TOP-SECRET FROM THE NSA-U.S. ESPIONAGE AND INTELLIGENCE

U.S. ESPIONAGE AND INTELLIGENCE
Aerial reconnaissance photograph of Severodvinsk Shipyard, the largest construction facility in the Soviet Union, taken by a KH4-B spy satellite on February 10, 1969.
Organization, Operations, and Management, 1947-1996

In the aftermath of World War II, with the Cold War looming on the horizon, the United States began the process of developing an elaborate peacetime intelligence structure that would extend across a number of government departments. The operations of the U.S. intelligence community during the Cold War would range from running single agents, to marshaling the talents of thousands to build and deploy elaborate spy satellites.

The end of the Cold War brought major changes, but not the end of the U.S. government’s requirement for an elaborate intelligence structure. A number of intelligence organizations have been consolidated or altogether eliminated. New organizations have been established to provide more coherent management of activities ranging from military espionage, to imagery collection, to the procurement of airborne intelligence systems. The end of the Cold War has brought about the declassification of much information about intelligence organization and espionage activities that took place prior to the collapse of the Soviet Union.

Focus of the Collection

CIA Headquarters, Langley, VirginiaU.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 publishes together for the first time recent unclassified and newly declassified documents pertaining to the organizational structure, operations, and management of the U.S. intelligence community over the last fifty years, cross-indexed for maximum accessibility. This set reproduces on microfiche 1,174 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, representing over 36,102 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council and other organizations. U.S. Espionage and Intelligence presents a unique look into the internal workings of America’s intelligence community. The documents gathered here shed further light on U.S. intelligence organization and activities during the Cold War, and describe the consolidation and reevaluation of the intelligence community in the post-Cold War era. They are drawn from diverse sources, including the National Archives, manuscript collections in the Library of Congress, court files of major espionage prosecutions, presidential libraries, and most importantly, Freedom of Information Act requests. The result of this effort is an authoritative documents publication which, together with the National Security Archive’s previous collection on the structure and operations of the U.S. intelligence community,

U.S. Espionage and Intelligence provides a wealth of information and documentation on key aspects of intelligence organization and operations during and after the Cold War, including such extraordinary topics as:

  • the evolution of the CIA
  • the development and operation of key reconnaissance systems (SR-71, CORONA)
  • the consolidation of Defense Department intelligence
  • intelligence performance during the Persian Gulf War
  • damage assessments of Aldrich Ames’ espionage activities

Significance of the Collection

The U.S. intelligence community has played a key role in advising presidents from Harry Truman to Bill Clinton on the intentions and activities of the Soviet Union, as well as of other nations. It also came to absorb a significant portion of the federal budget, reaching an approximate high of $30 billion in the late 1980s.

U.S. Espionage and Intelligence allows scholars direct access to the newly declassified, detailed primary documents that contain the history of the military, diplomatic, and intelligence components of the Cold War, and which go far beyond what is available in secondary sources. This new information is essential for reaching an accurate understanding of what was happening behind the scenes and how it related to the more public aspects of Cold War policy and operations.

The material contained in this set concerning the post-Cold War era is crucial in assessing the intelligence community’s performance in critical areas such as the Persian Gulf War and the Aldrich Ames case. The material is also vital in understanding the evolution of the intelligence community since the end of the Cold War and its possible future–for that evolution may significantly influence the ability of the intelligence community to deal with critical threats such as proliferation of weapons of mass destruction and terrorism.

One-Stop Access to Critical Documents

It would take a monumental effort, as well as many thousands of dollars, to duplicate the information contained in this collection. U.S. Espionage and Intelligenceallows a researcher– whether interested in the CIA, military intelligence, intelligence performance in the Persian Gulf War, or post-Cold War intelligence reform–to use one source at one location to access the thousands of pages of declassified material on the U.S. intelligence community available in this set.

Through U.S. Espionage and Intelligence the researcher gains access to a wide variety of documents: internal histories of the CIA and a variety of military intelligence organizations; program histories of the SR-71 and CORONA; director of central intelligence and Department of Defense directives establishing organizations such as the National Reconnaissance Office and the National Imagery and Mapping Agency; plans for the consolidation and reform of Defense intelligence organizations after the Cold War and memoranda implementing the reforms; and assessments of intelligence community performance in a number of areas.

In-depth Indexing Makes Every Document Accessible

The National Security Archive prepares extensive printed finding aids for its collections. In- depth indexing offers users remarkable ease and precision of access to every document in the set. The printed Index provides document-level access to subjects, individuals, and organizations, and represents a major research contribution in itself. Important transactions within each document are indexed individually using a controlled subjects vocabulary.

The Guide includes an essay, events chronology, glossaries of key individuals, organizations, and terms, document catalog, and a bibliography of secondary sources.

Research Vistas

With its depth of documentary detail, the collection enables researchers to explore

  • U.S. intelligence performance
  • Cold War history
  • evolution of the U.S. intelligence community and its components
  • U.S. intelligence collection activities

The Collection is a Necessity For:

  • Scholars and students of
    • intelligence
    • national security organization and operations
    • Cold War history
  • Journalists
  • Librarians and bibliographers
  • Concerned citizens

Sample Document Titles

01/15/62 Legal Basis for Cold-War Activities, Lawrence Houston, [Classification Excised] Memorandum

03/27/64 Directive 5105.23, National Reconnaissance Office, Department of Defense, Top Secret Directive 05/23/67 Report on Plots to Assassinate Fidel Castro, Central Intelligence Agency, Secret Memorandum

07/00/73 Allen Welsh Dulles as Director of Central Intelligence, 26 February 1953-29 November 1961, Central Intelligence Agency, Top Secret Biographic Sketch

00/00/82 History of the Navy HUMINT Program, United States Navy, Top Secret History

03/15/91 Plan for Restructuring Defense Intelligence, Assistant Secretary of Defense for Command, Control, and Communication Intelligence, Secret Report

01/06/92 Task Force Report on Greater CIA Openness, Director of Central Intelligence, [Classification Excised] Memorandum

06/01/92 DCID 2/9, Management of National Imagery Intelligence, Director of Central Intelligence, Secret Intelligence Directive

09/00/92 Appendixes A, B, and C to the Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence, National Reconnaissance Program Task Force, Secret Report

12/18/92 Directive 5200.37, Centralized Management of Department of Defense Human Intelligence (HUMINT) Operations, Department of Defense, [Classification Unknown] Directive

08/00/93 Intelligence Successes and Failures in Operations Desert Shield/Storm, House Committee on Armed Services, [Classification Unknown] Report

01/21/94 A Description of Procedures and Findings Related to the Report of the U.S. Environmental Task Force, King Publishing, Paper

12/07/95 Statement of the Director of Central Intelligence on the Clandestine Services and the Damage Caused by Aldrich Ames, Director of Central Intelligence, Statement

03/01/96 Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Report

12/19/96 United States of America v. Harold J. Nicholson, Superseding Indictment, U.S. District Court, Eastern District of Virginia, Indictment

Overview

Title
U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996

Content
Reproduces on microfiche 1,174 U.S. government records totaling 36,102 pages of documentation concerning the organizational structure, operations, and management of the intelligence community from World War II to the present.
Materials were identified, obtained, assembled, and indexed by the National Security Archive.

Series
The Special Collections

Arrangement
Microfiche are arranged chronologically. For ease of use, each document bears a unique accession number to which all indexing is keyed.

Standards
The documents are reproduced on 35mm silver halide archivally permanent positive microfiche conforming to NMA and BSI standards. Any microfiche found to be physically substandard in any way will be replaced free of charge.

Indexing
A printed Guide and Index accompanies the microfiche collection. The Guide contains an events chronology, glossaries, chronological document catalog and a bibliography of secondary sources. The Index provides in-depth, document level access to subjects and individuals.

U.S. Espionage and Intelligence Project Staff

Project Director

Dr. Jeffrey T. Richelson, project director, is a senior fellow at the National Security Archive and coordinates the Archive’s projects on U.S. policy toward China and ongoing documentation on U.S. intelligence issues. He previously edited the Archive’s collections on presidential national security documents, the history of the U.S. intelligence community, and the military uses of space. A former associate professor at American University, he received his Ph.D. in political science from the University of Rochester. Among his many books are Sword and Shield: Soviet Intelligence and Security Apparatus (1986), American Espionage and the Soviet Target (1988), America’s Secret Eyes in Space (1990), and A Century of Spies: Intelligence in the Twentieth Century (1995). His articles have appeared in a wide variety of professional journals and in publications ranging from Scientific American to the Washington Post. He is a regular commentator on intelligence and military issues for national television and radio.

Project Staff

Michael Evans, Research Assistant
Jane Gefter, Research Assistant
Michael Watters, Research Assistant

U.S. Espionage and Intelligence Advisory Board

Christopher Andrew, Corpus Christi College, University of Cambridge author, For the President’s Eyes Only

Loch Johnson, Department of Political Science, University of Georgia author, Secret Agencies: U.S. Intelligence in a Hostile World

David Wise, author, Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

Praise for U.S. Espionage and Intelligence, 1947-1996

“Serious students of the structure and operations of American intelligence rely on the work of the National Security Archive. The new collection of intelligence documents, compiled for the Archive by Jeffrey T. Richelson, helps to pierce the labyrinth.”

David Wise
Author of Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

“An invaluable supplement to the National Security Archive’s previous collection, The U.S. Intelligence Community 1947-1989, this brings the most recently declassified documents to the reader. Jeffrey Richelson’s useful introduction also serves to detail changes that have occurred in the structure of the U.S. espionage establishment.”

John Prados
Author of Presidents’ Secret Wars

TOP-SECRET FROM THE NSA-The Soviet Estimate: U.S. Analysis of the Soviet Union, 1947-1991

IMAGE
The Soviet Estimate:
U.S. Analysis of the Soviet Union,
1947-1991

Focus of the Collection

The Soviet Estimate: U.S. Analysis of the Soviet Union, 1947- 1991, publishes together for the first time the highest-level U.S. intelligence assessments of the Soviet Union, cross- indexed for maximum use. This set reproduces on microfiche more than 600 intelligence estimates and reports, representing nearly 14,000 pages of documentation from the office of the Director of Central Intelligence, the National Intelligence Council, the Central Intelligence Agency, the Defense Intelligence Agency, and other organizations. The set includes several hundred pages of debriefing transcripts and other documentation related to Colonel Oleg Penkovskii, the most important human source operated by the CIA during the Cold War, who later was charged with treason and executed by the Soviet Union. Also published here for the first time is the Pentagon’s Top Secret 1,000-page internal history of the United States-Soviet Union arms race.

The Soviet Estimate presents the definitive secret history of the Cold War, drawn from many sources: the hundreds of documents released by the CIA to the National Archives in December 1994, comprising the most important source of documents for the set, including intelligence estimates from 1946 to 1984; documents obtained under the Freedom of Information Act from the Pentagon, the CIA, the DIA, State Department, Pacific Command, and other agencies; and documents obtained from the National Archives and from various presidential libraries. The result of this effort is the most extensive and authoritative collection of declassified primary-source materials documenting the intelligence community’s effort to gather information on Soviet foreign policy, nuclear weapons, military policy and capabilities, weapons systems, the economy, science and technology, and the Soviet domestic political situation.

