[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
DENYING SAFE HAVENS: HOMELAND SECURITY'S EFFORTS TO COUNTER THREATS
FROM PAKISTAN, YEMEN, AND SOMALIA
=======================================================================
HEARING
before the
SUBCOMMITTEE ON OVERSIGHT,
INVESTIGATIONS, AND MANAGEMENT
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
JUNE 3, 2011
__________
Serial No. 112-29
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
72-239 WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Kathleen C. Hochul, New York
Billy Long, Missouri Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
Michael J. Russell, Staff Director/General Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON OVERSIGHT, INVESTIGATIONS, AND MANAGEMENT
Michael T. McCaul, Texas, Chairman
Gus M. Bilirakis, Florida William R. Keating, Massachusetts
Billy Long, Missouri, Vice Chair Yvette D. Clarke, New York
Jeff Duncan, South Carolina Danny K. Davis, Illinois
Tom Marino, Pennsylvania Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Dr. R. Nick Palarino, Staff Director
Diana Bergwin, Subcommittee Clerk
Tamla Scott, Minority Subcommittee Director
C O N T E N T S
----------
Page
STATEMENTS
The Honorable Michael T. McCaul, a Representative in Congress
From the State of Texas, and Chairman, Subcommittee on
Oversight, Investigations, and Management:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable William R. Keating, a Representative in Congress
From the State of Massachusetts, and Ranking Member,
Subcommittee on Oversight, Investigations, and Management...... 8
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Prepared Statement............................................. 9
WITNESSES
Panel I
Ms. Jacquelyn L. Williams-Bridgers, Managing Director,
International Affairs and Trade, Government Accountability
Office:
Oral Statement................................................. 11
Prepared Statement............................................. 13
Mr. Mark Koumans, Deputy Assistant Secretary, International
Affairs, U.S. Department of Homeland Security:
Oral Statement................................................. 18
Prepared Statement............................................. 19
Ms. Shari Villarosa, Deputy Coordinator for Regional Affairs,
U.S. Department of State:
Oral Statement................................................. 25
Prepared Statement............................................. 27
Mr. James Q. Roberts, Principal Director for Special Operations
and Combating Terrorism, Office of Special Operations/Low-
Intensity Conflict and Interdependent Capabilities, U.S.
Department of Defense:
Oral Statement................................................. 32
Prepared Statement............................................. 33
Panel II
Mr. Steve Coll, President and CEO, New America Foundation:
Oral Statement................................................. 46
Prepared Statement............................................. 47
Mr. Bruce Hoffman, Director, Center for Peace and Security
Studies, Director, Security Studies Program, Georgetown
University:
Oral Statement................................................. 52
Prepared Statement............................................. 54
Mr. Daniel L. Byman, Security Studies Program, School of Foreign
Service at Georgetown University, and Senior Fellow, Saban
Center for Middle East Policy, The Brookings Institution:
Oral Statement................................................. 59
Prepared Statement............................................. 60
DENYING SAFE HAVENS: HOMELAND SECURITY'S EFFORTS TO COUNTER THREATS
FROM PAKISTAN, YEMEN, AND SOMALIA
----------
Friday, June 3, 2011
U.S. House of Representatives,
Subcommittee on Oversight, Investigations, and
Management,
Committee on Homeland Security,
Washington, DC.
The subcommittee met, pursuant to call, at 10:05 a.m., in
Room 311, Cannon House Office Building, Hon. Michael T. McCaul
[Chairman of the subcommittee] presiding.
Present: Representatives McCaul, Bilirakis, Long, Duncan,
Keating, and Clarke.
Mr. McCaul. Good morning. The committee will come to order.
I would like to welcome our witnesses to this hearing entitled
``Denying Safe Havens: Homeland Security's Efforts to Counter
Threats from Pakistan, Yemen, and Somalia.''
Although Osama bin Laden is dead, al-Qaeda and its
affiliates are not. They are hiding in safe havens, areas of
relative security that are exploited by terrorists to recruit,
train, raise funds, and plan operations.
The Department of State has identified 13 countries acting
as safe havens today. Today, we examine three that we believe
pose the most serious threat to the United States--and that is
Pakistan, Yemen, and Somalia--and what is the U.S. Government
doing to deny these places as a refuge for terrorists.
Osama bin Laden was the most-wanted terrorist. Yet he lived
comfortably in Abbottabad, Pakistan, in a town that serves as a
headquarters for frontier force and infantry regiments only 31
miles from Islamabad, contrary to our belief that he was hiding
in some cave in the FATA or the frontier. He was not hiding in
a cave. He was not in the mountains. His compound was less than
1 mile--or about half the distance from here to the Washington
Monument--from the Pakistan Military Academy, or their
equivalent of West Point, where over 2,000 cadets are trained,
600 instructors teach, and approximately 2,000 representatives
from other countries visit and receive training each year.
CNN recently reported that Osama bin Laden sought a deal
with Pakistan in which he would not attack Pakistan in exchange
for protection. At this point, we do not know who in the
Pakistani government was aware of Osama bin Laden's presence,
but I am certain that some Pakistan officials knew that he was
living in plain sight, not exactly the average house in an
ordinary neighborhood. It stuck out like a sore thumb.
It is difficult to determine how many terrorist groups
operate out of Pakistan, but we do know al-Qaeda and the Afghan
Taliban and the Pakistani Taliban and other groups use this
country as a staging ground for attacks on U.S. troops, to kill
American citizens, and terrorize countries throughout the
world.
For example, Mullah Omar, the spiritual leader of the
Taliban, is believed to be in Pakistan. Anwar al-Awlaki is
hiding in Yemen. He is the equivalent of the bin Laden of the
internet. He provides spiritual guidance and recruits
terrorists via YouTube and Facebook. He has inspired more than
2 dozen terror plots against the United States in the past 2
years. The Fort Hood shooter, Nidal Hasan, e-mailed al-Awlaki
on numerous occasions before he killed 13 people, including
soldiers, and wounding 30 others. Abdulmutallab, the Christmas
bomber, was in contact with al-Awlaki before attempting to set
off an explosive on board Northwest Flight 254, an
international flight bound for Detroit.
With the death of bin Laden, many experts believe al-Qaeda
in the Arabian Peninsula based in Yemen will attempt to become
the successor. Because there is no central authority in
Somalia, al-Qaeda and other associated terrorist groups will
also use it as a base of operations to attack Western targets.
According to the 2009 Report on Terrorism issued by the
National Counterterrorism Center, al-Shabaab is also considered
by U.S. officials as one of the most deadly terrorist groups in
the world. Not only is Somalia a base for terrorists, but
pirates operating off the coast are a threat to international
shipping. This has contributed to an increase in shipping costs
and the delivery of food aid shipments. Ninety percent of the
world's food programs' shipments into Somalia arrive by sea and
ships and now require a military escort.
Numerous documents have addressed the problem of terrorist
safe havens. The 9/11 Commission's report to Congress concluded
the safe haven of Afghanistan allowed al-Qaeda operational
space to gather recruits and build logistical networks to
conduct attacks against the United States.
The Obama administration's National Security Strategy
states: We will deny safe havens and strengthen at-risk states.
This NSS report points out a whole-government approach that is
needed to include information sharing, law enforcement
cooperation, and establishing new practices to counter
terrorists. The document also requires the United States to
help countries build capacities for responsible governance and
security.
Existing U.S. law, the Intelligence Reform and Terrorism
Prevention Act of 2004 and the National Defense Authorization
Act for Fiscal Year 2010, requires the administration to
produce a list of what each agency is doing to deny terrorists
safe havens.
The Government Accountability Office, or GAO, examined the
U.S. Government approach and concluded, No. 1, that safe havens
are a threat to the United States; and No. 2, a more
comprehensive list of agency efforts is needed so Congress can
adequately oversee and assess how the United States is denying
safe havens to terrorists. In other words, GAO concludes that
this administration is not complying with these requirements.
We currently have an incomplete picture of what each of
these countries is doing to eliminate safe havens, what they
are doing to prevent the proliferation and tracking of weapons
of mass destruction, and what they are doing to cooperate with
U.S. counterterrorism officials. This knowledge is vital to
Congress' ability to craft foreign policy that holds countries
accountable for aiding terrorists by looking the other way.
I applaud our Government's efforts, but more has to be
done. Eliminating the terrorist's base of operations where they
have the ability to recruit, train, and plan their operations
is the key to preventing future attacks on American soil. Osama
bin Laden orchestrated the 9/11 attacks from his safe haven in
Afghanistan. Anwar al-Awlaki has been able to inspire more than
2 dozen plots against the United States over the past 2 years,
including the Fort Hood shootings and the Christmas bomber.
This hearing will assess the role of the U.S. Government in
denying the terrorists the ability to reconstitute.
Before I yield my time to the Ranking Member, I do want to
thank the brave men and women of our Armed Services, the
civilians in the Departments of State and Homeland Security,
and those across Government agencies who serve overseas. They
constitute our best defense against the terrorists who want to
kill us.
[The statement of Chairman McCaul follows:]
Prepared Statement of Chairman Michael T. McCaul
June 3, 2011
Good morning. Welcome to this Oversight, Investigations, and
Management Subcommittee hearing titled ``Denying Terrorist Safe Havens:
Homeland Security's Efforts to Counter Threats From Pakistan, Yemen,
and Somalia''.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Although Osama bin Laden is dead, al-Qaeda and its affiliates are
not. They are hiding in safe havens--areas of relative security that
are exploited by terrorists to recruit, train, raise funds, and plan
operations. The Department of State has identified 13 countries acting
as safe havens. Today we examine three that we believe pose the most
serious threat to the United States--Pakistan, Yemen, and Somalia--and
what the U.S. Government is doing to deny these places as a refuge for
terrorists.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Osama bin Laden was a hunted man, yet he lived comfortably in
Abbottabad, Pakistan, a town that serves as the headquarters for
Frontier Force and Infantry regiments only 31 miles from Islamabad. He
was not hiding in a cave. He was not in the mountains. His compound was
less than 1 mile--or about half the distance from here to the
Washington Monument--from the Pakistan Military Academy where over
2,000 cadets are trained, 600 instructors teach, and approximately
2,000 representatives from other countries visit and receive training
each year.
CNN recently reported that Osama bin Laden sought a deal with
Pakistan in which he would not attack Pakistan in exchange for
protection. At this point we do not know who in the Pakistani
Government was aware of Osama bin Laden's presence, but I am convinced
some Pakistani officials knew that he was living in plain sight. Not
exactly the average house in an ordinary neighborhood. It stuck out
like a sore thumb.
It is difficult to determine how many terrorist groups operate out
of Pakistan. But we do know al-Qaeda, the Afghan Taliban, the Pakistani
Taliban and other groups use this country as a staging ground for
attacks on U.S. troops, to kill American citizens, and terrorize
countries throughout the world. For example, Mullah Omar, the spiritual
leader of the Taliban, is believed to be in Pakistan.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Anwar al Awlaki is hiding in Yemen. He is the bin Laden of the
internet because he provides spiritual guidance and recruits terrorists
via YouTube and Facebook. He has inspired more than 2 dozen terror
plots against the United States over the past 2 years. The Fort Hood
shooter, Nidal Hasan emailed al Awalaki on numerous occasions before
killing 13 people and wounding 30 others. Umar Farouk Abdulmuttalab,
the Christmas bomber, was in contact with al Awalaki before attempting
to set off an explosive on-board Northwest Flight 254, an international
flight on approach to Detroit.
With the death of bin Laden, many experts believe al-Qaeda in the
Arabian Peninsula, based in Yemen, will attempt to become the successor
to al-Qaeda.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Because there is no central authority in Somalia, al-Qaeda and
other associated terrorist groups will use it as a base of operations
to attack Western targets. According to the 2009 Report on Terrorism
issued by the National Counterterrorism Center, al-Shabaab is
considered by U.S. officials as one of the most deadly terrorists
groups in the world.
Not only is Somalia a base for terrorists, but pirates operating
off its coast are a threat to international shipping. This has
contributed to an increase in shipping costs and impeded the delivery
of food aid shipments. Ninety percent of the World Food Program's
shipments into Somalia arrive by sea, and ships into this area now
require a military escort.
Numerous documents have addressed the problem of terrorist safe
havens.
The 9/11 Commission's report to Congress concluded the safe
haven of Afghanistan allowed al-Qaeda operational space to
gather recruits and build logistical networks to conduct
attacks against the United States.
The Obama administration National Security Strategy (NSS)
states we will ``Deny Safe Havens and Strengthen At-Risk
States.'' The NSS points out a whole-of-government approach
(interagency collaboration) is needed including information
sharing, law enforcement cooperation, and establishing new
practices to counter terrorists. The document also requires the
United States to help countries build capacities for
responsible governance and security.
Existing U.S. law (the Intelligence Reform and Terrorism
Prevention Act of 2004 and the National Defense Authorization
Act for Fiscal Year 2010) requires the administration to
produce a list of what each agency is doing to deny terrorists
safe havens.
The Government Accountability Office (GAO) examined the U.S.
Government approach and concluded: (1) Safe havens are a threat
to the United States, and (2) a more comprehensive list of
agency efforts is needed so Congress can adequately oversee and
assess how the United States is denying safe havens to
terrorists.
We currently have an incomplete picture of what each of these
countries is doing to eliminate safe havens, what they are doing to
prevent the proliferation and tracking of weapons of mass destruction,
and what they are doing to cooperate with U.S. counter-terrorism
officials. This knowledge is vital to Congress's ability to craft
foreign policy that holds countries accountable for aiding terrorists
by looking the other way.
I applaud our Government's efforts but more has to be done.
Eliminating the terrorists' base of operations where they have the
ability to recruit, train, and plan their operations is the key to
preventing attacks on American soil. Osama bin Laden orchestrated the
9/11 attacks from a safe haven in Afghanistan. Anwar al Awlaki has been
able to inspire more than 2 dozen plots against the United States over
just the past 2 years including the Fort Hood shootings and Christmas
bomber. This hearing will assess the role of the U.S. Government in
denying the terrorists the ability to reconstitute.
Before I yield my time I would like to thank the brave men and
women of our armed services, the civilians in the Departments of State
and Homeland Security and all those from other U.S. Government agencies
who serve overseas. They constitute our best defense against the
terrorist who want to kill us.
Also I want to thank our witnesses today and look forward to
hearing their testimonies.
Mr. McCaul. With that, I yield and recognize the Ranking
Member of this committee, Mr. Keating.
Mr. Keating. Thank you, Mr. Chairman; and thank you for
convening today's hearing on U.S. efforts to deny terrorist
safe havens and counter threats from Pakistan, Yemen, and
Somalia.
The terrorist attacks of 9/11 were coordinated, as we all
know, from a safe haven in Afghanistan. The 9/11 Commissioners
later stated that the U.S., ``strategy should include offensive
operations to counterterrorism,'' and terrorists should no
longer find safe havens where their organizations can grow and
flourish.
Terrorism in America right now is our No. 1 security
threat. Denying safe haven to terrorists is a paramount concern
to our homeland security and an important step in keeping our
communities safe from terrorism.
We know that safe havens exist in ungoverned, under-
governed, and ill-governed areas of the world. These havens
provide terrorists with cover and allow them the space to
operate and plan vicious terrorist attacks.
There are multiple agencies that play a role in
implementing U.S. counterterrorism efforts, and I thank the
panel for taking their time today to join us as part of that
grouping.
The Departments of State, Homeland Security, Justice, and
Defense are all but a few of the U.S. agencies that combine
their efforts in countering this threat; and I am interested in
hearing today from our witnesses the level of cooperation that
presently exists among the various agencies and whether this
multi-agency approach is producing positive results for our
homeland security. I think cooperation is one of the challenges
that we all face in a threat so complicated and serious as
this, and it is important that coordination exist as seamlessly
as possible.
I am concerned that Congress receive a full and
comprehensive listing of our Government's efforts, especially
in light of the risk safe havens pose to the safety and
security of U.S. interests, both at home and abroad. One hand
needs to know what the other hand is doing, and the production
of this report in the manner intended by Congress will allow
that to happen.
While today's focus is on physical safe havens, we must
also consider the broader safe havens of the future. Electronic
infrastructure and global communications play an important role
in terrorist operations and allow for virtual safe havens that
are much harder to track, disrupt, and dismantle than physical
safe havens.
Furthermore, the May 1 killing of Osama bin Laden, who
escaped detection by hiding in a safe haven located in a
heavily populated area, governed area, that indicates that the
terms of safe haven does not always equate with remoteness, in
scarcely populated areas, or lawless areas.
I look forward to hearing from both panels and receive
their recommendations on strategies on the best approach for
addressing terrorist safe havens, and I yield back my time.
Mr. McCaul. I thank the Ranking Member, and I couldn't
agree with you more that the virtual safe havens are a threat
as well. I know we have had hearings on radicalization over the
internet, which I think poses one of the biggest threats we
have today.
Other Members are reminded that opening statements may be
submitted for the record.
[The statement of Ranking Member Thompson follows:]
Prepared Statement of Ranking Member Bennie G. Thompson
June 3, 2011
Thank you, Chairman McCaul, for convening this hearing.
I would also like to thank our witnesses for their participation,
and I look forward to hearing their testimony.
Last month, the United States achieved a major milestone in our on-
going effort to secure our homeland from acts of terrorism.
The killing of Osama bin Laden, without a doubt, made the United
States, in particular, and the entire world, in general, a safer place
to live.
However, it did not remove the on-going threat from terrorist
forces that continue to seek to do us harm.
We know that terrorists rely on safe havens to organize, plan,
raise funds, communicate, recruit, train, and operate in relative
obscurity.
They also use safe havens to plan attacks--some of which focus on
killing innocent Americans--in an effort to further their ideological
goals.
These safe havens provide security for terrorists because in these
areas they are able to operate outside of the law, in uncontrolled
territory, with little or no government interference.
In August 2010, the Department of State identified 13 terrorist
safe havens, including areas in Pakistan, Somalia, and Yemen.
These areas experience widespread terrorist activities that
illustrate the danger in identified safe haven locations.
According to the National Counterterrorism Center, in 2010 alone,
there were approximately 200 terrorist attacks in Yemen, more than 580
in Somalia, and 1,331 in Pakistan.
Terrorists from these countries have also sought to attack United
States interests.
For example, al-Qaeda in the Arabian Peninsula, or AQAP, which
operates in Yemen, claimed responsibility for the attempted 2009
Christmas day bombing of a plane headed to the United States; in
addition to the attempted package bombings on U.S.-bound aircraft in
October 2010.
Congress has mandated that the U.S. Government issue reports that
identify where terrorist safe havens exist and assess U.S. Government
efforts in addressing them.
The reporting of this vital information to Congress is the first
step in ensuring Congressional oversight of Government-wide efforts in
denying terrorist safe havens and taking efforts to dismantle and
disrupt their existence.
Unless the United States identifies where safe havens are located
and the steps being taken to protect the homeland in light of their
existence, Congress cannot fully measure the adequacy of U.S. efforts.
Unfortunately, GAO will release a report today that indicates that
since 2004 Federal Government agencies have not fully complied with
Congressional reporting requirements.
As a result, not once has Congress received a comprehensive
Government-wide list of U.S. efforts to deny safe haven to terrorists,
as required by law.
Last year, several efforts were implemented to improve the U.S.
Government response to addressing terrorist safe havens.
The 2010 National Security Strategy declared that ``denying safe
haven to terrorists is an essential component of the U.S. strategy to
defeat al-Qaeda and its affiliates.''
Furthermore, the 2010 National Defense Authorization Act for Fiscal
Year 2010 reiterated safe haven reporting requirements and I am pleased
to learn that for the first time ever, a more comprehensive report is
underway.
I look forward to receiving testimony from our Government panel
which should shed light on U.S. Government efforts.
I am also interested in hearing from our panel of experts regarding
the extent to which terrorist safe havens pose a threat to U.S.
homeland security.
I yield back.
Mr. McCaul. We are pleased to have a very distinguished
panel of witnesses before us today on this important topic, and
I want to introduce each of you. I hope we can get through your
testimony. We have a series of votes coming up probably in
about 30 minutes from now. It will be two votes, and then we
will return to the hearing.
First, we have Ms. Jacquie Williams-Bridgers, who is the
Managing Director of the International Affairs and Trade Team
for the U.S. Government Accountability Office. She began her
professional career in the GAO in 1978.
Ms. Williams-Bridgers has also been Inspector General of
the U.S. Department of State and the U.S. Arms Control and
Disarmament Agency, and it is a pleasure to have you here
today.
Next, we have Mr. Mark Koumans, who is the Deputy Assistant
Secretary for International Affairs at the U.S. Department of
Homeland Security. He is responsible for coordinating the
Department's international programs and policies.
Prior to joining DHS, he served in the U.S. Foreign
Service, concentrating on counterterrorism and security issues;
and it is an honor to have you here today as well, sir.
Next, we have Ms. Shari Villarosa, who is the Deputy
Coordinator for Regional Affairs at the U.S. Department of
State. Previously, she served as Chief of Mission in Burma; and
her expansive Foreign Service career has included overseas
assignments in Thailand, Brazil, and Ecuador, among others.
Next, we have Mr. James Roberts. He serves as the Principal
Director for Special Operations and Combating Terrorism in the
Office of Secretary of Defense. Mr. Roberts began his
Government career as a U.S. Army private in 1968 and served 24
years on active duty as a military intelligence officer. We
thank you for your service to our country and thank all of you
for being here today.
I have been informed that we are going to have votes in
about probably 5 minutes or so. In fact, they just called it
just now.
I think we can proceed with some of the testimony. They
usually keep the votes open for about 30 minutes.
So, with that, Ms. Williams-Bridgers is recognized.
STATEMENT OF JACQUELYN L. WILLIAMS-BRIDGERS, MANAGING DIRECTOR,
INTERNATIONAL AFFAIRS AND TRADE, GOVERNMENT ACCOUNTABILITY
OFFICE
Ms. Williams-Bridgers. Chairman McCaul, Ranking Member
Keating, and Members of the subcommittee, I am pleased to be
here to discuss the report the GAO is releasing today on U.S.
efforts to address terrorist safe havens.
Safe havens, as we all know, allow terrorists the freedom
to train, recruit, and plan deadly operations that constitute a
threat to the United States. As you mentioned in your opening
statement, Chairman McCaul, such was the case with the
attempted airliner bombing on December 25, 2009, which was
planned from safe havens in Yemen. Most recently, the discovery
of Osama bin Laden in a compound near a military base in
Pakistan makes this hearing particularly timely.
My testimony focuses on three questions: To what extent do
U.S. agency strategies focus on terrorist safe havens? What
terrorist safe havens have been identified? Has the U.S.
Government developed a comprehensive assessment of its efforts
to deny terrorists the ability to train, recruit, plan deadly
operations against us?
My first point is that the U.S. Government emphasizes the
importance of denying safe havens to terrorists in several
strategic documents. Three National security strategies
released since 2002 and the National Strategy for Combating
Terrorism, which was last updated in 2006, identify safe havens
as a National security concern.
The National Strategy for Combating Terrorism noted that
the elimination of terrorist safe havens requires the attention
of all elements of National power, with a particular focus on
information sharing, law enforcement, and foreign capacity-
building and security governance in development sectors.
In addition to National strategies, Defense, Justice,
State, USAID, and the Office of Director of National
Intelligence have issued strategic plans that include language
emphasizing the importance of addressing safe havens. However,
other agencies such as DHS that are significantly involved in
relevant law enforcement efforts overseas do not specify the
need to address threats from safe havens in their strategic
plans.
My second point, in compliance with Congressional mandates,
State Department annually identifies safe havens around the
globe which threaten U.S. National security. Congress mandated
that State perform a detailed assessment of each foreign
country whose territory is being used as a sanctuary to
terrorists. Since 2006, State has published this information in
its annual country reports on terrorism. Of note, since 2007,
only one country, Indonesia, and one region, the Afghanistan-
Pakistan border, have been removed from the list of safe
havens. State most recently, in its Country Report issued in
August of last year, identified 13 countries as safe havens.
Each of the three countries that are the focus of this
hearing today have areas that terrorists use as safe havens.
For example, in Pakistan, several terrorist organizations
maintain safe havens, including the core of al-Qaeda, the
Pakistani Taliban, the LET. Each group has either attempted
attacks against the United States or views American interests
as legitimate targets. For example, the Pakistani Taliban
claimed responsibility for the failed vehicle bombing in New
York City's Times Square in 2010.
In Yemen, the al-Qaeda in the Arabian Peninsula, AQAP,
planned the attempted bombing of a plane headed to the United
States on December 25, 2009, and also claimed responsibility
for the attempted package bombing in cargo planes in late 2010.
Also, in 2010, the United States designated Anwar al-Awlaki, a
U.S. citizen and leader for AQAP, for supporting acts of
terrorism on behalf of AQAP.
In Somalia, al-Shabaab, whose core leadership is linked
ideologically to al-Qaeda, has claimed responsibility for
several bombings and shootings throughout Somalia, as well as
the deadly suicide bombings in Uganda. Just last year, the FBI
indicted 12 people, including five U.S. citizens, on charges of
providing support to al-Shabaab.
In addition, the FBI has expressed concerns about Americans
trained in Somalia who might plan to conduct attacks inside the
United States.
My third point is that, despite the express desire of the
Congress to receive comprehensive assessments of the United
States' efforts to deny terrorists safe harbor, the United
States Government has not developed such an evaluation.
Beginning in 2004, Congress required the administration to
submit reports outlining U.S. Government efforts to deny or
disrupt safe havens. In response, State submitted a report to
Congress in 2006 and subsequently updated its information in
its annual Country Reports.
While these reports, including the most recent update
issues in August, 2010, identify several U.S. efforts to
address safe havens, we found that State's report is not
complete for two reasons.
First, the Country Reports do not include at least 13
programs and activities that State funds to address safe
havens. For example, foreign military financing and State-
funded training provided through DHS to combat bulk cash
smuggling were not included.
Second, programs and activities funded by agencies other
than State Department, such as Defense, Justice, Treasury, were
not included. For example, DOD's Afghanistan and Iraqi security
forces funds and the 1206 program that is used to train and
equip foreign security forces were not included.
To enhance the usefulness of State's reporting we
recommended that State include an assessment of key U.S. agency
programs that addressed terrorist safe havens. State concurred
that its reporting should be more comprehensive but did not
agree that such a list should be part of its Country Reports,
citing another report that it issued. We examined that report,
an anti-terrorism report, and determined that it does not
constitute a Government-wide assessment of key U.S. efforts
because it, too, does not include the contributions of the
agencies, such as DOD.
In 2010, Congress again required the President to report on
U.S. counterterrorism efforts relating to the denial of safe
havens. We understand that the National Security Council has
been assigned responsibility for completing this report, but no
report has yet been submitted to Congress. To address this
reporting gap, we recommended that the NSC, in collaboration
with other agencies, complete the Congressional reporting
requirement to identify and assess Government-wide efforts
related to denial of terrorist safe harbors.
Chairman McCaul, Mr. Keating, that concludes my prepared
statement. I will be happy to answer questions at the
appropriate time.
[The statement of Ms. Williams-Bridgers follows:]
Prepared Statement of Jacquelyn L. Williams-Bridgers
June 3, 2011
gao-11-713t
Chairman McCaul, Ranking Member Keating, and Members of the
subcommittee: I am pleased to be here to discuss the report GAO is
releasing today on U.S. efforts to address terrorist safe havens.\1\
Terrorist safe havens provide security for terrorists, allowing them to
train recruits and plan operations. U.S. officials have concluded that
various terrorist incidents demonstrate the dangers emanating from
terrorist safe havens, such as the November 2008 attacks in Mumbai,
India, planned, in part, from safe havens in Pakistan,\2\ and the
attempted airliner bombing on December 25, 2009, planned from safe
havens in Yemen. The discovery of Osama bin Laden in a compound in
Pakistan, from which, according to U.S. officials, he played an active
role in al-Qaeda focused on attacking the United States, makes this
hearing particularly timely.
---------------------------------------------------------------------------
\1\ GAO, Combating Terrorism: U.S. Government Should Improve Its
Reporting on Terrorist Safe Havens, GAO-11-561 (Washington, DC: June 3,
2011).
\2\ See GAO, Combating Terrorism: The United States Lacks
Comprehensive Plan to Destroy the Terrorist Threat and Close the Safe
Haven in Pakistan's Federally Administered Tribal Areas, GAO-08-622
(Washington, DC: Apr. 17, 2008).
---------------------------------------------------------------------------
My testimony today focuses on: (1) U.S. National strategies related
to addressing terrorist safe havens, (2) terrorist safe havens \3\
identified by the Department of State (State) and the threats emanating
from these havens, and (3) the extent to which the U.S. Government has
identified efforts to deny terrorists safe havens.
---------------------------------------------------------------------------
\3\ The 2006 National Strategy for Combating Terrorism states that,
in addition to physical terrorist safe havens in geographic
territories, terrorist safe havens can also be nonphysical or virtual,
existing within legal, cyber, and financial systems. In this statement,
however, we focus on physical terrorist safe havens.
---------------------------------------------------------------------------
In our report, we found that U.S. National strategies emphasize the
importance of denying safe haven to terrorists and that, since 2006,
State has annually identified terrorist safe havens in its Country
Reports on Terrorism. However, we also found that, although there are
multiple reporting requirements, the U.S. Government has not provided
to Congress a comprehensive, Government-wide list of its efforts to
address terrorist safe havens. We made recommendations to both State
and the National Security Council to improve reporting on U.S. efforts
to address terrorist safe havens. State agreed with the importance of
comprehensive information regarding U.S. efforts to address terrorist
safe havens, but did not agree that this information needs to be
included in the Country Reports on Terrorism. The National Security
Council reviewed the report but provided no comments on the
recommendation.
u.s. national strategies emphasize the importance of denying safe
havens to terrorists
The United States highlights the denial of safe haven to terrorists
as a key National security concern in several U.S. Government strategic
documents. For example, National Security Strategies released in 2002,
2006, and 2010 emphasize the importance of denying safe haven to
terrorists. The current National Strategy for Combating Terrorism,
which was last updated September 2006, also stresses the importance of
eliminating terrorist safe havens. The document identifies eliminating
terrorist safe havens as a priority action against which all elements
of National power--including military, diplomatic, financial,
intelligence, and law enforcement--should be applied. According to
National Security Staff officials, an updated National Strategy for
Combating Terrorism is currently being drafted and its release is
expected in the coming months. However, these officials stated that
denying safe haven to terrorists will remain an important element of
U.S. counterterrorism strategy.
In addition to National strategies, plans issued by various U.S.
agencies, such as the Departments of Defense (DOD), Justice (DOJ), and
State/U.S. Agency for International Development (USAID), as well as the
National Intelligence Strategy issued by the Office of the Director of
National Intelligence, include language emphasizing the importance of
addressing safe havens. Figure 1 shows excerpts from these documents,
which discuss terrorist safe havens. However, other agencies that are
involved in U.S. efforts to address terrorist safe havens do not
include specific language on safe havens in their strategic plans. For
example, the Department of Homeland Security (DHS)--which contributes
to the law enforcement element of U.S. National power--does not
specifically address safe havens in its strategic plan but does have a
goal to ``protect the homeland from dangerous people,'' which includes
objectives related to effective border control.
figure 1: selected u.s. government strategic documents emphasizing the
importance of denying safe haven to terrorists
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
State's Office of the Coordinator for Counterterrorism coordinates
policies and programs of U.S. agencies to counter terrorism overseas.
