To remind...Hitz got a chair at Princeton funded by Goldman Sachs.....Deutch got a check from Pug through Harvard....should we presume that Hitz and Deutch are on different teams? > -----Original Message----- > From: Catherine Austin Fitts [mailto:[EMAIL PROTECTED]] > Sent: Saturday, August 05, 2000 1:51 PM > To: Catherine Austin Fitts; Kpomeara@Aol. Com; [EMAIL PROTECTED]; Kate; > Bob [[EMAIL PROTECTED]]; [EMAIL PROTECTED]; [EMAIL PROTECTED] > Cc: Uri Dowbenko; Lois Ann Battuello; Linda Minor [[EMAIL PROTECTED]]; > [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Tthe Herbert S. Winokur Public Policy Fund at Harvard > University > > > http://www.ksg.harvard.edu/visions/gtrept.htm > > > Pug's public policy fund at Harvard, funded with the wealth he > created side by side with Harvard, while he was a Harvard > Management (Endowment) trustee, including in HUD housing (NHP & > WMF), has funded the following report by the John F. Kennedy > (Cuomo's wifes uncle) School at Harvard (current employer of the > former FHA Commissioner, Nic Retsinas, and former employer of the > current FHA Commissoner, Bill Apgar). > > Lois---note joint Harvard-Stanford project. > > Cat-we should add publication to chronology. Thanks. > > ================================================================== > ================================================= > > > > > > > Catastrophic Terrorism: > > Elements of a National Policy > > By > > Ashton B. Carter, > John M. Deutch > > and Philip D. Zelikow > > A Report of > > Visions of Governance > for the Twenty-First Century > > A Project of the John F. > Kennedy School of Government > > Harvard University > > > > �1998 by the Board of Trustees of Leland Stanford Junior > University and the Board of Trustees of Harvard University > > This report was made possible in part by the Carnegie Corporation > of New York, the John D. and Catherine T. MacArthur Foundation, > and the Herbert S. Winokur Public Policy Fund at Harvard > University. The statements made and views > expressed are solely the responsibility of the authors. > > > > Contents > > Foreword: Preventive Defense > > Acknowledgments > > Catastrophic Terrorism: Elements of a National Policy > > Imagining the Transforming Event > > Organizing for Success > > Intelligence and Warning > > Prevention and Deterrence > > Crisis and Consequence Management > > Acquisition > > Conclusion > > Notes > > About the Authors > > About Visions of Governance for the Twenty-First Century > > About the Stanford-Harvard Preventive Defense Project > > > > Foreword: Preventive Defense > > Through more than four decades of Cold War, American national > security strategy was difficult to implement but easy to > understand. America was > set on a clear course to contain Soviet expansionism anywhere in > the world, all the while building a formidable arsenal of nuclear > weapons to deter > the Soviet Union from using military force against it or its > allies. Now, with the end of the Cold War, the underlying > rationale for that strategy�the > threat from the Soviet Union�has disappeared. What strategy > should replace it? Much depends on finding the correct answer to > this question. > > The world survived three global wars this century. The first two > resulted in tens of millions of deaths, but the third�the Cold > War�would have > been even more horrible than the others had deterrence failed. > These three wars trace a path that leads to the strategy needed > for the post-Cold War > era. > > At the end of the First World War, the victorious European allies > sought revenge and reparations; what they got was a massive depression and > another world war. The United States sought "normalcy" and > isolation; what it got was total war and leadership in winning > it. Because it failed to > prevent and then to deter Germany�s aggression, America was > forced to mobilize a second time to defeat it. > > At the end of the Second World War, America initially chose a > strategy based on prevention. Vowing not to repeat the mistakes > made after World > War I, the Truman administration created the Marshall Plan, which > sought to assist the devastated nations of Europe, friends and > foes alike, to > rebuild. The Marshall Plan and other examples of the preventive > defense strategy, aimed at preventing the conditions that would > lead to a future > world war, were an outstanding success in Western Europe and in Japan. > > But the Soviet Union turned down the Marshall Plan and, instead, > persisted in a program of expansion, trying to take advantage of > the weakened > condition of most of the countries of Europe. The resulting > security problem was clearly articulated by George Kennan, who > forecast that the > wartime cooperation with the Soviet Union would be replaced with > a struggle for the heart of Europe and that the United States > should prepare for a > protracted period of confrontation. Kennan�s analysis was > accepted by the Truman administration, which then formulated a > strategy that would get > us through the Cold War: deterring another global war while > containing the Soviet Union�s demonstrated expansionist > ambitions. Deterrence > supplanted prevention: there was no other choice. > > Even deterrence was a departure from earlier American military > strategy. The United States had twice previously risen to defeat > aggression, but it > had not maintained the peacetime military establishment or the > engagement in the world to deter World Wars I or II. Marshall and > other defense > leaders around Truman created the peacetime posture and new > security institutions required. In time, as George Kennan had > forecast, the Soviet > Union disintegrated because of the limitations of its political > and economic systems. Deterrence worked. > > The result is a world today seemingly without a major threat to > the United States, and the U.S. is now enjoying a period of peace > and influence as > never before. But while this situation is to be savored by the > public, foreign policy and defense leaders should not be > complacent. This period of an > absence of threat challenges these leaders to find the vision and > foresight to act strategically, even when events and imminent > threats do not compel > them to do so. > > To understand the dangers and opportunities that will define our > nation�s strategy in the new era, we must see the post-Cold War > world the way > George Marshall looked upon Europe after World War II, and return > to prevention. In essence, we now have another chance to realize > Marshall�s > vision: a world not of threats to be deterred, but a world united > in peace, freedom, and prosperity. To realize this vision, we > should return to > Marshall�s strategy of preventive defense. > > Preventive Defense is a concept of defense strategy for the > United States in the post-Cold War Era. It stresses the need to > anticipate security dangers > which, if mismanaged, have the potential to re-create Cold > War-scale threats to U.S. interests and survival. The foci of > Preventive Defense are: > proliferation of weapons of mass destruction, catastrophic > terrorism, "loose nukes" and other military technology from the > former Soviet Union, > Russia�s post-Cold War security identity, and the peaceful rise of China. > > Preventive Defense is the most important mission of national > security leaders and of the defense establishment. They must > dedicate themselves to > Preventive Defense while they deter lesser but existing > threats�in Iraq and North Korea�and conduct peacekeeping and humanitarian > missions�in Bosnia, Haiti, Rwanda, and so on�where aggression > occurs but where American vital interests are not directly threatened. > > This report is the sixth in a series of Preventive Defense > Project reports on key applications of Preventive Defense. We are > grateful to our colleagues > in the Catastrophic Terrorism Study Group and the Visions of > Governance for the Twenty-First Century for their collaboration > > > > Acknowledgments > > This report is a product of the Catastrophic Terrorism Study > Group, a nine-month long collaboration of faculty from Harvard > University, the > Massachusetts Institute of Technology, Stanford University, and > the University of Virginia. The Group involves experts on > national security, > terrorism, intelligence, law enforcement, constitutional law, > technologies of Catastrophic Terrorism and defenses against them, > and government > organization and management. The Group is co-chaired by Ashton B. > Carter and John M. Deutch, and the project director is Philip D. Zelikow. > Organized by the Stanford-Harvard Preventive Defense Project, the > work of the Study Group is part of the Kennedy School of Government�s > "Visions of Governance for the Twenty-First Century" project, > directed by Dean Joseph S. Nye, Jr. and Elaine Kamarck. > > While the danger of Catastrophic Terrorism is new and grave, > there is much that the United States can do to prevent it and to > mitigate its > consequences if it occurs. The objective of the Catastrophic > Terrorism Study Group is to suggest program and policy changes > that can be taken by > the United States government in the near term, including the > reallocation of agency responsibilities, to prepare the nation > better for the emerging > threat of Catastrophic Terrorism. > > An article based on this report will be published in the journal > Foreign Affairs in the November/December 1998 issue. > > The authors would like to thank the members of the Catastrophic > Terrorism Study Group: > > Graham T. Allison, Jr. > > Zoe Baird > > Vic DeMarines > > Robert Gates > > Jamie Gorelick > > Robert Hermann > > Philip Heyman > > Fred Ikle > > Elaine Kamarck > > Ernest May > > Matthew Meselson > > Joseph S. Nye, Jr. > > William J. Perry > > Larry Potts > > Fred Schauer > > J. Terry Scott > > Jack Sheehan > > Malcom Sparrow > > Herbert Winokur > > Robert Zoellick > > Though practically all of these group members are sympathetic to > the conclusions in this report, and some enthusiastically endorse > them, none is > responsible either for particular opinions expressed here or for > the way we have written this report and expressed those judgments. > > We would also like to thank the staff who was responsible for > organizing the Study Group in addition to assisting in the > preparation of this report: > Gretchen Bartlett, Lainie Dillon, Hilary Driscoll, Sarah > Peterson, and Kristin Schneeman. > > Finally, the Study Group is grateful for the support of the > Carnegie Corporation of New York, the John D. and Catherine T. > MacArthur Foundation, > and the Herbert S. Winokur Public Policy Fund at Harvard University. > > > > CATASTROPHIC TERRORISM: ELEMENTS OF A NATIONAL POLICY > > Imagining the Transforming Event > > We find terrorism when individuals or groups, rather than > governments, seek to attain their objectives by means of the > terror induced by violent > attacks upon civilians. When governments openly attack