Professional Documents
Culture Documents
Foreign Policy In Focus, established in 1996, is a think tank without walls that
functions as an international network of more than 650 policy analysts and
advocates. A joint project of the Institute for Policy Studies and the
Interhemispheric Resource Center, its mission is to make the U.S. a more
responsible global leader and global partner, with a special emphasis on providing resources to ground and inform social movements. Through its extensive publications, media outreach, organizing events, and congressional work, the project has, since its inception, worked to make a wider space for progressive voices in foreign policy debates on a wide variety of topicsfrom the war in Iraq, to the spread of economic
globalization, to the militarization of Latin America policy, to the threats of global environmental degradation.
FOREIGN POLICY
IN F CUS
TABLE OF CONTENTS
I. Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
A New Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
A. Strengthen Homeland Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
B. Strengthen International and National Legal Systems to Hold Terrorists Accountable . . . . . . . . . . . . . . . . . . 3
C. Defend and Promote Democracy at Home and Abroad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
D. Attack Root Causes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Changing Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
II. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
III. A Failed Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
A. Overemphasis on Military Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
B. Failure in Intelligence Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
C. Undermining Democracy and Civil Liberties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
D. Undermining Homeland Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
E. Weakening International Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
F. Failure to Attack Root Causes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
V. Changing Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Endnotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
App. 1: Funding for Counterterrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
App. 2: Major U.N. Conventions Against Terrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
App. 3: U.N. Security Council Resolutions Regarding Terrorism Post-September 11, 2001. . . . . . . . 47
Foreign Policy In Focus Task Force on Terrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
p. i
www.fpif.org
A Think Tank Without Walls
I. Executive Summary
The Bush administrations war on terrorism
reflects a major failure of leadership and makes
Americans more vulnerable rather than more secure.
The administration has chosen a path to combat terrorism that has weakened multilateral institutions
and squandered international goodwill. Not only has
Bush failed to support effective reconstruction in
Afghanistan, but his war and occupation in Iraq have
made the United States more vulnerable and have
opened a new front and a recruiting tool for terrorists
while diverting resources from essential homeland
security efforts. In short, Washingtons approach to
homeland security fails to address key vulnerabilities,
undermines civil liberties, and misallocates resources.
The administration has taken some successful steps
to counter terrorism, such as improved airline and
border security, a partial crackdown on terrorist
financing, improved international cooperation in
sharing intelligence, the arrest of several high-level alQaida figures, and the disruption of a number of
planned attacks. But these successes are overwhelmed
by policy choices that have made U.S. citizens more
rather than less vulnerable. The Bush White House
has undermined the very values it claims to be
defending at home and abroaddemocracy and
human rights; both Washingtons credibility and its
efforts to combat terrorism are hampered when it
aids repressive regimes. Furthermore, the administration has weakened the international legal framework
essential to creating a global effort to counter terrorism, and it has failed to address the political contextsfailed states and repressive regimesthat
enable and facilitate terrorism.
Six factors explain the failure of the Bush administrations approach:
A. Overemphasis on Military Responses: The Bush
administration has used everyones legitimate concerns about terrorism to justify a massive increase
in military spending that has little or nothing to
do with combating terrorism. According to the
Center for Defense Information, only about onethird of the increase in the FY2003 Pentagon
www.fpif.org
A Think Tank Without Walls
International Criminal Court to nearly all multilateral arms control and disarmament efforts,
including the Biological and Chemical Weapons
Conventions, the ABM Treaty, and the
Comprehensive Test Ban Treaty.
and the folly of traditional responsestypically militaryto threats against U.S. citizens.
www.fpif.org
A Think Tank Without Walls
dual focus: on the cooperative arrangements necessary to insure our protection in an era of international terrorist networks with global reach, and
on deterrence against possible threats from state
antagonists. Such efforts require a vibrant network
of global, regional, and bilateral alliances whereby
the security of the world strengthens the security
of America.
End Support for Repressive Regimes: The United States
must, in both word and deed, make a clean break
with its history of support for repressive regimes
throughout the world. Such a move would entail
curbing military aid, expanding human rights and
democracy, and reducing the dependence of the
United States and its allies on oil imports from
repressive regimes. Additional steps would include:
(1) withholding military aid and opposing
weapons sales to countries that systematically violate basic human rights, and (2) increasing support for human rights and democracy in North
Africa, the Middle East, Central Asia, Southeast
Asia, Colombia, and elsewhere through bilateral
and multilateral initiatives.
Deal with Failed States: The Afghanistan situation,
and the broader reality that weak and failing states
can provide enabling conditions for the operations
of terrorist networks, has highlighted the need for
increasing the U.N.s capacity to engage in peace
enforcement, peacekeeping, and other nationbuilding activities.
