Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

download Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

of 46

Transcript of Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    1/46

    _ _ _ - - - - - - . . . . . . . ; t '/t"/tf1~ t?~t? 773

    ~ c : . a/}/1 ,~cflLaw Enforcement Sensitive

    MEMORANDUM FOR THE RECORDEvent: Cofer Black, DOS S/CT programsType of event: BriefingDate: Aug. 14, 2003Special Access Issues: NonePrepared by: Susan GinsburgTeam Number: 5Location: State DepartmentParticipants - Non-Commission:Ambassador Cofer Black, Coordinator for Counterterrorism (S/CT), Dept. of State;Karen Aguilar, Regional Multilateral Designations, S/CTParticipants - Commission:Chris Kojm Depty. Exec. Dir. 202-331-4063M. Elizabeth Swope Leader, Team 5 202-401-1726Susan Ginsburg Counsel, Team 5 202-401-1747Janice Kephart-Roberts Counsel, Team 5 202-401-1705Scott Allan Team 3 202-331-4079Documents/handouts received by the Commission:S/CT Organization PlanDesignating Foreign Terrorist Organizations Under U.S. LawS/CT MissionState Department Basic Authorities Act of 1956TEXT:The State Department is the most important government agency in the "war onterrorism," because it is American diplomacy that enables other agencies - security,military-to go forward effectively. The two most important functions of S/CT areleadership and representation, especially regional geographic representation,development of contacts. There are those who help us and those who don't. S/CT'smission is to build the will and capacity to counter terrorism. Aspiration is for S/CTofficers to be knowledgeable in CT policies, integrate world counterrorism structure thatmakes sense, need to re-prioritize use of time and resources.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    2/46

    Post meeting in the sit room on borders.Observation made that we have "no defended border" between US and Canada, soescalated relations with the Canadians on border topics.

    Document fraud. Not involved in technical aspects - CA and DS.Visa policy. Weigh in with CA, not a primary issue.Watchlist. Live discussions on future of the watchlist process. Today's NSC deputiesmeeting attended by CA AlS Maura Harty backed up by S/CT person. S/CT participates(?) in Senior Steering Group at TIlC, with INR, DS, CA. Foresees integration ofwatchlist at TIIC. Congress said there is not enough commonality, and broadest possibleaccess is key. DHS is really only a customer, so should not run the system. DHS focus isassessing US vulnerabilities, Hoover Dam. Master database does not present a problemfor TIPOFF . Ambassador Black reports to Dep Sec. Armitage.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    3/46

    Designations of foreign terrorists by State and Treasury post 9/11 carried out pursuantto Exec Order 13224. 250 individuals and groups.Prior to 9/11, pursuant to Foreign Terrorist Organization process, 36 foreign terroristorganizations. Emphasized importance of balancing designation with other interests,such as intelligence activity. Object is not to designate, but to use as one tool to "getterrorists. "

    Basic communications mechanism for real time breaking events is 8 AMCounterterrorism Security Group video conference under Fran Townsend at NSC.Helpful that Fran used to be a DOS, he used to be at CIA.

    Anti-Terrorist Assistance program. Training. CT provides policy overlay, rank. orderscountries on basis of need. DS implements.Patterns of Global Terrorism. The definitive anti-terrorism account in the world.Provides a vehicle to advance US perspectives.Border screening. "Unwise to initiate policies that are fishing expeditions, to see whatwe come up with." Policy is open doors, secure borders. Idea is to protect but not hassle."Criteria of who to stop still emerging." Must identify measurables of who we want tostop. By country? Geneder? 3rd country passports because that's what US interested in. Various regional and multilateral counterterrorism efforts:CICTE for OAS, chairmanship EI Salvador, new and has potential, focus oncommunication and training assistance.G-8. more bureaucratic and problematic.OSCE. Passports and biometrics. 55 countries.Country policy coordination and guidelines is from NSC, with broad brush stroke.Policy Coordinating Committee and CSG.Terrorist flr:::Je .. Biggest growth area for S/CT. Training to financial units andlawmakers. Important thing is "taking money away from the right people."

    , .

    S'CF hasgrown from about 20 to nearly 100 people.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    4/46

    70Appropriations for Fiscal Year 1999 (Public, .t;~t ..~rs t ;~ . .Ad"; ; ; i~~t ;~t i~~~r F~ ;~~.M :d~~~~~~~g ; .~~ ~~~~:~~ : : :~ :~ : : : : :~ :~~ : :~~~~~~~~~~~~~~: :~ :(Publie Law 96-449) ..