others, we > call it war, to be judged or dealt with according to the laws of war. When > governments act in concert with private individuals or groups, > the United States government may call it war, or state-sponsored > terrorism, and > retaliate against both the individuals and the governments. > Whatever the label, terrorism is not a new phenomenon in national > or international life, > although terrorists may be animated by a greater variety of > motives than ever before, from international cults like Aum > Shinrikyo to the individual > nihilism of the Unabomber. > > What is certainly new is that terrorists may today gain access to > weapons of mass destruction (WMD). These can come in a variety of > forms: nuclear > explosive devices, germ dispensers, poison gas weapons, or even > the novel destructive power of computers turned against the > societies that rely on > them. What is also new is an unprecedented level of national and > global interdependence on an invisible infrastructure of energy > and information > distribution. > > Americans were shocked by the tragic results of the August 1998 > terrorist attacks against their embassies in Kenya and Tanzania. > By comparison > with the threat of catastrophic terrorism, we believe that the > threat of ordinary terrorism of the kind we have known over the > last generation is being > taken seriously. The United States government�s commitment to > address that danger is fundamentally sound. We are not as > confident that the > United States government is suitably prepared to address the new > threat of catastrophic terrorism that utilizes weapons of mass > destruction or > intensive cyber-assault. > > Long part of Hollywood�s and Tom Clancy�s repertory of > nightmarish scenarios, catastrophic terrorism is a real > possibility. In theory, the enemies of > the United States have motive, means, and opportunity. The U.S. > government has publicly announced that terrorist groups are attempting to > manufacture chemical weapons and destroyed one such facility > operating in the Sudan. As India and Pakistan build up their > nuclear arsenals and > Russia, storehouse for tens of thousands of weapons and the > material to make tens of thousands more, descends toward a future > none can foresee, it > is not hard to imagine the possibilities. The combination of > available technology and lethality has made biological weapons at > least as deadly a > danger as the better known chemical and nuclear threats. The > bombings in East Africa killed hundreds. A successful attack with > weapons of mass > destruction could certainly kill thousands, or tens of thousands. > If the device that exploded in 1993 under the World Trade Center > had been nuclear, > or the distribution of a deadly pathogen, the chaos and > devastation would have gone far beyond our meager ability to > describe it.1 > > Experts combining experience in every quadrant of the national > security and law enforcement community all consider this > catastrophic threat > perfectly plausible today. Technology is more accessible, society > is more vulnerable, and much more elaborate international > networks have developed > among organized criminals, drug traffickers, arms dealers, and > money launderers: the necessary infrastructure for catastrophic > terrorism. Practically > unchallengeable American military superiority on the conventional > battlefield pushes this country�s enemies toward the > unconventional alternatives.2 > > Readers should imagine the possibilities for themselves, because > the most serious constraint on current policy is lack of > imagination. An act of > catastrophic terrorism that killed thousands or tens of thousands > of people and/or disrupted the necessities of life for hundreds > of thousands, or > even millions, would be a watershed event in America�s history. > It could involve loss of life and property unprecedented for peacetime and > undermine Americans� fundamental sense of security within their > own borders in a manner akin to the 1949 Soviet atomic bomb test, > or perhaps > even worse. Constitutional liberties would be challenged as the > United States sought to protect itself from further attacks by > pressing against > allowable limits in surveillance of citizens, detention of > suspects, and the use of deadly force. More violence would > follow, either as other terrorists > seek to imitate this great "success" or as the United States > strikes out at those considered responsible. Like Pearl Harbor, > such an event would > divide our past and future into a "before" and "after." The > effort and resources we devote to averting or containing this > threat now, in the "before" > period, will seem woeful, even pathetic, when compared to what > will happen "after." Our leaders will be judged negligent for not > addressing > catastrophic terrorism more urgently. > > Using imagination, we hope now to find some of the political will > that we know would be there later, "after," because this nation > prefers prevention > to funereal reconstruction. When this threat becomes clear the > President must be in a position to activate extraordinary > capabilities. The danger of > the use of a weapon of mass destruction against the United States > or one of its allies is greater at this moment than it was during > the Cold War, or at > least since 1962. The threat of catastrophic terrorism is > therefore a priority national security problem, as well as a > major law enforcement concern. > The threat thus deserves the kind of attention we now devote to > threats of military nuclear attack or of regional aggression, as > in the Defense > Department�s major regional contingencies that drive our force > planning and the resources we devote to defense. > > The first enemy of imagination is resignation. Some who > contemplate this threat find the prospects so dreadful and > various that they despair of doing > anything useful and switch off their troubling imagination. They > are fatalistic, like someone contemplating the possibility of a > solar supernova, and > turn their eyes away from the threat. Some thinkers reacted the > same way at the dawn of the nuclear age, expecting doom to strike > at any hour and > disavowing any further interest in the details of deterrence as a > hopeless venture. But as in the case of nuclear deterrence, the > good news is that more > can be done. > > We formed a Catastrophic Terrorism Study Group to move beyond a > realization of the threat to consider just what can be done about > it. This group > began meeting in November 1997. We examined other studies that > consider this problem. We received information and advice from > some current > government officials as well as from those who had considered the > problem from the perspectives of governments in Great Britain, > Israel, Germany, > and Russia. We now advance practical proposals for consideration > and debate. We avoid a grand solution, preferring to shape > "bricks" that strengthen > existing structures, consider the very different technical > challenges presented by nuclear, biological, chemical, and cyber > threats, and provide a > foundation for future adaptation and future building. > > > > Organizing for Success > > The threat of catastrophic terrorism typifies the new sort of > security problem the United States must confront in the post Cold > War world. It is > transnational, defying ready classification as foreign or > domestic, either in origin, participants, or materials. As the > World Trade Center incident > demonstrated, one group can combine U.S. citizens with resident > aliens and foreign nationals, operating in and out of American > territory over long > periods of time. > > The greatest danger may arise if the threat falls into one of the > crevasses in our government�s field of overlapping jurisdictions, > such as the divide > between terrorism that is "foreign" or "domestic;" or terrorism > that has "state" or "non-state" sponsors; or terrorism that is > classified as a problem > for "law enforcement" or one of "national security." The law > enforcement/national security divide is especially significant, > carved deeply into the > topography of American government. > > The national security paradigm fosters aggressive, proactive > intelligence gathering, presuming the threat before it arises, > planning preventive action > against suspected targets, and taking anticipatory action. The > law enforcement paradigm fosters reactions to information > voluntarily provided, > post-facto arrests, trials governed by rules of evidence, and > general protection for the rights of citizens. > > We start with a concept for an overall end-to-end strategy. This > has at least four elements: (1) intelligence and warning; (2) > prevention and > deterrence; (3) crisis and consequence management; and (4) a > process for coordinated acquisition of needed materials, > equipment, and technology. > Throughout, there must be clear guidance about what our > institutions should be able to do and definition of the roles and > missions of involved > agencies at all levels of government. > > In an address at the U.S. Naval Academy, President Clinton > announced on May 22, 1998, that we must approach the new > terrorist challenges of the > 21st century "with the same rigor and determination we applied to > the toughest security challenges of this century." To that end he signed > Presidential Decision Directive (PDD) 62 and appointed a National > Coordinator for Security, Infrastructure Protection, and > Counterterrorism to > "bring the full force of all our resources to bear swiftly and > effectively." The National Coordinator and PDD-62, like the > predecessor PDD-39, look > to "lead agencies" on one or another issue to "identify a program > plan with goals and specific milestones." The National > Coordinator will produce an > annual "Security Preparedness Report," offer budget advice, and > lead in the development of guidelines for crisis management.3 > > We welcome the presidential determination to address the danger > of catastrophic terrorism and see no harm in the designation of a > responsible White > House aide. But we suggest a different emphasis when it comes to > solving the difficult problems of shared powers and overlapping > authorities. > > We place no faith in czars. An unidentified, incautious > administration official explained to reporters that "when money > was going to the war on > drugs, we created a drug czar. Now money is going to > counterterrorism, and so we�ll have a czar for that, except this > one will have real power."4 A > national coordinator may be necessary, but is certainly not > sufficient. For better or worse, however, "real power" resides in > the executive > departments and companies that actually have people, equipment, > money, and the capacity to do things. This report thus focuses on > building such > capabilities, rather than dwelling on coordination at the apex. > > "In form," Richard Neustadt explained