Community > Posts By > NSACLASSIFIED
Topic:
Remembering Eagle Flight
|
|
There are three types of Blackhawks used :
The first one, US UH-60 blackhawk Helicopter is for Transport. It is ideal for loading in a bunch of paratroopers, running them over to the other side of the map and supporting them with machine gun fire. Hovering just off to the side of the flag the Blackhawk can suppress resistance all around from above allowing your paratroopers to move in and take the target. The Blackhawk hovers easily, is very stable and is quite easy to land as it has a wide footprint and is quite stable because the larger rotors allow it to compensate for its weight. It has an auto-hover feature for us button tappers. By holding down the Alt-Fire button you can hover nice and even. The only time I find this useful is for hovering and landing straight down from a hover. You can move around very slowly this way but any cyclic pitch will lower your altitude so you will have to adjust your collective anyway. I wouldn't rely on it because its only found on the Blackhawks (no pilot weapons) and you won't find it on any of the other helicopters. There's way more control when you've mastered the button tapping rhythm, which on the Blackhawk is very easy. The second one: UH-60L has Hellfire missiles you can fire at ground targets but thats it and only carries one co-pilot with you. Use this in supporting paratroopers as well by eliminating hardware threats. The missiles fire off pretty quick so you'll be doing a lot of running back to reload. The third one: UH-60Q medic chopper is able to heal people as well as resupply them (but not vehicles) and, used effectively, could turn the tide of battle. Hover over your front lines to heal people and pass out ammo packs. Pick up your injured and ferry them to the next spot where you can drop them all healed up and ready to go. Heed those pick up and medic calls, they are now talking to you directly. ------------------------------------------------- Iraqi Mi-24 (Hind) Helicopter Kept on a short leash it can be a extremely effective as its the fastest chopper out there. A hind can carry almost as many weapons as the Apache helicopter can. The Hind has a payload of 64 S-5 rockets and 4 AT-2 missiles but what you see is what you get. While you do get one missile reload in the air there is no second weapons bank for reloading the rockets. The gunner controls the autocannon in the nose and its arc of fire is a lot bigger than the Apache's. Not bad for a transport helicopter. In the latest build the Hind can transport a co-pilot and 2 passengers. The doors no longer open and there is no "exiting" with the doors closed anymore so no more repairing the Hind in flight. |
|
|
|
Topic:
Remembering Eagle Flight
|
|
actuality 16 years ago.
|
|
|
|
Topic:
Remembering Eagle Flight
|
|
I served on that mission 11 years ago..
Part of the OPS division and had the pleasure to serve with another fellows Soldier who co-Sign is BlackFive "They came to save us, and to give us dignity. Their sacrifice will remain in the minds of our children for the rest of their lives. We will teach their names to our children, and keep their names in our books of history as heroes who gave their lives for freedom." - Kurd Sheik Ahmet, April 17th, 1994 memorial service in Zakhu, Iraq In April, 1991, as part of U.N. Resolution 688, the National Command Authority commanded the US Armed Forces to conduct Operation Provide Comfort. The mission was a tough one - to provide humanitarian aid to over one million Kurdish Refugees in northern Iraq. We began with airdrops (food, clothing, tents, blankets, medicine) a few days later. General John Shalikashvili, Chairman of the Joint Chiefs of Staff, had this to say about the hard work of the Provide Comfort Soldiers and Airmen: For over 1,000 days, the pilots and crews assigned to Operation Provide Comfort flew mission after mission, totalling over 50,000 hours... To further stop Saddam from killing the Kurds, a northern No-Fly Zone was placed north of the 36th parallel. Any Iraqi aircraft would be shot down in the No-Fly Zone. The No-Fly Zone was patrolled and kept "clean" by the USAF with fighters (F-15s) being supported by command and control aircraft (AWACS). On April 14th, 1994, two Blackhawk helicopters were ready for take-off from Diyarbakir, Turkey. COL Jerry Thompson - one of the best soldiers I had evet met - was changing command (or co-command as "command" of Provide Comfort was shared with Turkey). He decided to show his replacement, COL Mulhern, the lay of the land. At 0730, COL Thompson assembled 26 people that comprised important (command group) roles for the mission. He included French, British, and Turkish commanders and laisons, and also brought along Kurdish para-military personnel and linguists. The two Blackhawks were designated Eagle-1 and Eagle-2. Their first destination was Irbil, Iraq, but they would have to make a stop in Zakhu, Iraq (where the military part of Provide Comfort operated). There were plans to visit several other areas as well. At 8:22AM, Eagle Flight departed Diyarbakir. They were headed East-Southeast for a "gate" into the No-Fly Zone. Per Standard Operating Procedure, the command group was split between Eagle-1 and Eagle-2 to ensure continuity of command if one helicopter went down. At 9:21AM, Eagle Flight called the AWACS (callsign "Cougar"). They requested and were granted permission to enter the "gate" into the the No-Fly Zone. At 9:24AM, Eagle Flight lands at Zakhu, Iraq. At 9:35AM, two USAF F-15 fighters launched from Incirlik, Turkey. They were designated Tiger-1 and Tiger-2. Tiger-1 was the lead fighter with Tiger-2 as the wingman. Tiger Flight was headed to patrol the No-Fly Zone. At 9:54AM, Eagle Flight calls the AWACS to report departure from Zakhu, Iraq, with a destination of Irbil, Iraq. At 10:12AM, Eagle Flight enters mountainous terrain. It's Identification Friend or Foe system (IFF) failed. At 10:20AM Tiger Flight passes through "gate" into No-Fly Zone. At 10:22AM Tiger Flight picks up radar contact at forty nautical miles. No IFF reading occurs. Tiger-1 reports, "Cougar, picked up helicopter tracking northwest bound." AWACS says the area should be "clean". At 10:25 AWACS responds that there are "hits there" in the No-Fly Zone - confirming Tiger Flight's radar contact. Tiger Flight makes visual contact with Eagle Flight at five nautical miles. At 10:28 Tiger-1 conducts a visual identification (VID) pass of the helicopters. "Cougar, tally 2 HINDS." HINDS are Soviet Helicopters used by the Iraqi Armed Forces. AWACS replied, "Copy two HINDS". Tiger-1 then instructed Tiger-2 to make a VID pass. Thirty seconds later Tiger-2 confirms, "Tally 2." Tiger-1 to Tiger-2, "Arm hot." At 10:30AM on April 14, 1994, Tiger-1 fired an AIM 120 (medium range air-to-air missle) at Eagle-2. Tiger-2 fired an AIM 9 (Sidewinder air-to-air missle) at Eagle-1. The missles hit Eagle Flight with deadly accuracy. Tiger-1 confirmed the hits to AWACS, "Splash two HINDS." There were no survivors.. I Make this post to honor and in Remembrance of my friends SSG Paul Barclay (SF Commo NCO) SPC Cornelius A. Bass (Eagle-1 Door Gunner) SPC Jeffrey C. Colbert (Eagle-1 Crew Chief) SPC Mark A. Ellner (Eagle-2 Door Gunner) CW2 John W. Garrett, Jr. (Eagle-1 Pilot) CW2 Michael A. Hall (Eagle-2 Pilot Command) SFC Benjamin T. Hodge (Linguist) CPT Patrick M. McKenna (Eagle-1 Pilot Command) WO1 Erik S. Mounsey (Eagle-2 Pilot) COL Richard A. Mulhern (Incoming Co-Commander) 1LT Laurie A. Piper (USAF, Intel Officer) SGT Michael S. Robinson (Eagle-2 Crew Chief) SSG Ricky L. Robinson (SF Medic) Ms. Barbara L. Schell (State Dept. Political Advisor) COL Jerald L. Thompson (Outgoing Co-Commander) British Military: MAJ Harry Shapland (Security/Intel Duty Officer) LTC Jonathan C. Swann (Senior UK Officer) French Military: LTC Guy Demetz (Senior French Officer) Turkish Army: COL Hikmet Alp (Co-Commander) LT Ceyhun Civas (Laison Officer) LT Barlas Gultepe (Liason Officer) Kurdish Partisans: Abdulsatur Arab Ghandi Hussein Bader Mikho Ahmad Mohammed Salid Said (Linguist) |
|
|
|
How many ground troops does the United States need?
Answering that question depends on your vision of the future -- specifically, the military challenges the United States will face over the next 10 to 15 years. An "old future" provides some perspective on the current debate over U.S. Army and U.S. Marine Corps "end strength" (Pentagonese for the number of active duty personnel authorized by Congress). Let's return to 1990, just before Saddam invaded Kuwait. The U.S. Army had around 750,000 soldiers on active duty; the U.S. Marine Corps had 197,000 Marines. That same year, the U.S. population broke 250 million. Today, the U.S. population is slightly over 300 million. That "old future" occurred during the final phases of the Cold War. Department of Defense budgeteers had already begun paring Cold War force structure. Though the Soviet Union hadn't officially dissolved, cost-cutters identified Cold War air wings and armored divisions as expensive legacies. Desert Storm briefly delayed the planned decline in strength. Based on "the near-term future" the Defense and Congress envisioned, the United States didn't need Cold War troop levels. However, by 1995, peacekeeping commitments began stressing the personnel system. Then, the United States entered the Balkans, and hasn't quite left yet. The Army asked for a 30,000 troop "plus up" in the fiscal year 1997 budget request to meet those personnel requirements. It was denied. The Clinton administration began using the reserves as an operational force rather than as a strategic, war-winning reserve. The Bush administration continued to do this after 9-11, nudging Army end strength from around 480,000 in 2001 to approximately 515,000 today. While that's arguably close to the 30,000 "missing" since 1996, it's a far cry from the forces on hand on Aug. 2, 1990, when Saddam's tanks were on the move. It's also proved to be inadequate to support Iraq, Afghanistan, peacekeeping operations and emergency contingencies. In December 2006, former U.S. Army Chief of Staff Gen. Pete Schoomaker told Congress that the active duty Army needed more soldiers. The Army would grow to 547,000 by 2012, adding 65,000 new soldiers over a five-year period. However, the current Army chief of staff, Gen. George Casey, said last week that the Army needs 547,000 active troops within the next three years. Secretary of Defense Robert Gates supports Casey's boost. Gates also advocates expanding the Marine Corps' active force 27,000, from 175,000 to 202,000 Marines. I know it takes time to recruit and train soldiers, making a very rapid build-up unwieldy if not unrealistic, but in my opinion Casey's request is short by 100,000 troops. Last week, the Los Angeles Times featured a discussion between Phil Carter, a Los Angeles attorney who served with the 101st Airborne in Iraq, and me on military-related issues. Carter and I agreed that a 650,000-soldier U.S. Army is a more realistic figure given personnel demands and expected commitments. Carter argued that "America can no longer afford to run its steak-and-lobster national security strategy on a McDonald's budget." I agreed with his assessment, but pointed out that the personnel issue has another subtle dimension that stretches U.S. military personnel. America expects its military to win its wars, which means having war-fighters proficient with weaponry running from bayonets to smart bombs. But America also expects its military to competently use a trowel, auditing software and a doctor's bag, and occasionally provide legal, political and investment advice. That's been the military's burden since 1992, when the Era of Peacekeeping replaced the Cold War. Sept. 11 replaced the Era of Peacekeeping with a global war over the conditions of modernity, where the trowels and investment advice are often as important as combat skills. We need more troops. That will mean spending tax dollars -- but with 300 million people, we have the recruiting pool to support a 650,000 soldier Army. We also need to get the skills of U.S. government civilian agencies into the field. That will take tax dollars and focused political leadership. |
|
|
|
May 9, 2007
The long rumored Israeli Jericho 3 ballistic missile is apparently in production. For over two years, there were reports that this new missile was close to entering service. With a range of nearly 5,000 kilometers, the Jericho 3 can drop a nuke anywhere in the Middle East. The Jericho 3 is apparently a variant of the Shavit satellite launcher. The Jericho is probably a 30 ton, solid fuel, three stage missile, with a half ton payload. Israel is believed to have 50-100 of the shorter range Jericho 2. This is a 26 ton missile with a max range of about 1,500 kilometers. The Jericho 2 was the basis for the Shavit satellite launcher, which has put several satellites in orbit since 1995. |
|
|
|
Gardenforge no comment to your comment....By the way what was it
again???? scttrbrain cool pic |
|
|
|
sorry Kat ... You bring up a Vague topic and to CIA we declassify to the
devulgence of total fact and information therefore no possibility of area can be not understood or clarified enough |
|
|
|
If there is a "fog of war," there is probably a more dense "smog of
terrorism," for the small nature of terrorist groups, their close interpersonal communications, and their predilection for soft targets of opportunity make it difficult to predict their f uture operations. Counterterrorism analysts must therefore peer through a very cloudy crystal ball when assessing the intentions, capabilities, and targets of existing and future terrorist groups. Life would be easier if, as when assessing a conventional army, analysts could pour over communications intercepts to discern orders of battle and make predictions based on the enemy's known doctrine and strategy. The problem of penetrating the "smog of terrorism" is further exacerbated by the fact that it is difficult to infiltrate terrorist cells to acquire the tactical information needed to prevent, or at least to mitigate, a potential threat or actual incident. The most sophisticated capabilities in the arsenal of technical intelligence are no substitutes for the HUMINT (human intelligence) capabilities that are needed to gather information on terrorists. The problem of predictive analysis is further complicat ed by the fact that even if terrorist organizations have an encompassing ideology—or what is at best a proto-strategy—it tends to be rather general in nature and directed at establishing a broad declaration on revolutionary action that may not provide a c lear plan for action that can enable the analyst to have a foundation for assessing future terrorist operations. Furthermore, predictive capabilities are challenged by the tact that there is a whole range of potential new terrorist weapons and associated scenarios for destruction that create major problems for those responsible for identifying a new generation of te rrorist threats. There are those in the field who sometimes long for the "good old days" when a "terror network" guided by Moscow could be blamed for bombings, hostage-taking, skyjacking and other forms of mayhem. Given these conditions, one faces an onerous task in attempting to assess how vulnerable the United States is to future threats and acts of terrorism. Nevertheless, such an assessment can prove useful if it can assist the analyst and those responsible for countering terrorism to look beyond the immediate threats or the latest incident. In their contingency driven, highly pressurized environment, analysts must concentrate on the collection and analysis of what is primarily tactical, combat or operational i ntelligence. They often lack the time to deal with strategic threats, to veer from the current requirements for narrowly focused, tactical intelligence. What follows is a brief overview of the terrorist threat to the United States based on the application of strategic intelligence. This form of intelligence has a broader application than either operational or tactical intelligence, forms of information an alysis dealing with immediate threats. Strategic intelligence integrates politics, social studies, and the study of technology. It is designed to provide officials with long-range forecasts of what is important rather than what is urgent.[1] THE ANALYTICAL FRAMEWORK The analytical framework employed in this chapter will consist of the following components. The author will attempt to identify major changes in the international environment. He will then discuss how these changes create new terrorist threats in the Unit ed States. The author will then focus on probable technological/operational changes among terrorist groups. Finally, changes in terrorist motivations and goals will be examined. All of these components will then be analyzed in a strategic context to asses s potential terrorist targets, operations, and resulting vulnerabilities within the United States. THE INTERNATIONAL ENVIRONMENT Even though it probably never fully existed, the artificial superficial equilibrium imposed by the Cold War has been destroyed. Within the former republics of the defunct Soviet Union the order imposed by Moscow on ethnic and nationalist movements has gi ven way to separatists' demands often accompanied by political violence including terrorism, various forms of low intensity conflict, rapidly growing organized crime, and civil war. The instability has spilled over into Eastern Europe where the former sat ellites are attempting to cope with the uncertainties of democratization. Additionally, now that Moscow and Washington are no longer inclined to use regional surrogates as a way of avoiding direct confrontation, a number of regional powers are emerging. Neither Moscow nor Washington have either the inclination or the influence needed to constrain many of these regional would-be superpowers. Iran is a case in point. Countries like Iran, Syria and Libya use terrorism as a form of diplomacy and as an adjunct to their foreign policies.[2] To these states, terrorism is as integral a part of their diplomacy as the exchange of ambassadors. Smaller states can easily emulate their example. In this era of what should be called a "new world disorder" the breakdown of central authority and the domination of the existing state system has been under assault from a number of quarters. First, the legitimacy of many states has been challenged by th e growing assertion of both sub-national and transnational calls for "self-determination" by ethnic groups and religious movements that deny the legitimacy of what they perceive to be a discredited international order. Despite the optimism of the past, pr imordial loyalties have not withered away in the face of technology, democracy, and the introduction of free market economies. Indeed, many groups and movements have fed upon a reaction to what is sometimes viewed as the secular immorality of the West. Tr ibal loyalties on a sub-national level share the rejection of secular mass societies with fundamentalist movements. Some of these movements seem to offer the chimera of psychological, sociological and political security to people who are trying find their place in an uncertain, even threatening, world. New and dangerous players have emerged in the international arena. The level of instability and concomitant violence is further heightened by the rise to international political significance of non-state actors willing to challenge the primacy of the stat e. Whether it be the multinational corporation or a terrorist group that targets it, both share a common characteristic. They have each rejected the state-centric system that emerged 175 years ago at the Congress of Vienna. All of these factors have accelerated the erosion of the monopoly of the coercive power of the state as the disintegration of the old order is intensified. And, this process will in all probability gain even greater momentum because of the wide ranging an d growing activities of criminal enterprises. These include everything from arms traders and drug cartels, which will provide and use existing and new weapons in terrorist campaigns as a part of their pursuit of profit and political power. In sum, present and future terrorists and their supporters are acquiring the capabilities and freedom of action to operate in the new international jungle. They move in what has been called the "gray areas," those regions where control has shifted from le gitimate governments to new half-political, half-criminal powers.[3] In this environment the line between state and rogue state, and rogue state and criminal enterprise, will be increasingly blurred. Each will seek out new and profitable targets through t errorism in an international order that is already under assault. TECHNOLOGICAL/OPERATIONAL CHANGES The remarkable changes in the international environment have been accompanied by technological changes that may have serious ramifications as regards future terrorist operations both internationally and in the United States. Up to now, terrorists have not been especially innovative in their tactics. Bombing, although not on the intended magnitude of that at the Oklahoma City Federal Building, remains the most common type of attack. Hostage taking and kidnapping are fundamental to the terrorist repertoire and skyjacking is always a possibility. Automatic and semi-automatic rifles and pistols remain the weapons of choice. However, the employment of stand-off weapons like American Stinger and Russian SA-7 hand-held anti-aircraft missiles, the U.S. Army M-72 light anti-tank weapon (LAW), and the Russian-built RPG-7 anti-tank weapon may be more readily available to terrorists than many like to believe. The same may be said of terrorist bombing technologies. Dynamite has been replaced by the more destructive and easily concealed Semtex. Furthermore, the threat has grown as a result of increased technological sophistication of timing devices and fuses. But weapons need not be sophisticated to be destructive. One only has to consider what might have happened if the pilot of the lone single-engine light aircraft which crashed into the White House had filled his plane with somethi ng as simple as a fertilizer bomb. That incident, even if it was not a terrorist act, should serve as a warning for those who are concerned with more advanced technological threats. They should remember that smaller and more conventional instruments of de struction are still quite lethal and can have a profound affect on the targeted individual, corporation, government or what is often the ultimate target: public opinion. A growing concern is that terrorists will cross the threshold to engage in acts of mass or "super terrorism" by using atomic, biological, and chemical (ABC) weapons. So far, the international order has been spared terrorist incidents involving nuclear wea pons. Indeed, those that have been reported have turned out to be elaborate hoaxes. Fortunately, the threats have yet to be translated into actual incidents, but many believe it is only a matter of time before they are.