    ~ .. :

    9191919193 1. State Department Basic Authorities Act of 195

    Public Law 84-885 [So2569], 70 Stat. 890, approved August 1, 195amendedAN ACT To provide certain basic authority for the Department of Sta

    Be it enacted by the Senate and House of RepresentativesUnited States of America in Congress assembled, That this Abe cited as the "State Department Basic Authorities Act ofTITLE I-BASIC AUTHORITIES GENERALLYORGANIZATION OF THE DEPARTMENT OF STATE

    SECTION 1. (a) SECRETARY OF STATE.-* * * * * *()1 COORDINATOR FOR COUNTERTERRORISM.-

    (1) IN GENERAL.-There is within the office of the SecreState a Coordinator. for Counterterrorism (in this paragrapferred to as the 'Coordinator') who. shall be appointed by thedent, by and with the advice and consent of the Senate .. . (2) DUTIES.-

    (A) IN GENERAL-The Coordinator shall perform. suchand exercise such powers as the Secretary of State shascribe.(B) DurIES DESCRIBED.-The principal duty of the Cotor shall be the overall supervision (including policy ovof resources) of international counterterrorism activitiesCoordinator shall be the principal adviser to the SecreState on international countertelTOrism. matters. The Cotor shall be the principal counterterrorism official withsenior management of the Department of State and shport directly to the Secretary of State.(3) RANK AND STATUS .OF AMBASSAOOR.-The Coordinatorhave the rank and status of Ambassador at Large." ..* * * * * * *SEC. 36. DEPARTMENI' OF STA1E REWARDS PROGRAM.

    (a) ESTABLISHMENT.-(1) IN GENERAL-There is established a program for thment of rewards to carry out the purposes of this section.

    ISee. < 0 was added by See. 2801(a) of Public Law 105-277 (112 Stat. 2681-824)222 U.s.C. 2708. Sec 36 WIL8 added by sec. 102 of Public La w 9S-533 (98 Stat.eubsequently ameDded by Public Law 100-690 (102 Stat. (287); by Public La w 103-Stat. 619); by Public La w 104-134 (110 Stat. 1321-45); In 1998, sec. 36 was ameDdelee. 2202 of Public La w 105-277 (112 Stat. 2681-805) and subsequently by sec. 101Law 105-323 (112 Stat. 3029).

    (71)

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    5/46

    :-106 (110 Stat. 494) amended and restated subpara. (A),eign AsaistaDCe Act ot 1961, other than-J t&Dce or meclicine; andr 11 of part I (as enacted by the Freedom tor Russia andJ and Open Markets Support Act ot 1992);".

    ned "oJ person means a person that makesA insection 1604(a).nited States assistance" means-;~stance under the Foreign Assistance Act of2151 et. seq.), other than urgent humani-or medicine;

    to stance under the Arms Export ControlIg ' b~ the Commodity Credit Corporation forf agncultural commodities; andg under the Export-Import Bank Act.

    5. International Security and Development Cooperationof 1985Partial text o r Public Law 99-83 [S o 960], 99 Stat. 190, approved A1985 as amendedANACTTo authorize internationel development and security assistance pand Peace Corps programs for fiscal years 1986 and 1987, and for other pBe it enacted by the Senate and House of RepresentativesUnited States ofAmerica in Congress assembled,SECTION 1. SHORT TITLE AND TABLE OF CONTENTS.(a) SHORT TITLE.-This Act may be cited as the "InternaSecurity and Development Cooperation Act of 1985".

    * * ** *TITLE V-INTERNATIONAL TERRORISM AND FOREIAIRPORT SECURITY 1

    PART A-INTERNATIONAL TERRORISM GENERALLYSEC. 501. SEC. 502. COORDINATION OF ALL UNITED STATES TERRORISM-RED ASSISTANCE TO FOREIGN COUN'1RIES.(a) COORDINATION.~The Secretary 'of State shall be respfor coordinating all assistance related to international tewhich is provided by the United States Government(b) REpORTS.-Not later than February 1 each year, tretary of State, in -consultation with appropriate UnitedGovernment agencies, shall report to the appropriate committhe Congress on the assistance related to international tewhich was provided by .the United States Government duripreceding fiscal year. Such reports may be provided on a clbasis to the extent necessary, and shall specify the amountture of the assistance provided.(c) RULE OF CONSTRUCTlON.-Nothing contained in thisshall be construed to limit or impair the authority or responsof any other Federal agency with respect to law enforcemenmestic security operations, or intelligence activities as defExecutive Order 12333.2

    lSee Sect ion F for the text ot legislation on foreign airport security.2For text, see U.s. Congreas. House. Committee OD Intemational Relations. LegiFo~i81l Relationa Th.,!,Ugh 1996, (Washington, G.P.O., 1997). vol. II, sec. D.(35)

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    6/46

    , ~uthorization Act, Fiscal Years 1992and 1993 ~ ..cLaw 102-188 [H.R. 14 5 tat.October 28 1991 d 647, approved, ,amen y!appropriations for fucal years 1992 and 1993 f th:ment of State, and for other purposes. or e~ Se!Wcteand House of Representatives of theongress assembled,!LE.~~a:9~;. "Foreign Relations Authorization

    * * * * *SCELLANEOUS FOREIGN POLICYPROVISIONS>REIGN POLICY PROVISIONS

    * * * * *mRORIST ASSETS IN THE UNl'IED STA1ESGRESS -~ 90 da .md e~e1Y365 days t h e r J f t . e r~ the date ofsulta~on with the Attorney G e n e ' : J e : : : d t a r y~eDC1es,2 shall submit to th e Committee ap-~ e Co~ttee on Finance of the Senate ~~ A ffa irs 3 and the Committee on Wa~ o r Repre~ntatives a report describing d i:~~ t s .h e l d Inthe United States by terro~tiC?nengaged Inmternational te . 1. ie a detailed list and descri~~~fpuryoses of this section-corunsries", refers to countries des-:i~ ~ tate under section 4O(d) of the~tional terrorism" has the m . .~14O(d) of the Foreign Relatio:A~~ryen'S 1988 and 1989. nza-I RelaUons Autborizat A F';},&truck out "TreasuJn.ndc~e= ~&: Ithe994nd 1995ey General and ap . te '. reof "Treas-4 (109 Stat. prop.na investigatIve llgeDciea,".lep . 186) pro\' lded that retereDOes to the Committee H re&eDtofatiRepveahaD be treated as reterriDg to the Co touse reaentativea IIUD.I -Relations Autbo t A added this a e n t e = ' JOD ct, Fiscal Y.... 1994 and 1995

