for the protection and evacuation of (ambassador) evacuations
and military

U. S. citizens. In a crisis such as a terrorist incident, an ambassador
can noncombatant evacuation order the evacuation of U. S. government
personnel and dependents. The operations

preferred method of evacuation is through normal commercial transportation
or commercial charter. However, to assist State in some cases, DOD may
execute military Noncombatant Evacuation Operations. Ambassadors can
request the assistance of the appropriate unified military command to
assist planning such operations. State, and in urgent cases the
ambassador, will make the determination as to when such evacuation plans
should be implemented.

Alternative command centers

Office of the Secretary Alternate operations center Transformed State's
Alternate Operations Center from a part- time facility to a full- time
alternate site to carry out critical State functions.

Overseas Buildings Alternate operations centers Maintains an alternate
operations center for its headquarters operations Operations and maintains
facilities or the ability to establish alternate operations

centers for its overseas U. S. mission operations. Post- incident law
enforcement investigation U. S. embassies Point of contact during any

Serves as the point of contact for any post- incident law enforcement
(ambassador) investigation investigation. The ambassador would serve as
the official liaison between

the host country government and the U. S. government investigation.
Source: Departments of State, Defense, Justice, and the Treasury.

a The response to a terrorist incident involves managing the immediate
crisis as well as its consequences. *Crisis management* involves efforts
to prevent and deter a terrorist attack, protect public health and safety,
arrest terrorists, and gather evidence for criminal prosecution.
*Consequences management* involves efforts to provide medical treatment
and emergency services, evacuate people from dangerous areas, and restore
government services.

Matrix of Department of the Treasury Programs and Activities to Combat
Terrorism

Appendi V x Overseas The Department of the Treasury supports the
Department of State, which is the lead federal agency for coordinating U.
S. government efforts to combat terrorism overseas. Within the department,
multiple bureaus, offices, and agencies manage various programs and
activities to combat terrorism abroad. The Treasury also works with other
U. S. government agencies,

foreign government organizations and agencies, and international
organizations in carrying out these programs and activities. While these
activities are generally directed at combating terrorism overseas, some of
the activities (e. g., coordination) may actually occur in the United
States.

Appendix V identifies and describes:  the strategic framework of the
Treasury*s efforts to combat terrorism

overseas;  Treasury*s programs and activities to detect and prevent
terrorism overseas;

 Treasury*s programs and activities to disrupt and destroy terrorist
organizations overseas; and

 Treasury*s programs and activities to respond to terrorist incidents
overseas.

Tabl e 14: Department of the Treasury Programs and Activities to Combat
Terrorism Overseas Department of the Treasury office or bureau Program or
activity Description of program or activity

STRATEGIC FRAMEWORK Agency head*s role in counterterrorism

Office of the Secretary of the The Secretary of the The Secretary of the
Treasury plays a critical role in policy- making by Tr ea s ur y Treasury
is the principal bringing an economic and government financial policy
perspective to economic advisor to the

issues facing the government. Among other duties, the Secretary is
President

responsible for overseeing the department*s activities in carrying out its
major law enforcement responsibilities, including (1) preventing money
laundering, (2) disrupting and dismantling terrorist organizations*
financial support, and (3) investigating and freezing terrorists*
financial assets.

The Secretary also has a support role to the Department of State during a
terrorist incident overseas.

(Continued From Previous Page)

Department of the Treasury office or bureau Program or activity
Description of program or activity

Special agency official or office in charge of counterterrorism Agency
plans or strategies to combat terrorism

Department of the Treasury National Money Laundering

The strategy includes, for the first time, a comprehensive national plan
to

Strategy, jointly issued by the attack the financing of terrorist groups.
Goal 2 of the National Money

Secretary of the Treasury Laundering Strategy focuses law enforcement and
regulatory resources on and the Attorney General in identifying terrorist
financing networks by (1) implementing a multi- pronged July 2002

operational strategy to combat terrorist financing, (2) identifying and
targeting the methods used by terrorists financiers, and (3) improving
international efforts to dismantle terrorist financial networks. The
strategy is

an interagency plan that draws on the expertise and resources of the
Departments of the Treasury and Justice, and other federal agencies as
well as foreign partners and the private sector.

DETECT AND PREVENT TERRORISM ABROAD Diplomacy

Treasury, Office of Maintain international The Office of International
Affairs works bilaterally and multilaterally to build International
Affairs coalition against terrorist

and maintain the international coalition against terrorist finances along
with finances

other federal agencies, including the Departments of State and Justice,
the Federal Bureau of Investigation (FBI), and the intelligence community.

Treasury, Office of Financial Action Task Force Consists of an
international group of 31 member- states, which focuses on International
Affairs on Money Laundering terrorist financing. The task force provides
its members with an action plan that includes eight special
recommendations, which are viewed as a standard to address terrorist
financing. Treasury, Office of Task Force on Terrorist

Works with countries and monitors their efforts to track and block
terrorists' International Affairs Financing financial assets. This task
force, established by the Department of the

Treasury in the wake of the terrorist attacks on September 11, 2001, is
composed of international economists and financial analysts from the
International Affairs and Enforcement's Office of Foreign Asset Control.
The department enlisted support from ministries of finance and central
banks worldwide to assist efforts to immobilize and/ or confiscate the

financial assets of terrorist organizations and deny such organizations
use of the international banking system.

Treasury, Office of Financial Attaches Develop extensive contacts with
foreign finance ministries, foreign International Affairs regulatory
authorities, central banks and financial market participants. Financial
Attaches explain new U. S. policies to their foreign counterparts. They
also collect, report, interpret, and forecast macroeconomic and financial
developments and policies in their assigned countries.

(Continued From Previous Page)

Department of the Treasury office or bureau Program or activity
Description of program or activity

Prevent undermining of economic reforms

Treasury, Office of Office of Technical Provides specialist teams to
countries through an advisor- based program International Affairs
Assistance/ Enforcement

to help prevent corruption, organized criminal enterprises, and other
Policy and Administration

criminal activities that were undermining Treasury*s economic reforms.
Program

Law enforcement training (with foreign governments) DISRUPT AND DESTROY
TERRORIST ORGANIZATIONS ABROAD Identifying, freezing, and seizing
terrorist organizations* assets

Tr easury Executive Office for Terrorist This office was created in March
2003 and assumed the main Financing and Financial

functions of the former Office of Enforcement. The office is Crimes

charged with coordinating Treasury Department*s efforts to combat
terrorist financing both in the United States and abroad. The office is
responsible for the following specific duties: (1) developing and
implementing U. S. government strategies to combat terrorist financing
domestically and internationally, (2) developing and implementing the
National Money Laundering Strategy, (3) participating in the department*s
development and implementation of U. S. government policies and
regulations in support of the USA PATRIOT Act, (4) joining in
representation of the United States in international bodies dedicated to
fighting terrorist financing, and (5) developing U. S. government policies

related to financial crimes. Tr easury Financial Crimes Supports law
enforcement investigations to prevent and detect money

Enforcement Network laundering and other financial crimes. FinCEN*s
network links law enforcement, financial, and regulatory communities into
a single information- sharing network. Using Bank Secrecy Act information
reported by banks and other financial institutions, FinCEN serves as the
national*s central clearinghouse for broad- based financial intelligence
and information

sharing on money laundering. This information helps illuminate the
financial trail for investigators to follow as they track criminals and
their assets.

