Вы находитесь на странице: 1из 32

N AT I O N A L

S T R AT E G Y F O R
C O M B AT I N G
TERRORISM

F E B R U A R Y 2 0 0 3
N AT I O N A L
S T R AT E G Y F O R
C O M B AT I N G
TERRORISM

F E B R U A R Y 2 0 0 3
N AT I O N A L S T R AT E G Y F O R
C O M B AT I N G T E R R O R I S M

INTRODUCTION—1

T H E N AT U R E O F T H E
T E R R O R I S T T H R E A T T O D AY — 5
The Structure of Terror—6
The Changing Nature of Terrorism—7
A New Global Environment—7
Interconnected Terrorist Organizations—8
Availability of Weapons of Mass Destruction—9
Summary—10

S T R A T E G I C I N T E N T — 11
Victory in the War Against Terror—12

GOALS AND O B J E C T I V E S — 15
Defeat Terrorists and Their Organizations—15
Deny Sponsorship, Support, and Sanctuary to Terrorists—17
Diminish the Underlying Conditions
that Terrorists Seek to Exploit—22
Defend U.S. Citizens and Interests at Home and Abroad—24

C O N C L U S I O N — 29

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

iii
INTRODUCTION
“No group or nation should mistake America’s intentions:
We will not rest until terrorist groups of global reach
have been found, have been stopped, and have been defeated.”

P R E S I D E N T G E O R G E W. B U S H
NOVEMBER 6, 2001

The terrorist attacks of September 11, 2001, The struggle against international terrorism
in Washington, D.C., New York City, and is different from any other war in our history.
Pennsylvania were acts of war against the We will not triumph solely or even primarily
United States of America and its allies, and through military might. We must fight terrorist
against the very idea of civilized society. No networks, and all those who support their
cause justifies terrorism. The world must efforts to spread fear around the world, using
respond and fight this evil that is intent on every instrument of national power—
threatening and destroying our basic free- diplomatic, economic, law enforcement, finan-
doms and our way of life. Freedom and fear cial, information, intelligence, and military.
are at war. Progress will come through the persistent
The enemy is not one person. It is not a single accumulation of successes—some seen, some
political regime. Certainly it is not a religion. unseen. And we will always remain vigilant
The enemy is terrorism—premeditated, politi- against new terrorist threats. Our goal will be
cally motivated violence perpetrated against reached when Americans and other civilized
noncombatant targets by subnational groups people around the world can lead their lives
or clandestine agents. Those who employ free of fear from terrorist attacks.
terrorism, regardless of their specific secular There will be no quick or easy end to this
or religious objectives, strive to subvert the conflict. At the same time, the United States,
rule of law and effect change through will not allow itself to be held hostage by
violence and fear. These terrorists also share terrorists. Combating terrorism and
the misguided belief that killing, kidnap- securing the U.S. homeland from future
ping, extorting, robbing, and wreaking attacks are our top priorities. But they will
havoc to terrorize people are legitimate not be our only priorities. This strategy
forms of political action. supports the National Security Strategy of