    (86)

    6. Foreign Relations Authorization Act, Fiscal Yearsand 1989partial text of Public Law 100-204 [H.R. 1777], 101Stat. 1331,approDecember 22, 1987, as amended

    AN ACf To authorize ap'pro'priations for fiscal years 1988 and 1989 for thement of State, the United States Information Agency, the Voice of AmerBoard for International Broadcasting, and for other purposes.Be it enacted the Senate and House of RepresentativesUnited States ofAmerica in Congress assembled,SECl'ION 1.1 SHORT TITLE AND TABLE OFCONTENTS.(a) SHORT TITLE.-This Act may be cited as the "Foreigntions Authorization Act, Fiscal Years 1988 and 1989".

    * * * * * * *TITLE I-THE DEPARTMENT OF STATE

    PART B-DEPARTMENT OF STATE AUTHORITIES AND ACTIVIT

    * * * * * *SEC. 140.1ANNUAL COUNTRY REPORTS ON TERRORISM.(a) REQUIREMENT OF .ANNuAL COUNTRY REPORTS ON TEISM.-The Secretary of State shall transmit to the SpeakerHouse of Representatives and the Committee on Foreign Reof the Senate, by April 303 of each year, a full and completeproviding-. (1) detailed assessments with respect to each foreigntry- (A) in which acts of international terrorism ocwhich were, in the opinion of the Secretary, of majnificance;(B) about which the Congress was notified durinpreceding five years pursuant to section 6(j) of theAdministration Act of 1979; and(C) which the Secretary determines should be thject of such report; 4(2) all relevant information about the activities durinpreceding year of.anyterrorist group, and any umbrellaunder which such terrorist group falls, known to be respofor the kidnapping or death of an American citizen duri122us,o. 2651 note.222 u.s .c. 2656f.8Sec. 122 of the Foreign Relations Authorization Act, Fiscal Years 1990 and 1991 (P101-246; 104 Stat. 27), struck out "March 81" and inserted inlieu thereof -April 30".4 S e c. 578(1) of the Foreign Operations, Export Financing, and Related Programs Ations Act. 1997 (sec. 101(c)of titie Iof the Omnibus Consolidated Appropriations Act. 1lic Law 104-208; 110 Stat. 3009), struck out "'and" at the end of para. (1), struck ouat the end of para. (2) ~d inserted instead a semicolon, and added new paras. (8) and

    (87)

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    7/46

    preceding five years, any terrorist group known toby countries about which Congress was notified duceding year pursuant to section 6(j) of the Exporttion Act of 1979, and any other known internationagroup which the Secretary determines should be tsuch report; 4(3) 4 with respect to each foreign country fromUnited States Government has sought cooperationprevious five years in the investigation or prosecutioof international terrorism against United States cterests, information on-(A) the extent to which the government ocountry is cooperating with the United Statesin apprehending, convicting, and punishing thor individuals responsible fo r the act; and(B) the extent to which the government ocountry is cooperating in preventing further aism against United States citizens in the foreand .(4)4 with respect to each foreign country fromUnited States Government has sought cooperationprevious five years in the prevention of an act ofterrorism against such citizens or interests, the infscr ibed in paragraph (3XB).(b) PROVISIONS To BE INCLUDED IN REPORT.-The

    QUired under subsection (a) should to the extent feas(but not be limited to)-(1)with respect to subsection (aXl}-(A) a review of major counterterrorism etaken by countries whiCh are the subject of suceluding, as appropriate, steps taken in Interna(B) the response of the judicial system ofwhich is the subject of such report with respecrelating to terrorism affecting American citizeties, or which have, in the opinion of the Secrnificant impact on United States counterterroriincluding responses to extradition requests; an(C) ~cant sup~rt, if any, for internatioism by each country which is the subject of suceluding (but not limited to}-(i) p

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    8/46

    S/CT Mission

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    9/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    10/46

    O r g a n i z a t i o n P l a nCoordinatorfor Counterterrorism

    Amb. Cofer Black

    Personal AssistantLibby Braun

    Principal DeputyCoordinatorWilliam Pope

    Personal AssistantSandy Phelps

    Special AssistantJames NeelStaff Assistant

    Kathleen H.-Floyd

    RegionalMultilateralDesignationsK. Aguilar

    See Page 2 I

    Program~Legislation, PDK. Wycoff

    See Page 3 ,

    HomelandSecurity Unit Mitch Optican Rob Dolce

    .AdministrationR.Gain

    Operations(Amb. J. Dinger)

