International counter-terrorism activities of the CIA - Biblioteka.sk

Upozornenie: Prezeranie týchto stránok je určené len pre návštevníkov nad 18 rokov!
Zásady ochrany osobných údajov.
Používaním tohto webu súhlasíte s uchovávaním cookies, ktoré slúžia na poskytovanie služieb, nastavenie reklám a analýzu návštevnosti. OK, súhlasím


Panta Rhei Doprava Zadarmo
...
...


A | B | C | D | E | F | G | H | CH | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

International counter-terrorism activities of the CIA
 ...
Seal of the CIA

After the Central Intelligence Agency lost its role as the coordinator of the entire United States Intelligence Community (IC), special coordinating structures were created by each president to fit his administrative style and the perceived level of threat from terrorists during his term.

The US has a different counter-terrorist structure than many of its close allies such as Australia, Canada, France, and the United Kingdom. Each has a structure that fits its particular legal system and culture. A contentious issue is whether there needs to be a domestic intelligence service separate from the FBI, which has had difficulty in breaking away from its law enforcement roots and cooperating with other intelligence services.[1]

The National Counterterrorism Center (NCTC) is no longer in the CIA proper, but is in the Office of the Director of National Intelligence (ODNI). The NCTC, however, contains personnel from the CIA, FBI, Department of Justice, and from other members of the IC. A counterterrorism center did exist in the CIA before the NCTC was established.

Given the restrictions of the National Security Act of 1947, which created the CIA but strictly forbade it from having any domestic police authority, the role of the CIA still has multiple dimensions. The Directorate of Operations (DO) of the CIA can infiltrate or otherwise gain human intelligence (HUMINT) from terrorist organizations, their supporters, or from friendly foreign intelligence services. The NCS has a covert operations capability that, possibly in combination with military units from the United States Special Operations Command (USSOCOM), may take direct military action against terrorist groups outside the United States.

The key CIA counter-terror partner is the FBI, which has the domestic operational responsibility for counter-terrorism, which includes both domestic intelligence collection and domestic police work. In the highly decentralized police system of the United States, the FBI also provides liaison and operates cooperatively with state and local police agencies, as well as with relevant federal units, e.g., the United States Coast Guard, which has an important role in preventing terrorist infiltration by sea. Military units have a specialized Counterintelligence Force Protection Source Operations capability to protect their personnel and operations.

Intelligence Community view of terrorism

The United States Intelligence Community had dealt with terrorism long before the September 11, 2001 attacks, including support of guerrillas against the Soviets in Southeast Asia, and other places where the guerrillas' methods may have included terror. In Asia, Latin America, and Africa, the US worked with various foreign governments to suppress terrorism. While government research suggests personality traits that may be common to a substantial number of terrorists, terrorism has few other constants. It has taken place on every continent except Antarctica.

In all these cases, intelligence support from the CIA was required. In some of them, clandestine intelligence collection and covert action by CIA personnel, or those they sponsored, dealt with terrorists and performed counter-terrorist roles.

Many studies of the analysis of, and countermeasures to, terrorism remain classified. Declassified CIA documents on terrorism date back to the late 1970s. According to a 1979 report Western Europe often had opposing terrorist groups in the same conflict at that time, such as nationalists and separatists in Northern Ireland, Spanish nationalists and Basque separatists in Spain and others like them in Turkey.[2] Transnational terrorism was still unusual, although the report noted that the Basque group ETA was active in France as well as Spain.

There are relevant observations from government reports by researchers who have various levels of access into the IC, including the Federal Research Division (FRD) and Congressional Research Service of the Library of Congress. A 1999 FRD study examined some changes from terrorists of the past, especially the emergence of terrorist acts carried out by individuals and members of small, ad hoc groups largely unknown to security organizations.[3] Tactics, as well as sources, had changed, with the greater use of suicide attacks and attacks by women and children.

A very significant concern has been the possible use by terrorists of weapons of mass destruction (WMD).