Through investigative analysis efforts, FinCEN provides support for the
investigation and prosecution of law enforcement cases at the federal,
state, local, and international levels, using financial data collected
under the Bank Secrecy Act, as well as other commercial and law
enforcement information. FinCEN serves as a catalyst for research,
analysis, and dissemination of information on money laundering methods and
trends through joint case analysis with law enforcement, integration of
all source information, and the application of state- of- art data
processing techniques. Internationally, FinCEN maintains in- depth,
country- specific expertise concerning money laundering and other
financial crimes around the world to assist decision makers in developing
and promoting U. S. government anti- money laundering policies. FinCEN
uses this expertise to promote the development of Financial Intelligence
Units in other countries, which facilitate investigative exchanges.

(Continued From Previous Page)

Department of the Treasury office or bureau Program or activity
Description of program or activity

Treasury, Office of Foreign Administers Economic

This office administers economic sanctions and embargo programs against
Assets Control Sanctions specific foreign countries or groups (including
designated terrorists, terrorist organizations, state sponsors and
individuals supporting those

organizations) to further U. S. foreign policy and national security
objectives. The office imposes control on financial transactions and
freezes foreign assets, denying the targeted country, individual, or
organization.

RESPOND TO TERRORIST INCIDENTS ABROAD Crisis and consequence management
domestic and abroad a

Tr ea s ur y Counter- terrorism Fund In its fiscal year 2003 budget, the
Department of the Treasury proposed that $40 million remain available
until expended to reimburse any federal agency for costs of responding to
the U. S. Secret Service*s request to provide security at designated
National Special Security Events and only be provided after notice to
appropriate congressional committees. The proposed $40 million would (1)
provide support to counter, investigate, or prosecute domestic or
international terrorism, including payment of rewards in connection with
these activities and (2) re- establish the operational capability of an
office, facility or other property damaged or destroyed as a result of any
domestic or international terrorist incident. Treasury bureaus have
important counterterrorism responsibilities, including (1) protecting the
President; (2) designing and implementing security at National Special
Security Events; (3) investigating arson,

explosives, and firearms incidents; (4) conducting financial
investigations relating to terrorism; (5) preventing weapons of mass
destruction from entering the United States; and (6) implementing
sanctions against terrorist

organizations. Source: Department of the Treasury.

a The response to a terrorist incident involves managing the immediate
crisis as well as its consequences. *Crisis management* involves efforts
to prevent and deter a terrorist attack, protect public health and safety,
arrest terrorists, and gather evidence for criminal prosecution.
*Consequences management* involves efforts to provide medical treatment
and emergency services, evacuate people from dangerous areas, and restore
government services.

United Nations Protocols, Conventions, and

Appendi VI x Resolutions Related to Terrorism This appendix is a
representative list of United Nations (UN) documents related to combating
terrorism overseas. The Department of State works with international
organizations, such as the United Nations, to enhance multilateral support
to disrupt and destroy terrorists and their organizations. The United
Nations and its member states established a broad array of resolutions and
conventions to create a multilateral framework for combating international
terrorism. This UN- based multilateral framework falls into three broad
categories of documents or agreements: (1) UN conventions or protocols
related to terrorism, (2) UN Security Council Resolutions, and (3) UN
General Assembly Resolutions. The following conventions, protocols and
resolutions were identified by the United Nations as related to terrorism.
According to the Department of State, the United States is a party to all
12 international conventions and protocols relating to terrorism.

Table 15: UN Conventions and Protocols Related to Terrorism UN convention
or protocol Purpose

International Convention for the Suppression of the Financing of Commits
member states to prevention and counteraction of the Terrorism, New York

financing of terrorists; holds those who finance terrorists liable; and
Dec. 9, 1999

provides for the identification, freezing and seizure of funds for
terrorist activities.

International Convention for the Suppression of Terrorist Creates a regime
of universal jurisdiction over the use of explosives Bombings, New York
and other lethal devices. Dec. 15, 1997

Convention on the Marking of Plastic Explosives for the Purpose Combats
aircraft sabotage. Designed to control and limit the use of of Detection,
Montreal

undetectable plastic explosives. Mar. 1, 1991

Protocol for the Suppression of Unlawful Acts Against the Safety Obligates
member states to establish jurisdiction over unlawful acts of Fixed
Platforms located on the Continental Shelf, Rome

and punish offences with appropriate penalties. Mar. 10, 1988

Convention for the Suppression of Unlawful Acts Against the Establishes a
legal regime applicable to acts against international Safety of Maritime
Navigation, Rome maritime navigation. Makes it an offence for a person to
unlawfully and Mar. 10, 1988 intentionally seize or exercise control over
a ship by force.

Protocol for the Suppression of Unlawful Acts of Violence at Extends
provisions of the Montreal Convention to include terrorist acts Airports
Serving International Civil Aviation, supplementary to at international
airports. the Convention for the Suppression of Unlawful Acts Against the
Safety of Civil Aviation, Montreal Feb. 24, 1988

Convention on the Physical Protection of Nuclear Material, Criminalizes
the unlawful possession, use, transfer, of nuclear Vienna

material, the theft of nuclear material, and threats to use nuclear Mar.
3, 1980

material to cause death or serious injury.

(Continued From Previous Page)

UN convention or protocol Purpose

International Convention Against the Taking of Hostages, New Defines the
taking of hostages and requires state parties to make this York

offense punishable by appropriate penalties. Dec. 17, 1979

Convention on the Prevention and Punishment of Crimes Against Defines
internationally protected persons; requires appropriate Internationally
Protected Persons, including Diplomatic Agents,

penalties for those who commit attacks against internationally New York

protected persons and for those who support them. Dec. 14, 1973

Convention for the Suppression of Unlawful Acts Against the Outlaws acts
of violence on aircraft, placement of explosives on Safety of Civil
Aviation, Montreal

aircraft, and supporting those who attempt such acts. Sept. 23, 1971

Convention for the Suppression of Unlawful Seizure of Aircraft, Outlaws
the use of intimidation to take control of aircraft; hijackers The Hague
must be prosecuted or extradited. Dec. 16, 1970

Convention on Offences and Certain Other Acts Committed on Applies to acts
affecting in- flight safety; authorizes pilot to take Board Aircraft,
Tokyo measures to protect aircraft; requires contracting states to take
Sept. 14, 1963 custody of offenders and return aircraft to pilot. Source:
United Nations.

Table 16: UN Security Council Resolutions Related to Terrorism UN Security
Council Resolution Key provisions

1465 Condemns the bomb attack in Bogota, Colombia, on February 7, 2003.
Also, urges all states, in accordance Feb. 13, 2003 with resolution 1373,
to cooperate with and provide support and assistance to the Colombian
authorities in their efforts to bring to justice the perpetrators,
organizers, and sponsors of this terrorist attack.

1456 Calls on states to prevent and suppress all active and passive
support to terrorism and comply with UN Jan. 20, 2003 Security Council
resolutions 1373, 1390, and 1455. Also, calls on states to become a party
to all relevant international conventions and protocols relating to
terrorism, in particular the 1999 international convention for

the suppression of the financing of terrorism. 1455

Calls on all states to enforce and strengthen measures, where appropriate,
against their nationals or other Jan. 17, 2003 individuals or entities
operating in their territory, to prevent and punish violations. Also calls
upon states to

submit an updated report to the Committee no later than 90 days from
adoption of this resolution on steps being taken to implement the
measures.