    I See Page 4I- AssistantS.BellBudgetPlanner

    BudgetImplementerConferences

    1Liaison Officers

    II

    1

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    11/46

    O r g a n i 1 A t i o n P l a nDeputy CoordinatorRegional and Multilateral.Affairs and DesignationsKaren Aguilar

    OMSM. JablonskyOMSPat Chambers

    Office DirectorBrent Hartley

    Multilateral G-8 Chris Ensley Sally Schlegel

    Regionals

    EAP WHAErik Rye -Tom Cooney-Paul Fujimura -Everett Kaplan-Karen Chandler Adam Frankel

    EUR SA- Mark Wildermuth- (Marc Norman) Ruth Parent- (John Sullivan) Stephanie Molnar

    AF NEA-Lee MacTaggart Mark Shaheen-FS to be Advertised - Miller GS Position-Katy Gore

    IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII, I. III

    DesignationsIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIL --------

    S. Fox ~ ~ T. Navratil

    Exec Order I--- FTO- Ms. Sarraf M.JacksFTO

    -GS I--~ - T. Bacon-to be advertised Gonza

    FTO~ Rob Goods

    2

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    12/46

    S I C T O r g a n i z a t i o n P l a nAssociate Coordinator

    Programs, Legislation andPublic Diplomacy

    Karl Wycoff

    Capacity Building

    Wisniewski

    Senior PolicyWorkShops-G. Stinson-H. Medeiros

    OMSReceptionistVacant

    ----------------------

    3

    OMSJ. Redfern

    Office Director(and R&DrrSWG)Mike Jakub

    Legislative- M i ke K ra ft

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    13/46

    S/CT OperationsNavy Hill AnnexAssociate Coordinator

    Operations(Amb. John Dinger)

    OMSDeborah Watson

    TOPOFFVacant' - - - - - - - - 1 1 R . ~ : ~ ~ .. . . 1Director of Director Crisis :Plans/Policy Res onse :

    I,,,-Mark Thompson-James Webster

    Office DirectorTom Hastings

    I I

    rI,I '

    CommoSupport FEST-Mike Cifarelli-Tom McCueDoug Rhodes

    (IRM)

    -Tim WalshI IReserve AugmentationPart-Time and Full-TimeDODReservists

    Sensitive Supporti iI I

    4

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    14/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    15/46

    DESIGNATING FOREIGN TERRORIST ORGANIZATIONS UNDERU.S. LAW

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    16/46

    * Sec. 219 of the Immigration and Nationality Act, which was amended by the Antiterrorism and Effective DeathPenalty Act of 1996, defines terrorist activity to mean: any activjty which is unlawful under the laws of the placewhere it is committed (or which, if committed in the United States, would be unlawful under the laws of the UnitedStates or any State) and which involves any of the following:(I) The highjacking or sabotage of any conveyance (including an aircraft, vessel, or vehicle).(II) The seizing or detaining, and threatening to kill, injure, or continue to detain, another individual in order tocompel a third person (including a governmental organization) to do or abstain from doing any act as an explicit orimplicit condition for the release of the individual seized or detained. .(III) A violent attack upon an internationally protected person (as defined in section 1116(b)(4) of title 18, UnitedStates Code) or upon the liberty of such a person.(IV) An assassination.(V) The use of any-(a) biological agent, chemical agent, or nuclear weapon or device, or(b) explosive or firearm (other than for mere personal monetary gain), with intent to endanger, directly or indirectly,the safety of one or more individuals or to cause substantial damage to property.(VI) A threat, attempt, or conspiracy to do any of the foregoing.(iii) The term "engage in terrorist activity" means to commit, in an individual capacity or as a member of anorganization, an act of terrorist activity or an act which the actor knows, or reasonably should know, affords materialsupport to any individual, organization, or government in conducting a terrorist activity at any time, including any ofthe following acts:(I) The preparation or planning of a terrorist activity.(II) The gathering of information on potential targets for terrorist activity.(III) The providing of any type of material support, including a safe house, transportation, communications, funds,false documentation or identification, weapons, explosives, or training, to any individual the actor knows or hasreason to believe has committed or plans to commit a terrorist activity.(IV) The soliciting of funds or other things of value for terrorist activity or for any terrorist organization.(V) The solicitation of any individual for membership in a terrorist organization, terrorist government, or to engage ina terrorist activity. .

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    17/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    18/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    19/46

    T he effort to d eter terrorism , an d particularly p reven t terrorist attacks on A merican soil, req uiresw orkin g w ith our global frien ds an d allies to establish m ean s to preven t the un restricted m ovem en tof persons involved in terrorist activities. The Terrorist Interdiction Program (TIP) significantlycon tributes to this cause by servin g to bolster the border security of coun tries at a high-risk oft er ro rist t ra n sit . T er ro rist s t ak e a dv an t ag e of nations with little or n o effective capability toidentify or track their passage, or otherwise restrict their freedom of movement. TIP is designed tocoun ter th is threat by servin g as a foun dation for in creased coun terterrorism cooperation an dp rovid in g t he m ean s for p art icip at in g n at io ns t o d isru pt t erro rist act ivit ie s.