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

1
the United States. As the National Security partnerships, we will facilitate regional
Strategy highlights, we live in an age with solutions that further isolate the spread of
tremendous opportunities to foster a world terrorism. Concurrently, as the scope
consistent with interests and values embraced of terrorism becomes more localized, unor-
by the United States and freedom-loving ganized and relegated to the criminal
people around the world. And we will seize domain, we will rely upon and assist other
these opportunities. states to eradicate terrorism at its root.
This combating terrorism strategy further The United States will constantly strive to
elaborates on Section III of the the National enlist the support of the international
Security Strategy by expounding on our community in this fight against a common
need to destroy terrorist organizations, win foe. If necessary, however, we will not hesi-
the “war of ideas,” and strengthen tate to act alone, to exercise our right to
America’s security at home and abroad. self-defense, including acting preemptively
While the National Strategy for Homeland against terrorists to prevent them from doing
Security focuses on preventing terrorist harm to our people and our country.
attacks within the United States, the
The war on terrorism is asymmetric in
National Strategy for Combating Terrorism
focuses on identifying and defusing threats nature but the advantage belongs to us, not
before they reach our borders. the terrorists. We will fight this campaign
using our strengths against the enemy’s
While we appreciate the nature of the
weaknesses. We will use the power of our
difficult challenge before us, our strategy is
values to shape a free and more prosperous
based on the belief that sometimes the most
world. We will employ the legitimacy of our
difficult tasks are accomplished by the most
direct means. government and our cause to craft strong
and agile partnerships. Our economic
Ours is a strategy of direct and continuous
strength will help failing states and assist
action against terrorist groups, the cumula-
weak countries in ridding themselves of
tive effect of which will initially disrupt, over
terrorism. Our technology will help identify
time degrade, and ultimately destroy the
and locate terrorist organizations, and our
terrorist organizations. The more frequently
and relentlessly we strike the terrorists across global reach will eliminate them where they
all fronts, using all the tools of statecraft, the hide. And as always, we will rely on the
more effective we will be. strength of the American people to remain
resolute in the face of adversity.
The United States, with its unique ability
to build partnerships and project power, will We will never forget what we are ultimately
lead the fight against terrorist organizations fighting for—our fundamental democratic
of global reach. By striking constantly and values and way of life. In leading the
ensuring that terrorists have no place to campaign against terrorism, we are forging
hide, we will compress their scope and new international relationships and redefining
reduce the capability of these organizations. existing ones in terms suited to the transna-
By adapting old alliances and creating new tional challenges of the 21st century.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

2
We seek to integrate nations and peoples and more secure world and give hope to our
into the mutually beneficial democratic rela- children and generations to come. Ultimately,
tionships that protect against the forces of our fight against terrorism will help foster an
disorder and violence. By harnessing the international environment where our demo-
power of humanity to defeat terrorism in all its cratic interests are secure and the values of
forms, we promote a freer, more prosperous, liberty are respected around the world.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

3
T H E N AT U R E O F T H E
T E R R O R I S T T H R E A T T O D AY
“We have seen their kind before. They are the heirs of all the
murderous ideologies of the 20th century. By sacrificing
human life to serve their radical visions—by abandoning
every value except the will to power—they follow
in the path of fascism, and Nazism, and totalitarianism.
And they will follow that path all the way, to where it ends:
in history’s unmarked grave of discarded lies.”

P R E S I D E N T G E O R G E W. B U S H
ADDRESS TO A JOINT SESSION OF CONGRESS
AND THE AMERICAN PEOPLE

SEPTEMBER 20, 2001

Americans know that terrorism did not Americans also understand that we are not
begin on September 11, 2001. Regrettably, alone in the struggle against terror. Terrorists
its history is long and all too familiar. The have left their mark in some way upon every
first major terrorist attack on New York country in the world. Citizens from some 90
City’s financial district, for instance, did not countries died in the attacks of September 11.
occur on September 11, or even with the For decades, the United States and our friends
abroad have waged the long struggle against
1993 truck bombing of the World Trade
the terrorist menace. We have learned much
Center. It occurred September 16, 1920,
from these efforts.
when anarchists exploded a horse cart filled
with dynamite near the intersections of Wall Even as we experience success in the war
on terrorism, new enemies may emerge.
and Broad Streets, taking 40 lives and
Thus, the United States will confront the
wounding about 300 others. Starting with
threat of terrorism for the foreseeable future.
the assassination of President William
Consequently, we must continue to take
McKinley in 1901 and continuing with the aggressive action to uncover individuals and
bombings of the U.S. embassies in Tanzania groups engaged in terrorist activity, by
and Kenya in 1998 and the USS Cole analyzing the common characteristics of
in Yemen in 2000, American history in the terrorists in order to understand where our
20th century was punctuated by terrorism. enemies are weak and where they are strong.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