1452 Decides that the provisions of resolution 1267 and 1390 do not apply
to funds and other financial assets or Dec. 20, 2002 economic resources
that have been determined by the state to be necessary for basic expenses
and

extraordinary expenses. 1450

Condemns the terrorist bomb attack at the Paradise Hotel in Kikambala,
Kenya, and the attempted missile Dec. 13, 2002 attack on Arkia Israeli
Airlines flight 582, departing from Mombasa, Kenya, on November 28, 2002.
Also, urges all states in accordance with resolution 1373 to bring to
justice the perpetrators, organizers, and sponsors of these terrorist
attacks.

1440 Condemns the act of taking hostages in Moscow, Russia, on October 23,
2002. Also, urges all states, in Oct. 24, 2002 accordance with resolution
1373, to cooperate with the Russian authorities in their efforts to find
and bring to justice the perpetrators, organizers, and sponsors of this
terrorist attack.

(Continued From Previous Page)

UN Security Council Resolution Key provisions

1438 Condemns the bomb attacks in Bali, Indonesia, on October 12, 2002.
Also, urges all states, in accordance with Oct. 14, 2002 resolution 1373
to cooperate with and provide support and assistance to the Indonesian
authorities in their

efforts to find and bring to justice the perpetrators, organizers, and
sponsors of these terrorist attacks. 1390

Calls on member states to continue sanctions against the Taliban, Osama
bin Laden, and al Qaeda. Requires Jan. 16, 2002 states to take a number of
steps against the two regimes, including freezing economic resources,
preventing the supply or sale of weapons, and preventing members from
entering or traveling through their territories. Also, directs states to
report to the Sanctions Committee on actions taken to implement the
sanctions.

1377 Calls on member states to implement UN Security Council Resolution
1373 and to assist each other in doing Nov. 12, 2001 so. Also, invites
states to inform the Counterterrorism Committee of areas where they
require support. 1373

Calls on member states to work together to prevent and suppress terrorist
acts, through cooperation and Sept. 28, 2001 implementation of the
international conventions relating to terrorism. Also, obligates states to
prevent and

suppress the financing of terrorist acts and to freeze funds and other
financial assets or economic resources of persons who commit or attempt to
commit terrorist acts.

1372 Recalls UN Security Council Resolution 1044 and notes steps taken by
the Government of Sudan to comply Sept. 28, 2001 with UN Security Council
Resolutions 1044 and 1070. Terminates the measures brought against Sudan
in UN Security Council Resolutions 1054 and 1070.

1368 Calls on member states to bring to justice the perpetrators and
sponsors of the terrorist attacks on Sept. 12, 2001 September 11, 2001.
Also, calls on the international community to increase cooperation and
implementation of anti- terrorist conventions and UN Security Council
Resolutions. 1363

Establishes a mechanism to monitor the implementation of the measures
imposed by UN Security Council July 30, 2001 Resolutions 1267 and 1333.

1333 Calls on member states to freeze funds and other financial assets of
Osama bin Laden and individuals and Dec. 19, 2000 entities associated with
him, including those in the al Qaeda organization. Also, demands that the
Taliban comply with UN Security Council Resolution 1267 and turn over
Osama bin Laden to authorities in a country where he has been indicted.

1269 Calls on member states to implement the international anti- terrorist
conventions to which they are a party and Oct. 19, 1999 encourages the
speedy adoption of the pending conventions.

1267 Calls on member states to freeze funds and other financial resources
owned or controlled directly or indirectly Oct. 15, 1999 by the Taliban.

1214 Demands that the Taliban stop providing sanctuary and training for
international terrorists and their operations, Dec. 8, 1998 and that all
Afghan factions cooperate with efforts to bring indicted terrorists to
justice.

1189 Calls on member states and international institutions to cooperate
with and provide support to the Aug. 13, 1998 investigations in Kenya,
Tanzania, and the United States, to apprehend the perpetrators of the
criminal acts

and bring them to justice. 1070

Demands the Government of Sudan comply with UN Security Council
Resolutions 1044 and 1054 and also Aug. 16, 1996 decides that member
states shall deny Sudanese aircraft permission to take off, land, or over
fly their territories. 1054 Demands the Government of Sudan extradite
three suspects to Ethiopia who are wanted for the assassination Apr. 26,
1996 attempt on the President of the Arab Republic of Egypt. Also demands
the Government of Sudan desist from

providing shelter and sanctuary to terrorist elements. 1044

Calls upon the Government of Sudan to extradite three suspects wanted in
the connection with assassination Jan. 31, 1996 attempt on the President
of the Arab Republic of Egypt.

883 Demands that the Libyan government comply with UN Security Council
Resolutions 731 and 748 and decides Nov. 11, 1993 that member states
freeze the funds and financial resources of the government of Libya and
all Libyan

undertakings.

(Continued From Previous Page)

UN Security Council Resolution Key provisions

748 Decides that the Libyan government must commit itself to cease all
forms of terrorist action and all assistance Mar. 31, 1992 to terrorist
groups. Also decides that states shall prohibit the provision of weapons
to Libya.

731 Condemns the destruction of Pan American flight 103 and urges the
Libyan government to provide a full and Jan. 21, 1992 effective response
to UN member states* requests to eliminate international terrorism.

687 Recalls the International Convention Against the Taking of Hostages,
which categorizes all hostage- taking acts Apr. 3, 1991 as manifestations
of international terrorism.

635 Condemns all acts of unlawful interference against the security of
civil aviation. Calls upon all member states June, 14, 1989 to implement
measures to prevent acts of terrorism, including those involving
explosives. Urges the

International Civil Aviation Organization to intensify its work on
devising an international regime for the marking of plastic explosives for
the purpose of detection.

337 Condemns the Government of Israel for the forcible diversion and
seizure of a Lebanese airline from Aug. 15, 1973 Lebanon*s air space.

286 Appeals to all parties concerned for the immediate release of all
passengers and crews held as a result of Sept. 9, 1970 hijackings. Calls
on member states to take legal steps to prevent hijackings or other
interference with international civil air travel.

Source: United Nations.

Tabl e 17: UN General Assembly Resolutions Related to Terrorism UN General
Assembly Resolution Key provisions

56/ 1 Condemns the September 11, 2001, terrorist attacks and expresses
condolences and solidarity with the Sept. 18, 2001 people and Government
of the United States. Calls for urgent international cooperation to bring
the perpetrators to justice.

55/ 158 Reiterates General Assembly Resolution 54/ 110. Welcomes the
efforts of the Terrorism Branch of the Centre Jan. 30, 2001 for
International Crime Prevention. Continues the previous work of the Ad Hoc
Committee.

54/ 164 Recalls General Assembly Resolution 52/ 133. Commends those
governments that supplied the Secretary Feb. 24, 2000 General with their
views on the implications of terrorism. Welcomes the Secretary General*s
report and requests that he continue to seek views of member states.

54/ 110 Recalls General Assembly Resolution 53/ 108. Notes the
establishment of the Terrorism Prevention Branch of Feb. 2, 2000 the
Centre for International Crime Prevention in Vienna, Austria. Invites
states to submit information on their

national laws, regulations, or initiatives regarding terrorism to the
Secretary General. Invites regional intergovernmental organizations to do
likewise. Continues the previous work of the Ad Hoc Committee. 54/ 109

Adopts the International Convention for the Suppression of the Financing
of Terrorism and urges all states to Feb. 25, 2000 sign and ratify,
accept, approve, or accede to the Convention. 53/ 108

Recalls General Assembly Resolution 52/ 165. Reaffirms that actions by
states to combat terrorism should be Jan. 26, 1999 conducted in conformity
with the Charter of the United Nations, international law, and relevant
conventions. Decides to address the question of convening a UN conference
to formulate a joint response to terrorism by the international community.
Decides the Ad Hoc Committee shall continue to elaborate on a draft
convention for the suppression of terrorist financing and will continue
developing a draft convention for the suppression of acts of nuclear
terrorism.