Weapons of mass destruction

Terrorists have already made multiple attacks using WMD, such as chemical attacks by Aum Shinrikyo.[further explanation needed] A 1996 CIA presentation reviewed the history to date, including Iraq's (now defunct) programs.[4]

Researchers for a 1999 General Accounting Office study had classified access, and concluded that terrorists could use some chemicals like chlorine with relative ease for an attack, while other agents, chemical and biological, would require greater sophistication. [5]

Collection approach

HUMINT

One of the biggest challenges in dealing with relatively small terrorist groups is that the members are usually known to one another, or at least there is a chain of individuals that can vouch for a recruit. These social bonds have led to the refinement of the clandestine cell system in such groups. The combination of familiarity and compartmentalization make it extremely difficult to introduce human agents to the groups; it is more likely that human intelligence can be gained by subverting someone who is already a member, or perhaps is indirectly associated (e.g., a banker or arms dealer).

Efforts to use HUMINT operations with non-official cover, especially in the areas outside the groups' staging areas, have been disappointing.[6] Stepped-up efforts to use non-official cover, especially in Europe, began by creating covers in investment banks and consulting firms. Only several years later was it realized that terrorists would have little to do with such organizations. Another realization was that, even with excellent cover, HUMINT successes would be unlikely to recruit people deep inside the terrorist cells.

Where HUMINT had more potential, and where the cover organizations needed to change to help find appropriate targets, was on the fringes of the terrorist organizations, either groups from which the group would need goods or services, or from people with awareness of the groups but not supporting them. For example, there are reports that 15 cargo ships are linked to al-Qaeda,[7] whose activities at port might draw the attention of security officials, or even low-level dockworkers or craftsmen.[8]

Another potential target could be moderate Muslims that do not want to take up an overt role against jihadists, but could supply information. The cover for approaching such persons could be any of a wide range of businesses and institutions.[vague]

Foreign specialists in explosives, WMD, and other warfare methods might be noticed by the CIA in their countries of origin. By tracking their movements, the specialists-for-hire might lead to trusted persons within the groups. Once a member is identified, other intelligence collection methods could be directed at his communications, surveillance of his home and place of work, etc.

There has been significant controversy, without there being classified Congressional views, over the use of black sites for interrogating suspects, as well as the Guantanamo base. A separate role is played by regional Counterterrorist Intelligence Centers.

SIGINT

Signals intelligence, or SIGINT, is a common tool in espionage, although it has been hard to apply to anti-terrorism activities. The National Security Agency (NSA), the organization formally responsible for SIGINT within the United States intelligence community, was used to targeting conventional military communications systems, while terrorists lacked dedicated communications systems, confronting the NSA with the prospect of "picking out the needles of terrorist transmissions in the haystack".[9] While some information has been gained, SIGINT is only effective against cells if the group is unaware they are being monitored. Once known communication methods have been compromised, terrorists switch to other means.[10] Terrorists may employ various countersurveillance techniques, including the use of non-electronic messengers to avoid interception, employ encrypted message systems, or exploit public Internet connections such as Internet cafes.[11]

The actual interception of messages is probably not done by the CIA, but by NSA or possibly Service Cryptologic Elements (SCE): tactical SIGINT detachments attached to military tactical units. Important communications intercepts have been achieved, with the results clearly available to the CIA. There are cases, however, where a joint CIA-NSA organization places clandestine intercept equipment.[12] The National Security Archive commented, "In 1987, Deputy Director for Science and Technology Evan Hineman established ... a new Office for Special Projects. Concerned not with satellites, but with emplaced sensors – sensors that could be placed in a fixed location to collect signals intelligence or measurement and signature intelligence (MASINT) about a specific target. Such sensors had been used to monitor Chinese missile tests, Soviet laser activity, military movements, and foreign nuclear programs. The office was established to bring together scientists from the DS&T's Office of SIGINT Operations, who designed such systems, with operators from the Directorate of Operations, who were responsible for transporting the devices to their clandestine locations and installing them."[13]

While communications intercepts are usually highly classified, they have come up in US Congressional testimony on terrorism. For example, an FBI official testified with regard to the 1998 United States embassy bombings in Kenya and Tanzania, which took place so closely in time that the terrorist teams can reasonably be assumed to have coordinated their operations in near real-time.[14]

There was independent proof of the involvement of Bin Laden, Al-Qaeda and EIJ Egyptian Islamic Jihad in the bombings. First, the would-be suicide bomber, al-Owhali, ran away from the bomb truck at the last minute and survived. However, he had no money or passport or plan by which to escape Kenya. Days later, he called a telephone number in Yemen and thus arranged to have money transferred to him in Kenya. That same telephone number in Yemen was contacted by Osama Bin Laden's satellite phone on the same days that al-Owhali was arranging to get money.