5
Leadership

Organization

States

International Environment

Underlying
UNDERLYINGConditions
CAUSES

THE STRUCTURE OF TERROR


Figure 1

The Structure of Terror Terrorists must have a physical base from which
Despite their diversity in motive, sophisti- to operate. Whether through ignorance,
cation, and strength, terrorist organizations inability, or intent, states around the world still
share a basic structure as depicted in figure 1. offer havens—both physical (e.g., safe houses,
training grounds) and virtual (e.g., reliable
At the base, underlying conditions such as
communication and financial networks)—that
poverty, corruption, religious conflict and
terrorists need to plan, organize, train, and
ethnic strife create opportunities for terror-
conduct their operations. Once entrenched in a
ists to exploit. Some of these conditions are safe operating environment, the organization
real and some manufactured. Terrorists use can begin to solidify and expand. The
these conditions to justify their actions terrorist organization’s structure, membership,
and expand their support. The belief that resources, and security determine its
terror is a legitimate means to address such capabilities and reach.
conditions and effect political change is a
At the top of the structure, the terrorist lead-
fundamental problem enabling terrorism to
ership provides the overall direction and
develop and grow.
strategy that links all these factors and thereby
The international environment defines the breathes life into a terror campaign. The lead-
boundaries within which terrorists’ strategies ership becomes the catalyst for terrorist action.
take shape. As a result of freer, more open The loss of the leadership can cause many
borders this environment unwittingly provides organizations to collapse. Some groups,
access to havens, capabilities, and other support however, are more resilient and can promote
to terrorists. But access alone is not enough. new leadership should the original fall or fail.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

6
Still others have adopted a more decentralized A New Global Environment
organization with largely autonomous cells, Al-Qaida exemplifies how terrorist networks
making our challenge even greater.
have twisted the benefits and conveniences of
our increasingly open, integrated, and modern-
The Changing Nature of Terrorism ized world to serve their destructive agenda.
While retaining this basic structure, the The al-Qaida network is a multinational enter-
terrorist challenge has changed considerably prise with operations in more than 60
over the past decade and likely will continue countries. Its camps in Afghanistan provided
to evolve. Ironically, the particular nature of sanctuary and its bank accounts served as a
the terrorist threat we face today springs in trust fund for terrorism. Its global activities are
large part from some of our past successes. coordinated through the use of personal
couriers and communication technologies
In the 1970s and 1980s, the United States
emblematic of our era—cellular and satellite
and its allies combated generally secular
phones, encrypted e-mail, internet chat rooms,
and nationalist terrorist groups, many of
videotape, and CD-roms. Like a skilled publi-
which depended upon active state sponsors.
cist, Usama bin Laden and al-Qaida have
While problems of state sponsorship of
exploited the international media to project his
terrorism continue, years of sustained
image and message worldwide.
counterterrorism efforts, including diplo-
matic and economic isolation, have Members of al-Qaida have traveled from
convinced some governments to curtail or continent to continent with the ease of a
even abandon support for terrorism as a vacationer or business traveler. Despite our
tool of statecraft. The collapse of the Soviet coalition’s successes in Afghanistan and
Union—which provided critical backing to around the world, some al-Qaida operatives
terrorist groups and certain state sponsors— have escaped to plan additional terrorist
accelerated the decline in state sponsorship. attacks. In an age marked by unprecedented
Many terrorist organizations were effec- mobility and migration, they readily blend
tively destroyed or neutralized, including into communities wherever they move.
the Red Army Faction, Direct Action, and They pay their way with funds raised
Communist Combatant Cells in Europe, through front businesses, drug trafficking,
and the Japanese Red Army in Asia. Such credit card fraud, extortion, and money
past successes provide valuable lessons for from covert supporters. They use ostensibly
the future. charitable organizations and non-govern-
With the end of the Cold War, we also saw mental organizations (NGOs) for funding
dramatic improvements in the ease of transna- and recruitment. Money for their operations
tional communication, commerce, and travel. is transferred surreptitiously through
Unfortunately, the terrorists adapted to this numerous banks, money exchanges, and
new international environment and turned the alternate remittance systems (often known as
advances of the 20th century into the destruc- “hawalas”)—some legitimate and unwitting,
tive enablers of the 21st century. others not.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