According to State, the Office of the Coordinator for Counterterrorism
works with all appropriate elements of the U.S. Government to ensure
integrated and effective counterterrorism efforts that utilize
diplomacy, economic power, intelligence, law enforcement, and military
power. These elements include those in the White House, DOD, DHS, DOJ,
State, the Department of the Treasury (Treasury), USAID, and the
intelligence community. For instance, State funds programs to build the
capacity of U.S. foreign partners to counter terrorism financing
implemented by agencies such as DHS, Treasury, and DOJ.
since 2006, state has annually identified terrorist safe havens posing
risks to u.s. national security
The Intelligence Reform and Terrorism Prevention Act of 2004
(IRTPA) \4\ requires State to include a detailed assessment in its
annual Country Reports on Terrorism with respect to each foreign
country whose territory is being used as a terrorist sanctuary, also
known as a terrorist safe haven.\5\ State defines terrorist safe havens
as ``ungoverned, under-governed, or ill-governed areas of a country and
non-physical areas where terrorists that constitute a threat to U.S.
National security interests are able to organize, plan, raise funds,
communicate, recruit, train, and operate in relative security because
of inadequate governance capacity, political will, or both.'' Since
2006, State has identified existing terrorist safe havens in a
dedicated chapter of its Country Reports on Terrorism.\6\ As shown in
figure 2, State identified 13 terrorist safe havens in its August 2010
report.
---------------------------------------------------------------------------
\4\ Pub. L. 108-458, section 7102.
\5\ We use the term terrorist safe haven, which, according to
State, has the same meaning as terrorist sanctuaries.
\6\ State annually releases the Country Reports on Terrorism.
State's August 2010 report includes a strategic overview of terrorist
threats and country-by-country discussions of foreign government
counterterrorism cooperation. While released by State's Office of the
Coordinator for Counterterrorism, the Country Reports on Terrorism
incorporates the views of the National Counterterrorism Center and
National Security Staff, as well as key agencies involved in addressing
international terrorism.
---------------------------------------------------------------------------
figure 2: terrorist safe havens identified in state's country reports
on terrorism released in august 2010
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Terrorist safe havens pose a threat to U.S. National security. The
National Commission on Terrorist Attacks Upon the United States (9/11
Commission) noted that safe havens in Afghanistan allowed al-Qaeda the
operational space to gather recruits and build logistical networks to
undertake planning for the attacks on September 11, 2001. State reports
that denying safe havens is central to combating terrorism, which it
cited as the United States' top security threat. According to U.S.
agencies, a variety of groups that pose threats to the United States
operate in countries identified by State as terrorist safe havens. For
example:
Pakistan.--Various terrorist organizations operate in
Pakistan. First, al-Qaeda leader Osama bin Laden was located in
a compound in Pakistan from which U.S. officials have stated he
was actively involved in planning attacks against the United
States. Additionally, according to State, al-Qaeda also uses
the Federally Administered Tribal Areas (FATA) to launch
attacks in Afghanistan, train and recruit terrorists, and plan
global operations. State also reports that the Pakistani
Taliban has used the FATA to plan attacks against civilian and
military targets across Pakistan. The Pakistani Taliban have
claimed responsibility for several attacks against U.S.
interests, including an attack on the U.S. Consulate in
Peshawar in April 2010. Moreover, according to the National
Counterterrorism Center (NCTC), the Pakistani Taliban has
repeatedly threatened to attack the U.S. homeland and claimed
responsibility for the failed vehicle bombing in New York
City's Times Square in May 2010. In addition, according to
State, Lashkar-e-Tayyiba--the group responsible for attacks in
Mumbai, India, in November 2008, which killed at least 183
people--continues to plan operations from Pakistan and views
American interests as legitimate targets.
Yemen.--The foreign terrorist organization al-Qaeda in the
Arabian Peninsula (AQAP) is based in Yemen. According to the
NCTC, AQAP is pursuing a global agenda. For example, the group
attempted to bomb a plane headed to the United States on
December 25, 2009. AQAP also claimed responsibility for the
attempted package bombings of cargo planes in October 2010.
More recently, in response to the killing of Osama bin Laden,
AQAP issued a press release vowing revenge against the United
States. In addition, members of AQAP have been named Specially
Designated Nationals by the United States Government. In July
2010, the United States designated Anwar al-Awlaki, a U.S.
citizen and key leader for AQAP, for supporting acts of
terrorism and for acting for or on behalf of AQAP.
Somalia.--Al-Shabaab is a foreign terrorist organization
active in Somalia. Al-Shabaab has claimed responsibility for
several bombings and shootings throughout Somalia, as well as
the July 2010 suicide bomb attacks in Kampala, Uganda, which
killed more than 70 people. State reports that rank-and-file
members of al-Shabaab are predominantly interested in issues
within Somalia, rather than pursuing a global agenda. However,
NCTC and State note that al-Shabaab's core leadership is linked
ideologically to al-Qaeda and that some members of the group
previously trained and fought with al-Qaeda in Afghanistan. In
2009, the Deputy Director of Intelligence at the NCTC testified
that a number of young Somali-American men traveled to Somalia,
possibly to train and fight with al-Shabaab, including one who
conducted a suicide bombing attack. While noting there is no
specific evidence that the Americans previously trained in
Somalia planned to conduct attacks inside the United States,
the Federal Bureau of Investigation (FBI) has expressed concern
that this threat remains a possibility. In August 2010, the FBI
arrested two U.S. citizens and indicted 12 others, including
five U.S. citizens, on charges of providing support to al-
Shabaab.
the u.s. government has not fully addressed reporting requirements to
identify efforts to deny terrorists safe haven
The U.S. Government has not fully addressed reporting requirements
to identify U.S. efforts to deny safe haven to terrorists. Congress
required the President to submit reports outlining U.S. Government
efforts to deny or disrupt terrorist safe havens in two laws--the IRTPA
and the National Defense Authorization Act (NDAA) for fiscal year 2010.
The IRTPA required the President to submit a report to Congress
that includes an outline of the strategies, tactics, and tools the U.S.
Government uses to disrupt or eliminate the security provided to
terrorists by terrorist safe havens,\7\ and recommended that State
update the report annually, to the extent feasible, in its Country
Reports on Terrorism.\8\ In response to these provisions, State
submitted a report to Congress in April 2006, which it has updated
annually as part of its Country Reports on Terrorism. These reports
include a section on U.S. strategies, tactics, and tools that
identifies several U.S. efforts to address terrorist safe havens. In
the Country Reports on Terrorism released in August 2010, State
identified several U.S. efforts for addressing terrorist safe havens,
including programs such as State's Regional Strategic Initiative and
Antiterrorism Assistance programs.
---------------------------------------------------------------------------
\7\ Pub. L. 108-458, Section 7120(b).
\8\ Pub. L. 108-458, Section 7102(d)(2)(E).
---------------------------------------------------------------------------
However, State's August 2010 Country Reports on Terrorism does not
fully identify U.S. efforts to deny terrorists safe haven. For example:
Some State-funded efforts are not included.--Selected State
strategic documents \9\ identify efforts funded by State that
may contribute to denying terrorists safe haven--such as
Foreign Military Financing activities and USAID development
assistance--that were not included in the August 2010 Country
Reports on Terrorism. In addition, agency officials identified
additional State-funded efforts that may contribute to
addressing terrorist safe havens--such as activities funded
through State's Peacekeeping Operations and State-funded DHS
training to combat money laundering and bulk cash smuggling--
but were not included in the report.
---------------------------------------------------------------------------
\9\ We reviewed the fiscal year 2012 Mission Strategic and Resource
Plans (MSRP) for the Philippines, Somalia, and Yemen, submitted in
April 2010, which included program funding information for goals
related to addressing terrorist safe havens for fiscal years 2009
through 2015.
---------------------------------------------------------------------------
Efforts funded by other U.S. agencies are not included.--For
example, according to DOD officials, the Department's
Afghanistan and Iraq Security Forces Funds and Section 1206
program efforts to train and equip the security forces abroad
address terrorist safe havens but are not included in State's
report. Additionally, according to DOJ and Treasury, their
training programs to build the capacity of foreign partners to
counter terrorism financing address terrorist safe havens, but
they are also not included in State's report.
In the IRTPA, Congress noted that it should be the policy of the
United States to implement a coordinated strategy to prevent terrorists
from using safe havens and to assess the tools used to assist foreign
governments in denying terrorists safe haven. State's report is
incomplete without a comprehensive overview of its own contributions
and those of its various interagency partners to address terrorist safe
havens.
To enhance the comprehensiveness of State's reporting on U.S.
efforts to deny safe haven to terrorists, we recommended that State
include a Government-wide list of U.S. efforts to address terrorist
safe havens when it updates the report requested under the IRTPA.\10\
In response, State concurred that reporting on U.S. efforts to deny
terrorist safe havens should be more comprehensive. However, State did
not agree that such a list should be part of its annual Country Reports
on Terrorism, citing the fact that they have completed other reporting
requirements related to counterterrorism. We maintain that the
provisions in the IRTPA recommend annual updates related to U.S.
efforts to address terrorist safe havens be included in the Country
Reports on Terrorism. Moreover, while it is possible that other reports
produced by State address IRTPA provisions, the antiterrorism report
cited by State in its comments does not constitute a Government-wide
list of U.S. efforts to address terrorist safe havens as the report
does not include the contributions of key agencies, such as DOD.
---------------------------------------------------------------------------
\10\ GAO-11-561.
---------------------------------------------------------------------------
In addition to the provisions in the IRTPA, Congress demonstrated
an on-going interest in the identification of U.S. efforts to deny
terrorist safe havens in the NDAA for fiscal year 2010. The conference
report accompanying the act noted that existing Executive branch
reporting on counterterrorism does not address the full scope of U.S.
activities or assess overall effectiveness. The NDAA for fiscal year
2010 requires the President to submit to Congress a report on U.S.
counterterrorism strategy, including an assessment of the scope,
status, and progress of U.S. counterterrorism efforts in fighting al-
Qaeda and its affiliates and a provision to create a list of U.S.
counterterrorism efforts relating to the denial of terrorist safe
havens. The required report is intended to help Congress in conducting
oversight, enhance the public's understanding of how well the
Government is combating terrorism, and assist the administration in
identifying and overcoming related challenges. As of March 2011, no
report had been submitted to Congress. While National Security Staff
officials taking the lead on the report stated they were working on a
draft, they were unsure when it would be completed.
To address this reporting gap, we recommended that the National
Security Council, in collaboration with relevant agencies as
appropriate, complete the requirements of the NDAA of fiscal year 2010
to report to Congress on a list of U.S. efforts related to the denial
of terrorist safe havens.\11\ The National Security Council reviewed
our report but provided no comments on the recommendation.
---------------------------------------------------------------------------
\11\ GAO-11-561.
---------------------------------------------------------------------------
Chairman McCaul, Ranking Member Keating, and Members of the
subcommittee, this completes my prepared statement. I would be happy to
respond to any questions you or other Members of the subcommittee may
have at this time.
Mr. McCaul. Thank you so much for your testimony.
I have been informed we just have one vote, so I would ask
that we take a very short break, go make our one vote, and then
come right back to the hearing. I appreciate your patience.
[Recess.]
Mr. McCaul. The committee will come to order.
I appreciate the patience from the witnesses and everybody
in the room. Hopefully, we can now finish the hearing before
the next series of votes.
With that, Mr. Koumans, you are recognized for 5 minutes.
STATEMENT OF MARK KOUMANS, DEPUTY ASSISTANT SECRETARY,
INTERNATIONAL AFFAIRS, U.S. DEPARTMENT OF HOMELAND SECURITY
Mr. Koumans. Good morning, Chairman McCaul, Ranking Member,
and distinguished Members of the subcommittee. Thank you for
the opportunity to testify on the Department of Homeland
Security's role in support of U.S. efforts to address terrorist
safe havens.
Protecting the United States from terrorism is the
cornerstone of homeland security, and denying terrorists safe
havens is one of the best ways to undermine their capacity to
operate.
The State Department defines terrorist safe havens as
ungoverned, under-governed, or ill-governed areas where
terrorists that threaten national security are able to
organize, plan, raise funds, communicate, recruit, and train
because of inadequate governance, political will, or both.
Let me first clarify that DHS is concerned about threats
from terrorists, foreign or domestic, whether or not they come
from safe havens. DHS bases its actions, for example, in
deciding who should be allowed entry into the United States on
the experience of our officers in the field and the best
available intelligence. We take the source and transit
countries for terrorist movements into account when making our
screening decisions and in the other work we do, but DHS does
not base those decisions on whether a particular area is
designated a safe haven.
To address the problem of safe havens, to prevent threats,
and to reduce risks, DHS works closely with the Departments of
State and Defense and other departments and agencies to protect
the homeland from terrorist attack and to deny terrorists the
ability to travel and finance their activities.
One important way the DHS conducts these efforts is to
strengthen the capabilities of foreign partners. We believe
that these efforts make partner countries stronger and make
them and the United States more secure by improving governance
and economic opportunity, fighting criminality, and supporting
the rule of law and so decreasing the likelihood of safe
havens.
DHS carries out many programs around the world to provide
training and technical assistance to strengthen our partners'
ability to confront terrorists. DHS is generally not authorized
to use its appropriated funds for foreign capacity building
purposes. Therefore, when our interests and priorities overlap,
DHS works with the U.S. agencies that hold the authority to
fund such foreign assistance. These cooperative efforts to work
with our international partners do not hinge exclusively on
whether a particular area is a terrorist safe haven but instead
are based on where our assistance can help build the partner's
capacity to increase security, fight transnational crime, and
combat terrorism.
For example, in Afghanistan, DHS has led efforts that have
significantly improved the ability of the Afghan government to
control its borders, increase customs revenue collection, and
facilitate legal trade, while increasingly preventing the
movement of illegal goods, including the components for
improvised explosive devices. This effort is based on previous
border security efforts DHS carried out in Iraq, efforts
Defense Department officials had supported and encouraged DHS
to carry out in Afghanistan.
Our work has included mentoring Afghan border and customs
officials at border posts, tackling bulk cash smuggling through
Kabul International Airport, and establishing a training
academy for Afghan customs officials.
To cite another example, following the attempted terrorist
attacks last October after two printers rigged with explosives
were found, TSA deployed a team to Yemen to assess air cargo
security programs. Subsequently, TSA trained Yemeni officials
to mitigate threats to air cargo security in Yemen.
Also, this April, ICE and CBP provided training in Pakistan
to counter bulk cash smuggling and identify homemade
explosives. We trained more than 50 officers from four
different Pakistani border control agencies, including the
Federal Investigative Agency, Customs Force, and Airport
Security Force.
At the same time, DHS is strengthening coordination among
its many components and offices operating internationally. DHS
has established its first international strategy and is
consolidating information about all DHS training and technical
assistance activities worldwide, in part to ensure that our
activities are closely aligned with our priorities. These
advances will help us work more effectively with the
Departments of State and Defense.
Chairman McCaul, Ranking Member Clarke, and distinguished
Members of the subcommittee, I look forward to working with you
as we explore opportunities to advance our efforts and our
cooperation with international partners to deny terrorists safe
haven.
Thank you again for the opportunity to testify. I have
provided a more complete written testimony. I look forward to
your questions.
[The statement of Mr. Koumans follows:]
Prepared Statement of Mark Koumans
June 3, 2011
Good Morning, Chairman McCaul, Ranking Member Keating and
distinguished Members of the subcommittee. Thank you for the
opportunity to testify on the Department of Homeland Security's (DHS)
role in support of the U.S. Government's efforts to address the problem
of terrorist safe havens. Terrorists operate without regard to national
boundaries. Protecting the United States and its people from terrorism
is the cornerstone of homeland security, and denying terrorists' safe
haven is one of the best ways to undermine their capacity to operate
effectively.
As set forth in the Homeland Security Act of 2002, preventing
terrorist attacks against the United States and enhancing our Nation's
security have been and continue to be two of DHS's most important
objectives. The Department's first Quadrennial Homeland Security Review
(QHSR), released on February 1, 2010, reiterates that preventing
terrorist attacks in the United States is the first of five primary
missions for the homeland security enterprise. DHS also integrates
preventing terrorism into the four other missions of the homeland
security enterprise--securing and managing our borders, enforcing and
administering our customs and immigration laws, safeguarding and
securing cyberspace, and ensuring resilience to disasters of all kinds.
The State Department defines terrorist safe havens as ungoverned,
under-governed, or ill-governed areas of a country where terrorists
that constitute a threat to U.S. National security interests are able
to organize, plan, raise funds, communicate, recruit, train, and
operate in relative security because of inadequate governance capacity,
political will, or both. Safe havens provide security for terrorist
leaders, allowing them to plan acts of terrorism around the world.
The Intelligence Reform and Terrorism Prevention Act (IRTPA) of
2004 requires the State Department (DOS) to include in its annual
Country Reports on Terrorism the identification of terrorist safe
havens. Further, the 2004 IRTPA and the National Defense Authorization
Act (NDAA) for fiscal year 2010 requests that the President submit
reports identifying U.S. efforts to deny terrorist safe havens. DOS
identifies terrorist safe havens in its Country Reports on Terrorism,
and in its most recent report, issued in August 2010, DOS identified 13
terrorist safe havens.
To prevent threats and reduce risk, DHS works closely with DOS and
other departments and agencies to protect the homeland and U.S.
citizens from terrorist attacks, to deny terrorists the ability to
travel, to deny them the ability to finance their activities, and to
deny them access to areas of the world where they can plot and train
for their attacks.
DHS directly supports these efforts--funded by DOS or other
Government departments--to strengthen the capacity of foreign
governments to deny terrorists safe haven.
how dhs counterterrorism efforts affect terrorist safe havens
DHS is concerned about threats from terrorists, foreign or
domestic, whether they come from safe havens or not. DHS bases its
actions--for example in deciding who should be allowed entry to the
United States--on the experience of our officers in the field and on
the best available intelligence collected throughout the U.S.
Government. We take the source and transit countries for terrorist
movements into account when making our screening decisions and in all
the other work we do. DHS also does its part to support the work of
other departments and agencies that are more directly focused in
disrupting terrorist safe havens. While we base our screening decisions
on intelligence and other factors, DHS does not base screening
decisions on whether a particular area is designated a safe haven or
not.
DHS carries out significant programs around the world to provide
training and technical assistance to build the capacity of foreign
governments to confront terrorists and strengthen our own security. DHS
generally is not authorized to use its appropriated funds for foreign
capacity-building purposes;\1\ therefore, when our interests and
priorities overlap, DHS works with the U.S. agencies that hold
authority to fund foreign assistance, including capacity-building
efforts. These cooperative efforts to work with our international
partners, and often to provide training and technical assistance, do
not hinge on whether a particular area is a terrorist safe haven, but
instead are based on where our assistance can help build a partner's
capacity to combat terrorism. Below are several of these key technical
assistance programs.
---------------------------------------------------------------------------
\1\ There are exceptions for training and the sharing of best
practices by TSA in locations that have non-stop flights to the United
States.
---------------------------------------------------------------------------
cross-border financial investigations/money laundering training
DHS's U.S. Customs and Border Protection (CBP) and U.S. Immigration
and Customs Enforcement (ICE) conduct training on enforcement efforts
and interdiction of bulk cash smuggling, which includes cash courier
interdiction training for various nations. The training, conducted in
partnership with the Department of State, encourages countries' efforts
to comply with international standards, such as those established by
the Financial Action Task Force (FATF). Training is scheduled based on
a number of factors, including the status of the country's financial
reporting laws, available resources, political will to enforce the laws
and the current security situation. The training includes such topics
as the host country's money laundering reporting requirements and laws,
currency smuggling techniques, interviewing, source development, red
flag indicators of currency smuggling, conducting investigations, and
evidence processing.
ICE Homeland Security Investigations (HSI), coordinated and funded
by the State Department, routinely conducts cross-border financial
investigations and money laundering enforcement training for key
foreign partner nations. HSI's training provides participating
countries with the capability to effectively implement relevant FATF 40
Recommendations and Nine Special Recommendations (which provide the
international standards for combating money-laundering and terrorism
financing), with special emphasis on R8 (New Technologies), R17
(Dissuasive Actions), R26-R32 (Competent Authorities), SR V
(International Cooperation), SR VI (Alternative Remittance), and SR IX
(Cash Couriers). These recommendations were developed to ensure that
terrorist and other criminal organizations cannot easily finance their
activities or launder the proceeds of their crimes simply by leaving
one jurisdiction and seeking refuge in another.
The HSI-led training and technical assistance workshops cover a
range of topics, including money laundering, movement and smuggling of
bulk currency, money service businesses, informal value transfer
systems, trade-based money laundering, cross-border fraud,
investigative techniques, kleptocracy, and asset forfeiture. The
training includes practical exercises that exhibit how terrorist and/or
criminal organizations collect, store, and move funds. Here are a few
examples of training and technical assistance activities designed to
address terrorist safe havens, as identified in the State Department's
2010 report:
Over the last 6 years, HSI has conducted cross-border
financial investigations training in:
Afghanistan;
The Philippines;
Indonesia;
Malaysia;
Pakistan;
Algeria;
Mali;
Mauritania;
Iraq;
Argentina;
Brazil;
Paraguay.
ICE Attache Sana'a has provided training to counter bulk
cash smuggling and money laundering to Yemen's Ministry of
Interior (MOI) and Financial Information Unit officials.
ICE Attache Casablanca has regional responsibility for
Algeria, and provided training in Algeria on bulk cash
smuggling investigations and interdiction in August 2010.
In April 2011, ICE Attache Islamabad and CBP provided bulk
cash smuggling and the identification of homemade explosives
and bulk explosives training to 53 officers from the following
four Pakistan border control agencies: Federal Investigation
Agency, Federal Board of Revenue (FBR) Customs, FBR Customs
Intelligence and Investigations, and the Airport Security
Force.
fraudulent document detection
In February 2011, ICE special agents and CBP officers shared best
practices and techniques with their Afghan counterparts on detecting
forged documents used by individuals and criminal organizations seeking
to circumvent the established immigration process in Kabul, Afghanistan
at Kabul International Airport. CBP currently has a fraudulent document
expert detailed to Iraq, where he is providing on-going passport
examination training to Iraqi immigration officers and police
investigators to enhance their fraudulent document detection skills.
export enforcement investigations and wmd
The Export Control and Related Border Security Program (EXBS)
program is funded through agreements with DOS. CBP and ICE are
responsible for training foreign law enforcement counterpart agencies
in other countries, chiefly customs and border guard officials. Foreign
officials are taught to investigate, conduct surveillance, detect,
enforce transfer and control laws, and interdict unauthorized transfers
of items and technology, including dual-use technologies, which are
covered by control lists of the multilateral nonproliferation regimes
and arrangements. Items that may contribute to a weapon of mass
destruction or missile program are also included.
CBP has recently conducted or will soon conduct EXBS-funded border
control and enforcement training for Afghanistan, Iraq, Lebanon,
Pakistan, and Yemen.
border, customs, and immigration police training
CBP builds capacity to implement more effective customs operations,
border policing, and immigration inspections through relevant training
programs including: Border Patrol Primary, Border Patrol Checkpoint,
Weapons of Mass Destruction, Anti-Narcotics, and Border Enforcement; as
well as targeting and risk management seminars and short- and long-term
advisory assistance.
In addition to the border control and enforcement training that is
provided directly to a number of the countries identified as safe
havens, CBP also provides this training to neighboring countries not
designated as safe havens to increase their capability, including:
Kenya, Kuwait, Oman, Saudi Arabia, and Turkey. This demonstrates how
DHS employs a number of criteria to determine which countries would
benefit from the kinds of technical assistance we can offer to help
disrupt terrorist groups that threaten the United States and U.S.
interests.
In support of the World Customs Organization's Program Global
Shield, representatives from ICE and CBP are working with the Afghan
Ministry of the Interior (MOI) and Customs Department (ACD) to train
and equip border police to detect improvised explosive devices and drug
precursors. In addition, ICE Kabul is providing training in
investigative techniques and intelligence gathering to further exploit
illicit shipments of precursor chemicals.
ICE introduced the Kabul International Airport Action Plan (KIAAP)
in response to U.S. Embassy interest in enhancing the capacity of the
ACD, Afghan Border Police and MOI officials to increase revenue
collection and security at Kabul International Airport (KBL). KIAAP
focuses on capacity building while simultaneously allowing ICE access
to KBL, which is believed to be the conduit for much of the bulk cash
smuggling. The April 2011 approval of the Bulk Cash Flow (BCF) Action
Plan at KBL will be the centerpiece for the successful implementation
of KIAAP, which will improve security and revenue collection. ICE
Attache Kabul, in conjunction with other law enforcement components,
was instrumental in drafting the BCF Action Plan. ICE Attache Kabul
personnel have also completed formal document fraud and bulk cash
smuggling training for KBL Customs officers.
In June 2011, ICE and CBP, with funding provided by the Department
of Defense, are providing counternarcotics training tailored to the
needs of Afghan law enforcement agencies with counternarcotics
responsibilities. This training will highlight Program Global Shield
initiatives, and is designed to improve Afghan and U.S. capacity to
track shipping routes and compile and share targeting information about
legal shipments. There will be two 1-week courses provided to students
from the ACD, Afghan Customs Police, Border Police, and Counter
Narcotics Police.
In July 2011, ICE Attache Casablanca plans to provide training in
Algeria focusing on inspectional techniques and methodologies providing
foreign counterparts the skills and knowledge necessary to carry out
the effective inspection, detection and interdiction of contraband and/
or illegal aliens.
biometric data collection and information sharing
DHS's US-VISIT and Science and Technology Directorate together
build and leverage international partnerships to develop and promote
the use of biometrics using standards that allow for interoperability
with other countries' border and immigration biometric systems in order
to share actionable data. This sharing reinforces the security and
integrity of immigration and international travel between the United
States and our key international partners.
One of US-VISIT's notable projects is the Five Country Conference
(FCC) High Value Data Sharing Protocol (HVDSP). The HVDSP allows for
biometrically-based information sharing between the United States and
the four other FCC member countries: Australia, Canada, New Zealand,
and the United Kingdom. Separate bilateral memoranda of understanding
were developed between the partner countries to facilitate the matching
of immigration and nationality cases against each other's biometric
databases, and to exchange relevant information on cases where
biometric matches are made. All participating countries are using this
biometric information exchange to aid immigration decisions. There have
been cases where immigration or law enforcement officials of
participating countries have received new case information or taken
direct action as a result of sharing this biometric information. All
information exchanges are undertaken in full compliance with all U.S.
laws and regulations related to privacy and civil liberties.
In 2008, the United States began signing Preventing and Combating
Serious Crime (PCSC) agreements primarily with countries that
participate in the Visa Waiver Program (VWP). The agreements--which in
part satisfy a statutory information-sharing requirement to obtain or
maintain VWP designation--formalize the sharing of biometric and
biographic data for the purposes of preventing and combating serious
crime and terrorism. US-VISIT is currently working with the Federal
Bureau of Investigation's Criminal Justice Information Services
Division to begin implementing PCSC agreements with Germany and Spain.
maritime security and seaport interdiction
The U.S. Coast Guard (USCG) assists partner nations in the
development of maritime security. USCG advocates Global Maritime Domain
Awareness as the foundation of these efforts, to enable collective
protection of the region's maritime transportation system. USCG also
assesses the effectiveness of anti-terrorism measures in foreign ports
using a country's implementation of the International Ship and Port
Facility Security (ISPS) Code as a benchmark. The USCG shares the
results of its findings with other Federal agencies, including DOS. In
the countries where port security is inadequate, the USCG imposes
conditions of entry, including additional security measures, on vessels
arriving to the United States from those countries. Conditions of entry
are currently imposed on 16 countries. Among the USCG's most important
capacity-building activities is the International Port Security Program
country visit, where they work collaboratively with foreign partners to
fully implement the ISPS Code and related requirements in their ports
and waterways. The USCG also works Asia Pacific Economic Cooperation
Forum and the Organization of American States in the development and
execution of capacity-building activities in Asia and the Americas,
respectively.
In another example of maritime cooperation, the CBP National Marine
Training Center is planning to conduct Maritime Law Enforcement Officer
training for the Ecuadorian Navy during late summer 2011. Ecuador is a
neighbor of Colombia, which has been identified as a safe haven
country.
USCG international training partners include Indonesia, Pakistan,
the Philippines, and Yemen. USCG engagement in Yemen dates back to
2002, and the creation of the Yemeni Coast Guard was under the guidance
of the USCG. Several maritime capacity-building initiatives are planned
for Yemen pending the resolution of the current political crisis and an
improvement in the internal security situation. In 2011, the USCG has
facilitated the delivery of two new coastal patrol boats to Yemen, one
legacy high endurance cutter to the Philippines, and another high
endurance cutter to Nigeria. Once in service, these vessels will
substantially increase the maritime law enforcement capabilities of
these nations.
civil aviation security
The Transportation Security Administration (TSA) supports the
efforts of other governments to prevent their territories from being
used by terrorists, organized crime groups, or others who pose a threat
to U.S. security by assisting with the development of transportation
security systems, programs, and facilities. Specific assistance
includes technical and managerial expertise to assist with developing,
improving, and operating the civilian aviation security infrastructure,
standards, procedures, policies, training, and equipment. The tools TSA
uses to provide this assistance include tailored training, personnel
exchanges, information sharing, and lessons learned/best practices. TSA
works closely with its foreign government counterparts in these
locations to determine the exact tools used to meet the needs of the
host government.
TSA's authority for assessing security standards at foreign
airports is codified in 49 USC 44907. Specifically, the TSA shall
conduct an assessment of each foreign airport that serves as a last
point of departure to the United States. TSA uses the standards and
recommended practices contained in Annex 17 to the Convention on
International Civil Aviation as the baseline for these security
assessments. Additionally, TSA has the authority to conduct aircraft
operator inspections of both U.S. Aircraft Operators and Foreign Air
Carriers at foreign locations that serve as the last point of departure
to the United States. This authority is codified in 49 CFR 1544.3 and
49 CFR 1546.3 respectively. Further, the authorities vested to TSA by
the Aviation and Transportation Security Act of 2001 (Pub. L. 107-71,
115 Stat. 587 (2001)), include the authority to issue, rescind, and
revise TSA regulations, orders, and Security Directives/Emergency
Authorities that affect both domestic and foreign transportation
providers, and to enforce these authorities through civil penalties and
denials of authorization to operate in U.S. transportation venues.
In fiscal year 2010, 45 TSA assistance and training sessions were
provided to 28 countries. In fiscal year 2011, TSA is scheduled to
provide 51 sessions in 35 countries. For example, following the
attempted terrorist attacks on cargo operations this past October, TSA
immediately deployed a team to Yemen to assess cargo security programs.
