background image
haps cyclical economic factors. For the cost to the United States of visa backlogs, see National Foreign Trade Coun-
cil report,"Visa Backlog Costs U.S. Exporters More Than $30 Billion Since 2002, New Study Finds," June 2, 2004
(online at www.nftc.org/newsflash/newsflash.asp?Mode=View&articleid=1686&Category=All).
39.These issues are on the G-8 agenda.White House press release, "G-8 Secure and Facilitated Travel Initia-
tive (SAFTI)," June 9, 2004 (online at www.whitehouse.gov/news/releases/2004/06/20040609-51.html). Lax pass-
port issuance standards are among the vulnerabilities exploited by terrorists, possibly including two of the 9/11
hijackers. Three models exist for strengthened prescreening: (1) better screening by airlines, such as the use of
improved document authentication technology; (2) posting of border agents or inspectors in foreign airports to
work cooperatively with foreign counterparts; and (3) establishing a full preinspection regime, such as now exists
for travel to the United States from Canada and Ireland. All three models should be pursued, in addition to elec-
tronic prescreening .
40. Among the more important problems to address is that of varying transliterations of the same name. For
example, the current lack of a single convention for transliterating Arabic names enabled the 19 hijackers to vary
the spelling of their names to defeat name-based watchlist systems and confuse any potential efforts to locate them.
While the gradual introduction of biometric identifiers will help, that process will take years, and a name match
will always be useful.The ICAO should discuss the adoption of a standard requiring a digital code for all names
that need to be translated into the Roman alphabet, ensuring one common spelling for all countries.
41. On achieving more reliable identification, see Markle Foundation task force report, Creating a Trusted Infor-
mation Network for Homeland Security (Markle Foundation, 2003), p. 72 (online at www.markle.org).
42. General Accounting Office report, Mass Transit: Federal Action Could Help Transit Agencies Address Security Chal-
lenges, GAO-03-263, Dec. 2002 (online at www.gao.gov/new.items/d03263.pdf).
13 How to Do It? A Different Way of Organizing the Government
1.The Bush administration clarified the respective missions of the different intelligence analysis centers in a let-
ter sent by Secretary Ridge, DCI Tenet, FBI Director Mueller, and TTIC Director Brennan to Senators Susan Collins
and Carl Levin on April 13, 2004.The letter did not mention any element of the Department of Defense. It stated
that the DCI would define what analytical resources he would transfer from the CTC to TTIC no later than June
1, 2004. DCI Tenet subsequently told us that he decided that TTIC would have primary responsibility for terrorism
analysis but that the CIA and the Defense Intelligence Agency would grow their own analysts.TTIC will have task-
ing authority over terrorism analysts in other intelligence agencies, although there will need to be a board to super-
vise deconfliction. George Tenet interview (July 2, 2004).We have not received any details regarding this plan.
2."TTIC has no operational authority. However,TTIC has the authority to task collection and analysis from
Intelligence Community agencies, the FBI, and DHS through tasking mechanisms we will create.The analytic work
conducted at TTIC creates products that inform each of TTIC's partner elements, as well as other Federal depart-
ments and agencies as appropriate." Letter from Ridge and others to Collins and Levin, Apr. 13, 2004.
3. Donald Rumsfeld prepared statement, Mar. 23, 2004, p. 20.
4. In this conception, the NCTC should plan actions, assigning responsibilities for operational direction and
execution to other agencies. It would be built on TTIC and would be supported by the intelligence community
as TTIC is now.Whichever route is chosen, the scarce analytical resources now dispersed among TTIC, the Defense
Intelligence Agency's Joint Interagency Task Force--Combatting Terrorism (JITF-CT), and the DCI's Countert-
errorist Center (CTC) should be concentrated more effectively than they are now.
· The DCI's Counterterrorist Center would become a CIA unit, to handle the direction and execution of tasks
assigned to the CIA. It could have detailees from other agencies, as it does now, to perform this operational
mission. It would yield much of the broader, strategic analytic duties and personnel to the NCTC.The CTC
would rely on the restructured CIA (discussed in section 13.2) to organize, train, and equip its personnel.
· Similarly, the FBI's Counterterrorism Division would remain, as now, the operational arm of the Bureau to
combat terrorism. As it does now, it would work with other agencies in carrying out these missions, retain-
ing the JTTF structure now in place.The Counterterrorism Division would rely on the FBI's Office of Intel-
ligence to train and equip its personnel, helping to process and report the information gathered in the field.
· The Defense Department's unified commands--SOCOM, NORTHCOM, and CENTCOM--would be
the joint operational centers taking on DOD tasks. Much of the excellent analytical talent that has been assem-
bled in the Defense Intelligence Agency's JITF-CT should merge into the planned NCTC.
· The Department of Homeland Security's Directorate for Information Analysis and Infrastructure Protection
should retain its core duties, but the NCTC should have the ultimate responsibility for producing net assess-
ments that utilize Homeland Security's analysis of domestic vulnerabilities and integrate all-source analysis
of foreign intelligence about the terrorist enemy.
· The State Department's counterterrorism office would be a critical participant in the NCTC's work, taking
the lead in directing the execution of the counterterrorism foreign policy mission.
NOTES TO CHAPTER 12
565
FinalNotes.4pp 7/17/04 4:26 PM Page 565