(Continued From Previous Page)

UN General Assembly Resolution Key provisions

52/ 165 Reiterates General Assembly Resolution 51/ 210. Reaffirms the
Declaration on Measures to Eliminate

Dec. 15, 1997 International Terrorism. Requests the Ad Hoc Committee
established by UN General Assembly Resolution 51/ 210 continue its work.
Requests the Secretary General to invite the International Atomic Energy
Agency to assist the Ad Hoc Committee.

52/ 133 Recalls General Assembly resolution 50/ 186. Condemns incitement
of ethnic hatred, violence, and terrorism. Dec. 12, 1997 Requests the
Secretary General seek the views of member states on the implications of
terrorism in all its

forms and manifestations. 51/ 210

Calls upon states to adopt further measures to prevent and combat
terrorism. Some of these include: Dec. 17, 1996 accelerating research and
development of explosive detection and marking technology; investigating
the

abuse of charitable, social, and cultural organizations by terrorist
organizations; and developing mutual legal assistance procedures to
facilitate cross- border investigations. Further calls upon states to
become parties to relevant international anti- terrorism conventions and
protocols. Also establishes an Ad Hoc Committee to elaborate an
international convention for the suppression of terrorist bombings and
acts of nuclear terrorism.

Approves a supplement to the 1994 declaration on measures to Eliminate
International Terrorism, which, among other things, reaffirms that asylum
seekers may not avoid prosecution for terrorist acts and encourages states
to facilitate terrorist extraditions even in the absence of a treaty. 50/
186

Recalls General Assembly Resolution 49/ 185. Requests the Secretary-
General continue to seek the views of Dec. 22, 1995 member states on the
possible establishment of a UN voluntary fund to aid victims of terrorism,
as well as

ways and means to rehabilitate and reintegrate such victims back into
society. Requests the Secretary General submit a report to the General
Assembly containing the views of member states on these topics.

50/ 53 Reaffirms the Declaration on Measures to Eliminate International
Terrorism. Urges all states to cooperate in Dec. 11, 1995 eliminating
terrorist safe- havens and in further developing international law
regarding terrorism. Recalls the role of the Security Council in combating
terrorism. Requests the Secretary- General submit an annual report on the
implementation of paragraph 10 of the declaration. 49/ 185

Recalls General Assembly Resolution 48/ 122. Expresses solidarity with the
victims of terrorism. Requests the Dec. 23, 1994 UN Secretary General seek
views of member states on the establishment of a UN voluntary fund for
victims of

terrorism. 49/ 60

Approves the Declaration on Measures to Eliminate International Terrorism,
which, among other things, Dec. 9, 1994 unequivocally condemns all acts of
terrorism, demands that states take effective and resolute measures to
eliminate terrorism, and charges the Secretary General with various
implementation tasks. Some of these

tasks include collecting data on the status of existing international
agreements relating to terrorism and developing an international legal
framework of conventions on terrorism.

48/ 122 Condemns terrorism as an activity aimed at the destruction of
human rights, fundamental freedoms, and Dec. 20, 1993 democracy. Also
condemns terrorism for threatening state security, destabilizing
legitimate governments, undermining civil society, and obstructing
economic development. Calls upon states to take effective measures

to combat terrorism in accordance with international standards of human
rights. Urges the international community to enhance cooperation against
terrorism at many levels.

46/ 51 Recalls General Assembly Resolution 44/ 29. Welcomes the recent
adoption of the Convention on the Marking Dec. 9, 1991 of Plastic
Explosives for the Purpose of Detection.

44/ 29 Recalls General Assembly Resolution 42/ 159. Expresses concern at
the growing link between terrorist groups, Dec. 4, 1989 drug traffickers,
and paramilitary gangs. Calls upon member states to use their political
influence to secure the

safe release of all hostages. Also urges the International Civil Aviation
Organization to intensify its work on devising an international regime for
the marking of plastic explosives for purposes of detection. Welcomes the
recent adoption of aviation and maritime security conventions and
protocols.

(Continued From Previous Page)

UN General Assembly Resolution Key provisions

42/ 159 Reaffirms General Assembly Resolution 40/ 61. Urges all states to
(a) prevent the preparation and organization Dec. 7, 1987 of terrorist
acts from their territories; (b) ensure the apprehension, prosecution, or
extradition terrorist perpetrators; (c) conclude bilateral and
multilateral agreements to that effect; (d) cooperate with other states in
exchanging terrorist information; and (e) harmonize their domestic
legislation with existing international conventions to prevent terrorism.
Also welcomes the air and maritime- security conventions being drafted by
the International Civil Aviation Organization and the International
Maritime Organization. 40/ 61 Recalls General Assembly Resolution 38/ 130.
Unequivocally condemns all acts of terrorism. Urges all states Dec. 9,
1985 not to obstruct the application of appropriate law enforcement
measures against terrorist suspects provided for

in the conventions to which these states are a party. Urges states to
eliminate underlying causes of terrorism, including colonialism, racism,
and situations involving massive human rights violations. Also, calls upon
all states to follow the recommendations of the International Civil
Aviation Organization to prevent terrorist attacks

against civil aviation transport. Requests the International Maritime
Organization study the problem of terrorism against ships. 39/ 159
Condemns policies and practices of terrorism between states as a method of
dealing with other states and Dec. 17, 1984 peoples. Demands that states
refrain from taking action aimed at undermining other states. Urges all
states to

respect and observe the sovereignty and political independence of states.
38/ 130

Recalls General Assembly Resolution 34/ 145. Deeply deplores the loss of
innocent human lives and the Dec. 19, 1983 pernicious impact of
international terrorist acts on friendly relations among states as well as
on international cooperation. Re- endorses the recommendations of the Ad
Hoc Committee on International Terrorism.

36/ 109 Re- endorses the recommendations made to the General Assembly by
the Ad Hoc Committee on International Dec. 10, 1981 Terrorism and calls
upon all states to observe and implement these recommendations.

34/ 145 Unequivocally condemns all acts of international terrorism. Adopts
the recommendations of the Ad Hoc Dec. 17, 1979 Committee relating to
cooperation for the elimination of international terrorism. Calls upon
states to refrain from organizing, instigating, assisting or participating
in acts of civil strife or terrorism in another state. Appeals

to states to become parties to existing international conventions relating
to terrorism. Invites states to harmonize their domestic laws with
international conventions on terrorism and cooperate with each other more
closely in the areas of information sharing, terrorist extradition, and
terrorist prosecution. 31/ 102

Urges states to continue to seek just and peaceful solutions to the
problem of international terrorism. Reaffirms Dec. 15, 1976 the
inalienable right to self- determination of all people, and condemns the
continuation of repressive and

terrorist acts by colonial, racist, and alien regimes. Continues the work
of the Ad Hoc Committee on Terrorism in studying the underlying causes of
terrorism and requests that it submit practical measures to combat
terrorism to the Secretary General.