7
These terrorists are also transnational in Interconnected
another, more fundamental way—their Terrorist Organizations
victims. The September 11 attacks murdered The terrorist threat is a flexible, transna-
citizens from Australia, Brazil, China, Egypt, tional network structure, enabled by modern
El Salvador, France, Germany, India, Israel, technology and characterized by loose inter-
Jordan, Japan, Pakistan, Russia, South connectivity both within and between
Africa, Switzerland, Turkey, the United groups. In this environment, terrorists work
Kingdom and scores of other countries. together in funding, sharing intelligence,
As the al-Qaida network demonstrates, training, logistics, planning, and executing
the terrorist threat today is mutating into attacks. Terrorist groups with objectives in
something quite different from its predeces- one country or region can draw strength and
sors. Terrorists can now use the advantage of support from groups in other countries or
technology to disperse leadership, training, regions. For example, in 2001, three
and logistics not just regionally but globally. members of the Irish Republican Army were
Establishing and moving cells in virtually arrested in Colombia, suspected of training
any country is relatively easy in a world the FARC in how to conduct an urban
where more than 140 million people live bombing campaign. The connections
outside of their country of origin and between al-Qaida and terrorist groups
millions of people cross international throughout Southeast Asia further highlight
borders every day. this reality. The terrorist threat today is both
resilient and diffuse because of this mutually
Furthermore, terrorist groups have
reinforcing, dynamic network structure.
become increasingly self-sufficient by
exploiting the global environment to support Figure 2 is representative of how terrorists
their operations. Whether it is the FARC’s and terrorist organizations operate on three
involvement in the cocaine trade in levels. At the first level are those terrorist
Colombia, al-Qaida’s profiting from the organizations that operate primarily within a
poppy fields in Afghanistan, or Abu Sayyaf’s single country. Their reach is limited, but in
kidnapping for profit in the Philippines, this global environment their actions can have
terrorists are increasingly using criminal international consequences. Such state-level
activities to support and fund their terror. In groups may expand geographically if their
ambitions and capabilities are allowed to grow
addition to finding sanctuary within the
unchecked.
boundaries of a state sponsor, terrorists often
seek out states where they can operate with At the next level are terrorist organizations
impunity because the central government is that operate regionally. These regional opera-
unable to stop them. Such areas are found in tions transcend at least one international
the Americas, Europe, the Middle East, boundary.
Africa, and Asia. More audaciously, foreign Terrorist organizations with global reach
terrorists also establish cells in the very open, comprise the third category. Their operations
liberal, and tolerant societies that they plan span several regions and their ambitions can be
to attack. transnational and even global.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

8
Figure 2
T R A N S N AT I O N A L T E R R O R I S T N E T W O R K S

Linked by: Ideology al-Qaida


Global
Resources
Common enemy
Mutual support Jemmah Islamiya
Sponsorship

Result: Synergy
Regional

Abu
Sayyaf
State
Low High
Threat Severity

These three types of organizations are linked geographic spectrum to ensure that all linkages
together in two ways. First, they can cooperate between the strong and the weak organizations
directly by sharing intelligence, personnel, are broken, leaving each of them isolated,
expertise, resources, and safe havens. Second, exposed, and vulnerable to defeat.
they can support each other in less direct ways,
such as by promoting the same ideological
Availability of Weapons of
agenda and reinforcing each other’s efforts to
Mass Destruction (WMD)
cultivate a favorable international image for
their “cause.” By capitalizing on the very Weapons of mass destruction pose a direct
technological advances that we use within our and serious threat to the United States and
country, terrorist organizations learn and share the entire international community. The
information garnered from our web sites, probability of a terrorist organization using
exploit vulnerabilities within our critical infra- a chemical, biological, radiological, or
structure, and communicate across the same nuclear weapon, or high-yield explosives,
internet paths we use each day. The intercon- has increased significantly during the past
nected nature of terrorist organizations decade. The availability of critical technolo-
necessitates that we pursue them across the gies, the willingness of some scientists and