Reorient U.S Policy in the Middle East and Central
Asia: A broader U.S. policy along the lines of
respecting basic human rights and democratic
freedoms in the Middle East and elsewhere could
still contribute to easingthough not eradicatingthe conditions associated with terrorism.
Such efforts would involve eliminating weapons of
mass destruction and addressing the political
grievances behind continuing unrest in the region.
This includes opposing the bigotry embodied in
both al-Qaidas and other extremist groups opposition to Israels existence. The United States
should continue its strategic and moral commitment to Israeli sovereignty, but there is a distinction between Israels right to exist and support for
the occupation in the West Bank and Gaza.
www.fpif.org
A Think Tank Without Walls
tion efforts at the international financial institutions, and seek an end to structural adjustment
lending by the World Bank and the International
Monetary Fund.
Promote Clean Energy: The United States should pursue an energy policy at home and abroad that
emphasizes conservation, energy efficiency, and
renewables and that makes itself and its allies less
reliant on imported oil supplies.
Changing Course
No single component of this framework is an adequate response to terrorism. Only by joining all four
strategiespursuing prevention and preparedness,
strengthening the international framework for multilateral action, defending and promoting civil rights,
and addressing root causeswill the U.S. government be able to truthfully tell the American people
that it is doing all that it can to prevent future terrorist attacks. Our proposed security strategy would be
more effective at making the U.S. a safer place for all
its citizens. It would also have the added advantages
p. 6
www.fpif.org
A Think Tank Without Walls
II. Introduction
Everything changed on September 11, 2001, and
the United States will never be the same. This conventional wisdom has become a mantra, repeated
over and over again by the media, and it continues to
echo throughout America. The immediate aftermath
of Sept. 11 offered the United States and the Bush
administration a fateful choice. The Bush administration could have chosen a path to respond to terrorism that built upon a renewed sentiment of interest
in foreign policy, diplomacy, and international affairs
on the part of U.S. citizens and that leveraged the
spirit of international solidarity and goodwill toward
Americans that emerged in the immediate aftermath
www.fpif.org
A Think Tank Without Walls
p. 7
C. Undermining Democracy
and Civil Liberties
Third, the Bush administration has undermined
democracy at home by rolling back governmental
transparency in a manner that reduces accountability
and unnecessarily infringes on civil liberties. The
White House has impeded the investigation by the
National Commission on Terrorist Attacks Upon the
United States of the conditions that facilitated the
Sept. 11 attacks, it has failed to declassify important
documents regarding possible ties between Saudi
Arabian citizens and the Sept. 11 attackers, and it has
compromised the integrity of the Environmental
Protection Agency by pressuring it to alter its reports
on environmental health in lower Manhattan in the
aftermath of the Sept. 11 attacks.
On the civil liberties front, Attorney General John
Ashcroft has demonstrated a consistent willingness to
spearhead what a broad range of citizen groups
from the American Civil Liberties Union to the
National Rifle Associationhave viewed as an intrusive and dangerous effort to expand the governments
ability to spy on its citizens. It was only with a broad
range of citizen mobilization that the most repressive
elements of the initial draft of the USA PATRIOT
Act were deleted from final legislation.
Some provisions of the act, such as those relating to
money laundering and aviation security, are laudable.
But as legal analysts David Cole and James Dempsey
have noted, the USA PATRIOT Act imposes guilt by
association on immigrants; authorizes executive
detention on the suspicion that an immigrant has at
some point engaged in a violent crime or provided
humanitarian aid to a proscribed organization; allows
the government to deny entry to aliens for pure
speech reasons, resurrecting a relic of the McCarthy
era; expands the governments authority to conduct
criminal searches and wiretaps without first showing
www.fpif.org
A Think Tank Without Walls
ing to undermine rather than strengthen international law and is weakening U.S. claims to be a world
leader in the struggle for human rights. The revelations of torture and abuse in Afghanistan and at Abu
Ghraib prison in Iraq, the efforts to unilaterally
exempt U.S. counterterror operations from the
Geneva Conventions, the return or transport of terrorists or other national security suspects to countries
where torture is a widespread or systematic problem,19 and the continued legal limbo of detainees in
Guantanamo all reflect a cavalier approach to global
human rights and international law. Such behavior
makes hypocrisy and double standards appear to be
the norm.
p. 13
p. 14
gaps with respect to the private sector and intelligence operations as well as underfunding critical program areas. (see Box 2).
In terms of economic and educational impacts, the
National Academy of Sciences and over 20 other
educational and academic associations have noted
that problems with the visa security systemincluding the lack of transparency, arbitrariness, and stigma
associated with the current visa processing system
are,
discouraging and preventing the best and brightest
international students, scholars and scientists from
studying and working in the United States, as well as
attending academic and scientific conferences here and
abroad. If action is not taken soon to improve the visa
system, the misperception that the United States does
not welcome international students, scholars and scientists will grow, and they may not make our nation
their destination of choice now and in the future. The
damage to our nations higher education and scientific
enterprises, economy and national security would be
irreparable. In the long run, a robust network of
global interactions is essential to winning this war.