30/ 34 Urges states to devote their immediate attention to the growing
problem of international terrorism. Reaffirms Dec. 18, 1972 the
inalienable right to self- determination of all people under colonial
regimes and upholds the legitimacy of

national liberation movements. Also, establishes an Ad Hoc Committee on
terrorism to study the root causes and devise solutions to terrorism.
Source: United Nations.

Appendi VI x I

Organizations Visited or Contacted During the course of our review, we
visited and/ or contacted officials from the following organizations.
Cabinet Departments and Related Agencies

Department of Defense  Office of the Assistant Secretary of Defense for
Special Operations and Low- Intensity Conflict, Washington, D. C.

 Office of the Joint Chiefs of Staff, Washington, D. C.  Unified
Combatant Commands

 U. S. Central Command, MacDill Air Force Base, Florida  U. S. European
Command, Patch Barracks, Stuttgart- Vaihingen, Germany

 U. S. Southern Command, Miami, Florida  U. S. Special Operations
Command, MacDill Air Force Base, Florida  Defense Intelligence Agency,
Washington, D. C.

 Defense Attaches at selected U. S. embassies (see Department of State)

Department of Homeland  Bureau of Immigration and Customs Enforcement,
Washington, D. C.

Security  Bureau of Customs and Border Protection, Washington, D. C.

 U. S. Secret Service, Washington, D. C.  Headquarters, Federal Law
Enforcement Training Center, Glynco,

Georgia

Department of Justice  Criminal Division, Washington, D. C.  Terrorism
Section, Washington, D. C.  Federal Bureau of Investigation, Washington,
D. C.

 Counterterrorism Division, Washington, D. C.  Investigative Services
Division, Washington, D. C.  International Operations Branch, Washington,
D. C.  Legal Attache Program, Washington, D. C.  Bureau of Alcohol,
Tobacco, Firearms and Explosives, Washington, D. C.  International Law
Enforcement Academy, Budapest, Hungary  Legal Attache at a selected U. S.
embassy (see Department of State)

Department of State  Bureau of Administration, Washington, D. C.  Bureau
of Consular Affairs, Washington, D. C.  Bureau of Diplomatic Security,
Washington, D. C.  Bureau of Economic and Business Affairs, Washington,
D. C.  Bureau of Intelligence and Research, Washington, D. C.  Bureau
for International Narcotics and Law Enforcement Affairs,

Washington, D. C.  Bureau of International Organization Affairs,
Washington, D. C.  Bureau of Overseas Buildings Operations, Washington,
D. C.  Bureau of Political- Military Affairs, Washington, D. C. 
Geographic Bureaus, Washington, D. C.

 African Affairs, Washington, D. C.  East Asian and Pacific Affairs,
Washington, D. C.  European and Eurasian Affairs, Washington, D. C. 
Near Eastern Affairs, Washington, D. C.  South Asian Affairs, Washington,
D. C.  Western Hemisphere Affairs, Washington, D. C.  Office of the
Coordinator for Counterterrorism, Washington, D. C.  Office of
International Information Programs, Washington, D. C.  Office of the
Legal Adviser, Washington, D. C.  Overseas Security Advisory Council,
Washington, D. C.  U. S. Agency for International Development,
Washington, D. C.

 Office of Foreign Disaster Assistance, Washington, D. C.  U. S.
Embassy, Athens, Greece

Department of the Treasury  Office of Foreign Assets Control, Washington,
D. C.  Financial Crimes Enforcement Network, Washington, D. C.  Treasury
personnel at a selected U. S. embassy (see Department of

State)

Other Agencies Central Intelligence Agency  Counterterrorist Center,
Langley, Virginia Executive Office of the

 National Security Council, Washington, D. C. President

 Office of Homeland Security, Washington, D. C.  Office of Management
and Budget, Washington, D. C.

Appendi VI x I I Comments from the Department of Defense

Comments from the U. S. Agency for

Appendi X I x International Development

Appendi X x GAO Contacts and Staff Acknowledgments GAO Contacts Raymond J.
Decker (202) 512- 6020 Stephen L. Caldwell (202) 512- 9610 Acknowledgments
In addition to those named above, Mark A. Pross; James C. Lawson; Lori L.
Kmetz; David W. Hancock; Cheryl L. Goodman; Edward J. George, Jr.;

J. Addison Ricks; Susan K. Woodward; Rebecca Shea; Harry L. (Lee) Purdy;
Michael S. (Shawn) Arbogast; John W. Van Schaik; Michael C. Zola; and
Douglas E. Cole made key contributions to this report.

Related GAO Products

Information Technology: Terrorist Watch Lists Should Be Consolidated to
Promote Better Integration and Sharing. GAO- 03- 322. Washington, D. C.:
April 15, 2003.

Combating Terrorism: Observations on National Strategies Related to
Terrorism. GAO- 03- 519T. Washington, D. C.: March 3, 2003.

Weaknesses in Screening Entrants into the United States. GAO- 03- 438T.
Washington, D. C.: January 30, 2003.

High- Risk Series: Protecting Information Systems Supporting the Federal
Government and the Nation*s Critical Infrastructures. GAO- 03- 121.
Washington, D. C.: January 1, 2003.

Major Management Challenges and Program Risks: Department of Homeland
Security. GAO- 03- 102. Washington, D. C.: January 1, 2003.

Homeland Security: Management Challenges Facing Federal Leadership.

GAO- 03- 260. Washington, D. C.: December 20, 2002.

Combating Terrorism: Funding Data Reported to Congress Should Be Improved.
GAO- 03- 170. Washington, D. C.: November 26, 2002.

Border Security: Implications of Eliminating the Visa Waiver Program. GAO-
03- 38. Washington, D. C.: November 22, 2002.

Container Security: Current Efforts to Detect Nuclear Materials, New
Initiatives, and Challenges. GAO- 03- 297T. Washington, D. C.: November
18, 2002.

Technology Assessment: Biometrics for Border Security. GAO- 03- 174.
Washington, D. C.: November 14, 2002.

Combating Terrorism: Actions Needed to Guide Services' Antiterrorism
Efforts at Installations. GAO- 03- 14. Washington, D. C.: November 1,
2002.

Border Security: Visa Process Should Be Strengthened as an Antiterrorism
Tool. GAO- 03- 132NI. Washington, D. C.: October 21, 2002.

Combating Terrorism: Department of State Programs to Combat Terrorism
Abroad. GAO- 02- 1021. Washington, D. C.: September 6, 2002.

Homeland Security: Effective Intergovernmental Coordination Is Key to
Success. GAO- 02- 1013T. Washington, D. C.: August 23, 2002.

Nonproliferation R & D: NNSA's Program Develops Successful Technologies,
but Project Management Can Be Strengthened. GAO- 01- 904. Washington, D.
C.: August 23, 2002.

Port Security: Nation Faces Formidable Challenges in Making New
Initiatives Successful. GAO- 02- 993T. Washington, D. C.: August 5, 2002.

Combating Terrorism: Preliminary Observations on Weaknesses in Force
Protection for DOD Deployments Through Domestic Seaports. GAO- 02- 955TNI.
Washington, D. C.: July 23, 2002.

International Trade: Critical Issues Remain in Determining Conflict
Diamond Trade. GAO- 02- 678. Washington, D. C.: June 14, 2002.

Nuclear Nonproliferation: U. S. Efforts to Help Other Countries Combat
Nuclear Smuggling Need Strengthened Coordination and Planning. GAO- 02-
426. Washington, D. C.: May 16, 2002.