They have also been revealed in legal proceedings against terrorists, such as United States v. Osama bin Laden et al., indictment, Nov. 4, 1998, and updates.[15]

IMINT

The sort of imagery intelligence (IMINT), often from satellites, used against nation-states is of limited use in tracking the movement of groups of small size and little physical infrastructure. More success has come from unmanned aerial vehicles (UAV), which are hard to see and hear, to do such things as follow cars, or loiter above a building, photographic traffic in and out, often with low-light or infrared sensors that work in apparent darkness. For instance, the CIA experimented with the MQ-1 Predator, a small remote-controlled reconnaissance aircraft, to try to spot Bin Laden in Afghanistan, producing probable sightings of the al-Qaeda leader after a series of flights in autumn 2000, overseen by CTC officials and flown by USAF drone pilots at the CIA's Langley headquarters.[16]

FININT

Financial intelligence – "following the money" – often can trace the organization behind a particular attack. Once that organization is identified, value transfers from it can point to other operational cells. The term value includes cash and negotiable documents, but also materials such as gems, opium and drugs, and precious metals. The Treasury Department's Office of Foreign Assets Control (OFAC) has the power to "freeze" the accounts of organizations suspected of funding terrorist activities.

Terrorist groups use three types of financing, which are increasingly difficult to track by U.S. intelligence, including the CIA:

  1. Charities, which use both conventional financial institutions and informal value transfer systems,
  2. Informal value transfer systems such as hawala and hundi
  3. "Commodities- or trade-based money laundering includes the smuggling of bulk cash and the evasion of federal reporting requirements used to track money laundering with commodities such as diamonds, precious metals, gold, and tobacco."[17] The CIA is most likely to gain awareness of commodities and trade transfers outside the United States.

According to the Center for Defense Information (CDI), intelligence agencies help OFAC build its "freeze list" by sending it lists of individuals and organizations believed to be associated with terror,[18] but not all such suspects go onto the freeze list, since the intelligence community can use financial transactions as a means of tracking them.

One of the challenges of anti-terrorist FININT is that surveillance of transactions only works when the value transfers go through conventional, regulated banks and other financial institutions. Many cultures use informal value transfer systems, such as the hawala widely used in the Middle East and Asia, where value is transferred through a network of brokers, who operate with funds often not in banks, with the value transfer orders through personal communications among brokers, who know one another and operate on a paperless honor system.

A study from the Institute for Defence Studies and Analyses in India describes "narco-terrorism" as "the nexus between narcotics and terrorism ... It is recognised as one of the oldest and most dependable sources of terrorist financing, primarily because of the magnitudes of finance involved in both the activities."[19] The study indicates that informal value transfer systems, known "... India it is known as hawala, in Pakistan as hundi, in China fei qian (flying money), in Philippines as black market peso exchange" are important means of transferring funds to terrorist organizations.

Some hawala brokers have placed some of their reserve funds in banks, where they have been frozen by OFAC. On Nov. 7, 2001, the Treasury Department made raids and freezes to shut down two hawala networks, Al Barakaat and Al Taqwa, both believed to be funneling millions of dollars abroad from the United States to support terrorist activities. In addition to the placement of 62 people and groups associated with the two organizations on the asset freeze list, FBI and U.S. Customs agents raided the two networks' offices in six U.S cities.[18]

According to CDI,

The founder of Al Barakaat, Shaykh Ahmed Nur Jimale, is believed to be an associate of bin Laden who invested in and is still an owner of the organization. Al Barakaat is a financial, telecommunications and construction group headquartered in Dubai and operating largely out of Somalia. It was founded in 1989 and operates in 40 countries around the world. ... The Treasury Department said the raids on Nov. 7 resulted in the blocking of approximately $971,000 in Al Barakaat assets.[18]

Hawala plays an important role in the Afghan drug economy, and in drug trade worldwide.