Our nation needs a visa system that does not hinder
such international exchange and cooperation.26
p. 15
p. 17
The Department of Homeland Security has promoted the creation of private-sector information
sharing and analysis centers (ISACs) on a voluntary
basis to facilitate private-sector coordination with the
federal government on homeland security programs
and to serve as mechanisms for gathering, analyzing,
and appropriately sanitizing and disseminating information to and from infrastructure sectors and the
federal government. Because of the voluntary nature
of participation, membership and outreach through
the information sharing and analysis centers covers
just under two-thirds of the private-sector critical
infrastructure in the country, according to the
General Accounting Office.37
According to the ISAC council, the Bush administration has not made adequate provision for the participation of the private sector in national-level
homeland security exercises conducted by the federal
government, such as the Department of Homeland
Securitys May 2003 national terrorism exercise
(TOPOFF 2), which was designed to identify vulnerabilities in the nations domestic incident management capability. (In that exercise the participation of
the private sector was simulated).38 Furthermore,
additional government resources will be necessary to
facilitate the operations of these industry associations,
to support operations, to increase membership, to
develop metrics, and to support capacity-building
activities. Four of the most significant private-sector
issues of concern involve spent reactor fuel pools at
nuclear power plants, the chemical industry, food
safety, and information technology.
www.fpif.org
A Think Tank Without Walls
Box 4: The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets
This government document targets a core mission area identified in the National Strategy for Homeland Security. The
elements of critical infrastructure are identified as: agriculture and food, water, public health, emergency services,
defense industrial base, telecommunications, energy, transportation, banking and finance, chemicals and hazardous
materials, and postal and shipping. Key assets are defined as individual targets whose destruction could cause largescale damage to life, property, and/or national prestige. These are: national monuments, nuclear power plants, dams,
government facilities, and commercial key assets (which refers to the nations 460 skyscrapers).
The report includes a rough inventory of each of these categories (e.g., telecommunications: two billion miles of
cable, oil and natural gas: 300,000 producing sites) and commits the Department of Homeland Security to developing
a comprehensive database of these assets and an assessment of the vulnerabilities of each. Analyzing each sector, the
document briefly assesses vulnerabilities, problems in addressing them, and plans for doing so.
For example, for the chemical industry and hazardous materials, the report warns there is no clear federal legal or
regulatory authority to help ensure comprehensive, uniform standards for chemical facilities. But, it says, since risk profiles vary widely across the industry, because of differences in technologies, product mix, etc., no single security regime
would be appropriate for all. Cautioning that many current laws governing toxics are outdated, the report applauds trade
associations for developing voluntary security codes for their members, though it acknowledges that many of these
members dont comply. The document commits the Department of Homeland Security and the Environmental Protection
Agency to developing legislation requiring the most hazardous facilities to undertake vulnerability assessments (selfevaluation) and to take reasonable steps to reduce vulnerabilities. The report also promises to evaluate whether measures are necessary to regulate the sale of pesticides. Those are its only recommendations for action.
One of the most potentially vulnerable and hazardous sectors, the nuclear power plant complex, receives one of the
most cursory treatments. Security procedures have been enhanced, we are assured, and the Nuclear Regulatory
Commission is evaluating additional measures. Those mentioned are: criminalizing the act of bringing unauthorized
weapons and explosives into nuclear facilities, legislation authorizing security guards to carry more powerful weapons,
applying sabotage laws to nuclear facilities, and public awareness campaigns.
Among the collection of counterterrorism strategy documents, this one wrestles most directly with the conflict between
the administrations ideological impulse to protect private interests and governments responsibility for the public interest.
The report applauds the many businesses that have increased their security to an extent economically justifiable in a
competitive marketplace. The private sector will look to the federal government when the threat appears to exceed a
reasonable security investment, the report says. It speaks of developing incentives for businesses to do more, suggesting that early adopters might be rewarded.
Discussing the role of states and localities, the document acknowledges that they are being asked to do more, and
that their fiscal crises make this extremely difficult. As to what the federal government might be able to do about this
(i.e., help make up the shortfall), the document limits itself to a few extremely vague observations about the need for
unprecedented cooperation across all levels of government to deal with issues of informed resource investment.
Source: White House, The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets,
<http://www.whitehouse.gov/pcipb/physical.html>.
www.fpif.org
A Think Tank Without Walls
p. 19
The most important step that can be taken to significantly reduce this risk is to place all spent fuel
older than five years into thick-walled, dry storage
modes. Germany has done this for the past 25 years
to protect against airplane crashes and terrorist
attacks. The cost of putting the U.S. spent reactor
fuel inventory into dry, hardened storage modes over
the next 10 years is estimated at $3.5 billion to $7
billion, which could be paid from existing funds collected from nuclear-generated electricity for the disposal of this material.