Federal Funding for Selected Surveillance Technologies. GAO- 02- 438R.
Washington, D. C.: March 14, 2002.

Department of State: Status of Achieving Key Outcomes and Addressing Major
Management Challenges. GAO- 02- 42. Washington, D. C.: December 7, 2001.

European Security: U. S. and European Contributions to Foster Stability
and Security in Europe. GAO- 02- 174. Washington, D. C.: November 28,
2001.

Illegal Aliens: INS* Processes for Denying Aliens Entry into the United
States. GAO- 02- 220T. Washington, D. C.: November 13, 2001.

Combating Terrorism: Selected Challenges and Related Recommendations. GAO-
01- 822. Washington, D. C.: September 20, 2001.

Combating Terrorism: Actions Needed to Improve DOD Antiterrorism Program
Implementation and Management. GAO- 01- 909. Washington, D. C.: September
19, 2001.

International Crime Control: Sustained Executive- Level Coordination of
Federal Response Needed. GAO- 01- 629. Washington, D. C.: August 13, 2001.

FBI Intelligence Investigations: Coordination Within Justice on
Counterintelligence Criminal Matters Is Limited. GAO- 01- 780. Washington,
D. C.: July 16, 2001.

Combating Terrorism: Observations on Options to Improve the Federal
Response. GAO- 01- 660T. Washington, D. C.: April 24, 2001.

Combating Terrorism: Comments on Counterterrorism Leadership and National
Strategy. GAO- 01- 556T. Washington, D. C.: March 27, 2001.

Nuclear Nonproliferation: Security of Russia's Nuclear Material Improving;
Further Enhancements Needed. GAO- 01- 312. Washington, D. C.: February 28,
2001.

Embassy Construction: Better Long- term Planning Will Enhance Program
Decision- making. GAO- 01- 11. Washington, D. C.: January 22, 2001.

State Department: Serious Problems in the Anthrax Vaccine Immunization
Program. GAO- 01- 21. Washington, D. C.: December 13, 2000.

Combating Terrorism: Federal Response Teams Provide Varied Capabilities:
Opportunities Remain to Improve Coordination. GAO- 01- 14. Washington, D.
C.: November 30, 2000.

No Information to Link Irish Terrorist Organizations to International
Narcotics Trafficking. GAO/ OSI- 00- 18R. Washington, D. C.: September 29,
2000.

Combating Terrorism: Linking Threats to Strategies and Resources. GAO/ T-
NSIAD- 00- 218. Washington, D. C.: July 26, 2000.

Combating Terrorism: Action Taken but Considerable Risks Remain for Forces
Overseas. GAO/ NSIAD- 00- 181. Washington, D. C.: July 19, 2000.

Observations on the Department of State's Fiscal Year 1999 Performance
Report and Fiscal Year 2001 Performance Plan. GAO/ NSIAD- 00- 189R.
Washington, D. C.: June 30, 2000.

Weapons of Mass Destruction: DOD*s Actions to Combat Weapons Use Should Be
More Integrated and Focused. GAO/ NSIAD- 00- 97. Washington, D. C.: May
26, 2000.

Combating Terrorism: Comments on Bill H. R. 4210 to Manage Selected
Counterterrorist Programs. GAO/ T- NSIAD- 00- 172. Washington, D. C.: May
4, 2000.

Combating Terrorism: How Five Foreign Countries Are Organized to Combat
Terrorism. GAO/ NSIAD- 00- 85. Washington, D. C.: April 7, 2000.

Combating Terrorism: Issues in Managing Counterterrorist Programs. GAO/ T-
NSIAD- 00- 145. Washington, D. C.: April 6, 2000.

State Department: Overseas Emergency Security Program Progressing, but
Costs Are Increasing. GAO/ NSIAD- 00- 83. Washington, D. C.: March 8,
2000.

State Department: Progress and Challenges in Addressing Management Issues.
GAO/ T- NSIAD- 00- 124. Washington, D. C.: March 8, 2000.

Chemical and Biological Defense: Observations on Actions Taken to Protect
Military Forces. GAO/ T- NSIAD- 00- 49. Washington, D. C.: October 20,
1999.

Combating Terrorism: Observations on the Threat of Chemical and Biological
Terrorism. GAO/ T- NSIAD- 00- 50. Washington, D. C.: October 20, 1999.

Combating Terrorism: Need for Comprehensive Threat and Risk Assessments of
Chemical and Biological Attacks. GAO/ NSIAD- 99- 163. Washington, D. C.:
September 7, 1999.

Military Training: Management and Oversight of Joint Combined Exchange
Training. GAO/ NSIAD- 99- 173. Washington, D. C.: July 23, 1999.

Combating Terrorism: Analysis of Federal Counterterrorist Exercises. GAO/
NSIAD- 99- 157BR. Washington, D. C.: June 25, 1999.

Combating Terrorism: Issues to Be Resolved to Improve Counterterrorism
Operations. GAO/ NSIAD- 99- 135. Washington, D. C.: May 13, 1999.

Terrorism and Drug Trafficking: Testing Status and Views on Operational
Viability of Pulsed Fast Neutron Analysis Technology. GAO/ GDD- 99- 54.
Washington, D. C.: April 13, 1999.

Combating Terrorism: Observations on Federal Spending to Combat Terrorism.
GAO/ T- NSIAD/ GGD- 99- 107. Washington, D. C.: March 11, 1999.

Major Management Challenges and Program Risks: Department of State. GAO/
OCG- 99- 12. Washington, D. C.: January 1, 1999.

Combating Terrorism: FBI's Use of Federal Funds for
CounterterrorismRelated Activities (FYs 1995- 1998). GAO/ GGD- 99- 7.
Washington, D. C.: November 20, 1998.

Combating Terrorism: Observations on Crosscutting Issues. GAO/ T- NSIAD-
98- 164. Washington, D. C.: April 23, 1998.

Combating Terrorism: Threat and Risk Assessments Can Help Prioritize and
Target Program Investments. GAO/ NSIAD- 98- 74. Washington, D. C.: April
9, 1998.

Combating Terrorism: Spending on Governmentwide Programs Requires Better
Management and Coordination. GAO/ NSIAD- 98- 39. Washington, D. C.:
December 1, 1997.

Combating Terrorism: Efforts to Protect U. S. Forces in Turkey and the
Middle East. GAO/ T- NSIAD- 98- 44. Washington, D. C.: October 28, 1997.

Combating Terrorism: Federal Agencies' Efforts to Implement National
Policy and Strategy. GAO/ NSIAD- 97- 254. Washington, D. C.: September 26,
1997.

Combating Terrorism: Status of DOD Efforts to Protect Its Force Overseas.
GAO/ NSIAD- 97- 207. Washington, D. C.: July 21, 1997.

State Department: Efforts to Reduce Visa Fraud. GAO/ T- NSIAD- 97- 167.
Washington, D. C.: May 20, 1997.

Aviation Security: FAA's Procurement of Explosives Detection Devices. GAO/
RCED- 97- 111R. Washington, D. C.: May 1, 1997.

Department of Energy: Information on the Distribution of Funds for
Counterintelligence Programs and the Resulting Expansion of These
Programs. GAO/ RCED- 97- 128R. Washington, D. C.: April 25, 1997.

Aviation Security: Commercially Available Advanced Explosives Detection
Devices. GAO/ RCED- 97- 119R. Washington, D. C.: April 24, 1997.