long ago, "all Presidents > are leaders nowadays. In fact this guarantees no more than that > they will be clerks. > Everybody now expects the man inside the White House to do > something about everything. ... But such acceptance ... merely > signifies that other > men have found it practically impossible to do their jobs without > assurance of initiatives from him. ... They find his actions > useful in their business. > ... A President, these days, is an invaluable clerk. His services > are in demand all over Washington. His influence, however, is a > very different > matter."5 > > Well before the idea of a terrorism czar had been conceived, > James Q. Wilson had noticed that "whenever a political crisis > draws attention to the > fact that authority in our government is widely shared, the cry > is heard for a �czar� to �knock heads together� and �lead� the > assault on AIDS, drug > abuse, pollution, or defense procurement abuses. Our form of > government, to say nothing of our political culture, does not > lend itself to czars...."6 > > Also, most of the expensive functional capabilities that must be > brought together to cope with the danger of catastrophic > terrorism are capabilities > that are needed for other purposes, too, from reconnaissance > satellites to National Guardsmen. Unifying these capabilities > exclusively for one > challenge will not work in practice. The people making decisions > about using these capabilities against terrorists should be the > same people who > must consider the other missions and who can weigh and reconcile > competing demands. > > Experience from World War II (such as that of the British Chiefs > of Staff Committee or the U.S. Office of War Mobilization) > through the Cold War > to the present, including the current system of security > policymaking the British have devised (after long trial and > error) for Northern Ireland, instead > counsels us toward a different approach.7 One or another > executive agency may be in the lead, but the key is to give > responsibility (and > accountability) to the people who are in charge of the relevant > people and machines; create unglamorous but effective systems for shared > decision-making that combine civil, military, and intelligence > judgments up and down the chain of command; fashion entities that > integrate planning > and operational activity at the working level; and focus on the > tasks of building up the institutional capacities to do new > things. There must be > exercises of the entire system to highlight defensive needs, > before an incident happens. We turn now to the first crucial > task: intelligence and > warning. > > > > Intelligence and Warning > > Since 1945 the United States has given intense attention to any > potentially hostile entity that might deliver weapons of mass > destruction against its > territory or its allies. The intelligence objectives were > straightforward: orientation toward governments and monitoring of > weapons development, > testing, and deployment. The intelligence task for catastrophic > terrorism is complicated by non-state actors, concealed weapons > development, and > unconventional deployments. In cyber attacks, the delivery of > weapons can be entirely electronic. > > So the intelligence job is much harder. It is not impossible. The > would-be terrorists have problems, too. If states are involved, > the organizations tend > either to be large and leaky, or small and feckless. If no state > is involved, the group may be small, feckless, and pathological, > too. These realities > form the opportunities for intelligence successes. Even the most > formidable Irish terrorist groups took years of experience to > acquire their level of > professionalism and, for all their skills and training, suffered > frequent setbacks in their underground war against British > intelligence. Perhaps the most > serious recent attempt to carry out an act of catastrophic > terrorism was an expertly planned effort to destroy, with a > series of simultaneous bomb > explosions, the entire electrical power supply for metropolitan > London. The attempt was thwarted and British security forces > arrested the terrorists. > > The U.S. government should seek to have the legal authorities and > the capability to monitor�physically and electronically�any group > and their > potential state sponsors that might justifiably be considered to > have a motive and capability to use weapons of mass destruction. The U.S. > government should be able to do all that can reasonably be done > to detect any use or deployment of such weapons anywhere in the world, by > utilizing remote sensing technology and by strengthening and > evaluating worldwide sources of information. These would include > clandestine > collection, open sources such as foreign newspapers and journals > or the Internet, and would include better-organized exchanges > with key allies and > other like-minded states. > > Nearly a year before its attack on the Tokyo subway system, the > Aum Shinrikyo group had already used the nerve gas, Sarin, in > attacks on civilians. > Although known to the Japanese news media, the U.S. government > did not know. Not only did Washington not know what Japanese law > enforcement agencies knew, it is likely that centralized Japanese > law enforcement agencies did not know what other local > organizations in Japan > knew about this prior and well documented use of chemical weapons. > > Today the U.S. intelligence community lacks a place to perform > "all-source" planning for collecting information, where the > possible yields from > efforts in overhead reconnaissance, electronic surveillance, > clandestine agents, law enforcement databases and informants, and > reports from foreign > governments, can be sifted and organized for maximum > complementary effect. The national security agencies can be > proactive. Domestic law > enforcement officials understandably are not proactive about > intelligence collection but focus their efforts from informants > or other collection to > investigate suspected criminal actions with the objective of > criminal prosecution. Civil liberties properly discourage them > from going out and looking > for criminals before they have evidence of crime. > > On the other hand, domestic law enforcement has many techniques > for gathering data, including lawful wiretaps and grand jury > investigations. Much > of the yield from these efforts is, in turn, closed off to the > national security community by law or regulation, to safeguard > constitutional rights.8 > > We believe the U.S. needs a new institution to gather > intelligence on terrorism, with particular attention to the > threat of catastrophic terrorism. We > call this new institution a National Terrorism Intelligence > Center. This Center would be responsible for collection > management, analysis, dissemination of > information, and warning of suspected catastrophic terrorist > acts. The Center would need the statutory authority to: > > � monitor and provide warning of terrorist threats to > relevant agencies of the U.S. government, supporting defense or > intelligence operations, as well as law enforcement; > > � set integrated collection requirements for gathering > information for all the intelligence agencies or bureaus of the U.S. > government; > > � receive and store all lawfully collected, relevant > information from any government agency, including law enforcement > wiretaps and grand jury information; > > � analyze all forms of relevant information to produce > integrated reports that could be disseminated to any agency that > needed them, while restricting dissemination of > underlying domestic wiretap and grand jury information; > > � review planned collection and intelligence programs > of all agencies directed toward terrorist targets to determine the > adequacy and balance among these efforts in preparation > of the President�s proposed budget; > > � facilitate international cooperation in > counterterrorism intelligence, including the bilateral efforts of > individual agencies; > > � not manage operational activities or take on the task > of general intelligence about the proliferation of weapons of mass > destruction (now coordinated in the Director of Central > Intelligence Nonproliferation Center); > > � be exempt from motions for pretrial discovery in the > trials of indicted criminals.9 > > Since this Center would have constant access to considerable > domestic law enforcement information, we believe it should not be > located at the > Central Intelligence Agency. The highly successful Director of > Central Intelligence Counterterrorism Center established in the > mid-1980s has a > narrower mandate than the National Center that we propose and it > would be incorporated into the new National Center. Instead we > recommend the > National Center be located in the FBI. However, the Center, in > our conception, would be responsible to an operating committee, > chaired by the > Director of Central Intelligence and including the Director of > the FBI, the Deputy Secretary of Defense, the Deputy Attorney > General, the Deputy > Secretary of State, and the Deputy National Security Adviser. The > budget would be included within the National Foreign Intelligence Program, > which already provides support for the FBI�s National Security > Division. Unresolved disputes would go to the National Security > Council. The > director of the Center would come alternately from FBI and CIA. > The major intelligence organizations would all be required to > provide a specified > number of professionals to the Center, and this number would be > exempt from agency personnel ceilings. > > The concept of this Center attempts to combine the proactive > intelligence gathering approach of the national security > agencies, which are not legally > constrained in deciding when they may investigate a possible > crime, with the investigative resources of law enforcement > agencies. We must have an > entity that can utilize our formidable but disparate national > security and law enforcement resources to analyze transnational > problems. This > combination should be permitted, consistent with public trust, > only in a National Center that has no powers of arrest and > prosecution and that > establishes a certain distance from the traditional defense and > intelligence agencies. The Center would also be subject to > oversight from existing > institutions, like the federal judiciary, the President�s Foreign > Intelligence Advisory Board and the select intelligence > committees of the Congress. > > There are precedents for creating novel interagency operating > institutions that work�the National Reconnaissance Office and the reformed > Counterintelligence Center offer relevant illustrations. We are > not anxious to create new government institutions. But the > problems in information > sharing about terrorism are not just products of petty > bureaucratic jealousy. They stem from a real question: how do we > reconcile the practices of > foreign intelligence work with the restrictions that properly > limit domestic law enforcement? We believe our proposal offers a > possible answer. > > > > Prevention and Deterrence > > There are several measures that we believe will contribute to > prevention and deterrence of catastrophic terrorism. We suggest > three measures > here�an international legal initiative to make any development or > possession of weapons of mass destruction a universal crime, a National > Information Assurance Institute, and stronger federal support to > strategic risk analysis of the catastrophic terrorism problem. > > Outlawing Terror Weapons > > Prevention is intertwined with the concept of deterrence. The > U.S. has finally developed a sound, firm, and increasingly > credible declaratory policy > that criminalizes terrorist activity and supports sanctions, or > even the use of force, to thwart an attack or respond. We also > believe that the United > States must work with other countries to extend the prohibitions > against development or possession of weapons of mass destruction. Matthew > Meselson and others have recently proposed a convention that > would make any individual intentionally involved in biological > weapons work liable > as an international criminal, prosecutable anywhere, as is the > case for pirates or airplane hijackers.10 Defensive work against > biological warfare agents > would of course be permitted. > > There are already international treaties in which governments > promise to restrain their weapons developments�the nuclear > Non-Proliferation > Treaty, the Biological Weapons Convention, and the Chemical > Weapons Convention are the most notable examples. Governments > breaking such a > treaty violate international law. We are pressing a different > idea. Prohibited weapon development would become a universal > crime, opening the way > to prosecution and extradition of individual offenders wherever > they may be found, around the world. This idea utilizes the power > of national > criminal law against people, not the power of international law > against governments. It builds on analogous developments in the > law of piracy, > treaties declaring the criminality of airplane hijacking, crimes > of maritime navigation, theft of nuclear materials, and crimes > against diplomats. > > We are concerned about the actions of governments, too. Over > time, we hope the burden of proof in demonstrating compliance > with international > conventions must also shift away from those alleging > noncompliance to those states or groups whose compliance is in > doubt. International norms > should adapt so that such states are obliged to reassure those > who are worried and to take reasonable measures to prove they are > not secretly > developing weapons of mass destruction. Failure to supply such > proof, or prosecute the criminals living in their borders, should > entitle worried > nations to take all necessary actions for their self-defense. > > National Information Assurance Institute > > Cyber-terrorism is a special problem, where private sector > cooperation is vital, but elusive. The President�s Commission on > Critical Infrastructure > Protection (often called the Marsh Commission) stressed that > industry was reluctant to deal with these problems on its own > because the solutions > cost money, the risk is unclear, and they fear heavy-handed > government action. On the other hand, although the FBI has > created a National > Infrastructure Protection Center, which can help identify sites > that need help, we do not think FBI, with all its operational > duties, is the place to > build a bridge with the private sector or harness the significant > resources and expertise found on the cyber problem within the > Department of > Defense. So we propose a National Information Assurance > Institute, based within the private, nonprofit sector, that could > serve as a kind of industry > laboratory with a central focus on cyber protection. Placed in > the private sector, the institute would not itself own the > infrastructure or be part of the > government, but it could deal with both sides. It implements the > Marsh Commission�s recommendation, seeking a way for industry to > organize itself > better to deal with this problem as part of a public-private partnership. > > For industry, this institute could become: > > � a clearinghouse for sharing information assurance > techniques and technology; > > � a developer of common techniques and technology for > information assurance; > > � a trusted repository of proprietary information that > poses no competitive threat; > > � a single point of contact with the law enforcement, > national security, and other agencies of the federal government; > > � a resource for training and familiarization of > industry personnel with technical best practice and government concerns, > policies, and regulations. > > For government, this institute could become: > > � a channel for sharing sensitive intelligence about > threats to information infrastructure; > > � a center of technical excellence for developing and > improving technology and techniques for protecting critical > infrastructure; > > � a unified government-industry forum for coordinating > federal policy, regulation, and other actions affecting infrastructure > providers. > > We envision that the institute would be established as a > not-for-profit research organization by a group of concerned > private companies, universities, > and existing not-for-profit laboratories. The institute would be > governed by a board of directors drawn from the private sector > and academia. > > The institute staff could be supplemented by detailees drawn from > both industry and government. Industry affiliates would not only > include the > manufacturers and maintainers of information systems, but also > service vendors, their trade associations, and the major > companies and trade > associations from the power, telecommunications, banking, > transportation, oil and gas, water and sewer, and emergency > service sectors (including > multinational companies, with appropriate protection for > circulation of U.S.-only classified information). > > This new institute could perform information assurance > assessments for industry on a confidential basis. Industry > representatives would be educated > and trained on technical best practice, threats, and government > policies. The institute would receive contracts from government. > The institute could > sponsor and conduct research on security assessment tools, > intrusion detection, recovery, and restoration. As it identifies > and develops industry > standard best practices, and evaluates the vulnerability of > commercial products, we prefer to rely where possible on informal > private sector > enforcement of these ideas in the marketplace (through insurance > rating, for example), rather than formal government regulation. > The institute could > also perform incident evaluations, create a monitoring center for > information assurance, provide on-call assistance, and help > industry develop > contingency plans for failure. > > Risk Analysis > > Other than more general policies to keep America�s enemies to a > minimum and to prevent anyone from acquiring weapons of mass > destruction who > does not already possess them, efforts to prevent catastrophic > terrorism turn on the interdiction of people and materials and on > deterring attacks. A > serious U.S. government effort would include development of the > capacity to use remote sensing technology to detect, at least > from close range, any > distinctive and measurable physical properties of nuclear, > biological, and chemical weapons or their less commonplace > precursor materials and the > distribution of this technology in a form that can be used in the > field. Aided by international agreements among supplier nations, > materials that can > be used in weapons of mass destruction would be marked or tagged > wherever possible, to enhance detection or post facto identification. > > Moreover, the United States should seek to ascertain the identity > of every person and the contents of all freight entering its > territory or its > installations overseas. Though we know this goal obviously cannot > be attained in the immediate future, it is a legitimate objective > for the long-term. > Even imperfect measures can still create the perception, among > would-be terrorists, that they or their precious weapon material > might run a > significant risk of being intercepted. But systematic > interdiction efforts require shrewder analysis of where more > resources can make a difference. > > The allocation of inspection and protective instruments by the > government should be guided by risk analysis. This form of > analysis is well known to > engineers who may analyze a dangerous system to find the key > sequences of errors that can lead not just to failure, but to > catastrophic failure. Those > are the sequences that then command disproportionate engineering > attention (to add redundant switches, for example). Not all > worries merit equal > concern. Engineers refer to a "balanced" design as one where all > the components have been designed to be as good as the whole system needs, > neither better nor worse. > > The role of risk analysis, or strategic analysis for risk > control, is to analyze threats and define risks in a natural way > (avoiding the temptation to define > them in terms of existing agency boundaries or capabilities), to > commission further data gathering and analysis to assess relative > significance, and > then to subdivide acute risks into actionable components where > resources can make a difference.11 A systemic approach is needed > that encompasses > broad area surveillance; specific threat identification; targeted > surveillance and warning; prevention, protection, deterrence, > interdiction and covert > action; consequence management; forensic analysis of a site to > determine responsibility, punitive action, and learning lessons. > > Analysis, for instance, shows that international border crossings > are an important bottleneck in the worldwide movement of > criminals. The United > States, rather than just looking after the verifiability of its > own passports, should organize resources focused on such > bottlenecks throughout the > world. We can imagine, for instance, a system created, with > American funding, to insure that every country�s passports are > computer readable, that > every passport control officer has such a reader, and that every > reader is linked to a database that can validate the status of > the document, or indicate > the need for further inquiries. The database need not invade the > internal files of any government. As is already the case in the > private sector, third > entities can be created to perform the clearinghouse role, using > data supplied by participating governments. Naturally, terrorists > could