Information Technology
Information technology is essential to virtually all of
the nations critical infrastructures, from the air traffic
control system to the aircraft themselves, from the
electric power grid to the financial and banking systems
and, obviously, from the Internet to communication
systems. In sum, this reliance of all of the nations
critical infrastructures on information technology
makes any of them vulnerable to sabotage through
their computer or telecommunication systems.45
www.fpif.org
A Think Tank Without Walls
312,337
2,463
0
Source: Terrorist attacks data from Department of State, Patterns of Global Terrorism 2003 (revised),
<http://www.state.gov/s/ct/rls/pgtrpt/2003/33777.htm>, computer security incident data from Carnegie Mellon
University Computer Emergency Response Team (CERT), <http://www.cert.org/stats/cert_stats.html>. Also see
James A. Lewis, Cyber Attacks: Missing in Action, Center for Strategic and International Studies, April 2003,
<http://www.csis.org/tech/0403_cyberterror.pdf>.
www.fpif.org
A Think Tank Without Walls
p. 21
www.fpif.org
A Think Tank Without Walls
these areas. The first highlights failures in determining priorities, focusing resources to address vulnerabilities, and setting benchmarks to guide the implementation of the national cyberspace strategy.
The report specifically notes that the DHS has
failed to:
Prioritize its initiatives for addressing the recommendations in the National Strategy to Secure Cyberspace;
Identify the resources needed to ensure that it can
identify, analyze, and reduce long-term cyber
threats and vulnerabilities;
Develop strategic implementation plans, including
performance measures and milestones, focusing on
the divisions priorities, initiatives, and tasks;
Institute a formal communications process both
within the DHS and for interactions with the
public, private, and international sectors;
Initiate and implement a process to oversee and coordinate efforts to develop best practices and create
cybersecurity policies in collaboration with other
government agencies and the private sector; and
Review or update the actions and recommendations
in the National Strategy to Secure Cyberspace.53
Equally troubling, the inspector general also found
that the Department of Homeland Securitys management of intra-departmental IT issues lags far behind
other federal agencies. In particular, the chief information officer at the DHS does not have adequate
authority or resources to insure effective strategic
management of IT resources within the department.
He also lacks the resources to insure effective identification and implementation of information security
standards for the department as a whole.54
These DHS shortcomings highlight key challenges
facing the implementation of an effective cybersecurity strategy and underscore the need for an alternative
policy agenda that would devote adequate resources,
legislation, and attention to a balanced and measured
response to the vulnerabilities of IT systems.
Specific initiatives should:
Create Greater Incentives in the Private Sector: Though
not likely to be a primary terrorist target, the priwww.fpif.org
A Think Tank Without Walls
channels, public health and emergency response systems, utilities and energy, transportation and financial services. Critically, most of these systems consist
of civilian public servants, such as fire, police, and
rescue departments and public health personnel, all
of which will be frontline first responders in case of a
terrorist attack.
Strengthening such infrastructures and public services would have significant positive side effects, since
natural disasters, ordinary criminals, and infectious
disease outbreaks also threaten these systems. The
public health system is critical due to its roles both in
surveillance (i.e., determining if a terrorist attack has
involved biological or chemical weapons) and in the
treatment of victims. Recent exercises of mock terrorist attacks have indicated that public health infrastructures are rapidly overwhelmed in cases of WMD
attacks, suggesting that the public health system
should be a key area for increased spending. These
services require both international and national level
collaboration, as some of the infrastructuressuch as
public health and the Internetcannot just be
addressed nationally.
The burden of preparing for and responding to catastrophic terrorist attacks lies primarily outside the
federal government at the local and state levels and
impacts the private sector companies that own and
operate much of the nations critical infrastructure.
Most of the expertise about both the vulnerabilities
and the most practical protective measures to save
lives and avert mass societal and economic disruption
is to be found outside the federal level as well.
The current federal budget for emergency responders is $27 billion for five years beginning in 2004.
Based on assessments from emergency responder
groups nationwide, a recent Council on Foreign
Relations report estimates that federal, state, and
local efforts in this area will fall short by about $100
billion over the next five years.58 Federal funding
should make up at least half of this shortfall in order
to support a series of improvements including:
upgrading public health and hospital preparedness,
enhancing urban search and rescue operation capabilities, supplying protective gear and WMD remediation equipment to firefighters and police, and providwww.fpif.org
A Think Tank Without Walls
ence between states and terrorists regarding acquisition of weapons of mass destruction is that states can
be deterred from using WMDs by the likelihood of
retaliation. Because terrorists are harder to locate,
they are less easily dissuaded. As a recent report from
the Carnegie Endowment for International Peaces
Nonproliferation Program noted: the nexus of greatest danger comes at the intersection of terrorists and
state stockpiles of nuclear weapons and fissile materials. It remains very difficult for a terrorist group to
produce nuclear weapons material on its own.