[4] All this could easily change as a result of the disintegration of the Soviet Union. The current trade in illicit weapon's grade plutonium serves to underscore the fact that the necessary material and attendant technology will be increasingly available for those terrorist groups who may want to exercise a nuclear option, be it in the form of a dispersal of radioactive material that could contaminate a large area or the use of a relatively small but very lethal atomic weapon. The illegal trade in weapons an d technology will be further exacerbated by the very real dangers resulting from the proliferation of nuclear weapons. There is good reason to fear that either a rogue state, its terrorist surrogates, or independent terrorist groups will have the capacity to go nuclear. Whether this threshold will be crossed will depend in part on the motivation, attendant strategies, and goals of present and future terrorist groups. In sum, there is every reason to be concerned that terrorists will engage in their own f orm of technical innovation to develop the capacity to make the nightmare of a nuclear, chemical, or biological threat move from the pages of an adventure novel to the shores of the United States. Scenarios addressing future acts of high-tech terrorism include a wide variety of assaults on the delicate interdependent infrastructure of modern industrialized society. These scenarios move beyond the bombing or seizing of conventional or nuclear power plants to include the potentially disastrous destruction of the technological infrastructure of the information super highway. However, the scope of what constitutes a terrorist act on computers and their associated facilities is subject to interpretation . The bombing of a multinational corporation or a government's crucial computer centers could be judged an act of terrorism, but what if a terrorist hacker placed a computer virus in a very sensitive network? The results could range from the massively inc onvenient to dangerous or disastrous. Such an act, however, would lack an essential element of terrorism as it is now defined: the use or threat of the use of physical violence. Nevertheless, as the technology expands so may definitions of what constitute s a terrorist act. From the terrorist's point of view the following dictum may apply, "so many new targets... so little time." Finally, if indeed terrorism is "theater" and the people are the audience, the stage is changing.[5] CNN and other networks provide the terrorists with a potential and almost instantaneous means for spreading their message of fear and intimidation. The re ality of video proliferation is just as significant as that of nuclear proliferation. Some terrorist groups already have the ability to stage and videotape their acts, sending them out to either a broad or limited audience. They can even transmit live ev ents through low power transmitter stations. Furthermore, the next generation of terrorists may produce highly imaginative presentations to seize the attention of a violence jaded public, one which has grown used to the now standard images of hooded terr orists holding hostages in embassies, prisons, or aircraft cabins. This kind of theater of the obscene will find a ready mass audience among those who watch the tabloid television shows and depend on the National Enquirer for their news.[6] Given the pub lic's fascination with television happenings like the O.J. Simpson trial, one can only imagine what might happen if future terrorists direct and produce their own television spectaculars. CHANGES IN TERRORIST MOTIVATIONS AND GOALS There are almost certainly going to be changes in both the motivation and goals of terrorist groups. The traditional motivations for terrorism: ethnic, tribal, and religious animosities, will continue and intensify. Even while people of goodwill struggle to find solutions to problems in Northern Ireland and in the Middle East, the disintegration of the former Soviet Union and the related turmoil in the former Yugoslavia and elsewhere have engendered new groups pursuing their own varied agendas through vio lence, including terrorism. While much of the violence is confined to the various regions, the potential for involving surrounding states and for international assaults is significant. Even in the Middle East, where the Palestine Liberation Organization ( PLO) and Israel are moving along a tortuous road toward accommodation, various factions, willing and able to engage in non-territorial terrorism, will continue to "bring the war home" to Israel and its primary supporter, the United States. Perhaps even more ominous is the growing significance of apolitical groups which resort to terrorism in pursuit of financial gain as a part of criminal enterprises. While a number of these groups may, in part, justify their actions under the rubric of pol itical rationalization, their major goal will relate to maximizing their profits through co-opting, corrupting, and neutralizing the authority of the states in their respective countries and regions of operations. These groups, which include narco-terrori sts, are particularly difficult to counteract given their vast resources gleaned by illicit trade in drugs or weapons, and because of their ability to influence, control or demoralize governments in countries where they operate. This new criminal order ca n engage in operations with the kind of violence that makes the old Mafia seem pacifistic by comparison. Finally, one might anticipate that in addition to existing extremists operating according to issue-oriented movements such as radical environmentalism, fringe elements of the pro-life movement, and extremist animal rights groups, there will emerge new gro ups willing to use terrorism to avenge grievances both real and imaginary. These groups, which at the outset may be small and not tied to any recognized social or political movement, may have the capability to maximize their impact through the availabilit y of a wide variety of weapons, a rich selection of targets, and the skillful use of the media and communications technology. There will be both old and new adversaries to threaten the international order and, more specifically, U.S. interests and citizen s both at home and abroad. HOW VULNERABLE IS THE UNITED STATES AND WHAT ARE THE TERRORISTS GOALS? The following assessment is based on integrating the analytical components presented above. The focus will be on the vulnerabilities in the United States to attacks by international terrorist or domestic groups or by such groups with domestic-internationa l linkages. The new threat environment may see the emergence of a wide variety of sub-national and transnational groups intent on venting their frustrations with Washington for what they perceive to be a lack of support for their causes or, conversely, for supporting their adversaries. As the major military superpower, with an increased global involvement, even when engaged under the United Nations, the United States is likely to be viewed as the primary party in future disputes. Even when neutral, Washington is lik ely to be viewed suspiciously by one or more warring factions. In addition, when Washington moves beyond "peace keeping" to "peace enforcement"' operations, the likelihood of a reaction among one or more disputants is possible. Even though the United States may not want to be the policeman or the conscience of the world, the parties in any conflict may question whether Washington is intentionally or unintentionally pursuing a political agenda that may be counter to their objecti ve. The result might be the spillover of violence to the United States by one or more parties in the dispute. Resort to terrorism could be a punitive action or it might be an effort to dramatize a cause. As the United States tries to redefine the formulat ion and execution of its foreign policy in the post-Cold War era, even if Washington is motivated by the highest of ideals, i.e., democratization, humanitarian assistance, or nation-building, those who will be the objects of such efforts might resent it. Their use of terrorism on American soil is a likely response. The potential spillover effect may be intensified by the domestic political and economic environment. The potency of ethnic-based politics, coupled with the tendentious debates over immigration policy, may provide fertile ground by which ethnic-based conf licts from overseas may be transported to the United States. Even if that is not the case, the existence of large immigrant communities may provide the "human jungle" in which external terrorist groups can operate. The emergence of a variety of issue-orie nted transnational groups could also lead extremists within their respective organizations to establish linkages with like-minded individuals or groups within the United States. Such groups could undertake joint operations against American targets in an e ffort to dramatize their causes or seek changes in public policy. Cooperation between home-grown terrorists and their foreign counterparts cannot be understated. In an increasingly interrelated international environment, a new "terror network" might emerg e with issue-oriented groups launching assaults on domestic targets. The threat posed by fundamentalist religious groups of all faiths cannot be discounted. Not only Islamic extremists, but other "true believers" of a variety of faiths are likely to engage in terrorist acts against American targets. These groups might be s upported or joined in their operations by domestic religious extremists. In addition, they might also seek alliances with a variety of cultists, survivalists, or neo-fascists who, for their own reasons, reject the existing social, economic, and political order and await their own versions of Armageddon. Perhaps even more dangerous will be the resort to terrorism by apolitical terrorists who are engaged in violence and intimidation as a pant of criminal pursuits. Such groups have operated overseas with impunity. Inner-city America could become a fertile g round for their operations. They will be particularly threatening since, as a result of their illegal trade in drugs and other criminal enterprises, they may have access to vast funds with which to corrupt local authorities. What will make these groups es pecially dangerous may be the fact that their threats and acts of terrorism will not necessarily be meant to achieve publicity or to dramatize their cause. Such groups may use terrorist tactics in extortion attempts like those used to "shake down the neighborhood'"-only these gangs may attempt to blackmail the entire city. With their vast revenues, they could acquire a formidable arsenal of weapons with whic h to challenge local authorities and carry out their acts of violence on a scale not yet experienced in the United States. Furthermore, it may be very difficult for our already strained criminal justice system to address the development of new criminal ca rtels. The scope and magnitude of future potential terrorist organizations will be enhanced by the rapid changes in technology that will provide the next generation of terrorists with capabilities undreamed of by the most highly dedicated and skilled terrorist o f today. In a sense the capture of the infamous Carlos marked the end of an era. A new generation of terrorists armed with technologically advanced weaponry will be able to engage in violence that is more dramatic and destructive than that intended in the bombing in Oklahoma City. The threat at the lower end of the spectrum is likely to grow as well. The M-16, M-10, Uzi and AK-47 assault rifles will be supplemented by stand-off weapons like Stinger anti-aircraft missiles, LAWs and RPG-7s, already availabl e on the world weapons market. Just because a weapon is relatively unsophisticated does not mean it cannot cause massive casualties. A stinger missile aimed at a jumbo jet as it takes off or as it approaches a large metropolitan airport could cause tremen dous casualties. A LAW or RPG round lobbed into the right area of a nuclear power plant could produce catastrophic consequences. Ultimately, the most fearful and recurrent terrorist nightmare may be drawing closer to reality. The proliferation of nuclear weapons and associated technologies, and the diffusion of knowledge needed to manufacture chemical and biological weapons, raises the fearful specter of mass destruction that makes concerns related to use of anthrax as a way of spreading both disease and panic pale to insignificance. The scary truth is that the United States is all too vulnerable to this kind of attack. The porous borders that have allowed massive illegal immigration are just as open to those who want to import new instruments of mass destruction. And, because there are significant profits to be made, there are suppliers who are willing to provide the new generatio n of portable nuclear weapons, chemical and biological delivery systems despite Washington's growing concern and the improving technical means to counter such threats. Furthermore, the next generation of terrorists will have the capability of effectively exploiting the highly competitive electronic and print media both to dramatize their conventional or ABC capabilities and to extort money. Technological changes will certainly have an impact on target selection. At the outset, the availability of more sophisticated conventional explosives could enable terrorists to inflict greater damage on potential targets while lessening the risk of captu re that results from having to process or transport the material. Highly symbolic targets like government buildings and corporate headquarters will be more vulnerable to attack. Major public events, like the Super Bowl or the 1996 Atlanta Olympics are als o prime targets. Despite more effective physical security and technological countermeasures it will be increasingly difficult to harden potential targets. Even if the range of the weapons is relatively short, it will be a considerable challenge to expand an anti-terrorist security zone beyond the immediate periphery of potential targets like sports facilities, government buildings, or nuclear power plants. Defense in depth will require broader protective measures. Even of greater concern is the potential threat of such weapons to aviation security. While anti-skyjacking measures have been largely successful in the industrialized West, the possibility of the threat or the destruction of commercial aircraft cannot be dismissed. It is exceedingly difficult to expand a security zone beyond the confines of an airport. Moreover, stand-off weapons provide the opportunity for highly flexible hit and run attacks. The resulting mobility will make it very difficult to predict or take appropriate action against terrorists. Finally, as potential targets continue to be hardened in urban areas, there is no reason to believe that terrorists will not seek softer targets of opportunity either in the suburbs (corporate headquarters) or rural areas (nuclear or thermal power plants and other installations). Despite these threats, it will remain difficult to develop the necessary awareness, technology and training among those corporations outside urban areas. Too many people may not t ake the threat seriously enough due to an "it can't happen here" syndrome. Most ominous, however, is the threat issuing from mass or super-terrorism. Cities may be held hostage by threats to poison the water supply or to disseminate any number of dangerous chemical or biological agents. Such threats must also be taken seriously given the proliferation of ABC capabilities. The threat might be overt, in which case the authorities will have the onerous task of reconciling the need to take appropriate action without creating a panic. Or the threat might be covert, in which case gove rnments will be facing a form of nuclear, chemical, or biological blackmail unknown to the public. Finally, one can anticipate that there will be more incidents of criminal terrorism directed against senior executives, public officials, and their families . The terrorists will justify such acts of hostage-taking and kidnapping on the basis of political causation, but in many cases they will be motivated by nothing more than a desire for ransom money. There is no reason to believe that criminal extortion, which has become a major industry in Mexico and throughout Central and South America, will not be emulated within the United States. In sum, the constellation of potential targets and the means to attack them will continue to expand in the coming decade. The traditional motivation behind the resort to terrorism by various groups is sure to continue. Ethnic identification and hatred, the call to right perceived wrongs, and the demand for self-determination will continue to inspire terrorists. The ranks of the traditional terror mongers will be joined by religious extremist groups who have rejected what they view to be the excesses of Western and American secular society. These forces of reaction may come from the Middle East, but there will be the non-Isla mic equivalents of the HAMAS and Hizbollah venting their anger and demanding the destruction of the "Great Satan." These true believers, in the conduct of what they view to be a "just war," may attack the symbols of their religious or secular rivals. Acts such as the bombings of the Israeli Embassy and the Jewish Community Center in Buenos Aires might be emulated in Washington or New York. Moreover. domestic groups acting either independently or with the support of external terrorist organizations ma y launch their own assaults. One need only recall how a sectarian dispute within the United States was transformed into a mass hostage taking by the Hanafi Muslims in Washington, DC in 1977. The most alarming aspect of the religious extremists is the fact that they did not necessarily constrain their actions by using terror as a weapon to coerce or to propagandize for their causes. The new true believer, armed with the certainty of faith, may not be concerned with current public opinion or a change in the policy of an adversary. To them, being killed while undertaking an act of terrorism may be a way to paradise in the next life. The image of the smiling truck bomber driving his vehicle into the Marine barracks in Beirut may be duplicated in a large urban center in the United States. And the nightmare only becomes more horrific if such a perpetrator uses a nuclear device. While one does not want to overstate the threat, the strategic thinker must be willing to "think the unthinkable" so that appropriate responses may be conceived. The panoply of potential attacks, save for the nuclear option or other forms of super-terrorism, will probably not create a major change in U.S. foreign policy or the articulation and pursuit of U.S. strategic interests and national security objectives. H owever, in this new world disorder terrorism may come to the United States whenever foreign adversaries want to test Washington's resolve in continuing its support for activities of the United Nations and friendly governments. Given the lack of coherence in the international environment and the low threshold of pain in regard to the taking of American casualties in ill-defined conflicts and the emergence of neo-isolationism, one must recognize that future acts of terrorism, if skillfully executed, might h ave a strategic result. The bombing of the Marine barracks in Beirut changed the course of U.S. policy toward Lebanon. That kind of act could be duplicated in the United States with even more dramatic results. CONCLUSION As noted at the start of this chapter, it is difficult to see through the smog of terrorism to assess America's vulnerabilities. Furthermore, it is dangerous to either understate or overstate the threat. If one minimizes the threat, little action may be taken. If one overstates it, the public and the authorities might overreact. What is needed is a realistic assessment which avoids both extremes. While recognizing that there is a threat, but not overemphasizing it, appropriate measures can be taken to le ssen the likelihood of an attack. Moreover, a balanced and cautious view can assist both the public and policymakers in developing a consistent level of anti-terrorism awareness and countermeasures. Constant awareness and preparedness are fundamental to d eterring terrorists. Such a prudent approach is far better than the overreaction that might occur after an incident. In the final analysis, the United States is vulnerable to the changing terrorist threat. But the threat can be met through heightened leve ls of awareness, resolve, counterterrorism measures, and consistent policies.[7] ENDNOTES What is your Opinion on this and do you think it's true? |