The Soviet Estimate provides a wealth of information and documentation on key intelligence issues, including:

  • The missile gap controversy, which helped John F. Kennedy to win the presidency in 1960
  • The “Team A”/”Team B” intelligence report controversy in 1976
  • Whether the CIA foresaw the decline of the Soviet economy
  • Advance warning from the CIA to President Bush about the hard-line coup attempt against Gorbachev in 1991.

Significance of the Collection

(54398) 1961/05/27

The Soviet Union was the major concern of U.S. national security decisionmakers for more than 40 years, and represented the most important single target of all U.S. intelligence collection efforts. The ultimate policies adopted by the U.S. during the Cold War were the result of many factors, not the least of which was an understanding of Soviet objectives and capabilities, shaped and influenced by the intelligence reports included in this set.

Until recently scholars have had to address issues such as the performance of U.S. intelligence analysis with respect to the Soviet Union or the impact of intelligence on policy without access to most of the key documents. Prior to December 1994, all of the National Intelligence Estimates related to the birth and death of the so-called “missile gap” were classified; scholars were often forced to rely either on other government documents that reproduced some of the information in estimates (for example, Department of Defense posture statements), or unofficial sources. The Soviet Estimate, with its diverse sources, permits scholars direct reference to the primary documents used in formulating much Cold War policy.


One-Stop Access to Critical Intelligence Documents

It would take an enormous effort, and many thousands of dollars, to duplicate the information contained in this collection. The Soviet Estimate allows a researcher– whether interested in the Soviet military, the Soviet economy, or Soviet internal politics–to use one source at one location to access the thousands of pages of declassified U.S. intelligence documents on the Soviet Union.

Through The Soviet Estimate the researcher gains access to a wide variety of documents, including National Intelligence Estimates, Special National Intelligence Estimates, National Intelligence Council memoranda, interagency intelligence studies, Defense Intelligence Estimates, and intelligence reports produced by DIA, military service, and unified command intelligence organizations.

Among the specific areas covered in the collection are:

  • Developments in Soviet nuclear forces from the early 1950s to the 1980s
  • The deteriorating political and economic situation under Mikhail Gorbachev in the late 1980s
  • Soviet relations with the United States, European countries, and other nations
  • The Soviet space program and developments in science and technology
  • The Soviet economic system and economy

In-depth Indexing Makes Every Document Accessible

The National Security Archive prepares extensive printed finding aids for its collections. In-depth indexing offers users remarkable ease and precision of access to every document in the set. The printed Index provides document- level access to subjects, individuals, and organizations, and represents a major historical contribution itself. Important transactions within each document are indexed individually using a controlled subjects vocabulary.

The Guide includes an events chronology, glossaries of key individuals and organizations, chronological document catalog, and a bibliography of relevant secondary sources.


Research Vistas

With its depth of documentary detail and balance of perspectives, this collection enables researchers to explore in greater detail:

  • Soviet studies
  • Cold War history
  • U.S. intelligence performance
  • The intelligence-policy relationship

The Collection is a Necessity for:

  • Scholars and students of
    • The Soviet Union
    • The history of the Cold War
    • The U.S. intelligence community
    • Policy formation
  • Policy analysts
  • Journalists
  • Concerned citizens
  • Librarians and bibliographers

Sample Document Titles

4/6/50 ORE 91-49
Estimate of the Effects of the Soviet Possession of the Atomic Bomb Upon the Security of the U.S. 
10/5/54 NIE 11-6-54
Soviet Capabilities and Probable Programs in the Guided Missile Field 
9/21/61 NIE 11-8/1-61
Strength and Deployment of Soviet Long-Range Ballistic Missile Forces, September 21, 1961 
3/2/67 NIE 11-1-67
The Soviet Space Program 
2/19/70 SNIE 11-16-70
Soviet Attitudes Toward SALT 
6/76 United States Air Force
A History of Strategic Arms Competition, 1945-1972: Volume 3: A Handbook of Selected Soviet Weapon and Space Systems (May-Steinbruner-Wolfe Report) 
12/76 NIO M 76-021J
Soviet Strategic Objectives: An Alternative View (“Team B” Report) 
5/27/81 SNIE 11-2-81
Soviet Support for International Terrorism and Revolutionary Violence 
7/7/81 M/M NIE 11-4-78
Soviet Goals and Expectations in the Global Power Arena 
4/83 NIC M 83-10006
Dimensions of Civil Unrest in the Soviet Union 
3/6/84 NIE 11-3/8-83
Soviet Capabilities for Strategic Nuclear Conflict, 1983-93 
4/89 CIA
Rising Political Instability Under Gorbachev: Understanding the Problem and Prospects for Resolution 
4/25/91 CIA, Office of Soviet Analysis
The Soviet Cauldron  

Overview

Title:

The Soviet Estimate: U.S. Analysis of the Soviet Union, 1947 – 1991
Content:
Reproduces on microfiche more than 600 intelligence estimates and reports, representing nearly 14,000 pages of documentation recording the intelligence community’s effort to gather information on Soviet foreign policy, nuclear weapons, military policy and capabilities, weapons systems, the economy, science and technology, and the Soviet domestic political situation.
Arrangement and Access:
Documents are arranged chronologically. For ease of use, the unique identification numbers assigned to the documents are printed in eye-legible type at the top right-hand corner and precede each document on the microfiche strip.
Standards:
Documents are reproduced on silver halide positive- reading microfiche at a nominal reduction of 24x in envelopes. They are archivally permanent and conform to AIIM, BSI, and ANSI standards. Any microfiche found to be substandard will be replaced free of charge.
Indexing:
A printed Guide and Index totaling over 390 pages accompanies the microfiche collection. The Guide contains an essay; an events chronology; glossaries of acronyms and abbreviations, names, organizations, and technical terms; and a bibliography of secondary sources. The Index provides in-depth, document-level access to subjects, individuals, and organizations.
Date of Publication:
December 1995
Orders and Inquiries

The National Security Archive

Founded in 1985, the National Security Archive has developed a reputation as the most prolific and successful nonprofit user of the Freedom of Information Act (FOIA). Through its FOIA expertise, the Archive has built what the Christian Science Monitor called “the largest collection of contemporary declassified national security information outside the United States government.” Located at The George Washington University, the Archive serves librarians, scholars, journalists, members of Congress, policymakers, public interest groups, and the general public. Foundation grants and publication royalties underwrite the Archive’s budget.

The Archive’s editorial process focuses on high-level policy-making and implementation, with special attention to inter-agency decisionmaking processes. Archive analysts target all U.S. government documents used by policymakers during the period covered by the collection, as well as other significant materials of direct relevance to the subject.

This research establishes a roadmap for future scholarship and “freezes” the documentary record with official requests for declassification before normal governmental document destruction process can diminish the historical record. The result is an “unusual” series of publications, as Microform Review noted, which make available documents “from the twilight zone between currently released government information, and normal declassification” periods.

Accompanied by highly sophisticated item-level catalogs, indexes, and other finding aids–which Government Publications Review hailed as “gold mines in and of themselves”–the Archive’s collections, according to the Washington Journalism Review, constitute “a ‘Nexis’ of national security . . . [a] state-of-the-art index to history.”


Praise for The Soviet Estimate

“The National Security Archive has performed a valuable service by compiling the most extensive and authoritative file of declassifed, official U.S. National Intelligence Estimates on the Soviet Union. The compilation The Soviet Estimate is a gold mine for analyzing Soviet developments on the Cold War, and no less important, contemporary American intelligence assessments of those developments. With the benefit of hindsight and new information, the validity of those estimates can be studied, and their impact on U.S. policy and the Cold War evaluated. ”
–Raymond Garthoff,
Senior Fellow, Foreign Policy Studies Program, Brookings Institution, former U.S. Ambassador to Bulgaria, veteran of the U.S. Department of State and Central Intelligence Agency, and author of many publications, including Deterrence and the Revolution in Soviet Military Doctrine (1990), The Great Transition: American-Soviet Relations and the End of the Cold War (1994), and Détente and Confrontation: American-Soviet Relations from Nixon to Reagan (1994).


The National Security Archive Soviet Estimate Project Staff

Project Editor
Jeffrey T. Richelson, Ph.D., Project Editor, is a senior fellow at the National Security Archive and coordinates the Archive’s projects on U.S. policy toward China and ongoing documentation on U.S. Intelligence issues. He previously edited the Archive’s collections on presidential national security documents, the history of the U.S. intelligence community, and the military uses of space. A former associate professor at American University, he received his Ph.D. in political science from the University of Rochester. Among his many books are Sword and Shield: Soviet Intelligence and Security Apparatus (1986), American Espionage and the Soviet Target (1988), America’s Secret Eyes in Space (1990), and A Century of Spies: Intelligence in the Twentieth Century (1995). His articles have appeared in a wide variety of professional journals and in publications ranging from Scientific American to the Washington Post. He is a regular commentator on intelligence and military issues for national television and radio. 
Project Staff
Jane Gefter, Research Assistant
Ian Stevenson, Research Assistant
Kristin Altoff, Intern

TOP-SECRET-Post-Saddam Iraq: The War Game

“There was consensus that the United States would not intervene without coalition support except under the most dire circumstances such as WMD use or catastrophic humanitarian disaster.”
Desert Crossing After Action Report, 1999.

“When it looked like we were going in, I called back down to CENTCOM and said, ‘You need to dust off Desert Crossing.’ They said, ‘What’s that? Never heard of it.'”
General Anthony Zinni (ret.), 2004.

Washington D.C., November 6, 20011 – In late April 1999, the United States Central Command (CENTCOM), led by Marine General Anthony Zinni (ret.), conducted a series of war games known as Desert Crossing in order to assess potential outcomes of an invasion of Iraq aimed at unseating Saddam Hussein. The documents posted here today covered the initial pre-war game planning phase from April-May 1999 through the detailed after-action reporting of June and July 1999.

The Desert Crossing war games, which amounted to a feasibility study for part of the main war plan for Iraq — OPLAN 1003-98 — tested “worst case” and “most likely” scenarios of a post-war, post-Saddam, Iraq. The After Action Report presented its recommendations for further planning regarding regime change in Iraq and was an interagency production assisted by the departments of defense and state, as well as the National Security Council, and the Central Intelligence Agency, among others.

The results of Desert Crossing, however, drew pessimistic conclusions regarding the immediate possible outcomes of such action. Some of these conclusions are interestingly similar to the events which actually occurred after Saddam was overthrown. (Note 1) The report forewarned that regime change may cause regional instability by opening the doors to “rival forces bidding for power” which, in turn, could cause societal “fragmentation along religious and/or ethnic lines” and antagonize “aggressive neighbors.” Further, the report illuminated worries that secure borders and a restoration of civil order may not be enough to stabilize Iraq if the replacement government were perceived as weak, subservient to outside powers, or out of touch with other regional governments. An exit strategy, the report said, would also be complicated by differing visions for a post-Saddam Iraq among those involved in the conflict.

The Desert Crossing report was similarly pessimistic when discussing the nature of a new Iraqi government. If the U.S. were to establish a transitional government, it would likely encounter difficulty, some groups discussed, from a “period of widespread bloodshed in which various factions seek to eliminate their enemies.” The report stressed that the creation of a democratic government in Iraq was not feasible, but a new pluralistic Iraqi government which included nationalist leaders might be possible, suggesting that nationalist leaders were a stabilizing force. Moreover, the report suggested that the U.S. role be one in which it would assist Middle Eastern governments in creating the transitional government for Iraq.