Therefore, the security and elimination of state stockpiles of weapons and weapon-usable materials must
become the primary objective.61 Most stockpiles of
weapons-grade material are not held by rogue or outlaw states but rather by entities otherwise seen as
sympathetic to the United States, such as the
republics of the former Soviet Union, Pakistan, and
civilian nuclear power facilities throughout the world.
The Bush administration has been unwilling to allocate greater funding for WMD threat reduction programs, which now cost about $1 billion annually.62
At the same time, one should not overestimate the
likelihood of terrorists using weapons of mass
destruction in an attack. An excessive focus on a
WMD attack may lead to inadequate preparations
for defending against attacks utilizing conventional
weapons. Though terrifying to contemplate, the low
probability/high consequence WMD attacks may not
represent the most significant terrorist threats. More
appropriate risk and threat assessments are necessary
to be able to develop appropriate strategies and to
prioritize spending effectively.
On the global level, the Bush administration has been
hostile to most arms control and disarmament efforts,
including the Biological and Chemical Weapons
Conventions, the ABM Treaty, and the Comprehensive
Test Ban Treaty. Strengthening these regimes, however, represents one of the best means of preventing
access by terrorists to weapons of mass destruction.
In addition, reforms of the export control process
should mean strengthening the current U.S. system
and pursuing better multilateral controls. Especially
in this time of heightened security risks, the question
the U.S. government should be asking is whether
current controls will keep arms, technology, and
p. 25
Foreign Operations Appropriations Act has prevented U.S. military aid from going to foreign
military units where there is credible evidence of
human rights abuses. The law is intended to prevent those specifically accused of abuses from benefiting from U.S. security assistance. But the law
would be more effective if it prevented all military
equipmentno matter who paid for itfrom
going to such units. It should also be made permanent instead of needing to be reapproved on an
annual basis.
Follow through on the International Code of
Conduct Act, which passed as part of the FY2001
State Department Authorization Act and directed
the State Department to pursue a multilateral
agreement on arms transfers. The agreement was
www.fpif.org
A Think Tank Without Walls
p. 29
p. 30
www.fpif.org
A Think Tank Without Walls
www.fpif.org
A Think Tank Without Walls
p. 33
Despite claims by the Bush administration and others that poverty is a key cause of terrorism (a point
we discuss in more detail below), it is political conditions that most shape terrorism. As a National
Academy of Sciences study noted, terrorism and its
supporting audiences appear to be fostered by policies
of extreme political repression and discouraged by
policies of incorporating both dissident and moderate
groups into civil society and the political process.83
p. 34
weapons proliferation, billions of dollars in humanitarian aid, and the emergence of regional complexes
of war and organized crime.
The failure of the Bush administration to develop
an effective strategy to deal with the complex security
challenges posed by failed, failing, and flailing states
is by now apparent and illustrates, yet again, the dangers of framing efforts to combat terrorism as a war
on terrorism. The Afghanistan situation, and the
broader reality that weak and failing states can provide enabling conditions for the operations of terrorist networks, has highlighted the need for increasing
the U.N.s capacity to engage in peace enforcement,
peacekeeping, and other nation-building activities.
Yet Washington remains unwilling to expand support
for U.N. peacekeeping operations. Michael
OHanlon of the Brookings Institution estimates that
the world should double its capacity to engage in
peacekeeping operations, which would provide a
valuable and constructive role for U.S. military assistance that might otherwise be channeled to repressive
governments.85 These missions are important not
only for humanitarian reasons but for national security ones as wellto deprive terrorists of sanctuaries
and sources of income (from diamonds, drug trading,
and the like) that they can often obtain in failed or
failing states.
Specific initiatives should:
Strengthen the multilateral forces involved in
Afghanistan to provide the security necessary for
reconstruction and development; and
Expand support for peacekeeping initiatives through
the U.S. Armys Peacekeeping and Stability Operations
Institute at Carlisle Barracks and expand military
assistance aimed at strengthening other countries
efforts to engage in peacekeeping operations.
4. Reorient U.S. Policy in the Middle East and
Central Asia:
U.S. policy in the Middle East and Central Asia
must also shift. Such a reorientation would include
efforts to eliminate weapons of mass destruction and
to address the political grievances behind continuing
unrest in the region. But U.S. efforts to advance
www.fpif.org
A Think Tank Without Walls
p. 35
Underwrite efforts to provide secular and nonsectarian education as an alternative to religious schools
that promote violent jihadist ideologies.