Subsequently, TSA provided training to mitigate threats to the cargo
security network emanating from Yemen. TSA also works closely with the
International Civil Aviation Organization and other foreign partners to
eliminate duplicative efforts by coordinating training given by various
countries to nations in need of technical assistance.
In addition, CBP's Carrier Liaison Program (CLP) enhances border
security by increasing commercial carrier effectiveness in identifying
improperly documented passengers destined to the United States. In
2010, CLP provided training to carrier and airport security personnel
in Argentina, Venezuela, and Brazil on fraudulent document
identification, passenger assessment, impostor identification, and
travel document verification.
reconstruction and stabilization
National Security Presidential Directive 44 on Reconstruction and
Stabilization tasks DOS with coordinating a unified, whole-of-
government approach to help fragile and failing foreign governments
exercise sovereignty over their own territories and prevent those
territories from being used as a base of operations or safe haven for
extremists, terrorists, organized crime groups, or others who pose a
threat to U.S. security, foreign policy, or economic interests.
Under this initiative, DHS participates by training and deploying
ICE special agents and CBP officers to Afghanistan and other locations
worldwide to help nations secure their borders and disrupt illicit
travel and trade.
In Afghanistan, CBP's primary mission is to oversee the Border
Management Task Force (BMTF), a mixed civilian and military task force
whose primary goal is to assist the Afghan government by providing
subject matter expertise relating to customs and border operations. The
BMTF initiatives are a critical part of U.S. efforts to assist the
Afghan government to gain control over its borders, defeat the
insurgency by attacking links to narco-trafficking, and promote
economic growth and stability.
iraq and afghanistan
Following the outbreak of war in Iraq in 2003, the Department of
Defense requested CBP assistance in developing Iraq's border control
agencies. In 2004-2005, CBP teams trained more than 3,700 Iraqi border
officers in the areas of border patrol and customs and immigration
operations at the Jordanian International Police Training Center
outside Amman, Jordan. Since January 2005, CBP has deployed personnel
to Iraq to provide training and advisory assistance to Iraqi border
control officials. More recently, DHS personnel provided advanced
mentoring in Baghdad to senior Iraqi border control officials with the
Department of Border Enforcement and the Port of Entry Directorate
within the Ministry of Interior.
DHS efforts have helped strengthen the capacity of the Iraqi
government to control its borders. While there is more to do, the Iraqi
Ministry of Interior directorates dealing with Border Enforcement and
Ports of Entry have improved their capabilities from what they were
only a few years ago.
The current Department of Defense-funded CBP assistance project in
Iraq will terminate at the end of fiscal year 2011. Following
negotiations between the State Department and DHS to determine the
appropriate level of future support, DHS has committed to provide an 8-
person advisory team to support the U.S. mission in Iraq beginning in
fiscal year 2012. Funding for the CBP presence in Iraq will be provided
by State Department Bureau of International Narcotics and Law
Enforcement Affairs.
In Afghanistan, DHS efforts have significantly improved the ability
of the Afghan government to control its borders, increase customs
revenue collection, and facilitate legal trade, while increasingly
preventing the movement of illegal goods, including components for
improvised explosive devices.
For example:
Working together, ICE and CBP personnel have been successful
in facilitating numerous changes at Kabul International Airport
to enhance security. Terminal controls of employees,
passengers, cargo, baggage, and currency have been implemented
in fiscal year 2011.
CBP officials assisted in the development of the Afghan
Customs Academy. The ACD and BMTF will collaborate to expand
the Academy, which graduated its first class of 48 in March
2010. The Afghan government and CBP have also broken ground on
a new Afghan Customs Academy in Kabul.
In December 2010, ICE officials established the Afghan
Vetted Investigative Unit, composed of 12 investigators from
the Afghanistan MOI Criminal Investigations Division.
CBP officials are assisting the Afghan government with
infrastructure improvements at a number of border locations, as
well as four international airports, which include baggage and
cargo scanners in addition to life support facilities for
civilian contract mentors and Afghan government border
officials.
CBP officials continue to provide training and mentorship to
the Ministry of Finance (Customs Officials), Ministry of
Interior (Afghan Border Police), and Afghan National Security
Directorate on the use of ammonium nitrate detection kits.
CBP officials continue to provide training and mentorship to
Afghan Airport Authorities on cargo/passenger enforcement
operations, and assist the Airport Interdiction Task Force with
bulk cash/capital flight operations at Kabul International
Airport.
CBP officials continue to assist senior Ministry of Finance
and Ministry of Interior officials in the crafting of a unified
Afghan national border strategy.
By the end of fiscal year 2011, CBP will increase its
presence in Afghanistan to a total of 11 permanent CBP
representatives utilizing DOS funding.
The BMTF will expand the border/customs mentoring program to
more than 50 contract mentors by the end of fiscal year 2011.
CBP representatives will manage and oversee the continued
operation and deployment of BMTF civilian contract mentors at
various border crossing points, inland customs depots and
international airports.
By the end of fiscal year 2011, CBP representatives will
identify requirements and oversee infrastructure improvements
to 14 Afghan border crossing points.
conclusion
DHS is continuing to strengthen coordination and cooperation across
all of its relevant components involved in the activities described
above. For example, efforts to establish agreed-upon international
priorities across all of DHS in key thematic engagement areas are well
advanced. At the same time, significant achievements have been made in
creating a departmental information-sharing architecture to consolidate
information about all DHS training and technical assistance activities
worldwide. We are now working to assemble this information and ensure
that DHS activities are closely aligned with our priorities. These
advances will allow us to work more effectively with those who help
fund our efforts, mainly the State and Defense Departments.
At the same time, we are also strengthening our outreach to DOS and
to embassies around the world, with more frequent and robust
interaction and information-sharing efforts to expand our partners'
understanding of the tools and capabilities that DHS brings to the
fight against terrorism. We are increasingly seeing the fruits of these
efforts as our programs are sought out by other departments and by
international partners.
Chairman McCaul, Ranking Member Keating, and distinguished Members
of the subcommittee, I look forward to working with you as we explore
opportunities to advance our efforts and our cooperation with
international partners to deny safe haven to terrorists. Thank you
again for the opportunity to testify. I am happy to answer any
questions.
Mr. McCaul. All right. Thank you for the testimony.
The Chairman now recognizes Ms. Villarosa for 5 minutes.
STATEMENT OF SHARI VILLAROSA, DEPUTY COORDINATOR FOR REGIONAL
AFFAIRS, U.S. DEPARTMENT OF STATE
Ms. Villarosa. Chairman McCaul, Ranking Member Clarke, and
distinguished Members of the committee, thank you for the
opportunity to discuss State Department's efforts, in
coordination with our other agency partners, to eliminate
terrorist safe havens.
Our ultimate success against terrorism depends on
eliminating these safe havens which have generally developed in
remote areas where there is little to no effective governance,
frequently in border regions. This requires a whole-of-
government effort and a strategic approach to address both the
immediate security needs while building long-term governance
and rule of law, including the capacity to counter violent
extremism, to reduce terrorist recruitment, and delegitimize
violence in those virtual safe havens.
In order for our strategy to be effective, we must develop
regional approaches with the neighboring countries to shrink
the space in which terrorists can operate. We build this
regional cooperation by bringing our ambassadors together with
senior interagency officials to devise collaborative strategies
and action plans.
State works with Defense to build the capacity of military
and civilian law enforcement officials. State works with
Homeland Security to tighten border security. State works with
Treasury to restrict the flow of funds in and out of terrorist
safe havens. State works with Justice and FBI to improve
investigative and prosecutorial capacity so countries can build
effective criminal cases against terrorists. State works with
USAID to improve governance by establishing the rule of law,
assisting with the provision of basic services such as health
and education, and promoting peaceful conflict resolution.
We have achieved success with this approach. Jemaah
Islamiya can no longer travel freely between Indonesia and the
Philippines due to improved maritime surveillance procedures,
Indonesia's success in prosecuting terrorists, and greater
Philippine government control over territory formerly used by
JI for its training camps.
In the Trans-Sahara, the countries have a political will to
fight terrorism but lack the capacity and have welcomed our
assistance to build capacity and to counter violent extremists.
The countries of the region, with our assistance, have begun to
work together to take action against the al-Qaeda affiliates
operating in their territories.
The committee has asked us to address three of the toughest
challenges we still face: Pakistan, Yemen, and Somalia. Our
complex relationship with Pakistan is well known. It is also
important to remember that, as a result of our cooperation, we
have been able to strike major blows against al-Qaeda's ability
to seek safe haven in Pakistan. The challenge remains to make
these advances durable and sustainable.
We are assisting the Pakistanis with delivery of basic
services and improved governance in the federally administered
tribal areas bordering Afghanistan. We will continue to press
Pakistan for increased action against terrorist groups
operating within its borders, but we must also continue to help
Pakistan help itself to eliminate terrorist safe havens.
Al-Qaeda in the Arabian Peninsula, operating out of Yemen,
has tried multiple times to attack us. We had some success in
2009 and 2010 with our strategy. We worked with the Yemenis to
take action against imminent threats, and we also helped the
Yemeni government deliver basic services and security to its
people. We are hopeful that future Yemeni leaders will be solid
counterterrorism partners once the political situation there is
resolved.
Somalia has not had a functioning central government for 20
years. The main terrorist group, al-Shabaab, has links with al-
Qaeda and conducted a major attack outside of Somalia last
July, killing 76 people in Uganda. An offense launched earlier
this year by Somalian partner nation forces has reduced al-
Shabaab's territorial control and caused defections from al-
Shabaab. Clearly, more needs to be done to consolidate
political control over the newly liberated areas.
We have also begun a more incentive outreach to the Somali
diaspora and civil society to foster peaceful reconciliation.
In conclusion, our threat is formidable, but we are making
progress. Our strategic approach of capacity building,
countering violent extremism, and broader regional cooperation
provides us with the tools to make lasting progress.
Thank you very much, and I welcome your questions.
[The statement of Ms. Villarosa follows:]
Prepared Statement of Shari Villarosa
Chairman McCaul, Ranking Member Keating, and distinguished Members
of the committee: Thank you for the opportunity to appear before this
committee today. Denying terrorists safe haven plays a major role in
undermining terrorists' capacity to operate effectively and forms a key
element of what we're doing in the State Department on
counterterrorism. Terrorists operate without regard to national
boundaries. Safe havens allow terrorists to recruit, organize, plan,
train, and claim turf as a symbol of legitimacy. Physical safe havens
usually straddle national borders or exist in regions where ineffective
governance allows their presence. Examples include the Pakistan/
Afghanistan border, Yemen, the Trans-Sahara region, and Somalia.
To effectively counter safe havens, we increasingly operate in a
regional context with the goal of shrinking the space in which
terrorists operate. Through the Regional Strategic Initiative, we seek
to build regional cooperation to constrain terrorist activities. Under
Chief-of-Mission authority, we bring Embassy officials, Military, Law
Enforcement, and Intelligence agencies together to collectively assess
the threats, pool resources, and devise collaborative strategies and
action plans. We have established nine RSIs covering South East Asia,
Iraq and its neighbors, the Eastern Mediterranean, the Western
Mediterranean, East Africa, the Trans-Sahara, South Asia, Central Asia,
and Latin America.
I'd like to note that there are examples of success against
terrorist safe havens, particularly in Southeast Asia where we formed
our first RSI. Terrorists traveled freely among the nations of the
region by sea. So, through the U.S. military and Coast Guard we worked
with the nations of the region to improve maritime security first in
the Straits of Malacca, then in the Sulu Sea terrorist safe haven area.
With combined U.S. military and development assistance, the Government
of the Philippines now has increasing control of the island of Basilan
and is beginning to create stability on the island of Jolo. Both areas
are exploited by Indonesia-based terrorist group Jemaah Islamiya and
the Philippines-based Abu Sayyaf Group.
Improved law enforcement and criminal justice also works to shrink
safe havens as we have seen in Indonesia. After the 2002 Bali bombings,
Indonesia enacted new anti-terrorism laws and established a special
police force working together with trained prosecutors. As a result,
the police have successfully disrupted operations, such as the Aceh
terrorist training camp in February 2010, captured terrorists,
collected intelligence, and arrested additional suspects based on that
intelligence. Since 2003, over 500 JI operatives have been captured.
Since its formation in September 2006, the special prosecutor task
force has conducted 166 prosecutions, secured 133 verdicts, including
those responsible for the 2009 Jakarta hotel bombings, and is currently
prosecuting 36 defendants with additional cases being prepared for
prosecution. We also embarked on a program with the Government of
Indonesia to diversify the curriculum of religious schools, with math
and science, so children would develop the skills needed in a global
economy.
key terrorist safe havens
The State Department defines terrorist safe havens as ungoverned,
under-governed, or ill-governed physical areas where terrorists are
able to organize, plan, raise funds, communicate, recruit, train,
transit, and operate in relative security because of inadequate
governance capacity, political will, or both. This definition includes
consideration of both political will and the capacity of host
countries.
Pakistan/Afghanistan
I'll begin our discussion of terrorist safe havens with the
Afghanistan/Pakistan border. Al-Qaeda cannot be allowed to maintain its
safe haven and to continue plotting attacks. After he took office,
President Obama launched a thorough review of our policy and set out a
clear goal: To disrupt, dismantle, and defeat AQ, and prevent it from
threatening America and our allies in the future. In pursuit of this
goal, the USG is following a strategy with three mutually reinforcing
tracks--three surges: A military offensive against AQ terrorists and
Taliban insurgents in Afghanistan; a civilian campaign to bolster the
governments, economies, and civil societies of Afghanistan and Pakistan
to undercut the pull of the insurgency; and an intensified diplomatic
push to bring the Afghan conflict to an end, and a more secure future
for the region.
Since 2009, we have worked with the Government of Pakistan and its
people at all levels. Secretary Clinton was there in late May. Pakistan
has been a victim of terrorism many times in the last few years. At the
same time, we are looking forward to Pakistan launching its own inquiry
as to how Osama bin Ladin was able to live in Abbottabad for more than
5 years.
We are working closely with the Government of Pakistan on a range
of counterterrorism-related capacity building projects. These include
numerous training courses for Pakistani police, which are administered
by the State Department's Diplomatic Security bureau. Our Bureau of
International Narcotics and Law Enforcement also works closely on
border security and other law-enforcement matters. It routinely
provides Pakistani security and police forces with equipment to counter
extremism. And it is truly a whole-of-government effort. For example,
the FBI and Department of Justice work with their Pakistani
counterparts on investigatory, prosecutorial, and training matters.
Treasury and DHS are also interacting with Pakistan on several
important matters relating to terrorism finance and improvised
explosive devises, respectively. Through USAID we are assisting the
Pakistanis with delivery of basic services and improved governance in
the Federally Administered Tribal Areas. Even as we've endured serious
challenges to the relationship, some of which continue to make
headlines, we've continued civilian and military assistance throughout
the country and solidified our cooperation.
It is no secret that we have not always seen eye-to-eye with
Pakistan on how to deal with its terrorist threats or on the future of
Afghanistan. But as a result of U.S. and Pakistan counterterrorism
cooperation and Pakistani military operations aimed at eliminating
militant strongholds in the FATA, the AQ core has had significant
leadership losses--including the recent demise of Osama bin Laden and
is finding it more difficult to raise money, train recruits, and plan
attacks outside of the region. Although the AQ core is clearly weaker,
it retains the capability to conduct regional and transnational
attacks. In addition, AQ has forged closer ties with other militant
groups in the region--for example Tehrik-e Taliban Pakistan and the
Haqqani Network providing the group with additional capabilities to
draw on.
While Pakistan is making some progress on the counterterrorism
front, specifically against TTP, the challenge remains to make these
gains durable and sustainable. To this end, Pakistan must sustain its
efforts to deny AQ safe haven in the tribal areas of western Pakistan.
And we must continue to press Pakistan for increased action against
Lashkar-e-Tayyiba and terrorist groups that undermine the security of
Pakistan, the region, and beyond. Secretary Clinton just concluded a
trip to Islamabad and discussed in great detail our cooperation with
Pakistan to disrupt, dismantle, and defeat AQ, and to drive them from
Pakistan and the region. We will do our part and we look to the
Government of Pakistan to take decisive steps in the days ahead. Joint
action against AQ and its affiliates will make Pakistan, America, and
the world safer and more secure.
Yemen
While the AQ core has weakened operationally, the affiliates have
become stronger. Consequently, the broader AQ threat has become more
geographically diversified. At the top of the affiliates list is al-
Qaeda in the Arabian Peninsula, based in Yemen. It continues to
demonstrate its growing ambitions and strong desire to carry out
attacks outside of its region. AQAP is the first of the AQ affiliates
to make attacks against the United States homeland a central goal. As
you know, the group made its debut in this regard with its December 25,
2009 attempt to destroy an airliner bound for Detroit. Then, in October
2010 it sought to blow up several U.S.-bound airplanes by shipping
bombs that were intended to detonate while in the planes' cargo holds.
As those efforts and AQAP's failed attempt in August 2009 on the life
of Saudi Arabia's Assistant deputy interior for security affairs
minister demonstrated, the group is trying to evade existing detection
capabilities.
Obviously, we are talking here about a country in the middle of a
political crisis, that we see in the headlines every day. But to put
things in perspective, let me back up a bit. The gravity of the AQAP
threat was clear to the Obama administration from Day 1, and we've been
focused on Yemen since the outset. In the spring of 2009, the
administration initiated a full-scale review of Yemen policy that led
to a whole-of-government approach to Yemen. As part of that approach,
we strengthened our engagement with the Yemeni government on
counterterrorism. We also increased our efforts to coordinate with
other international actors. Our strategy seeks to deal with imminent
and developing threats at the same time that it addresses the root
causes of instability in Yemen to improve governance. Central to this
is building the capacity of Yemen's government to be responsive to the
Yemeni people, delivering the security and services they require.
Given that Yemen's political, economic, security, and governance
challenges are interrelated and mutually reinforcing, U.S. policy must
be holistic and flexible to be effective in both the short- and long-
term. U.S. strategy in Yemen is two-pronged: No. 1, strengthen the
Government of Yemen's ability to promote security and minimize the
threat from violent extremists within its borders, and, No. 2, mitigate
Yemen's economic crisis and deficiencies in government capacity,
provision of services, and transparency.
To help meet immediate security concerns, we have provided training
and equipment to particular units of the Yemeni security forces. In
coordination with our security efforts, the USG has also increased
development assistance to Yemen significantly. Development and
stabilization assistance for Yemen went from roughly $9 million in
fiscal year 2008 to $75 million in fiscal year 2010.\1\
---------------------------------------------------------------------------
\1\ This includes funding from bilateral programs funded by DA,
ESF, and GHCS accounts, funding from regional and global programs/
accounts that were attributed to/spent in Yemen (CCF, TI, MEPI, and
DCHA funds), and Sec. 1207 transfer authority funds from DoD.
---------------------------------------------------------------------------
While we are in a period of uncertainty, I'd stress that our shared
interest with the Yemeni government in fighting terrorism, particularly
defeating AQAP, does not rely solely on one individual; we are hopeful
that any future Yemeni leaders will be solid counterterrorism partners.
The Trans-Sahara
Before I talk about Somalia, I'd like to talk about West Africa,
where no group has made a bigger name for itself in the kidnapping-for-
ransom business than al-Qaeda in the Lands of the Islamic Maghreb. AQIM
has raised tens of millions of Euros in the past several years through
kidnap-for-ransom operations. We believe much of this ransom money goes
to logistically sustain the organization but there is plenty as well to
build truck bombs, which have been used in Mauritania and Niger with
limited success. AQIM has attacked and ambushed military forces in
Mauritania and Algeria recently as well as others in Niger and Mali;
the group is also working to increase its operational reach in West
Africa.
A moment ago I mentioned the importance of operating in a regional
context in our efforts to counter terrorist safe havens. The United
States created a regional partnership in North and West Africa, the
Trans Sahara Counterterrorism Partnership in 2005 with the following
strategic goals: To build military and law enforcement capacity; foster
regional cooperation; and counter violent extremism. We want the region
to lead counterterrorism efforts, rather than have those efforts be led
by a group of Western allies. TSCTP is working to enhance a range of
military and civilian capabilities in the Sahel and Maghreb. It is also
facilitating cooperation between Mauritania, Mali, Chad, Niger,
Nigeria, Senegal, and Burkina Faso and our TSCTP partners in the
Maghreb--Morocco, Algeria, and Tunisia.
We believe this program is beginning to pay off with partners
taking a greater-than-ever role in counterterrorism operations in the
region. We have also seen positive signs of greater regional
cooperation among these countries, particularly between Algeria,
Mauritania, and Mali. Moreover, select Allies, such as Canada and
France, have also joined to bolster TSCTP efforts with their own
programs that complement our own.
Given all that is going on in Maghreb, successful democratic
transitions in Tunisia and Libya will be the best bar to inroads by
violent extremists in both countries and in North Africa more broadly.
In the short term, however, the instability in Libya and the transition
in Tunisia may provide AQIM with new openings, and we must continue to
adjust our strategy in response to evolving conditions, work with our
partners in the region to preserve the gains we've made through TSCTP
and bilaterally, and ensure that we remain on track to achieve our goal
of containing and marginalizing AQIM.
Somalia
The chronic instability in Somalia and the fragile hold on power
that the Somalia Transitional Federal Government exert, combined with a
protracted state of violent insecurity, long unguarded coasts, and
porous borders, have made Somalia an appealing location for
exploitation by terrorists, criminals, and other nefarious actors. The
terrorist and insurgent group al-Shabaab and other anti-TFG clan-based
militias exercise control over strategic locations in south and central
Somalia. Al-Shabaab is composed of a range of groups with varying
motivations and interests. Some of al-Shabaab's senior leaders have
links to al-Qaeda and are interested in waging a global struggle, while
other members have a purely Somali agenda or simply are in it for the
money. Al-Shabaab's widening scope of operations makes it a continuing
threat to East Africa and U.S. interests in the region. Last July, we
saw it conduct its first major attack outside of Somalia when it
claimed responsibility for twin suicide bombings at the time of the
soccer World Cup that killed 76 people in Kampala, Uganda. In addition,
al-Shabaab has a cadre of Westerners, including fighters of ethnic
Somali descent drawn from the global Somali diaspora and American
converts, which make it a particular concern.
The United States continues to pursue a dual track approach to
create stability in Somalia. On track No. 1, we support the Djibouti
Peace Process, while continuing to encourage the TFG to reach out to
moderates that support peace and stability in Somalia. On track No. 2,
we are broadening our outreach to include greater engagement with
Somaliland, Puntland, and regional and local anti-al-Shabaab actors and
groups throughout south-central Somalia in order to broaden security
and stabilization efforts throughout the country. We are also reaching
out to diaspora communities and civil society to foster dialogue and
peaceful reconciliation.
Additionally, the United States actively supports the African Union
Mission in Somalia, AMISOM. The recent offensive by the combined AMISOM
and TFG forces has shown some promise in fighting al-Shabaab in
Mogadishu. Outside of Mogadishu, Ethiopia- and Kenya-supported militia
in the western regions of south central Somalia are having some success
in reducing al-Shabaab's territorial control. However, a great deal
more work remains to be done to translate the success of the offensives
into political gains through the consolidation of political control in
these newly liberated areas.
We are also engaging with regional partners to build and sustain
their counterterrorism capabilities to address the threats emanating
from Somalia. The Partnership for Regional East African
Counterterrorism is the USG's program for long-term engagement and
counterterrorism capacity-building in East Africa not only in Somalia,
but also its neighbors to shrink terrorists' ability to transit the
region. PREACT has an expanded set of strategic objectives and program
indicators to more effectively systematize and streamline interagency
contributors and resources to support the program's counterterrorism
capacity-building objectives in East Africa.
how we are addressing terrorist safe havens
To begin with, we are working with our various interagency
partners, such as Homeland Security, USAID, the military, and the
intelligence community to keep Americans safe and our interests secure.
With this whole-of-government approach, we are comprehensively
strengthening our partnerships around the world by ensuring that all
U.S. Government assistance providers are working from the same
playbook, making sure that our assistance is more balanced to improve
both immediate security and long-term governance and rule of law.
Helping our partners more effectively confront the threat within their
borders is both good counterterrorism and good statecraft.
What we are doing in Pakistan, Yemen, and elsewhere is balancing
military programs with robust civilian efforts that include rule of
law, political and fiscal reforms; better governance through competent
institutions, reduced corruption and civil service reform; economic
diversification to generate employment and enhance livelihoods, and
strengthened natural resource management. I'd like to note that many
USG programs and activities simultaneously contribute to various
foreign policy goals. Governance and economic reform are not
specifically designed to counter terrorist safe havens but indirectly
serve that function and should be considered an essential part of the
assistance package we provide for a truly whole-of-Government approach
to shrink terrorists' operating spaces.
Since coming into office, the administration has been emphasizing a
more strategic approach to counterterrorism. The United States has made
great strides in tactical counterterrorism--taking individual
terrorists off the street, disrupting cells, and thwarting
conspiracies. But at the strategic level, we continue to see a strong
flow of new recruits into many of the most dangerous terrorist
organizations. Addressing the factors that drive radicalization--a
mixture of local grievances and the global terrorist narrative--is
necessary to further diminish terrorist safe havens.
One emphasis of strategic counterterrorism is building our foreign
partners' capacity. The heart of these efforts is to improve the rule
of law and governance. Ultimately, counterterrorism and rule of law
goals are closely aligned and reinforce one another. We are working to
make the counterterrorism training of police, prosecutors, border
officials, and members of the judiciary more systematic, more
innovative, and more far-reaching. We are addressing the state
weaknesses that terrorism thrives on--helping our partners to more
effectively counter the threat that they and we both face.
One of our most effective capacity building programs is the
Antiterrorism Assistance Program, the primary provider of U.S.
Government antiterrorism training and equipment to law enforcement
agencies of partner nations. Last year, in fiscal year 2010, $215
million in Nonproliferation, Anti-terrorism, Demining, and Related
programs funds supported approximately 350 ATA courses, workshops, and
technical consultations that trained almost 7,000 participants from 64
countries. In fiscal year 2010, the ATA Program also completed 23
capabilities assessments and program review visits. These on-site
assessments looked at critical counterterrorism capabilities and served
as a basis for Country Assistance Plans and the evaluation of
subsequent progress.
The ATA program is most effective where countries have a
combination of political will and basic law enforcement skills to be
most receptive to the advanced training ATA provides. This relatively
successful formula has been especially evident in Indonesia, Colombia,
Turkey, and parts of North Africa. Through an emphasis on train-the-
trainer courses, we are working with partner nations toward the goal of
institutionalization and self-sustainment of capacities. We also are
moving toward giving advising and mentoring an importance similar to
training and equipping. Finally, we ensure that our programs are based
on long-term strategic country and regional plans, integrated with
other providers of security sector assistance at the State Department
and in the interagency.
In Colombia, ATA training of civilian and police law enforcement
has paid particular dividends, as Colombia now uses the lessons learned
to help train more than 20 countries, 11 of those in the Western
Hemisphere. USAID has supported efforts enabling Colombia to establish
an effective reconciliation and transition program for those willing to
lay down their arms. These efforts along with the Colombian military's
success in identifying the location of terrorist safe havens--which we
have assisted--has resulted in significant progress in reducing the
FARC's operating space in Colombia.
All of this work goes on in the context of vigorous diplomatic and
multilateral engagement. While we work in regional fora, I'd also point
to our bilateral engagement, which remains important. We have formal
bilateral counterterrorism consultations with numerous countries. Among
them are Australia, Canada, China, Israel, Egypt, Japan, Pakistan,
Algeria, Russia, and India; these consultations have strengthened our
counterterrorism partnerships so we can complement one another's
efforts in pursuit of a comprehensive approach to our common
challenges.
Before closing, I want to mention one other area of activity where
we are innovating--namely in our program to counter violent extremism,
a key part of our strategic counterterrorism work. Compared to
capacity-building work, which has been going on for many years, this
activity has a new focus. CVE focuses on three main lines of effort
that will reduce terrorist recruitment: delegitimizing the violent
extremist narrative in order to diminish its ``pull''; developing
positive alternatives for youth vulnerable to radicalization to
diminish the ``push'' effect of grievances and unmet expectations; and
building partner capacity to carry out these activities. We are working
with the interagency to develop programs that address the upstream
factors of radicalization in communities particularly susceptible to
terrorist recruitment overseas. Efforts include providing alternatives
for at-risk youth, encouraging the use of social media to generate
local initiatives, and enhancing the resilience of communities against
extremism.
Research has shown that radicalization occurs primarily at the
local level. To be effective, CVE work needs to be driven by local
needs, informed by local knowledge, and responsive to the immediate
concerns of the community. Furthermore, programs owned and implemented
by local civil society of government partners have a better chance
succeeding and enduring. These initiatives can enable communities to
address recruitment and radicalization, and can help deny terrorists
avenues to create ideological safe haven in such communities.
In conclusion, the threat is formidable but we are making progress.
I firmly believe that countering violent extremism, multilateral
engagement, and building local capacity--through our various programs
and with our Department and interagency partners--provide us with the
tools to make lasting progress in our fight against terrorism. Al-Qaeda
is having a tougher time now more than ever, although AQ and its
affiliates are still extremely dangerous and capable of attacking the
United State and our allies. In the race to protect the United States
and to stay ``one step ahead'' we should ensure that the tools of
civilian power continue to serve National Security interests. This is
an enduring challenge. Staying sharp, improving our offense,
strengthening our defense, and maintaining our intellectual edge--these
are all essential. I believe that we are on the right track. Thank you
again for providing the opportunity to testify.
Mr. McCaul. Thank you.
The Chairman now recognizes Mr. Roberts for 5 minutes.
STATEMENT OF JAMES Q. ROBERTS, PRINCIPAL DIRECTOR FOR SPECIAL
OPERATIONS AND COMBATING TERRORISM, OFFICE OF SPECIAL
OPERATIONS/LOW-INTENSITY CONFLICT AND INTERDEPENDENT
CAPABILITIES, U.S. DEPARTMENT OF DEFENSE
Mr. Roberts. Good morning, Chairman McCaul, Ranking Member
Clarke, and distinguished Members of the subcommittee. Thank
you for inviting me to testify today and share with you the
Department of Defense's efforts to address under- or ungoverned
territories to preclude their use by terrorists in safe havens.
DOD recognizes that such efforts require close interagency
coordination, in fact, cooperation, as is reflected by our
panel here this morning. Eliminating terrorist safe havens is a
core element of the Defense Department's counterterrorism
efforts.
As Secretary Gates has written and said on numerous
occasions, in the decades to come, the most lethal threats to
the United States' safety and security are likely to emanate
from states that cannot adequately govern themselves or secure
their own territories, not from strong states or pure
competitors. Dealing with these fractured and failing states
is, in many ways, the main security challenge of our time.
Your focus today on Pakistan, Yemen, and Somalia highlights
the many and diverse challenges such states can present.
Today's strategic calculus demands that the U.S. Government
focus on building partner capacity, helping other countries
develop the tools for their security and governance to defend
themselves and to defend us by extension. We do this by
providing them with education, equipment, training, and other
forms of security assistance.