still use > documents of non-participating countries, but those would attract > just the suspicion such travelers seek to avoid. > > Government agencies can do many things reasonably well, but > strategic risk analysis is not one of them. We recommend > establishing a center for > catastrophic terrorism risk analysis, offering a substantial > multi-year contract, executed by the FBI, to a not-for-profit > research center to perform this > sort of analysis, devise and evaluate exercises and tests, and > develop concepts of operations for countering catastrophic > terrorism. Early in the > nuclear era the RAND Corporation played an important part in > helping the government think about a new set of security > concerns. The Department > of Defense has made a start by establishing an advanced concepts > office in the newly formed Defense Threat Reduction Agency. But > risk analysis > will require a national, not just a DOD, focus. > > > > Crisis and Consequence Management > > Crisis management for catastrophic terrorism should include the > capacity to employ appropriate force and specialized capabilities > in any part of the > world, endeavoring to minimize collateral damage, and to thwart a > possible attack using weapons of mass destruction. Crisis management would > include urgent protective efforts, employing every resource at > the disposal of federal, state, and local governments. The U.S. > government should also > acquire capacities and plans for forensic investigation of the > site of an attack in order to collect evidence and identify those > responsible for further > action. > > Consequence management is a capacity to deal with the aftermath > of an attack. The United States, at all levels of government, > must develop the > ability to respond effectively within hours, if not minutes, to > any use of a weapon of mass destruction�nuclear, biological, chemical, or > cyber�against American targets with appropriate and specific > measures to mitigate casualties and damage. This is a large > order. The needed > capabilities include emergency medical care, distributions of > protective gear or medications (including vaccines for those not > yet exposed to the > pathogen12), evacuations, and area quarantines, among other > measures. Since these capabilities would need to be on a large > scale, extensive > preparations are needed to ready them in central locations, be > able to mobilize them on sudden notice, be able to transport them > where needed, and > expect local authorities and caregivers to be ready to receive > and use them. The United States must also have emergency plans > readied, including > redundant or alternative control systems, for sustaining the > operation of infrastructure that provides the necessities of > life, if this infrastructure > comes under attack. > > The present system for handling terrorist emergencies is based on > the FBI or�if overseas�on initiatives by State Department > representatives or > local military commanders. If an acute threat emerges in the > United States, local authorities are expected to alert the local > FBI office. The FBI�s > special agent in charge would then organize intergovernmental > response through activation of a strategic intelligence center in > Washington, and a > joint operations center and joint public affairs effort in the > local area. If there were a WMD threat, the FBI could call on its > Weapons of Mass > Destruction Operations Unit, which has "Domestic Guidelines" to > coordinate with other agencies and, in particular, seek Pentagon > assistance. > > There is ample legal authority to seek military aid in dealing > with such a crisis on U.S. soil. FBI can call upon an existing, > though rather small-scale, > interdepartmental Domestic Emergency Support Team (or, overseas, > a Foreign Emergency Support Team). FBI has its own Hazardous Materials > Response Unit. More military assistance would likely come, not > from a joint interservice command, but from the Army�s Chemical > and Biological > Defense Command. If the attack occurred, consequence management > would be organized by the Federal Emergency Management Agency (FEMA) > under what is called the "Federal Response Plan." > > This structure is adequate for responding to ordinary terrorist > threats or attacks, or perhaps even small scares related to > weapons of mass destruction, > as in February 1998 when FBI learned that two suspects in Las > Vegas, one of whom had earlier been convicted for fraudulently > obtaining bubonic > plague virus, might be in possession of some anthrax. The crisis > response went well, including coordination with limited Defense Department > resources. The suspects turned out not to have any anthrax. > > However, if some agency of the U.S. government learned that a > large scale WMD attack might actually be imminent, threatening > tens of thousands > of lives, we expect that this structure for responding would > almost instantly be pushed aside. The White House would > immediately become involved > and would seek to use every bit of power at America�s disposal in > order to avert or contain the attack. The operational command > structure would > need to be capable of directing everything from CIA covert > actions to strikes by bombers or missiles, be able to set up > interdiction involving ground, > sea, and air forces, and be able to mobilize and move thousands > of soldiers (active duty, ready reserve, and National Guard) and > thousands of tons > of freight (in various emergency supplies and support for > deployed units). Nor can any of these actions happen quickly > unless plans have already > been drawn up and units designated to carry them out, with > repeated training and exercises to create a readiness to bring > the plans to life. In this > situation, the Defense Department�s capabilities would > immediately become paramount. The FBI does not command such > resources and does not > plan to command them. > > So what is needed is a two-tier structure for response, one for > ordinary terrorist incidents that can be managed by federal law > enforcement with > interagency help, and a second structure readied for the > contingency of truly catastrophic terrorist attack. The United > States has set up unified > combatant commands to prepare for remote but extremely serious > contingencies of regional aggression, like U.S. Central Command�s > response to > Iraq�s 1990 invasion of Kuwait. The United States must also > develop a structure that is ready to respond to this new, perhaps > even more likely, > contingency of the future. > > Rather than create a new combatant command, we suggest instead > two new offices, one set up within the Office of the Secretary of > Defense, and > the other created within the existing combatant command, U.S. > Atlantic Command, that is already responsible for the security of > the American > homeland with operational responsibility for the majority of the > U.S. armed forces. Our working titles for these offices are > Catastrophic Terrorism > Response Offices, or CTROs. The new offices would build a > capability centered in the federal government but including state > and local authorities > along with relevant parts of the private sector to respond, once > authorized to act by the President and the Secretary of Defense, > to validated terrorist > threats that would cause massive loss of life (measured in the > thousands, i.e., significantly larger than the attack on the > federal building in Oklahoma > City) or otherwise jeopardize the operation of American > government or critical infrastructure necessary to public health > or the functioning of the > economy. Obviously, the President and his advisors would face a > difficult judgment to determine when this threshold has been met, but such > judgments are required in other areas of national security policy > and they can be made here. > > The CTROs would plan and organize for a U.S. response to > catastrophic terrorism by all elements of the U.S. government. > > They would: > > � assess intelligence and warning information in order > to alert the National Command Authority of catastrophic terrorist > threats; > > � set requirements for, among other things, the > collection and analysis of intelligence carried out by the > proposed National > Counterterrorism Intelligence Center; > > � define needed resources and assure that resources, > procedures, and trained personnel are available at the federal, state, > and local level to respond to validated catastrophic threats; > > � sponsor training and exercises involving federal, > state, and local authorities for responding to catastrophic terrorist > attacks; > > � task operations by other organizations once activated > by the President through the Secretary of Defense (with actual > operations being undertaken by line organizations, > whether covert actions by the CIA or military operations through the > Joint Chiefs of Staff or law enforcement actions by the FBI); > > � coordinate international preparedness to join in a > multinational response against catastrophic terrorist threats. > > The two CTROs should have the legal responsibility to achieve > overall U.S. government readiness to respond to catastrophic > terrorist threats when > asked to do so by the President, acting through the Secretary of > Defense. The defense secretary would be the executive agent for > both offices and for > their budget program, so that the CTROs can program elements in > the DOD program budgeting system and have the job of submitting a > consolidated catastrophic terrorism response program to the White > House for inclusion in the President�s proposed budget. The > Congress pointed > toward such a goal in the Defense Against Weapons of Mass > Destruction Act of 1996 (more commonly known as the Nunn-Lugar-Domenici > Amendment, or Nunn-Lugar II) which mandated that DOD train > civilian emergency personnel at all levels of government and > establish rapid > terrorism response teams. Our idea broadens the scope of the > initiative and suggests a way to give it a stronger, and more > operational, institutional > base.13 > > The Department of Defense would play a strong, supporting role, > not the leading one. It has resources and capabilities in dealing > with biological and > chemical weapons. Its resources would be needed either for crisis > or for consequence management, but only as part of a larger > national effort. > > Why two offices, rather than one? The CTRO centered in the Office > of the Secretary of Defense should concentrate on planning and > preparedness > for preemptive and/or retaliatory strikes, utilizing covert > action or the uniformed armed forces. It should draw additional > staff from and involve a > relatively narrow set of agencies: the Joint Staff, CIA, and FBI. > This is a highly secret, delicate activity now done only in an ad > hoc manner between > CIA and JCS and never with the FBI. But the second office must be > prepared to handle a much broader range of