|
|
|
Mister Chairman, Members of the Committee. It is an honor to be asked to participate in this important review of threats to our nation and the challenges they present to the Intelligence Community. INR has taken to heart your admonition to describe the spectrum of threats to the United States and its interests, and to assess the probability, immediacy, and severity of the dangers we face, but I will do so in a way intended to complement the judgments presented by our colleagues in other agencies by focusing on the way threats appear when viewed through the lens of diplomacy. The subject of this hearing is one on which there is broad consensus in the Intelligence Community. INR concurs with the judgment that terrorism is the single greatest threat to Americans, both at home and abroad, and that the proliferation of weapons of mass destruction (WMD), missiles, and certain types of advanced conventional weapons is a close and dangerous second. We also share most of the other threat judgments presented by our colleagues. But rather than merely echoing their assessments, I will approach the subject reflecting INR’s unique perspective and responsibilities as the Secretary of State’s in-house intelligence unit. As Secretary Rice has made clear in recent statements, diplomacy is critical to U.S. efforts to contain, counter, and diminish the threats we face. On February 8 she told her audience in Paris, "We agree on the interwoven threats we face today: terrorism, and proliferation of weapons of mass destruction, and regional conflicts, and failed states, and organized crime." She added that America stands ready to work with other countries in "building an even stronger partnership" to address these threats. To combat the twin scourges of terrorism and proliferation requires more than just the effective collection of hard to obtain intelligence. At a minimum, it also requires deep understanding of the motivations and objectives of those who resort to terrorism and/or pursue WMD. It also takes sophisticated analysis of all-source information, informed judgments about what we do not know, and detailed knowledge of other countries, cultures, political systems, and the underlying causes of discontent and radicalization. The prerequisites for meeting all these requirements include global coverage, deep analytical expertise, and Intelligence Community commitment to providing policymakers what they need, when they need it, and in a form that they can use day in and day out. Why are terrorism and proliferation at the top of the threat list? The short and conventional answer is that the normalization of relations with China and demise of the Soviet Union dramatically reduced the danger of nuclear war and eliminated or transformed fundamentally a wide array of associated threats. But the end of the Cold War also brought many changes to other aspects of international life, including the erosion of constraints on "client" states, the reemergence of long repressed political aspirations, and the rise of ethnic and religious hatreds. Former DCI Jim Woolsey described the change as the displacement of a few big dragons by lots of dangerous snakes. But it was, and is, more than that. Globalization and the information revolution have changed expectations and aspirations and made it possible for nations and non-state actors, including individuals, to do things that would have been unthinkable just a few years ago. One of the many resultant developments has been the emergence of vast differences in coercive capabilities. This, in turn, has exacerbated the dangers of both terrorism and proliferation. The inability of all but a few nations to deter the most powerful countries (including but not limited to the United States) has reinforced the determination of states that feel threatened (whether justifiably or not) to seek asymmetric solutions to the disparity of power. For some, this means pursuit of WMD and delivery capabilities because they know they have no hope of deterring or defeating the attacks they fear with conventional armaments. Perhaps the clearest illustration of this can be found in D.P.R.K. public statements after Operation Iraqi Freedom intended to reassure its public and warn potential adversaries that, unlike Saddam, it had a (nuclear) deterrent; a claim reiterated February 10. Pakistan pursued—and obtained—nuclear weapons and delivery systems to compensate for India’s vastly superior conventional military power and nuclear weapons. Terrorism is at the other end of the spectrum of asymmetric responses. State sponsors, most notably Iran, seem implicitly to warn potential enemies that the response to any attack will include resort to terror. They seem to be saying, in effect, "You may be able to defeat us militarily, but you cannot protect all your people, everywhere, all the time." Such a porcupine defense/deterrent posture is an unfortunate but not irrational response to wide disparities of power. The situation is somewhat analogous for non-state actors frustrated by their inability to achieve their (however reprehensible) goals by other means. Terror and guerrilla warfare are long-standing measures of choice (or last resort) for weak actors confronting a much stronger adversary. The targets vary widely, from established democracies to authoritarian regimes. However, in some cases, terrorists also direct their attacks against those who are seen as responsible for—by imposition or support—the actions or existence of the regime they oppose. That appears to be one of the reasons al-Qaida has targeted the United States in Saudi Arabia and terrorists in Iraq have used suicide bombers and improvised explosive devices to attack Iraqis and others supportive of the Iraqi government. The use of terror tactics in liberal democracies is especially problematic because in open societies, self-restraint under the rule of law and commitment to respect human rights and dignity complicate the challenges of mounting an effective response. Attacking a distant country is difficult, even in the era of globalization, and would-be assailants must choose between difficult, high profile attacks, like those on 9/11, and easier to accomplish but probably lower impact incidents (like sniper attacks on random individuals or small explosions in crowded public places). We remain vulnerable to both types of terror attack, but arguably we are now less vulnerable to relatively large-scale, high profile attacks than we were before 9/11. Nevertheless, it is extremely difficult to penetrate the tight-knit groups that are most capable of carrying out such attacks on our country and our people. We have achieved great success in disrupting al-Qaida but may be witnessing a repeat of the pattern found in the wars on illegal drugs and organized crime, namely, that we are fighting a "hydra" with robust capabilities of resurgence and replacement of lost operatives. The bottom line is that terrorism remains the most immediate, dangerous, and difficult security challenge facing our country and the international community and is likely to remain so for a long time. Despite the progress we have made, it would be imprudent to become complacent or to lower our guard. The quest for WMD, missiles (or unmanned aerial vehicles), and advanced conventional arms has become more attractive to, and more feasible for, a small but significant set of state and non-state actors. This poses major challenges to the security of the United States and our friends and allies, but it is important to put this threat in perspective. Nuclear Threats. The nuclear sword of Damocles that hung over our national existence during the Cold War remains largely a concern from a different era. Russia and China still have nuclear weapons (the number is declining in Russia and increasing only modestly in China), but the hostility of the past is no longer a pressing concern and neither threatens to use them against our country. North Korea has produced sufficient fissile material to make a small number of nuclear weapons, but, despite its February 10 statement, there is no evidence that it has produced such weapons and mated them to a missile capable of delivering them to the United States. However, if it has made such weapons, it could reach U.S. allies, our armed forces, and large concentrations of American citizens in Northeast Asia. India and Pakistan have nuclear weapons and the capability to deliver them to targets in the region, but both nations are friends and neither threatens the territory of the United States. Iran seeks but does not yet have nuclear weapons or missiles capable of reaching the United States. INR’s net assessment of the threat to U.S. territory posed by nuclear weapons controlled by nation states is that it is low and lacks immediacy. But this should not be grounds for complacency. The existence of such weapons and the means to deliver them constitutes a latent but deadly threat. Ensuring that it remains latent is a key diplomatic priority. The so far theoretical possibility of nuclear weapons falling into the hands of terrorists constitutes a very different type of threat. We have seen no persuasive evidence that al-Qaida has obtained fissile material or ever has had a serious and sustained program to do so. At worst, the group possesses small amounts of radiological material that could be used to fabricate a radiological dispersion device ("dirty bomb"). The only practical way for non-state actors to obtain sufficient fissile material for a nuclear weapon (as opposed to material for a so-called dirty bomb) would be to acquire it on the black market or to steal it from one of the current, want-to-be, or used-to-be nuclear weapons states. The "loose nukes" problem in the former Soviet Union continues to exist but is less acute than it once was, thanks to the Nunn-Lugar cooperative threat reduction program and diligent efforts by Russia to consolidate and protect stockpiles. North Korea’s possession of weapons-grade fissile material adds a new layer of danger and uncertainty. There is no convincing evidence that the D.P.R.K. has ever sold, given, or even offered to transfer such material to any state or non-state actor, but we cannot assume that it would never do so. Chemical and Biological Weapons. Despite the diffusion of know-how and dual-use capabilities to an ever-increasing number of countries, the number of states with known or suspected CW programs remains both small and stable. Most of those that possess such weapons or have the capability to produce quantities sufficient to constitute a genuine threat to the United States or Americans (civilian and military) outside our borders are not hostile to us, appreciate the significance of our nuclear and conventional arsenals, and are unlikely to transfer such weapons or capabilities to terrorists. There are nations that might use CW against invading troops, even American forces, on their own territory, but we judge it highly unlikely that nation states would use CW against the American homeland or specifically target American citizens except as an act of desperation. Terrorists, by contrast, have or could acquire the capability to produce small quantities of chemical agents for use against selected targets or random individuals. We judge the chances of their doing so as moderate to high. One or a few disgruntled individuals or a small terrorist cell could do so in a manner analogous to the 1995 Aum Shinrikyo sarin gas attack on a Tokyo subway. The severity of such an attack would be small in terms of lethality, but the psychological and political impact would be huge. The risk posed by nation states with biological weapons is similar to that for CW; many nations have the capability, but few have programs and even fewer would be tempted to use them against the United States. The danger of acquisition and use by terrorists, however, is far greater. Though hard to handle safely and even harder to deliver effectively, BW agents have the potential to overwhelm response capabilities in specific locations, induce widespread panic, and disrupt ordinary life for a protracted period, with resulting economic and social consequences of uncertain magnitude. Conventional Attack. INR considers the danger of a conventional military attack on the United States or American military, diplomatic, or business facilities abroad to be very low for the simple reason that no state hostile to the United States has the military capability to attack the U.S. with any hope of avoiding massive retaliation and ultimate, probably rapid, annihilation. The only way to reach a different conclusion, it seems to us, is to posit an irrational actor model in which either all key decisionmakers in a hostile country are irrational or there are no systemic constraints on a totally irrational dictator. We judge that such conditions exist nowhere at present and hence that U.S. military might is, and will be, able to deter any such suicidal adventure for the foreseeable future. Here again, ensuring that this situation continues is a major goal of American diplomacy. A far more dangerous threat is the possibility, even the likelihood, that advanced conventional weapons will be obtained—and used—by terrorists. For example, the danger that groups or individuals antithetical to the United States will obtain MANPADs or advanced explosives is both high and immediate. The number of Americans likely to be killed or maimed in such an attack would be small in comparison with the casualties in a conventional war or nuclear attack, but would be unacceptably large no matter how small the number of casualties and could have a major economic and psychological impact. Attacks on American nationals, whether they are aimed at workers in an American city, American tourists abroad, U.S. diplomatic facilities, U.S. businesses at home or abroad, or U.S. military facilities at home or abroad, are possible and unacceptable. The fact that State Department personnel, family members, and facilities have been frequent targets of attack makes us acutely aware of this danger and determined to do everything possible to thwart it. This determination is magnified several-fold by the fact that it is an important part of the State Department’s mission, and the Secretary of State’s responsibility, to protect American citizens everywhere around the globe. We take this responsibility very seriously, and an important part of INR’s support to diplomacy involves providing information and insights that contribute directly to the success of this mission. States of Concern. It has become something of a convention in threat testimony to list a number of countries that, for one reason or another, are judged to warrant special attention from the Intelligence Community. A few countries on this list engage in activities that directly or indirectly threaten American lives (e.g., North Korea’s deployment of massive military power close enough to Seoul to put at risk our ally as well as American troops and tens of thousands of American civilians). Most countries on the list do not threaten the United States militarily but are important to the success of policies to protect and promote other American interests. Rather than enumerate a long list of countries, I will simply provide a series of generic examples to illustrate the kinds of conditions and concerns germane to diplomatic efforts to protect and advance American interests. The State Department needs good intelligence on some countries primarily because their actions could lead to internal instability that could, in turn, threaten other American interests. Others belong on the list because they do not or cannot prevent the growth and export of narcotics, harbor or assist terrorist groups, have leaders who make anti-American pronouncements, or have conditions conducive to the rise of extremist movements. Still others illicitly traffic in persons, weapons, conflict diamonds, or other commodities; control critical energy resources; or have fragile political institutions, large and dynamic economies, or any of myriad other attributes. What states on this long and varied list have in common is the capacity to affect American interests and the efficacy of U.S. foreign, economic, and security policy. Most do not and will not "threaten" the United States in the way that we were once threatened by the Soviet Union and the Warsaw Pact, but something, or many things, about them pose challenges and/or opportunities for American diplomacy. The problems of failing states and the tremendous drain on resources in developing countries from AIDS and other pandemics, environmental stress, and corruption affect our ability to partner with allies and friends to meet humanitarian needs in the interest of promoting stability and democracy. This, in turn, poses challenges and requirements for the Intelligence Community that extend far beyond the collection and analysis of information germane to the suppression of terrorism and limiting the spread of WMD, delivery systems, and advanced conventional weapons. Meeting these challenges requires global coverage, deep expertise, extensive collaboration, and, above all, acceptance of the idea that the mission of the Intelligence Community demands and entails more than collecting and interpreting covertly acquired information on a relatively small number of narrowly defined threats. Focusing on known threats and concerns is necessary but could prove to be very dangerous if we are not equally vigilant in trying to anticipate unknowns and surprises. Intelligence is, or should be, about more than addressing "threats". The Intelligence Community has been justifiably criticized for serious failings and shortcomings, but we should not lose sight of what we do well and must continue to do well. For example, America’s unrivaled military preeminence, demonstrated so dramatically in our elimination of the Taliban regime in Afghanistan and the destruction of Saddam’s regime in Iraq, is inextricably linked to the capabilities and accomplishments of our Intelligence Community. Intelligence collection, analytic tradecraft, insights gained through years of experience, and close ties among collectors, analysts, weapons designers, military planners, and troops on the ground are all and equally critical to the military successes we have achieved, the predominance we enjoy, and the fact that conventional military threats to our nation and our citizens are low and almost certain to remain so for many years. Preserving this state of affairs will be neither automatic nor easy, but our efforts and the allocation of resources to do so must not foreclose equally committed efforts to address other threats and challenges. Terrorism and proliferation are at the top of every agency’s list of threats, and the Intelligence Community is committing substantial effort and resources to provide the intelligence support required to contain and reduce those dangers. In part, this requires and involves penetration of highly restricted and suspicious organizations and secure systems of communication, including sophisticated measures to hide financial transactions, obscure relationships, and deceive human and technical collectors. But collection is only one of many essential factors in the equation. To place the intelligence we collect in context, to distinguish between what is true and useful and what is not, and to develop strategies to detect and disrupt activities inimical to American interests requires expert analysts and information on a very wide array of critical variables. Stated another way, it is not possible to identify, anticipate, understand, and disrupt terrorists and proliferators without broad and deep understanding of the countries, cultures, contexts, social networks, economic systems, and political arenas in which they spawn, develop, and operate. Without broad and deep expertise and information that goes far beyond what we can or should collect through clandestine means, we will not be able to judge accurately the information we collect, and will ultimately be reduced to reliance on lucky guesses and chance discoveries. That isn’t good enough. We can and must do better. |
|
|
|
NEW YORK (AP) - No beards or other "Islamic characteristics." Do not