Analytic approach

The National Security Archive makes the point that the US government and intelligence community did not suddenly come upon terrorism on September 11, 2001.[20] Understanding the IC and political perceptions of the past help predict the future, identify weaknesses, and develop strategies.

... at the beginning of the Reagan administration, Secretary of State Alexander Haig announced that opposition to terrorism would replace the Carter administration's focus on advancing human rights throughout the world. Although opposition to terrorism never really became the primary focus of the Reagan administration or successor administrations, each of these paid significant attention to the issue and produced many important documents that shed light on the policy choices faced today. Terrorism has been the subject of numerous presidential and Defense Department directives as well as executive orders. Terrorist groups and terrorist acts have been the focus of reports by both executive branch agencies (for example, the State Department, CIA, and FBI) as well as Congressional bodies – including the Senate Select Committee on Intelligence and the Congressional Research Service. The General Accounting Office has also produced several dozen reports evaluating the U.S. government's ability to prevent or mitigate terrorist strikes ...

The CIA's Directorate of Intelligence produces analytic products that can help identify terrorist groups, their structure, and plans. These may benefit from signals intelligence from the National Security Agency (NSA), from imagery intelligence from the National Reconnaissance Office (NRO) and National Geospatial-Intelligence Agency (NGA), from the Financial Crimes Enforcement Network (FinCEN) of the Department of the Treasury, and from other specialized agencies.

Regular research

The Department of State, with CIA assistance, prepares an annual volume called Patterns in Terrorism. FBI reporting is more irregular, but does do problem descriptions as well as specific reports.[21]

While the Congressional Research Service technically is prohibited from making its reports automatically available to the public, several legislative efforts are underway to change this, and in practice, its reports are often Internet-accessible within a few days of issue, typically on the Federation of American Scientists website.

Virtual station and cross-functional team research

While the initial implementation, the Bin Laden Issue Station, did not work well, there has been an Intelligence Community effort to avoid the problems of stovepiping, especially where it involves lack of communication between analysts and operators. There is a continuing controversy about ensuring Federal Bureau of Investigation (FBI) information gets to analysts; the FBI culture has been extremely decentralized, so "dots to be connected" in two field offices were not shared; this was particularly relevant in the aftermath of the September 11 attacks.

The overall problems of stovepiping and encouraging cross-functional teams, in the context of terrorism, has been addressed by, among other groups, the House Intelligence Committee.[22] One of their chief recommendations was:

FBI's main problem going forward is to overcome its information sharing failures. "Ensuring adequate information sharing" should be communicated throughout the Bureau as the Director's top priority, and a clear strategy incorporating the personnel dimension, the technical dimension, and the legal dimension of the information-sharing problem should be developed and communicated immediately.

Their recommendations for the CIA included:

CIA leadership must ensure that HUMINT collection remains a central core competency of the agency, and should develop additional operational tools, in conjunction with other appropriate agencies (FBI, etc,), penetrate terrorist cells, disrupt terrorist operations and capture and render terrorists to law enforcement as appropriate. More core collectors need to be put on the streets.

ClA should ensure that a management structure is in place to steward the multiyear investments needed to build new platforms to collect on terrorist targets. CIA must also ensure sufficient numbers of unilateral CT slots in field stations and bases.

CIA should lead an effort to improve watchlisting to ensure that all relevant agencies, including FBI, Homeland Security, and others, have access to a common database of up-to-date terrorist person-related data collected by US government agencies and other appropriate sources. The creation of a terrorism watchlisting unit at CIA may be a useful first step.

Require all new case officers and analysts to achieve a "level 3" language proficiency prior to initial deployment, and devise a mechanism for ensuring language skill maintenance is incentivized and directly tied to performance evaluation.