Terrorism and Drug Trafficking: Responsibilities for Developing Explosives
and Narcotics Detection Technologies. GAO/ NSIAD- 97- 95. Washington, D.
C.: April 15, 1997.

Terrorism and Drug Trafficking: Technologies for Detecting Explosives and
Narcotics. GAO/ NSIAD/ RCED- 96- 252. Washington, D. C.: September 4,
1996.

Aviation Security: Immediate Action Needed to Improve Security. GAO/ T-
RCED/ NSIAD- 96- 237. Washington, D. C.: August 1, 1996.

Passports and Visas: Status of Efforts to Reduce Fraud. GAO/ NSIAD- 96-
99. Washington, D. C.: May 9, 1996.

Terrorism and Drug Trafficking: Threats and Roles of Explosives and
Narcotics Detection Technology. GAO/ NSIAD/ RCED- 96- 76BR. Washington, D.
C.: March 27, 1996.

Nuclear Nonproliferation: Status of U. S. Efforts to Improve Nuclear
Material Controls in Newly Independent States. GAO/ NSIAD/ RCED- 96- 89.
Washington, D. C.: March 8, 1996.

Nonimmigrant Visa Processing. GAO/ NSIAD- 95- 122R. Washington, D. C.:
April 17, 1995.

Aviation Security: Additional Actions Needed to Meet Domestic and
International Challenges. GAO/ RCED- 94- 38. Washington, D. C.: January
27, 1994.

Foreign Assistance: Meeting the Training Needs of Police in New
Democracies. GAO/ NSIAD- 93- 109. Washington, D. C.: January 21, 1993.

Foreign Assistance: Promising Approach to Judicial Reform in Colombia.
GAO/ NSIAD- 92- 269. Washington, D. C.: September 24, 1992.

Russian Nuclear Weapons: U. S. Implementation of the Soviet Nuclear Threat
Reduction Act of 1991. GAO/ T- NSIAD- 92- 47. Washington, D. C.: July 27,
1992.

Foreign Aid: Police Training and Assistance. GAO/ NSIAD- 92- 118.
Washington, D. C.: March 5, 1992.

Economic Sanctions: Effectiveness as Tools of Foreign Policy. GAO/ NSIAD-
92- 106. Washington, D. C.: February 19, 1992.

State Department: Management Weaknesses in the Security Construction
Program. GAO/ NSIAD- 92- 2. Washington, D. C.: November 29, 1991.

Preliminary Inquiry into Alleged 1980 Negotiations to Delay Release of
Iranian Hostages until after November Election. GAO/ T- OSI- 92- 4.
Washington, D. C.: November 21, 1991.

Preliminary Inquiry into Alleged 1980 Negotiations to Delay Release of
Iranian Hostages until after November Election. GAO/ T- OSI- 92- 1.
Washington, D. C.: November 7, 1991.

State Department: Status of the Diplomatic Security Construction Program.
GAO/ NSIAD- 91- 143BR. Washington, D. C.: February 20, 1991.

International Terrorism: FBI Investigates Domestic Activities to Identify
Terrorists. GAO/ GGD- 90- 112. Washington, D. C.: September 7, 1990.

Aviation Security: Training Standards Needed for Extra Security Measures
at Foreign Airports. GAO/ RCED- 90- 66. Washington, D. C.: December 15,
1989.

International Terrorism: Status of GAO's Review of the FBI's International
Terrorism Program. GAO/ T- GGD- 89- 31. Washington, D. C.: June 22, 1989.

Embassy Security: Background Investigations of Foreign Employees. GAO/
NSIAD- 89- 76. Washington, D. C.: January 5, 1989.

Security Assistance: Update of Programs and Related Activities. GAO/
NSIAD- 89- 78FS. Washington, D. C.: December 28, 1988.

Aviation Security: FAA's Assessments of Foreign Airports. GAO/ RCED- 89-
45. Washington, D. C.: December 7, 1988.

Passports: Implications of Deleting the Birthplace in U. S. Passports.
GAO/ NSIAD- 87- 201. Washington, D. C.: August 27, 1987.

Terrorism: Laws Cited Imposing Sanctions on Nations Supporting Terrorism.
GAO/ NSIAD- 87- 133FS. Washington, D. C.: April 17, 1987.

Obstacles to U. S. Ability to Control and Track Weapons- Grade Uranium
Supplied Abroad. GAO/ ID- 82- 21. Washington, D. C.: August 2, 1982.

(350092)

a

GAO United States General Accounting Office

Page i GAO- 03- 165 Combating Terrorism

Contents

Contents

Page ii GAO- 03- 165 Combating Terrorism

Contents

Page iii GAO- 03- 165 Combating Terrorism

Contents

Page iv GAO- 03- 165 Combating Terrorism

Contents

Page v GAO- 03- 165 Combating Terrorism

Contents Page vi GAO- 03- 165 Combating Terrorism

Page 1 GAO- 03- 165 Combating Terrorism United States General Accounting
Office Washington, D. C. 20548

Page 1 GAO- 03- 165 Combating Terrorism

A

Page 2 GAO- 03- 165 Combating Terrorism

Page 3 GAO- 03- 165 Combating Terrorism

Page 4 GAO- 03- 165 Combating Terrorism

Executive Summary Page 5 GAO- 03- 165 Combating Terrorism

Executive Summary Page 6 GAO- 03- 165 Combating Terrorism

Executive Summary Page 7 GAO- 03- 165 Combating Terrorism

Executive Summary Page 8 GAO- 03- 165 Combating Terrorism

Executive Summary Page 9 GAO- 03- 165 Combating Terrorism

Executive Summary Page 10 GAO- 03- 165 Combating Terrorism

Executive Summary Page 11 GAO- 03- 165 Combating Terrorism

Page 12 GAO- 03- 165 Combating Terrorism

Chapter 1

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 13 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 14 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 15 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 16 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 17 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 18 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 19 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 20 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 21 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 22 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 23 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 24 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 25 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 26 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 27 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 28 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 29 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 30 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 31 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 32 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 33 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 34 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 35 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 36 GAO- 03- 165 Combating Terrorism

Chapter 1 Introduction: Terrorism Overseas and the Federal Government*s
Role

Page 37 GAO- 03- 165 Combating Terrorism

Page 38 GAO- 03- 165 Combating Terrorism

Chapter 2

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 39 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 40 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 41 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 42 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 43 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 44 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 45 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 46 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 47 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 48 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 49 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 50 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 51 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 52 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 53 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 54 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 55 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 56 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 57 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 58 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 59 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 60 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 61 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 62 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 63 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 64 GAO- 03- 165 Combating Terrorism

Chapter 2 The Interagency Framework for Combating Terrorism Overseas

Page 65 GAO- 03- 165 Combating Terrorism

Page 66 GAO- 03- 165 Combating Terrorism

Chapter 3

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 67 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 68 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 69 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 70 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 71 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 72 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 73 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 74 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 75 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 76 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 77 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 78 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 79 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 80 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 81 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 82 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 83 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 84 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 85 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 86 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 87 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 88 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 89 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 90 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 91 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 92 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 93 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 94 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrorism

Page 95 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 96 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 97 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 98 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 99 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 100 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrorism

Page 101 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 102 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 103 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 104 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 105 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 106 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 107 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 108 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 109 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrorism

Page 110 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 111 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 112 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 113 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 114 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 115 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 116 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 117 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 118 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 119 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrorism

Page 120 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 121 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrorism

Page 122 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 123 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 124 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 125 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 126 GAO- 03- 165 Combating Terrorism