speak loudly or otherwise draw attention to yourself. Rent apartments in areas where neighbors do not know each other well. The suicide hijackers in last week's attacks apparently practiced terrorism by the book - a 180-page manual for Muslim operatives living undercover among their enemies in "godless areas" of the world. The manual, "Military Studies in the Jihad Against the Tyrants," was discovered last year during an investigation of Osama bin Laden, and gives terrorists precise instructions on how to act while they await their orders to strike. Investigators have not said whether the 19 hijackers ever read the manual, but glimpses of their lives suggest they conducted themselves according to its instructions during the months they spent in the United States. Experts say the manual illustrates the inner workings of bin Laden's al-Qaida organization, the prime suspect in the attacks. It also foreshadows the suicide hijackings themselves, in which the terrorists used boxcutters and knives. For example, the manual's "Assassinations" section gives precise instructions on how to use weapons with blades, saying the "enemy must be struck in one of these lethal spots: Anywhere in the rib cage, both or one eye, the back of the head, the end of the spinal column." The hijackers "seem to have followed (the manual) as closely as they could ... making sure no one knew the whole picture," said George Andrew, former deputy head of anti-terrorism for the FBI's New York City office. The manual says anyone willing to "undergo martyrdom" should be "able to act, pretend and mask himself" behind enemy lines. Among its instructions: -Do not address others with traditional Islamic greetings in which Allah's name is invoked. -Do not cause trouble in your neighborhood. Do not park in no-parking zones. -Do not live near police stations. -Do not appear to be overly inquisitive. -Burn letters immediately after reading them and get rid of the ashes, too. -Rent apartments "in newly developed areas where people don't know each other." -Use codes when talking on the telephone. -Try not to be "chatty and talkative" in public. -Maintain an appearance "that does not indicate Islamic orientation (beard, toothpick, book, long shirt, small Koran)." Most television images of the men thought to have been aboard the airliners show them without beards. And people who met them said they wore Western clothes. Neighbors of some of the men in California, Florida and Maryland said they lived in suburbs where they did not stand out. In Florida they moved frequently, staying in motels and apartments around the state. They also joined gyms. One made small talk with a neighbor about sports. Another posted a personal ad on the Internet. People who came into contact with them described them as quiet, friendly and sometimes timid men who gave few, if any, hints that they harbored deep resentment against the United States. Nawaq Alhamzi, a suspected hijacker aboard the jet that crashed into the Pentagon, lived last fall in a new 175-unit San Diego apartment building where so many people came and went that he was barely noticed. He always paid the rent on time. Some of the hijackers appeared to bend a rule in the manual stating that "there is nothing that permits ... drinking wine or fornicating." Days before the World Trade Center attack, Mohamed Atta and Marwan Al-Shehhi were seen drinking at a sports bar in Hollywood, Fla. Majed Moqued was spotted perusing adult videos in two Laurel, Md., stores. He did not buy anything. FBI agents discovered the manual last year in Manchester, England, in one of several "guest houses" authorities say al-Qaida used to harbor terrorist cells. The FBI was investigating bin Laden and his suspected role in the deadly 1998 bombings of two U.S. embassies in Africa. A translation of manual from the original Arabic was made public last spring, when prosecutors in New York introduced it as evidence in the embassy bombing trial that ended with the convictions of four bin Laden associates. After studying the manual, the FBI suspected that bin Laden's soldiers were attempting to infiltrate American society, said Andrew, the former FBI anti-terrorism official. But investigators apparently did not conclude that terrorists had already put themselves in position to strike. |
|
|
|
America’s chief suspect for yesterday’s attacks on the World Trade
Centre and the Pentagon is Osama bin Laden, one of America’s ten most wanted men. He carries a $5 million bounty on his head. Bin Laden warned three weeks ago that he and his followers would carry out an unprecedented attack on US interests for its support of Israel, an Arab journalist with access to him said yesterday. Abdel-Bari Atwan, editor of the London-based al-Quds al-Arabi, an Arabic-language weekly news magazine, said Islamic fundamentalists led by Bin Laden were “almost certainly” behind yesterday’s attack on the United States. “It is most likely the work of Islamic fundamentalists. Osama bin Laden warned three weeks ago that he would attack American interests in an unprecedented attack, a very big one. Personally, we received information that he planned very, very big attacks against American interests. We received several warnings like this.” The US government, which appears to have suffered a catastrophic intelligence lapse, said last night it believed bin Laden was responsible. Soon afterwards, there were reports of air raids in Afghanistan, his headquarters, though the US was initially denying responsibility. One of bin Laden’s associates was to be sentenced today over the 1998 bombing of a US embassy in Tanzania that killed 213 people. The sentencing had been set for a federal court near the World Trade Centre. From his several mountain hide-outs in southern Afghanistan, Bin Laden, a Saudi millionaire, runs Al Qaeda, one of the world’s most feared terrorist organisations. He is perhaps the only one sophisticated enough to arrange yesterday’s stunning timetabled destruction. Bin Laden is wanted by a US court for masterminding the bombing in 1998 of two US embassies in East Africa in which 224 people died. According to the indictment, his organisation is “dedicated to opposing non-Islamic governments with force and violence”. In August 1996, after he moved to Afghanistan, he issued a “declaration of war” against the United States, because of its position as a secular superpower and because of the presence of US troops in Saudi Arabia. Earlier this year, George Tenet, director of the Central Intelligence Agency, described him as the most immediate and serious threat to US security. Born in Jeddah in 1955, Bin Laden is the son of a construction magnate. He used his inherited wealth in the 1980s to run the “Services Office” which funnelled fighters and money into Afghanistan for the war against the Soviet occupation. Now, long after the Soviets left, he remains in Afghanistan and sends money and fighters to support the Taleban, the hardline Islamic regime which is trying to create a pure but brutal Islamic state. He is believed to be responsible for an attempted assassination attack on Sunday against Ahmad Shah Masood, Afghanistan’s most senior opposition commander and the only force still resisting the Taleban. Taleban leaders have refused to hand Bin Laden over for trial, but they insist he cannot command an international terrorist organisation from his hide-outs. He was photographed in January, posing at the wedding of his son, Mohammed, in Kandahar, in southern Afghanistan, in an apparent gesture of defiance to the United States. “Osama bin Laden came as a mujahid (a holy warrior),” Maulvi Qudratullah Jamal, the Taleban information minister, said last month. Like all senior Taleban ministers, Mr Jamal has met the Saudi. “He is a very calm man and he respects Islamic law. He is good man and he doesn’t want to harm anyone.” Few Western analysts believe that. Al Qaeda is an advanced, international organisation run on a system of cells. Last year, US intelligence agencies found CD-ROM copies of a six-volume training manual apparently used by Bin Laden to train recruits. The manual contained information on recruiting followers and assembling bombs. Bin Laden’s reach is extensive. According to the indictment for the US embassy bombings, he is suspected of involvement in the killing of 18 US soldiers in Mogadishu, in Somalia, in October 1993. He provided a safe house for Ramzi Yousef, who bombed the World Trade Centre in 1993, killing six people and injuring 1,000. He is also believed to have tried to obtain components of nuclear and chemical weapons. But it is not clear how extensive his weaponry is now. The Pentagon said a year ago that with the nerve gases tabun and sarin at his disposal, he might attempt to leave the realm of brutal terrorist to become a potential world power broker. With the Middle East in flames and teetering on the edge of war, there are three factors making now the right time for any attack by Bin Laden. The peace process is in ruins and the Arab world is convinced that it cannot come back. For the first time in years, despite the brutal lynching of Israeli soldiers, the shooting of settlers and the suicide bomb attacks, the Palestinians have garnered a large measure of world sympathy. With their enemies shooting children dead in the streets for throwing stones, Israel has been losing the public relations battle with its foes and Bin Laden is offering his fanatics a glory in death that has evaded them in life. The CIA sent an urgent report to the Clinton administration 18 months ago that suicide bombers inside Israel with chemical weapon bombs could wreak death and destruction on a massive scale. The Japanese cult that released a small portion of sarin into the Tokyo subway system a few years ago showed its awesome power. The United States targeted what it said was a chemical weapons plant in Sudan in retaliation for the bombings of US embassies in Africa that Bin Laden carried out with lethal effect. “But the chemicals had already gone,” said Kenneth Katzman of the US Congressional Research Service and an expert on Middle East terrorism. He said they had been shipped back to the terrorist training academy Bin Laden runs in Afghanistan where they were believed to have been “weaponised”. Weaponising consists of turning inert chemical agents into lethal toxins and fitting them into devices to spread the poison over a wide scale. A teacup full of sarin in the water supply of Jerusalem would be enough to kill every inhabitant ten times over. The normal method of dispersing chemical agents is through an artillery shell, but because Palestinian stone-throwers don’t possess artillery pieces, the accepted future scenario is of an infiltration into Israel of suicide bombers. “Aside from the fact that he has access to millions of dollars," said a former CIA counter-terrorism chief, Vincent Cannistrano, “Bin Laden and his people are masters of improvisation. With his connections in Saudi Arabia, where his father became one of the country’s richest men as a builder, and to other areas of the Arab world, he has access to some of the most sophisticated explosives and weapons. Semtex, nitro-glycerine, detonators. “By the best estimates, he probably has no more than two pounds of tabun and sarin,” said Günther Griese, a German anti-terrorist expert. “No matter – that is enough to wipe out Israel, Egypt, Jordan and probably several other countries besides.” It is ironic that Bin Laden was once backed by the United States, a warlord who disciplined and organised Muslim youth in Soviet-occupied Afghanistan. Now he is Washington’s most wanted man. Mr Cannistrano said: “He is the only one out of any of the Middle East terrorist groups who has declared a fatwa against America. He is the one with the vision and the means to see this thing through.” Around 2,000 Muslims have “graduated” from his terror academy over the past five years. Bin Laden also has links with other international terrorist organisations. He has developed close relations with Ayman al-Zawahiri, the head of a leading faction of the Egyptian extremist group al-Jihad, who has also sought sanctuary in Afghanistan. Washington has tried to strike back but with limited success. Listening stations operated by the US National Security Agency in countries around Afghanistan are able to trace e-mail, fax and satellite calls. The US launched 60 cruise missiles at his training camps in Khost, in southern Afghanistan, shortly after the bombings of the US embassies in Africa, homing in on the transmissions from one of his Inmarsat cellular phones. Minutes before, Bin Laden escaped, suspecting a raid was planned. HIJACKERS: THE SUSPECTS US INTELLIGENCE agencies will be concentrating their efforts on four lines of inquiry until hard evidence turns up: OSAMA BIN LADEN The Saudi Arabian former businessman with a pathological hatred of all things American must be the prime suspect for yesterday’s terrorist attack. He has a track record of striking US targets in the Middle East, Africa and New York. His Afghanistan-based Islamic fundamentalist group undoubtedly has the motivation to mount this type of attack, but its sheer scale and audacity is far beyond anything he has tried before. PALESTINIAN GROUPS The suicide element of the hijackings would seem to have the fingerprints of fanatical Palestinian groups with Islamic fundamentalist links such as Islamic Jihad, the Hezbollah or others. The year-old conflict in the occupied territories has radicalised a new generation of Palestinian youth who are determined to strike back at Israel’s chief paymaster and arms supplier. MIDDLE EASTERN GOVERNMENT/ INTELLIGENCE AGENCY The complex nature of the simultaneous multiple hi-jackings of the aircraft perhaps points to the involvement of Middle Eastern intelligence agencies. They could have provided the logistics and cloak of secrecy necessary to get the hijack teams into the US and on to the aircraft without detection. Elements in the Iranian, Iraqi and Libyan regimes have strong anti-US track records and might want to provoke an overwhelming response from the Bush administration in the hope of radicalising their populations to continue the struggle against the "great Satan". US RIGHT-WING GROUPS Although groups with Middle Eastern links must be top of the US government’s suspects list, the possibility of involvement by so-called militia groups cannot be discounted. They have the motivation and resources to continue their struggle against the federal government by very violent means, as the Oklahoma bombing proved |
|
|
|
Terrorists who hijacked American Airlines Flight 11 out of Boston on
Tuesday morning slit the throats of two female flight attendants who tried to bar them from entering the ****pit. The terrorists then forced their way into the locked ****pit and commandeered the Boeing 767 to New York, where they slammed it into one of the World Trade Center towers. The flight, carrying 81 passengers, was bound for Los Angeles. A third stewardess aboard the nine-crew flight – Madeline Amy Sweeney – used her cellphone, or possibly the plane phone, to alert Michael Woodward, her superviser back at Logan International Airport, about the hijacking and murders. The terrorists were armed with razor-tipped knives that looked like box cutters, she relayed. "That was just horrific to all of us when we heard about it at about 8:15" yesterday morning, said the senior American Airlines employee, who works at Logan and said goodbye to the crew at the gate around 7:30 a.m. "We were, like, 'Oh my God, these poor girls are trying to save their captain and their plane.'" The plane left the gate at about 7:45 a.m. and took off at about 7:55 a.m. Sweeney made her call around 8:10 a.m. or 8:15 a.m., the source says. At about 8:25 a.m., the jet turned sharply off its planned westbound flight path and headed south toward Manhattan. The jet crashed into the north World Trade Center tower at about 8:45 a.m. About 15 minutes later, a United Airlines jet sliced through the south tower. According to the American source, the American captain, John Ogonowski, managed to key the ****pit mike, apparently without the terrorists knowing, allowing air-traffic controllers to briefly pick up their ****pit conversations. The terrorists turned off the plane's transponder, the equipment that identifies the plane and provides other information – such as whether it's been hijacked – to air-traffic controllers tracking it by radar. Ogonowski flew the plane with his first officer, Tom McGuinness. "They were trying to clue in the tower," the airline source said. The crew was very close, having flown the Boston-Los Angeles run together regularly, the source said. "This was a senior crew," she said. "They've been around. A lot of them usually do that flight – go out on Flight 11 and come back on Flight 12 [from Los Angeles]. We all knew them really well." In fact, a couple of the stewardesses were married to American gate agents at Logan, she says. "You know, I said goodbye to that crew at the gate," the American employee said. "I was up there talking to the girls who were doing the flight, and the crew walks by and gives us all a wave. They said, 'See you later, we're coming back on [Flight] 12.'" "Everyone was just stunned," she said, when they learned some 90 minutes later of their ultimate fate in Manhattan. As part of their investigation, FBI agents and Massachusetts state troopers have interviewed American Airlines employees and Logan airport workers, including custodians working the morning shift, to rule out an inside job and establish a record of all the people who were at the terminal that morning. "It was pretty intense," said the American worker. |
|
|
|
The history of terrorism against Americans and U.S. allies looks a little like its effects: a smoking pile of rubble. By contrast, the history of nations and their wars—with known political leaders, generals, soldiers, and ambassadors—is downright tidy. World Wars settle issues (temporarily, anyway) and redraw maps; terrorism, concentrated so often on civilians, usually just terrorizes. The human toll of attacks has recently increased as terrorists have moved from making specific demands about prisoner release to general statements of their desire for vast governmental changes. The following is more a journey down nightmare lane than a neat history lesson with a beginning and an end, but one theme does emerge: man's capacity for evil seems limitless, and not limited to Islam's extremists. 7/28/1968 A Marxist group called the People's Front for the Liberation of Palestine (PFLP) begins the first in a series of hijackings of Israeli El Al airliners. For this mission, the group exchanges 48 Israeli hostages for 16 Arab prisoners in Israeli jails. 2/21/1970 PFLP terrorists blow up a Swissair 330 in midair shortly after leaving Geneva, killing 47. 6/10/1970 Agents of the Palestine Liberation Organization murder U.S. Embassy attaché Army Major Robert P. Perry at home in Amman, Jordan. 9/6/1970 PFLP terrorists seize four airliners at the beginning of what would become known as "Black September." The hijackers demand the release of Palestinian prisoners in Germany, Switzerland, and Israel. They fly two planes to Dawson's Field in the Jordanian desert and blow up one in Cairo after releasing passengers and crew. On the fourth plane, the terrorists are overpowered and the plane returns to London. British authorities take Leila Khaled, who commanded the terrorist operation, into custody. The PFLP then demands Ms. Khaled's release and hijacks another plane bound for Beirut, landing a third plane at Dawson's Field. PFLP releases 255 hostages (retaining 56) and blow up the three planes. At the end of Black September, Great Britain releases Ms. Khaled and six other Palestinian guerrillas in exchange for the remaining hostages. 3/1/1971 A U.S. Senate office building sustains heavy damage from a bomb planted by the radical Weather Underground. 5/11/1972 The Red Army Faction (also known in its early years as the Baader-Meinhof Gang) carries out six separate bombing attacks aimed at U.S. Army personnel and a West German Supreme Court Justice. One bomb kills an Army officer and injures 12 other servicemen. A short time later, both Andreas Baader and Ulrike Meinhof are captured and imprisoned. 9/5/1972 At the Olympics in Munich, Germany, eight Black September terrorists take nine Israeli athletes hostage and kill two others. They demand the release of 200 Palestinians in Israeli jails, as well as freedom for terrorists of the Japanese Red Army and the Red Army Faction. A Black September grenade kills the athletes during an unsuccessful rescue attempt. Five terrorists die in a shootout and three are captured. 10/29/1972 Black September hijackers seize a Lufthansa flight from Beirut to Ankara, and gain the freedom of the three remaining Munich assailants. 3/1/1973 Black September terrorists take 10 hostages at the Saudi embassy in Khartoum, Sudan. The terrorists murder the U.S. ambassador and charge d'affaires, as well as a Belgian diplomat. They later surrender to authorities. 2/5/1974 Leftist radicals of the Symbionese Liberation Army kidnap newspaper heiress Patricia Hearst. In April, she totes a gun in a San Francisco bank robbery. In May, police kill six SLA members in a shootout. The FBI arrests Ms. Hearst in September 1975. She claims she only pretended to support the SLA to survive, but she must serve time in prison until President Carter pardons her in 1979. 4/13/1974 The New People's Army, the guerrilla arm of the Communist Party of the Philippines, kills three U.S. Navy personnel near Subic Bay Naval Base. 1/24/1975 At New York City's historic Fraunces Tavern, where in 1783 George Washington said farewell to his troops, a bomb by a doorway explodes during the lunch hour, killing four people and wounding 60. The Puerto Rican terrorist group FALN claims responsibility. 1/28/1975 Weather Underground detonates a bomb at the U.S. State Department building. 8/4/1975 Five terrorists from the Japanese Red Army shoot their way into the American consulate on the ninth floor of a downtown office building in Kuala Lumpur, Malaysia. They wound four people and take 53 men, women, and children hostage, including American consul Robert Stebbins. Japanese officials bow to the attackers' demand for the release of five Japanese Red Army prisoners; after difficult negotiations, Libya agrees to accept the terrorists. After it ends, Mr. Stebbins declares of his captors: "I hope they might someday be people with whom I can sit down and have a cup of coffee and talk about politics." 6/27/1976 The days of coffee talk come to an end after four terrorists-two from the Palestinian terrorist group PFLP and two from the Red Army Faction-hijack an Air France flight from Tel Aviv to Paris, capturing 240. After refueling in Libya, they fly to Entebbe, Uganda, where dictator Idi Amin welcomes them and allows them to land. The terrorists demand the release of 54 colleagues who are jailed in six countries around the world and a $5 million ransom for the PFLP. They release all passengers with non-Israeli passports, reducing the number of hostages to 103. On July 1, Israeli commandos raid the terminal building, killing all four terrorists and rescuing all but two hostages who die in the crossfire. The raid at Entebbe becomes a rallying point for the fight against terrorism. 