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

9
others to cooperate with terrorists, and the terrorists acquiring and using WMD is a clear
ease of intercontinental transportation and present danger. A central goal must be to
enable terrorist organizations to more easily prevent terrorists from acquiring or manufac-
acquire, manufacture, deploy, and initiate a turing the WMD that would enable them to
WMD attack either on U.S. soil or abroad. act on their worst ambitions.
While new instruments of terror such as Summary
cyber attacks are on the rise, and other While terrorism is not new, today’s
conventional instruments of terror have not terrorist threat is different from that of the
diminished, the availability and potential past. Modern technology has enabled
use of a WMD is in a category by itself. terrorists to plan and operate worldwide as
We know that some terrorist organizations never before. With advanced telecommuni-
have sought to develop the capability to use cations they can coordinate their actions
WMD to attack the United States and our among dispersed cells while remaining in
friends and allies. Motivated by extreme, the shadows. Today’s terrorists increasingly
even apocalyptic ideologies, some terrorists’ enjoy a force-multiplier effect by estab-
ambitions to inflict mayhem seem unlimited. lishing links with other like-minded
The Aum Shinrikyo’s unsuccessful efforts to organizations around the globe. Now, with
deploy biological weapons and its lethal a WMD capability, they have the potential
1995 sarin gas attack in the Tokyo subway to magnify the effects of their actions many
provided an early warning of such willing- fold. The new global environment, with its
ness to acquire and use WMD. In 1998, resultant terrorist interconnectivity, and
Usama bin Laden proclaimed the acquisition WMD are changing the nature of terrorism.
of WMD a “religious duty,” and evidence Our strategy’s effectiveness ultimately
collected in Afghanistan proves al-Qaida depends upon how well we address these
sought to fulfill this “duty.” The threat of key facets of the terrorist threat.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

10
S T R AT E G I C I N T E N T
“We must take the battle to the enemy, disrupt his plans
and confront the worst threats before they emerge.
In the world we have entered, the only path to safety is
the path of action. And this nation will act.”

P R E S I D E N T G E O R G E W. B U S H
JUNE 1, 2002

The intent of our national strategy is to As this dispersion and organizational


stop terrorist attacks against the United degradation occurs, we will work with
States, its citizens, its interests, and our friends regional partners to implement a coordi-
and allies around the world and ultimately, to nated effort to squeeze, tighten, and isolate
create an international environment inhos- the terrorists. Once the regional campaign
pitable to terrorists and all those who support has localized the threat, we will help states
them. To accomplish these tasks we will develop the military, law enforcement, polit-
simultaneously act on four fronts. ical, and financial tools necessary to finish
The United States and its partners will the task (figure 3). However, this campaign
defeat terrorist organizations of global reach need not be sequential to be effective; the
by attacking their sanctuaries; leadership; cumulative effect across all geographic
command, control, and communications; regions will help achieve the results we seek.
material support; and finances. This We will deny further sponsorship,
approach will have a cascading effect across support, and sanctuary to terrorists by
the larger terrorist landscape, disrupting the ensuring other states accept their responsi-
terrorists’ ability to plan and operate. As a bilities to take action against these
result, it will force these organizations to international threats within their sovereign
disperse and then attempt to reconsolidate territory. UNSCR 1373 and the 12 UN
along regional lines to improve their counterterrorism conventions and protocols
communications and cooperation. establish high standards that we and our