activities that affect > prevention, > containment, and management of the consequences of a catastrophic > attack. The number of agencies involved must also be inclusive. This > consequence management function must draw on the resources of the > National Guard, FEMA, the Department of Health and Human Services, and > other federal, state and local agencies. This is a much larger > orchestra that we think can be well prepared and conducted, if > activated in an > emergency, by an integrated structure like U.S. Atlantic Command. > > Neither of these new offices need be very large. Their jobs are > planning and preparation, not day-to-day intelligence gathering, > law enforcement, or > combat operations. Yet the work they do will be invaluable, > should the crisis ever come. > > > > Acquisition > > A national policy must include a concept for buying what is > needed. The government is already ordering everything from > vaccines to new research, > but nearly two dozen agencies have their own separate shopping > lists and ways of doing business. All these budget requests > eventually arrive in > Congress, where the lack of overall acquisition planning creates > new difficult choices for the affected committees and budget > competition on the > Hill. In November 1997 a conference report accompanying > appropriations for the Department of Justice correctly warned > that "additional emphasis > is needed to coordinate efforts among the many participating > departments and agencies that have personnel, resources, and > expertise to contribute" > to the counterterrorism mission.14 > > We urge the creation of a coordinated, broadly focused, budget > program that will plan, coordinate, and track all R & D and > acquisition projects > intended to improve counterterrorism capabilities, both > conventional and unconventional, defensive and offensive, > domestic and foreign, including > field testing of new operational capabilities. This national > counterterrorism acquisition program would be based on a > government-wide five-year plan > to develop and acquire the needed technology and operational > skills. Examples include improved detectors of special materials > (like radioactive > substances), forensic investigation tools, automated tracking and > analysis systems, and improved protective clothing or equipment. > > The Clinton administration has already started a significant > effort to acquire stockpiles of vaccines, antidotes, and > antibiotics, adding to such a > program already underway for the U.S. armed forces. Resources are > needed for storage, transportation, and shipment of such > medications. There is a > further need for renewed research into defense against biological > weapons, including adaptation to genetic alteration of deadly > pathogens in order to > defy available vaccines or antidotes. Improved detection devices > need to be complemented by specialized laboratories, set up > around the country, > that can rapidly analyze substances or validate field identifications. > > Attorney General Janet Reno warned Congress of the extraordinary > acquisition requirements that would be created by a serious > policy to cope with > the threat of catastrophic terrorism. In April 1998 she explained > that "we may need to develop an approach which will permit the > government to > accelerate the normal procurement procedures to quickly identify > and deploy new technologies and substances needed to thwart > terrorist threats and > respond to terrorist acts. These procedures would be used not > only to purchase medications and other needed tools, but also, in > some instances, to > borrow medications or tools from, or to enter into effective > partnerships with, both academia and industry."15 To us, this > statement is a call for an > interdepartmental acquisition program that draws on Defense > Department expertise. Despite its limitations, the Defense > Department still has the > best track record in the government for successful sponsorship of > technological development and rapid, large-scale procurement. > > This proposed acquisition program would be quite separate from > other, also worthwhile, acquisition programs for cooperative > threat reduction (like > the Nunn-Lugar programs for the former Soviet Union), efforts to > counter narcotics trafficking or organized crime, and > nonproliferation activities; its > focus would be counterterrorism. An effective interdepartmental > committee system is needed for this acquisition program to be successful. > > We suggest a National Counter-Terrorism Acquisition Council that > would be chaired by the undersecretary of defense for acquisition > and technology. > Such an acquisition council should include representatives from > other departments, including top subcabinet officials from > Justice, Energy, Treasury, > State, and Health and Human Services, as well as the deputy > director of FBI, the deputy director of CIA for science and > technology, and the director > of the Federal Emergency Management Agency. > > This acquisition council would need to oversee the field-testing > and evaluation of new capabilities with participation of several > concerned agencies. > Some agencies might worry about Defense usurpation of their > procurement decisions. Instead we think it is just these agencies > that should want a > national program. Defense will already be acquiring vast > quantities of equipment for its own needs. Suppliers will > naturally configure themselves > around this demand. Civilian agencies need a way to be sure that > their particular requirements are also taken into account. > > We suggest that the Defense Department establish an initial > program with more than $100 million to fund the development of > some technology > ideas that would offer benefits across the government. Where > appropriate, the acquisition council would designate lead agency > responsibilities. The > acquisition council can also facilitate easier sharing of > technology, tactics, and material from one agency to another. > Further, this council can provide > a point of contact for international program and technology > sharing with other nations. It can provide government-wide > procedures controlling > access to especially sensitive projects within the national > counterterrorism program. Although the program would be executed > by various > departments, the acquisition council would still be held > responsible for monitoring the progress of each program element > and should be expected to > report annually on progress to both the President and to the Congress.16 > > > > Conclusion > > Our group�s deliberations started from the premise that > catastrophic terrorism poses a first-order threat to our nation�s > future. We then asked, in > effect: if we had a serious national policy to deal with this > threat, what would our government be organized and able to do? In > 1940 and 1941 the > U.S. government imagined what kind of forces it would have in > order to wage a global war. The answers were so far beyond > existing reality that we > can imagine all the wry smiles and shaking heads that must have > been seen in Washington offices as the planning papers made their > rounds. Similar > cycles occurred in the Cold War. For example, the notion of an > intelligence system founded on photographic surveillance from the upper > atmosphere, or outer space, seemed outrageously far-fetched in > 1954, when the U-2 program was born. The films and cameras alone > seemed to be an > overwhelming hurdle. A few years later the U-2s were flying; six > years later satellites were doing the job. Similar stories can be > told about the strange > and remarkable history of intercontinental missile guidance or > about how the U.S. and its allies developed the capability to > move more than a > half-million troops and thousands of armored fighting vehicles > and their supporting infrastructure to the Persian Gulf within a > few months, from > both Europe and North America. > > Our government can deal with new challenges. But first we must > imagine success. Then we must organize ourselves to attain it. > > > > Notes > > 1. For a careful, dispassionate evaluation, see Richard A. > Falkenrath, Robert D. Newman & Bradley Thayer, America�s Achilles > Heel: Nuclear, Biological, > Chemical Terrorism and Covert Attack (Cambridge: MIT Press, > 1998). On the increasingly fragile and interconnected > infrastructure and on the cyber > threat, see also the Report of the President�s Commission on > Critical Infrastructure Protection (also known as the Marsh > Commission, for its > chairman), Critical Foundations: Protecting America�s > Infrastructures, Washington, DC, October 1997. > > 2. The most detailed and credible threat scenarios, based on > close analysis of specific vulnerabilities, should not be > published at all. These would be > indispensable but quite sensitive documents to be prepared by > relatively small groups of knowledgeable officials and expert consultants. > > 3. Address by President Clinton, May 22, 1998; White House Fact > Sheet on PDD-62; all distributed by the White House Press Office. > > 4. Roberto Suro & Dana Priest, "Plan to Overhaul Anti-Terrorism > Strategy Would Boost NSC�s Role," Washington Post, March 24, > 1998, p. A7; see > also M.J. Zuckerman, "Anti-terror �czar� to coordinate $7B > effort," USA Today, May 4, 1998, p. 1A. > > 5. Richard E. Neustadt, Presidential Power and the Modern > Presidents: The Politics of Leadership from Roosevelt to Reagan > (New York: Free Press, 5th ed., > 1990), p. 7. > > 6. James Q. Wilson, Bureaucracy: What Government Agencies Do and > Why They Do It (New York: Basic Books, 1989), pp. 271-72. > > 7. See Maurice Matloff, Strategic Planning for Coalition Warfare, > 1943-1944 (Washington: U.S. Army, 1959); John Ehrman, Grand > Strategy: August > 1943-September 1944 (London: HMSO, 1956); Herman M. Somers, > Presidential Agency: The Office of War Mobilization and > Reconversion (Cambridge: > Harvard University Press, 1950). On the Northern Ireland example, > see Philip Zelikow, "Policing Northern Ireland (A): A Question of > Primacy," > and "Policing Northern Ireland (B): A Question of Balance," > Kennedy School of Government Case Program, Harvard University, 1994. > > 8. Philip Heymann has been especially helpful to us in > understanding the legal capabilities and limits affecting > counterterrorist investigations. For his > survey of the legal and policy dilemmas associated with > countering terrorism, see Philip B. Heymann, Terrorism and > America: A Commonsense Strategy for > a Democratic Society (Cambridge: MIT Press, 1998). > > 9. These motions seek to find whether the police or prosecutors > have any information, not already disclosed, that may tend to > show the innocence of > the defendant. Even if statutes are amended, under our proposal > the arresting agency and prosecutor�s office would remain subject > to such discovery > motions, which the Supreme Court considers an aspect of > constitutionally mandated due process of law. Since the Center > would not itself carry out > law enforcement operations or make prosecutorial decisions, it > should be exempted from such discovery, although any information > it chooses to > provide to police or prosecutors would then be discoverable under > the procedures specified in the current Classified Information > Protection Act. > > 10. For a summary, see Philip Heymann, Matthew Meselson & Richard > Zeckhauser, "Criminalize the Traffic in Terror Weapons," Washington Post, > April 15, 1998, p. A19; a detailed copy of the proposal is > available from Meselson. Development of biological weapons is > distinguishable from the > necessary work to develop defenses against such weapons. > > 11. We are especially indebted to Malcolm Sparrow for his > thinking on this subject, which we have abridged. > > 12. Vaccines may be useful after exposure to anthrax, however, > and smallpox (for different reasons). > > 13. The FBI has also been given funds for training local "first > responders" to an emergency. FBI must be involved in the effort, > but based on training > plans that fully integrate what Defense and other federal > agencies can and are doing. These useful but fragmentary efforts > indicate the case for an > office like the one we suggest. > > 14. Conference Report 105-405 for FY 1998 Appropriations to the > Departments of Commerce, Justice, State, the Judiciary, and > Related Agencies, > November 13, 1997. > > 15. Statement of Attorney General Reno, Hearings of the Senate > Judiciary Subcommittee on Technology, Terrorism and Government Information > and the Select Committee on Intelligence, "The Threat of Chemical > and Biological Weapons," April 22, 1998. > > 16. A useful analogy for such an acquisition program, on a > smaller scale, is the Technical Support Working Group, which > develops counterterrorism > equipment for use by all agencies of the federal government and > for state and local law enforcement, principally with DOD > funding. This program > concentrates on traditional counterterrorism acquisition, as in > robots for municipal bomb disposal squads. One person we talked > to told us: "This > thing works because it is so small that it flies under the radar > of Congress. If you grow it larger, you�re going to need a policy > to go with it." > > > > About the Authors > > The Honorable Ashton B. Carter > > Ash Carter is Ford Foundation Professor of Science and > International Affairs at Harvard University�s John F. Kennedy > School of Government and > Co-Director, with William J. Perry, of the Stanford-Harvard > Preventive Defense Project. > > From 1993-1996 Carter served as Assistant Secretary of Defense > for International Security Policy, where he was responsible for > national security > policy concerning the states of the former Soviet Union > (including their nuclear weapons and other weapons of mass > destruction), arms control, > countering proliferation worldwide, and oversight of the U.S. > nuclear arsenal and missile defense programs; he also chaired > NATO�s High Level > Group. He was twice awarded the Department of Defense > Distinguished Service Medal, the highest award given by the > Pentagon. Carter continues > to serve DOD as an adviser to the Secretary of Defense and as a > member of both DOD�s Defense Policy Board and Defense Science Board, and > DOD�s Threat Reduction Advisory Council. > > Before his government service, Carter was director of the Center > for Science and International Affairs in the Kennedy School of > Government at > Harvard University and chairman of the editorial board of > International Security. Carter received bachelor�s degrees in > physics and in medieval history > from Yale University and a doctorate in theoretical physics from > Oxford University, where he was a Rhodes Scholar. > > In addition to authoring numerous scientific publications and > government studies, Carter was an author and editor of a number > of books, most > recently Preventive Defense: An American Security Strategy for > the 21st Century (with William J. Perry). Carter�s current > research focuses on the Preventive > Defense Project, which designs and promotes security policies > aimed at preventing the emergence of major new threats to the > United States. > > Carter is a Senior Partner of Global Technology Partners, LLC, > and a member of the Advisory Board of MIT Lincoln Laboratories, the Draper > Laboratory Corporation, and the Board of Directors of Mitretek > Systems, Inc. He is a consultant to Goldman Sachs and the MITRE > Corporation on > international affairs and technology matters, a Member of the > Council on Foreign Relations, and a Fellow of the American > Academy of Arts and > Sciences. > > > > The Honorable John M. Deutch > > Dr. John Deutch has served in significant government and academic > posts throughout his career. In May 1995, he was sworn in as Director of > Central Intelligence following a unanimous vote in the Senate, > and he served as DCI until December 1996. In this position, he > was head of the > Intelligence Community (all foreign intelligence agencies of the > United States) and directed the Central Intelligence Agency. From > March 1994 to > May 1995, he served as the Deputy Secretary of Defense. From > March 1993 to March 1994, Dr. Deutch served as Under Secretary of > Defense for > Acquisitions and Technology. From 1977 to 1980, Dr. Deutch served > in a number of positions for the U.S. Department of Energy: Director of > Energy Research, Acting Assistant Secretary for Energy > Technology, and Undersecretary of the Department. > > Dr. Deutch has served on many commissions during several > presidential administrations, and he has received fellowships and > honors from the > American Academy of Arts and Sciences (1978), Alfred P. Sloan > (Research Fellow 1967-69), and John Simon Guggenheim (Memorial Fellow > 1974-1975). Public Service Medals have been awarded him from the > Department of Energy (1980), the Department of State (1980), the > Department > of Defense (1994), the Department of the Army (1995), the > Department of the Navy (1995), the Department of the Air Force > (1995), and the Coast > Guard (1995). He also received the Central Intelligence > Distinguished Intelligence Medal (1996) and the Intelligence > Community Distinguished > Intelligence Medal (1996). > > Dr. Deutch has been a member of the faculty of the Massachusetts > Institute of Technology from 1970 to present, where he has served > as Chairman > of the Department of Chemistry, Dean of Science and Provost. > Currently, Dr. Deutch is an MIT Institute Professor. > > Dr. Deutch earned a BA in history and economics from Amherst > College, and both a BS in chemical engineering and a Ph.D. in > physical chemistry > from MIT. He holds honorary degrees from Amherst College, > University of Lowell and Northeastern University. Dr. Deutch > serves as director for > the following publicly held companies: Ariad Pharmaceutical, > Citicorp, CMS Energy, Cummins, Raytheon, and Schlumberger Ltd. > > > > Philip D. Zelikow > > Philip Zelikow is Director of the Miller Center of Public Affairs > and White Burkett Miller Professor of History at the University > of Virginia. He has > taught at Harvard University, and he served as a career diplomat > in the Department of State and on the staff of the National > Security Council. > > His books include The Kennedy Tapes: Inside the White House > During the Cuban Missile Crisis (with Ernest May, Harvard UP), > Germany Unified and Europe > Transformed: A Study in Statecraft (with Condoleezza Rice, > Harvard UP), and the forthcoming rewritten edition of Essence of > Decision: Explaining the > Cuban Missile Crisis (with Graham Allison, Longman). He has also > written a study of intelligence policy for the Twentieth Century > Fund, published as > In From the Cold. > > A member of the Department of State�s Historical Advisory > Committee, a former consultant to the Office of the Secretary of > Defense, and a > participant in Harvard�s Intelligence and Policy Project, Zelikow > is also the deputy director of the Aspen Strategy Group, a > program of the Aspen > Institute. He holds a doctorate from the Fletcher School and a > law degree from the University of Houston. > > > > About Visions of Governance for the Twenty-First Century > > The Imperative for Change > > Momentous social and economic forces are reshaping democratic > governance around the world. Current political rhetoric insists > that the era of big > government is over�but what will take its place? > > The answer is not at all obvious. While some national governments > are getting smaller, they are not necessarily getting less > powerful. Information > technology, which has allowed industry to do more with less, is > opening up the same opportunities for governments, while bringing > with it new > threats to their traditional roles and functions. The increasing > number and authority of supranational organizations is countered > by trends toward > devolution in the United States and Europe. Non-profit and even > for-profit entities are taking on tasks once thought of as the > sole province of > government. Markets are being created and used to produce public > as well as private goods. > > All of this is taking place amidst a loss of confidence on the > part of citizens with their governments. This unhappiness > transcends partisanship and > economic well-being. It is as if, on some level, the public knows > that its government is simply out of step with the times. > > Dean Joseph Nye believes it is a critical part of the Kennedy > School�s mission to address the precipitous decline in confidence > in public institutions, > by identifying and illuminating some of the most important trends > affecting governments, and by creating a public conversation with > citizens and > policy makers about appropriate responses to changing realities > and expectations of government. This imperative is not an > artifact of the millennium. > In fact, were public trust in government high, change could be > incremental. What is needed now, however, is new ways of thinking about > governance. > > Growing Mistrust in Government > > The first year of the Visions Project focused on generating a > critical mass of intellectual activity among a core group of > Harvard faculty around the > issue of trust in government, which resulted in the publication > in October 1997 of Why People Don�t Trust Government. The book was the > culmination of over a year of inquiry into the scope and > performance of government (actual and perceived) and the possible > causes of citizens� > dissatisfaction with it. > > The Project is continuing this investigation of declining trust > in government with both a study of anomalies in the evidence, > such as high levels of > confidence in the military, and an international comparative > study of public trust in government (Critical Citizens, > forthcoming in the spring of > 1999). > > New