3/9/1977 A dozen Hanafi Muslim terrorists armed with long knives, pistols, and sawed-off shotguns seize 134 hostages in three buildings only blocks from the White House. One man is killed and 12 are wounded in the takeover of the Islamic Center, the international headquarters of B'nai Brith, and the District building, Washington's city hall. They surrender two days later after negotiations with ambassadors of Egypt, Iran, and Pakistan. 5/17/1977 The anti-American group GRAPO (translated as the October 1 Anti-Fascist Resistance Group) bombs the U.S. Cultural Center in Madrid on the day Vice President Walter Mondale arrives for an official visit. 3/16/1978 Red Brigades terrorists kidnap Italian Prime Minister Aldo Moro and kill five of his bodyguards. They execute Moro and leave his bullet-riddled body in a car in downtown Rome. 2/14/1979 The U.S. ambassador to Afghanistan dies in a hail of gunfire from Afghan troops as others plot to rescue him from four kidnappers in a Kabul hotel room. Just as U.S. officials believed they had persuaded Afghan Interior Ministry officials not to storm the room, a gunshot was heard, spurring the spray of bullets. 6/20/1979 Serb nationalists hijack an American Airlines flight from New York to Chicago, seeking the release of a priest involved in a bombing of a Yugoslavian consular official's home in Chicago four years earlier. The hijackers fail and are taken into custody. 6/25/1979 NATO Allied Supreme Commander (and future Secretary of State) Alexander Haig barely escapes death when a bomb explodes just a few feet behind his chauffeur-driven Mercedes-Benz in Belgium. The Red Army Faction claims responsibility for the attack. 8/27/1979 The Irish Republican Army blows up the boat of Lord Mountbatten, killing the cousin of Queen Elizabeth II. 11/4/1979 In response to the Shah of Iran's admission to the United States for medical treatment and American refusals to extradite him, about 500 Iranians take over the U.S. Embassy in Tehran. They hold 52 Americans as hostages. President Jimmy Carter applies economic pressure on Iran by halting Iranian oil imports and freezing Iranian assets in the United States. On April 24,1980, the Carter administration attempts a rescue mission that fails when three of the mission's eight helicopters are damaged in a sandstorm. After Ronald Reagan's election in November, successful negotiations begin and Iran releases the hostages shortly after President Reagan is inaugurated on January 20, 1981. 12/2/1979 Puerto Rican terrorists kill two U.S. Navy sailors on a bus in Puerto Rico. 7/22/1980 Daoud Salahuddin (formerly David Belfield), an American Khomeini supporter, kills Ali Akbar Tabatabai, a press aide for Iran during the reign of Shah Reza Pahlavi and a strong critic of Ayatollah Khomeini's revolution, at his home in Bethesda, Md. 10/5/1980 Armenian terrorists claim responsibility for two bombings of Turkish interests in the United States, injuring one person near the Turkish consulate in Los Angeles. 3/7/1981 Colombian kidnappers kill American Chester Allen Bitterman, 28, after holding him for six weeks. Bitterman had worked for Wycliffe Bible Translators, and his assailants demand that Wycliffe close its Latin American branch. Wycliffe doesn't comply. 5/9/1981 The Irish Republican Army detonates a bomb at a North Sea oil factory during a visit by Queen Elizabeth. The bomb misses the queen's party. 5/13/1981 Turkish-born terrorist Mehmet Ali Agca shoots Pope John Paul II as he greets a crowd of thousands in St. Peter's Square. The pope survives and later visits with Mr. Agca for 20 minutes in a Rome prison to forgive him. 8/31/1981 The Red Army Faction detonates a bomb inside a Volkswagen in a parking lot at the U.S. Air Force base in Ramstein, West Germany. The explosion injures two West Germans and 18 Americans and knocks down bystanders a hundred yards away. The blast is part of a series of incidents in response to German leftist Sigurd Debus's death by hunger strike at a Hamburg jail. 9/15/1981 The Red Army Faction attempts to kill the commanding general of U.S. forces in Europe, Army Gen. Frederick Kruesen. RAF terrorists fire two RPG-7 grenades at the general's car as he and his wife ride along a highway near Heidelberg. The Kruesens suffer minor injuries. 10/6/1981 Terrorists jump off a parade vehicle during an Egyptian parade, firing weapons and throwing grenades at the reviewing stand. They kill Egyptian President Anwar Sadat along with eight others and injure 20, including four American diplomats. 12/17/1981 The Red Brigades kidnap U.S. Army Brigadier General James Lee Dozier from his home in Verona, Italy. After 42 days, 10 Italian counter-terrorist agents free Dozier in a raid on a Red Brigades hideout. 1/18/1982 In Paris, Lebanese Marxists murder American military attaché Lieutenant Colonel Charles R. Ray near his apartment. 6/1/1982 Terrorist bombs rip through four U.S. military installations in West Germany, including the U.S. Army headquarters in Frankfurt, as President Reagan prepares to tour Europe. The West German terrorist group Revolutionary Cells claims credit. 7/19/1982 David Dodge, the acting president of American University of Beirut, is kidnapped and held in Lebanon and then Iran. He is released a year later, and the Reagan administration gives credit to Syrian leader Hafez Assad, who told the Iranians that Mr. Dodge, as AUB president, had contributed to the culture of the Middle East. 8/21/1982 A bomb planted by Lebanese Marxists beneath the car of an American embassy employee in France explodes as technicians attempt to disarm it, killing one technician and injuring two. 4/18/1983 A man drives a van carrying 2,000 pounds of explosives into the front portion of the seven-story U.S. Embassy in Beirut, killing 63 (including 17 Americans) and injuring 120. Islamic Jihad claims responsibility. 9/16/1983 Puerto Rican terrorists strike the West Hartford, Conn., terminal of Wells Fargo Company, escaping with $7.2 million, one of the largest bank robberies in American history. 10/23/1983 In the early morning at the U.S. Marine barracks in Beirut, a truck loaded with compressed gas-enhanced explosives crashes through chain-link fences and barbed-wire entanglements. While guards open fire, the truck smashes through the doors of the four-story barracks and explodes, killing 241 U.S. servicemen as they sleep. Islamic Jihad claims responsibility. At almost the same time, a nearly identical suicide bombing attack kills 56 soldiers at the eight-story French military barracks in Beirut. 11/6/1983 A bomb explodes around 11 p.m. near the Senate chamber in the U.S. Capitol, blowing out the windows of the Republican cloakroom and throwing large chunks of plaster through the air. A group called the Armed Resistance Unit claims responsibility, saying it is protesting the invasion of Grenada and American involvement in Lebanon. 12/12/1983 Suicide terrorists ram a truckload of explosives into the American and French embassies in Kuwait. Five people, but no Americans, are killed at the U.S. embassy, since the driver hits a small administrative annex rather than the crowded chancellery building. The explosion at the French embassy blows a 30-foot hole in the wall around the compound, but kills no one. Analysts later blame the attacks on the banned Al-Dawa party, a radical Shiite group with ties to Iran. 12/31/1983 Puerto Rican terrorists carry out four simultaneous bombings of government targets in New York City, including city police headquarters, FBI offices, and a federal courthouse. One city detective loses a leg, one loses the fingers on his right hand, and another loses an eye. Some of the wounded later protest when President Clinton pardons FALN activists in 1999, claiming the pardons are intended to curry favor with Puerto Ricans to help Hillary Clinton's Senate race in New York. 1/18/1984 Malcolm H. Kerr, president of the American University of Beirut, is slain by two gunmen as he steps off an elevator near his office. Islamic Jihad claims responsibility. 6/14/1985 Lebanese gunmen hijack TWA flight 847 bound from Athens to Rome with 104 Americans and 49 other passengers and force it to fly to Beirut, where they pick up more gunmen, and then to Algiers. The hijackers release passengers until the number is down to 39. They demand the release of 766 Lebanese prisoners being held in Israel. On the second day of the standoff, the plane returns to Beirut, and the hijackers kill U.S. Navy diver Robert Stethem and throw his body out on the runway. Israel releases 31 Lebanese prisoners, but insists the release is not related to the standoff. After 17 days in captivity, the hostages are transported to Damascus, Syria, and released. 8/8/1985 The Red Army Faction detonates a car bomb at the U.S. Air Force base at Rhein-Main, West Germany, killing two and injuring 17. The night before, the assailants killed an off-duty U.S. serviceman, and they use his military identification to enter the base. 10/7/1985 Four heavily armed Palestinian terrorists from the Popular Liberation Front hijack the Italian cruise ship Achille Lauro, carrying more than 400 passengers and crew, off Egypt. The terrorists demand that Israel release 50 Palestinian prisoners. They murder 69-year-old disabled American tourist Leon Klinghoffer and throw his body overboard with his wheelchair. After two days of tension, the hijackers surrender in exchange for a promise of safe passage. But when an Egyptian jet tries to fly them to freedom, U.S. Navy F-14 fighters intercept it and force it to land in Sicily, where Italian authorities take the terrorists into custody. 11/25/1985 As customers shop at a U.S. military post exchange in Frankfurt, Germany, a bomb hidden in a silver BMW parked about 250 yards away from the PX explodes, injuring 35 people, most of them Americans. 4/2/1986 A bomb explodes aboard a TWA jet in Greece, killing four people, but the plane lands safely. The timing device in the bomb was activated when a passenger sat on the seat it was placed under. 4/5/1986 An explosion rips through La Belle Disco in West Berlin, killing two American soldiers (and one other person) and injuring almost 230, including dozens of off-duty U.S. servicemen. President Reagan orders air strikes against Libya 10 days later as a "swift and effective retribution" for its role in the disco bombing. 4/24/1987 A remote-control bomb injures 16 U.S. servicemen in Greece in an attack by the group Revolutionary Organization 17 November, a Marxist-Leninist group known for lengthy ideological statements. The same group injures another 10 servicemen in Greece in another bus attack on Aug. 10. 10/26/1987 The communist New People's Army kills four Americans within 15 minutes near Clark Air Base. 12/26/1987 One U.S. serviceman is killed and nine others are injured when Catalan separatist groups in Spain launch hand grenades into a USO bar in Barcelona. 4/14/1988 Japanese suicide bomber Junzo Okudaira drives a car bomb into a USO club in Naples, Italy, killing a U.S. Navy enlisted woman and four others. A Japanese Red Army front group claims responsibility. Two days earlier, JRA member Yu Kikumura was arrested at a New Jersey Turnpike rest area with three powerful bombs and other explosives. Both attacks were planned in retaliation on the second anniversary of the U.S. bombing of Libya. 6/28/1988 A car bomb detonated by Revolutionary Organization 17 November kills Captain William Nordeen, a defense attaché at the U.S. embassy in Athens, Greece. 8/8/1988 A group calling itself the "Simon Bolivar Commandos" explodes a bomb as a motorcade carrying Secretary of State George Shultz passes on a highway outside the Bolivian capital city of La Paz. There are no injuries. 12/21/1988 Pan Am Flight 103 from London to New York explodes over Lockerbie, Scotland, killing all 259 people on board (including 189 Americans) and 11 villagers on the ground. Crashing parts of the jet destroy 21 homes. In 1991 the U.S. Central Intelligence Agency charges two Libyan terrorists with the crime. On January 31, 2001, a former Libyan Arab Airlines official and suspected Libyan spy, Abdel Basset Ali al-Megrahi, is convicted of mass murder for his role in the bombing. The other defendant, Lamen Khalifa Fhimah, is found not guilty and receives a hero's welcome upon his return to Libya. 2/28/1989 Two Berkeley, Calif., bookstores are firebombed during the night to protest the sale of Iranian author Salman Rushdie's The Satanic Verses. Iranian authorities had issued a fatwa calling for Rushdie to be killed for disparaging Islam. 3/10/1989 A bomb explodes in a van driven by the wife of U. S. Navy Captain Will C. Rogers. She is unhurt. The attack is believed to be in retaliation for the July 1988 downing of an Iranian civil airliner by the USS Vincennes, commanded by Capt. Rogers. 3/17/1990 Narco-terrorists firebomb Drug Enforcement Agency offices in Fort Myers, Fla. Two months later the FBI rounds up Colombians employed by drug kingpin Pablo Escobar in Florida as they attempt to buy 24 stolen Stinger anti-aircraft missiles for an estimated $6 million dollars. Stinger missiles are capable of destroying the largest airliners. 9/26/1990 Gunmen kill the captain of President Corazon Aquino's guard, as well as two American employees of Ford Aerospace, in attacks that coincide with Vice President Dan Quayle's visit to the Philippines. 12/25/1991 The Union of Soviet Socialist Republics dissolves. The fall of the Soviet Union and the Eastern communist bloc leads to the dissolution of remaining "Red" terrorist groups, especially with the opening of Soviet and East German archives. 1/25/1993 Mir Amal Kansi, a Pakistani living in the United States since 1991, shoots two CIA employees, Lansing Bennet and Frank Darling, and wounds three others near the gate of the CIA's 258-acre headquarters in Langley, Va. 2/26/1993 A minibus containing 1,100 pounds of explosives blows up in the garage beneath the World Trade Center complex. The blast kills six people, injures 1,000, and causes $300 million worth of damage. The towers are cleaned, repaired, and reopened in less than a month. Courts later convict six Middle Eastern men, including mastermind Ramzi Yousef. They claim to be retaliating against U.S. support for the Israeli government. 3/8/1995 A gunman kills two employees of the U.S. consulate in Karachi, Pakistan-CIA communications technician Gary Durell and consulate secretary Jackie Van Landingham. No one claims responsibility, but analysts suggest it could be meant to cripple warming relations between the U.S. and Benazir Bhutto's government in Pakistan. 3/20/1995 Members of Japan's Aum Shinrikyo cult release sarin nerve gas in Tokyo's subway system. The attack kills twelve and renders thousands sick. 9/13/1995 A masked assailant fires a rocket-propelled grenade across a busy street during rush hour at the U.S. Embassy in Moscow, destroying a copier and causing minor damage in a 6th-floor office in protest against American air strikes in Bosnia. 4/19/1995 A truck bomb explodes outside the Alfred R. Murrah Federal Office Building, collapsing walls and floors and killing 168 persons, including 19 children and one person who died in the rescue effort. Over 220 buildings sustain damage. Timothy McVeigh and Terry Nichols are later convicted in a plot to avenge the fiery end of the Branch Davidian standoff in Waco, Texas, exactly two years earlier. The government executes McVeigh in 2001. 6/25/1996 Terrorists drive a tanker truck loaded with at least 5,000 pounds of plastic explosives into the parking lot of Khobar Towers in Dhahran, Saudi Arabia, a housing facility for U.S. and allied forces enforcing a no-fly zone over the southern portion of Iraq. Nineteen Americans are killed and almost 500 wounded as the explosion drills a crater 35 feet deep and rips the front off an apartment building. The Justice Department announces indictments of 13 members of Hezbollah on June 12, 2001. 11/12/1997 In Karachi, Pakistan, two gunmen murder four American auditors for Union Texas Petroleum Company just 36 hours after a jury in Fairfax, Va., found Pakistani Mir Amil Kansi guilty of the two CIA headquarters murders. Kansi was captured a few months before, on June 17, in Pakistan. 8/7/1998 More than 300 people are killed and more than 5,000 injured in simultaneous car bombings of the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania. The explosion rips apart the back of the Kenyan embassy, which was located at an intersection and had no security fence in front, although it had an eight-foot-high steel fence on the other three sides. The Tanzanian blast occurred within the embassy walls, meaning the car had passed through a security check. Authorities suspect Osama bin Laden's network is responsible. 8/20/1998 In response to the embassy bombings, President Clinton authorizes cruise-missile attacks on terrorist targets in Sudan and Afghanistan three days after his sworn testimony in the Monica Lewinsky investigation. Administration officials also freeze the assets of Saleh Idris, who owns the Sudanese factory that is bombed, claiming he has terrorist ties. In May 1998, facing legal action, the administration unfreezes the assets. 12/14/1999 Authorities arrest Algerian Ahmed Ressam as he tries to enter the United States from Canada at Port Angeles, Wash. They find more than 100 pounds of explosives in his car, foiling a plot to detonate a bomb at Los Angeles International Airport in the days before millennium celebrations on 1/1/2000. Three Algerians-Mr. Ressam, Abdel Ghani Meskini, and Mokhtar Haouari-are convicted in New York. Mr. Ressam testifies that he was trained at a camp in Afghanistan that American officials say is run by Osama bin Laden. 10/12/2000 In the port of Aden, Yemen, a pair of suicide bombers in a small boat pull alongside the U.S.S. Cole, an advanced Arleigh Burke-class destroyer carrying Aegis anti-missile weaponry. After taking a mooring line to a buoy to defuse suspicion, the bombers stand at attention as their small boat blows up, blasting a 40-foot-by-40-foot hole in the ship's hull, killing 17 American military personnel and injuring 39. U.S. officials suspect al-Qaeda, the network of Osama bin Laden, who speaks of the ship as having sailed "to its doom" along a course of "false arrogance, self-conceit, and strength." 9/11/2001 Hijackers take over two large jetliners, both en route from Boston to Los Angeles, and fly them into the north and south towers of the World Trade Center in New York City, collapsing both towers and killing more than 5,000 people in the buildings and on the ground. Minutes later another hijacked jet smashes into the west side of the Pentagon. A fourth hijacked plane crashes in a field near Shanksville, Pa. Bin Laden's network is implicated. President George W. Bush, in a speech to Congress, says his administration will make no distinction between terrorists like bin Laden and the states that support them. Four weeks later, the bombing of Afghanistan begins. |
|
|
|
The Taliban grew up in the desperately poor outskirts of Pakistan. As
they grew in power because of their ruthless tactics they spread over the border into neighboring Afghanistan during the years of the Soviet occupation. The United States CIA gave them guerilla training equipped them with military hardware including Stinger missiles which changed the course of the Afghan's war. One of the prominent students was a rich Saudi named Osama bin Laden. His parents were billionaires in the construction business. Osama backed the Taliban group financially when he became upset at the US for using air bases in Saudi Arabia during the Desert Storm war to save Kuwait and Saudi from Iraqi invasion. The Taliban was to become his weapon and his power base. These terrorists from Pakistan then went to war against the native Afghans after they were finished expelling the Soviets. They now occupy all but 15% of Afghanistan and are committing acts on the populace that show that they couldn't care less about Islam. Islam, the Moslem religion is just a shield for their actions. These people commit rape, torture, and murder at will to terrorize any population they seek to subjugate. That is until they tried their tactics on the United States this time. Before this they attacked the administration of BJ Clinton. They knew he was in fact a weak president and would let them continue their terror with little more than token retaliation. This time however they attacked a US led by a President with solid credentials and a powerful array of legitimate advisors. Suddenly the terrorists are afraid from what I am beginning to see a week after their attack. Pakistan is doing what we told them to do or risk bombing of their own country. The Taliban is suddenly saying that although Osama bin Laden has been "their guest" they would like him to leave Afghanistan "voluntarily". And the US has said that is not good enough and the retaliation is now on the way |
|
|
|
Sunday, October 21, 2001 6:39 a.m