America's efforts to build the capacity of our partners
will always be defined by support for healthy civil-military
relations, respect for human dignity and the rule of law,
promotion of international humanitarian law, and the
professionalization of partner military forces.
Finally, as a long-standing member of the Special
Operations family, I would like to take a moment to
congratulate the special operators who killed Osama bin Laden
early last month. Even as we work to eliminate terrorist safe
havens, we remain grateful for the risks our Armed Forces take
in directly eliminating threats when necessary.
The Department is also grateful for the outstanding support
you in the Congress provide to our Nation's military forces in
general and, in my case, to our Special Operations Forces in
particular.
Mr. Chairman, this concludes my opening remarks. I ask that
the written statement that I provided be entered in its
entirety in the record. I will be pleased to respond to any
questions. Thank you.
[The statement of Mr. Roberts follows:]
Prepared Statement of James Q. Roberts
June 3, 2011
Chairman McCaul, Ranking Member Keating, and Members of the
subcommittee, thank you for inviting me to testify today and for the
opportunity to share with you the Department of Defense's efforts to
decrease under- or un-governed territories, thereby striving to
preclude their use by terrorists as safe havens.
Eliminating terrorist safe havens is a core element of the
Department's counterterrorism efforts. As the Secretary of Defense has
written and said on numerous occasions, in the decades to come, the
most lethal threats to the United States' safety and security are
likely to emanate from states that cannot adequately govern themselves
or secure their own territory. Dealing with these fractured or failing
states is, in many ways, the main security challenge of our time. Your
focus today on Pakistan, Yemen, and Somalia highlights the challenges
such states can present.
What has been called the war on terror is, in grim reality, a
prolonged, world-wide irregular campaign--a struggle between the forces
of violent extremism and those of moderation. Direct military force
will continue to play a role in the long-term effort against terrorists
and other extremists. But over the long term, the United States cannot
kill or capture its way to victory. Where possible, what the military
refers to as kinetic operations should be subordinated to measures
aimed at promoting better governance, economic programs that spur
development, and efforts to address the grievances among the
discontented, from whom the terrorists recruit. In short, we recognize
that the elimination of safe havens is a prerequisite to winning the
current conflict and inherently requires an interagency, whole-of-
government approach. To that end, Secretary Gates has repeatedly called
for increased resources for the Department of State to enable the
important work our friends across the river do in advancing U.S.
interests through diplomacy, foreign assistance, and development.
The recent past vividly demonstrated the consequences of failing to
address adequately the dangers posed by insurgencies and failing
states. Terrorist networks can find sanctuary within the borders of a
weak nation, and recruits within the chaos of social breakdown. The
most likely catastrophic threats to the U.S. homeland are more likely
to emanate from these zones of instability than from aggressor states.
This strategic calculus demands that the U.S. Government focus on
building partner capacity: Helping other countries develop the tools
for their security and governance, to defend themselves and us by
extension. We do this by providing them with equipment, training, or
other forms of security assistance. Where possible, U.S. strategy is to
employ indirect approaches--primarily through building the capacity of
partner governments and their security forces--to prevent festering
problems from turning into crises that require costly and controversial
direct U.S. military intervention. In this kind of effort, the
capabilities of the United States' allies and partners may be as
important as our own, and building their capacity is arguably as
important as, if not more so than, the fighting the United States does
itself.
Given these realities, the Department of Defense has sought to
enhance the tools at its disposal for dealing with the threats from
terrorist groups that currently exploit opportunities provided by weak,
fractured, or failing states. Notably, new train and equip programs
allow for quicker improvements in the security capacity of partner
nations. Training and education programs allow us to make contact with,
and enhance the capabilities of, counterterrorism professionals in key
states.
We refer to these training, equipping, advising, and assisting
activities collectively as security force assistance (SFA). SFA
supports the professionalization and the sustainable development of the
capacity and capability of the foreign security forces and supporting
institutions of host countries, as well as international and regional
security organizations. SFA can occur across the range of military
operations and spectrum of conflict as well as during all phases of
military operations. These efforts shall be conducted with, through,
and by foreign security forces.
SFA activities are conducted primarily to assist host countries to
defend against internal and transnational threats to stability.
However, the Department of Defense may also conduct SFA to assist host
countries to defend effectively against external threats; contribute to
coalition operations; or organize, train, equip, and advise another
country's security forces or supporting institutions. The objective of
all SFA activities is to directly increase the capacity or capability
of a foreign security force or their supporting institutions.
This indirect approach, working by, through, and with our partners
also reduces the risk to--and burdens on--U.S. military personnel. We
train partners so that they--not U.S. forces--can patrol their
waterways and territories, take on terrorists, or undertake stability
operations. More capable partners in these missions will lessen the
pressure on U.S. forces. By engaging early in building a Nation's
capacity we may be able to avoid committing troops in the future. We
are better off helping our partners handle their own security than
``calling in the Marines'' when a long-simmering problem ultimately
blossoms into conflict. Furthermore, when a partner executes an
operation it confirms its sovereignty--when we conduct an operation on
their behalf, our mutual enemies will claim that partner has ceded its
sovereignty to the United States.
dod activities to deny safe havens
A subset of the Department of Defense's capacity-building
activities are directly focused on combating terrorist safe havens
around the world in places such as Yemen and the Philippines. Two
primary tools in this regard are our Global Train and Equip authority
(otherwise known as ``Section 1206'') and the Combating Terrorism (CbT)
Fellowship Program. Section 1206 is one of our most important tools in
the counterterrorism fight. This authority gives the Department the
ability--with the concurrence of the Secretary of State--to quickly
respond to build our partners' capabilities to confront urgent and
emerging terrorism threats and support those fighting alongside us in
Coalition operations. Using Section 1206 authority, the Department can
provide training, equipment, and supplies to partner nation military
counterterrorism forces. Both of these programs adhere to the
requirements to accomplish ``Leahy vetting'' for human rights in
accordance with relevant statutes on security assistance and related
activities.
The Combating Terrorism Fellowship Program (CTFP) was established
to meet emergent defense requirements to build partnerships and partner
knowledge about the struggle against terror. The program provides
targeted, non-lethal, CbT education and training. CTFP directly
supports DoD efforts by providing CbT education and training for mid-
to senior-level international military officers, ministry of defense
civilians and security officials. Education and training is a mixture
of existing, traditional classroom and mobile programs, and innovative
activities designed to strengthen individual, country, and regional
combating terrorism capabilities and capacities. CTFP provides
education and training at U.S. military educational institutions,
regional centers, conferences, seminars, or as part of other education
and training programs.
I should note that this indirect approach is not without
challenges. We focus our efforts and resources on places where the
terrorist threat profile is high and partner nation capability--for
whatever reason--is insufficient to meet that threat. Of course, the
political will of the partner nation is also a crucial determinant. In
this complex environment, our ability to conduct and sustain effective
capacity-building programs can be challenged by many factors, including
political instability and competing security concerns in the host
nation. For example, in addition to terrorism, Yemeni forces have
historically dealt with the Huthi rebellion in the north and the
secessionist movement in the south. Although the Yemenis clearly
recognize the threat AQAP poses to their internal security, CT is but
one of several security concerns. Even in cases where instability or
other security concerns do not distract our partners, factors such as
education levels, literacy rates, technological know-how, or
appreciation of the value of maintenance can make absorption and
sustainment of both the equipment and the training problematic.
We recognize the need to assess our building partner capacity
efforts across the board, to include those targeted at eliminating
terrorist safe havens. For example, DoD is initiating a more formal
assessment effort to better evaluate Section 1206 train and equip
programs. This effort will be built on information collected in the
program proposal process, which includes baseline information, expected
program milestones, and quantitative and qualitative metrics to measure
the program's effectiveness. We are designing a system with the intent
of measuring outcomes, not just outputs.
I'll outline below how we use both Section 1206 and CTFP along with
other authorities to build the capacity of our partners to counter
terrorist threats in Pakistan, Yemen, Somalia, and the Philippines, by
way of example.
In Pakistan
The core objective of the United States in Pakistan is to disrupt,
dismantle, and defeat al-Qaeda and its affiliates, and to prevent their
use of safe havens in Pakistan and Afghanistan. To this end, our
``train and equip'' programs with the Pakistan military and
paramilitary forces are central to pursuing our near-term objective of
eliminating terrorist sanctuary and disrupting and defeating the al-
Qaeda network.
The Department of Defense's train and equip programs in Pakistan
have helped the Pakistani military and paramilitary forces address
terrorist threats in ungoverned spaces along its borders and
particularly in the Federally Administered Tribal Area (FATA). Section
1206 programs for the Pakistan Army Aviation helped improve its airlift
capability to support counterterrorism operations in the border region
between Pakistan and Afghanistan against enemies common to both
Pakistan and the United States.
We also provided training and equipment to the Pakistan forces to
help improve maritime counterterrorism capabilities and
counterterrorism efforts focused on the western border area and coast.
More recently, the Pakistan Counterinsurgency Fund has focused training
and equipping programs on building Pakistan's Command, Control,
Communications, Computers, Intelligence, Surveillance, and
Reconnaissance (C4/ISR) capability and its ability to conduct
intelligence-driven operations; expanding its air-mobility capacity;
and improving close air support capabilities, night operations, and its
counter-improvised explosive device (C-IED) capability.
The Department has also used CTFP in Pakistan to fund confidence-
building seminars with Afghanistan on border issues with the aim of
preventing al-Qaeda from establishing safe havens. Since 2009, CTFP has
funded a 4-day Bilateral Seminar that has engaged senior-level
Pakistani officials focusing on the benefits of a whole-of-government
approach to denying al-Qaeda safe havens, controlling the volatile
border with Afghanistan and strengthening civil-military relations in a
larger national security strategy. In 2010, the CTFP funded 10
Pakistani Members of Parliament to spend 3 days in Washington to meet
with representatives from the Departments of Defense, State,
Transportation, and Justice. The goal was to strengthen their
understanding and ability to provide good governance in Pakistan. In
2011, CTFP funded a Pakistani Brigadier General to serve as a visiting
professor and fellow at the College of International Security Affairs
(CISA) at the National Defense University. He will provide first-hand
knowledge of dealing with a terrorist organization embedded in a
society as well as lessons learned from Pakistani efforts to execute
counterterrorism operations.
We find ourselves at a critical juncture in our relationship with
Pakistan. Despite inevitable setbacks, our train-and-equip efforts
paired with persistent diplomatic engagement have tangibly enhanced the
Pakistani military's efforts against militants. The operations
conducted by their forces today would have been unthinkable 2 years
ago. Because of our enduring interests, and the fragile nature of the
gains made by the Pakistani military, we must continue to assist
Pakistan in dismantling militant safe havens and extending the reach of
its government into the remote tribal areas of Pakistan.
U.S. personnel have worked with select Pakistani military units to
provide them with an enhanced understanding of counterinsurgency and
counterterrorism fundamentals, inherent in which is the significance of
adopting a population-centric approach designed to turn the populace
away from supporting terrorists and thus, deny them established or
prospective safe haven. However, counterinsurgency is a methodical
process, and if the Pakistani government continues to lack adequate
capacity to conduct all facets--clear, hold, and build--of COIN
operations, it will be less able to transition to the follow-on phases.
Our efforts have bolstered Pakistani capabilities and capacity, but
much more remains to be done.
In Yemen
In fiscal year 2011 our Combating Terrorism Fellowship Fund
supported seminars and workshops in Sana'a, Yemen. Seminar speakers
included Yemen's Prime Minister, the Minister of Foreign Affairs, Chief
of the Defense Staff, a representative from the President's Office, the
Director for the National Security Bureau (the Yemeni security,
intelligence, and counterterrorism service), the U.S. Ambassador to
Yemen, and U.S. Congresswoman McCollum. The events focused on the
benefits of a whole-of-government approach to national security
strategy. Attendees included 650 Yemeni military and civilian officials
to include: Members of the Council of Ministers, Al-Shura Council (U.S.
Senate equivalent), House of Representatives, members of civil society,
Embassy representatives and students from the host High Military
Academy, and Yemeni CTFP alumni. The program specifically discussed al-
Qaeda safe havens in the south, the spread of al-Qaeda's extremist
ideology and influence, and how to counter it.
Our Section 1206 train-and-equip programs in Yemen have focused on
improving the Yemenis' ability to control its own territory and
territorial waters to combat terrorists currently exploiting ungoverned
and under-governed spaces. Programs have focused on improving border
security and increasing mobility, and have provided equipment to the
Yemeni Special Operations Forces, Air Force, Border Security Force, and
Coast Guard to help them deter, detect, and detain terrorists along
land borders, and at sea, though the security environment has been
challenging of late. The programs in fiscal year 2010 centered on
improving the operational reach and reaction time of counterterrorism
forces so that they could confront terrorists in previously unreachable
areas.
In Somalia
Because Somalia lacks an internationally-recognized permanent
government, many of our capacity-building programs are limited in their
ability to address safe haven there. As such Somalia has not directly
benefited from either Section 1206 funding or CTFP funding. However, we
are working closely with the Department of State to enhance the
capabilities of the multinational African Union Mission in Somalia
(AMISOM) forces and the National Security Force of the Transitional
Federal Government (TFG). These forces are currently operating in
Somalia to stabilize the security situation and create a safe and
secure environment in support of the Djibouti Peace Process and in
which the TFG can function in the midst of current threats.
Further, Somalia's lack of governance and sparse population make it
appealing as a potential safe haven for al-Qaeda. The U.S.-designated
Foreign Terrorist Organization al-Shabaab currently operates freely
throughout much of south/central Somalia. While al-Shabaab is not a
monolithic structure, its leadership has strong and increasing
connections to al-Qaeda. As al-Qaeda undergoes changes in its central
leadership and regroups from counterterrorism operations in Pakistan,
we need to ensure that it does not relocate its center of operations to
Somalia.
It is critical that we view Somalia from a regional Horn of Africa
perspective, not least because so many of the USG's traditional
security cooperation tools are restricted from being used in Somalia.
The Department of Defense is reviewing the status of its Joint Task
Forces to determine if any should be considered for transition to a
more permanent status, such as Joint Interagency Task Force. This
review includes the Combined Joint Task Force--Horn of Africa (CJTF-
HOA) based at Camp Lemonnier, Djibouti, whose mission is to build
partner nation capacity in order to promote regional security and
stability, prevent conflict, and protect U.S. interests.
U.S. Africa Command is concurrently undertaking a review of East
Africa to determine how our military efforts in the region can be most
efficiently applied to work in concert with those of our interagency
partners to achieve our collective regional goals. This review of our
East Africa strategy will also inform the Department's recommendations
on basing and funding for CJTF-HOA and Camp Lemonnier. Our ultimate
goal is a fully integrated DoD strategy under which security
assistance, capacity building, operational collaboration with regional
partners, and counterterrorism actions are synchronized to provide the
regional security and stability that is in the interests of the United
States, our regional partners, and the appropriate international
organizations.
In the Philippines
I will include some comments about DoD's capacity-building programs
in the Philippines, as they have enjoyed a degree of quiet success in
helping the central government in its efforts to expand governance. Our
education, equipping, and training programs there have helped deny safe
haven to a variety of malign actors. Some examples follow.
The Combating Terrorism Fellowship Program has funded Philippine
counterterrorism professionals to attend the Master's degree-granting
program at both the National Defense University's College of
International Security Affairs and the Naval Postgraduate School's
College of International Security Affairs. Both degree programs address
strategic security to include courses on countering the ideological
support for terrorism and countering violent extremism. Senior level
CTFP-funded Filipino leadership have led efforts mainly in the south
against groups such as the Moro Islamic Liberation Front, Moro National
Liberation Front, Abu Sayyaf, Rajah Sulaiman Movement, and Jemaah
Islamiyah.
Section 1206 train-and-equip programs in the Philippines have
focused on increasing maritime border security and decreasing land and
maritime ungoverned spaces. Although still in the stages of
development, United States Pacific Command (USPACOM) believes 1206
programs will be one of the highlights of the command's bilateral
counterterrorism effort. These efforts have expanded and broadened into
a growing maritime domain awareness network with links to command-and-
control centers in Manila that are capable of guiding air- and sea-
borne interdiction assets.
Importantly, we also have provided maritime domain awareness assets
to the Philippines, Malaysia, and Indonesia in an effort to build
regional capacity to monitor waters that have historically been areas
of ``safe transit'' for terrorist and criminal elements alike. Section
1206 programs have also supported the development of naval special
operations forces and key air units who engage day to day with the most
acute terrorist threats in previously unreachable areas.
Civil Military Operations.--Since 2002, Joint Special Operations
Task Force--Philippines (JSOTF-P) has engaged the Government of the
Republic of the Philippines in a Foreign Internal Defense mission with
one of its primary objectives being to neutralize the safe haven that
Southern Mindanao and the Sulu Archipelago afford to Jemaah Islamiyah,
the Abu Sayaaf Group, and potentially to other regional and
transnational terrorist groups. As part of this mission, the JSOTF's
advisers have continued to mentor their Philippine counterparts in the
utility and planning of targeted Civil Military Operations (CMO) as
part of a larger counterinsurgency and counterterrorism strategy, and
have worked shoulder-to-shoulder with them in the execution of these
activities.
Over the 2010 calendar year, U.S. and Filipino civilian and uniform
personnel have worked together to plan and execute over $5.2 million in
CMO activities, amounting to 44 civic action projects, 38 km of road
construction, over 19,000 medical treatments, and close to 6,000
veterinary services performed. All of this has been part of the larger
U.S. effort to assist the Government of the Philippines in establishing
a stable environment in the Southern Philippines, garnering local
popular support, and increasing the legitimacy and governance of the
Government of the Philippines in these remote areas. The goal, of
course, is to separate terrorist group members from their local support
base and deny access to this prospective safe haven.
building dod's sfa toolkit for the future
Recognizing the important role that assisting our partners plays in
furthering our U.S. National security, and the enduring nature of this
requirement, the 2010 Quadrennial Defense Review laid out a series of
initiatives to support this mission area. Key themes were:
Strengthen and institutionalize general purpose force capabilities
for security force assistance.--Conducting missions to train, advise,
and assist partner forces has long been the domain of U.S. Special
Operations Forces. Our experiences in Iraq and Afghanistan, and the
irregular nature of today's conflict, have taught us that we need all
our forces to have these skill sets.
Enhance linguistic, regional, and cultural ability.--Operating in
partnership with host-nation security forces and among local
populations puts a premium on foreign language skills and regional and
cultural knowledge.
Strengthen and expand capabilities for training partner aviation
forces.--Providing training to partner aviation forces is an area that
QDR analysis suggests will continue to grow.
Strengthen capacities for ministerial-level training.--The
Department recognizes that in order to ensure that enhancements
developed among security forces are sustained, the supporting
institutions in partner nations must also function effectively.
Create mechanisms to facilitate more rapid transfer of critical
materiel.--We are exploring and beginning to implement options for
expediting the acquisition and transfer of critical capabilities to
partner forces.
Strengthen the capacities for training regional and international
security organizations.--The Department will improve its capacity for
enabling the United Nations and other multinational peacekeeping
efforts.
conclusion
Terrorist groups seek to evade security forces by exploiting
ungoverned and under-governed areas as safe havens from which to
recruit, indoctrinate, and train fighters, as well as to plan attacks
on U.S. and allied interests. Where appropriate, U.S. forces will work
with the military forces of partner nations to strengthen their
capacity and capabilities for internal security. We will coordinate
those activities with those of other U.S. Government agencies as they
work to strengthen civilian capacities, thus denying terrorists the
time, space, and resources they require. For reasons of political
legitimacy, as well as sheer economic necessity, there is no substitute
for professional, motivated, local security forces protecting
populations threatened by terrorists operating in their midst.
Efforts that use smaller numbers of U.S. forces and emphasize host-
nation leadership are generally preferable to large-scale military
campaigns. We have seen this approach work in the Philippines where,
over the past 8 years, U.S. forces and their Philippine counterparts
have trained together and worked to understand the organization and
modus operandi of the adversary. As their equipment and skills have
improved, Philippine forces have patrolled more widely and more
frequently, bringing security to previously contested areas.
As we place greater emphasis on building the capacity of our
partners, our efforts will continue to be informed by our long-term
determination to foster human dignity. This commitment is manifested in
human rights vetting and other controls that shape our efforts to
educate, train, equip, advise, and assist foreign forces and partner
security institutions. America's efforts to build the capacity of our
partners will always be defined by support for healthy civil-military
relations, respect for human dignity and the rule of law, promotion of
international humanitarian law, and the professionalization of partner
military forces.
Mr. McCaul. Thank you, Mr. Roberts. Let me, too, associate
myself with your remarks regarding the Navy SEAL operation to
kill bin Laden. No one will ever know the names or the faces,
but they are truly the unsung heroes.
In addition, I would like to also commend and recognize the
intelligence community and the analysts who were able to track
down the information that led us to bin Laden. They, too--we
will never know their names or faces--the public, at least--but
they deserve our congratulations as well.
With that, Ms. Williams-Bridgers, the GAO came out with
your report, and I want to go through some of the conclusions
with you and assess how that impacts our ability to go after
these terrorists in the safe havens.
But essentially, as I understand it, your report concludes
that the State Department did not fully comply with the level
of detail required by two laws, two statutes, one being the
National Defense Authorization Act and the second one being the
Intelligence Reform and Terrorism Prevention Act. These Acts
require the President to submit to the Congress a report on the
strategy and activities of the U.S. Government to eliminate
terrorist sanctuaries. Can you tell me or tell this committee
how these reports were deficient and what impact that will have
on our ability to hunt down the terrorists in the safe havens?
Ms. Williams-Bridgers. Thank you, Mr. Chairman, for the
question. I would be glad to respond.
With regard to the report that was mandated by the National
Defense Authorization Act, that required the President to
complete an overall assessment of U.S. Government-wide efforts
to address terrorist safe havens. That report has not yet been
completed. We understand the responsibility has been delegated
to the National Security Council.
In our conversations during the course of our review, the
National Security Council says they are in the process of
developing that report, so we are looking forward to receiving
it and having an examination of it. We think it is critically
important for there to be a high-level National statement of
the priorities, the goals, the objectives; and, hopefully, we
will see the level of detail in that assessment that will
afford the Congress the opportunity to measure over time
progress being made.
With regard to the Intelligence Reform and Terrorist
Prevention Act, it specifically mandated that State Department
produce reports on an annual basis that rendered country by
country assessments, those countries that had been identified
as terrorist safe havens, and then to assess these countries in
terms of the actions the countries have taken to prevent
terrorism, actions that the countries have demonstrated as
being cooperative with the United States, and to explain the
level of knowledge that exists within these governments about
terrorist activity or the presence of safe havens in their
countries.
The one provision that Congress recommended that we did not
see in any of the country reports related to the provision that
would require State Department to report on actions taken by
countries to prevent the proliferation and trafficking of
weapons of mass destruction. This was absent in every single
country report.
To State's credit, during the course of our review they
acknowledged that that provision had not been adequately
responded to and they intended to incorporate in their next
report, which we expect to be issued some time this year.
Mr. McCaul. Okay. So, in other words, your testimony
indicates, and your report you issued, that these reports are
incomplete----
Ms. Williams-Bridgers. Correct.
Mr. McCaul [continuing]. Are not in compliance with the
requirements under these two statutes.
Ms. Williams-Bridgers. Absolutely. Absolutely.
In addition, sir, I would also add that in the assessment
what we expected to see--and not what I believe Congress
expected to see in its articulation of its need to have a full
assessment of information on which it could provide adequate
oversight--we expected to see a listing of all activities
undertaken by the whole of the U.S. Government, all agencies
that have a presence and contribute in a relevant and
significant way toward the detection and elimination of
terrorist safe havens. That assessment was complete. That
listing of all other agency activities and programs was not
clear and it was not complete.
In the course of our own review, we identified at least 13
programs that are funded by State Department that we consider
to be most relevant, programs that speak to governance,
capacity-building, security, economic development activities,
this whole-of-government approach that was articulated in the
most recent National strategic statement.
We also did not see the listing of other agencies, not all
other agencies' programs and activities, such as DHS. As I
mentioned in my opening statement, activities that DHS advances
with regard to cash smuggling that leads to money laundering
that leads to financing of terrorist groups and operations,
that, too, was not included in the State country reports.
Mr. McCaul. So there's a lack of reporting by the National
Security Council--which they assured you that they will be
coming out with a report soon?
Ms. Williams-Bridgers. Yes.
Mr. McCaul. But, coupled with the deficiencies in this
report by both DHS and the State Department, it is not allowing
Congress to do its oversight responsibility; is that correct?
Ms. Williams-Bridgers. I believe it does not provide
Congress with sufficient detail and explanation and evaluation
that allows you to measure over time what progress has been
made.
For example, the removal of Indonesia from the country
reports. It took some digging for our team to look over time to
see what countries were in, what countries were out. There is
no explicit statement in any--the most current country report
that a country had been removed or the Afghan-Pakistan border
area had been removed. That took some concerted effort and
examining and data mining, if you will, of each of the country
reports over time. That kind of information needs to be
provided in order to give you a sense of progress or lack
thereof.
Mr. McCaul. So, as I understand it, there are no metrics
reported. Is that correct?
Ms. Williams-Bridgers. That is correct.
Mr. McCaul. So this committee, Foreign Affairs, Armed
Services, the Intelligence Committee cannot adequately perform
its job without this information.
Ms. Williams-Bridgers. It cannot adequately perform the job
without this information. This information is not currently
available in open sources. However, it may be available in
classified environment, and it might be most appropriate in a
classified reporting environment.
The Congress did allow State Department to provide it that
type of more sensitive information in a classified report.
State Department has chosen not to issue that type of report.
Mr. McCaul. I would like to give, obviously, the State
Department, Ms. Villarosa and Mr. Koumans, would like to give
you the opportunity to respond to the allegations in this
report. We will start with Ms. Villarosa.
Ms. Villarosa. Thank you, Chairman.
Again, we took to heart, we have talked with the GAO about
the deficiencies in our Country Reports of Terrorism and are in
the process of finalizing the 2010 version to make them more
comprehensive, as the GAO has recommended; and this will
include specifically addressing efforts that are done with
regard to the proliferation of weapons of mass destruction.
We are working with the Bureau of ISN, International
Security and Nonproliferation Affairs, to provide that
information so that it is as comprehensive as possible.
Mr. McCaul. Okay. I mean, tracking the proliferation of
weapons of mass destruction seems to be a pretty serious thing
that we should be reporting. Why was that not included?
Ms. Villarosa. Again, I know that this is--our Bureau of
International Security and Nonproliferation tracks this very
closely, and I do not know in terms of what their reporting
requirements are. But we understand that we need to include
this information in the Country Reports of Terrorism and are in
the process of doing so now.
Mr. McCaul. I certainly hope so. I mean, that seems to be a
major oversight in the reporting requirement that is by law. I
think it harms our ability in the Congress, as the Chairman of
the Oversight Investigations Committee on Homeland Security, it
does not allow us to do our job. So I would hope that this
report would be updated as soon as possible.
I want to commend the GAO for calling this to our
attention. I don't think many people knew about that,
certainly, either on this committee or in the Congress as a
whole, and I think that is a major gap in the reporting
requirement.
Mr. Koumans, do you have any comments?
Mr. Koumans. Thank you, Mr. Chairman.
I come at this question from the point of view of having
been a Foreign Service Officer, as you mentioned in your
opening remarks, for 17 years before I came to Homeland
Security and, perhaps similarly to Ms. Villarosa, was posted
overseas during times when I had to write the first draft of
the counterterrorism Country Reports that are then submitted
back to Washington and further amplified by the Washington
interagency community. I know that the State Department sends
specific instructions with respect to legal changes that took
place in the country at that time, significant prosecutions, et
cetera. From our point of view, absolutely, if the training
that ICE and CBP have done with respect to bulk cash smuggling,
if that should be included, we report that through other
channels, we are more than happy to include that, absolutely.
Mr. McCaul. It is June 2011. This is a 2010 report. I would
hope that both DHS and State can update this report so that the
other branch of Government, that being the Congress, can do its
job.
So my time is way over expired. But I thank you for your
testimony.
I now recognize the Ranking Member, Ms. Clarke.
Ms. Clarke. Thank you very much, Mr. Chairman; and I would
like to associate myself with your opening comments.
As a New Yorker, we are indebted and indeed grateful to our
armed services, our special forces and intelligence community
for eliminating the threat that was Osama bin Laden; and I
would like to just state that for the record.
Let me ask the entire panel, although terrorist safe havens
have been identified in Pakistan, Yemen, and Somalia, they each
are unique and present different challenges for U.S. officials.
How do the three countries differ, especially as it relates to
our counterterrorism strategy? How does the United States adapt
to the differences?
Ms. Villarosa. I guess I will start with that.
Each of these are very unique countries. In the case of
Somalia, there hasn't been a functioning government for over 20
years. So we have a multi-pronged strategy in order to start
building stability with the Transitional Federal Government
forces. We are working with the African Union, who have
provided troops to assist the TFG in providing security and
stability in Mogadishu. We are also working with the nations
that surround Somalia, because they are also very threatened by
the threat that comes from Somalia. So we are helping
strengthen their borders.
We are also, because of the attraction of the turmoil in
Somalia to members of the Somali diaspora in the West and in
the United States and in Europe and in Australia, we are
reaching out more broadly to the Somali diaspora to educate
them about the situation, hopefully prevent people from
traveling to take part in the violence. But this will be a
long-term effort.
We are providing training for both the AMISOM forces as
well as the TFG forces. We are getting ready to--we are also
working with some of the other sort of islands of stability
that we find in Somalia. But our goal is a peaceful, stable
Somalia; and it will take a while.
In Pakistan, again, you have an established government
which has its challenges that we are trying to address. There
are some severe economic challenges. There are a lot of local
grievances. So we have tried to address those local grievances
through a lot of our USAID programs.
But, at the same time, we are trying to work--we have been
working closely with Homeland Security in terms of building up
border security and also preventing the movement of improvised
explosive materials into Afghanistan where they are killing our
troops. So we need to work on that. We need to work very much
with the security forces.
Pakistan has 147,000 troops in the border provinces that
they have been working to eliminate the terrorist threat there,
so we need to continue working with them through DOD to help
build their ability to take action. Once they clear out these
terrorists, then we want to help them hold that and start
providing those basic services that the people have not--that
have not been forthcoming in the past.
In the case of Yemen, it is on the front page of the
newspapers today. There is a very serious political dispute
going on. But, at the same time, there is a very real terrorist
threat in that country. Obviously, the political uncertainty
right now makes it difficult for us to do very much. But we had
been working to train the Yemeni security forces again to
exercise more control. As I mentioned earlier, we had a lot of
success in 2009 and 2010.
We are also working through USAID to reach out and, again,
assist in the provision of services and promote countering
violent extremism to delegitimize the violence. We have been
working with--there is a lot of European partners. The Saudis,
the Gulf states are interested in working with us to
delegitimize violence, prevent people from being recruited.
So we do--again, we have multi-faceted approaches to take
on the particular challenges of each one of these very complex
countries.
Ms. Clarke. I want to thank you.
My time has expired, and if time permits we will continue
on that question.
Thank you, Mr. Chairman.