    T e rror is t I n te rd ic tio n P ro gram Desc rip tio n

    TIP provides selected countries with a computerized system that allows border control officials toquickly identify suspect persons attempting to enter or leave the country through air, land and seaports of entry. TIP also provides selected countries with the means to collect, compare andanalyze traveler information and contribute to the global effort to understand terrorist methods andtrack their m ovem en ts. B y assistin g coun tries to better con trol their borders T IP en han ces thesecurity of A merican s both at hom e an d abroad.T IP is a joint p rogram that in stalls an d m ain tain s the P erson al Id en tification S ecu re C om parisonan d E valuation System (PISC ES) at selected poin ts of en try in a participatin g coun try. PISC ESprovides a high-speed secure connection from the participating country's central data base ofsuspect persons to air, land and sea points of entry where the system is installed. PISCES enablesbord er officials to q uickly in pu t traveler in fon n ation con tain ed in passports or other officialdocum en ts to the database an d obtain n early in stan tan eous feedback on the traveler's status withrespect to the government's listing of terror suspects. In addition to installing PISCES equipmentat points of entry, and government headquarters facilities of the nation's choosing, TIP providescom prehen sive train in g in PISC ES operation an d m ain ten an ce, as w ell as assistan ce withoptim izin g its em ploym en t in th e coun try's border con trol an d im migration program .There are presen tly 60 coun tries iden tified through a U SG in teragen cy process as poten tialrecipients of TIP. These countries were selected based on known terrorist activity or terroristtran sit , a n eed for the capability that PISC ES provides, an d the political w ill to participate w ith theUn ited States in this program . W hile the in itial in stallation of PISCES m ay on ly be at thep art icip atin g n at io n's in te rn at ion al airp ort (s), it is a g oal of TIP to in stall the system at allsign ifican t air, lan d an d sea poin ts of en try.In FY 2005, the D epartm en t plan s to con duct approxim ately 15 phased in stallation s of PISCES incoun tries on the in teragen cy tier list for T IP. Som e of these in stallation s m ay represen t the in itialin crem en t of TIP in a particular coun try, while others would in volve expan sion of the n um ber ofsites where PISCES is operatin g in a coun try. The size, com plexity an d scope of thesein stallation s w ill vary accord in g to the u niqu e requ irem en ts an d d esires of the p articipatin g n ation ,as w ell existin g priorities in respon se to the chan gin g n ature of the t erro rist t hre at . T he go alrem ain s to in stall TIP as quickly an d com prehen sively as resources an d circum stan ces perm it.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    20/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    21/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    22/46

    Policy:Within S/CT, DOS and CTCWithin the InteragencyWith MissionsAmong Host Nation Agencies

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    23/46

    1d~nti f iea ' :E)cf i ' t~~t i ( ,n()ot~~" 'D'o 'r ihCollected Country Watchlist DataCollected Country Traveler Data

    Improve Immigration ControlsBuilding Effective Watch listingTighter immigration screening in more locations

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    24/46

    Deployrri~~~tst~p~kistan,Afgh~hi~t~~,Yemenand NepalSurveys in 17countriesAcceptance by 18countriesRevised PISCES "baseline" software

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    25/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    26/46

    ,,__ ' ...,:", . ,,.:,.,:, ".,-;, . __. ,1_"" ,, ," '::_ :"-:" " -:-,,:;:

    . R e g i o n a l ' C ~ l 1 t e " " ' ( ' < " " " : " " ' "Develop and deploy new "standard" PISCESsystemImprove data flow from the field

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    27/46

    FY202(SU PP}+ .. . .. .. .$10FY 2003 $5.0M $9.0MFY 2004 (Req) $11.0M

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    28/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    29/46

    Kazakhstan

    : , : : ,~~.na l11a'Colombia:MauritaniaNigeriaSenegalEgypt

    Saudi ArabiaRussia

    Czech RepublicBulgariaRomania

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    30/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    31/46

    . . ' ': " , < : ' ' i , ' : , 'Intelligence collectedDeterrent Value

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    32/46

    . . .S e" ..es . . . i ' i~~'~~"< )' ........................0 g ~ i : l < . . i . ' < , c : . , : : . . . . .. .-....::

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    33/46

    Terrorist Interdiction Program DescriptionThe effort to deter terrorism, and particularly prevent terrorist attacks on American soil, requires :working with our global friends and allies to establish means to prevent the unrestricted movementof persons involved in terrorist activities. The Terrorist Interdiction Program (TIP) significantlycontributes to this cause by serving to bolster the border security of countries at a high-risk ofterrorist transit. Terrorists take advantage of nations with little or no effective capability toidentify or track their passage, or otherwise restrict their freedom of movement. TIP is designed tocounter this threat by serving as a foundation for increased counterterrorism cooperation andproviding the means for participating nations to disrupt terrorist activities.TIP provides selected countries with a computerized system that allows border control officials toquickly identify suspect persons attempting to enter or leave the country through air, land and seaports of entry. TIP also provides selected countries with the means to collect, compare andanalyze traveler information and contribute to the global effort to understand terrorist methods andtrack their movements. By assisting countries to better control their borders TIP enhances thesecurity of Americans both at home and abroad.TIP is a joint program that installs and maintains the Personal Identification Secure Comparisonand Evaluation System (PISCES) at selected points of entry in a participating country. PISCESprovides a high-speed secure connection from the participating country's central data base ofsuspect persons to air, land and sea points of entry where the system is installed. PISCES enablesborder officials to quickly input traveler information contained in passports or other officialdocuments to the database and obtain nearly instantaneous feedback on the traveler's status withrespect to the government's listing of terror suspects. Inaddition to installing PISCES equipmentat points of entry, and government headquarters facilities of the nation's choosing, TIP providescomprehensive training in PISCES operation and maintenance, as well as assistance withoptimizing its employment in the country's border control and immigration program.There are presently 60 countries identified through a USG interagency process as potentialrecipients of TIP. These countries were selected based on known terrorist activity or terroristtransit, a need for the capability that PISCES provides, and the political will to participate with theUnited States in this program. While the initial installation of PISCES may only be at theparticipating nation's international airport(s), it is a goal of TIP to install the system at allsignificant air, land and sea points of entry.InFY 2005, the Department plans to conduct approximately 15 phased installations of PISCES incountries on the interagency tier list for TIP. Some of these installations may represent the initialincrement of TIP in a particular country, while others would involve expansion of the number ofsites where PISCES is operating in a country. The size, complexity and scope of theseinstallations will vary according to the unique requirements and desires of the participating nation,as well existing priorities in response to the changing nature of the terrorist threat. The goalremains to install TIP as quickly and comprehensively as resources and circumstances permit.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    34/46