General Zinni, who retired in 2000 shortly after the completion of Desert Crossing, brought the report to the attention of the public after the war. Even before the invasion, he had made his opposition to an imminent war widely known. In a major address at the Middle East Institute in October 2002, he disputed the view that war was either inevitable or desirable. On the question of establishing a new government to replace Saddam Hussein, he said, “God help us if we think this transition will occur easily.” (Note 2)

Zinni disparaged the views of pro-war advocates who minimized the significance of Arab opinion: “I’m not sure which planet they live on, because it isn’t the one I travel.” In a Q&A after the speech, he declared that while it was necessary to deal with Saddam Hussein “eventually,” “[t]hat could happen in many ways” short of war. “The question becomes how to sort out your priorities …. My personal view, and this is just personal, is that I think this isn’t No. 1. It’s maybe six or seven, and the affordability line may be drawn around five.” (Note 3)

Zinni commented in depth publicly about Desert Crossing at UCLA in 2004 where he discussed the origins of the plan in the wake of the Desert Fox bombing campaign in 1998:

And it struck me then that we had a plan to defeat Saddam’s army, but we didn’t have a plan to rebuild Iraq. And so I asked the different agencies of government to come together to talk about reconstruction planning for Iraq. . . . I thought we ought to look at political reconstruction, economic reconstruction, security reconstruction, humanitarian need, services, and infrastructure development. We met in Washington, DC. We called the plan, and we gamed it out in the scenario, Desert Crossing. (Note 4)

Zinni noted the parallels to what eventually happened after the invasion as well as to the lack of interest elsewhere in the U.S. government for tackling the problems of reconstruction:

The first meeting surfaced all the problems that have exactly happened now. This was 1999. And when I took it back and looked at it, I said, we need a plan. Not all of this is a military responsibility. I went back to State Department, to the Office of Foreign Disaster Assistance, Department of Commerce and others and said, all right, how about you guys taking part of the plan. We need a plan in addition to the war plan for the reconstruction. Not interested. Would not look at it. (Note 5)

So the General decided to take action himself — “because I was convinced nobody in Washington was going to plan for it, and we, the military, would get stuck with it.”

Zinni claimed that his report had been forgotten only a few years later, stating: “When it looked like we were going in [to Iraq], I called back down to CENTCOM and said, ‘You need to dust off Desert Crossing.’ They said, ‘What’s that? Never heard of it.’ So in a matter of just a few years it was gone. The corporate memory. And in addition I was told, ‘We’ve been told not to do any of the planning. It would all be done in the Pentagon.'” (Note 6)

The planning done at the Defense Department changed Zinni’s original conception in some fundamental ways. For example, Zinni proposed a civilian occupation authority with offices in all eighteen Iraqi provinces, whereas the Coalition Provisional Authority (CPA) was actually established only in Baghdad.

Even more significantly, the former CENTCOM commander noted that his plan had called for a force of 400,000 for the invasion — 240,000 more than what Secretary of Defense Donald Rumsfeld approved. “We were concerned about the ability to get in there right away, to flood the towns and villages,” USA Today quoted Zinni as saying in July 2003. “We knew the initial problem would be security.” (Note 7)

Army General Thomas “Tommy” Franks adjusted the concept when he assumed command of CENTCOM upon Zinni’s retirement. Yet even his initial version of OPLAN 1003-98 envisioned a need for 385,000 troops, according to the book, COBRA II, (Note 8) — before Rumsfeld insisted that the number be sharply reduced.

DOWNLAOD THE ORIGINAL DOCUMENTS HERE

Desert Crossing After Action Report Briefing_1999-07-22

Desert Crossing After Action Report_1999-06-28

Desert Crossing Joint Intelligence Center Central doc_1998-11-14

Desert Crossing Misc emails_May-Aug 1999

Desert Crossing Pre-Wargame Intellgence Conference_1999-04-29

Central Intelligence Agency Marks 50th Anniversary of the Berlin Crisis of 1961 and the Building of the Berlin Wall

The Central Intelligence Agency, in partnership with the National Declassification Center, hosted a symposium on 27 October 2011 at the National Archives in Washington, D.C., to discuss the Berlin Crisis of 1961 and the subsequent construction of the Berlin Wall. In conjunction with the event, more than 370 declassified documents – totaling more than 4800 pages of material about this crucial time period – were released from the records of multiple U.S. Government agencies. This collection marks the first time so many government entities have compiled their declassified documents on a single historic event in one place.

“Eleven U.S. Government organizations contributed to the material being presented today – from intelligence reports to contingency plans to photographs to maps – all of these revealing the tremendous challenges U.S. analysts faced in predicting Nikita Khrushchev’s intentions and actions during the Berlin Crisis,” said Joseph Lambert, CIA’s Director of Information Management Services (IMS). “These documents also afford a glimpse of the many differing opinions held by Kennedy Administration advisors and various military leaders about which tactics and strategies offered the most effective U.S. response.”

Historians, intelligence experts, retired CIA officers, and policymakers from the Berlin Crisis era participated in the event. The symposium featured a keynote address by Dr. William R. Smyser, the last person to cross the Potsdamer Platz in a car as the Berlin Wall was being erected. Dr. Smyser, who now teaches at Georgetown University, discussed his firsthand experiences serving as the special assistant to General Lucius Clay, President Kennedy’s personal representative to Berlin, and as a political counselor at the American Embassy in Bonn.

The military, historical, and diplomatic views of the crisis were explored in a panel led by CIA historian Dr. Donald P. Steury. The panel consisted of Dr. Don Carter, historian at the U.S. Army Center of Military History; Dr. Hope Harrison, historian at the George Washington University and Woodrow Wilson Center; Lou Mehrer, a retired CIA officer; and Dr. Greg W. Pedlow, historian at the Supreme Headquarters Allied Powers Europe.

This event was organized by the CIA’s Historical Collections Division (HCD), a component of IMS. HCD seeks to identify and declassify collections of documents that detail the Agency’s analysis and activities relating to historically significant topics and events.

“Of one thing I am certain,” Lambert said of the officers in HCD. They believe that “they hold these classified records in trust for the American people, and that when the sensitivity of the material attenuates over time, that they have a sense of duty to declassify and release it.”

TOP-SECRET-The National Commission on Terrorist Attacks Upon the United States – 9/11 Commission

FBI Report Apr 2004

FBI Report Chronology Part 01 of 02

FBI Report Chronology Part 02 of 02

Click on te links above to get the Original Documents of the 9/11 Commisssion

The National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission, was set up on November 27, 2002, “to prepare a full and complete account of the circumstances surrounding the September 11, 2001 attacks“, including preparedness for and the immediate response to the attacks.

The commission was also mandated to provide recommendations designed to guard against future attacks.

Chaired by former New Jersey Governor Thomas Kean, the commission consisted of five Democrats and five Republicans. The commission was created by Congressional legislation, with the bill signed into law by President George W. Bush.

The commission’s final report was lengthy and based on extensive interviews and testimony. Its primary conclusion was that the failures of the U.S. Central Intelligence Agency and Federal Bureau of Investigation permitted the terrorist attacks to occur and that had these agencies acted more wisely and more aggressively, the attacks could potentially have been prevented.

After the publication of its final report, the commission closed on August 21, 2004.[1] The commission was the last investigation by the federal government into the events of 9/11, with the exception of the NIST report on the collapse of Building 7.

The National Commission on Terrorist Attacks Upon the United States was established on November 27, 2002, by President George W. Bush and the United States Congress, with former Secretary of State Henry Kissinger initially appointed to head the commission.[2] However, Kissinger resigned only weeks after being appointed, because he would have been obliged to disclose the clients of his private consulting business.[3] Former U.S. Senator George Mitchell was originally appointed as the vice-chairman, but he stepped down on December 10, 2002, not wanting to sever ties to his law firm.[4] On December 15, 2002, Bush appointed former New Jersey governor Tom Kean to head the commission.[5]

By the spring of 2003, the commission was off to a slow start, needing additional funding to help it meet its target day for the final report, of May 27, 2004.[6] In late March, the Bush administration agreed to provide an additional $9 million for the commission, though this was $2 million short of what the commission requested.[7] The first hearings were held from March 31 to April 1, 2003, in New York City.[8]

Members

The members of the commission’s staff included:

Then government officials who were called to testify before the commission included:

Past government officials who were called to testify before the commission included:

President George W. Bush, Vice President Dick Cheney, former President Bill Clinton, and former Vice President Al Gore all gave private testimony. President Bush and Vice President Cheney insisted on testifying together and not under oath, while Clinton and Gore met with the panel separately. As National Security Advisor, Condoleezza Rice claimed that she was not required to testify under oath because the position of NSA is an advisory role, independent of authority over a bureaucracy and does not require confirmation by the Senate. Legal scholars disagree on the legitimacy of her claim. Eventually, Condoleezza Rice testified publicly and under oath.[12]

The commission issued its final report on July 22, 2004. After releasing the report, Commission Chair Thomas Kean declared that both Presidents Bill Clinton and George W. Bush had been “not well served” by the FBI and CIA.[13] The commission interviewed over 1,200 people in 10 countries and reviewed over two and a half million pages of documents, including some closely-guarded classified national security documents. Before it was released by the commission, the final public report was screened for any potentially classified information and edited as necessary.

Additionally, the commission has released several supplemental reports on the terrorists’ financing, travel, and other matters.