CIA should take immediate and sustained steps to dramatically improve all aspects of its CT training program. Establish structures in CTC (Counterterrorism Center) in such a manner that ensures a normal career path for these officers. Incorporate counterterrorism-related skill development in all appropriate training for case officers and analysts.

Internal policies, such as CTC's 'no threshold' threat reporting policy, should be reviewed and modified to ensure that consumers are getting the most reliable reporting and that sufficient analysis is applied to that product in advance of its wholesale dissemination, wherever possible.

The 1995 guidelines must be rescinded immediately, and replaced with new guidelines that balance concerns about human rights behavior and law breaking with the need for flexibility to take advantage of opportunities to gather information on terrorist activities, as required by law.

Under Porter Goss, for a variety of reasons, including innovation, the CIA has proposed moving its National Resources Division, concerned with issues in the U.S., to Denver, letting it work more freely than under Headquarters bureaucracy.[23] Some officers[who?] believe this is a bad idea and would hurt information sharing, the critical problem with the FBI. With regard to the prohibition on the CIA having any domestic law enforcement powers:

... FBI is having significant problems developing its own domestic intelligence branch and the CIA is generally viewed across the intelligence community as more experienced and skilled at handling foreign informants who eventually return abroad, where the CIA has the lead in intelligence gathering and operations.

Regional analytic operations

The CIA (and its predecessors) has a long history of placing selected collection and analytic functions (e.g., Foreign Broadcast Information Service intercept locations) in places where they can coordinate with regional intelligence agencies, and also have access to people with native-level understanding of languages and culture.

Intelligence and terrorism in the 1970s

While there were no major foreign terror actions in the US during the early part of the decade, there were actions against US personnel and facilities in other countries. Terrorism was definitely present as a worldwide phenomenon, and the CIA produced regular reports on it.[citation needed]

1972

In the context of nationalist terror, multiple Irish Republican Army bombings, starting on "Bloody Friday" (July 21), took place in Northern Ireland.[citation needed]

The best known act of terrorism in 1972 was the kidnapping and killing of Israeli Olympic team members, in the Munich massacre by the Palestinian group, Black September. West German response was ad hoc and poorly executed, resulting in the deaths of all hostages, several terrorists, and a German police officer. This incident focused world attention on the need for early warning, hostage rescue, and, with great controversy, preemptive and retaliatory attacks on terrorists.[citation needed]

1973

Black September attacked the Saudi Arabian Embassy in Khartoum, Sudan. The terrorists killed the US ambassador, Cleo Noel and other diplomats.[citation needed]

In Guadalajara, Mexico, the People's Revolutionary Armed Forces killed the US consul general.[citation needed]

1974

At Los Angeles International Airport (LAX), 17 people were injured and 2 were killed when a bomb exploded near the Pan Am ticket area.[citation needed]

1975

In January, Puerto Rican nationalists bombed a Wall Street bar, killing four and injuring 60; 2 days later, the Weather Underground claims responsibility for an explosion in a bathroom at the U.S. Department of State in Washington.[citation needed]

1976

The hijacking of an Air France passenger aircraft, eventually arriving at Entebbe, Uganda pointed to the need for international anti-terrorist cooperation, and also demonstrated the ability to rescue hostages at long range (i.e., the Israeli Operation Entebbe). This became a prototype for other hostage rescue forces.[citation needed]

Terrorism in the US was not necessarily directed at American organizations. For example, exiled Chilean Foreign Minister Orlando Letelier was killed by a car bomb in Washington, D.C. Subsequent investigations suggested the bombers may have had CIA ties in Chile.[24] "... in February 1976, President Gerald Ford signed Executive Order (EO) 11905 which forbade all U.S. government employees from engaging in or conspiring to engage in political assassination" (Section 5(g)).[25]

1978

Ford's EO was superseded by President Jimmy Carter's EO 12036, which tightened restrictions on intelligence agencies. The ban on assassinations was continued by President Ronald Reagan in 1981, (EO 12333, Sec 2.11) and extended to apply specifically to intelligence agencies. This ban remains in effect today, although challenges were mounted by Rep. Bob Barr, R-Ga,[25] including sponsoring the Terrorist Elimination Act of 2001.[26]