5. Address Poverty and Inequality:
www.fpif.org
A Think Tank Without Walls
p. 37
V. Changing Course
The sobering reality of terrorism is that it constitutes a threat to individual, national, and international security that can never be completely eliminated.
Despite Americas best efforts, there will always be
ideologues, fanatics, and alienated groups that may
resort to terrorism to express their frustration and to
make their political point.
No single component of the framework outlined
above is an adequate response to terrorism. Only by
joining all four strategiespursuing prevention and
preparedness, strengthening the international framework for multilateral action, defending and promoting civil rights, and addressing root causeswill the
U.S. government be able to tell the American people
that it is doing all that it can to prevent future terrorist attacks. Our proposed security strategy would be
more effective at making the U.S. a safer place for all
its citizens. It would also have the added advantages
of improving the nations quality of life by improving
public safety, health care, and air quality.
The 9/11 Commission has accomplished a great
deal by placing this debate at the forefront of policy
debates. But its recommendations focus somewhat
narrowly on intelligence operations and congressional
oversight without addressing the broader foreign policy, military, and homeland security issues that are
equally important to constructing an effective
response to terrorism. Its contribution, while essential, remains inadequate to forging the comprehensive
strategy necessary to effectively combat terrorism.
Combating terrorism should not become a crusade
that trumps all other policy concerns. Commitments
to environmental protection, human rights, democratic political transitions, economic development,
poverty alleviation, disarmament, and gender equalityto name a few of the stated U.S. policy goals
must remain strong. But neither can counterterrorism
simply be appended to these policy imperatives.
p. 38
www.fpif.org
A Think Tank Without Walls
Endnotes
1
Ibid.
See Thomas P. Barnett, The Pentagons New Map (New York: G.P.
Putnam, 2004), p. 31.
For the cost of the Iraq War see Institute for Policy Studies and
Foreign Policy In Focus, Paying the Price: The Mounting Costs of the
Iraq War, June 2004 at: <http://www.fpif.org/papers/0406costsofwar.html>. Also see U.S. Government Accountability Office,
Military Operations: Fiscal Year 2004 Costs for the Global War on
Terrorism Will Exceed Supplemental, Requiring DOD to Shift Funds
www.fpif.org
A Think Tank Without Walls
11
12
13
14
15
p. 39
17
18
19
20
21
22
23
p. 40
24
25
26
27
28
29
30
See, for example, the discussions of an alternative approach, the creation of a National Counter Terrorism Center, proposed by the
Advisory Panel to Assess Domestic Response Capabilities for
www.fpif.org
A Think Tank Without Walls
32
33
Robert Block, Gary Fields, and Jo Wrighton, U.S. Terror List Still
Lacking, Wall Street Journal, January 2, 2004.
34
35
36
37
38
Ibid., p. 37.
39
40
41
www.fpif.org
A Think Tank Without Walls
43
Ibid.
44
45
46
47
48
49
50
51
p. 41
52
53
54
55
56
57
58
63
59
64
60
On the broad public health issues, see Joshua Shemer and Yehuda
Shoenfeld, Terror and Medicine: Medical Aspects of Biological,
Chemical and Radiological Terrorism (Lengerich, Germany: Pabst
Science Publishers, 2003). On the methodology for establishing criteria to evaluate the readiness of metropolitan regions to respond to
terrorist attacks, see Frederick J. Manning and Lewis Goldfrank,
eds., Preparing for Terrorism: Tools for Evaluating the Metropolitan
Medical Response System Program (Washington: National Academy of
Sciences Press, 2002). For issues involving psychological impacts, see
Institute of Medicine, Preparing for the Psychological Consequences of
Terrorism: A Public Health Strategy (Washington: National Academy
of Sciences Press, 2003). Concerns about weaknesses in the public
health infrastructure that were highlighted in the anthrax attacks
were addressed prior to the Sept. 11 attacks. See National Research
Council, Improving Civilian Medical Response to Chemical or
Biological Terrorist Incidents Interim Report on Current Capabilities
(Washington: National Academies Press, 1998).
65
66
67
68
69
70
61
62
p. 42
www.fpif.org
A Think Tank Without Walls
72
See, for example: Ibid; various reports from the United Nations
1267 Monitoring Group; Council on Foreign Relations, Terrorist
Financing (New York: Council on Foreign Relations, 2002); and
Council on Foreign Relations, Update on the Global Campaign
Against Terrorist Financing: Second Report of an Independent Task
Force on Terrorist Financing (New York: Council on Foreign
Relations, June 2004).
73
74
75
76
77
www.fpif.org
A Think Tank Without Walls
79
See <http://www.aclu.org/SafeandFree/SafeandFree.cfm?
ID=11817&c=206> and documents at the Paul Revere project at:
<http://freedom.idahogreenparty.org/>.