Mr. McCaul. Well, thank you.
The Chairman now recognizes the gentleman from Missouri,
Mr. Long.
Mr. Long. Thank you, Mr. Chairman; and thank you all for
being here today and your testimony.
To Ms. Villarosa in particular, I would like to state that
since I have been--I am a freshman, and since I have been here,
January 5 I believe we were sworn in, I believe I have been to
5,417 different events, one of which was at the State
Department where the Secretary of State invited the freshman
class over. I was just struck that night with the dedication of
everyone over there. You go to these events. When you have been
to 5,417 of them, it is kind of like, hi, how are you? Getting
moved in? Is everything going okay in the District of Columbia
for you?
But at the Department of State everyone was excited about
what they do. They were very engaging. People, some dating back
to working in the Reagan administration, are over there. If you
can just carry a message back to the Secretary and to your
coworkers how much that I appreciated that and their dedication
to what they do, I would appreciate it.
Ms. Villarosa. I am glad to deliver that message. Thank you
so much.
Mr. Long. Okay. That should be an easy one for you to carry
back.
Mr. Koumans, in your opinion, do you think that the
Department of Homeland Security is doing all that it should to
deny terrorists safe havens today?
Mr. Koumans. Thank you for the question, Mr. Congressman.
There is an enormous amount that can be done. I am
satisfied with the amount of work that we are doing in
partnership with the Departments of State and Defense. There is
always more to do, and I think it becomes a question for
leadership in partnership with Congress, in partnership with
the Departments of State and Defense to determine where the
priority should be, where to direct the resources and to remain
nimble so always to be prepared to shift resources as
circumstances warrant.
Mr. Long. In your testimony, you kind of reiterated or
said, I guess, that you do work closely with the Departments of
State and Defense. In your opinion, to what extent does the
Department of State coordinate its efforts with DHS personnel
overseas?
Mr. Koumans. Mr. Congressman, I thank you for your comment,
your question.
I think we cooperate very closely. On the ground at the
embassies overseas, typically DHS personnel, ICE, CBP, TSA, and
others, are part of the ambassador's country team and partner
with the other members of the country team, with the Department
of Justice, Department of Defense, and others who are in the
law enforcement and intelligence and security cooperation
groups that get established at the post, coordinating with
respect to assistance, with respect to visits, with respect to
high-level engagement with the country leadership. It is an on-
going effort and one that requires a lot of work there on the
ground.
We try to copy that cooperation and build on it here back
in Washington, and I think the cooperation that we have is of
extremely high level.
Mr. Long. Ms. Villarosa made mention a minute ago--and I am
still on you, Mr. Koumans--made mention about Yemen. Can you
tell us how many DHS personnel you have in Pakistan and Yemen
and what their duties are?
Mr. Koumans. Sure. Thank you, Mr. Congressman.
We currently have three people in Pakistan, three ICE,
Immigration and Customs Enforcement, officers. We normally have
two in Yemen, also from ICE, but we currently have one there
due to the security situation and the departure that was
ordered. We are down to just one person there.
To answer your question as to their responsibilities, they
carry out the full range of ICE responsibilities with respect
to countering smuggling and trafficking of contraband of every
kind, partnership with local law enforcement in carrying out
investigations that could have roots to other parts of the
world where ICE is operating, and, of course, chiefly, of
course, the United States, carrying out those investigations,
partnering with the State Department with respect to travelers
to the United States, carrying out joint investigations, and
training and mentoring with local officials.
Mr. Long. Okay. Ms. Villarosa, you didn't think you would
get off that easy, so I do have a question for you.
It has been suggested that the Pakistan government has an
increasingly questionable partnership between known terrorist
organizations and the Inter-Services Intelligence, ISI, if you
will. Do you think the United States should continue to involve
Pakistan in anti-terror training programs and provide foreign
aid?
Ms. Villarosa. Mr. Congressman, thank you for that
question.
I very much believe that we should remain very closely
engaged with Pakistan. If we are going to succeed in our
ultimate goal of defeating al-Qaeda, we must work with
Pakistan. The security assistance that we are providing is
enabling them to take action against terrorists in Pakistan.
We have our differences with the Pakistani government, and
we reiterate them regularly. Secretary Clinton was just there
last week and highlighted the many concerns that we have. The
operation of terrorist groups represent not only a threat to us
but to Pakistanis themselves, are very serious, and I think
Secretary Clinton found that the Pakistani officials do want to
continue to cooperate.
We must find--we have to do it. It may be frustrating, but
I think it is very important that we stay engaged over the long
term.
Mr. Long. Okay. I know I am past my time, but if you will
allow me, Mr. Chairman, I also want to thank DHS.
Joplin, Missouri, is in my district, and we had a half-
mile, three-quarter mile by 11 miles wiped out by an F-5 last
week.
I got there at daylight the next morning. The White House
liaison for FEMA, which is under DHS, called and said, we want
you to know that we are coming, you will have everything you
need, and also said we will have boots on the ground shortly. I
said, no, you won't. They are already there. They came about an
hour ago and made introductions. Greg Fugate came in and Rich
Serino came in, the director and the deputy director.
So just everybody needs to keep Joplin in their prayers,
and I very much appreciate the attitude. The President came in
on Sunday, and I was thrilled with that, because he got to see
it with his own eyes.
So, anyway, if you can take the message to FEMA, we
appreciate what they are doing. Thank you.
Mr. McCaul. Thank you, Mr. Long.
Just in conclusion, let me say that proliferation of
weapons of mass destruction has always been a central threat
and issue for the Congress. We are talking about Pakistan,
going back to A.Q. Kahn who proliferated his nuclear capability
to Syria, North Korea, Iran. Pakistan has nuclear weapons. So
the idea that the report required by law under the National
Defense Authorization Act and the Intelligence Reform and
Terrorism Prevention Act would not include information about
proliferation of weapons of mass destruction to me is a
woefully inadequate report.
We are debating a Libya resolution today, and the issue is
what weapons of mass destruction do they have, whether it be
chemical weapons, 10,000 MANPADS.
So I would ask that all three agencies represented here
today, both DHS, Department of State, and Department of
Defense, fully comply with the law here and update these
reports in a more comprehensive way as soon as possible so that
Congress can do its job for the American people. The ultimate
job of this committee is to protect the American people, and
without that information we can't adequately do our jobs. So I
would ask you go back to your bosses and tell them we need that
information as soon as possible.
With that, we will go ahead and dismiss this panel of
witnesses. I want to thank you for your testimony and your
expertise and ask that the second panel take their seats as
well.
Our next panel, Panel II, has three distinguished
witnesses.
First, Mr. Steve Coll, who is President and CEO of The New
American Foundation. Previously, he spent 20 years as a senior
editor and foreign correspondent at the Washington Post,
serving as the paper's managing editor from 1998 to 2004. He is
the recipient of numerous professional awards, including two
Pulitzer Prizes.
On a sort of point of personal privilege, I recall reading
your book Ghost Wars many years ago, which is, in my judgment,
the definitive piece for the Afghan-Soviet and now the current
situation we find ourselves in today with Afghanistan and
Pakistan. It provides still I think the greatest insights into
the threat that we face today. So thank you for your great
contributions.
Second, we have Professor Bruce Hoffman, who is currently a
tenured professor at Georgetown University and director of both
the Center for Peace and Security Studies Program. He was a
scholar in residence for counterterrorism at the CIA between
2004 and 2006. Professor Hoffman also previously held the
Corporate Chair in Counterterrorism and Counterinsurgency at
the Rand Corporation.
Finally, Professor Daniel Byman, who is currently a
professor also at Georgetown University--we have some great
professors at Georgetown, it sounds like--and the research
director and senior fellow at the Saban Center for Middle East
Policy for the Brookings Institution. From 2005 to 2010, Dr.
Byman was a director for the Center for Peace and Security
Studies also at Georgetown. He has worked as a professional
staff member for the National Commission on Terrorist Attacks
on the United States and the joint 9/11 inquiry, U.S. House and
Senate Intelligence Committees. Thank you for being here today.
The Chairman now recognizes Mr. Coll for his statement.
STATEMENT OF STEVE COLL, PRESIDENT AND CEO, NEW AMERICA
FOUNDATION
Mr. Coll. Chairman McCaul, thank you for the kind words.
Ranking Member Clarke and Members of the committee, thanks for
the opportunity to testify.
Almost a decade after the September 11 attacks, the threat
to the United States from al-Qaeda-related groups is
diminishing but remains persistent.
Most encouragingly, al-Qaeda has failed politically and by
doing so has isolated itself. Its violence and absence of
constructive ideas and programs has caused Muslim populations
to turn away, limiting its potential in recruitment and fund-
raising. The death of Osama bin Laden will challenge the group
to manage the first leadership succession crisis in al-Qaeda's
history.
The group's claims on the grievances and imaginations of
disenfranchised Muslims is waning. Yet no terrorist
organization requires a mass following to inflict substantial
and disruptive damage. Al-Qaeda remains capable from time to
time of killing dozens, even hundreds of American citizens at
once, including on American soil, as evidence from recent
plotting makes clear.
Mention has already been made of the Najibullah Zazi case
and the near-miss on Northwest flight 253. Both of these plots
involved safe havens abroad, the Pakistan-Afghanistan border in
the case of Zazi and Yemen in the case of the Christmas day
bombing attempt.
The State Department's Country Reports on Terrorism have
identified 13 terrorist safe havens. Of these 13, at least six
currently contain al-Qaeda or related groups that have
historically displayed international ambitions. The most
prominent areas are the Trans-Sahara, Yemen, Somalia, Pakistan,
Afghanistan, and Iraq. In my judgment, two of these havens
currently stand out as the places most likely to produce potent
cross-border attacks, Yemen and Pakistan.
In Yemen, al-Qaeda in the Arabian Peninsula, headed by bin
Laden's personal secretary, has emerged as the organization's
most internationally ambitious and capable franchise. Because
of political changes and conflicts in Yemen resulting from
anti-government protests of this Arab Spring, the political and
territorial spaces enjoyed by al-Qaeda in the Arabian Peninsula
are likely to expand in Yemen during the next few years. The
country now seems to be falling into civil war. It is likely
that al-Qaeda and historically aligned Yemeni Islamic groups
will seek and gain advantage in the country's coming turmoil,
as they have done in previous eras of Yemeni civil conflict.
In Pakistan, too, the current trend lines for American
counterterrorism goals look difficult. The discovery and
killing of Osama bin Laden in a walled compound not far from
the Pakistan Military Academy has brought U.S.-Pakistani
relations, already troubled, to a low point. This deterioration
will have an impact on American intelligence collection and
paramilitary activity in Pakistan.
The United States has an obvious interest in Pakistan's
success and stability. The country possesses the world's
fastest-growing nuclear arsenal and is adopting defense
policies that are likely to destabilize its military balance
with India in the years ahead. The level of violence and
pressure within Pakistan caused primarily by the Pakistani
Taliban is very disturbing. Ultimately, only a stable,
economically growing, pluralistic Pakistan with much stronger
civilian leadership, healthier civil-military relations, and a
more sustainable defense policy can prevent the country from
remaining a terrorist haven.
Over the long run, a more successful Pakistan will only
emerge if its military and civilian elites decide that it is in
the country's national interest to increase cooperation with
India, particularly cooperation that will lead to greater
economic integration in South Asia. Full peace is not necessary
to produce the economic growth that has altered similar
patterns of internal violence, government dysfunction,
terrorism, and failed civil-military relations in countries
such as Indonesia, Columbia, the Philippines, and Turkey.
Another reset in American policy toward Pakistan is on the
horizon. In the security realm, what seems required is a
clearer, more focused, more manageable effort to identify and
act on shared interests against al-Qaeda and in the transition
ahead in Afghanistan. Both countries may benefit now from a
period of less hopeful transformative America ambition and more
clear-eyed focus on shared interests. At the same time, it
would be helpful for the United States to reset its longer-term
planning to construct a pragmatic vision to promote regional
economic integration in South Asia as well as Pakistani
economic growth.
Thanks again for the opportunity to participate in this
hearing.
[The statement of Mr. Coll follows:]
Prepared Statement of Steve Coll
June 3, 2011
Chairman McCaul, Ranking Member Keating, distinguished Members of
the committee, thank you for the opportunity to testify today.
In my testimony, I will address several of the questions the
committee is exploring, with an emphasis on those areas where my
experience is greatest. In particular, I will review: (1) An estimate
of the threat al-Qaeda poses today; (2) which overseas havens currently
pose the greatest threat to the United States; (3) the struggle of the
United States to construct a successful policy toward Pakistan; and (4)
some opportunities for improved Government reporting on terrorism
raised by the findings of the General Accountability Office report,
``Combating Terrorism: U.S. Government Should Improve Its Reporting on
Terrorist Safe Havens.''
al-qaeda after the death of osama bin laden
Almost a decade after the September 11 attacks, the threat to the
United States from al-Qaeda-related groups is diminishing but
persistent.
Most encouragingly, al-Qaeda has failed politically, and by doing
so, has isolated itself. Its violence and absence of constructive
political ideas and programs has caused Muslim populations and
important constituencies to turn away, limiting its potential in
recruitment and fundraising. The death of Osama bin Laden will
challenge the group to manage the first leadership succession crisis in
its history. Al-Qaeda will likely struggle continue in the forms it has
presented since its founding in 1988. The odds are rising that it will
fragment into even more autonomous regional groups and that some of
those groups will turn increasingly to criminal activity such as
kidnapping-for-ransom. Such criminality will accelerate a positive
trend, namely, that al-Qaeda's claim on the grievances and imaginations
of disenfranchised Muslims is waning.
Yet no terrorist organization requires a mass following to inflict
substantial and disruptive damage. Al-Qaeda remains capable from time
to time of killing dozens, even hundreds of American citizens at once,
including on American soil, as evidence from recent plotting makes
clear. In September 2009, an Afghan-American who had been recruited by
al-Qaeda, Najibullah Zazi, planned an attack against subway trains in
Manhattan; Zazi had the intent and means to succeed, but fortunately,
intelligence and law enforcement officers intercepted him. Three months
later, Umar Farouq Abdulmutallab, a Nigerian who was recruited by al-
Qaeda in the Arabian Peninsula, attempted to destroy Northwest Flight
253 as it vectored to land in Detroit. He, too, had the intention and
means to succeed, but fortunately, his bomb makers were imperfect.
External attacks of this scale have been attempted by al-Qaeda and
related groups at regular intervals since September 11. Attempts of
this magnitude are certain to continue. It is also conceivable that a
small, talented, clandestine group, probably originating from Pakistan,
could carry out a larger-scale, even more spectacular attack, for
example, of the media-driven type witnessed in Mumbai, India, in
November 2008. It would be very difficult for such a group to act
within the United States without being detected first, but the
possibility cannot be ruled out entirely, as the capacity and intention
of some radicals in Pakistan to attack the United States directly
clearly remains. Some Pakistani groups with international ambitions,
such as Lashkar-e-Taiba, draw on well-educated volunteers who include
scientists, doctors, and other talented urban professionals who might
have the creativity and resources required. In addition, the ability of
dangerous, determined groups to form and plan in Yemen is likely to
grow as that country's internal conflicts worsen.
More recently, homegrown attacks by radicalized individuals living
in the United States have increased in frequency and seriousness. The
most serious of these was the attack carried out by Maj. Nidal Malik
Hasan, who killed 13 people at Fort Hood, Texas, in 2009.
The nature and scale of all these threats must be kept in
perspective. Last year, the New America Foundation and the Maxwell
School at Syracuse University surveyed and analyzed the cases of the
180 individuals indicted or convicted in Islamist terrorism cases in
the United States since the September 11 attacks. The research found
that only four of the homegrown attacks caused casualties in the United
States, and that these attacks resulted in a total of 17 deaths--13
from the Fort Hood attack. By way of comparison, according to the FBI,
between 2001 and 2009, 73 people were killed in hate crimes in the
United States. About 15,000 Americans are murdered each year.
the safe haven map
In August, 2010, responding to a Congressional mandate, the State
Department's Country Reports on Terrorism identified 13 terrorist safe
havens: The Trans-Sahara (Algeria, Mali, Maritania, and Niger);
Venezuela; the Colombia Border Region (Brazil, Ecuador, Panama, Peru,
and Venezuela); the Tri-Border Area (Argentina, Brazil, and Paraguay);
Yemen; Somalia; Pakistan; the Sulu/Sulawesi Seas Littoral (the maritime
boundaries of Indonesia, Malaysia, and the Philippines); the Southern
Philippines; Afghanistan; Northern Iraq; Iraq; and Lebanon.
Of these 13, at least six currently contain al-Qaeda or related
groups that have historically displayed international ambitions. These
most prominent areas are the Trans-Sahara, Yemen, Somalia, Pakistan,
Afghanistan, and Iraq. Inside all of these havens violence and
kidnapping have been regular occurrences in recent years.
In the case of Somalia there is incipient evidence of international
terrorism, but most of the violence is local. But of the six havens
with an al-Qaeda presence, two currently stand out in the open sources
for the extent to which they have recently and will likely produce
potent attacks beyond the borders of the haven: Yemen and Pakistan.
Before we turn to those two cases, it is worth examining what is
not marked on the State Department map. Understandably, for reasons of
definition and foreign policy clarity, State defines safe havens in a
way that emphasizes the impunity that terrorists or financiers may
enjoy when they take root in ungoverned spaces or areas where local
authorities find it convenient to collaborate with terrorist groups,
for ideological or financial reasons, or because they are too weak to
oppose the terrorists. This approach to thinking about safe havens
inevitably produces a map biased toward weak states.
Consider, by way of contrast, what a map of the actual planning,
travel, and transit of convicted terrorists would look like. It would
show many individuals spending many hours in hotel rooms, dormitories,
and residential housing in the United States, Europe, Dubai, Asia and
elsewhere--very often undetected. It would show almost all of those
individuals using communications technologies rooted in the United
States and distributed globally. The point here is that in
conceptualizing the challenge of safe havens, it would be a mistake to
locate our thinking only in the cartoonish image of a Dr. Evil holed up
in a cave or foggy compounds beyond the reach of the law and Special
Forces. Modern terrorism is a media-leveraging tactic embedded in the
structures of our prosperous, globalized economy. It cannot be
successfully contained if it is only considered as an external threat
from weak states.
An implication of this argument is that in addition to the sort of
mapping analysis mandated of State in its Country Reports, it might be
useful to Congress, in its oversight role, to obtain analysis of the
terrorist threat that is more reverse-engineered from actual terrorist
activity. What does this activity show about their use of actual havens
and transit and communications corridors, whether of the traditional
ungoverned-territory type or the post-modern, internet-and-airport-
lounge type? What policy-relevant insights might be obtained from such
bottom-up analysis?
Certainly, traditional, external havens in weak states, such as
Pakistan and Yemen, remain very important. As I have argued,
considering the residual international threat posed by al-Qaeda, they
remain the two most important cases.
In Yemen, al-Qaeda in the Arabian Peninsula, headed by Bin Laden's
former personal secretary Nasir al-Wahayshi, has emerged as the
organization's most internationally ambitious and capable franchise.
Because of political changes and conflicts in Yemen resulting from
anti-government protests of this Arab Spring, the political and
territorial spaces enjoyed by AQAP are likely to expand in Yemen during
the next few years. The country seems now to be falling into civil war.
In recent, earlier eras of civil conflict in Yemen, al-Qaeda has
exploited the fighting to gain space and allies, and it is likely to
attempt this again.
Al-Qaeda's roots in Yemen trace back decades. The bin Laden family
immigrated to Saudi Arabia from the Hadramawt, an interior region of
Yemen. Osama bin Laden identified with his family's roots in Yemen,
particularly after he was deprived of Saudi citizenship; he financed
and otherwise participated in Islamist uprisings there during the
country's civil conflicts between 1990 and 1992; he reportedly explored
moving to Yemen at later points; he took a wife from the country; and
al-Qaeda has continually funded violent activity there. The most
significant of these attacks was the bombing of the U.S.S. Cole in
2000. Yemen's weak strongman President, Ali Abdullah Saleh, sought to
co-opt Islamist groups and to contain al-Qaeda, particularly to the
extent that its activity jeopardized American aid flows. His position
became more difficult after 2003, when a crackdown on al-Qaeda cells in
neighboring Saudi Arabia sent dozens of terrorist refugees scurrying to
Yemen. They regrouped, particularly in the southern Abyan Governate. In
general, Saleh's political influence has been weakened in the south by
a succession movement there.
The arrival in Yemen of American-born media innovator Anwar al-
Awlaki amplified these changes. Through his on-line magazine Inspire
and various self-produced videos, al-Awlaki has become a significant
voice in English-medium discourse for al-Qaeda, filling an important
gap in the group's language channels. The extent of his operational
role is not entirely clear from the open sources, but it is plain that
he has participated in plotting international violence and recruiting,
and that he has both the intent and the capability to facilitate
significant violence.
The course of anti-government protests against Saleh and their
implications for Yemen's political future are unclear. Civil war
increasingly seems a possibility, although who will win the current
military confrontation between Saleh and some of his tribal opposition
is difficult to predict. It is all but certain, however, that Yemen's
weak central government will weaken further and that its recent
internal conflicts--a mostly sectarian uprising in the north, a
secession movement in the south--will accelerate and mix in with new
conflicts.
On May 29, news reports indicated that armed men had seized the
town of Zinjibar in the Abyan Governate; officials in the capital of
Sanaa claimed the rebels had ties to al-Qaeda. Such claims by a
besieged dictator whose legitimacy in Western eyes has derived from his
(partial) willingness to accommodate Western counterterrorism policy
should be taken with a shaker full of salt. Nonetheless, it is likely
that al-Qaeda and historically aligned Islamist groups will seek and
gain advantage in Yemen's coming turmoil. During the civil war 20 years
ago, they played a role in the fighting and, following victory, were
rewarded by Saleh's relatively accommodating policies. They will likely
seek a fighting role again.
Saleh's irrational resistance to proposals for his resignation, and
the violence his resistance has precipitated, has already weakened the
state that his successor will inherit. All of this will make
intelligence collection and the pursuit of pressure on AQAP through
collaboration with Yemeni security forces more difficult. So far as is
apparent in the open sources, the ability of the United States to
collect intelligence and act unilaterally against al-Qaeda in Yemen is
considerably more limited than in Pakistan and Afghanistan. The
collapse of the Yemeni political order, the fragmentation of its
security forces and the prospect of sustained internal conflict will
make this harder still. Full-on civil war or a series of concurrent,
intensifying internal conflicts may draw AQAP into local battles for a
time but it may also provide them more resources and freedom of
maneuver, particularly in southern Yemen, which faces pirate-infested
sea channels across from ungoverned and al-Qaeda-influenced Somalia.
In Pakistan, too, the current trend lines for American
counterterrorism policy look unfavorable. The discovery and killing of
Osama bin Laden in a walled compound in Abbottabad, not far from the
Pakistan Military Academy, has brought U.S.-Pakistani relations,
already troubled, to a low point, comparable at least in the levels of
mutual mistrust to the breach in relations in the early 1990s. This
deterioration of relations will have an impact on American intelligence
collection and paramilitary activity in Pakistan. For example, Pakistan
has demanded that the United States reduce the number of American
military, diplomatic, and administrative personnel in the country; one
of Pakistan's motivations is to reduce American intelligence collection
capabilities within the country, and to channel a greater share of
American intelligence activity through joint operations, where Pakistan
can maintain greater control.
The discovery of bin Laden in Abbottabad has raised questions about
how and why sections of Pakistan's Army and intelligence service, the
I.S.I., might provide haven to al-Qaeda. Many of the specific questions
about whom in Pakistan's security services knew what about bin Laden's
sanctuary may never be answered satisfactorily. But a few points can be
made with relatively high confidence.
First, in the Pakistani political economy, it is simply not
possible to build an expensive, heavily secured, walled compound in a
closely-policed town such as Abbottabad without collaboration from at
least some government officials. For example, Pakistan has one of the
lowest rates of tax participation in the world, even among countries of
its economic profile. The reason is that police, intelligence officers,
and other government officials routinely extort payments from wealthy
householders to protect them from tax raids. It seems likely that at
least some Pakistani officials were on the payroll of bin Laden's
compound for this reason. Whether they would have known that bin Laden
was living there, or where the money came from, is another matter. If
I.S.I. officers were among those extracting supplemental incomes from
the Abbottabad compound, as would seem possible, if not likely, they
may or may not have informed their superiors. I.S.I. is a large,
complex organization, a state within the Pakistani state; it is also an
organized economic or criminal enterprise with diverse, autonomous,
self-rewarding cells scattered throughout.
Second, the circumstances in which bin Laden was discovered were
not by themselves unusual. Listed terrorist leaders from anti-Indian
organizations such as Lashkar e-Taiba and Jaish-e-Mohammed have lived
for years in similarly ambiguous walled compounds and apartment
buildings around Pakistan. The fugitive mastermind of the 1993 bombings
in Mumbai, the underworld figure Ibrahim Daoud, has reportedly lived
and prospered in Karachi for many years. Sometimes the circumstances of
these listed terrorists are described by the Pakistani government as
``house arrest;'' other times they are described as ``fugitives in
hiding.'' The ambiguity is deliberately constructed by I.S.I. and the
Pakistani state to maintain the greatest degree of flexibility at home
and in its long-running struggle against India. Afghan Taliban leaders
known to be living in exile in Pakistan presumably enjoy the same haven
policies. That bin Laden, too, found a place in this much larger system
is shocking to Americans because of the scale of murderous violence he
authored on September 11. In the local context, however, the
circumstances of his hiding place were not unusual among terrorists
sheltering in the country.
In Yemen, ``safe haven'' is largely a function of weak state
formation. In Pakistan, the state is weak but the sources of haven are
more varied and more directly tied to state policy. Fundamentally,
Pakistan provides safe haven for violent Islamist groups, including
listed terrorists such as al-Qaeda, for two reasons. First, the Army
and I.S.I. find some of these groups to be useful levers in regional
competition with India and Afghanistan. Second, having nurtured
Islamist groups for three decades (initially, during the anti-Soviet
war in Afghanistan, in collaboration with the United States), Pakistan
has been weakened by their virulence and revolutionary ambition, and
the state now lacks the capacity to wipe out the groups without paying
a very high price and incurring great risks; accommodation, therefore,
seems the wiser policy, even in the face of rising evidence that this
approach may not work.
american policy in pakistan
The United States has an obvious interest in Pakistan's success and
stability. The country possesses the world's fastest-growing nuclear
arsenal and is adopting defense policies that are likely to destabilize
its military balance with India in the years ahead. The Pakistani
Taliban, influenced and perhaps aided by al-Qaeda, has mounted an
insurgency aimed at overthrowing the country's military and civilian
leadership. The Pakistan Army has contained the insurgency at a high
price, but the level of violence and pressure the Taliban is producing
within Pakistan is very disturbing.
Ultimately, only a stable, economically growing, pluralistic
Pakistan with much stronger civilian leadership, healthier civil-
military relations, and a more sustainable defense policy can prevent
the country from remaining a terrorist haven. American attempts to
construct a policy that will aid the emergence of this Pakistan--a
``normal'' if chronically troubled country--have evidently failed to
date. Unfortunately, it may be beyond the capacity of the United States
to decisively influence the outlook of the Pakistan Army and the I.S.I.
about India and Pakistani National security, and it is the Army's
outlook on security matters, more than any other factor, that has
created the landscape in Pakistan we see today.
Over the long run, a more successful Pakistan will only emerge if
its military and civilian elites decide that it is in the country's
national interest to increase cooperation with India, particularly
cooperation that will lead to greater economic integration in South
Asia. Full peace is not necessary to produce the sort of incentive-
changing trade and internal growth that has altered similar patterns of
internal violence, terrorism, and failed civil-military relations
during the past two decades, to varying degrees, in countries such as
Indonesia, Colombia, the Philippines, and Turkey. India's high rates of
economic growth are proving to be transformative within that country;
to change, Pakistan needs greater access to that regional engine of
growth and middle class formation.
American policy toward Pakistan has long been imprisoned by
compelling but narrow security imperatives--the invasion of
Afghanistan, nuclear proliferation and the rise of al-Qaeda and related
groups, to name three--at the expense of sustained, highly prioritized
policy to pursue regional economic integration and broadly distributed
Pakistani economic growth. Only the latter policy offers the hope of a
Pakistan capable of delivering on its obligations and interests in the
international system.
In the mean time, once again, the United States' security interests
remains trapped by short-term security needs. These are, currently, not
only the problem of terrorism and safe havens, but also supply lines
that run through Pakistan to support more than 100,000 American troops
in Afghanistan. The need to reduce troop levels without empowering the
Taliban or touching off civil war, a project that will require some
degree of Pakistan's cooperation.
Another ``reset'' in American policy toward Pakistan is on the
horizon. In the security realm, what seems required is a clearer, more
manageable effort to identify and act on shared interests--against al-
Qaeda, and in the transition ahead in Afghanistan. Both countries will
benefit from a period of less hopeful, transformative ambition and more
clear-eyed focus on shared interests. At the same time, it would be
helpful for the United States to reset its medium-term and long-term
planning to construct a pragmatic vision to promote regional economic
integration and Pakistani growth.
the gao report
In their report, ``Combating Terrorism: U.S. Government Should
Improve Its Reporting on Terrorist Safe Havens,'' researchers at the
General Accounting Office raise a number of interesting question about
Congressionally-mandated reports on safe havens and terrorism more
generally. Although this is not my particular area of experience or
putative expertise, as an independent analyst who often makes use of
this Government reporting, I thought I would offer a modest idea about
how the reporting might be improved.
Annual reporting on terrorism by State serves a number of purposes.
It provides Congress with a sound, specific basis for oversight. It
informs the public. It also coerces governments and security services
that harbor or might consider harboring terrorists by calling attention
to their activity in an influential way.
It should be the ambition of the United States to produce credible
reporting about states that support terrorism that is as effective and
impactful as the reporting the State Department publishes annually
about human rights. The State Department's annual human rights reports
are credible and constructive. They provide a basis for substantial
media reporting in countries where abuses occur; they provide cover for
international civil society activists challenging local authoritarians
and dictators; and they coerce and influence governments that receive
unfavorable, embarrassing notice. In my judgment, State's human rights
reports pull the occasional punch but in comparison to other Government
reporting of this type they are generally honest, forthright, and
highly credible. Partly this is because civil society investigators at
groups such as Human Rights Watch and Amnesty International produce
their own highly credible investigations; this marketplace effect helps
keep State's work honest.
The GAO points out a number of ways in which State's reports on
safe havens and the counterterrorism policies of foreign governments
could be improved. In my reading of the reporting, one problem is the
extent to which the published assessments are compromised by the need
not to offend flawed foreign security and intelligence services on
which the United States depends for cooperation. In comparison to its
human rights reporting, that is, the United States' counterterrorism
reporting is less forthright and convincing.