Italian Prime Minister Aldo Moro was seized by the Red Brigades and later killed, which brought additional NATO attention to the problem.[citation needed]

1979

In January, Iranian militants captured the buildings and staff of the US embassy in Tehran. A number of CIA operational documents were reconstructed.[citation needed]

In November, there was Muslim-on-Muslim violence with the seizure of the Grand Mosque in Mecca. French security forces assisted the Saudis in recapturing the building, indicating that ad hoc alliances would form for both terrorism and counterterrorism.[citation needed]

Intelligence and terrorism in the 1980s

It became increasingly obvious in the 1980s that there is no generally accepted definition of terrorism, as a unique offense. For example, many discussions of terrorism emphasize it is directed against noncombatants.

Attacks by non-state actors, such as the 1983 Beirut barracks bombing of US and French troops under UN auspices, are more problematic. The Beirut attacks are usually called "terrorism" in news reports, but if terrorism is assumed to be against noncombatants, they may not qualify. The organizers and attackers might well be categorized as illegal combatants under the Geneva Conventions, but the Conventions do not define terrorism.

During this decade, the US supported Muslim fighters against the Soviets in Afghanistan. The training and arms supplied may have helped start transnational jihadist groups.

1982

In April 1982, President Ronald Reagan signed National Security Decision Directive (NSDD) 30[27] dealing with responses to armed attacks on U.S. citizens or assets. The NSDD created a coordinating body, the Interdepartmental Group on Terrorism, to develop and assign to various executive agencies specific responsibilities when terrorist incidents occurred. The objective was to have in place, before an incident occurred, guidelines for such matters as lines of authority, intelligence responsibilities, and response training. A Special Situation Group (SSG) was established to advise the president, and lead agencies to coordinate responses were named.

  1. For international terrorist incidents outside U.S. territory, the State Department had the lead role.
  2. For incidents, the Justice Department was to be the lead agency with the Federal Bureau of Investigation (FBI) in the lead for operational response.
  3. For plane hijackings within the "special jurisdiction of the United States, the lead agency was the Federal Aviation Administration.
  4. For planning and managing public health aspects of terrorist incidents, the Federal Emergency Management Agency (FEMA) was the responsible agency.

Supporting the SSG was a Terrorist Incident Working Group with representatives from the Departments of State and Defense, the Director of Central Intelligence, the FBI, FEMA, and the National Security Staff. It was to give "direct operational support ... and to provide advice and recommendations during an incident" to the SSG.[25]

In November 1982, following the establishment of the DoD Inspector General, the Deputy Secretary of Defense directed that the Inspector General for Intelligence be redesignated as the Assistant to the Secretary of Defense (Intelligence Oversight) (ATSD (IO)). Today, the ATSD (IO) reports on Intelligence Oversight activities at least quarterly to the Secretary of Defense and, through him, to the Intelligence Oversight Board (IOB), a standing committee of the President's Foreign Intelligence Advisory Board (PFIAB).[28]

1983

The major terrorist incident was the bombing of a UN observer force in Beirut, which led to considerable rethinking of U.S. rules of engagement, the deterrent effect of a US presence, and the issue of force protection intelligence.

1983 Beirut barracks bombing

Suicide attacks in Beirut cost the lives of 241 American and 58 French soldiers, with many casualties. Often called terrorist attacks, this designation seems to be more a facet of the means of attack, and that it was carried out by non-national actors, than that it was intended to terrorize a civilian population.

Further complicating the designation is that there is no consensus on who sponsored the attacks. A US court did find Iran responsible, which would make it an attack by a nation-state on military personnel of two other nation-states. In 2001, former Secretary of Defense Caspar Weinberger stated: "But we still do not have the actual knowledge of who did the bombing of the Marine barracks at the Beirut Airport, and we certainly didn't then."[29]

Rules of engagement for the Marines were restrictive; they could not set up what would be considered today a safe perimeter against truck bombs. They carried rifles that had to be loaded before use; there were no heavier weapons that could deflect a truck or destroy its engine.[30]

The Commission termed this a terrorist attack, and raised questions about the intelligence support available to it (emphasis added):