Parenthetic numbers refer to page numbers in the Commission Report

  1. The U.S. government must identify and prioritize actual or potential terrorist sanctuaries. For each, it should have a realistic strategy to keep possible terrorists insecure and on the run, using all elements of national power. (367)
  2. United States should support Pakistan’s government in its struggle against extremists with a comprehensive effort that extends from military aid to support for better education, so long as Pakistan’s leaders remain willing to make difficult choices of their own. (369)
  3. United States and the international community should make a long-term commitment to a secure and stable Afghanistan, in order to give the government a reasonable opportunity to improve the life of the Afghan people. Afghanistan must not again become a sanctuary for international crime and terrorism. The United States and the international community should help the Afghan government extend its authority over the country, with a strategy and nation-by-nation commitments to achieve their objectives. (370)
  4. The problems in the U.S.-Saudi relationship must be confronted, openly. The United States and Saudi Arabia must determine if they can build a relationship that political leaders on both sides are prepared to publicly defend—a relationship about more than oil. It should include a shared commitment to political and economic reform, as Saudis make common cause with the outside world. It should include a shared interest in greater tolerance and cultural respect, translating into a commitment to fight the violent extremists who foment hatred. (374)
  5. The U.S. government must define what the message is, what it stands for. We should offer an example of moral leadership in the world, committed to treat people humanely, abide by the rule of law, and be generous and caring to our neighbors. America and Muslim friends can agree on respect for human dignity and opportunity. (376)
  6. Where Muslim governments, even those who are friends, do not respect these principles, the United States must stand for a better future. One of the lessons of the long Cold War was that short-term gains in cooperating with the most repressive and brutal governments were too often outweighed by long-term setbacks for America’s stature and interests. (376)
  7. We need to defend our ideals abroad vigorously. America does stand up for its values. The United States defended, and still defends, Muslims against tyrants and criminals in Somalia, Bosnia, Kosovo, Afghanistan, and Iraq.
    • Recognizing that Arab and Muslim audiences rely on satellite television and radio, the government has begun some promising initiatives in television and radio broadcasting to the Arab world, Iran, and Afghanistan. These efforts are beginning to reach large audiences. The Broadcasting Board of Governors has asked for much larger resources. It should get them.
    • The United States should rebuild the scholarship, exchange, and library programs that reach out to young people and offer them knowledge and hope. Where such assistance is provided, it should be identified as coming from the citizens of the United States. (377)
  8. The U.S. government should offer to join with other nations in generously supporting a new International Youth Opportunity Fund. Funds will be spent directly for building and operating primary and secondary schools in those Muslim states that commit to sensibly investing their own money in public education. (378)
  9. A comprehensive U.S. strategy to counter terror-ism should include economic policies that encourage development, more open societies, and opportunities for people to improve the lives of their families and to enhance prospects for their children’s future. (379)
  10. The United States should engage other nations in developing a comprehensive coalition strategy against Islamist terror-ism. (379)
  11. The United States should engage its friends to develop a common coalition approach toward the detention and humane treatment of captured terrorists. (380)
  12. Pre-venting the proliferation of [weapons of mass destruction] warrants a maximum effort—by strengthening counterproliferation efforts, expanding the Proliferation Security Initiative, and supporting the Cooperative Threat Reduction program. (381)
  13. Vigorous efforts to track terrorist financing must remain front and center in U.S. counterterrorism efforts. The government has recognized that information about terrorist money helps us to understand their networks, search them out, and disrupt their operations. Intelligence and law enforcement have targeted the relatively small number of financial facilitators—individuals al Qaeda relied on for their ability to raise and deliver money—at the core of al Qaeda’s revenue stream. (382)
  14. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility. (385)
  15. The U.S. border security system should be integrated into a larger network of screening points that includes our transportation system and access to vital facilities, such as nuclear reactors. The President should direct the Department of Homeland Security to lead the effort to design a comprehensive screening system, addressing common problems and setting common standards with systemwide goals in mind. (387)
  16. The Department of Homeland Security, properly supported by the Congress, should complete, as quickly as possible, a biometric entry-exit screening system, including a single system for speeding qualified travelers. It should be integrated with the system that provides benefits to foreigners seeking to stay in the United States. (389)
  17. We should do more to exchange terrorist information with trusted allies, and raise U.S. and global border security standards for travel and border crossing over the medium and long term through extensive inter-national cooperation. (390)
  18. Secure identification should begin in the United States. The federal government should set standards for the issuance of birth certificates and sources of identification, such as drivers licenses. (390)
  19. The U.S. government should identify and evaluate the transportation assets that need to be protected, set risk-based priorities for defending them, select the most practical and cost-effective ways of doing so, and then develop a plan, budget, and funding to implement the effort. The plan should assign roles and missions to the relevant authorities (federal, state, regional, and local) and to private stakeholders. In measuring effectiveness, perfection is unattainable. But terrorists should perceive that potential targets are defended. They may be deterred by a significant chance of failure. (391)
  20. Improved use of “no-fly” and “automatic selectee” lists should not be delayed while the argument about a successor to CAPPS continues. (393)
  21. The TSA and the Congress must give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. (393)
  22. As the President determines the guidelines for information sharing among government agencies and by those agencies with the private sector, he should safeguard the privacy of individuals about whom information is shared. (394)
  23. The burden of proof for retaining a particular governmental power should be on the executive, to explain (a) that the power actually materially enhances security and (b) that there is adequate supervision of the executive’s use of the powers to ensure protection of civil liberties. If the power is granted, there must be adequate guidelines and oversight to properly confine its use. (394-5)
  24. There should be a board within the executive branch to oversee adherence to the guidelines we recommend and the commitment the government makes to defend our civil liberties. (395)
  25. Homeland security assistance should be based strictly on an assessment of risks and vulnerabilities. Now, in 2004, Washington, D.C.,and New York City are certainly at the top of any such list. We understand the contention that every state and city needs to have some minimum infrastructure for emergency response. But federal homeland security assistance should not remain a program for general revenue sharing. It should supplement state and local resources based on the risks or vulnerabilities that merit additional support. Congress should not use this money as a pork barrel. (396)
  26. Emergency response agencies nationwide should adopt the Incident Command System (ICS). When multiple agencies or multiple jurisdictions are involved, they should adopt a unified command. (397)
  27. Congress should support pending legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes. (397)
  28. We endorse the American National Standards Institute’s recommended standard for private preparedness…. We also encourage the insurance and credit-rating industries to look closely at a company’s compliance with the ANSI standard in assessing its insurability and creditworthiness. We believe that compliance with the standard should define the standard of care owed by a company to its employees and the public for legal purposes. (398)
  29. We recommend the establishment of a National Counterterrorism Center (NCTC), built on the foundation of the existing Terrorist Threat Integration Center (TTIC). Breaking the older mold of national government organization, this NCTC should be a center for joint operational planning and joint intelligence, staffed by personnel from the various agencies. (403)
  30. The current position of Director of Central Intelligence should be replaced by a National Intelligence Director with two main areas of responsibility: (1) to oversee national intelligence centers on specific subjects of interest across the U.S. government and (2) to manage the national intelligence program and oversee the agencies that contribute to it. (411)
  31. The CIA Director should emphasize (a) rebuilding the CIA’s analytic capabilities; (b) transforming the clandestine service by building its human intelligence capabilities; (c) developing a stronger language program, with high standards and sufficient financial incentives; (d) renewing emphasis on recruiting diversity among operations officers so they can blend more easily in foreign cities;(e) ensuring a seamless relationship between human source collection and signals collection at the operational level; and (f) stressing a better balance between unilateral and liaison operations. (415)
  32. Lead responsibility for directing and executing paramilitary operations, whether clandestine or covert, should shift to the Defense Department. There it should be consolidated with the capabilities for training, direction, and execution of such operations already being developed in the Special Operations Command. (415)
  33. Overall amounts of money being appropriated for national intelligence and to its component agencies should no longer be kept secret. Congress should pass a separate appropriations act for intelligence, defending the broad allocation of how these tens of billions of dollars have been assigned among the varieties of intelligence work. (416)
  34. Information procedures should provide incentives for sharing, to restore a better balance between security and shared knowledge. (417)
  35. The president should lead the government-wide effort to bring the major national security institutions into the information revolution. (418)
  36. Congress should address [the dysfunction system of intelligence oversight].We have considered various alternatives: A joint committee on the old model of the Joint Committee on Atomic Energy is one. A single committee in each house of Congress. (420)
  37. Congress should create a single, principal point of oversight and review for homeland security. Congressional leaders are best able to judge what committee should have jurisdiction over this department and its duties. But we believe that Congress does have the obligation to choose one in the House and one in the Senate, and that this committee should be a permanent standing committee with a nonpartisan staff. (421)
  38. We should minimize as much as possible the disruption of national security policymaking during the change of administrations by accelerating the process for national security appointments. (422)
  39. A specialized and integrated national security workforce should be established at the FBI consisting of agents, analysts, linguists, and surveillance specialists who are recruited, trained, rewarded, and retained to ensure the development of an institutional culture imbued with a deep expertise in intelligence and national security. (425-6)
  40. The Department of Defense and its oversight committees should regularly assess the adequacy of Northern Command’s strategies and planning to defend the United States against military threats to the homeland. (428)
  41. The Department of Homeland Security and its oversight committees should regularly assess the types of threats the country faces to determine (a) the adequacy of the government’s plans—and the progress against those plans—to protect America’s critical infrastructure and (b) the readiness of the government to respond to the threats that the United States might face. (428)

TOP-SECRET – OIG Report on CIA Accountability With Respect to the 9/11 Attacks

The Office of the Inspector General (OIG) of the United States Central Intelligence Agency (CIA) was asked to prepare a report of the accountability of CIA officers for performance failures in countering the terror attacks of September 11, 2001, as revealed by earlier congressional hearings. The report was prepared in 2005, but kept secret until August 21 2007.

Responding to congressional pressure, the CIA released a bowdlerized executive summary only, which does not name responsible persons. CIA Director General Hayden and others objected to the release of the report, and Hayden also objects to the report’s recommendation that an Accountability Review Board should be set up to judge the persons responsible for the failures.

A report in searchable text form is here: OIG Report on CIA Accountability With Respect to the 9/11 Attacks. Actually the report itself, or what we can see of it, is pretty mild, considering the magnitude and inexplicability of many of the failures. While the report focuses on “little issues” like poor CIA-FBI cooperation and various tactical failures, it doesn’t consider the larger question of why radical Islamist terrorism in general, and Al-Qaeda in particular, was not ringing alarm bells everywhere. The report does ask why CIA Director Tenet didn’t formulate a plan to eliminate Al-Qaeda. A better question is why neither Tenet or nor anyone in the executive office of two administrations was not treating the threat as a war. After all, Bin-Laden had threatened to destroy the United States in his Fatwas, and Al-Qaeda had already carried out attacks in the SS Cole and on US embassies. Here was a clearly hostile enemy who was not making empty threats. The problem could be seen by anyone who looked, without the need for special intelligence information. Yet the issue was shunted aside.

The great failure perhaps was not the failure of George Tenet. A CIA director is not supposed to formulate policy. The great failure was the failure of the executive branch, which failed to identify a clear and present danger, and to put into operation an emergency plan to deal with it.

Read the full report and draw your own conclusions:

This document describing the unreadiness of the CIA for the attacks of 9-11 was prepared in June of 2005 by the Office of the Inspector General (OIG) of the CIA . The CIA decided to keep the document secret. At length in August of 2007, the executive report portion of the document was released.

An article by Mark Mazetti in the The New York Times of August 21, summarized some of the findings:

A report released Tuesday by the Central Intelligence Agency includes new details of the agency’s missteps before the Sept. 11 attacks, outlining what the report says were failures to grasp the role being played by the terror mastermind Khalid Sheikh Mohammed and to assess fully the threats streaming into the C.I.A. in the summer of 2001.

The 19-page report, prepared by the agency’s inspector general, also says 50 to 60 C.I.A. officers knew of intelligence reports in 2000 that two of the Sept. 11 hijackers, Nawaf al-Hamzi and Khalid al-Mihdhar, may have been in the United States. But none of those officers thought to notify the Federal Bureau of Investigation about the potential domestic threat, the report says, evidence of what it calls a systemic failure.

The inspector general recommended that several top agency officials, including former director George J. Tenet, be held accountable for their failure to put in place a strategy to dismantle Al Qaeda in the years before Sept. 11, 2001. Gen. Michael V. Hayden, the current C.I.A. director, and his predecessor, Porter J. Goss, have declined to seek disciplinary action against Mr. Tenet  and others named in the report.

The report was not a spontaneous review initiated by the CIA. It begins “

The Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence requested that the CIA’s Office of Inspector General (OIG) review the findings of their Joint Inquiry (JI) Report and undertake whatever additional investigations were necessary to determine whether any Agency employees were deserving of awards for outstanding service provided before the attacks of September 11, 2001 (9/11), or should be held accountable for failure to perform their responsibilities in a satisfactory manner.