80
For more information on the Civil Liberties Restoration Act, see the
analysis by the Rights Working Group at:
<http://www.rightsworkinggroup.org/>. For more information on
the SAFE Act, see the Electronic Frontier Foundations analysis at:
<http://www.eff.org/Privacy/Surveillance/Terrorism/PATRIOT/
safe_act_analysis.php>.
81
82
83
84
See, for example, Robert I. Rotberg, The New Nature of NationState Failure, The Washington Quarterly, vol. 25, no. 3, Summer
2002, pp. 85-96, and Commission on Weak States and U.S.
National Security, On the Brink: Weak States and U.S. National
Security (Washington: Center for Global Development, 2004) at:
<http://www.cgdev.org/docs/Full_Report.pdf>.
85
86
87
88
89
p. 43
91
92
93
For the negative view, see Alan Krueger and Jitka Maleckova,
Education, Poverty, and Terrorism: Is There a Causal Connection?
Journal of Economic Perspectives, vol. 17, no. 4, Fall 2003, pp. 11944. For the positive view, see Kim Cragin and Peter Chalk, Terrorism
& Development: Using Social and Economic Development to Inhibit a
Resurgence of Terrorism (Santa Monica, Calif.: RAND, 2003), case
studies of Northern Ireland, Palestine, and the Philippines. But, as
Cragin and Chalk note, inadequately funded or administered programs can create rising expectations, which are subsequently unmet.
This can generate a backlash and reinforce nascent support for terrorist activities.
94
p. 44
96
97
www.fpif.org
A Think Tank Without Walls
2002 Enacted
2002 Supp.
2003 Enacted
2003 Supp.
2004 Request
$230.5
96.8
11,153.0
1,232.9
434.0
11,398.6
14.6
1,018.7
71.4
1,693.1
634.5
85.0
47.0
12.5
2.0
46.4
88.6
114.0
239.9
2.5
113.0
13.0
7.0
6.5
62.5
7.0
29.0
$28,854.9
$322.2
18.7
3,047.0
303.1
1,479.4
5,981.5
92.6
1,124.4
5.9
330.6
784.4
31.7
2.0
139.0
175.0
138.0
51.0
483.0
109.0
19.6
8.0
200.0
3.0
36.4
587.0
27.8
$15,501.4
$385.0
110.3
17,550.0
1,482.3
3,602.8
19,058.7
2.0
110.9
1,973.8
69.4
1,871.3
382.8
80.0
147.2
36.0
107.7
43.0
94.6
701.3
163.0
284.6
3.0
132.0
25.0
1.0
11.0
1.0
35.3
82.8
8.0
57.0
$48,611.6
$110.0
77.5
142.0
4,305.0
25.0
457.2
214.0
39.0
969.6
$6,339.3
$368.2
153.4
15,172.0
1,588.1
3,775.5
23,890.9
2.0
114.8
2,289.4
67.2
2,365.7
282.9
90.4
145.0
104.0
123.1
37.0
95.7
1,157.3
170.0
307.5
3.0
147.0
15.0
1.0
12.0
53.2
80.1
8.0
118.0
$52,737.2
www.fpif.org
A Think Tank Without Walls
p. 45
Appendix 2:
Major U.N. Conventions Against Terrorism
Convention on Offenses and Certain Other Acts
Committed on Board Aircraft, signed at Tokyo on
September 14, 1963.
p. 46
www.fpif.org
A Think Tank Without Walls
Appendix 3:
United Nations Security Council
Resolutions Regarding Terrorism
Post-September 11, 2001
Resolution 1368: Adopted September 12, 2001
Condemns the terrorist attacks of September 11,
2001, and those responsible for the support of the
relevant terrorist organizations and calls on the international community to participate in the cooperation
and full implementation of relevant international
anti-terrorist conventions and Security Council resolutions; in particular, Resolution 1269.1
Resolution 1373: Adopted September 28, 2001
Reaffirms previous commitments to anti-terrorism
and obligates all member statesunder Chapter VII
of the Charter of the United Nations2to criminalize terrorist funds and states harboring or supporting
terrorists and to establish effective border control regulations. The resolution creates the CounterTerrorism Committee as a subsidiary body of the
Security Council to monitor the implementation of
Resolution 1373 and to increase the capability of
states to fight terrorism.
Resolution 1377: Adopted November 12, 2001
Calls on all states to implement the affirmations in
Resolution 1373, welcomes the commitment of states
to fight international terrorism, and encourages all
states to become parties to the relevant international
conventions and protocols.
www.fpif.org
A Think Tank Without Walls
p. 47
funds, denying entry, etc.) and strengthens the mandate of the assigned committee to include monitoring
the implementation of these measures under
Resolution 1267 (1999).