Intelligence provided a good picture of the broad threat facing the USMNF US multinational force in Lebanon. Every intelligence agency in the national community and throughout the chain of command disseminated a great amount of analysis and raw data. Key Defense officials and the military chain of command ere alert to, and concerned with, the insights it provided them. There was an awareness of the existing dangerous situation at every level, but no one had specific information on how, where and when the threat would be carried out. Throughout the period of the USMNF presence in Lebanon, intelligence sources were unable to provide proven, accurate, definitive information on terrorist tactics against our forces. This shortcoming held to be the case on October 23, 1983. The terrorist threat was just one among many threats facing the USMNF from the many factions armed with artillery, crew served weapons and small arms.[31]

The USMNF was operating in an urban environment surrounded by hostile forces without any way of pursuing the accuracy of data in order to head off attack. The intelligence structure should be reviewed from both a design and capabilities standpoint. We need to establish ourselves early in a potential trouble spot and find new techniques to isolate and penetrate our potential enemies. Once established, our military forces (and especially ground forces) need to have aggressive, specific intelligence to give the commander the hard information he needs to counter the threats against his force. U.S. intelligence is primarily geared for the support of air and naval forces engaged in nuclear and conventional warfare. Significant attention must be given by the entire U.S. intelligence structure to purging and refining of masses of generalized information into intelligence analysis useful to small unit ground commanders.

1984

edit

In 1984, the CIA both suffered from terrorism directed at it, and also supported anti-Soviet guerrillas in Afghanistan that the Soviets considered terrorists.

Kidnapping of CIA Beirut station chief and US response authorizing preemption

edit

"NSDD 138 was the next known significant Reagan-era action. It was promulgated after the March 16, 1984 kidnapping of the Central Intelligence Agency's Beirut, Lebanon station chief, William Buckley. This NSDD, much of which remains classified, permitted both the CIA and the Federal Bureau of Investigation to form covert operations teams and to use military special operations forces to conduct guerrilla-style war against guerrillas. The NSDD reportedly permits preemptive operations, retaliation, expanded intelligence collection, and when necessary, killing of guerrillas in "pre-emptive" self-defense. States that sponsored guerrillas, or what today would generally be lumped under the term terrorists, could be targeted for operations. These included Iran, Libya, Syria, Cuba, North Korea – all identified before Sept. 11, 2001 by the State Department as state-sponsors of terrorism. Nicaragua and the Soviet Union were reportedly also on the list."[25]

Support to the Afghan resistance

edit

The CIA also channeled US aid to Afghan resistance fighters via Pakistan in a covert operation known as Operation Cyclone. It denied dealing with non-Afghan fighters, or having direct contact with bin Laden.[32] However, various authorities relate that the Agency brought both Afghans and Arabs to the United States for military training.[33][34][35]

Creation of al-Qaeda

edit

The network that became known as al-Qaeda ("The Base") grew out of Arab volunteers who fought the Soviets and their puppet regimes in Afghanistan in the 1980s. In 1984 Abdullah Azzam and Osama bin Laden set up an organization known as the Office of Services in Peshawar, Pakistan, to coordinate and finance the "Afghan Arabs", as the volunteers became known.

Azzam and Bin Laden set up recruitment offices in the US, under the name "Al-Khifah", the hub of which was the Farouq Mosque in Brooklyn's Atlantic Avenue. This was "a place of pivotal importance for Operation Cyclone".[36]

1986

edit

Foundation of the Counterterrorist Center

edit

In the mid-1980s there was a spate of terrorist activity, much of it by Palestinian organizations. In 1986 the CIA founded the Counterterrorist Center, an interdisciplinary body drawing its personnel from the Directorates of Operations, Intelligence, and other US intelligence organizations. It first got to grips with secular terrorism, but found the upcoming Islamist terror much more difficult to penetrate. In the 1990s the latter became a major preoccupation of the center.