    THE TERRORIST INTERDICTION PROGRAMNADR Account

    BackgroundThe Terrorist Interdiction Program (TIP) is the Coordinator for Counterterrorism's

    (S/CT) response to the increasing ability of terrorists to cross international boundaries tostage terrorist attacks and escape undetected. TIP limits terrorists' capabilities to movefreely amongst countries by assisting host countries in securing their borders. Theprogram has three parts:

    Installing the Personal Identification Secure Comparison and EvaluationSystem (PISCES); Training immigration and customs officials to use PISCES; and

    Development, sustainment and management of the system.PISCES is a database that provides border control officials with information that

    allows them to identify and detain or track individuals of interest. The system provides ahigh-speed, secure connection from a country's centralized data bank of suspects, locatedin the country's intelligence bureau, to points of entry where PISCES is installed. Thisallows border control officials to check passports quickly and accurately for the purposeof identifying terrorist suspects. Officials can also use PISCES to quickly retrieveinformation on persons who may be trying to hastily depart the country after a terroristincident. Furthermore, TIP will train these border control officials to use PISCES tocollect, compare and analyze data that can be utilized to arrest and investigate suspects.

    S/CT selects countries to participate based on the countries' volume of travel anduse as a transit point, available intelligence information, and political will to cooperate.S/CT plans to add five countries per year over the next six years. This will require asignificant increase in funding given the need to increase the number of installations percountry (approximately $800k per "node"). Addressing multiple transit points within acountry is essential to ensure TIP's maximum effectiveness, especially in countries athigher risk for transit of suspected individuals. Additionally, the program's successrequires appropriate funding for the sustainment, system development and regionalprogram management for the long-term. .

    Since September 11 and the addition of the Frontline States, we now haveidentified 57 countries as potential recipients of TIP. Our initial baseline goal was toinstall TIP in one to two airports in up to five countries annually -- a schedule that wouldtake at least 12 years to complete at the current annual funding level. Supplemental isthus needed to ramp up installation of PISCES in multiple points of entry in a range ofnew countries as well as augment the number of nodes for some countries already in theTIP program.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    35/46

    FY 2002The President's budget requested $4 million in FY 2002 for the TIP. Of this,approximately $640,000 will be used to complete installation of PISCES in South Africaand train border control officials to use PISCES. The remaining funding will be used toconduct site assessments, install the TIP, and train host country border control officials inthe next priority countries. Prior to the terrorist attacks on 11 September 2001, we

    Use of Funding

    FY 2000The Secretary allocated $1.25 million in FY 2000 for the TIP. S/CT, inconjunction with the interagency counterterrorism community, selected Pakistan for theTIP pilot project. Approximately $1 million was used to develop the PISCES softwarefor Pakistan. The remaining $250,000 was provided to INTERPOL to upgrade theINTERPOL NCB in Islamabad, Pakistan.

    FY 2001The Secretary allocated $4 million in FY 2001 for the TIP. The Department willuse approximately $1.5 million to install PISCES in the Karachi, Pakistan InternationalAirport with associated links to key government ministries and agencies. Morespecifically, the funding will be used to install the infrastructure necessary to supportPISCES and establish connectivity between arrival and departure lounges in the KarachiInternational Airport, the Federal Investigative Agency (FIA) in Karachi and Islamabad,the Intelligence Bureau (IB) in Karachi and Islamabad, the National Database andRegistration Authority (NADRA) in Islamabad, and the Islamabad International Airport.This funding will also purchase the hardware and software necessary for installation andtrain border control officials to use PISCES.

    The Department will use the remaining $2.5 million for programs in the UnitedArab Emirates (UAB), Yemen, Kenya, and South Africa. Approximately $2,355,000 willbe used for site assessments, contractor support, the purchase of hardware and software,training for border control officials, and the installation of PISCES in the UAE, Yemen,and Kenya (approximately $785,000 for each country). The Department also plans to useup to $145,000 for site assessments and contractor support in South Africa.