Resolution 1530: Adopted March 11, 2004
Strongly condemns the bombings in Madrid, Spain,
on March 11, 2003 (although the resolution identifies the perpetrators as the ETA) and reaffirms the
need to combat terrorism by all means in accordance
with the U.N. Charter.
Resolution 1535: Adopted March 26, 2004
Restructures the organization of the CounterTerrorism Committee.
These are actions with respect to peace, breaches of peace, and acts
of aggression.
p. 48
www.fpif.org
A Think Tank Without Walls
ROBERT ALVAREZ
Senior Scholar
Nuclear Policy Project
Institute for Policy Studies
(202) 234-9382
<kitbob@starpower.net>
<www.ips-dc.org>
SALIH BOOKER
Executive Director
Africa Action
(202) 546-7961
<sbooker@africaaction.org>
<www.africaaction.org>
JOHN CAVANAGH
Director
Institute for Policy Studies
(202) 234-9382, ext. 224
<jcavanagh@igc.org>
<www.ips-dc.org>
MARCUS CORBIN
Senior Analyst
Center for Defense Information
(202) 797-5282
<mcorbin@cdi.org>
<www.cdi.org/mrp>
DAVID CORTRIGHT
President
Fourth Freedom Forum
(800) 233-6786, ext. 14
<dcortright@fourthfreedom.org>
<www.fourthfreedom.org>
www.fpif.org
A Think Tank Without Walls
KRISTEN DAWKINS
Vice President for International Programs and Director for the
Trade and Global Governance Program
Institute for Agriculture and Trade Policy
(612) 870-0453
<kdawkins@iatp.org>
<www.iatp.org>; <www.wtowatch.org>
LLOYD J. DUMAS
Professor of Political Economy
University of Texas at Dallas
(972) 883-2010; (972) 394-4637
<ljdumas@utdallas.edu>
JOHN FEFFER
Policy Analyst
Foreign Policy In Focus
(301) 779-3941
<johnfeffer@earthlink.net>
VAN GOSSE
Co-Chair
Historians Against War
(717) 291-4246
<vgosse@fandm.edu>
<www.historiansagainstwar.org>
WILLIAM D. HARTUNG
Presidents Fellow
Arms Trade Resource Center
World Policy Institute
(212) 229-5808, ext. 106
<hartung@newschool.edu>
<www.worldpolicy.org >
COLLEEN KELLY
Co-director
September 11th Families for Peaceful Tomorrows
(212) 598-0970
<colleen@peacefultomorrows.org>
<www.peacefultomorrows.org>
p. 49
MICHAEL KLARE
Professor of Peace & World Security Studies
Hampshire College
(413) 559-5563
<mklare@hampshire.edu>
<www.pawss.hampshire.edu>
DR. LAWRENCE J. KORB
Senior Fellow, Center for American Progress
Senior Adviser, Center for Defense Information
(202) 682-1611; (202) 332-0600
<lkorb@americanprogress.org>
<www.americanprogress.org>; <www.cdi.org>
JULES LOBEL
Professor
University of Pittsburgh Law School
(412) 648-1375
<lobel@law.pitt.edu>
<www.law.pitt.edu>
JOE STORK
Washington Director
Middle East / North Africa Division
Human Rights Watch
(202) 612-4321
<storkj@hrw.org>
<www.hrw.org>
JOE VOLK
Executive Secretary
Friends Committee on National Legislation
(202) 547-6000, ext. 144
<joe@fcnl.org>
<www.fcnl.org>
BRUCE ZAGARIS
Partner
Berliner Corcoran & Rowe, L.L.P.
(202) 293-5555
<bzagaris@bcr-dc.com>
<www.bcr-dc.com>
JOHN ZAVALES
Research Fellow
Cuny Center
(703) 549-1261
<zavalesjg@aol.com>
<www.thecunycenter.org>
STEPHEN ZUNES
Professor, Department of Politics
University of San Francisco
(415) 422-6981
<zunes@usfca.edu>
<www.fpif.org>
Published by Foreign Policy In Focus (FPIF), a joint project of the Interhemispheric Resource Center (IRC, online at www.irc-online.org) and the
Institute for Policy Studies (IPS, online at www.ips-dc.org). 2004. All rights reserved.
Foreign Policy In Focus Task Force on Terrorism, A Secure America in a Secure World, (Silver City, NM & Washington, DC: Foreign Policy In Focus,
September 2004).
Web location:
http://www.fpif.org/
Production Information:
p. 50
w w w. f p i f . o r g
A Think Tank Without Walls
FOREIGN POLICY
IN F CUS
Interhemispheric Resource Center
PO Box 2178
Silver City, NM 88062
(505) 388-0208
www.irc-online.org
Institute for Policy Studies
733 15th St. NW, Suite 1020
Washington, DC 20005
(202) 234-9382
www.ips-dc.org
Cost: $10.00