One way to counter this problem would be to commission annual
analytic reports by independent experts--perhaps a standing commission,
perhaps a rotating panel. Just as American economic policy benefits
from the diverse views and debates generated by independent Federal
Reserve governors, so might American counterterrorism policy benefit
from assessments of safe havens, foreign government performance, and
U.S. policy from experts who have no bureaucratic or policy equities at
stake, and no operational need to shave the facts in order to get along
with a particular foreign government. Such work need not be expensive;
it would also have the benefits of aiding Congressional oversight,
informing the public, and putting pressure on under-performing
governments.
Thank you again for the opportunity to participate in this hearing.
Mr. McCaul. Thank you, Mr. Coll.
Now the Chairman recognizes Professor Hoffman.
STATEMENT OF BRUCE HOFFMAN, DIRECTOR, CENTER FOR PEACE AND
SECURITY STUDIES, DIRECTOR, SECURITY STUDIES PROGRAM,
GEORGETOWN UNIVERSITY
Mr. Hoffman. Thank you Chairman McCaul, Ranking Member
Clarke, and Congressman Long for the opportunity to testify.
History has shown that al-Qaeda is nothing without a
physical sanctuary or safe haven. Indeed, this is why al-Qaeda
has invested so much of its energy in recent years to
strengthening the capabilities of its affiliated and associated
movements in Pakistan, Yemen, and Somalia.
Al-Qaeda has thus created a networked transnational
movement in order to ensure its survival. Accordingly, rather
than the single, monolithic entity of a decade ago, today there
are several al-Qaedas, not just one, each of which has
different capabilities and presents different, often unique,
challenges.
This effectively negates a one-size-fits-all strategy on
our part. Indeed, countermeasures have to be tailored to the
specific conditions and realities in each of these places where
al-Qaeda and its franchises have taken root and indeed
flourished.
Al-Qaeda's strategy of survival in recent years has been
predicated on the expansion and consolidation of its safe
havens and sanctuaries in both South Asia and beyond. Its
greatest success, of course, has been in Pakistan, but
significant strides have been made in Yemen and Somalia as
well. Indeed, since 2004, every major terrorist attack or plot
against the United States or our European allies has emanated
from al-Qaeda or its affiliates and associates based in
Pakistan, Yemen, or Somalia. The majority of these attacks and
plots have originated from Pakistan. Sizable numbers of Arabs,
Turks, Chechens, Chinese, and Uzbeks comprise an international
jihadi contingent based in Pakistan that, along with their
indigenous allies and hosts have planned local, regional, and
international terrorist operations on an ambitious scale.
Although fewer in number, the plots that have originated
from Yemen by al-Qaeda in the Arabian Peninsula have been no
less serious and, if anything, even more ambitious. Not
surprisingly, a succession of U.S. intelligence officials have
expressed concern at the rapidity with which AQAP has emerged
as a potent force in international terrorism, posing perhaps an
even greater threat to U.S. security than its parent body.
In al-Shabaab's case as well, American and European
intelligence officials have been alarmed by the global
ambitions and international radicalization and recruitment
capabilities of this relative new Somali militant organization.
All these incidents represent the fruition of al-Qaeda's
strategy to fight its enemies on multiple fronts and from
multiple bases. Accordingly, it conducts local campaigns of
subversion and destabilization in critical operational theatres
where failed or failing states provide new opportunities for
al-Qaeda to extend its reach and consolidate its presence.
Countries such as Pakistan, Somalia, and especially Yemen
figure prominently within this category.
Al-Qaeda also deliberately seeks to seek out citizens and
residents of enemy countries who can then be brought to these
sanctuaries and safe havens for training. Pakistan, Yemen, and
Somalia again figure prominently in this strategy.
Failing to deprive al-Qaeda and its affiliates and
associates of these safe havens and sanctuaries will almost
certainly give al-Qaeda new momentum and greater freedom of
action than an expanded geographical ambit facilitates. This
will require both continued U.S. military and intelligence
operations in South Asia, alongside a continual scanning of the
horizon to counter al-Qaeda's presence in and prevent its
expansion to other failed and failing states.
An effective strategy will combine the tactical elements of
systematically destroying and weakening enemy capabilities
alongside the equally critical, broader strategic imperative of
breaking the cycle of terrorist and insurgent recruitment and
replenishment that have respectively sustained al-Qaeda and
fueled its allies in Yemen and Somalia as well. Enhanced and
improved and better-coordinated information operations will be
a critical element of this approach. This will also entail the
building of host nation capabilities to a greater and more
sustained extent than currently exists.
In conclusion, it would be dangerously precipitous at this
time to declare a total victory. Al-Qaeda's hopes of renewal
and regeneration in the aftermath of bin Laden's killing rest
on its continued access to the geographical sanctuaries and
safe havens that the movement has always depended on and
historically has used as bases from which to plot and plan and
launch international terror strikes. Only by depriving al-Qaeda
of those sanctuaries, destroying the organization's leadership,
and disrupting the continued resonance of its message will al-
Qaeda finally be defeated.
Thank you very much.
[The statement of Bruce Hoffman follows:]
Prepared Statement of Bruce Hoffman*
---------------------------------------------------------------------------
* Bruce Hoffman is Director of the Center for Peace and Security
Studies and Director of the Security Studies Program at Georgetown
University and a Senior Fellow at the U.S. Military Academy's Combating
Terrorism Center.
---------------------------------------------------------------------------
June 3, 2011
History has shown that al-Qaeda is nothing without a physical
sanctuary or safe haven. Indeed, this is why al-Qaeda has invested so
much of its energy in recent years to strengthening the capabilities of
its affiliated and associated movements in Pakistan, Yemen, and
Somalia. Al-Qaeda has thus created a networked transnational movement
in order to ensure its survival. Accordingly, rather than the single,
monolithic, entity of a decade ago, today there are several al-Qaedas,
not just one: Each of which has different capabilities and presents
different, often unique, challenges. This effectively negates a ``one-
size-fits-all'' strategy. Instead, countermeasures have to be tailored
to the specific conditions and realities in each of these places where
al-Qaeda and its franchises have taken root and indeed have flourished.
the role of safe havens and sanctuaries in al-qaeda's strategy
Al-Qaeda's strategy of survival in recent years has been predicated
on the expansion and consolidation of its safe havens and sanctuaries
in both South Asia and beyond. It's greatest success has of course been
in Pakistan but significant strides have been made in Yemen and Somalia
as well. Indeed, since 2004 every major terrorist attack or plot
against the United States or our European allies has emanated from al-
Qaeda or its affiliates and associates based in Pakistan, Yemen, or
Somalia.
The majority of these attacks and plots have originated from
Pakistan. Arabs, Turks, Chinese, Uzbeks, and Chechens comprise an
international jihadi contingent based in Pakistan that, along with
their indigenous allies and hosts have planned local, regional, and
international terrorists operations on an ambitious scale. As Dame
Eliza Manningham-Buller, then-Director General of the British Security
Service (MI5), explained in a November 2006 speech, upwards of 30
terrorist plots and attacks in the United Kingdom alone had been
``linked back to al-Qaeda in Pakistan . . . through those links al-
Qaeda gives guidance and training to its largely British foot soldiers
here on an extensive and growing scale.''\1\ Among the 30 incidents she
referred were:
---------------------------------------------------------------------------
\1\ Quoted in BBC News, ``Extracts from MI5 Chief's Speech,''
November 10, 2006 accessed at http://newsvote.bbc.co.uk/mpapps/
pagetools/print/news.bbc.co.uk/2/hl/news/6135000.stm.
---------------------------------------------------------------------------
The planned bombing of a London nightclub and a shopping
center in April 2004;
The 7 July 2005 suicide attacks on London transport that
killed 52 persons and wounded nearly a thousand others;
The abortive follow-on plot against the same target set in
London 2 weeks later; and
The attempt in August 2006 to bomb seven U.S. and Canadian
aircraft departing from London's Heathrow Airport.
More recently, the following additional plots and attacks emanating
from Pakistan, including several planned to occur in the United States
have been detected. They include:
The January 2008 plan to attack transportation targets in
Barcelona, Spain that in turn was linked to another plot by a
sister terrorist cell in Germany;
The abortive plan to bomb New York City's Pennsylvania
Station on Thanksgiving day 2008;
The plots uncovered to stage attacks in Manchester, England
in April 2009 and in New York City against its subway system in
September 2009;
The attempt to detonate an explosive-packed SUV in New York
City's Times Square; and,
The plan to attack transportation targets in Berlin, Germany
that was uncovered just days before bin Laden's killing on 2
May 2010.
Although fewer in number, the plots that have originated from Yemen
by al-Qaeda in the Arabian Peninsula (AQAP), have been no less serious
and, if anything, even more ambitious. Among them were:
The September 2009 attempted assassination of Prince
Mohammed bin Nayef in Saudi Arabia, the Deputy Interior
Minister responsible for counterterrorism in that country;
The Christmas day 2009 plot to explode a bomb aboard a
Northwest Airlines flight en route From Amsterdam to Detroit;
and,
The attempt to blow up American cargo planes uncovered in
September 2010 involving bombs disguised as photocopier printer
cartridges.
Not surprisingly, a succession of U.S. intelligence officials have
expressed concern at the rapidity with which AQAP has emerged as a
potent force in international terrorism posing perhaps an even greater
threat to U.S. security than its parent body.
And, from Somalia a January 2010 plot by members of the al-Qaeda
affiliate in that country, al-Shabaab (``The Youth'') to kill the
Danish cartoonist responsible for drawings of the Prophet Muhammad that
enraged the Muslim world. In al-Shabaab's case as well, American and
European intelligence officials have been alarmed by the global
ambitions, and international radicalization and recruitment
capabilities of this relatively new Somali militant organization.
al-qaeda's strategy of survival
All these incidents represent the fruition of al-Qaeda's strategy
to fight its enemies on multiple fronts and from multiple bases.
Accordingly, it conducts local campaigns of subversion and
destabilization in critical operational theatres where failed or
failing states provide new opportunities for al-Qaeda to extend its
reach and consolidate its presence. Countries such as Pakistan,
Somalia, and especially, Yemen prominently fall within this category.
Al-Qaeda accordingly provides guidance, assistance, and other help
to its local affiliates and associated terrorist movements. This
support often appreciably enhances attack capabilities and strengthens
the resilience of these groups thus presenting more formidable
challenges to national and local police, military forces, and
intelligence agencies. Al-Qaeda actively works behind the scenes to
``plus up'' the capabilities of indigenous terrorists both in terms of
kinetic as well as essential non-kinetic operations--including
information operations, propaganda, and psychological warfare.
Al-Qaeda's role in each of these theaters is thus critical. It
serves as a ``force multiplier'': providing training and advice and
otherwise building existing capacity among indigenous insurgent groups.
The standard basic insurgent training package of riflery and field
craft, for instance, is augmented by al-Qaeda instruction in advanced
ambush techniques and the use and emplacement of increasingly
sophisticated improvised explosive devices. Al-Qaeda additionally
provides overall strategic guidance and assists in the coordination of
operations between a variety of terrorist and insurgent groups. It
imparts useful non-combat skills as well: Teaching local jihadis how to
plan and execute psychological and information operations, make use of
the internet for radicalization and recruitment purposes, and generally
improve and strengthen operational expertise and organizational
resiliency.
Al-Qaeda also deliberately seeks out citizens and residents of
enemy countries, who can then be brought to these sanctuaries and safe
havens for training. Pakistan, Yemen, and Somalia have figured
prominently in this strategy.
For example, members of each of the British terrorist cells
involved in the aforementioned plots and attacks in the United Kingdom
between 2004 and 2006 were trained at the same al-Qaeda camp in
Pakistan's Malakand Agency.
Like these British plotters, Najibullah Zazi, the Afghan-born,
Green Card holder who lived in Queens, New York, and ring-leader of the
2009 plot to stage suicide attacks against the New York City subway,
was also instructed in the fabrication of powerful homemade explosives
using ordinary commercial ingredients like hair bleach (hydrogen
peroxide) and acetone at an al-Qaeda facility in Pakistan.
Zazi and his two fellow conspirators told FBI agents, that they had
been trained in bomb making at an al-Qaeda camp in Pakistan. Senior al-
Qaeda commanders had overseen and directed the operation, which was
linked to another set of attacks planned from Pakistan to occur in
Manchester, England in April 2009. The superseding indictment of Zazi
and the two other men filed by the U.S. Department of Justice on 7 July
2010 unambiguously describes how this ``American-based al-Qaeda cell''
was commanded by ``leaders of al-Qaeda's external operations program
[based in Pakistan who were] dedicated to terrorist attacks in the
United States and other Western countries.''\2\
---------------------------------------------------------------------------
\2\ United States District Court Eastern District of New York,
United States of America v. Adis Medunjanin, Abid Nasser, Adnan El
Shukrijumah, Tariq Ur Rehman, and FNU LNU, 7 July 2010.
---------------------------------------------------------------------------
Umer Farouk Abdulmuttalab, the would-be Christmas day 2009 airline
bomber, for example, was trained and prepared for his operation in
Yemen by AQAP. It is believed that the group may have been responsible
for recruiting, training, and deploying at least 7 other bombers--and,
according to some reports, as many as 20--from Europe and the United
States.
According to Western intelligence sources, as of 2010, al-Qaeda has
been able to train and deploy back to their home or adopted countries
some 100 and 150 persons from Europe and the United States, among other
locales.
Finally, lest there be any remaining doubts about the importance of
physical safe haven and training facilities to terrorist organizations
in general and those within al-Qaeda's orbit in particular, the case of
the nearly 30 young Somali-Americans who left the United States between
2007 and 2008 to train in terrorism and guerrilla warfare in Somalia
provides a salutary remainder.
The youths were radicalized and recruited in the United States and
trained in Somalia by al-Shabaab, the local al-Qaeda ally that
deliberately emulates its mentor organization--down to its reliance on
training camps and use of the internet for propaganda purposes.
Indeed, it is believed that their trainer in Somalia was Saleh Ali
Nabhan, the longtime al-Qaeda commander implicated in both the 1998
bombing of the American embassy in Nairobi and the 2002 attack on
Israeli tourists at a hotel in Mombassa, who was reportedly killed in
September 2009 by U.S. special operations forces in Somalia. Two of
these youths have become the first-known Americans to have carried out
suicide terrorist attacks.\3\
---------------------------------------------------------------------------
\3\ Spencer S. Hsu, ``Concern Grows Over Recruitment of Somali
Americans by Islamists,'' Washington Post, 4 October 2009.
---------------------------------------------------------------------------
The Annual Report 2008\4\ of the Netherlands' General Intelligence
and Security Service (Algemene Inlichtingen en Veiligheidsdienst, or
AIVD), had specifically called attention to the growing threat then
posed by al-Qaeda and its allies because of the sanctuary they had
established in Pakistan and elsewhere. The AIVD, it should be noted, is
among the most professional and prescient of the world's intelligence
and security agencies. Though far smaller than many of its Western
counterparts,\5\ the AIVD is an elite and perspicacious service that is
impressive for its early identification and incisive analysis of
emerging trends.
---------------------------------------------------------------------------
\4\ General Intelligence and Security Service, Annual Report 2008
(The Hague: Ministry of the Interior and Kingdom Relations, 2009). The
report can be accessed at: http://www.fas.org/irp/world/netherlands/
aivd-2008.pdf.
\5\ The AIVD reportedly employs some 1,100 people. See DutchNews LG
accessed at: http://www.dutchnews.nl/dictionary/2006/11/aivd.php.
---------------------------------------------------------------------------
``Al Qaeda's ability to commit and direct terrorist attacks has
increased in recent years,'' the report, which was released in April
2009, unequivocally states. ``The AIVD received a growing number of
indications that individuals from Europe are receiving military
training at camps in the Pakistan-Afghanistan border region.''\6\
Further elucidating this key point, the report goes on to explain how
---------------------------------------------------------------------------
\6\ General Intelligence and Security Service, Annual Report 2008,
p. 17.
``An analysis conducted in 2008 by the AIVD and verified by fellow
services indicates that core Al Qaeda's ability to carry out terrorist
attacks has increased in recent years. To a great extent, this is
explained by the many alliances Al Qaeda has forged with other networks
and groups, both in the Pakistan-Afghanistan border region itself and
---------------------------------------------------------------------------
elsewhere in the Islamic world . . .
``One development of particular concern is the growing evidence that
people from Europe are undergoing military training at camps in the
border region.''\7\
---------------------------------------------------------------------------
\7\ Ibid., p. 19.
The report's conclusion was as disquieting as it was sobering:
``This could increase the ability of (core) al-Qaeda and its allies to
commit or direct attacks in Europe.''\8\
---------------------------------------------------------------------------
\8\ Ibid., p. 17.
---------------------------------------------------------------------------
Earlier in 2008, Spanish authorities had uncovered a terrorist cell
in Barcelona, that was planning terrorist attacks against
transportation targets in that city. It was directed by the late
Pakistani Taliban leader Beituallah Meshud (who was killed in a
predator airstrike in 2009). In addition, terrorist cells of other
Pakistanis in Belgium, the Netherlands, and Germany, among other places
that were subsequently uncovered had similar plans and were also
directed by Meshud's Taliban faction from Pakistan. Further, the German
terrorists who in September 2008 were arrested and charged with
plotting to bomb U.S. military targets in that country had also been
trained in Pakistan at a camp run by the IJU (Union of Islamic Jihad),
an Uzbek jihadi group closely allied to al-Qaeda.
sanctuaries and safe havens matter to al-qaeda
Despite the evidence to the contrary, the centrality of sanctuaries
and safe havens to al-Qaeda and its allies and affiliates is often
dismissed or discounted. This willful ignoring of recent history may be
found in arguments claiming that al-Qaeda ``requires apartments and not
acres''\9\ and therefore that the risk of al-Qaeda sanctuaries in
failed or failing states is distorted and over-blown. It has been most
cogently articulated by Paul R. Pillar, a former senior CIA officer,
who maintains that planning for the 9/11 attacks did not take place in
Afghanistan but in ``apartments in Germany, hotel rooms in Spain and
flight schools in the United States.''\10\ Harvard University professor
Stephen M. Walt made the same point on his Foreign Policy.com blog in
2008 arguing that, ``The 9/11 plot was organized out of Hamburg, not
Kabul or Kandahar, but nobody is proposing that we send troops to
Germany to make sure there aren't `safe havens' operating there.''\11\
---------------------------------------------------------------------------
\9\ Dr. Austin Long of Columbia University coined this phrase in an
exchange on the foreign policy list-serve managed by Professor Robert
Art, 8 September 2009.
\10\ Paul R. Pillar, ``Who's Afraid of A Terrorist Haven?''
Washington Post, 16 September 2009.
\11\ Stephen M. Walt, ``The `safe haven' myth,'' Foreign
Policy.com, 18 August 2009 accessed at: http://walt.foreignpolicy.com/
posts/2009/08/18/the_safe_haven_myth.
---------------------------------------------------------------------------
However, while it is true that follow-on, tactical planning did
indeed occur in those places; according to the authoritative 9/11
Commission Report,\12\ among other sources, the location and strategic
genesis of the 9/11 attacks, however, indisputably came from al-Qaeda's
physical sanctuary in Afghanistan. In late 1998/early 1999, for
instance, the operation's mastermind, Khaled Sheik Mohammed (KSM),
moved to Afghanistan at bin Laden's invitation precisely for this
purpose.\13\ KSM had admittedly been mulling over such an operation
ever since his nephew, Ramzi Ahmed Yousef, had returned to Pakistan
following the 1993 Trade Center bombing--but the concrete steps towards
the plot's execution did not take shape until KSM accepted bin Laden's
invitation.\14\ Bin Laden subsequently took the idea forward in
discussions with his military chief, Mohammed Atef, and KSM at al-
Qaeda's al Matar complex near Kandahar in the spring of 1999.\15\ An
``elite'' training course was then organized for the four operatives
originally selected to pilot the hijacked aircraft at al-Qaeda's Mes
Aynak camp--also in Afghanistan.\16\
---------------------------------------------------------------------------
\12\ Report of the National Commission on Terrorist Attacks Upon
the United States, The
9/11 Commission Report: Authorized Edition (New York & London, W.W.
Norton & Company, 2004).
\13\ Ibid., pp. 149-150.
\14\ Ibid., p. 153.
\15\ Ibid., p. 155.
\16\ Ibid., pp. 156-159.
---------------------------------------------------------------------------
It was only later, towards the end of 1999, that Mohammed Atta and
the three other Hamburg operatives entered the picture when they came
to Afghanistan to undergo training at al-Qaeda camps pursuant to
fulfilling their desire to fight (and die) in Chechnya. It was at these
al-Qaeda camps in Afghanistan that they were then recruited for the 9/
11 operation.\17\ KSM confirmed all this when he was interviewed by
Pakistani journalist Yosri Fouda in 2002.\18\ And bin Ladin himself, in
the famous ``Kandahar Tape,'' captured by U.S. forces in that city in
November 2001 that was broadcast the following month, detailed his own
intimate involvement in the planning of the 9/11 attacks--from exactly
where he was sitting in Khandahar.
---------------------------------------------------------------------------
\17\ Ibid., pp. 160-166.
\18\ Yosri Fouda and Nick Fielding, Masterminds of Terror: The
Truth Behind the Most Devastating Terrorist Attack Ever Seen (NY:
Arcade, 2003), pp. 123-128.
---------------------------------------------------------------------------
Additional al-Qaeda operations also were planned in Afghanistan.
The 1999 ``Millennium Bomber,'' Ahmad Ressam, was trained by KSM at al-
Qaeda's al Farouk facility in Afghanistan.\19\ And, the 2003 Istanbul
suicide bombings were originally conceived at al-Qaeda's camp outside
of Kandahar immediately following the 9/11 attacks.\20\
---------------------------------------------------------------------------
\19\ Report of the National Commission on Terrorist Attacks Upon
the United States, The
9/11 Commission Report, pp. 177, 261 & fn. 5, p. 500.
\20\ Karl Vick, ``Al Qaeda's Hand In Istanbul Plot: Turks Met With
Bin Laden,'' Washington Post, 13 February 2007, accessed at http://
www.washingtonpost.com/wp-dyn/content/article/2007/02/12/
AR2007021201715_pf.html.
---------------------------------------------------------------------------
conclusion
To sum up, al-Qaeda's sanctuaries in Pakistan, Yemen, and Somalia
largely account for the movement's survival. These three safe havens
figure prominently in the threat that al-Qaeda continues to present to
the United States and the West but also to stability and security of
each of those countries today. Failing to deprive al-Qaeda and its
affiliates and associates of these safe havens and sanctuaries will
almost certainly give al-Qaeda new momentum and the greater freedom of
action that an expanded geographical ambit facilitates. Accordingly
sanctuary--and in the form of something larger than an apartment's
confines and in the kind of permissive environment that the border
straddling Afghanistan and Pakistan and parts of Yemen and Somalia
afford--appears to be extremely important to, and highly valued by, al-
Qaeda and its allies.
Al-Qaeda has been compared to the archetypal shark in the water
that must keep moving forward--no matter how slowly or incrementally--
or die. Whether al-Qaeda can in fact do so--and thereby prove that it
can survive following its founder and leader's killing last month--is
surely the most pressing question of the moment.
In these circumstances, the United States must remain vigilant and
avoid complacency and the temptation to lower our guard. Al-Qaeda has
always regarded this as a generational struggle that goes beyond the
purview or interests of any one individual. The loss of Osama bin Laden
will not affect that calculus.
Accordingly, the United States should continue to kill and capture
al-Qaeda leaders and operatives as it has so effectively done,
especially during the past 3 years of stepped-up aerial drone attacks.
At the same time, the United States must also continue to deprive al-
Qaeda and its leaders of the sanctuaries and safe havens that it
depends on.
Thus, the highest priority for the United States must be to
concentrate our attention on al-Qaeda as a networked global
phenomenon--not as in the past as one enemy, in one place, at one time.
Today, there are several al-Qaedas in a variety of places, each with
different capabilities. This will require both continued U.S. military
and intelligence operations in South Asia alongside a continual
scanning of the horizon to counter al-Qaeda's presence in, and prevent
its expansion to, failing and failed states.
At the foundation of the type of dynamic and adaptive strategy
needed to defeat terrorists and insurgents alike in these variegated
locales is the ineluctable axiom that successfully countering these
threats is not exclusively a military endeavor but also involves
fundamental parallel political, social, economic, and ideological
activities.
The predominantly tactical ``kill or capture'' approach and metric
encapsulated by the targeted assassination-focused drone program is too
narrow and does not sufficiently address the complexities of these
unique operational environments. The adversaries and the threats that
the United States faces today in Pakistan, Yemen, Somalia and elsewhere
are much more elusive and complicated to be vanquished by mere
decapitation. What is required to ensure success is a more integrated
approach to a threat that is at once operationally durable,
evolutionary, and elusive in character.
An effective strategy will thus combine the tactical elements of
systematically destroying and weakening enemy capabilities alongside
the equally critical, broader strategic imperative of breaking the
cycle of terrorist and insurgent recruitment and replenishment that
have respectively sustained al-Qaeda and fueled and its allies in Yemen
and Somalia as well.\21\ Enhanced, improved and better-coordinated
information operations will be a critical element of this approach.\22\
These also will entail the building of host-nation capabilities to a
greater and more sustained extent than currently exists.
---------------------------------------------------------------------------
\21\ Secretary Gates made exactly this point in his September 2008
speech at the National Defense University. ``In the long-term effort
against terrorist networks and other extremists, we know that direct
military force will continue to have a role. But we also understand
that over the long term, we cannot kill or capture our way to victory.
Where possible, kinetic operations should be subordinate to measures to
promote better governance, economic programs to spur development, and
efforts to address the grievances among the discontented from which the
terrorists recruit.'' See U.S. Department of Defense, Office of the
Assistant Secretary of Defense (Public Affairs), Speech: National
Defense University (Washington, DC), As Delivered by Secretary of
Defense Robert M. Gates, Washington, DC, Monday, September 29, 2008
accessed at: http://www.defenselink.mil/utility/
printitem.aspx?print=http://www.defenselink.mil/speeches/
speech.aspx?speechid=1279.
\22\ Secretary Gates was explicit on this point as well. ``Retired
Marine Colonel T.X. Hammes has noted that where past insurgencies
consisted of military campaigns supported by information operations,
they now often consist of strategic communications campaigns supported
by military operations. In Iraq and Afghanistan, extremists have made
deft use of the internet and propaganda to misinform and intimidate
local populations. See Ibid.
---------------------------------------------------------------------------
In conclusion, it would be dangerously precipitous at this time to
declare total victory. Al-Qaeda's hopes of renewal and re-generation in
the aftermath of bin Laden's killing rest on its continued access to
the geographical sanctuaries and safe havens that the movement has
always depended on and historically have used as bases from which to
plot and plan and launch international terrorist strikes. Only by
depriving al-Qaeda of those sanctuaries, destroying the organization's
leadership, and disrupting the continued resonance of its message will
al-Qaeda finally be defeated.
Mr. McCaul. Thank you.
The Chairman now recognizes Professor Byman for his
statement.
STATEMENT OF DANIEL L. BYMAN, SECURITY STUDIES PROGRAM, SCHOOL
OF FOREIGN SERVICE AT GEORGETOWN UNIVERSITY, AND SENIOR FELLOW,
SABAN CENTER FOR MIDDLE EAST POLICY, THE BROOKINGS INSTITUTION
Mr. Byman. Thank you.
Chairman McCaul, Ranking Member Clarke, Members of the
subcommittee, thank you for this opportunity to present my
views today. Let me briefly summarize some of the points in my
written testimony.
As I think we all agree on this panel, the al-Qaeda core
has an active operational as well as strategic role and has
helped inspire and direct jihadists around the globe. The core
has recovered from its low point in 2002 and now has a base in
Pakistan from which it can plan and train. Maintaining pressure
on the core is vital to keep it off-balance.
Core operators also try to attract and direct the
attentions and the actions of affiliate groups. These
affiliated groups pose a range of dangers to the United States.
Al-Qaeda in the Arabian Peninsula, which is based in Yemen, is
increasingly important, given its record of near successes
against the United States.
The Shabaab in Somalia is another concern, given the
radicalization of small numbers of Somali Americans.
Affiliate groups, however, have different relations with
the core and often do not fully embrace its objectives.
The death of bin Laden is a serious blow to al-Qaeda. It is
a blow to its image of strength. Bin Laden was a charismatic
and capable leader, and in-fighting may occur now. In addition,
recruitment and fund-raising may suffer. These problems in turn
may make al-Qaeda less able to influence affiliate groups. The
core, however, is likely to survive, even if it is less
capable. It will be eager to conduct attacks to prove its
relevance.
The drone campaign is extremely important for striking the
al-Qaeda core. The United States has few alternatives to acting
in remote parts of Pakistan. Al-Qaeda has a finite number of
skilled leaders, and their loss is a tremendous blow to it. The
drone attacks also force the organization to communicate less,
forces leaders to reduce the number of associates, and these
leaders must also spend much of their time in hiding. This is
difficult for any organization, but it is especially difficult
for an organization that is having to deal with a major
leadership transition.
The Arab Spring also requires fundamental changes in U.S.
counterterrorism policy. The change sweeping the Arab world
undermines the al-Qaeda message, but, at the same time, it
offers terrorists far more operational freedom. The United
States must exploit the threat to al-Qaeda's message and
encourage a smooth transition to democracy in countries like
Egypt and Tunisia, while continuing counterterrorism
partnerships and building new ones.
In addition to aggressive efforts abroad, U.S. officials
must consider how American foreign policy can lead to domestic
radicalization. The case of the radicalization of Somalia
Americans is instructive, as a relatively minor
counterterrorism operation overseas helped create a potentially
dangerous problem at home. Also at home, the FBI and State
officials should redouble their efforts to know Muslim
communities and to gain their trust.
In the end, however, it is difficult to separate over there
from here. U.S. intelligence and Homeland Defense should focus
particular attention on seam areas where the United States is
attackable outside of U.S. soil, such as on airplanes
transiting from airports overseas to airports in the United
States.
I thank you for this opportunity to testify, and I would
welcome your questions.
[The statement of Mr. Byman follows:]
Prepared Statement of Daniel L. Byman
June 3, 2011
Chairman McCaul, Ranking Member Keating, Members of the
subcommittee and subcommittee staff, thank you for this opportunity to
present my views before you today.
The death of bin Ladin poses a major setback for al-Qaeda.
Nevertheless, the al-Qaeda core remains a danger to the United States,
as do al-Qaeda affiliates. These organizations are capable of mounting
attacks against the U.S. homeland in the years to come, and the danger
they pose to U.S. allies in Europe and in the Muslim world is even
greater. However, al-Qaeda and its allies suffer from many weaknesses,
are fractious in the best of times, and in general are under
considerable strain.
I would urge this subcommittee to consider several recommendations
as it strives to improve U.S. homeland security. Fighting the al-Qaeda
core in Pakistan should remain at the center of U.S. counterterrorism
policy, even after bin Ladin's death. With the death of bin Ladin there
is an additional opportunity to weaken al-Qaeda's relationship with
affiliate groups, one of the core's most important sources of strength.
The aggressive U.S. drone campaign in Pakistan has played an important
role in weakening al-Qaeda and should be continued. The drone campaign
will not end the al-Qaeda presence in Pakistan, but it does keep the
organization on the run and reduces its operational effectiveness.