    In addition, TIP supported the upgrade of INTERPOL's communications systemto transmit fingerprints, photos, and other graphics on a near-real time basis to and from aparticipating country's INTERPOL National Central Bureau (NCB) to other points on theINTERPOL network. Information from the NCB can then be entered into PISCESdatabases. This support will continue as required by the region.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    36/46

    FY 2002 Supplem enta@f?_~!:! '~~1.. l~~~~_5!f~~~-T!-e .Y ' !-~~-~!ti~~-!~f?~!!~~~_f~! _ ~ ~ - - _ _ - {_ D _ e _ l e _ t e _ d _ : ' :: .- -- -- --TIP program and the increase in per-country requirements (more nodes per country plussustainment) leaves a sizeable funding shortfall to meet the President's war on terrorism.Supplemental funding of $18 million is requested to meet near-term programrequirements. The current funding plan (illustrated below) applies the FY 2002 annualand ERF supplemental funding to help fulfill these requirements, and reflects the need forFY 2002 emergency supplemental funding:

    planned to install TIP in Nigeria, the Philippines, Thailand, Bosnia, and Turkey. As aresult of those attacks, the order of priority countries is shifting. FY 2002 program fundswill be targeted towards countries identified as priorities based on more recentassessments of intelligence, strategic importance to the global counterterrorism campaign,and political will.

    FY 2002 ERF SupplementalBeyond the planned FY 2002 program, $4 million in supplemental funds will beused to accelerate and broaden implementation of TlP assets in priority countries. Thebenefits of TlP _ giving states improved capability to interdict and prevent the transit ofterrorist suspects - is a critical component of the global effort to fight terrorism.

    Supplemental funds will enable the Department to provide TlP to countries thathave moved up on the priority list. Greece, for example, is a higher priority country dueto the 2004 Olympics and its requirement for a strong border security system. Funds willalso be needed to meet unforeseen requirements, such as a program in Indonesia, whichthe President offered to President Megawati Sukarnoputri in September 2001.

    Afghanistan $2.5MPakistan $3.25MIndia $3.25MYemen $1.5MMexico $2.5MGreece $1.5MKenya $1.5MIndonesia $1.5Mphilippines $1.5MS. Africa $1.5MTanzania $1.5MJordan $1.5MUAB $.5MMalaysia $1.5MSinga~ore ~l.5MTotal $27M

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    37/46

    We believe investment in TIP provides a significant diplomatic engagement toolas well as a tactical intelligence measure that will help tighten the noose at key terroristtransit points world-wide. By assisting countries in securing their borders, TIP enhancesthe security of Americans who live and travel abroad. The program acts as both an entre'for USG diplomatic engagement with an host nation and acts as a clear indicator of itswillingness to support the global campaign against terrorism.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    38/46

    PISCESP erson al Id entification S ecu re Comparison an d

    Evalu a tion System

    _~ _ ~_ ._ ._ '_0 ._~ __ .__ -_ - - - -- --- - - - - - - - .- - - - . - . - -

    The Personal Identification Secure Comparison and Evaluation System(PISCES) assists host countries in the global effort to combat terrorism andcrime. Itcollects, compares and analyzes data gathered from travelers,allowing border control officials to quickly and easily identify suspect. individuals.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    39/46

    IntroductionAs the tragic events of September 11 remind us, terrorism is a global threat with globalreach: although the attack occurred on American soil, citizens of more than 80 countrieswere killed in the strike. The proper use of intelligence is the only way to stay one stepahead of terrorist networks, disrupt their operations and protect innocent people aroundthe world from their malicious intentions. But information, although abundant, is uselessuntil it can be interpreted, managed and shared.

    The Personal Identification Secure Comparison and Evaluation System (PISCES) isa sophisticated border management tool and powerful high-tech weapon designed to helpfight the global war against terrorism. PISCES provides host countries with the means todetect, prevent and deter global terrorist activities by collecting, comparing and analyzingtraveler information at strategic transit points around the world. Itis efficient and reliable,with low deployment and maintenance costs.

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    40/46

    System Hardware and SoftwarePISCES is a client-server system. This allows PISCES to operate in a stand-alone, LANor WAN configuration. Included with the PISCES system are the necessary anti-viral andbackup software and Microsoft Office suite, inc1uding the Word,.PowerPoint, Excel andAccess programs .

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    41/46

    Planning for and Installing PISCES

    PISCES uses the Dell 6400 or 4400 servers and Dell 4100 clients. The operating systemis Windows 2000 and the database management system is Oracle. A web browserinterface allows quick access to foreign languages without changing the application code.Itfeatures the JAVA control programming language and compliance with the OpenDatabase Connectivity Query Standard. The browser controls and supports rapidresponse for database functions, peripheral devices, and system administration. Thesystem also features numerous peripherals to boost its effectives (see box below). All ofthese peripherals are modular and insulated from the application software by easilyaltered interface routines. That means if a new peripheral is needed, a different brand ispurchased Of a new and improved version is released, the impact of such a change orupgrade is virtually unnoticed by the user.

    Network, software and facilities engineersperform a detailed site survey to determine thespecific installation needs at each location wherePISCES will be installed. Following thecompletion of a detailed questionnaire thatexamines the status andlor availability ofelectrical power, networking requirements, thesystem environment and other similar issues, theteam creates a floor plan and power schematicsto accommodate PISCES. The survey teamtypically includes a staff member who isprepared to discuss the PISCES project in detail.A 12-minute video, available inEnglish andArabic, further demonstrates the capabilities ofthe PISCES system. Before they depart the

    team will prepare a list of any additional actions that are necessary to complete thei ns t al la ti on o f the system. This is called the After Action Report.