Afghanistan and its consequences

edit

Blowback (referring to operations launched against an enemy which eventually hurt their originators) into the United States may have come from a pipeline, from Brooklyn, New York, to Peshawar, Pakistan, the gateway to joining the Afghan mujahedin. The Brooklyn end was at the Al Kifah Refugee Center, funded by Operation Cyclone, and the associated Afghan Refugee Service. The Maktab al-Khidamat ("Office of Services") was founded in Peshawar in 1984 by Abdullah Azzam and Osama bin Laden to finance and support this effort. "Cold warriors" in the CIA and US State Department looked favorably on these efforts, and considered that they should be formally endorsed and expanded, perhaps along the lines of the international brigades of the Spanish Civil War. "Bin Laden actually did some very good things", said Milton Bearden, chief of the CIA's Islamabad station in the later 1980s. "He put a lot of money in a lot of right places in Afghanistan. He never came on the screen of any Americans as either a terrific asset or someone who was anti-American." The CIA denied, however, actually assisting the "Arab-Afghans", or having direct contact with Bin Laden.[37]

Arrested in the US for the 1998 embassy bombings, was a former Egyptian soldier named Ali Mohamed (sometimes called "al-Amriki", "the American"), who is alleged to have provided training and assistance to Bin Laden's operatives. At that time, however, he was a member of the United States Army Special Forces.[36] FBI special agent Jack Cloonan calls him "bin Laden's first trainer".[38] Originally an Egyptian army captain, in the 1980s Mohamed came to the US and became a supply sergeant to the Green Berets in Fort Bragg. At the same time he was involved with Egyptian Islamic Jihad (which "merged" with al-Qaeda in the 1990s), and later with al-Qaeda itself; he boasted of fighting the Soviets in Afghanistan. He had worked for the CIA in the earlier 1980s, but the agency supposedly dropped him after he boasted of his relationship. However, Mohamed's behavior led his commanding officer, Lt. Col. Robert Anderson, to believe he was still a US intelligence asset. ("I assumed the CIA", said Anderson.[39]) In 1989 Mohamed trained anti-Soviet fighters in his spare time, apparently at the al-Khifah center in Brooklyn. He was honorably discharged from the US military in November 1989.

Another individual associated with the Brooklyn center was the "Blind Sheikh" Omar Abdel-Rahman, a leading recruiter of mujaheddin, who obtained US entry visas with the help of the CIA in 1987 and 1990.

Bin Laden's early years: terrorist financier

edit

Sometime in late 1988 or early 1989, Bin Laden set up al-Qaeda from the more extreme elements of the Services Office. However, it was not a large organization at the time; when Jamal al-Fadl (who had been recruited through the Brooklyn center in the mid-1980s) joined in 1989, he was described as Qaeda's "third member".[40]

Congressional testimony from then-DCI George Tenet speaks of knowledge and analysis of Bin Laden, from his early years as a terrorist financier to his leadership of a worldwide network of terrorism based in Afghanistan.[41]

According to Tenet, Bin Laden gained prominence during the Afghan war for his role in financing the recruitment, transportation, and training of Arab nationals who fought alongside the Afghan mujahedin against the Soviets during the 1980s. Tenet denied there had been any US government involvement with him until the early nineties.

Zdroj:https://en.wikipedia.org?pojem=International_counter-terrorism_activities_of_the_CIA
Text je dostupný za podmienok Creative Commons Attribution/Share-Alike License 3.0 Unported; prípadne za ďalších podmienok. Podrobnejšie informácie nájdete na stránke Podmienky použitia.






Text je dostupný za podmienok Creative Commons Attribution/Share-Alike License 3.0 Unported; prípadne za ďalších podmienok.
Podrobnejšie informácie nájdete na stránke Podmienky použitia.

Your browser doesn’t support the object tag.

www.astronomia.sk | www.biologia.sk | www.botanika.sk | www.dejiny.sk | www.economy.sk | www.elektrotechnika.sk | www.estetika.sk | www.farmakologia.sk | www.filozofia.sk | Fyzika | www.futurologia.sk | www.genetika.sk | www.chemia.sk | www.lingvistika.sk | www.politologia.sk | www.psychologia.sk | www.sexuologia.sk | www.sociologia.sk | www.veda.sk I www.zoologia.sk