FORT BRAGG - Ali Mohamed lived a double life that seemed more fiction than fact. He served in the heart of the U.S. military at Fort Bragg and in the inner circle of Osama bin Laden's Islamic fundamentalist terrorists' network. Long before he was arrested in connection with the 1998 car-bombing attacks on the American embassies in Kenya and Tanzania, there were questions about Ali Mohamed, a retired U.S. Army sergeant. He had puzzled fellow soldiers with his haughty attitude toward America and avowed Islamic fundamentalist beliefs. Now, as the United States wages war on terrorism, the case of Mohamed shows what the CIA and FBI are up against: terrorist operatives who weave themselves into the fabric of America. After al-Qaeda's car-bombings of the American embassies in Kenya and Tanzania, it became clear where his allegiance lay. Investigators linked Mohamed to the attacks, which killed 224 people and injured more than 4,500. He was arrested 34 days later and has since pleaded guilty and described his central role in the attack. Even more than the hijackers of Sept. 11, Mohamed lived and trained in the United States. He had training as a Green Beret officer and turned those skills against the United States. Although law enforcement and intelligence agencies collected information on Mohamed, they assembled the pieces of the puzzle too late -- after the embassies had been bombed. Identifying such terrorists resembles police work more than traditional warfare, experts say. Law enforcement and intelligence agencies need to cooperate and not compete over turf, if they are to apprehend terrorists like Mohamed. "He was an active source for the FBI, a double agent," said Larry Johnson, a former CIA agent and director of counterterrorism at the State Department during the elder Bush's administration. The FBI "did a lousy job of managing him," Johnson said. "He was holding out on them. He had critical information years ago and didn't give it up." The FBI declined to be interviewed for this article. So just who is this educated soldier, fluent in at least four languages, who trained on the drill grounds and red-clay firing ranges of Fort Bragg and taught Green Berets about the Middle East and Islamic fundamentalism? And how did he move back and forth between an outwardly normal immigrant's existence and the hidden world of al-Qaeda? Mohamed's relationship with the FBI and intelligence services remains wrapped in secrecy. His plea agreement is sealed, as are many of the court documents and much of the testimony. Mohamed was expected to testify -- but did not -- at the trial where the four others were convicted. Mohamed and his lawyer have declined all interview requests. But a picture emerges from court documents, interviews, trial transcripts and published accounts. Ever since the attacks Sept. 11, Jason T. Fogg has found himself thinking about Ali Mohamed. He remembers a tall, serious former Egyptian Army major with a haughty attitude toward America. Fogg, who knew nothing about Mohamed's role in al-Qaeda until a reporter told him, said he and Mohamed had spent three months together in Army training. Mohamed constantly compared the U.S. military with his own, and the former officer always found the American military wanting. "To be in the [enlisted ranks] and have so much training was weird," said Fogg, now a supervisor with a freight company in Spring Hill, Tenn. "And to be in the U.S. military and have so much hate toward the U.S. was odd. He never referred to America as his country." Mohamed was quiet but with a ferocious temper and very religious, Fogg said. This echoes court testimony by admitted al-Qaeda members earlier this year about the man they called "Abu Mohamed al Amriki" -- Mohamed the American. Some al-Qaeda members, however, found spiritual shortcomings in the salty-tongued Mohamed. "He is not a good practitioner of Islam," testified L'Houssaine Khertchou, a witness in the embassy bombings trial. "You can hear from him some bad words." Egyptian army experience Born in Alexandria in 1952, Mohamed joined the Egyptian army in 1971. With a bachelor's in psychology and two years of training at Egypt's military academy, he rose to major in the Egyptian special forces. Sometime in the early 1980s, after Egyptian President Anwar Sadat made peace with Israel in the Camp David accords, Mohamed joined the fundamentalist group Egyptian Islamic Jihad. About this time, the Egyptian army sent Mohamed to Fort Bragg for special forces training -- common for officers from countries the United States regards as friendly. Training beside U.S. Green Berets, he learned how to command elite soldiers on difficult missions such as special reconnaissance, unconventional warfare and counterinsurgency operations. After four months, he received a diploma with a green beret on it. Returning home, he served in the Egyptian army for three more years. In 1984, he left to work as a security expert for Egypt Air -- and started to make contact with the CIA. "This individual approached the CIA to offer information," a U.S. official told The News & Observer, speaking on condition that no further identification be provided. "Some time later, we found out he was talking to known terrorists and had identified himself as a CIA agent. We felt him to be untrustworthy, and we put him on the State Department watch list." The CIA also warned other U.S. government agencies about Mohamed and urged them to detain him if possible, the official said. The next year, in 1985, Mohamed managed to get a visa to enter the United States. One year later, he enlisted as a regular soldier in the U.S. Army at the age of 34, unusually old for a recruit. He was assigned to the U.S. Special Operations Command in Fort Bragg, the home of the Green Berets and the Delta Force, the elite counterterrorism squad. Fluent in Arabic, Hebrew, French and English, Mohamed brought extensive knowledge of the Arab world. Though officially a supply sergeant, he spent much of his time teaching soldiers about the Mideast. Robert Anderson, a retired lieutenant colonel, remembers him vividly. Anderson said Mohamed made no secret of his religious views. "He had identified himself as a fundamentalist, but after I interviewed him I identified him as a fanatic," said Anderson, who lives in Fay-etteville. "So after the interview I said, 'Well, there's one thing I would like to say: Anwar Sadat was a hero to Egypt and to the United States.' He looked at me with these steely eyes and said, 'Sadat was a traitor, and he had to die.' " Mohamed's beliefs were not just talk. In 1988, he told Anderson and others that he was using his leave to join the war in Afghanistan against Soviet occupation. The United States was then secretly supporting the Afghan rebels and supplying them with weapons; but it was highly irregular, if not illegal, for an active-duty U.S. soldier to fight in a foreign war. If the Soviets captured him and learned his identity, it would embarrass the United States and further aggravate international tensions. Anderson and another of Mohamed's superiors speculated that Mohamed would end up in a military prison if he went. Anderson said he submitted an intelligence report to his superiors two weeks before Mohamed departed, but it was ignored. Mohamed returned about a month later, Anderson said. He had clearly lost weight, suggesting that the trip had been strenuous. "He comes back and brings me a belt from a Russian special forces soldier that he said he killed," Anderson said. Anderson wrote up a second report and again heard no response. Questions about Mohamed Other soldiers who served with Mohamed said they had unanswered questions about him. Lamar A. Wood, who worked in the motor pool attached to the 5th Special Forces Group, recalled a time when Mohamed was shipped back to the United States in 1988 during the annual Egypt-U.S. desert war games known as Operation Bright Star. "He had to come back to the states only after three days or so," Wood said. "There was some trouble there." Near the end of his tour at Bragg, Mohamed apparently got busier in his work with terrorist groups. Documents from court cases show that he traveled on weekends to New Jersey, where he trained other Islamic fundamentalists in surveillance, weapons and explosives. He continued this training after he was honorably discharged in 1989 with commendations in his file, including one for "patriotism, valor, fidelity and professional excellence." Mohamed spent the next five years in the Army Reserves. For nine years after he left active duty, until his arrest in 1998, Mohamed shuttled between California, Afghanistan, Kenya, Somalia and at least a dozen other countries, the court records show. It was through his contacts with the Egyptian Islamic Jihad that he met bin Laden, but the date is not clear. It may have been in 1991, when Mohamed again went to Afghanistan to fight. That year, Mohamed helped move bin Laden from Afghanistan to Sudan. Mohamed was soon handling some of bin Laden's most sensitive security matters, details of which he made public during his guilty plea. After a failed 1994 assassination attempt on bin Laden, Mohamed trained the inner circle of bodyguards for the Saudi exile. He handled security when bin Laden moved his al-Qaeda entourage from Sudan back to Afghanistan in 1996, as well as when bin Laden met the Hezbollah chief who had directed the 1983 bombing of the U.S. Marine barracks in Beirut. Mohamed also shared his extensive military knowledge. He gave basic explosives training for al-Qaeda soldiers in Afghanistan in 1992 and translated training manuals from English to Arabic. In 1993, he trained Somali clansmen in the months leading up to a furious gun battle that took the lives of 18 U.S. soldiers. Mohamed taught the terrorists how to create cell structures that preserved secrecy and how to move undercover in Western countries. He taught surveillance techniques: how to case targets, photograph them and write attack plans. And he played a central role in the 1998 bombing of the U.S. Embassy in Nairobi, Kenya. In the early 1990s, he set up a cell in the Kenyan capital to support al-Qaeda's operations in Somalia, using a car business and a charity as cover. "We used various code names to conceal our identities," Mohamed said in his guilty plea. "I used the name 'Jeff.' " In late 1993, al-Qaeda ordered Mohamed to scour Nairobi for targets that would avenge the U.S. involvement in Somalia. Mohamed conducted surveillance of the U.S. Embassy, the U.S. Agency for International Development and two French facilities. He drew maps and diagrams and rigged a darkroom in a colleague's apartment to avoid dealing with a commercial developer. He later showed the photos to bin Laden in the Sudanese capital, Khartoum. "Bin Laden looked at the picture of the American Embassy and pointed to where a truck could go as a suicide bomber," Mohamed told the court last year. Bombings planned patiently In planning the embassy attacks, Mohamed and his al-Qaeda associates showed the kind of patience that would later characterize the 2001 attacks in America. It was not until August 1998 -- four years later -- that Mohamed's partners parked a truck full of plastic explosives in the very spot bin Laden had chosen. The suicide bomb crumpled buildings, twisted and incinerated buses and shattered windows as far as five blocks away. The blast killed 224 people and injured more than 4,500. Within two weeks, FBI agents led a squad of 10 into Mohamed's apartment in Sacramento, Calif., using a key provided by his apartment manager, according to testimony at the trial. They copied computer files and photographed documents. The evidence they found of Mohamed's terrorist activities included documents from his cell in Kenya and materials on how to run terrorist cells and penetrate security cordons. Mohamed was subpoenaed to appear before a grand jury on Sept. 10, 1998. He was arrested as he left the grand jury room. At the request of the U.S. Attorney, federal judges kept the arrest secret for almost a year, filing his case as "United States v. John Doe" and clearing the courtroom whenever it came up. Much of the case remains sealed. Mohamed would have come first to the attention of the FBI in late 1990 after the murder of the Rabbi Meier Kahane, a radical Jewish leader. When authorities searched the home of El Sayyid Nosair, who was charged with Kahane's murder, they found U.S. Army training manuals, videotaped talks that Mohamed delivered at the Kennedy Special Warfare Center at Fort Bragg, an operation plan for Operation Bright Star and other materials marked "Classified" or "Top Secret." Mohamed, who often stayed in New Jersey with Nosair, was the source of these documents. The documents didn't surface during Nosair's 1991 trial when he was acquitted of killing Kahane, but they did in 1995 when Nosair was convicted of conspiring to blow up the World Trade Center and other New York landmarks in 1993. Roger Stavis, Nosair's attorney, argued to the jury that the U.S. Army sent Mohamed to New Jersey to do the training. One witness, Khalid Ibrahim, testified that he was trained by Mohamed in New Jersey and then saw him later in Afghanistan. "He's on active duty, helping Muslims train to help Muslims in Afghanistan, as part of a U.S. government effort," Stavis said in an interview. The FBI has acknowledged in court filings that its agents interviewed Mohamed several times after he left active duty. In 1993, he told the FBI that bin Laden "ran an organization called al-Qaeda and was building an army which may be used to overthrow the Saudi Government." In 1994, he told the FBI that he had moved bin Laden out of Afghanistan in 1991. In a 1997 interview, Mohamed admitted to a much deeper involvement in al-Qaeda. An FBI agent wrote that Mohamed said that "he loved Bin Laden and believed in him" and that "one did not need a fatwah [religious ruling] to go against the United States since it was 'obvious' that the United States was the enemy." However, not all of Bin Laden's people trusted Mohamed. In 1994, Mohamed Atef, the al-Qaeda commander credited with engineering the attack Sept. 11 on New York and Washington, refused to let Mohamed know what name and passport he was traveling under. Atef "doesn't want Abu Mohamed al Amriki to see his name, because he was afraid that maybe he is working with United States or other governments," L'Houssaine Khertchou testified at the embassy bombing trial in February. Defense lawyers and many other observers believe that Mohamed, who has not yet been sentenced, is now cooperating with the United States, though the government has never confirmed this. When he is finally sentenced, Mohamed could receive as little as 25 years under his plea agreement, which would allow him to be free at 73. David Ruhnke, attorney for one of the four embassy bombing defendants, said that Mohamed's deal with the government might strike the jury as unfair, because the the government was seeking the death penalty for two defendants. "Some of the things [Mohamed] admitted were so serious," Ruhnke said. "The government worried it would impact the jury." But Larry Johnson, the former State Department counterterrorism chief, has a more skeptical interpretation: Putting Mohamed on trial would unearth material extremely embarrassing for the government. "The reason he didn't testify was so they wouldn't have to face uncomfortable statements on the FBI," Johnson said. "They are more interested in covering their ass." There are lessons to be learned, Johnson said. The FBI should have polygraphed Mohamed and used counterintelligence techniques to see if he was forthcoming. The CIA and the FBI should have worked together on Mohamed. Mohamed has not spoken in public since his guilty plea, but his prior statements carry warnings to the country in whose military he served. "He knows, for example, that there are hundreds of 'sleepers' or 'submarines' in place who don't fit neatly into the terrorist profile," a 1997 FBI report said. "These individuals don't wear the traditional beards and don't pray at the mosques |
|
|
|
A cult that displays these characteristics may then produce three
social-psychological components, referred to as the "Lethal Triad," that predispose a cult towards violence aimed at its members and/or outsiders.40 Cults in which members are heavily dependent on the leader for all decision making almost always physically and psychologically isolate their members from outsiders, the first component of the triad.41 The other two components interact in the following way: "... isolation causes a reduction of critical thinking on the part of group members who become entrenched in the belief proposed by the group leadership. As a result, group members relinquish all responsibility for group decision making to their leader and blame the cause of all group grievances on some outside entity or force, a process known as projection. Finally, isolation and projection combine to produce pathological anger, the final component of the triad."42 Of the nearly 1000 cults operating in the United States, very few present credible threats for millennial violence. Law enforcement officials should concentrate on those cults that advocate force or violence to achieve their goals concerning the endtime, as well as those cults which possess a substantial number of the distinguishing traits listed above.43 In particular, cults of greatest concern to law enforcement are those that: (1) believe they play a special, elite role in the endtime; (2) believe violent offensive action is needed to fulfill their endtime prophecy; (3) take steps to attain their beliefs. Those factors may culminate in plans to initiate conflict with outsiders or law enforcement. The violent tendencies of dangerous cults can be classified into two general categories defensive violence and offensive violence. Defensive violence is utilized by cults to defend compound or enclave that was created specifically to eliminate most contact with the dominant culture.44 44 Jeffrey Kaplan, Radical Religion in America, p.57. 45 Ibid., p.165. 46 Lisa Beyer, "Target: Jerusalem," Time Magazine, January 18, 1999. 29 The 1993 clash in Waco, Texas at the Branch Davidian complex is an illustration of such defensive violence. History has shown that groups that seek to withdraw from the dominant culture seldom act on their beliefs that the endtime has come unless provoked.45 Cults with an apocalyptic agenda, particularly those that appear ready to initiate rather than anticipate violent confrontations to bring about Armageddon or fulfill "prophesy" present unique challenges to law enforcement officials. One example of this type of group is the Concerned Christians (CC). Monte Kim Miller, the CC leader, claims to be one of the two witnesses or prophets described in the Book of Revelation who will die on the streets of Jerusalem prior to the second coming of Christ. To attain that result, members of the CC traveled to Israel in 1998 in the belief that Miller will be killed in a violent confrontation in the streets of Jerusalem in December 1999. CC members believe that Miller's death will set off an apocalyptic end to the millennium, at which time all of Miller's followers will be sent to Heaven. Miller has convinced his followers that America is "Babylon the Great" referred to in the Book of Revelation. In early October 1998, CC members suddenly vanished from the United States, an apparent response to one of Miller's "prophesies" that Denver would be destroyed on October 10, 1998. In January 1999, fourteen members of the group who had moved to Jerusalem were deported by the Israeli government on the grounds that they were preparing to hasten the fulfillment of Miller's prophecies by instigating violence.46 Ascertaining the intentions of such cults is a daunting endeavor, particularly since the agenda or plan of a cult is often at the whim of its leader. Law enforcement personnel should become well acquainted with the previously mentioned indicators of potential cult violence in order to separate the violent from the non-violent. 47 Arabs refer to this site as Haram al-Sharif, which is Arabic for "Noble Sanctuary." Israelis refer to it as Har HaBayit, which is Hebrew for "Temple Mount." American news organizations almost always refer to it as the Temple Mount. Therefore, for the sake of simplicity and continuity, the term Temple Mount will be used in this report when referring to this section of Jerusalem. 30 VIII. THE SIGNIFICANCE OF JERUSALEM The city of Jerusalem, cherished by Jews, Christians, and Muslims alike, faces many serious challenges as the year 2000 approaches. As already evidenced by the deportation of various members of the religious cult known as the Concerned Christians, zealotry from all three major monotheistic religions is particularly acute in Israel, where holy shrines, temples, churches, and mosques are located. While events surrounding the millennium in Jerusalem are much more problematic for the Israeli government than for the United States, the potential for violent acts in Jerusalem will cause reverberations around the world, including the United States. The extreme terrorist fringes of Christianity, Judaism, and Islam are all present in the United States. Thus, millennial violence in Jerusalem could conceivably lead to violence in the United States as well. Within Jerusalem, the Temple Mount, or Haram al-Sharif, holds a special significance for both Muslims and Jews.47 The Temple Mount houses the third holiest of all Islamic sites, the Dome of the Rock. Muslims believe that the prophet Muhammad ascended to Heaven from a slab of stone the "Rock of Foundation" located in the center of what is now the Dome of the Rock. In addition, when Arab armies conquered Jerusalem in 638 A.D., the Caliph Omar built the al-Aqsa Mosque facing the Dome of the Rock on the opposite end of the Temple Mount. The Western (or Wailing) Wall, the last remnant of the second Jewish temple that the Romans destroyed in 70 A.D., stands at the western base of the Temple Mount. The Western Wall has long been a favorite pilgrimage site for Jews, and religious men and women pray there on a daily basis. Thus, the Temple Mount is equally revered by Jews as the site upon which the first and second Jewish Temples stood. Israeli officials are extremely concerned that the Temple Mount, an area already seething with tension and distrust among Jews and Muslims, will be the stage for violent encounters between religious zealots. Most troubling is the fact that an act of terrorism need not be the catalyst that sparks widespread violence. Indeed, a simple symbolic act of desecration, or even perceived desecration, of any of the holy sites on the Temple Mount is likely to trigger a violent reaction. For example, the Islamic holy month of Ramadan is expected to coincide with the arrival of the year 2000. Thus, even minor provocations on or near the Temple Mount may provide the impetus for a violent confrontation. The implications of pilgrimages to Jerusalem by vast numbers of tourists are ominous, particularly since such pilgrimages are likely to include millennial or apocalyptic cults on a mission to hasten the arrival of the Messiah. There is general concern among Israeli officials that Jewish and Islamic extremists may react violently to the influx of Christians, particularly near the Temple Mount. The primary concern is that extreme millennial cults will engage in proactive violence designed to hasten the second coming of Christ. Perhaps the most likely scenario involves an attack on the Al-Aqsa Mosque or the Dome of the Rock. Some millennial cults hold that these structures must be destroyed so that the Jewish Temple can be rebuilt, which they see as a prerequisite for the return of the Messiah. 