In other words, the legislative bodies had found problems in the functioning of the CIA, and requested the CIA to take appropriate corrective measures. The refusal to seek disciplinary action against CIA officers by the head of the CIA is therefore significant.

The summary also notes that “

(U) The Accountability Review Team assembled by the Inspector General (IG) focused exclusively on the issues identified by the JI. The IG was not asked by the Congress to conduct a comprehensive review of the capabilities and functioning of the Agency’s many components involved with counterterrorism programs, and the Team did not do so. As a result, this account does not document the many successes of the Agency and its officers at all levels (including many whose actions are discussed in this report) in the war on terrorism, both before and after 9/11.

(U) Similarly, because this report was designed to address accountability issues, it does not include recommendations relating to the systemic problems that were identified. Such systemic recommendations as were appropriate to draw from this review of the events of the pre-9/11 period have been forwarded separately to senior Agency managers. In its regular program of audits, investigations, and inspections, the OIG continues to review the counterterrorism programs and operations of the Agency, identifying processes that work well and those that might be improved.

The team notes that it used a “reasonable person” approach, that is, to determine if actions taken were responsible or negligent based on what a reasonable person would do. The results of this approach are sometimes peculiar. For example, the Team decided, in contradiction to congress, that the use of foreign liaison and walk-in (volunteer) “assets” by the CIA was not excessive. But then they decide that the CIA officials were not to blame for failures, because the failures were due to the lack of cooperation or limited operation provided by such assets and liaisons.

The problems that allowed 9-11 to happen would seem to be much deeper than personal failures, or even “systemic failures” related to CIA-FBI cooperation. The FBI and the CIA had been tracking Al-Qaeda for years. Inexplicably, they failed to do so at the crucial time. They are also indicative of a larger conceptual failure in understanding the Middle East, and in allocating the necessary intelligence and diplomatic resources. (See comment on the role of the CIA and FBI in the 9-11 failure).

An important recommendation of the report:

Concerning certain issues, the Team concluded that the Agency and its officers did not discharge their responsibilities in a satisfactory manner. As a result, the Inspector General recommends that the Director, Central Intelligence Agency establish an Accountability Board made up of individuals who are not employees of the Agency to review the performance of some individuals and assess their potential accountability.

General Hayden objects to creation of such a board. No agency likes to have external oversight.

The first page of the released report is numbered Roman Numeral v. We have tried to keep the formatting as close to the original as reasonably possible. The report has numerous areas that were whited out by the censor. These are indicated herein by XXXXXXXXXX. They include names of operatives, foreign liaisons, amounts of money and other information.

Ami Isseroff

9-11 Project at MidEastWeb9-11 Commission Report: Whitewash as a public service 9-11 commission report OIG Report on CIA Accountability With Respect to the 9/11 Attack Osama Bin Laden Fatwa of 1998 Osama Bin Laden Statement on Afghanistan War  Inside Al-Qaeda Who is Osama Bin Laden? – Fatwa of 1996 (Declaration of war) Terrorist threat greater than before 9-11


Notice – Copyright

This introduction is copyright 2007 by MidEastWeb Middle East http://www.mideastweb.org  and the author. Please tell your friends about MidEastWeb and link to this page. Please do not copy this page to your Web site. You may print this page out for classroom use provided that this notice is appended, and you may cite this material in the usual way. Other uses by permission only.  The source material below is placed in the public domain  and is free of copy restrictions. Source: https://www.cia.gov/library/reports/Executive%20Summary_OIG%20Report.pdf


TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(U) EXECUTIVE SUMMARY

(U) The Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence requested that the CIA’s Office of Inspector General (OIG) review the findings of their Joint Inquiry (JI) Report and undertake whatever additional investigations were necessary to determine whether any Agency employees were deserving of awards for outstanding service provided before the attacks of September 11, 2001 (9/11), or should be held accountable for failure to perform their responsibilities in a satisfactory manner.

(U) The Accountability Review Team assembled by the Inspector General (IG) focused exclusively on the issues identified by the JI. The IG was not asked by the Congress to conduct a comprehensive review of the capabilities and functioning of the Agency’s many components involved with counterterrorism programs, and the Team did not do so. As a result, this account does not document the many successes of the Agency and its officers at all levels

(including many whose actions are discussed in this report) in the war on terrorism, both before and after 9/11.

(U) Similarly, because this report was designed to address accountability issues, it does not include recommendations relating to the systemic problems that were identified. Such systemic recommendations as were appropriate to draw from this review of the events of the pre-9/11 period have been forwarded separately to senior Agency managers. In its regular program of audits, investigations, and inspections, the OIG continues to review the counterterrorism programs and operations of the Agency, identifying processes that work well and those that might be improved.

(U) After conducting its review, the Inspector General Team reports that, while its findings differ from those of the JI on a number of matters, it reaches the same overall conclusions on most of the important issues.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 v

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


Concerning certain issues, the Team concluded that the Agency and its officers did not discharge their responsibilities in a satisfactory manner. As a result, the Inspector General recommends that the Director, Central Intelligence Agency establish an Accountability Board made up of individuals who are not employees of the Agency to review the performance of some individuals and assess their potential accountability.

(U) In its deliberations, the Team used “reasonable person” approach and relied on Agency regulations-which are subjective-concerning standards of accountability. A discussion of those regulations is included in the Foreword. While the Team found that many officers performed their responsibilities in an exemplary fashion, it did not recommend individuals for additional recognition because these officers already have been rewarded.

(U) The Team found no instance in which an employee violated the law, and none of the errors discussed herein involves misconduct. Rather, the review focuses on areas where individuals did not perform their duties in a satisfactory manner; that is, they did not-with regard to the specific issue or issues discussed-act “in accordance with a reasonable level of professionalism, skill, and diligence,” as required by Agency regulation. On occasion, the Team has found that a specific officer was responsible for a particular action or lack of action, but has not recommended that an Accountability Board review the officer’s performance. Such a conclusion reflects the Team’s view that extenuating circumstances mitigate the case.

(U) The findings of greatest concern are those that identify systemic problems where the Agency’s programs or processes did not work as they should have, and concerning which a number of persons were involved or aware, or should have been. Where the Team found systemic failures, it has recommended that an Accountability Board assess the performance and accountability of those managers who, by virtue of their position and authorities, might reasonably have been expected to oversee and correct the process. In general, the fact that failures were systemic should not absolve responsible officials from accountability.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 vi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(U) The Review Team found that Agency officers from the top down worked hard against the al-Qa’ida and Usama Bin Ladin (UBL) targets. They did not always work effectively and cooperatively, however. The Team found neither a “single point of failure” nor a “silver bullet” that would have enabled the Intelligence Community (IC) to predict or prevent the 9/11 attacks. The Team did find, however, failures to implement and manage important processes, to follow through with operations, and to properly share and analyze critical data. If IC officers had been able to view and analyze the full range of information available before 11 September 2001, they could have developed a more informed context in which to assess the threat reporting of the spring and summer that year.

(U) This review focuses only on those findings of the Joint Inquiry that relate to the Central Intelligence Agency. The Team cooperated with the Department of Justice Inspector General and the Kean Commission as they pursued their separate inquiries. For this report, the Team interviewed officers from other agencies who had been detailed to the CIA in the period before 9/11, but did not undertake to interview systematically other officers outside CIA and the IC Management Staff. This report reaches no conclusions about the performance of other agencies or their personnel.

(U) Senior Leadership and Management of the Counterterrorism Effort

(U) The JI concluded that, before 9/11, neither the US Government nor the IC had a comprehensive strategy for combating al-Qa’ida. It charged that the Director of Central Intelligence (DCI) was either unwilling or unable to marshal the full range of IC resources necessary to combat the growing threat to the United States. The OIG Team also found that the IC did not have a documented, comprehensive approach to al-Qa’ida and that the DCI did not use all of his authorities in leading the IC’s strategic effort against UBL.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 vii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


(C) The Team found that the DCI was actively and forcefully engaged in the counterterrorism efforts of the CIA. Beginning in 1999, he received regular updates, often daily, on efforts to track and disrupt UBL. He was personally engaged in sounding the alarm about the threat to many different audiences in the policy community, military, Congress, and public, and he worked directly and personally with foreign counterparts to encourage their cooperation.

(S//NF) In December 1998, the DCI signed a memorandum in which he declared: “We are at war.” In addition to directives related to collection programs and other matters, this memorandum stated that the Deputy Director for Central Intelligence (DDCI) would chair an interagency group to formulate an integrated, interagency plan to counter the terrorist challenge posed by Usama Bin Ladin. The DCI wrote that he wanted “…no resources or people spared in this effort, either inside CIA or the Community.”

(S//NF) The Team found that neither the DCI nor the DDCI followed up these warnings and admonitions by creating a documented, comprehensive plan to guide the counterterrorism effort at the Intelligence Community level. The DDCI chaired at least one meeting in response to the DCI directive, but the forum soon devolved into one of tactical and operational, rather than strategic, discussions. These subsequent meetings were chaired by the Executive Director of the CIA and included few if any officers from other IC agencies. While CIA and other agencies had individual plans and important initiatives underway, senior officers in the Agency and Community told the Team that no comprehensive strategic plan for the IC to counter UBL was created in response to the DCI’s memorandum, or at any time prior to 9/11.

(S//NF) The DCI Counterterrorist Center (CTC) was not used effectively as a strategic coordinator of the IC’s counterterrorism efforts. CTC’s stated mission includes the production of all-source intelligence and the coordination of the IC’s counterterrorism efforts. Before 9/11, however, the Center’s focus was primarily operational and tactical. While

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 viii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


focusing on operations is critically important and does not necessarily mean that other elements of mission will be ignored, the Team found that this nearly exclusive focus-which resulted in many operational successes-had a negative impact on CTC’s effectiveness as a coordinator of IC counterterrorism strategy. The Team found that the most effective interagency effort against UBL was that of the Assistant DCI for Collection, who, from the early months of 1998 to 9/11, worked with representatives of several intelligence agencies to stimulate collection.

(S//NF)  In the years leading up to 9/11, the DCI worked hard and with some success, at the most senior levels of government, to secure additional budgetary resources to rebuild the CIA and the IC. At the same time, the Team found that he did not use his senior position and unique authorities to work with the National Security Council to elevate the relative standing of counterterrorism in the formal ranking of intelligence priorities, or to alter the deployment of human and financial resources across agencies in a coordinated approach to the terrorism target. While the nature of the IC makes the mission of managing it problematic and difficult, the DCI at the time had some authority to move manpower and funds among agencies. The Team found that, in the five years prior to 9/11, the DCI on six occasions used these authorities to move almost XXXXXX

in funds from other agencies to the CIA for a number of important purposes XXXXXX

XXXXXX  One of these transfers helped fund a middle East program that was terrorism-related, but none supported programs designed to counter UBL or al-Qa’ida. Nor were DCI authorities used to transfer any personnel into these programs in the five years prior to 9/11.

The Team notes that the former DCI recognized the need for an integrated, interagency plan, and believes that such a plan was needed to mobilize all of the operational, analytic, and resource capabilities of the IC to enable the several agencies of the Community to work cooperatively and with maximum effectiveness against al-Qa’ida. At the same time, the Team concludes that the former DCI, by virtue of his position, bears ultimate responsibility for the fact that no such strategic plan was

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 ix

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


ever created, despite his specific direction that this should be done.