    Step 1: The Site Survey

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    42/46

    Step 2: Planning, Ordering and DeliveryBased on the After Action Report the PISCES team will prepare a project plan, systemdesign, equipment inventories and installation and training plans. They will order all ofthe necessary equipment and will configure it for installation, loading the COTS andPISCES software. The team tests each PISCES system before it is installed to ensure thatit is operating as required. Following the successful completion of this simulation, thecomputers will be packed for shipping.

    Step 3: PISCES InstallationWhen the final installation site is ready, a PISCES team willarrive to install the system and conduct a training. User'smanuals and training materials will be provided-in the locallanguage if necessary- to all personnel who will be using thesystem, such as customs and immigration officials, borderguards, analysts and system administrators.Future enhancementsAs technology becomes more sophisticated, so too do thepractices of criminals and terrorist networks in their quest toevade detection. PISCES strives to stay one step ahead andhas planned several critical upgrades for future versions ofthe system. Biometrics, for example, is a rapidly advancingand exciting new technology that will further enhance theeffectiveness of the PISCES system. Below is a list of someof what's to come:

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    43/46

    Global Programs

    TERRORIST INTERDICTION PROGRAM($ in thousands)

    Account ""~ADR'

    TIP Program Background:As Sept. 11 made painfully clear, the United States has a major interest in

    preventing terrorists from crossing international borders to attack innocent civilianpopulations or to disrupt the internal stability of friendly countries. The TerroristInterdiction Program (TIP) is designed to help prevent or disrupt t h e travel of terroristsacross international borders into high-risk countries that have little or no means ofquickly identifying such persons. TIP complements existing anti-terrorism trainingprograms by providing border control systems, incorporating computerized databaseprograms and rapidly transmitting information to interdict potential terrorists and theirweapons trying to cross international borders. In doing so, TIP bolsters the security ofAmericans at home and abroad.

    Specifically, the TIP program helps recipient nations improve border security byproviding computer hardware, database software, peripheral devices- such a s passportscanners and finzernrint readers-training, and operational support that enables officials

    I n .s increase in the baselinecapacity will allow the USG to meet current, emergency, and anticipated needs within thebudget.The Need for Global Capacity-Building:

    Since the beginning of the war on terrorism, the President and other topAdministration and Cong r es s io n al o ff ic ia ls h av e emphasized the g lo b al n at u r e of theterrorist threat and the need for a cooperative global attack to defeat it. This war extends

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    44/46

    Global Programs

    beyond the battlefield in Afghanistan to every country where terrorist cells currentlyoperate or have the potential to operate because of weak internal defenses.Because the tactics of terrorist movements today are highly unconventional, the

    United States cannot win this war by conventional military means alone. The efforts ofOur armed forces must be complemented by effective, robust capacity-building programsoverseas, which are aimed at bolstering the capabilities of U.S. allies to fight and mitigateterrorist activities. TIP does this by providing the necessary training, equipment, andtechnologies to host nation security and immigration officials. These are the forces thatwill be fighting international terrorism on a daily basis, protecting U.S. assets andinterests overseas and preventing terrorists from ever reaching American soil in the firstplace.TIP is also a significant diplomatic engagement tool. The program acts as both anentre for USG diplomatic engagement with a host nation and acts as a clear indicator ofits willingness to support the global campaign against terrorism.

    TIP Program Scope:TIP makes it harder for terrorists to enter vulnerable countries undetected byestablishing a multiple-layered barrier program comprised of three elements: bordermonitoring, using lookout systems and passport scrutiny; updated intelligence andsecurity databases and communications systems; and development of appropriateequipment to detect weapons. The program focuses on vulnerable countries that are keytransportation hubs, havens or otherwise important international crossroads identitied byintelligence analysis and interagency assessment teams. As demonstrated by the attacksof Sept. 11, the Cole attack, the Embassy bombings in East Africa in 1998, and othersimilar and deadly attacks, intercepting terrorists before they can move into position is

    key to preventing terrorist activities and saving lives.Following Sept. 11 the Three-Tiered Interagency Priority list of strategiccountries increased' from 34 to 60 countries, including all Frontline states; thirteen ofthese have known terrorist nodes and are key transit points. Not only has the list ofpotential recipient countries increased significantly, but the country program resourcerequirements have as well. As noted above, the introduction of the pilot program inI I h a s demonstrated the requirement for widespread installation of the systemthroughout all of a country's entry and exit points as well as the necessity for a! comprehensive program to ensure the proper management, training, and functioning ofthe system.Installing TIP in multiple points of entry within a single country increases itseffectiveness in identifying terrorists as they transit that country's borders. Moreover,building a network of TIP countries exponentially increases the program's effectivenessby tightening the noose around free movement of terrorist suspects between countries .Bu t it als o in creas es the co st o f the p ro gram .

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    45/46

  • 8/14/2019 Mfr Nara- t5- Dos- Black Cofer- 8-14-03- 00270

    46/46

    . ,