The untold story of how the 9/11 Commission overcame partisanship and bureaucracy to produce its acclaimed report. From the beginning, the 9/11 Commission found itself facing obstacles — the Bush administration blocked its existence for months, the first co-chairs resigned right away, the budget was limited, and a polarized Washington was suspicious of its every request. Yet despite these long odds, the Commission produced a bestselling report unanimously hailed for its objectivity, along with a set of recommendations that led to the most significant reform of America’s national security agencies in decades. This is a riveting insider’s account of Washington at its worst — and its best.
Terrorism, sadly, seems here to stay and to stay with a vengeance. It turns out that the United States was not prepared for it and now must play catch-up. Countries such as Japan, France, Spain, England and others have been targeted and attacked as well. As opposed to traditional forms of war where the enemy is known and locatable, the war on terrorism features foggily-defined enemies who seem at the same time everywhere and nowhere. This book presents important new reports of issues, trends and developments in the global war on terrorism.
"This volume represents the complete work of the 9/11 Commission staff report, "9/11 and terrorist travel", as published on the 9/11 Commission Web site on August 22, 2004 ..."--Title page verso.
The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.
The most comprehensive account to date of the 9/11 attack on the Pentagon and aftermath, this volume includes unprecedented details on the impact on the Pentagon building and personnel and the scope of the rescue, recovery, and caregiving effort. It features 32 pages of photographs and more than a dozen diagrams and illustrations not previously available.
Stopping the ability of terrorists to finance their operations is a key component of the U.S. counter-terrorism strategy. To accomplish this, the Bush Administration implemented a three-tiered approach based on: (1) intelligence and domestic legal and regulatory efforts; (2) technical assistance to provide capacity-building programs for U.S. allies; and (3) global efforts to create international norms and guidelines. Effective implementation of this strategy requires the participation of, and coordination among, several elements of the U.S. Government. This report provides an agency-by-agency survey of U.S. efforts as of August 2005. This is a print on demand edition of an important, hard-to-find publication.
“The greatest danger of another catastrophic attack in the United States will materialize if the world's most dangerous terrorists acquire the world's most dangerous weapons.” —The 9/11 Commission Report The bipartisan Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism was established by the U.S. Congress to build on the work of the 9/11 Commission by assessing our nation's progress in preventing weapons of mass destruction proliferation and terrorism, and providing a roadmap to greater security with concrete recommendations for improvement. The Commission has interviewed over 200 experts inside and outside of government. They have met with counterterrorism and intelligence officials here at home and abroad who are working to stop proliferation and terrorism The Commission's report examines the government's current policies and programs, identifies gaps in our government's prevention strategy and recommends ways to close them. The threat of terrorist attacks in the United States and elsewhere is still very real. The world remians at risk There is more that can and must be done. Our security depends on it.
This intelligence guide was prepared in response to requests from law enforcement executives for guidance in intelligence functions in a post-September 11 world. It will help law enforcement agencies develop or enhance their intelligence capacity and enable them to fight terrorism and other crimes while preserving community policing relationships. The world of law enforcement intelligence has changed dramatically since September 11, 2001. State, local, and tribal law enforcement agencies have been tasked with a variety of new responsibilities; intelligence is just one. In addition, the intelligence discipline has evolved significantly in recent years. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. This guide is intended to help them in this process. The guide is directed primarily toward state, local, and tribal law enforcement agencies of all sizes that need to develop or reinvigorate their intelligence function. Rather than being a manual to teach a person how to be an intelligence analyst, it is directed toward that manager, supervisor, or officer who is assigned to create an intelligence function. It is intended to provide ideas, definitions, concepts, policies, and resources. It is a primera place to start on a new managerial journey. Every law enforcement agency in the United States, regardless of agency size, must have the capacity to understand the implications of information collection, analysis, and intelligence sharing. Each agency must have an organized mechanism to receive and manage intelligence as well as a mechanism to report and share critical information with other law enforcement agencies. In addition, it is essential that law enforcement agencies develop lines of communication and information-sharing protocols with the private sector, particularly those related to the critical infrastructure, as well as with those private entities that are potential targets of terrorists and criminal enterprises. Not every agency has the staff or resources to create a formal intelligence unit, nor is it necessary in smaller agencies. This document will provide common language and processes to develop and employ an intelligence capacity in SLTLE agencies across the United States as well as articulate a uniform understanding of concepts, issues, and terminology for law enforcement intelligence (LEI). While terrorism issues are currently most pervasive in the current discussion of LEI, the principles of intelligence discussed in this document apply beyond terrorism and include organized crime and entrepreneurial crime of all forms. Drug trafficking and the associated crime of money laundering, for example, continue to be a significant challenge for law enforcement. Transnational computer crime, particularly Internet fraud, identity theft cartels, and global black marketeering of stolen and counterfeit goods, are entrepreneurial crime problems that are increasingly being relegated to SLTLE agencies to investigate simply because of the volume of criminal incidents. Similarly, local law enforcement is being increasingly drawn into human trafficking and illegal immigration enterprises and the often associated crimes related to counterfeiting of official documents, such as passports, visas, driver's licenses, Social Security cards, and credit cards. All require an intelligence capacity for SLTLE, as does the continuation of historical organized crime activities such as auto theft, cargo theft, and virtually any other scheme that can produce profit for an organized criminal entity. To be effective, the law enforcement community must interpret intelligence-related language in a consistent manner. In addition, common standards, policies, and practices will help expedite intelligence sharing while at the same time protecting the privacy of citizens and preserving hard-won community policing relationships.~
Mark M. Lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. In this Seventh Edition, Lowenthal examines cyber space and the issues it presents to the intelligence community such as defining cyber as a new collection discipline; the implications of the Senate Intelligence Committee’s staff report on enhanced interrogation techniques; the rise of the Islamic State; and the issues surrounding the nuclear agreement with Iran. New sections have been added offering a brief summary of the major laws governing U.S. intelligence today such as domestic intelligence collection, whistleblowers vs. leakers, and the growing field of financial intelligence.