Chapter 3 Federal Efforts to Detect and Prevent Terrori sm

Page 127 GAO- 03- 165 Combating Terrorism

Page 128 GAO- 03- 165 Combating Terrorism

Chapter 4

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 129 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 130 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 131 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 132 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 133 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 134 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 135 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 136 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 137 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 138 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 139 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 140 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 141 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 142 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 143 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 144 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 145 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 146 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 147 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 148 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 149 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 150 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 151 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 152 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 153 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 154 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 155 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 156 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 157 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 158 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 159 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 160 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 161 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 162 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 163 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 164 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 165 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 166 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 167 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 168 GAO- 03- 165 Combating Terrorism

Chapter 4 Federal Efforts to Disrupt and Destroy Terrorist Organizations

Page 169 GAO- 03- 165 Combating Terrorism

Page 170 GAO- 03- 165 Combating Terrorism

Chapter 5

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 171 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 172 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 173 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 174 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 175 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 176 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 177 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 178 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 179 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 180 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 181 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 182 GAO- 03- 165 Combating Terrorism

Chapter 5 Federal Efforts to Respond to Terrorist Incidents Overseas

Page 183 GAO- 03- 165 Combating Terrorism

Page 184 GAO- 03- 165 Combating Terrorism

Appendix I

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 185 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 186 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 187 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 188 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 189 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 190 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 191 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 192 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 193 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 194 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 195 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 196 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 197 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 198 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 199 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 200 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 201 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 202 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 203 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 204 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 205 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 206 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 207 GAO- 03- 165 Combating Terrorism

Appendix I Matrix of Department of Defense Programs and Activities to
Combat Terrorism Overseas

Page 208 GAO- 03- 165 Combating Terrorism

Page 209 GAO- 03- 165 Combating Terrorism

Appendix II

Appendix II Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas

Page 210 GAO- 03- 165 Combating Terrorism

Appendix II Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas

Page 211 GAO- 03- 165 Combating Terrorism

Appendix II Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas

Page 212 GAO- 03- 165 Combating Terrorism

Appendix II Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas

Page 213 GAO- 03- 165 Combating Terrorism

Appendix II Matrix of Department of Homeland Security Programs and
Activities to Combat Terrorism Overseas

Page 214 GAO- 03- 165 Combating Terrorism

Page 215 GAO- 03- 165 Combating Terrorism

Appendix III

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 216 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 217 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 218 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 219 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 220 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 221 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 222 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 223 GAO- 03- 165 Combating Terrorism

Appendix III Matrix of Department of Justice Programs and Activities to
Combat Terrorism Overseas

Page 224 GAO- 03- 165 Combating Terrorism

Page 225 GAO- 03- 165 Combating Terrorism

Appendix IV

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 226 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 227 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 228 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 229 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 230 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 231 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 232 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 233 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 234 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 235 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 236 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 237 GAO- 03- 165 Combating Terrorism

Appendix IV Matrix of Department of State Programs and Activities to
Combat Terrorism Overseas

Page 238 GAO- 03- 165 Combating Terrorism

Page 239 GAO- 03- 165 Combating Terrorism

Appendix V

Appendix V Matrix of Department of the Treasury Programs and Activities to
Combat Terrorism Overseas

Page 240 GAO- 03- 165 Combating Terrorism

Appendix V Matrix of Department of the Treasury Programs and Activities to
Combat Terrorism Overseas

Page 241 GAO- 03- 165 Combating Terrorism

Appendix V Matrix of Department of the Treasury Programs and Activities to
Combat Terrorism Overseas

Page 242 GAO- 03- 165 Combating Terrorism

Page 243 GAO- 03- 165 Combating Terrorism

Appendix VI

Appendix VI United Nations Protocols, Conventions, and Resolutions Related
to Terrorism

Page 244 GAO- 03- 165 Combating Terrorism

Appendix VI United Nations Protocols, Conventions, and Resolutions Related
to Terrorism

Page 245 GAO- 03- 165 Combating Terrorism

Appendix VI United Nations Protocols, Conventions, and Resolutions Related
to Terrorism

Page 246 GAO- 03- 165 Combating Terrorism

Appendix VI United Nations Protocols, Conventions, and Resolutions Related
to Terrorism

Page 247 GAO- 03- 165 Combating Terrorism

Appendix VI United Nations Protocols, Conventions, and Resolutions Related
to Terrorism

Page 248 GAO- 03- 165 Combating Terrorism

Page 249 GAO- 03- 165 Combating Terrorism

Appendix VII

Appendix VII Organizations Visited or Contacted

Page 250 GAO- 03- 165 Combating Terrorism

Appendix VII Organizations Visited or Contacted

Page 251 GAO- 03- 165 Combating Terrorism

Appendix VII Organizations Visited or Contacted

Page 252 GAO- 03- 165 Combating Terrorism

Page 253 GAO- 03- 165 Combating Terrorism

Appendix VIII

Page 254 GAO- 03- 165 Combating Terrorism

Appendix IX

Page 255 GAO- 03- 165 Combating Terrorism

Appendix X

Page 256 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 257 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 258 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 259 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 260 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 261 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 262 GAO- 03- 165 Combating Terrorism

Related GAO Products Page 263 GAO- 03- 165 Combating Terrorism

GAO*s Mission The General Accounting Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting its
constitutional responsibilities

and to help improve the performance and accountability of the federal
government for the American people. GAO examines the use of public funds;
evaluates federal programs and policies; and provides analyses,
recommendations, and other assistance to help Congress make informed
oversight, policy, and funding decisions. GAO*s commitment to good
government is reflected in its core values of accountability, integrity,
and reliability.

Obtaining Copies of GAO Reports and Testimony

The fastest and easiest way to obtain copies of GAO documents at no cost
is through the Internet. GAO*s Web site (www. gao. gov) contains abstracts
and fulltext files of current reports and testimony and an expanding
archive of older products. The Web site features a search engine to help
you locate documents using key words and phrases. You can print these
documents in their entirety, including charts and other graphics.

Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as *Today*s Reports,* on its
Web site daily. The list contains links to the full- text document files.
To have GAO e- mail this

list to you every afternoon, go to www. gao. gov and select *Subscribe to
GAO Mailing Lists* under *Order GAO Products* heading.

Order by Mail or Phone The first copy of each printed report is free.
Additional copies are $2 each. A check or money order should be made out
to the Superintendent of Documents. GAO

also accepts VISA and Mastercard. Orders for 100 or more copies mailed to
a single address are discounted 25 percent. Orders should be sent to:

U. S. General Accounting Office 441 G Street NW, Room LM Washington, D. C.
20548 To order by Phone: Voice: (202) 512- 6000 TDD: (202) 512- 2537 Fax:
(202) 512- 6061

To Report Fraud, Waste, and Abuse in Federal Programs

Contact: Web site: www. gao. gov/ fraudnet/ fraudnet. htm E- mail:
fraudnet@ gao. gov Automated answering system: (800) 424- 5454 or (202)
512- 7470

Public Affairs Jeff Nelligan, Managing Director, NelliganJ@ gao. gov (202)
512- 4800 U. S. General Accounting Office, 441 G Street NW, Room 7149
Washington, D. C. 20548

United States General Accounting Office Washington, D. C. 20548- 0001
Official Business Penalty for Private Use $300 Address Service Requested

Presorted Standard Postage & Fees Paid

GAO Permit No. GI00
*** End of document. ***