(S//NF) The JI report discussed a persistent strain in relations between CIA and the National Security Agency (NSA) that impeded collaboration between the two agencies in dealing with the terrorist challenge from al-Qa’ida. The Team, likewise, found that significant differences existed between CIA and NSA over their respective authorities. The Team did not document in detail or take a position on the merits of this disagreement, but notes that the differences remained unresolved well into 2001 in spite of the fact that considerable management attention was devoted to the issue, including at the level of the Agency’s Deputy Executive Director. Senior officers of the CIA and the IC Management Staff stated that these interagency differences had a negative impact on the IC’s ability to perform its mission and that only the DCI’s vigorous personal involvement could have led to a timely resolution of the matter.

(C)The Team recommends that an Accountability Board review the performance of the former DCI for failing to act personally to resolve the differences between CIA and NSA in an effective and timely manner.

(U) See the Team’s discussions of Systemic Findings 2 (The DCI’s Role); 4 (Application of Technology); and 7 (Computer Exploitation) for discussion of these issues.

(U) Management of CIA’s Resources for Counterterrorism

(C) Funding for the Agency’s counterterrorism programs increased significantly from Fiscal Year (FY)1998 to FY 2001 as a result of supplemental appropriations. These funds were appropriated, in part, because of the efforts of the CIA’s Director and senior leaders to convince the Administration and Congress that the Agency was short of resources for counterterrorism and other key programs. The Team preparing this report did not attempt to reach a

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 x

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


counterterrorism programs.

(S) The Team did find, however, that during the same period they were appealing the shortage of resources, senior officials were not effectively managing the Agency’s counterterrorism funds. In particular, Agency managers moved funds from the base budgets of the Counterterrorist Center and other counterterrorism programs to meet other corporate and Directorate of Operations (DO) needs. The Team found that from FY 1997 to FY 2001 (as of 9/11),XXXXX XXXXXXXXXX

was redistributed from counterterrorism programs to other Agency priorities. Some of these funds were used to strengthen the infrastructure of the DO and, thus, indirectly supported counterterrorism efforts; other funds were used to cover nonspecific corporate “taxes” and for a variety of purposes that, based on the Agency’s budgetary definitions, were unrelated to terrorism. Conversely, no resources were reprogrammed from other Agency programs to counterterrorism, even after the DCI’s statement in December 1998 that he wanted no resources spared in the effort. The Team found that the Agency made little use of the Reserve for Contingencies to support its counterterrorism effort. Finally, CTC managers did not spend all of the funds in their base budget, even after it had been reduced by diversions of funds to other programs.

(C) The Team recommends that an Accountability Board review the performance of the Executive Director, the Deputy Director for Operations, and the Chief of CTC during the years prior to 9/11 regarding their management of the Agency’s counterterrorism financial resources, including specifically their redirection of funds from counterterrorism programs to other priorities.

(C)  Concerning human resources, the Team found that the unit within CTC responsible for Usama Bin Ladin, UBL Station, by the accounts of all who worked there, had an excessive workload. Most of its officers did not have the operational experience, expertise, and training necessary to accomplish their mission in an effective manner. Taken together, these weaknesses contributed to performance lapses related to the handling of materials concerning

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


individuals who were to become the 9/11 hijackers. The Team recommends that an Accountability Board review the performance of the Chiefs of CTC during the period 1997-2001 regarding the manner in which they staffed the UBL component.

(C) The Team found that certain units within CTC did not work effectively together to understand the structure and operations of al-Qa’ida. This situation had a particularly negative impact on performance with respect to Khalid Shaykh Muhammad (KSM), the mastermind of the 9/11 attacks. The Team, like the Joint Inquiry, found that CTC’s assigning principal responsibility for KSM to the Renditions Branch had the consequence that the resources of the Sunni Extremist Group, UBL Station, and CTC analysts were not effectively brought to bear on the problem. CTC considered KSM to be a high-priority target for apprehension and rendition, but did not recognize the significance of reporting from credible sources in 2000 and 2001 that portrayed him as a senior al-Qa’ida lieutenant and thus missed important indicators of terrorist planning. This intelligence reporting was not voluminous and its significance is obviously easier to determine in hindsight, but it was noteworthy even in the pre-9/11 period because it included the allegation that KSM was sending terrorists to the United States to engage in activities on behalf of Bin Ladin.

(C) The evidence indicates that the management approach employed in CTC had the effect of actively reinforcing the separation of responsibilities among the key CTC units working on KSM. The Team recommends that an

Accountability Board review the performance of the XXX

XXXX and XXXXX

for failure to provide proper oversight and guidance to their officers; to coordinate effectively with other units; and to allocate the workload to ensure that KSM was being covered appropriately. The Team also recommends that an Accountability Board review the performance of the Chief of CTC for failure to ensure that CTC units worked in a coordinated, effective manner against KSM. Finally, the Team recommends that an Accountability Board review the performance of the XXXXXX for

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


failure to produce any XXXXXX coverage of Khalid Shaykh Muhammad from 1997 to 20011

  • (U) See the Team’s discussions of Systemic Finding 3 (Counterterrorism Resources) and Factual Finding 5i (Khalid Shaykh Muhammad) for further information on these issues.

(U) Information Sharing

The Team’s findings related to the issue of information sharing are in general accord with the JI’s overall assessment of CIA’s performance. Like the JI, the Team found problems in the functioning of two separate but related processes in the specific case of the Malaysia operation of early 2000: entering the names of suspected al-Qa’ida terrorists on the “watchlist” of the Department of State and providing information to the Federal Bureau of Investigation (FBI) in proper channels. The Team also found that CTC did not forward relevant information to XXXXXX

In regard to broader issues of information sharing, the Team found basic problems with processes designed to facilitate such sharing. In particular, CTC managers did not clarify the roles and responsibilities of officers detailed to CTC by other agencies.

(S//NF)  The Malaysia Operation. Agency officers did not, on a timely basis, recommend to the Department of State the watchlisting of two suspected al-Qa’ida terrorists, Nawaf al-Hazmi and Khalid al-Mihdhar. These individuals, who later were among the hijackers of 9/11, were known by the Agency in early January 2000 to have traveled to Kuala Lumpur, Malaysia, to participate in a meeting of suspected terrorists. From Kuala Lumpur, they traveled to Bangkok. In January 2000, CTC officers received information that one of these suspected terrorists had a US visa; in March 2000,


‘ (U) As a result of a conflict of interest, the Inspector General recused himself from deliberations on the performance of Agency components and individuals relating to the KSM issue and to the strategic analysis issues discussed below. The two successive Deputy Inspectors General did participate in accountability discussions regarding analysis and all other issues.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xiii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


these officers had information that the other had flown from Bangkok to Los Angeles.

(S//NF) In the period January through March 2000, some 50 to 60 individuals read one or more of six Agency cables containing travel information related to these terrorists. These cables originated in four field locations and Headquarters. They were read by overseas officers and Headquarters personnel, operations officers and analysts, managers and junior employees, and CIA staff personnel as well as officers on rotation from NSA and FBI. Over an 18-month period, some of these officers had opportunities to review the information on multiple occasions, when they might have recognized its significance and shared it appropriately with other components and agencies. Ultimately, the two terrorists were watchlisted in late August 2001 as a result of questions raised in May 2001 by a CIA officer on assignment at the FBI.

(S//NF)  In 1998, CTC assumed responsibility for communicating watchlisting guidance in the Agency. As recently as December 1999, less than a month before the events of early January 2000, CTC had sent to all field offices of the CIA a cable reminding them of their obligation to watchlist suspected terrorists and the procedures for doing so. Field components and Headquarters units had obligations related to watchlisting, but they varied widely in their performance. That so many individuals failed to act in this case reflects a systemic breakdown-a breakdown caused by excessive workload, ambiguities about responsibilities, and mismanagement of the program. Basically, there was no coherent, functioning watchlisting program.

(S//NF) The Review Team recommends that an Accountability Board review the performance of the two Chiefs of CTC in the years between 1998 and 2001 concerning their leadership and management oversight of the watchlisting program.

(S//NF) Agency officers also failed to pass the travel information about the two terrorists to the FBI in the prescribed channels. The Team found that an FBI officer

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xiv

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


assigned to CTC on 5 January 2000 drafted a message about the terrorists’ travel that was to be sent from CIA to the FBI in the proper channels. Apparently because it was in the wrong format or needed editing, the message was never sent. On the same date, another CTC officer sent a cable to several Agency addressees reporting that the information and al-Mihdhar’s travel documents had been passed to the FBI. The officer who drafted this cable does not recall how this information was passed. The Team has not been able to confirm that the information was passed, or that it was not passed. Whatever the case, the Team found no indication that anyone in CTC checked to ensure FBI receipt of the information, which, a few UBL Station officers said, should have been routine practice.

(S//NF) addressees cables reporting that al-Hazmi and another al-Qa’ida associate had traveled to the United States. They were clearly identified in the cables as “UBL associates.” The Team has found no evidence, and heard no claim from any party, that this information was shared in any manner with the FBI or that anyone in UBL . Station took other appropriate operational action at that time.

(S//NF) In the months following the Malaysia operation, the CIA missed several additional opportunities to nominate al-Hazmi and al-Mihdhar for watchlisting; to inform the FBI about their intended or actual travel to the United States; and to take appropriate operational action. These included a few occasions identified by the Joint Inquiry as well as several others.

(S//NF)   The consequences of the failures to share information and perform proper operational followthrough on these terrorists were potentially significant. Earlier watchlisting of al-Mihdhar could have prevented his re-entry into the United States in July 2001. Informing the FBI and good operational followthrough by CIA and FBI might have resulted in surveillance of both al-Mihdhar and al-Hazmi. Surveillance, in turn, would have had the potential to yield information on flight training, financing, and links to others who were complicit in the 9/11 attacks.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xv

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


The Team recommends that an Accountability Board review the performance ofXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

for failing

to ensure that someone in the Station informed the FBI and took appropriate operational action regarding al-Hazmi in March 2000. In addition, the Team recommends that the Accountability Board assess the performance of the latter three managers for failing to ensure prompt action relevant to al-Hazmi and al-Mihdhar during several later opportunities between March 2000 and August 2001.

(U) Broader Information Sharing Issues. The Joint Inquiry charged that CIA’s information-sharing problems derived from differences among agencies with respect to missions, legal authorities, and cultures. It argued that CIA efforts to protect sources and methods fostered a reluctance to share information and limited disclosures to criminal investigators. The report also alleged that most Agency officers did not focus sufficiently on the domestic terrorism front, viewing this as an FBI mission. The 9/11 Review Team’s findings are similar in many respects, but the Team believes the systemic failures in this case do not lie in reluctance to share. Rather, the basic problems were poor implementation, guidance, and oversight of processes established to foster the exchange of information, including the detailee program.

CTC and UBL Station had on their rosters detailees from many different agencies, including the FBI, NSA, Federal Aviation Administration , and State Department. The manner in which these detailees were managed left many of them unclear about the nature of their responsibilities. Many CIA managers and officers believed the detailees were responsible for conveying information to their home agencies, while most of the detailees maintained that they were working as CTC officers and had neither the time nor the responsibility to serve as links to their home agencies. The Team found, at a minimum, that there were fundamental ambiguities about the responsibilities of the detailees as they related to information sharing, and that these responsibilities were never delineated explicitly or in

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xvi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


writing. The Team recommends that an Accountability Board review the performance of the two Chiefs of CTC during the years before 9/11 concerning their oversight of the Center’s practices in management of the detailee program.