Ways of Thinking about Governance > > The Project is focusing its attentions on several new areas of inquiry: > > � New paradigms for national security policy. The > Catastrophic Terrorism Study Group will recommend a comprehensive program > of responses by the U.S. government to the danger of > large-scale, catastrophic terrorism. > > � The future direction of social policy. Is it possible to > bring the productive and innovative power of markets to > traditional questions > of social welfare? "Who�s Responsible? Renegotiating the > Social Contract" will evaluate the central question of alternatives to > traditional government activism in various areas of social policy. > > � How governments can manage and measure their performance > to better serve their citizens. A series of Executive Session > and Practitioner Forums on Performance Management will seek > to engage and invest political decision makers in a management > movement which offers the possibility of a new kind of > democratic accountability. > > � How information technologies are changing the realities > and expectations of governments. The explosive growth of > information as a resource and of computer networks as a > medium is at once evident everywhere and yet very little understood. The > Visions Project has begun a continuing effort to understand > the multiplicitous changes being wrought by information technologies in > order to focus attention on maximizing their benefits and > minimizing their costs to society. > > Visions Project Director Elaine Kamarck will weave these themes > together in a book which will raise significant questions that > are central to > democratic governments. Will a more effective capacity to fight > global crime and global terrorism be compatible with our deeply > held beliefs that we > should protect the privacy of our citizens from internal spying? > Can a system which attempts to meet a variety of social needs > through market > mechanisms and via non-governmental organizations really > guarantee equality of treatment? Can innovative governmental > organizations also be > accountable to elected officials and to the public? > > These are momentous questions, and they illustrate why > large-scale social and governmental change does not happen > overnight. Our challenge is to > find the value in change, and that will require new visions of > governance for the 21st century. > > > > About the Stanford-Harvard Preventive Defense Project > > The Preventive Defense Project is a joint venture between > Stanford University and Harvard University. Preventive Defense is > a concept of defense > strategy for America in the post-Cold War era. The premise of > Preventive Defense is that the absence of an imminent, major, > traditional military > threat to American security presents today�s national security > leaders with an unaccustomed challenge and opportunity: to > prevent new Cold > War-scale threats to U.S. security from emerging in the future. > While the United States defense establishment must continue to > deter regional > conflicts in the Persian Gulf and the Korean Peninsula, as well > as keep the peace and provide humanitarian relief in selected > instances, its highest > priority is to contribute to forestalling developments that could > directly threaten the survival and vital interests of American citizens. > > The Preventive Defense Project will initially concentrate on > forging productive security partnerships with Russia and its > neighbors, dealing with the > lethal legacy of Cold War weapons of mass destruction, engaging > an awakening China, and countering proliferation of weapons of > mass destruction > and catastrophic terrorism. The Project seeks to contribute to > these objectives through the invention of new policy approaches > reflecting Preventive > Defense, intensive personal interaction with defense and military > leaders around the world, and through the establishment of highly > informed, > non-governmental track two initiatives that explore new > possibilities for international agreement. > > Current Preventive Defense Project initiatives include: > > � Describing Preventive Defense. In a forthcoming book, the > Project�s leaders will explain the concept to a wider audience, drawing > on their experience in the Pentagon and making > recommendations for the future of American security policy. > > � Russia. The Project is pursuing a number of activities > designed to support Russian foreign and defense policy leaders in > developing a > post-Soviet security identity that matches Russia�s > interests to the interests of international stability. These > initiatives include assisting > Russian military reform and the development of national > security decision-making processes, furthering NATO-Russia relations, > encouraging the development of mutually beneficial relations > with the other Newly Independent States of the former Soviet Union, and > charting a course for nuclear arms reduction after START II > ratification. > > � Other Newly Independent States (NIS) of the former Soviet > Union. Expanded military-to-military contacts and economic > opportunities are key to the continued security and > stability of the NIS. The Project is pursuing initiatives with > Ukraine, the Central > Asian states, and the Caucasus countries, including the > Caspian Sea region. > > � Eliminating the lethal legacy of the Cold War. Through > such innovations as the Nunn-Lugar program, the United States > intervened to promote nuclear safety and non-proliferation > in the early years after the breakup of the Soviet Union. Much was > accomplished in the first post-Cold War era, but changing > politics in Russia and the United States have caused their cooperation in > controlling "loose nukes" to bog down and progress in > chemical and biological weapons dismantlement to falter. > Nunn-Lugar and arms > control require "reinvention" if they are to continue in the > second post-Cold War era. The Project seeks to contribute fundamental new > ideas to that reinvention. > > � China. Through research and intensive track two dialogue > with Chinese defense and military leaders, the Project will concentrate on > defining the specific content of the U.S. policy of > engagement with China. > > � Countering the proliferation of weapons of mass > destruction (WMD). The glimmers of trouble to come provided by Iraq�s WMD > programs during and since the Gulf War show that > proliferation has moved from a diplomatic problem to a direct > military threat. DOD, > therefore, needs to strengthen its Counter-proliferation > Initiative, which is designed to contribute both to proliferation > prevention and to > the capabilities of U.S. forces to counter WMD in regional > conflict. The Project seeks to define organizational and > technical responses > by DOD to this growing threat. > > � Organizing to combat catastrophic terrorism. The Project > convened the Catastrophic Terrorism Study Group, which is a > collaboration of faculty from Harvard University, the > Massachusetts Institute of Technology, Stanford University, and > the University of > Virginia and is co-chaired by Ashton B. Carter and John M. > Deutch. The Study Group is identifying appropriate responses by the United > States government to the dangers of catastrophic terrorism. > > The Preventive Defense Project is a multi-year effort supported > by the Carnegie Corporation of New York, the John D. and > Catherine T. MacArthur > Foundation, and private sources. The Project�s Co-Directors are > former Secretary of Defense William J. Perry and former Assistant > Secretary of > Defense for International Security Policy Ashton B. Carter. > Former Chairman of the Joint Chiefs of Staff General (ret.) John > M. Shalikashvili and > former Deputy Assistant Secretary of Defense for Russia, Ukraine > and Eurasia Elizabeth Sherwood-Randall serve as Senior Advisors. > Additional > contributors to the Project include: member of President > Clinton�s Foreign Intelligence Advisory Board Robert J. Hermann > and former Deputy > Secretary of Defense John P. White. > > Institute for International Studies > > Stanford University > > The Institute for International Studies (IIS) seeks solutions to > real-world, international problems that affect international > security, the global > environment, and international political economy. IIS creates a > dynamic environment in which to address these critical issues by > bringing experts > from a variety of disciplines within Stanford University together > with long- and short-term visitors from other academic, > government, and corporate > institutions. At any given time, over 150 scholars are engaged in > policy studies within the Institute�s federation of research centers. > > Center for International Security and Cooperation > > Stanford University > > The Center for International Security and Cooperation (CISAC), > part of Stanford University�s Institute for International > Studies, is a multidisciplinary > community dedicated to research and training in the field of > international security. The center brings together scholars, > policymakers, scientists, area > specialists, members of the business community and other experts > to examine a wide range of international security issues. > > Belfer Center for Science and International Affairs > > Harvard University > > The Belfer Center for Science and International Affairs (BCSIA) > is the hub of the John F. Kennedy School of Government�s > research, teaching, and > training in international security affairs, environmental and > resource issues, and science and technology policy. The center�s > mission is to provide > leadership in advancing policy-relevant knowledge about the most > important challenges of international security and other critical > issues where > science, technology, and international affairs intersect. BCSIA�s > leadership begins with the recognition of science and technology > as driving forces > transforming threats and opportunities in international affairs. > The center integrates insights of social scientists, natural > scientists, technologists, and > practitioners with experience in government, diplomacy, the > military, and business to address critical issues. > > Publications of the Preventive Defense Project > > NATO After Madrid: Looking to the Future > > The Content of U.S. Engagement with China > > Fulfilling the Promise: Building an Enduring Security > Partnership Between Ukraine and NATO > > Reforming the Department of Defense: The Revolution in > Business Affairs > > The NATO-Russia Relationship > > Catastrophic Terrorism: Elements of a National Policy > > > > Stanford University > > Center for International Security and Cooperation > > Encina Hall > > Stanford, CA 94305-6165 > > (650) 725-6501 > > > > Harvard University > > Belfer Center for Science and International Affairs > > John F. Kennedy School of Government > > 79 John F. Kennedy Street > > Cambridge, MA 02138 > > (617) 495-1405 > > > >