The ``Arab Spring'' also requires fundamental changes in U.S.
counterterrorism policy. The change sweeping the Arab world undermines
al-Qaeda's message but, at the same time, offers terrorists more
operational freedom. The United States must exploit the threat to al-
Qaeda's message and encourage a smooth transition to democracy while
continuing counterterrorism partnerships and building new ones.
In addition to aggressive efforts abroad, U.S. officials must
consider how American foreign policy can lead to domestic
radicalization and ensure that U.S. policy does not unnecessarily
alienate key domestic constituencies. At home the FBI and State
officials should redouble efforts to know local Muslim communities and
gain their trust.
In the end, however, it is difficult to separate ``over there''
from ``here.'' U.S. intelligence and homeland defense should focus on
``seam'' areas--where the United States is attackable outside of U.S.
soil, such as on airplanes transiting from airports overseas to
airports in the United States.
My testimony will address several issues: 1. The danger from the
al-Qaeda core in Pakistan after the death of bin Ladin; 2. The
importance of the drone campaign; 3. The role of al-Qaeda-linked
affiliate groups; 4. The nature of the threat to the U.S. homeland; 5.
The impact of the ``Arab Spring'' on counterterrorism; and 6. Policy
recommendations for increasing the security of the U.S. homeland.
i. the state of the al-qaeda core
Despite claims that the al-Qaeda core became largely irrelevant
after 9/11, in reality it remained active in proselytizing, plotting
anti-Western terrorist attacks, and supporting insurgencies in the
Muslim world.\1\ The al-Qaeda core revived after the collapse of the
Taliban in 2001 and its loss of a haven in Afghanistan. Over time, the
group became more entrenched in parts of Pakistan. While Islamabad had
made fitful efforts to uproot it, some of the jihadist groups that the
regime nurtured and tolerated to fight India and advance Pakistani
interests in Afghanistan have turned against the regime. Al-Qaeda now
has close ties to Laskkar-e Janghvi, Jaish-e Mohammed, and other groups
that have tens of thousands of supporters in Pakistan, and its reach is
considerable in non-tribal parts of the country.
---------------------------------------------------------------------------
\1\ For a leading proponent of the view that al-Qaeda was weak and
decentralized, see Marc Sageman, Leaderless Jihad: Terror Networks in
the 21st Century (Philadelphia: University of Pennsylvania Press,
2008). However, several official U.S. and U.K. government statements
and documents support the assessment that the al-Qaeda core remains
active. National Intelligence Council, ``National Intelligence
Estimate: The Terrorist Threat to the U.S. Homeland,'' unclassified key
judgments (July 2007), p. 1; Dennis C. Blair, ``Annual Threat
Assessment of the Intelligence Community for the Senate Select
Committee on Intelligence,'' February 12, 2009, pp. 5-6; ``Speech by
the Director General of the Security Service,'' Queen Mary's College,
London, November 9, 2006; and Jonathan Evans, ``Intelligence, Counter
Terrorism and Trust,'' November 5, 2007. Available at: www.mi5.gov.uk.
---------------------------------------------------------------------------
In this sanctuary al-Qaeda has planned, recruited, issued
propaganda, and trained the next round of attackers. Al-Qaeda played a
major role in the 2005 attacks on the transportation system in
London.\2\ Writing in 2008, terrorism expert Peter Bergen describes the
bombings as ``a classic al-Qaeda plot.''\3\ Al-Qaeda appears to have
organized, coordinated, or otherwise played a major role in foiled 2004
attacks in the United Kingdom on a nightclub or a shopping mall; plans
to bomb economic targets in several American cities; and the 2006 plan
to simultaneously blow up perhaps ten airplanes as they went from the
United Kingdom to the United States.\4\ Press reporting indicates that
operatives with links to Pakistan played a role in the spring 2009
Manchester plot that British security services disrupted--all those
alleged to be involved were of Pakistani origin.\5\ Terrorism expert
Bruce Hoffman found that al-Qaeda was actively involved in virtually
all major terrorist plots in the United Kingdom since 2003.\6\
---------------------------------------------------------------------------
\2\ See ``Were They Directed from Abroad?'' Honourable House of
Commons, Report of the Official Account of the Bombings in London on
the July 2005 (London: The Stationary Office, May 2006), pp. 20-21;
Robert Winnett and David Leppard, ``Leaked No 10 Dossier Reveals Al-
Qaeda's British Recruits,'' Sunday Times, July 10, 2005 available at:
http://www.timesonline.co.uk/tol/news/uk/article542420.ece; Bruce
Riedel, The Search for Al Qaeda (Brookings, 2008); Bruce Hoffman,
``Challenges for the U.S. Special Operations Command Posed by the
Global Terrorist Threat: Al Qaeda on the Run or on the March?'' written
testimony submitted to the U.S. House of Representatives Committee on
Armed Services Subcommittee on Terrorism, Unconventional Threats, and
Capabilities, February 14, 2007,'' pp. 11-13; Bruce Hoffman,
``Radicalization and Subversion: Al Qaeda and the 7 July 2005 Bombings
and the 2006 Airline Bombing Plot,'' Studies in Conflict and Terrorism,
32 (2009), p. 1102; and Bruce Hoffman, ``The 7 July 2005 Bombings,''
unpublished paper.
\3\ Peter Bergen, ``Al Qaeda, the Organization: A Five Year
Forecast,'' Annals of the American Association of Political Science
(July 2008), p. 15.
\4\ Hoffman, ``Challenges for the U.S. Special Operations
Command,'' pp. 11, 13-14; Richard Greenberg, Paul Cruickshank, and
Chris Hansen, ``Inside the Terror Plot that `Rivaled 9/11,' ''
MSNBC.com, September 16, 2008.
\5\ Sarah Laville, Richard Norton-Taylor, and Vikram Dodd,
``Student visa link to terror raids as Gordon Brown points finger at
Pakistan,'' Guardian, available at: http://www.guardian.co.uk/uk/2009/
apr/10/student-visa-terror-arrests-link; House of Commons,
``Examination of Witnesses,'' statement of James Fergusson, available
at: http://www.publications.parliament.uk/pa/cm200809/cmselect/cmfaff/
302/9042103.htm.
\6\ Hoffman, ``Challenges for the U.S. Special Operations
Command,'' p. 11.
---------------------------------------------------------------------------
Outside of the United Kingdom, German government officials claimed
that they disrupted a plot to attack U.S. and German targets in Germany
in 2007 involving three men, none of whom were of Pakistani origin, who
trained at camps in Pakistan.\7\ The Danish government also reported a
disrupted plot linked to Pakistan in 2007. France and Italy have also
reported al-Qaeda-linked plots.
---------------------------------------------------------------------------
\7\ Craig Whitlock, ``Germany Says It Foiled Bomb Plot,''
Washington Post, September 6, 2007.
---------------------------------------------------------------------------
Al-Qaeda has carried out numerous terrorist attacks in Pakistan
today, working both on its own and with various Pakistani groups. It
tried to kill former President Pervez Musharraf several times and
probably was responsible for the assassination of Benazir Bhutto in
2007.\8\
---------------------------------------------------------------------------
\8\ Riedel, The Search for Al-Qaeda, p. 125.
---------------------------------------------------------------------------
Al-Qaeda's own thinkers stress the importance of maintaining a
haven and seem to have little faith in decentralized, bottom-up
efforts. Al-Qaeda itself was consciously constituted as a vanguard. Bin
Ladin's deputy and heir-apparent, Ayman al-Zawahiri contended even as
his movement was being expelled from Afghanistan that, ``the mujahid
[fighter for the faith] Islamic movement will not triumph against the
world coalition unless it possesses a Islamist base in the heart of the
Islamic world.''\9\
---------------------------------------------------------------------------
\9\ Zawahiri, Knights under the Prophet's Banner. Serialized in Al-
Sharq al Awsat (London) 2-10 December 2001, trans. Foreign Broadcast
Information Service, document FBIS-NES-2001-1202, maintained on-line by
the Federation of American Scientists, http://fas.org/irp/world/para/
aymanh_bk.html.
---------------------------------------------------------------------------
The al-Qaeda core issues propaganda to radicalize Muslims and helps
recruit potential terrorists, trains them, and offers guidance for
specific attacks. As a result, local individuals become far more
dangerous when they are able to interact with al-Qaeda core members.
Impact of the Death of bin Ladin
Bin Ladin's death is a significant blow to al-Qaeda. Bin Ladin,
Hoffman notes, ``played an active role at every level of al-Qaeda
operations: from planning to targeting and from networking to
propaganda. ``\10\ Beyond his operational role, his survival was a form
of successful defiance. The world's biggest military and most powerful
country made him public enemy No. 1 for almost 10 years and failed to
find him. To bin Ladin's supporters, only God's protection explained
this mystery.
---------------------------------------------------------------------------
\10\ Bruce Hoffman, ``The Leaderless Jihad's Leader,'' Foreign
Affairs, May 13, 2011, http://www.foreignaffairs.com/articles/67851/
bruce-hoffman/the-leaderless-jihads-leader.
---------------------------------------------------------------------------
Because of the successful U.S. attack, the aura of divine
protection has diminished not only for bin Ladin, but by association
his cause. A new leader like Zawahiri is an effective operator but has
far less starpower than bin Ladin and is unlikely to inspire Muslims as
effectively. More prosaically, but no less importantly, al-Qaeda will
find it hard to recruit and fundraise without bin Ladin to lead their
cause.
Within the jihadist movement, bin Ladin often pushed back against
the tendency toward slaughter that manifested in Iraq and Algeria. In
such countries, so-called ``taqfiris'' (who saw other Muslims who did
not adhere to their extreme views as apostates) made war on their own
societies, killing other Muslims and often making civil strife a
priority over striking U.S. or regime targets. Bin Ladin counseled
against this tendency and tried to put his resources behind leaders who
embraced his agenda rather than killed their co-religionists on a mass
scale.
In short, bin Ladin was both a symbol of the movement and an
effective strategic and operational leader. It would be glib to assume
his death means the movement is finished. At the same time, however,
the organization has suffered a tremendous blow.
ii. the importance of the drone campaign
The U.S. drone campaign against al-Qaeda, begun under Bush and put
on steroids under Obama, has taken out dozens of al-Qaeda figures,
primarily in Pakistan. In 2010, the United States launched over 100
drone attacks in Pakistan, according to the New America Foundation.\11\
Those killed were far less prominent than bin Ladin, but in many cases
their skills were in short supply and difficult to replace. Al-Qaeda
struggles to find seasoned and skilled new leaders, and even when it
can it takes time to integrate them into the organization. Even more
important, but even harder to see, al-Qaeda lieutenants must limit
communications to stop U.S. eavesdropping that could lead to
airstrikes, reduce their circle of associates to avoid spies, and avoid
public exposure, all of which make them far less effective as leaders.
This makes it harder, though not impossible, for them to pull off
sophisticated attacks that require long-term planning.
---------------------------------------------------------------------------
\11\ See data compiled by Peter Bergen and Katherine Tiedemann,
``The Year of the Drone'' at http://counterterrorism.newamerica.net/
drones.
---------------------------------------------------------------------------
Although innocent civilians do die in these attacks, the number of
non-combatant deaths is often exaggerated and has been declining.
According to Peter Bergen and Katherine Tiedemann, ``According to our
estimates, the nonmilitant fatality rate since 2004 is approximately 25
percent, and in 2010, the figure has been more like 6 percent--an
improvement that is likely the result of increased numbers of U.S.
spies in Pakistan's tribal areas, better targeting, more intelligence
cooperation with the Pakistani military, and smaller missiles.''\12\
Such innocent deaths are still considerable, and errant strikes have
the potential to worsen U.S.-Pakistan relations, but drone strikes are
often far less bloody than alternatives such as Pakistani military
attacks or U.S. attacks by manned fixed-wing aircraft. In addition,
drone strikes involve no risk of U.S. personnel.
---------------------------------------------------------------------------
\12\ Peter Bergen and Katherine Tiedemann, ``There Were More Drone
Strikes--And Far Fewer Civilians Killed,'' Foreign Policy, December 22,
2010, available at: http://newamerica.net/node/41927.
---------------------------------------------------------------------------
Killing terrorist group lieutenants on a large scale can devastate
a group. There may still be thousands of people who hate the United
States and want to take up arms, but without bomb-makers, passport-
forgers, and leaders to direct their actions they are often reduced to
menacing bumblers, easier to disrupt and often more a danger to
themselves than to their enemies.
iii. al-qaeda affiliates
Because of the blows the al-Qaeda core has suffered, attention is
increasingly focused on al-Qaeda affiliates. The most notable of these
affiliates include al-Qaeda in the Arabian Peninsula (AQAP), al-Qaeda
of Iraq (AQI), al-Qaeda of the Islamic Maghreb (AQIM), and al-Shabaab
in Somalia. Al-Qaeda also has ties to a range of other salafi-jihadist
groups, at times working with them against U.S. or allied interests and
in other cases simply supporting the local groups' struggles against
various regimes.\13\
---------------------------------------------------------------------------
\13\ AQIM remains focused on the greater Maghreb area, but it is
more anti-Western in its operations than in the past. On the road to
becoming AQIM the GPSC expanded its primary focus to include France as
well as the Algerian regime. The group also began to strike U.N. and
Israeli targets and go after Algeria's energy infrastructure, none of
which were a priority in the past. Suicide bombings, hitherto one of
the few horrors the GSPC did not inflict, grew more frequent, along
with Iraq-style car bombs. In addition, with the NATO intervention in
Libya AQIM should be a concern to Western officials. In Pakistan, where
al-Qaeda's influence has spread since 9/11, there were two suicide
attacks in 2002; by 2010 there were over 50, which killed over 1,000
people. Al-Qaeda allies in Pakistan attack both the Pakistani state and
support anti-U.S. forces in Afghanistan. And AQI, of course, attacks
U.S. forces in Iraq. See Lianne Kennedy Boudali, ``The GSCP: Newest
Franchise in Al-Qa'ida's Global Jihad,'' April 2, 2007, available at:
http://www.ctc.usma.edu/posts/the-gspc-newest-franchise-in-al-qaidas-
global-jihad; ``2010 bloodiest year in Pakistan since 2001,'' The
Economic Times Online, December 24, 2010, available at http://
articles.economictimes.indiatimes.com/2010-12-24/news/
27599872_1_suicide-khyber-pakhtunkhwa-province-personnel.
---------------------------------------------------------------------------
The Yemen-based AQAP began to receive far more attention from U.S.
homeland security officials after the 2009 Christmas day bombing plot,
in which a Nigerian recruit almost blew up a passenger airplane landing
in Detroit. Al-Qaeda has long had operatives and associates in Yemen,
but for most of the last decade they focused on targets in Yemen or in
the region. The Yemeni regime effectively crushed the threat after 9/
11, but a 2006 jailbreak and a lapse in U.S. and Yemeni attention
reinvigorated the jihadists.\14\ At the same time the Saudi government
successfully suppressed what had briefly seemed to be a serious
jihadist threat to the regime, and many Saudi fighters fled to Yemen.
In 2009 the Saudi and Yemeni branches claimed to merge under the AQAP
banner and took a more global focus, attacking not just Yemeni and
Western targets in the region but also conducting international
terrorism such as the Christmas bombing plot and the October 2010 plan
to blow up two cargo planes as they neared U.S. cities.\15\ Some U.S.
officials claim that AQAP is more dangerous than al-Qaeda.
---------------------------------------------------------------------------
\14\ See in particular ``Testimony of Gregory D. Johnsen,'' before
the Senate Foreign Relations Committee, January 20, 2010.
\15\ For an overview of this danger, see Christopher Boucek,
``Terrorist Threat to the U.S. Homeland--Al-Qaeda in the Arabian
Peninsula (AQAP),'' Testimony before the House Committee on Homeland
Security Subcommittee on Counterterrorism and Intelligence, March 2,
2011.
---------------------------------------------------------------------------
It is difficult to come to firm conclusions about how to view al-
Qaeda affiliates.\16\ There is no single way to join al-Qaeda, nor is
it always clear when a group should be viewed as under the al-Qaeda
core's control. Al-Qaeda does not demand sole allegiance: it supports
local struggles even as it pursues its own war against the United
States and its allies. So group members can be part of al-Qaeda's ranks
and loyal fighters in their local organizations.
---------------------------------------------------------------------------
\16\ For an excellent recent review of how al-Qaeda views
affiliation, see Barak Mendelsohn, ``Al-Qaeda's Franchising Strategy,''
Survival (Summer 2011), http://www.iiss.org/publications/survival/
survival-2011/year-2011-issue-3/al-qaedas-franchising-strategy/.
---------------------------------------------------------------------------
Groups often straddle their old and new identities, trying to keep
up their local activities while also attacking more global targets.
Often this is a time of infighting within a group, with key leaders
pulling in different directions. Somalia's al-Shabaab, for instance,
appears to be in such a phase today.\17\ Some parts of the organization
cooperate with al-Qaeda, with foreign jihadis playing leading roles in
tactics and operations. But others within the movement--probably the
majority, in fact--oppose the control of the foreigners, with some even
publicly condemning terrorism and even working with international
humanitarian relief efforts. Al-Shabaab could become ``al-Qaeda of the
Horn of Africa,'' but this is not yet a done deal. And if it happens,
it could split the group.\18\
---------------------------------------------------------------------------
\17\ International Crisis Group, ``Somalia's Divided Islamists,''
May 18, 2010.
\18\ See Bronwyn Burton, ``In the Quicksands of Somalia,'' Foreign
Affairs (November/December 2009), available at http://
www.foreignaffairs.com/articles/65462/bronwyn-bruton/in-the-quicksands-
of-somalia.
---------------------------------------------------------------------------
The Benefits and Risks of Affiliation
Al-Qaeda seeks not only to change the Islamic world, but also to
shift the orientation of jihad from the local to the global--and here
affiliates play a crucial role. Historically, most jihadist resistance
movements have focused on their own territory or on throwing out
foreign troops, but bin Ladin successfully convinced groups that
striking the United States and its allies is more important to this
victory than fighting more proximate enemies.
For the al-Qaeda core, affiliates provide hundreds or even
thousands of fighters, donors, smuggling networks, and sympathetic
preachers who offer religious legitimacy. For example, when al-Qaeda
needed to get its fighters out of Afghanistan after the fall of the
Taliban, they relied on the logistical assistance of Sunni radicals in
Pakistan; the Libyan Islamic Fighting Group helped them obtain false
travel documents.
Al-Qaeda affiliates also offer access to immigrant and diaspora
communities--a group like Somalia's al-Shabaab, with its connections to
the Somali-American population, would be a prize asset. In 2010 a
Somali-American from Portland was arrested for planning to bomb a
Christmas tree lighting ceremony in Portland.\19\ (There is no
indication I have seen, however, that the individual was linked to the
al-Qaeda core).
---------------------------------------------------------------------------
\19\ See ``Somali-American accused of plotting to bomb Oregon tree-
lighting event,'' November 27, 2010. http://articles.cnn.com/2010-11-
27/justice/oregon.bomb.plot_1_tree-lighting-justice-department-
portland-resident?_s=PM:CRIME.
---------------------------------------------------------------------------
Al-Qaeda franchises, in turn, often get money from the al-Qaeda
core or others in its fundraising network. Al-Qaeda also has web and
media specialists, recruiters, trainers, and other experts in its
global rolodex, all available to help a local franchise.
In the past, an al-Qaeda label is also a potential recruiting
boon--it may help a group attract new members who hate the West and the
United States but were not motivated by the group's past, more local,
rhetoric. Less tangibly, the al-Qaeda brand also can give credibility
to groups struggling at home. Groups like al-Shabaab often have an
inchoate ideology; al-Qaeda offers them a coherent alternative. The
death of bin Ladin, for now at least, diminishes the attractiveness of
the al-Qaeda brand.
Gaining affiliates may raise al-Qaeda's profile and extend its
reach, but it also poses risks for the core. The biggest is the lack of
control. Nowhere was this more apparent than Iraq. Beginning at least
in 2005, al-Qaeda core leaders tried to push Iraqi fighters waging
guerrilla war under the banner of al-Qaeda in Iraq not to slaughter
Shi'a Muslims, and especially not Sunni civilians, but to no avail. As
the bloodshed rose, al-Qaeda funders and supporters pointed their
fingers not only at AQI leaders, but also at the al-Qaeda core.
The risk is even greater for affiliates. When they take on the al-
Qaeda label, they also take on al-Qaeda enemies. The United States not
only conducts direct attacks on al-Qaeda-related individuals and
targets their recruiting and financial infrastructure, but Washington
also can offer its allies intelligence, financial support, paramilitary
capabilities, and other vital forms of assistance, creating new
headaches for groups that are already beleaguered. They also move
farther away from their original goal of fighting the local regime.
Because of these risks, the decision to join al-Qaeda's ranks often
angers more sensible group members who retain local ambitions.
iv. the nature of the threat to the u.s. homeland
The U.S. homeland is safer than it was in the months before 9/11,
and the death of bin Ladin is a further blow to al-Qaeda. Yet the
danger of terrorism remains real. As I and others have noted, there is
a real chance that in revenge an al-Qaeda sympathizer or member will
attack a U.S. target, ideally (from the terrorists' point of view) in
the U.S. homeland but also, primarily for operational reasons, on U.S.
persons and facilities overseas. Al-Qaeda itself also has a strong
incentive to conduct an attack in order to prove its relevance at a
time when many question whether it can continue after bin Ladin's
death.
There have been few attacks on the U.S. homeland since 9/11, and
one only serious terrorist success--Major Nidal Malik Hasan's shooting
of 13 Americans at Fort Hood in Texas. Hasan does not appear to have
any direct linkages to the al-Qaeda core, but he was in email contact
with AQAP member, and U.S. citizen, Anwar al-Awlaki, the ideologue and
operator who was also linked to AQAP's attempted attacks on U.S.
aviation targets in 2009 and 2010.
Despite Hasan's action, in general the U.S. homeland has enjoyed
far more freedom from terrorism than I and many experts predicted in
the months after 9/11. I believe this good fortune stems from several
factors. The destruction of al-Qaeda's haven in Afghanistan and the
global intelligence and law enforcement hunt for group members and
supporters dealt major blows to the core's operational capability and
global reach. At home, the FBI and other organizations focused
intensely on al-Qaeda, making it harder for the terrorists to pass
unnoticed. Although there are individual exceptions, the U.S. Muslim
community is not radicalized. Indeed, in several important terrorism
cases community members have worked with U.S. law enforcement,
providing invaluable tips.
Ironically, the terrorism charges levied against various Americans
in the years immediately after 9/11 seemed to confirm how much safer
our country was. The FBI would often announce arrests of suspects with
great drama, but those charged were often common criminals or unskilled
dreamers, talking big but with little ability to carry out their
schemes. Those arrested had little or no training, and--just as
importantly--they did not seem to know how to get in touch with the al-
Qaeda core. In the end, the Government would often charge them with
minor, non-terrorism related crimes such as fraud or violating their
immigration status.
Yet there is reason to believe that all these factors are changing
for the worse in recent years. As discussed above, al-Qaeda has revived
somewhat in Pakistan, enabling it to plan and train more effectively
than it could in the years after losing its base in Afghanistan. This
revival is why the September 19, 2009, arrest of Najibullah Zazi is so
disturbing to homeland defense officials. Zazi, a legal Afghan resident
of the United States for many years, pled guilty in 2010 to planning to
bomb several targets in New York. Unlike the unskilled attackers who
were arrested in the past, Zazi admitted he was trained in Pakistan
where he was instructed to carry out a suicide bombing.\20\
---------------------------------------------------------------------------
\20\ United States Department of Justice, ``Najibullah Zazi Pleads
Guilty to Conspiracy to Use Explosives Against Persons or Property in
U.S., Conspiracy to Murder Abroad, and Providing Material Support to
Al-Qaeda,'' February 22, 2010.
---------------------------------------------------------------------------
Nor is Pakistan the only problem. On October 28, 2008, Shirwa Ahmed
became the first American suicide bomber, killing himself in Somalia's
civil war on behalf of the Islamist group al-Shabaab.\21\ Ahmed was
part of two groups of perhaps 20 Somali-Americans who grew up in
Minneapolis and became radicalized after the Ethiopian invasion of
Somalia in 2006. The Somali-American community from which he came has
more in common with the Algerians in the banlieues in Paris than the
affluent Arab Muslim community of the United States. By one estimate 60
percent of the Somalis in the United States, a community estimated as
high as 200,000 people, live in poverty, and many young men drop out of
school and turn to crime.
---------------------------------------------------------------------------
\21\ In 2009, al-Qaeda's No. 2 Zawahiri called Shabaab advances in
Somalia ``a step on the path of victory of Islam,'' while Shabaab would
pledge allegiance to bin Laden. The group even used Alabama native Omar
Hammani, who spoke under the name Abu Mansoor al-Amriki (``the
American''), to do a video critique of President Barack Obama's speech
in Cairo earlier in the year.
---------------------------------------------------------------------------
While the conflict in Somalia may seem distant to most Americans,
the U.S. role there is considerable--and Somali-Americans know it well.
In the minds of many Somalis, the 2008 U.S. airstrike that killed Aden
Hashi Ayro, a Shabaab leader, fused Somalia's historic enemy Ethiopia
and the United States. The result, in Somalia expert Ken Menkhaus'
words, was that ``fierce levels of anti-Americanism took root among
many Somalis at home and abroad.''\22\ In September 2009, the United
States struck again, killing another al-Qaeda figure there, Saleh Ali
Saleh Nabhan. So far, none of the Somali-Americans who went overseas
have planned to return home and attack, but the Shabaab's move toward
al-Qaeda and the anger at U.S. policy are a disturbing combination.
---------------------------------------------------------------------------
\22\ Testimony of Ken Menkhaus, ``Violent Islamic Extremism: Al-
Shabaab Recruitment in America,'' before the Committee on Homeland
Security and Governmental Affairs, United States Senate, March 11,
2009.
---------------------------------------------------------------------------
One of the biggest dangers involves ``seam'' areas that involve
borders, airspace, and other security spots that are the responsibility
of multiple countries--areas where homeland security meets foreign
policy. Al-Qaeda and affiliate groups have far more sympathizers in
foreign countries and better logistics networks there as well, making
it easier for them to launch attacks from there rather than in the
United States. Several of the most deadly terrorist plots in the last
decade--the 2003 ``shoebomber'' attempt to blow up American Airlines
flight 63 in 2001, the 2009 and 2010 AQAP attempts on civil and
commercial aviation, a United Kingdom cell's 2006 plan to bomb as many
as ten transatlantic flights--would have had devastating effects on the
U.S. homeland but were not based in the United States. Instead, these
involved the al-Qaeda core in Pakistan working with members and
sympathizers, usually in Europe, to attack the U.S. homeland.\23\
---------------------------------------------------------------------------
\23\ BBC News, `` `Airliners Plot': The Allegations,'' April 3,
2008, available at: http://news.bbc.co.uk/2/hi/uk_news/7329221.stm;
Riedel, The Search for Al-Qaeda, p. 131.
---------------------------------------------------------------------------
Radicalization from abroad is another homeland security problem.
Anwar al-Awlaki left the United States in 2002 and went to Yemen in
2004. From there, his fluent English and comprehensive understanding of
U.S. culture enabled him to radicalize individuals like Major Hasan and
perhaps others--activities that would have led to his arrest had he
remained in the United States.
v. counterterrorism and the arab spring
Al-Qaeda is dangerous not just because it has hundreds of skilled
fighters under arms, but also because tens of thousands of Muslims have
found its calls for violent change compelling. When dictators reigned
supreme in Arab lands, al-Qaeda could score points by emphasizing its
struggle against despotism. When dictators like Mubarak fall, however,
al-Qaeda loses one of its best recruiting pitches: the repression Arab
governments inflict on their citizens and the stagnant societies that
result. The possible emergence of less repressive and more dynamic
leaders would remove a popular issue from al-Qaeda propagandists.
Although the word democracy itself often means different things to
different audiences, polls suggest that the generic concept is quite
popular in the Arab world, as befits a region that knows first-hand how
brutal autocracy can be.\24\ In contrast, al-Qaeda believes that
democracy is blasphemous because it places man's word above God's.
---------------------------------------------------------------------------
\24\ See for example http://pewresearch.org/pubs/1874/egypt-
protests-democracy-islam-influence-politics-islamic-extremism.
---------------------------------------------------------------------------
Even more ominous for al-Qaeda is the way in which Mubarak and Ben
Ali fell. Al-Qaeda's narrative is that violence carried out in the name
of God is the only way to force change. Further damaging al-Qaeda's
message, change occurred without blows being struck first at the United
States. Al-Qaeda has long insisted that you must first destroy the
region's supposed puppetmaster in Washington (or Jerusalem) before
change will come to Cairo or Tripoli. Events have shown idealistic
young people dreaming of a new order--in, say, Jordan or Morocco--that
you do not need to strike at Westerners and that peaceful change is
possible.
Finally, bin Ladin must also have lamented that the youth of
various Arab countries are leading the revolution. Young people,
especially young men, are al-Qaeda's key demographic, the ones al-Qaeda
propagandists expect to take up arms. For over a decade, al-Qaeda
portrayed it fighters as audacious and honorable defenders of Muslim
lands. In some circles they are cool. Now youth in the Arab world are
afire with ideas of freedom and non-violent action.
Though the revolutions make al-Qaeda's message less compelling, it
may still gain traction in the Arab world through greater freedom of
operation. Arab tyranny often served U.S. purposes. U.S.
counterterrorism officials have long praised countries like Egypt for
their aggressive efforts against terrorism and their cooperation with
the United States. Even Qaddafi--long derided as the ``Mad Dog of the
Middle East''--since 9/11 has been valued as a partner against al-
Qaeda.
New governments in the Arab world will not necessarily be anti-
American, but if they take popular opinion into account, cooperation
will not be as close as it had been with governments like Mubarak's.
The security services that have fought al-Qaeda and its affiliates have
also imprisoned peaceful bloggers, beat up Islamist organizers to
intimidate them, and censored pro-democracy newspapers. Indeed, one
measure of how much progress the Arab regimes are making toward
democracy will be how much these services are purged. New security
officials will be inexperienced, and conspiracy theories about U.S.
intelligence have run amok in the Arab world. U.S. intelligence
officers would probably be seen as coup plotters rather than partners.
Islamists are likely to be particularly suspicious of intelligence
cooperation.
In addition, during the unrest some jails in Libya and Egypt have
emptied, and the ranks of newly-freed jihadists multiplied. In both
countries, many of the jailed jihadists turned away from violence in
the last decade, producing bitter polemics against al-Qaeda (and an
even more vitriolic al-Qaeda response) in recent years. Nevertheless,
among those released are some true believers in jihad who are willing
to wreak havoc upon their perceived enemies.
Even in countries where the autocrats cling to power, security
services are likely to be less effective against jihadists. At the very
least, the security services of Morocco, Algeria, and other countries
that have seen protests will make the democratic dissenters their top
priority, not suspected terrorists.