(U) See the Team’s discussions of Factual Finding 5b (The Watchlisting Failure) and Systemic Findings 9 (Information Sharing Within the IC) and 10 (Information Sharing with Non-IC Members) for elaboration on these issues.

(U) Strategic Analysis

The Team, like the JI , found that the IC’s understanding of al-Qa’ida was hampered by insufficient analytic focus, particularly regarding strategic analysis. The Team asked three individuals who had served as senior intelligence analysts and managers to conduct an independent review of the Agency’s analytic products dealing with UBL and al-Qa’ida for the period from 1998 to 2001 and assess their quality. They found that, while CTC’s tradecraft was generally good, important elements were missing. Discussion of implications was generally weak, for example. Most important, a number of important issues were covered insufficiently or not at all. The Team found:

    • No comprehensive strategic assessment of al-Qa’ida by CTC or any other component.
    • No comprehensive report focusing on UBL since 1993.
    • No examination of the potential for terrorists to use aircraft as weapons, as distinguished from traditional hijackings.
    • Limited analytic focus on the United States as a potential target.
    • No comprehensive analysis that put into context the threats received in the spring and summer of 2001.
APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xvii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


That said, CTC’s analytic component, the Assessments and Information Group (AIG), addressed aspects of these issues in several more narrowly focused strategic papers and other analyticproducts.

J,Sf The personnel resources of AIG were heavily dedicated to policy-support and operational-support activities. Analysts focused primarily on current and tactical issues rather than on strategic analysis. In the two years prior to 9/11, the Directorate of Intelligence’s

raised with CTC managers the need to dedicate some proportion of the analytic work force to strategic analysis, as was the practice in many DI offices. In early 2001, the DCI specifically directed CTC to establish a strategic analysis unit within AIG. The Chief of AIG had for some time been aware of the need to strengthen the analytic work force and was working to do so. The strategic analysis unit was formed in July 2001; as of late July, it was manned by XXXXXX analysts.

(S/NF) he Team found that the National Intelligence Council (NIC) addressed the al-Qa’ida threat to only a limited extent. The NIC produced a National Intelligence Estimate on the terrorist threat to the United States in 1995 and an update in 1997. It did not produce a similar, comprehensive assessment from that point until after 9/11, although preparation of such a product was underway, with a CTC drafter, in the early months of 2001 and was being edited as of 9/11.

(U) See Team discussions of Factual Findings 2 (Signs of an Impending Attack), 3 (The Threat to the United States), and 4 (Aircraft as Weapons) and Systemic Finding 5 (Strategic Analysis) for further information on these topics.

(U) Operations (Unilateral and Liaison)

(S/NF) The Joint Inquiry charges that CIA did not effectively develop and use human resources to penetrate al-Qa’ida’s inner circle, thus significantly limiting the IC’s

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xviii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


ability to acquire actionable intelligence before 9/11. The report argues that this lack of sources resulted from an excessive reliance on foreign liaison services and walk-ins (sources who volunteer); a focus on disruption and capture rather than collection; and adherence to the dirty asset rules (guidelines that restricted the recruitment of sources who had committed certain proscribed acts).

The Review Team did not find that CIA’s reliance on liaison for collection was excessive but did find thatXXXXXX this reliance was not balanced with a strong focus on developing unilateral assets. The Team did not find that CIA reliance on walk-ins was misguided XXXXXXX XXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

‘Although the CIA focused its al-Qa’ida operations on Afghanistan, possibly limiting its ability to focus elsewhere, the Team believes that this approach was reasonable and that its purpose was collection on al-Qa’ida as well as disruption of al-Qa’ida’s activities. While

agreeing that the dirty asset rules may have created a climate that had the effect of inhibiting certain recruitment operations, the Team is unable to confirm or determine the extent of the impact. Finally, the Team found that several operational platforms XXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

were not effectively engaged in the battle against al-Qa’ida. In the case of XXXX this reflected the weakness of the program itself. In the case XXXXX it reflected CTC’s focus on Afghanistan and the priority o its attempts to penetrate al-Qa’ida’s inner circle.

(S//NF) The Team found that the CIA’s relations with foreign liaison services were critical to its ability to disrupt al-Qa’ida and thwart some terrorist attacks on the United States. While the capabilities and cooperation of liaison services were uneven, the program itself did not detract from CIA’s efforts to mount its own unilateral operations. The Team did raise serious questions about whether CTC prior to 9/11 had made the most effective use of  XXXXXXXXX liaison services in its operations against al-Qa’ida. XXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xix

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


XXXXXXXXXXXXXXXX

Nevertheless, the Team observes that the complicated dynamics of liaison relationships, including lack of common goals and counterintelligence problems, suggest that CTC     managers made reasonable judgmentsXXXXXXXXXXXXXXXX

The Joint Inquiry particularly criticized CIA for the conduct of its operational relationship XXXXXXXXXXXXXX

It noted that CIA had unsuccessfully pressed XXXXXX

authorities for additional information on individuals later identified as associates of some of the hijackers. It placed some of the blame for this on CIA’s decisions. XXXXXXXXXXX

XXXXXXXXXXXXXXXXXX The Team also found that CIA was unable to acquire the information cited by the JI but found that it made repeated efforts to do so and that its lack of success was the result of a difficult operating environment and limited cooperation on the part of’ XXXXXX. The Team concluded that the decisions made with respect to XXXXXXXX were reasonable.

(S//NF) The Joint Inquiry also argued that both the FBI and CIA had failed to identify the extent of support from Saudi nationals or groups for terrorist activities globally or within the United States and the extent to which such support, to the extent it existed, was knowing or inadvertent. While most of the JI discussion on the Saudi issue dealt with issues involving the FBI and its domestic operations, the report also XXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXX The Team found that a significant gap existed in the CIA’s understanding of Saudi extremists’ involvement in plotting terrorist attacks. The primary reasons for this gap were the difficulty of the task, the hostile operational environment, and’XXXXXXXXXXXXXXXXX

(S//NF) The Team also found, however, that UBL Station and  XXXXX were hostile to each other and working at cross purposes over a period of years before 9/11. The Team cannot measure the specific impact of this counterproductive behavior. At a minimum, however, the Team found that organizational tensions clearly complicated

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xx

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


and delayed the preparation of Agency approaches XXXXXXXXXXX XXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX(thus negatively affecting the timely and effective functioning of the exchange with  XXXXXXX on terrorism issues.

(U) See the Team’s discussions of Systemic Findings 11 (HUMINT Operations Against Al-Qa’ida) and 15 (Reliance on Foreign Liaison), Factual Finding 5h (The Hijackers’ Associates in Germany), and Related Finding 20 (Issues Relating to Saudi Arabia) for additional information.

(U) Covert Action

(91 The Joint Inquiry charged that US policymakers had wanted Usama Bin Ladin killed as early as August 1998 and believed CIA personnel understood that. However, the government had not removed the ban on assassination and did not provide clear direction or authorization for CIA to kill Bin Ladin or make covert attacks against al-Qa’ida0

The JI said that the CIA was reluctant to Iseek authority to assassinate Bin Ladin and averse to taking advantage of ambiguities in the authorities it did receive that might have allowed it more flexibility. The JI argued that these factors shaped the type of covert action the CIA undertook against Bin Ladin and that, before September 11, covert action had little impact on al-Qa’ida or Bin Ladin.

The findings and conclusions of the Review Team correspond with most but not all of the JI conclusions. The Team believes that the restrictions in the authorities given the CIA with respect to Bin Ladin, while arguably, although ambiguously, relaxed for a period of time in late 1998 and early 1999, limited the range of permissible operations. Given the law, executive order, and past problems with covert action programs, CIA managers refused to take advantage of the ambiguities that did exist. The Team believes this position was reasonable and correct. Ultimately, the Team concludes the failure of the Agency’s covert action against Bin Ladin lay not in the language and interpretation of its authorities, but in the limitations of its covert action capabilities: CIA’s heavy reliance on a single

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxi

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


group of assets, who were of questionable reliability and had limited capabilities, proved insufficient to mount a credible operation against Bin Ladin. Efforts to develop other options had limited potential prior to 9/11.

XXXXXXXXXXXXXXX The Joint Inquiry states that US military officials were reluctant to use military assets to conduct operations in Afghanistan or to support or participate in CIA operations against al-Qa’ida prior to 9/11. At least in part, this was a result of the IC’s inability to provide the necessary intelligence to support military operations. The findings of the Team match those of the JI as they relate to the CIA. The Agency was unable to satisfy the demands of the US military for the precise, actionable intelligence that the military leadership required in order to deploy US troops on the ground in Afghanistan or launch cruise missile attacks against UBL-related sites beyond the August 1998 retaliatory strikes in Afghanistan and Sudan. Differences between CIA and the Department of Defense over the cost of replacing lost Predators also hampered collaboration over the use of that platform in Afghanistan. The Team concludes, however, that other impediments, including the slow-moving policy process, reduced the importance of these CIA-military differences. The Team believes CIA handled its relationship with the US military responsibly and within the bounds of what was reasonable and possible.

XXXXXXXX The Joint Inquiry charges that the CIA failed to attack UBL’s finances and failed to work cooperatively with the Department of the Treasury to develop leads and establish links to other terrorist funding sources. The Team, likewise, found that CIA failed to attack Bin Ladin’s moneysuccessfully but finds that this was not for lack of effort.  XXXXXXXXXXXXX

XXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXX The Team also agrees that bureaucratic obstacles and legal restrictions inhibited CIA’s partnership with the Department of the Treasury.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxii

TOP SECRET XXXXXXXX                     OIG Report on CIA Accountability

HCS/SI //ORCON, NOFORN//MR           With Respect to the 9/11 Attacks


U) See the Team’s discussions of Systemic Findings 13 (Covert Action), 14 (Collaboration with the Military), and 16 (Strategy to Disrupt Terrorist Funding) for more information on these issues.

(U) Technology

XXXXXXXXXXThe Joint Inquiry charged that

technology had not been fully and effectively applied in support of US counterterrorism efforts. The Team found that significant differences existed between CIA and NSA over several critical issues. One of these involved a dispute over which agency had authorityXXXXXXXXXX

XXXXXXXXXXXXX

This dispute had not yet been resolved in September 2001. The second issue involved NSA’s unwillingness to share raw SIGINT transcripts with CIA; this made it more difficult for CTC to perform its mission against al-Qa’ida. In the late 1990s, however, NSA managers offered to allow a CTC officer to be detailed to NSA to cull the transcripts for useful information. CTC sent one officer to NSA for a brief period of time in 2000, but failed to send others, citing resource constraints. The Team recommends that an Accountability Board review the performance of the Chiefs of CTC for their failure to detail officers to NSA on a consistent, full-time basis to exploit this material in the years before 9/11.

(U) See the Team’s discussions of Systemic Findings 4 (Application of Technology) and 7 (Computer Exploitation) for discussion of the technology issue.