31 Additionally, several religious cults have already made inroads into Israel, apparently in preparation for what they believe to be the endtimes. It is beyond the scope of this document to assess the potential repercussions from an attack on Jewish or Islamic holy sites in Jerusalem. It goes without saying, however, that an attack on the Dome of the Rock or the Al-Aqsa Mosque would have serious implications. In segments of the Islamic world, close political and cultural ties between Israel and the United States are often perceived as symbolic of anti-Islamic policies by the Western world. Attacks on Islamic holy sites in Jerusalem, particularly by Christian or Jewish extremists, are likely to be perceived by Islamic extremists as attacks on Islam itself. Finally, the possibility exists that Islamic extremist groups will capitalize upon the huge influx of foreigners into Jerusalem and engage in a symbolic attack. 32 IX. CONCLUSION Extremists from various ideological perspectives attach significance to the arrival of the year 2000, and there are some signs of preparations for violence. The significance of the new millennium is based primarily upon either religious beliefs relating to the Apocalypse/Armageddon, or political beliefs relating to the New World Order conspiracy theory. The challenge to law enforcement is to understand these extremist theories and, if any incidents do occur, be prepared to respond to the unique crises they will represent. Law enforcement officials should be particularly aware that the new millennium may increase the odds that extremists may engage in proactive violence specifically targeting law enforcement officers. Religiously motivated extremists may initiate violent conflicts with law enforcement officials in an attempt to facilitate the onset of Armageddon, or to help fulfill a "prophesy." For many on the extreme right-wing, the battle of Armageddon is interpreted as a race war to be fought between Aryans and the "satanic" Jews and their allies. Likewise, extremists who are convinced that the millennium will lead to a One World Government may choose to engage in violence to prevent such a situation from occurring. In either case, extremists motivated by the millennium could choose martyrdom when approached or confronted by law enforcement officers. Thus, law enforcement officials should be alert for the following: 1) plans to initiate conflict with law enforcement; 2) the potential increase in the number of extremists willing to become martyrs; and 3) the potential for a quicker escalation of conflict during routine law enforcement activities (e.g. traffic stops, issuance of warrants, etc.). END OF REPORT F.B.I. PROJECT MEGIDDO |
|
|
|
V. MILITIAS
The majority of growth within the militia movement occurred during the 1990s. There is not a simple definition of how a group qualifies as a militia. However, the following general criteria can be used as a guideline: (1) a militia is a domestic organization with two or more members; (2) the organization must possess and use firearms; and (3) the organization must conduct or encourage paramilitary training. Other terms used to describe militias are Patriots and Minutemen. Most militias engage in a variety of anti-government rhetoric. This discourse can range from the protesting of government policies to the advocating of violence and/or the overthrow of the federal government. However, the majority of militia groups are non-violent and only a small segment of the militias actually commit acts of violence to advance their political goals and beliefs. A number of militia leaders, such as Lynn Van Huizen of the Michigan Militia Corps Wolverines, have gone to some effort to actively rid their ranks of radical members who are inclined to carry out acts of violence and/or terrorism.25 Officials at the FBI Academy classify militia groups within four categories, ranging from moderate groups who do not engage in criminal activity to radical cells which commit violent acts of terrorism.26 It should be clearly stated that the FBI only focuses on radical elements of the militia movement capable and willing to commit violence against government, law enforcement, civilian, military and international targets. In addition, any such investigation of these radical militia units must be conducted within strict legal parameters. Militia anxiety and paranoia specifically relating to the year 2000 are based mainly on a political ideology, as opposed to religious beliefs. Many militia members believe that the year 2000 will lead to political and personal repression enforced by the United Nations and countenanced by a compliant U.S. government. This belief is commonly known as the New World Order (NWO) conspiracy theory (see Chapter I, Introduction). Other issues which have served as motivating factors for the militia movement include gun control, the incidents at Ruby Ridge (1992) and Waco (1993), the Montana Freemen Standoff (1996) and the restriction of land use by federal agencies. One component of the NWO conspiracy theory that of the use of American military bases by the UN is worth exploring in further detail. Law enforcement officers, as well as military personnel, should be aware that the nation's armed forces have been the subject of a great deal of rumor and paranoia circulating among many militia groups. One can find numerous references in militia literature to military bases to be used as concentration camps in the NWO and visiting foreign military personnel conspiring to attack Americans. 27 Accessed at www.eagleflt.com. 22 One example of this can be found on the website for the militia group United States Theatre Command (USTC).27 The USTC website prominently features the NWO theory as it portrays both Camp Grayling in Michigan and Fort Dix in New Jersey as detention centers to be used to house prisoners in an upcoming war. Specifically in reference to a photograph of Camp Grayling, the USTC website states: "Note that the barbed wire is configured to keep people in, not out, and also note in the middle of the guard towers, a platform for the mounting of a machine gun." Specifically in reference to a photograph of Fort Dix, the USTC website states: "Actual photos of an 'Enemy Prisoner of War' camp in the United States of America! (Fort Dix, New Jersey to be exact!) Is there going to be a war here? Many more are suspected to be scattered throughout the United States." Law enforcement personnel should be aware of the fact that the majority of militias are reactive, as opposed to proactive. Reactive militia groups are generally not a threat to law enforcement or the public. These militias may indeed believe that some type of NWO scenario may be imminent in the year 2000, but they are more inclined to sit back and wait for it to happen. They will stockpile their guns and ammunition and food, and wait for the government to curtail their liberties and take away their guns. When the expected NWO tragedy does not take place, these reactive militias will simply continue their current activities, most of which are relatively harmless. They will not overreact to minor disruptions of electricity, water and other public services. However, there is a small percentage of the militia movement which may be more proactive and commit acts of domestic terrorism. As stated earlier, the main focus of the militias connected to the Y2K/millennium revolves around the NWO conspiracy theory. While the NOW is a paranoid theory, there may be some real technological problems arising from the year 2000. Among these are malfunctioning computers, which control so many facets of our everyday lives. Any such computer malfunctions may adversely affect power stations and other critical infrastructure. If such breakdowns do occur, these may be interpreted as a sign by some of the militias that electricity is being shut off on purpose in order to create an environment of confusion. In the paranoid rationalizations of these militia groups, this atmosphere of confusion can only be a prelude to the dreaded NWO/One World Government. These groups may then follow through on their premeditated plans of action. 28 See Fall 1997 edition of the Southern Poverty Law Center's Intelligence Report, "Rough Waters: Stream of Knowledge Probed by Officials." 23 VI. BLACK HEBREW ISRAELITES As the millennium approaches, radical fringe members of the Black Hebrew Israelite (BHI) movement may pose a challenge for law enforcement. As with the adherents of most apocalyptic philosophies, certain segments of the BHI movement have the potential to engage in violence at the turn of the century. This movement has been associated with extreme acts of violence in the recent past, and current intelligence from a variety of sources indicates that extreme factions of BHI groups are preparing for a race war to close the millennium. Violent BHI followers can generally be described as proponents of an extreme form of black supremacy. Drawing upon the teachings of earlier BHI adherents, such groups hold that blacks represent God's true "chosen people," while condemning whites as incarnate manifestations of evil. As God's "authentic" Jews, BHI adherents believe that mainstream Jews are actually imposters. Such beliefs bear a striking resemblance to the Christian Identity theology practiced by many white supremacists. In fact, Tom Metzger, renowned white supremacist, once remarked, "They're the black counterpart of us."28 Like their Christian Identity counterparts, militant BHI followers tend to see themselves as divinely endowed by God with superior status. As a result, some followers of this belief system hold that violence, including murder, is justifiable in the eyes of God, provided that it helps to rid the world of evil. Violent BHI groups are of particular concern as the millennium approaches because they believe in the inevitability of a race war between blacks and whites. The extreme elements of the BHI movement are prone to engage in violent activity. As seen in previous convictions of BHI followers, adherents of this philosophy have a proven history of violence, and several indications point toward a continuation of this trend. Some BHI followers have been observed in public donning primarily black clothing, with emblems and/or patches bearing the "Star of David" symbol. Some BHI members practice paramilitary operations and wear web belts and shoulder holsters. Some adherents have extensive criminal records for a variety of violations, including weapons charges, assault, drug trafficking, and fraud. In law enforcement circles, BHI groups are typically associated with violence and criminal activity, largely as a result of the movement's popularization by Yahweh Ben Yahweh, formerly known as Hulon Mitchell, Jr., and the Miami-based Nation of Yahweh (NOY). In reality, the origins of the BHI movement are non-violent. While the BHI belief system may have roots in the United States as far back as the Civil War era, the movement became more recognized as a result of the teachings of an individual known as Ben Ami Ben Israel, a.k.a Ben Carter, from the south side of Chicago. Ben Israel claims to have had a vision at the age of 27, hearing "a voice tell me that the time had come for Africans in America, the descendants of the Biblical Israelites, to return to the land of our forefathers." 29 Linda Jones. "Claiming a Promised Land: African-American settlers in Israel are guided by idea of independent Black Hebrew Society," The Dallas Morning News, July 27, 1997. 30 Ibid. 31 See Fall 1997 Southern Poverty Law Center's Intelligence Report, "Rough Waters: Stream of Knowledge Probed by Officials." 32 Jones, Dallas Morning News, July 27, 1997. 33 Ibid. 34 Ibid. In fact, in the community of Dimona where the BHI community resides, the Dimona Police Chief spoke in complimentary terms as to the group's discipline, leadership, and integrity. 24 29 Ben Israel persuaded a group of African-Americans to accompany him to Israel in 1967, teaching that African- Americans descended from the biblical tribe of Judah and, therefore, that Israel is the land of their birthright. Ben Israel and his followers initially settled in Liberia for the purposes of cleansing themselves of bad habits. In 1969, a small group of BHI followers left Liberia for Israel, with Ben Israel and the remaining original migrants arriving in Israel the following year. Public source estimates of the BHI community in Israel number between 1500 and 3000. 30 Despite promoting non-violence, members of Ben Israel's movement have shown a willingness to engage in criminal activity. For example, in 1986, Ben Israel and his top aide, Prince Asiel Ben Israel, were convicted of trafficking stolen passports and securities and forging checks and savings bonds.31 BHI in Israel are generally peaceful, if somewhat controversial. The FBI has no information to indicate that Ben Israel's BHI community in Israel is planning any activity terrorist, criminal, or otherwise inspired by the coming millennium. Ben Israel's claims to legitimate Judaism have at times caused consternation to the Israeli government. BHI adherents in Israel have apparently espoused anti-Semitic remarks, labeling Israeli Jews as "imposters."32 Neither the Israeli government nor the Orthodox rabbinate recognize the legitimacy of BHI claims to Judaism. According to Jewish law, an individual can be recognized as Jewish if he/she was born to a Jewish mother or if the individual agrees to convert to Judaism.33 At present, BHI in Israel have legal status as temporary residents, which gives them the right to work and live in Israel, but not to vote. They are not considered to be Israeli citizens. While BHI claims to Judaism are disregarded by Israeli officials and religious leaders, the BHI community is tolerated and appears to be peaceful.34 While the BHI community in Israel is peaceful, BHI adherents in the United States became associated with violence thanks to the rise of the NOY, which reached the height of its popularity in the 1980s. The NOY was founded in 1979 and led by Yahweh Ben Yahweh. Ben Yahweh's followers viewed him as the Messiah, and therefore demonstrated unrequited and unquestioned obedience. Members of the organization engaged in numerous acts of violence in the 1980s, including several homicides, following direct orders from Ben Yahweh. Seventeen NOY members were indicted by a federal grand jury in Miami in 1990-91 on charges of RICO, RICO conspiracy, and various racketeering acts. Various members were convicted on RICO conspiracy charges and remain imprisoned. 25 While the overwhelming majority of BHI followers are unlikely to engage in violence, there are elements of this movement with both the motivation and the capability to engage in millennial violence. Some radical BHI adherents are clearly motivated by the conviction that the approach of the year 2000 brings society ever closer to a violent confrontation between blacks and whites. While the rhetoric professed by various BHI groups is fiery and threatening, there are no indications of explicitly identified targets for violence, beyond a general condemnation and demonization of whites and "imposter" Jews. Militant BHI groups tend to distrust the United States government; however, there are no specific indications of imminent violence toward the government. 35 Frederick C. Mish, ed., Merriam Webster's Collegiate Dictionary 10 th Edition (Springfield, MA: Merriam-Webster, Incorporated, 1997), p. 282. 36 Margaret Thaler Singer and Janja Lalich, Cults in Our Midst: The Hidden Menace in Our Everyday Lives (San Francisco, CA: Jossey-Bass Publishers, 1995), p. 7. 37 Singer and Lalich, p. 7. 38 Singer and Lalich, pp.8-9. 26 VII. APOCALYPTIC CULTS For apocalyptic cults, especially biblically based ones, the millennium is viewed as the time that will signal a major transformation for the world. Many apocalyptic cults share the belief that the battle against Satan, as prophesied in the Book of Revelation, will begin in the years surrounding the millennium and that the federal government is an arm of Satan. Therefore, the millennium will bring about a battle between cult members religious martyrs and the government. In the broadest meaning, cults are composed of individuals who demonstrate "great devotion to a person, idea, object or movement."35 However, using that definition, many domestic terrorist groups could be characterized as cults, including Christian Identity churches, Black Hebrew Israelites, and some militias. For law enforcement purposes, a narrower interpretation of groups that qualify as cults is needed. A more useful definition of cults incorporates the term "cultic relationships" to describe the interactions within a cult.36 Specifically, a cultic relationship refers to "one in which a person intentionally induces others to become totally or nearly totally dependent on him or her for almost all major life decisions, and inculcates in these followers a belief that he or she has some special talent, gift, or knowledge."37 This definition of cults provides important distinctions that are vital for analyzing a cult's predilection towards violence. The origin of the cult, the role of its leader, and its uniqueness provide a framework for understanding what distinguishes cults from other domestic terrorist groups that otherwise share many similar characteristics. These distinctions are: (1) cult leaders are self-appointed, persuasive persons who claim to have a special mission in life or have special knowledge; (2) a cult's ideas and dogma claim to be innovative and exclusive; and (3) cult leaders focus their members' love, devotion and allegiance on themselves.38 These characteristics culminate in a group structure that is frequently highly authoritarian in structure. Such a structure is a sharp contrast to the rapidly emerging trend among domestic terrorist groups towards a leaderless, non-authoritarian structure. While predicting violence is extremely difficult and imprecise, there are certain characteristics that make some cults more prone to violence. Law enforcement officials should be aware of the following factors: 39 Carl J. Jensen, III, Rod Gregg and Adam Szubin, "When a Cult Comes to Town," accessed from Law Enforcement Online. 27 Sequestered Groups: Members of sequestered groups lose access to the outside world and information preventing critical evaluation of the ideas being espoused by the leader. Leader's History: The fantasies, dreams, plans, and ideas of the leader are most likely to become the beliefs of the followers because of the totalitarian and authoritarian nature of cults. Psychopaths: Control of a group by charismatic psychopaths or those with narcissistic character disorders. Changes in the Leader: Changes in a leader's personality caused by traumatic events such as death of a spouse or sickness. Language of the Ideology: Groups that are violent use language in their ideology that contains the seeds of violence. Implied Directive for Violence: Most frequently, a leader's speeches, rhetoric, and language does not explicitly call for violence, rather it is most often only implied. Length of Time: The longer the leader's behavior has gone unchecked against outside authority, the less vulnerable the leader feels. Who Is in the Inner Circle: Cults with violent tendencies often recruit people who are either familiar with weapons or who have military backgrounds to serve as enforcers. Apocalyptic cults see their mission in two general ways: They either want to accelerate the end of time or take action to ensure that they survive the millennium. For example, Aum Shinrikyo wanted to take action to hasten the end of the world, while compounds in general are built to survive the endtime safely. An analysis of millennial cults by the FBI's Behavioral Science Unit describes how rhetoric changes depending on whether the leader's ideology envisions the group as playing an active role in the coming Apocalypse or a passive survivalist role: A cult that predicts that "God will punish" or "evil will be punished" indicates a more passive and less threatening posture than the cult that predicts that "God's chosen people will punish . . ." As another example, the members of a passive group might predict that God or another being will one day liberate their souls from their bodies or come to carry them away. The followers of a more action-oriented group would, in contrast, predict that they themselves will one day shed their mortal bodies or transport themselves to another place.39 40 Kevin M. Gilmartin, "The Lethal Triad: Understanding the Nature of Isolated Extremist Groups," accessed at www.leo.gov/tlib/leb/1996/sept961/txt. 41 Carl J. Jensen, III and Yvonne Hsieh, "Law Enforcement and the Millennialist Vision: A Behavioral Approach," accessed from Law Enforcement Online. 42 Ibid. 43 B.A. Robinson in "Factors Commonly Found in Doomsday Cults," (www.religioustolerance.org/cultsign.htm.) dentifies traits that provide a framework for analyzing cults. They include the following: (1) The leader preaches end of the world/Armageddon in 2000 or within a reasonable time frame before and after 2000; (2) the cult expects to play a major, elite role at the end time; (3) the cult has large numbers of firearms, explosives or weapons of mass destruction; (4) the cult has prepared defensive structures; (5) the cult speaks of offensive action; (4) the cult is led by a single male charismatic leader; (5) the leader dominates the membership through physical, sexual and emotional control; (6) the cult is not an established denomination; (7) cult members live together in a community isolated from society; (8) extreme paranoia exists within the cult concerning monitoring by outsiders and government persecution; (9) and outsiders are distrusted, and disliked. These factors are designed to leave out cults that have unique end-time beliefs, but whose ideology does not include the advocacy of force or violence. |