For now, there is reason to hope that revolutions in the Arab world
will end up a net plus for counterterrorism. But hope should be
balanced with the recognition that in the short-term al-Qaeda will gain
operational freedom and that the United States and its allies need to
act now if they are to prevent al-Qaeda from reaping long-term benefits
from the upheavals.
vi. policy recommendations
I would urge this subcommittee to consider several recommendations
as it strives to improve U.S. homeland security. First, fighting the
al-Qaeda core in Pakistan should remain at the center of U.S.
counterterrorism policy, even after bin Ladin's death. Having a secure
haven is often a make or break issue for terrorist groups, and al-
Qaeda's strength there is a deadly danger. Because of the danger this
haven presents, and because Pakistan is at best a fitful
counterterrorism partner, the United States must continue an aggressive
drone campaign. Drone strikes, however, are not a substitute for
forcing Pakistan to crack down on terrorist groups and secure its own
territory. Zazi, for example, managed to receive training after the
drone strikes began in earnest, and other terrorist recruits can do so
too.
Second, we need to consider how American foreign policy can lead to
domestic radicalization. Killing an al-Qaeda leader in Somalia can be a
blow to the organization there, but the decision on whether to pull the
trigger or not should also factor in the risk of radicalizing an
immigrant group here at home, not just the operational benefit of
removing one leader from the organization.
Third, bin Ladin's death also offers a further opportunity to
reduce links between the al-Qaeda core and al-Qaeda affiliates.
Zawahiri does not have bin Ladin's charisma, and in the past his
leadership has been more polemical and divisive. Affiliates may be more
reluctant to follow him, particularly if al-Qaeda core fundraising
efforts suffer after bin Ladin's death and the drone campaign makes it
difficult for Zawahiri to communicate regularly with affiliate leaders.
Conversely, atrocities by one branch of al-Qaeda discredit the core, as
has happened with AQI.
Fourth, the United States needs to prepare for low-end threats as
well as high-level dangers. For homeland defense purposes, the al-Qaeda
core represents an unusual set of leaders and operatives: Most are
highly skilled and dedicated, well-trained, and meticulous about
operational security. Affiliate members, however, are often less
careful--their organizations grew up amidst a civil war, and
accordingly focused more on maintaining an insurgency as opposed to a
limited number of high-profile terrorist attacks.
A vexing dilemma for U.S. policy concerns groups that may be moving
toward al-Qaeda but have not yet made the leap. Many al-Qaeda
affiliates always hated the United States and its allies and, even
before they took on the al-Qaeda label, had members who trained or
worked with al-Qaeda in a limited way. Their focus, however, was
primarily on local issues. Because their groups had some ties to al-
Qaeda, the Bush and Obama administrations began to target them and
encourage others to do so. As a result, the groups became more anti-
American, creating a vicious circle. Administrations are damned either
way: ignoring the group allows potential threat to grow worse and risks
an attack from out of the blue. But taking them on may mean driving
some deeper into al-Qaeda's fold.
Fourth, U.S. intelligence and homeland defense should focus on
``seam'' areas--where the U.S. homeland is attackable from outside the
country, such as on airplanes transiting from airports overseas to U.S.
soil. U.S. officials should continue to try to improve integration
between domestic and foreign-focused agencies and, at the same time,
ensure that domestic-focused agencies are in touch with the relevant
non-U.S. agencies in key countries.
Fifth, at home the FBI and State officials should redouble efforts
to know local Muslim communities and gain their trust. Counterterrorism
involves not only drone attacks, but also social services for immigrant
communities and courtesy calls to local religious leaders to hear their
concerns and assure them that the United States continues to welcome
them. Whether it be concerns over radicalization of Somali-Americans or
other recent immigrant groups, outreach and successful immigration is
vital for counterterrorism.
Finally, U.S. counterterrorism policy must incorporate the ``Arab
Spring'' into its strategic planning, and U.S. regional policy toward
the new regimes (and surviving old ones) must continue to emphasize
counterterrorism. U.S. public diplomacy efforts should relentlessly
highlight al-Qaeda's criticisms of democracy and emphasize the now-
credible argument that reform can come through peaceful change. The
message should be spread by television and radio, as always, but
specific attention should be given to the internet given the importance
of reaching young men in particular.
Washington also needs a new policy towards Islamists. Ignoring the
Muslim Brotherhood and other Islamist movements seemed prudent to both
Republican and Democratic administrations when they had little chance
of gaining power. In particular, the United States should make it clear
that it does not want these movements frozen out of government, but
rather wants them to participate. The price for this participation is
more moderate policies at home and abroad. Inevitably, this will lead
to tension, as these Islamist groups seek policies that do not jibe
with U.S. preferences, but their alienation could be a disaster for
U.S. counterterrorism.
More quietly, the United States should renew efforts to train the
intelligence and security forces of new regimes, particularly if there
are widespread purges. The first step is simply to gain their trust, as
the new leaders are likely to see their U.S. counterparts as bulwarks
of the old order and a possible source of counterrevolution. Many of
the security services' leaders will be new to counterterrorism. Even
more important, they will be unaccustomed to the difficult task of
balancing civil liberties and aggressive efforts against terrorism.
Here the FBI and Western domestic intelligence services have much to
offer.
Recognizing these dilemmas and implementing (or continuing to
implement) these policy recommendations will not end the threat from
terrorism. However, they can make the United States more secure as the
terrorism threat continues to evolve.
Mr. McCaul. Thank you, Professor Byman.
Let me start out with just a personal experience I had.
A couple of years ago I visited Afghanistan and Pakistan,
and in Afghanistan I visited our troops around the 4th of July
on the border of Afghanistan and Pakistan. At that time, they
told me at one of the bases three of their soldiers had been
killed the day before we arrived, and they are very barbaric in
the way they kill our soldiers. But they said to me,
Congressman, they are coming out of there--and they point at
Pakistan--and they are coming over here, and they are killing
us.
I remember coming back here and met with the President,
then President Bush, and talked to him about the threat of the
tribal area in Pakistan, in the Fattah, that they were breeding
there, they were training in the tribal area. He recognized
that that was a serious concern, and I think not too long after
that conversation we had the drone project that you mentioned,
Professor Byman, which I think has been very successful in
terms of taking out high-value targets, and I think their
command-and-control structure has been greatly damaged by the
drone project.
But the question I wanted to ask before I go on about that
issue is, just Pakistan in general, Mr. Coll, I think all of
you are experts, but I wanted to ask you particularly, when I
visited them, they would talk about Madiyar, for instance, and
they would study his battle plans from the Soviet days and how
can we battle with him.
But the ISI continues to be a troubling issue for the
American people and the Congress in the sense that they always
play this double game, if you will, or they like to play both
sides of the fence, while on the one hand cooperating with us
on some high-value targets and on the other hand protecting
extremists when it is in their best interests, like for
interest in the Kashmir area where you mentioned the issue with
India. Cooperation with India I think would go a long ways.
But this double game I think really came to a head when we
saw the killing of bin Laden and we saw where he was living for
quite a few years. It is very troubling to me, because if you
look, there is a diagram up there about the compound, the
location. As I mentioned in my opening statement, it is less
than a mile away, which is half the distance between here and
the Washington Monument, to what is the equivalent of
Pakistan's West Point Academy. You have retired military in
this community surrounding this compound; and you have ISI
agents, as I understand, in the area as well. This is not a
normal house. It really was a large compound, very heavily
fortified, very suspicious looking in a sort of military area.
It leads me to the question of our relationship with
Pakistan and where do we go from here. Because, in my judgment,
it is hard for anybody to believe that they didn't know he was
there, and the question is at what level did the Pakistani
government know about this. I believe that either they are
complicit or they are incompetent. Either they are complicit in
providing material support to the most wanted terrorist by
providing him a safe haven, or they are totally incompetent to
not know he was there.
So, with that, let me just throw that question out first to
you, Mr. Coll, in terms of what is your assessment of this
picture and how does this affect and impact our relationship
with a very dicey country, Pakistan, who has been known to
proliferate nuclear weapons?
Mr. Coll. Well, thank you, Mr. Chairman.
First, I would associate myself with your observations and
analysis. I think you described the picture well.
The circumstantial evidence about the house in Abbottabad
raises very disturbing questions about the knowledge that
almost certainly must have been present in at least some
sections of the Pakistani government about this unusual
compound. I hope that over time we will discover more about how
far up the chain of command in Pakistan such knowledge might
have gone.
Just a couple of quick observations about the compound.
Pakistan has one of the lowest rates of tax participation
in the world, even for a poor country. One of the reasons why
official tax participation is so low is that if you build a
million dollar house in the middle of a security town, someone
knocks on your door and says, I have a way for you to avoid
taxes, and that is put me on your payroll.
The person who knocks on the door is almost always at least
a regional official of the government, the police. In a town
like Abbottabad, it certainly raises the question of whether
ISI wouldn't have been involved in such a racket. ISI is best
understood as a criminal enterprise as well as a security
agency. It is involved in many rackets around the country.
Second, it is important for Americans to understand I think
that the ambiguity and the nature of the haven that bin Laden
found in Pakistan is not by itself unusual in the country. From
India's perspective, there are five or six listed terrorists
living around the country in similar circumstances. Sometimes
they are judged to be under house arrest. Sometimes they are
notional fugitives. Sometimes they really are difficult to
find. But many of these people have either admitted to or been
credibly charged with mass killings on Indian soil.
So these patterns look outrageous to the United States when
the personality is somebody like Osama bin Laden, but in the
context of the way Pakistan has evolved over the last 10 years,
his circumstances were not by themselves unusual.
Just on the question of what it poses by way of challenge
to the United States and Pakistan, I think it is a useful wake-
up call to both sides. The fundamental problem, as you point
out, is that the Pakistani military and intelligence service
has not been held accountable over a long period of time
adequately by its partners or by its own people. It has made it
difficult for its own people to hold the services accountable
by often ruling directly or suppressing those who question the
military's supremacy.
But I think for the United States this is an opportunity to
come to a more effective grip with the fact that the United
States and Pakistan do not always see these very important
security questions the same way and to try to hold Pakistan's
military to greater account, even while acknowledging the
sacrifices that its soldiers have made in their own war on
terrorism and the shared interests that will endure between the
two countries.
Mr. McCaul. Thank you.
I think it also calls into question as we go into the
appropriations cycle the billions of dollars we provide to
Pakistan in foreign aid. We have known they have played this
game for quite some time. Like you, boy, they need to be held
accountable; and we need some answers as to whether they are
complicit with us or not.
Professor Hoffman and Professor Byman, do you have any
observations?
Mr. Hoffman. Thank you, sir.
I agree with your remarks and also Mr. Coll's. But I would
suggest there may even be a third explanation that goes beyond
complicity or incompetence but rather willful ignorance, is
that it was simply better and preferable not to ask.
But I think on this question of the double game you talk
about, it extends even beyond whatever protection may have been
afforded to Osama bin Laden. As I am sure you know, right now
in Federal District Court in Chicago there is a trial of
someone named Tahawwur Rana, and testimony is being made by
David Headley, who is an agent of the ISI, to the effect that
one of his ISI handlers, someone named Major Iqbal, not only
knew of the Mumbai plot but also made absolutely no effort to
stop the plans of LeT to target American citizens, both at the
Jewish Chabat House but also at the hotel. Yet we haven't seen
any convincing denials from Pakistan. We haven't seen any, at
least to my knowledge, any investigations about who this Major
Iqbal is and what his role is, and I think this is another area
where we need to hold Pakistan very accountable.
Mr. McCaul. That is a great point. How many other of these
wanted terrorists are being provided with safe haven by
Pakistan, who we provide so much aid to and purportedly work
together with to eradicate the terrorists?
Professor Byman, do you have any comments?
Mr. Byman. To briefly add, Pakistan has long had what it
feels are strategic interests in both Afghanistan and India in
terms of ensuring a friendly government to Afghanistan and I
would say one dominated by Pakistan and India in preventing
Kashmir from becoming I will say a normal part of the Indian
union and, as a result, its work with a range of militant
groups.
We think of al-Qaeda, of course, as a terrorist group, but
it is also an organization that has put a tremendous amount of
energy into working with insurgencies around the region. In
this capacity, I will say it is hard to say where al-Qaeda
begins and where some of the components of its network begin.
But certainly components of the network have been extremely
useful to Pakistan and India and in Afghanistan. So it is very
hard for us to make progress on the counterterrorism front
without making progress on Afghanistan and Kashmir, which makes
this exceptionally difficult.
Mr. McCaul. I think you and Mr. Coll have raised that same
issue, and I think it is a very good point.
My time has now expired. I recognize the Ranking Member,
Mr. Keating.
Mr. Keating. Thank you, Mr. Chairman. I want to thank Ms.
Clarke, too. I appreciate that.
I think the greatest concern we have right now is the
possibility of terrorists getting hold of nuclear weapons, and
that brings Pakistan front and center in that regard, the way
we are proceeding with Pakistan, I think clearly some of the
issues about weak governance and some of the strong anti-
American sentiment that exists there and the limited ability we
have to really monitor the programs.
Now, the President has said he is going to call forth now
to really measure accountability in metrics, in real metrics.
For the entire panel, could you comment on what kind of metrics
this could be measured in? How can this be tangibly monitored
and how can we hold Pakistan accountable?
Most everyone now, I think Senator Kerry when he returned
from a meeting in Pakistan, had said that it is going to be
more what you do, not what you say. So it seems like Senator
Kerry and the President are on the same page. They are looking
for tangible metrics that can be measured.
So if you can comment on how you think we could measure
what those metrics should consist of, I would be appreciative.
Mr. Coll. I think that is an excellent question and subject
and a very important direction for U.S. policy.
You can start with the observations that the Chairman made
about these compounds in Pakistan. The first metric would be
the status under the law of listed terrorists known to be
residing in Pakistan. There is a substantial body of open-
source evidence about a number of listed terrorists, a U.N.
list of terrorist, so it doesn't even have to be something
coming directly from the United States, whose status under the
law is confused or unsatisfactory.
I think there are two other important areas where the
United States has the capacity itself to monitor the conduct of
Pakistani security services in its relations with militant
groups. There is always a debate about what the true capacity
of the Pakistani state is to do more.
The Pakistanis use their own weakness as a defense against
accountability, but there are some areas where the state's
capacity to control terrorist activity is clear. One of those
is in the cross-border movements of militants from Pakistani
territory into Indian-held Kashmir, for example.
That border is essentially a military zone. Nobody moves
across that border without the Pakistan Army's permission. The
Indians have been watching the Army send armed young men with
groups like Lashkar across that border with impunity for years,
and the United States has not made a priority of holding
Pakistan to account for the rates of infiltration. It would be
unreasonable to say you should have zero infiltration in this
complex territory, big mountains, but the rates of infiltration
that Pakistan has allowed suggests state policy.
Similarly, on the Afghan border where American lives and
security interests are even more directly at stake, surely
there are metrics to monitor the actual conduct of Pakistani
security services to prevent cross-border infiltration,
applying some rule of reason as to what the state's capacity
really is and then holding the state to that account.
Mr. Keating. Do any of the other panelists wish to comment
on that?
Mr. Hoffman. Well, I agree completely with what Mr. Coll
has said. I would only add that I think some of the metrics are
the degree of cooperation, and I think now at least publicly
cooperation is flattening rather than increasing. The number
of, for instance, U.S. military trainers in Pakistan has
decreased. The number of CIA intelligence operatives has also
decreased. So I think it is really the strength of cooperation.
Some of these things, the metrics may be able to be
publicly stated but the reporting of them may have to remain
classified. But I think these are enormously illustrative of
the degree and extent that Pakistan is sincere about
cooperation against terrorism.
Mr. Keating. I just have a few seconds left, so I apologize
for giving a difficult question so quickly. But how would you
suggest and what would be some of the benefits or dangers of
linking our foreign aid to these measurable metrics? Do you
think there is a way to do that? Do you think there is a danger
in doing it too closely, or do you think there is a benefit?
Mr. Hoffman. I don't think we have much choice. I think
that the problem is that from the Pakistani perspective, they
believe in essence they have us over the barrel. They know that
we require their cooperation. Yet I think it has been either a
blank check during the Musharraf time, or now what they see as
an open checkbook. So I think it is our only leverage that we
can exert over them.
Mr. Keating. Do any of you think that that could be
measured so that there is some accountability for their own
actions?
Mr. Coll. I think there has always been or there has often
been from Congress sources of conditionality attached to U.S.
aid to Pakistan. But it has often been the Executive branch's
prerogative to judge Pakistan's performance and the criteria
have often been general or abstract. Whatever the degree of
sort of automatic trigger that such accountability might
involve, I think it would be a helpful change to attach
specific metrics of the sort we are talking about to that
finding. Even if the Executive branch retains some discretion,
our Executive branch ought to be held accountable around some
of these same specific issues, rather than just a generalized
sense that things are good enough.
Mr. Keating. I just want to thank you. I couldn't agree
with you more. I think that some countries use their own
weaknesses as an excuse. So thank you very much.
I yield back my time.
Mr. McCaul. Thank you. I agree. This is excellent testimony
as we go into the foreign aid appropriations cycle that we need
to use these metrics, because clearly the location of the bin
Laden compound I think calls into serious question Pakistan's
cooperation with the United States.
With that, I recognize the gentleman from Missouri, Mr.
Long.
Mr. Long. Thank you, Mr. Chairman.
A question for all three of you, I guess, however you can
best answer it. But it has been said that al-Qaeda on the
Arabian Peninsula has put its American supporters on a noble
quest to vanquish injustice and save the world from invading
evil. However, we know that al-Qaeda has killed far more
Muslims than it has Americans.
So how do we as the U.S. Government go about debunking and
countering this message?
Mr. Byman. Mr. Long, I will take the first shot at this
one. To me this is the great weakness of al-Qaeda, and it is
something that Muslim thinkers and commentators have noticed
and repeatedly mentioned and it has caused tremendous dissent
within the broader, certainly Islamist, but even within the
jihadist community, the question of killing Muslims, especially
Muslim noncombatants.
To me, I would recommend several things to emphasize this.
One is that when the United States does public diplomacy we not
make it about the United States. I think if we end up trying to
sell our policies, whether it is in Iraq or Israel-Palestine,
we are not going to win on that one. But we do put it in their
court when we make it about the killing of Muslim
noncombatants.
Also, we should be elevating credible voices that make
these statements that condemn al-Qaeda. Here I would say this
is a particularly difficult issue for Congress, however,
because many of these credible voices are actually quite anti-
American on a number of other things. So you might have a quite
eminent sheikh who says you should not kill Muslim women and
children, al-Qaeda is wrong and evil, but you should go to Iraq
and kill American soldiers there.
Of course, I understand why we do not want to support
anyone making that statement. But if you are trying to reach
into the radical community, someone who is on the other extreme
is not going to have any resonance there. So people with
credibility to condemn al-Qaeda are going to have views that we
often disagree with, at times quite strongly.
Mr. Long. When you say public diplomacy, walk me through
that again. Our public diplomacy should what?
Mr. Byman. I am sorry, in my view often our public
diplomacy emphasizes how good it is to be a Muslim in the
United States, the validity and justice of U.S. policies, and
these are legitimate activities. But to me it is far more
credible, given the unpopularity of al-Qaeda's message, when we
make the public diplomacy about their message, in a way this is
negative campaigning. They have done many things and stand for
many things that are extremely unpopular in the Muslim world
and have been criticized even by elements within the radical
fringe, and we need to amplify those voices and make that what
the debate is about rather than trying to insert ourselves into
this, which I think backfires.
Mr. Long. Okay. Professor Hoffman.
Mr. Hoffman. I think this question of al-Qaeda and its
affiliates claiming far more Muslim lives than its enemies is a
very important one and an unexploited one, but I would say
generally we do a very bad job in countering the al-Qaeda
narrative and countering their message of radicalization and
recruitment.
First, I think within the United States Government these
types of activities are both poorly resourced and have a very
low priority. I think we also tend to look at the world through
our own eyes, not through the eyes of the audience we have to
communicate with. For example----
Mr. Long. How do we change that attitude? How do we change
that?
Mr. Hoffman. Well, I think we have to understand our enemy
and understand our target audience much better than we do. I
think just as Professor Byman was saying, that too often it is
either directed from an American prison or through an American
lens.
I will give you a specific example. Much has been made in
recent weeks about the videotape of Osama bin Laden sitting on
the floor with the blanket around him in very austere
surroundings wearing a wool cap. It almost gives the sense that
this is some broken pathetic old man watching old films of
himself. But yet we haven't thought of what that image actually
portrays to Muslims elsewhere, to the Muslim world.
For example, they see a man who lived until the end, who
was true to his own commitment to forsake a life of comfort and
luxury to wage jihad. Someone who lived simply, who like the
prophet cloaked himself in a blanket as a pious Muslim, wore a
head covering. So we see this as someone sitting there
humiliated in essence, but that is not necessarily the image
that other people, especially the audience that we need to
reach, sees him as.
In terms of how we can better counter this narrative than
we have done, the victims of terrorism, especially the Muslim
victims of terrorism, a young woman in Washington named Carie
Lemack literally on her own with a very small network has
created a survivor's group that has been motivated, and their
mission basically is to better illuminate the role that victims
and survivors of terrorism can play in countering this message.
Of course, the documentary that she made on a shoestring
``Killing in the Name'' was nominated for an Academy Award. But
this is an important message that I think we have really under-
exploited and under-used.
Mr. Long. Mr. Coll.
Mr. Coll. Well, I agree entirely with Professor Byman and
Professor Hoffman. I guess the only thought I would add is that
the Arab Spring does offer an opportunity to advance the
recommendations that both of the previous speakers have
outlined. There is going to be an opportunity for the United
States and many other countries around the world, wishing well
to the nascent democracies forming in countries like Egypt and
Tunisia to support civil society groups, credible voices, to
strengthen speech and to bring forward the underlying opinion
in many of these societies that al-Qaeda does not represent
their ambitions and is in fact an evil in their midst. So that
indirect opportunity speaks to the strategies that they have
both outlined.
Mr. Long. Thank you all for being here today. I have no
time to yield back, but if I did, I would.
Mr. McCaul. Thank you for your generosity.
The Chairman now recognizes the gentleman from South
Carolina, Mr. Duncan.
Mr. Duncan. Thank you, Mr. Chairman, and thank you
gentleman for being here. The little bit of time I have been in
here has been very enlightening.
I will direct this question to Dr. Hoffman. I am just
trying to understand some of the relationships on the Arabian
Peninsula and North Africa. What is the relationship, if any,
between al-Qaeda and the Muslim Brotherhood?
Mr. Hoffman. Well, it is a relationship that perhaps at one
time in history ideologically was similar, but I think in
recent years really they have been two inimical forces, where
Ayman al-Zawahri, I suppose the titular leader of al-Qaeda now,
but until recently bin Laden's deputy, certainly in recent
months has attacked the Muslim Brotherhood in Egypt, also
Hamas, which is part of the Muslim Brotherhood network in Gaza,
for even attempting to make peace, for instance, with Israel or
enter into any kind of negotiations in Egypt, for deigning to
participate in any kind of a democratic process.
So I think we are actually talking about phenomena that, as
I said at one time, had some ideological similarities, but
really now is quite separate and different.
Mr. Duncan. Any other gentlemen have anything to add to
that?
Mr. Byman. Zawahri managed to write a book denouncing the
Muslim Brotherhood essentially while on the run and being
hunted. I have difficulty writing a book sitting in my office
for years on end without such interruptions. So the fact that
he put such effort into it. He has also had quite bitter
relations with Hamas, the Palestinian terrorist group that is
also a Muslim Brotherhood offshoot. So I think it is what the
people refer to as the narcissism of little differences, where
they were close enough ideologically that their subsequent
split in terms of where they have gone, where they moved to,
grates all the more.
With the Muslim Brotherhood in Egypt now, you have an
alternative, you have a political alternative. This is a group
that is, so far, and we should perhaps knock wood here, is so
far moving on the path to being part of regular elections in a
democratic society. If that is a success, that is quite a
different message and quite a different hope that should be
encouraged. It will come with a lot of bumps, even if it is a
success, but that in itself could be a blow to al-Qaeda.
Conversely, if the Muslim Brotherhood is excluded from
power, that will send a message to many young members that the
world will not allow them to take power peacefully, so that
exclusion could be quite dangerous and radicalizing to a small
group of these people.
Mr. Duncan. Just kind of a follow-up about al-Qaeda. What
is the relationship between al-Qaeda and the Iranian
Revolutionary Guard Corps, is that the Qods Force? Can you talk
about that, because I am reading a lot about that now and I
really would love to hear some testimony on that.
Mr. Byman. Congressman, I would urge you to try to get a
classified briefing on this, because the unclassified material,
which I have studied extensively, is actually noticeable by its
absence. There is clearly significant things going on. We have
had senior al-Qaeda members transit Iran. Some have found haven
in Iran, but perhaps under different degrees of house arrest.
Iran has a history of working with a wide range of groups that
it actually does not see eye-to-eye to, and certainly in this
case they are often violently in disagreement. But Iran is
quite pragmatic.
So we have seen cooperation in the past. We have seen some
degree of cooperation since 9/11. But in my judgment it is a
very fraught relationship. There are ideological differences.
Iran is much more cautious in its use of terrorism than al-
Qaeda. These groups in the end strongly, I would say, even hate
one another is the right word, but they have other problems as
well.
But this is an area I think where both Iran and al-Qaeda
for their own reasons have been trying to keep any relationship
as secret as possible. It is politically damaging to both of
them.
Mr. Duncan. Clearly al-Qaeda is in Iran, the CIA just
canceled a program over there tracking those individuals. I was
going to ask a question how you feel about the CIA canceling
that tracking program.
Mr. Byman. In my view, tracking where al-Qaeda individuals
are should always be a priority. I cannot speak to this
particular program though. I don't know its strength and
weaknesses.
Mr. Duncan. A news report just came out today. I read it
this morning.
So thank you very much. I yield back the balance of my
time.
Mr. McCaul. Just in closing, I want to make a couple of
comments. When we heard from the previous panel that the
administration is not providing a complete and accurate picture
of the threat assessment, specifically as it relates to
proliferation of weapons of mass destruction, so when we look
at countries like Pakistan and others that have nuclear
capability, I think that is absolutely essential that they come
forward as required by law and report these findings to the
Congress. I would assume you would all agree with that
assessment as well.
AQAP, Awlaki has troubled me for the last 2 years, almost
more so than bin Laden did, because of his ability to impact
Muslim youth in the United States and radicalize them. As the
Ranking Member talked about, this is a virtual safe haven, and
he is in a safe haven in Yemen, a failed state. But his ability
to use the internet very deceptively to radicalize remains--I
think the testimony I have heard, you probably agree that
Awlaki is emerging as one of the top leaders of al-Qaeda and
one of the biggest threats.
My last question, and if anybody else would like to ask a
question, I will recognize them. We talked about the Predator
drones, Professor Byman. I believe they have been very
effective, the surgical strikes, but they have had some
controversy obviously within Pakistan and Yemen as well. How
effective are these drone strikes?
Mr. Byman. Thank you, Mr. Chairman. In my view, the drone
strikes are effective. But let me begin with three caveats:
When you bomb people, at times you miss or at times you kill
innocent people nearby. The drones are far more surgical than
our traditional fixed-wing aircraft that are manned, and, of
course, they are far more surgical than Pakistani military
range. But nevertheless, we have to accept innocent death as
part of this.
Second, the drones are unpopular in Pakistan. When you are
conducting military operations on the soil of another country,
that is understandable. Often they are less popular farther
away from the areas where the drones are operating. I think
that in some ways people are farther away, it is easier to take
offense when you don't have to deal with the militants nearby.
The third caveat is the drone itself is not a strategy that
solves the problem. In my view, it reduces the problem, but
this is something that will be solved more fundamentally or not
by the actions of the Pakistani state.
But the drones do reduce the skilled number of al-Qaeda
leaders, and their bench, while deep, is not infinite. I think
even more important, it forces them to operate in a different
way. They spend much of their time playing defense. It is very
hard to quantify, but if instead of spending 12 hours a day
organizing, planning and training, they spend 2 because the
other remaining 10 are spent moving from place to place,
avoiding dangerous communications, that is a huge impact on an
organization, and I will say especially given the leadership
transition going on.
With the death of bin Laden, Zawahri needs to lead. He
needs to be out there, he needs to be communicating, he needs
to be showing that he is taking over, and that is much harder
because he risks exposing himself to U.S. intelligence and the
U.S. military if he does, and his death in a short period of
time would be an extreme blow to this organization, reducing
continuity.
Mr. McCaul. Mr. Coll and Professor Hoffman, do you agree
with that assessment?
Mr. Hoffman. I do. I would just add a couple of points. I
think it has been a highly effective tactic. I think though we
have run the risk of confusing an effective tactic with an
overall strategy, and I think this is just one arm of the war
on terrorism.
But I think what concerns me the most is I predict we are
going to see diminishing returns from the drone program. I
think we already are. When we see the publicly-released lists
of targets that have been killed, the 130 or so people, you
look at that list, there is a diminishing number of actual high
value targets of the senior leaders of al-Qaeda. There is
nothing wrong with disrupting the mid-level as well, but I
think as a means of decapitation, we are going to find it that
it pays fewer dividends. I think also that our opponents will
take increasing countermeasures to frustrate the drones and to
make sure that they are not the victims.
But I would end with the point that one of the lessons or
messages we should take from the highly successful SEAL
operation in Abbottabad is that we also have the capacity
perhaps in the future not just to take out and kill high-value
targets, but also to use that capability to capture them and
therefore gain the necessary intelligence, both tactically and
also strategically, that often high-value targeted killings
don't enable us to obtain.
Mr. McCaul. That is a great point. The treasure trove we
found in the compound, do you believe Pakistan is fully
cooperating with us on getting that information?
Mr. Hoffman. One hopes so, but it is difficult to say. At
least publicly it is not clear. I mean, they did of course let
the CIA--there was one important development. They did let the
CIA team into the compound to do their forensic scans with
equipment and with capabilities that the Pakistanis don't have.
But beyond that, how the treasure trove of information is
actively being applied in terms of actionable intelligence, it
is just not clear. It may be happening, but I am not aware of
it.
Mr. McCaul. Mr. Coll.
Mr. Coll. Just on that last point, it is my understanding
that the access to the wives and other civilians who were in
the compound and who were left behind was difficult for the
United States to obtain in the early days and the circumstances
in which those individuals were held by Pakistan raised
questions about the Pakistani government's intent in terms of
maximizing cooperation. So it does seem as if from the open
source evidence things have improved, but certainly in the
first 48 hours or 72 hours there were some real breaches in
cooperation, I think.
On the larger subject, I agree very much with both of the
previous speakers. I do think that, to Professor Hoffman's
points about the diminishing returns, I think the open source
evidence makes clear what he asserts, and also bin Laden's own
circumstances suggest what life is like if you are on the run
from a world of drones. You do not sit in the spaces that you
know the drones will be actively patrolling.
Mr. McCaul. I would say that is a great point.
Okay, with that, I want to thank the witnesses for an
excellent discussion here today.
Members have 10 days to submit questions in writing. If
they do so, I would hope you would answer those. Thank you so
much again for appearing here today.
With that, this hearing is adjourned.
[Whereupon, at 12:20 p.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|