APPROVED FOR RELEASE TOP SECRETDATE: AUG 2007      June 2005 xxiii

TOP-SECRET: CIA Declassifies Oldest Documents in U.S. Government Collection

The Central Intelligence Agency today declassified the United States Government’s six oldest classified documents, dating from 1917 and 1918. These documents, which describe secret writing techniques and are housed at the National Archives, are believed to be the only remaining classified documents from the World War I era. Documents describing secret writing fall under the CIA’s purview to declassify.

“These documents remained classified for nearly a century until recent advancements in technology made it possible to release them,” CIA Director Leon E. Panetta said. “When historical information is no longer sensitive, we take seriously our responsibility to share it with the American people.”

One document outlines the chemicals and techniques necessary for developing certain types of secret writing ink and a method for opening sealed letters without detection. Another memorandum dated June 14, 1918 – written in French – reveals the formula used for German secret ink.

“The CIA recognizes the importance of opening these historical documents to the public,” said Joseph Lambert, the Agency’s Director of Information Management Services. “In fiscal year 2010 alone, the Agency declassified and released over 1.1 million pages of documents.”

The documents will be available on CIA.gov and in the CIA Records Search Tool (CREST) at the National Archives in College Park, Maryland. CREST currently houses over 10 million pages of declassified Agency documents. Since 1995, the Agency has released over 30 million pages as a result of Executive Orders, the Freedom of Information Act (FOIA), the Privacy Act, and mandatory declassification reviews.

Secret-writing-document-one

Secret-writing-document-two

Secret-writing-document-three

Secret-writing-document-four

Secret-writing-document-five

Secret-writing-document-six

 

TOP-SECRET: U.S. ESPIONAGE AND INTELLIGENCE

U.S. ESPIONAGE AND INTELLIGENCE
Aerial reconnaissance photograph of Severodvinsk Shipyard, the largest construction facility in the Soviet Union, taken by a KH4-B spy satellite on February 10, 1969.
Organization, Operations, and Management, 1947-1996


Aldrich Ames is arrested by the FBI as he leaves his house on February 21, 1994. In the aftermath of World War II, with the Cold War looming on the horizon, the United States began the process of developing an elaborate peacetime intelligence structure that would extend across a number of government departments. The operations of the U.S. intelligence community during the Cold War would range from running single agents, to marshaling the talents of thousands to build and deploy elaborate spy satellites.

The end of the Cold War brought major changes, but not the end of the U.S. government’s requirement for an elaborate intelligence structure. A number of intelligence organizations have been consolidated or altogether eliminated. New organizations have been established to provide more coherent management of activities ranging from military espionage, to imagery collection, to the procurement of airborne intelligence systems. The end of the Cold War has brought about the declassification of much information about intelligence organization and espionage activities that took place prior to the collapse of the Soviet Union.


Focus of the Collection

CIA Headquarters, Langley, VirginiaU.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 publishes together for the first time recent unclassified and newly declassified documents pertaining to the organizational structure, operations, and management of the U.S. intelligence community over the last fifty years, cross-indexed for maximum accessibility. This set reproduces on microfiche 1,174 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, representing over 36,102 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council and other organizations.

U.S. Espionage and Intelligence presents a unique look into the internal workings of America’s intelligence community. The documents gathered here shed further light on U.S. intelligence organization and activities during the Cold War, and describe the consolidation and reevaluation of the intelligence community in the post-Cold War era. They are drawn from diverse sources, including the National Archives, manuscript collections in the Library of Congress, court files of major espionage prosecutions, presidential libraries, and most importantly, Freedom of Information Act requests. The result of this effort is an authoritative documents publication which, together with the National Security Archive’s previous collection on the structure and operations of the U.S. intelligence community, The U.S. Intelligence Community: 1947-1989, published in early 1990, provides a comprehensive record of U.S. espionage and intelligence activities since World War II.

U.S. Espionage and Intelligence provides a wealth of information and documentation on key aspects of intelligence organization and operations during and after the Cold War, including such extraordinary topics as:

  • the evolution of the CIA
  • the development and operation of key reconnaissance systems (SR-71, CORONA)
  • the consolidation of Defense Department intelligence
  • intelligence performance during the Persian Gulf War
  • damage assessments of Aldrich Ames’ espionage activities

Significance of the Collection

The U.S. intelligence community has played a key role in advising presidents from Harry Truman to Bill Clinton on the intentions and activities of the Soviet Union, as well as of other nations. It also came to absorb a significant portion of the federal budget, reaching an approximate high of $30 billion in the late 1980s.

U.S. Espionage and Intelligence allows scholars direct access to the newly declassified, detailed primary documents that contain the history of the military, diplomatic, and intelligence components of the Cold War, and which go far beyond what is available in secondary sources. This new information is essential for reaching an accurate understanding of what was happening behind the scenes and how it related to the more public aspects of Cold War policy and operations.

The material contained in this set concerning the post-Cold War era is crucial in assessing the intelligence community’s performance in critical areas such as the Persian Gulf War and the Aldrich Ames case. The material is also vital in understanding the evolution of the intelligence community since the end of the Cold War and its possible future–for that evolution may significantly influence the ability of the intelligence community to deal with critical threats such as proliferation of weapons of mass destruction and terrorism.

One-Stop Access to Critical Documents

It would take a monumental effort, as well as many thousands of dollars, to duplicate the information contained in this collection. U.S. Espionage and Intelligenceallows a researcher– whether interested in the CIA, military intelligence, intelligence performance in the Persian Gulf War, or post-Cold War intelligence reform–to use one source at one location to access the thousands of pages of declassified material on the U.S. intelligence community available in this set.

Through U.S. Espionage and Intelligence the researcher gains access to a wide variety of documents: internal histories of the CIA and a variety of military intelligence organizations; program histories of the SR-71 and CORONA; director of central intelligence and Department of Defense directives establishing organizations such as the National Reconnaissance Office and the National Imagery and Mapping Agency; plans for the consolidation and reform of Defense intelligence organizations after the Cold War and memoranda implementing the reforms; and assessments of intelligence community performance in a number of areas.

In-depth Indexing Makes Every Document Accessible

The National Security Archive prepares extensive printed finding aids for its collections. In- depth indexing offers users remarkable ease and precision of access to every document in the set. The printed Index provides document-level access to subjects, individuals, and organizations, and represents a major research contribution in itself. Important transactions within each document are indexed individually using a controlled subjects vocabulary.

The Guide includes an essay, events chronology, glossaries of key individuals, organizations, and terms, document catalog, and a bibliography of secondary sources.

Research Vistas

With its depth of documentary detail, the collection enables researchers to explore

  • U.S. intelligence performance
  • Cold War history
  • evolution of the U.S. intelligence community and its components
  • U.S. intelligence collection activities

The Collection is a Necessity For:

  • Scholars and students of
    • intelligence
    • national security organization and operations
    • Cold War history
  • Journalists
  • Librarians and bibliographers
  • Concerned citizens

Sample Document Titles

01/15/62 Legal Basis for Cold-War Activities, Lawrence Houston, [Classification Excised] Memorandum

03/27/64 Directive 5105.23, National Reconnaissance Office, Department of Defense, Top Secret Directive 05/23/67 Report on Plots to Assassinate Fidel Castro, Central Intelligence Agency, Secret Memorandum

07/00/73 Allen Welsh Dulles as Director of Central Intelligence, 26 February 1953-29 November 1961, Central Intelligence Agency, Top Secret Biographic Sketch

00/00/82 History of the Navy HUMINT Program, United States Navy, Top Secret History

03/15/91 Plan for Restructuring Defense Intelligence, Assistant Secretary of Defense for Command, Control, and Communication Intelligence, Secret Report

01/06/92 Task Force Report on Greater CIA Openness, Director of Central Intelligence, [Classification Excised] Memorandum

06/01/92 DCID 2/9, Management of National Imagery Intelligence, Director of Central Intelligence, Secret Intelligence Directive

09/00/92 Appendixes A, B, and C to the Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence, National Reconnaissance Program Task Force, Secret Report

12/18/92 Directive 5200.37, Centralized Management of Department of Defense Human Intelligence (HUMINT) Operations, Department of Defense, [Classification Unknown] Directive

08/00/93 Intelligence Successes and Failures in Operations Desert Shield/Storm, House Committee on Armed Services, [Classification Unknown] Report

01/21/94 A Description of Procedures and Findings Related to the Report of the U.S. Environmental Task Force, King Publishing, Paper

12/07/95 Statement of the Director of Central Intelligence on the Clandestine Services and the Damage Caused by Aldrich Ames, Director of Central Intelligence, Statement

03/01/96 Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Report

12/19/96 United States of America v. Harold J. Nicholson, Superseding Indictment, U.S. District Court, Eastern District of Virginia, Indictment

Overview

Title
U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996

Content
Reproduces on microfiche 1,174 U.S. government records totaling 36,102 pages of documentation concerning the organizational structure, operations, and management of the intelligence community from World War II to the present.
Materials were identified, obtained, assembled, and indexed by the National Security Archive.

Series
The Special Collections

Arrangement
Microfiche are arranged chronologically. For ease of use, each document bears a unique accession number to which all indexing is keyed.

Standards
The documents are reproduced on 35mm silver halide archivally permanent positive microfiche conforming to NMA and BSI standards. Any microfiche found to be physically substandard in any way will be replaced free of charge.

Indexing
A printed Guide and Index accompanies the microfiche collection. The Guide contains an events chronology, glossaries, chronological document catalog and a bibliography of secondary sources. The Index provides in-depth, document level access to subjects and individuals.

Date of Publication
April 1997


U.S. Espionage and Intelligence Project Staff

Project Director

Dr. Jeffrey T. Richelson, project director, is a senior fellow at the National Security Archive and coordinates the Archive’s projects on U.S. policy toward China and ongoing documentation on U.S. intelligence issues. He previously edited the Archive’s collections on presidential national security documents, the history of the U.S. intelligence community, and the military uses of space. A former associate professor at American University, he received his Ph.D. in political science from the University of Rochester. Among his many books are Sword and Shield: Soviet Intelligence and Security Apparatus (1986), American Espionage and the Soviet Target (1988), America’s Secret Eyes in Space (1990), and A Century of Spies: Intelligence in the Twentieth Century (1995). His articles have appeared in a wide variety of professional journals and in publications ranging from Scientific American to the Washington Post. He is a regular commentator on intelligence and military issues for national television and radio.

Project Staff

Michael Evans, Research Assistant
Jane Gefter, Research Assistant
Michael Watters, Research Assistant

U.S. Espionage and Intelligence Advisory Board

Christopher Andrew, Corpus Christi College, University of Cambridge author, For the President’s Eyes Only

Loch Johnson, Department of Political Science, University of Georgia author, Secret Agencies: U.S. Intelligence in a Hostile World

David Wise, author, Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

Praise for U.S. Espionage and Intelligence, 1947-1996

“Serious students of the structure and operations of American intelligence rely on the work of the National Security Archive. The new collection of intelligence documents, compiled for the Archive by Jeffrey T. Richelson, helps to pierce the labyrinth.”

David Wise
Author of Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

“An invaluable supplement to the National Security Archive’s previous collection, The U.S. Intelligence Community 1947-1989, this brings the most recently declassified documents to the reader. Jeffrey Richelson’s useful introduction also serves to detail changes that have occurred in the structure of the U.S. espionage establishment.”

John Prados
Author of Presidents’ Secret Wars