|
|
|
Nevertheless, Christian Identity is the most unifying theology for a
number of these diverse groups and one widely adhered to by white supremacists. It is a belief system that provides its members with a religious asis for racism and an ideology that condones violence against non-Aryans. This doctrine allows believers to fuse religion with hate, conspiracy theories, and apocalyptic fear of the future. Christian Identity-inspired millennialism has a distinctly racist tinge in the belief that Armageddon will be a race war of Aryans against Jews and nonwhites. 16 The potential difficulty society may face due to the Y2K computer glitch is considered by a number of Christian Identity adherents to be the perfect event upon which to instigate a race war. There are a number of issues concerning the Christian Identity belief system that create problems when determining the threat level of groups. First, Christian Identity does not have a national organizational structure. Rather, it is a grouping of churches throughout the country which follows its basic ideology. Some of these churches can be as small as a dozen people, and some as large as the AN church, which claims membership in the thousands. In addition, some groups take the belief to a higher extreme and believe violence is the means to achieve their goal. This lack of structure creates a greater potential for violent actions by lone offenders and/or leaderless cells. It is important to note that only a small percentage of Christian Identity adherents believe that the new millennium will bring about a race war. However, those that do have a high propensity for violence. Secondly, there are many factions of the right-wing, from Christian Identity to militias, all of which are intermingled in ideology and members. In some cases it is easy for a person to be a member of more than one group or to move from one to another. Often, if a member of one group believes the group is lax in its convictions, he or she will gravitate to a group that is more radical. The third concern is the increased level of cooperation between the different groups. This trend can be seen throughout the right-wing. Christian Identity followers are pairing up with militias to receive paramilitary training and have also joined with members of the Ku Klux Klan and other right-wing groups. This cohesiveness creates an environment in which ideology can easily spread and branch out. However, it makes the job of law enforcement much more difficult as there are no distinctive borders between groups or ideology. Lastly, the formation of splinter groups or state chapters from larger organizations presents an increased level of threat due to the likelihood that the leader has diminished control over the members and actions of the smaller groups. The AN is a large group that adheres to the Christian Identity belief system. The group espouses hatred toward Jews, the federal government, blacks and other minorities. The ultimate goal of the AN is to forcibly take five northwestern states Oregon, Idaho, Wyoming, Washington and Montana from the United States government in order to establish an Aryan homeland. It consists of a headquarters in Hayden Lake, Idaho, and a number of state chapters, which often act as their own entities. While the leader may not support or encourage acts of violence, it is easy for small cells of members or splinter groups to take part in violent acts without the knowledge of the leader. The individuals are associated with the group as a whole and carry the name of the group, but may perpetrate acts on their own. These factors make a threat assessment concerning millennial violence difficult to determine. There is a moderate possibility of small factions of right-wing groups, whether they be members of the same group, or members of different groups, acting in an overtly violent manner in order to initiate the Apocalypse. 17 Several problems associated with the assessment for violence can be seen when looking at the structure and actions of the AN. The AN has been headquartered at Hayden Lake since the late 1970s and remains a focal point for the group's activities. Its annual World Congress attracts a number of different factions from the right-wing, including members and leaders of various right-wing groups. The World Congress is often viewed as a sort of round table to discuss right-wing issues. These meetings have led to an increased level of contact between AN members and members and leaders of other groups. This degree of networking within the right-wing may further the AN's base of support and help advance its cause. One of the greatest threats posed by the right-wing in terms of millennial violence is the formation of a conglomeration of individuals that will work together to commit criminal acts. This has happened with some frequency in the past. Bob Mathews formed a subgroup of the AN, called The Order, which committed a number of violent crimes, including murder. Their mission was to bring about a race war and there are several groups that currently exist which hold these same beliefs. Dennis McGiffen, who also had ties to the AN, formed a cell called The New Order, based on Mathews' group. The members were arrested before they could follow through on their plans to try to start a race war. Chevie Kehoe, who was convicted of three homicides, conspiracy and interstate transportation of stolen property also spent some time at the AN compound. Most recently, Buford O. Furrow, Jr., the man accused of the August 10, 1999, shooting at the Jewish Community Center in Los Angeles, California, also spent some time at the AN compound working as a security guard. A relatively new tenet gaining popularity among Christian Identity believers justifies the use of violence if it is perpetrated in order to punish violators of God's law, as found in the Bible and interpreted by Christian Identity ministers and adherents. This includes killing interracial couples, abortionists, prostitutes and homosexuals, burning pornography stores, and robbing banks and perpetrating frauds to undermine the "usury system." Christian Identity adherents engaging in such behavior are referred to as Phineas Priests or members of the Phineas Priesthood. This is a very appealing concept to Christian Identity's extremist members who believe they are being persecuted by the Jewish-controlled U.S. government and society and/or are eagerly preparing for Armageddon. Among adherents today, the Phineas Priesthood is viewed as a call to action or a badge of honor. 22 Anti-Defamation League, Explosion of Hate, p 15. 18 IV. WHITE SUPREMACY There are a number of white supremacy groups that do not necessarily adhere to Christian Identity or other religious doctrines. White supremacy groups such as the National Alliance, the American Nazi Party and the National Socialist White People's Party are largely politically, rather than religiously, motivated. The National Alliance is probably best known for its leader, William Pierce, who is one of the most recognized names in the radical right. Pierce wrote The Turner Diaries and Hunter and hosts a weekly radio program, American Dissident Voices. Via these outlets, Pierce is able to provide his followers with an ideological and practical framework for committing violent acts. The rhetoric of these groups largely shadows that of Adolf Hitler's in content and political ideology. In 1997, Pierce stated that: Ultimately we must separate ourselves from the Blacks and other non-whites and keep ourselves separate, no matter what it takes to accomplish this. We must do this not because we hate Blacks, but because we cannot survive if we remain mixed with them. And we cannot survive if we permit the Jews and the traitors among us to remain among us and to repeat their treachery. Eventually we must hunt them down and get rid of them.22 The end goal of National Socialist and Christian Identity devotees is the same: an all white nation. However, Christian Identity followers appear to be more of a threat concerning the millennium because of their religious beliefs. There are also white supremacist groups which adhere to the general supremacist ideology, but are not political or religious in nature. For example, the Ku Klux Klan (KKK) proposes racial segregation that is not generally based on religious ideals. The KKK is one of the most recognized white supremacist groups in the United States. Its history is expansive and its actions of cross burnings and rhetoric of hate are well known. There is currently not a singular KKK group with a hierarchical structure, but many different KKK groups with a common ideology. The KKK, as a whole, does not pose a significant threat with regard to the millennium. That is not to say that a member of the KKK will not act on his own or in concert with members of another group. Law enforcement has been very successful in infiltrating a number of these groups, thereby keeping abreast of their plans for action. The KKK also draws the attention of many watchdog groups, and the Southern Poverty Law Center produces a quarterly publication entitled "Klanwatch." It would be difficult for any of the known KKK groups to participate in millennial violence without law enforcement knowing. 23 "U.S. Mulls Church Probe; Ties To Killings Investigated," Chicago Tribune, July 9, 1999. 24 "Behind the Hate," The Washington Post, July 6, 1999. 19 Again, there is a great deal of movement that is possible throughout the right-wing, regardless of prior beliefs. If a member of a Christian Identity faction does not feel that his current group is taking enough violent action, it is possible for that member to move on to other ideologies or organizations such as Odinism, the World Church of the Creator (WCOTC) or the National Socialist movement. Because of this movement, it is also likely that communication exists between various factions of the right-wing, from religious groups to skinheads. Their end goals are similar. The WCOTC presents a recent example of violence perpetrated by a white supremacist in order to bring about a race war. The major creed upon which Ben Klassen founded the religion is that one's race is his religion. Aside from this central belief, its ideology is similar to many Christian Identity groups in the conviction that there is a Jewish conspiracy in control of the federal government, international banking, and the media. They also dictate that RAHOWA, a racial holy war, is destined to ensue to rid the world of Jews and "mud races." In the early 1990s, there was a dramatic increase in membership due to the growing belief in the Apocalypse and that RAHOWA was imminent. In 1996, Matt Hale, who has come upon recent fame by being denied a license to practice law in Illinois, was appointed the new leader of the Church of the Creator. Hale made a number of changes to the group, including changing the name of the organization to the World Church of the Creator, giving it the feel of a widespread movement. As publicly reported, there is information to indicate that the WCOTC has violent plans for the millennium. Officials who searched Benjamin Smith's apartment, the man who went on a racially motivated killing spree over the 4th of July weekend, found a loose-leaf binder of handwritings. These writings described a holy war among the races and included a reference to the new millennium. Passages included plans of how white supremacists would shoot at non-whites from motor vehicles after the dawning of the new millennium.23 While the group's rhetoric does include the belief in a race war and the creation of an all white bastion within the United States, other than Smith's writings, there is no indication that it is linked to the millennium. In addition, there have been recent incidents that have demonstrated the willingness of members to take part in violent action. WCOTC members in Southern Florida are thought to be tied to several racially motivated beatings. Within the last year, four Florida members were convicted for the pistol-whipping and robbery of a Jewish video store owner. They were supposedly trying to raise money for "the revolution."24 Finally, Odinism is another white supremacist ideology that lends itself to violence and has the potential to inspire its followers to violence in connection to the millennium. What makes Odinists dangerous is the fact that many believe in the necessity of becoming martyrs for their cause. 20 For example, Bob Mathews, the leader of The Order, died in a fiery confrontation with law enforcement. Also, William King relished the fact that he would receive the death penalty for his act of dragging James Byrd, Jr. to his death. Odinism has little to do with Christian Identity but there is one key similarity: Odinism provides dualism as does Christian Identity with regard to the universe being made up of worlds of light (white people) and worlds of dark (non-white people). The most fundamental difference between the two ideologies is that Odinists do not believe in Jesus Christ. However, there are enough similarities between the myths and legends of Odinism and the beliefs of Christian Identity to make a smooth transition from Christian Identity to Odinism for those racist individuals whose penchant for violence is not being satisfied. 25 Van Huizen lost re-election as commander of the MMCW in late 1997 to the more radical Joe Pilchak. 26 See "Militias Initiating Contact," FBI Law Enforcement Bulletin, July 1997, pp. 22-26. |
|
|
|
The view of what Armageddon will be varies among Christian Identity
believers. Some contend there will be a race war in which millions will die; others believe that the United Nations, backed by Jewish representatives of the anti-Christ, will take over the country and promote a New World Order. One Christian Identity interpretation is that white Christians have been chosen to watch for signs of the impending war in order to warn others. They are to then physically struggle with the forces of evil against sin and other violations of God's law (i.e., race- mixing and internationalism); many will perish, and some of God's chosen will be forced to wear the Mark of the Beast to participate in business and commerce. After the final battle is ended and God's kingdom is established on earth, only then will the Aryan people be recognized as the one and true Israel. Christian Identity adherents believe that God will use his chosen race as his weapons to battle the forces of evil. Christian Identity followers believe they are among those chosen by God to wage this battle during Armageddon and they will be the last line of defense for the white race and Christian America. To prepare for these events, they engage in survivalist and paramilitary training, storing foodstuffs and supplies, and caching weapons and ammunition. They often reside on compounds located in remote areas. As the millennium approaches, various right-wing groups pose a threat to American society. The radical right encompasses a vast number and variety of groups, such as survivalists, militias, the Ku Klux Klan, neo-Nazis, Christian Identity churches, the AN and skinheads. These groups are not mutually exclusive and within the subculture individuals easily migrate from one group to another. This intermixing of organizations makes it difficult to discern a singular religious ideology or belief system that encompasses the right-wing. |
|
|
|
The view of what Armageddon will be varies among Christian Identity
believers. Some contend there will be a race war in which millions will die; others believe that the United Nations, backed by Jewish representatives of the anti-Christ, will take over the country and promote a New World Order. One Christian Identity interpretation is that white Christians have been chosen to watch for signs of the impending war in order to warn others. They are to then physically struggle with the forces of evil against sin and other violations of God's law (i.e., race- mixing and internationalism); many will perish, and some of God's chosen will be forced to wear the Mark of the Beast to participate in business and commerce. After the final battle is ended and God's kingdom is established on earth, only then will the Aryan people be recognized as the one and true Israel. Christian Identity adherents believe that God will use his chosen race as his weapons to battle the forces of evil. Christian Identity followers believe they are among those chosen by God to wage this battle during Armageddon and they will be the last line of defense for the white race and Christian America. To prepare for these events, they engage in survivalist and paramilitary training, storing foodstuffs and supplies, and caching weapons and ammunition. They often reside on compounds located in remote areas. As the millennium approaches, various right-wing groups pose a threat to American society. The radical right encompasses a vast number and variety of groups, such as survivalists, militias, the Ku Klux Klan, neo-Nazis, Christian Identity churches, the AN and skinheads. These groups are not mutually exclusive and within the subculture individuals easily migrate from one group to another. This intermixing of organizations makes it difficult to discern a singular religious ideology or belief system that encompasses the right-wing. Nevertheless, Christian Identity is the most unifying theology for a number of these diverse groups and one widely adhered to by white supremacists. It is a belief system that provides its members with a religious asis for racism and an ideology that condones violence against non-Aryans. This doctrine allows believers to fuse religion with hate, conspiracy theories, and apocalyptic fear of the future. Christian Identity-inspired millennialism has a distinctly racist tinge in the belief that Armageddon will be a race war of Aryans against Jews and nonwhites. 16 The potential difficulty society may face due to the Y2K computer glitch is considered by a number of Christian Identity adherents to be the perfect event upon which to instigate a race war. There are a number of issues concerning the Christian Identity belief system that create problems when determining the threat level of groups. First, Christian Identity does not have a national organizational structure. Rather, it is a grouping of churches throughout the country which follows its basic ideology. Some of these churches can be as small as a dozen people, and some as large as the AN church, which claims membership in the thousands. In addition, some groups take the belief to a higher extreme and believe violence is the means to achieve their goal. This lack of structure creates a greater potential for violent actions by lone offenders and/or leaderless cells. It is important to note that only a small percentage of Christian Identity adherents believe that the new millennium will bring about a race war. However, those that do have a high propensity for violence. Secondly, there are many factions of the right-wing, from Christian Identity to militias, all of which are intermingled in ideology and members. In some cases it is easy for a person to be a member of more than one group or to move from one to another. Often, if a member of one group believes the group is lax in its convictions, he or she will gravitate to a group that is more radical. The third concern is the increased level of cooperation between the different groups. This trend can be seen throughout the right-wing. Christian Identity followers are pairing up with militias to receive paramilitary training and have also joined with members of the Ku Klux Klan and other right-wing groups. This cohesiveness creates an environment in which ideology can easily spread and branch out. However, it makes the job of law enforcement much more difficult as there are no distinctive borders between groups or ideology. Lastly, the formation of splinter groups or state chapters from larger organizations presents an increased level of threat due to the likelihood that the leader has diminished control over the members and actions of the smaller groups. The AN is a large group that adheres to the Christian Identity belief system. The group espouses hatred toward Jews, the federal government, blacks and other minorities. The ultimate goal of the AN is to forcibly take five northwestern states Oregon, Idaho, Wyoming, Washington and Montana from the United States government in order to establish an Aryan homeland. It consists of a headquarters in Hayden Lake, Idaho, and a number of state chapters, which often act as their own entities. While the leader may not support or encourage acts of violence, it is easy for small cells of members or splinter groups to take part in violent acts without the knowledge of the leader. The individuals are associated with the group as a whole and carry the name of the group, but may perpetrate acts on their own. These factors make a threat assessment concerning millennial violence difficult to determine. There is a moderate possibility of small factions of right-wing groups, whether they be members of the same group, or members of different groups, acting in an overtly violent manner in order to initiate the Apocalypse. |
|
|