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

11
international partners expect others to meet forums to keep combating terrorism at the
in deed as well as word. forefront of the international agenda.
Where states are willing and able, we will Most importantly, we will defend the
reinvigorate old partnerships and forge new United States, our citizens, and our interests
ones to combat terrorism and coordinate at home and abroad by both proactively
our actions to ensure that they are mutually protecting our homeland and extending our
reinforcing and cumulative. defenses to ensure we identify and neutralize
Where states are weak but willing, we the threat as early as possible.
will support them vigorously in their efforts
to build the institutions and capabilities Victory in the War Against Terror
needed to exercise authority over all their
Victory against terrorism will not occur as a
territory and fight terrorism where it exists.
single, defining moment. It will not be marked
Where states are reluctant, we will work by the likes of the surrender ceremony on the
with our partners to convince them to change deck of the USS Missouri that ended World
course and meet their international obligations. War II. However, through the sustained effort
Where states are unwilling, we will act to compress the scope and capability of
decisively to counter the threat they pose terrorist organizations, isolate them regionally,
and, ultimately, to compel them to cease and destroy them within state borders, the
supporting terrorism. United States and its friends and allies will
We will diminish the underlying condi- secure a world in which our children can live
tions that terrorist seek to exploit by free from fear and where the threat of terrorist
enlisting the international community to attacks does not define our daily lives.
focus its efforts and resources on the areas Victory, therefore, will be secured only as
most at risk. We will maintain the long as the United States and the international
momentum generated in response to the community maintain their vigilance and work
September 11 attacks by working with our tirelessly to prevent terrorists from inflicting
partners abroad and various international horrors like those of September 11, 2001.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

12
OPERATIONALIZING THE STRATEGY

al-Qaida
Global
Reduce
Scope
Terrorist Catagories

Regional
Reduce
Capability
State Abu
Sayyaf

Low High
Threat Severity

Global
Reduce
Terrorist Catagories

Scope
Regional

al-Qaida Reduce
Capability
State Abu
Sayyaf

Low High
Threat Severity

Global
Terrorist Catagories

Reduce
Scope
Regional
• Unorganized
• Localized
• Non-sponsored Reduce
• Rare
Capability
State Return Terrorism to the
al-Qaida “Criminal Domain”

Low High
Threat Severity

Figure 3
DESIRED ENDSTATE

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

13
GOALS AND OBJECTIVES
“America is no longer protected by vast oceans.
We are protected from attack only by vigorous action abroad,
and increased vigilance at home.”

P R E S I D E N T G E O R G E W. B U S H
J A N U A RY 2 9 , 2 0 0 2

Goal: Defeat Terrorists and defeat terrorism is to isolate and localize its
Their Organizations activities and then destroy it through inten-
The first tenet of the 4D strategy (Defeat, sive, sustained action. Political pressures and
Deny, Diminish and Defend) calls for economic sanctions have moderated some
defeating terrorist organizations of global state sponsors, but have had little effect on
reach through the direct or indirect use of individual groups that can sustain an inde-
diplomatic, economic, information, law pendent presence. However, due to the
enforcement, military, financial, intelligence, broad expanse and sophistication of some of
and other instruments of power. The evolu- these global terrorist organizations, we must
tion of terrorist organizations into loose, first act to reduce their scope and capability.
flexible networks with small, informal This effort requires us to identify the terror-
groups compounds the challenges of
ists, locate their sanctuaries, and destroy
combating them. The United States will use
their ability to plan and operate.
all its resources, including the ability to
marshal and sustain international coalitions, We cannot wait for terrorists to attack
to defeat networks and prevent the growth and then respond. The United States and its
of new organizations. The United States and partners will disrupt and degrade the ability
its partners will target the individuals, state of terrorists to act, and compel supporters
sponsors, and transnational networks that of terrorism to cease and desist. Preventing
enable terrorism to flourish. terrorist groups from gaining access to tech-
An analysis of the history of combating nology, particularly that which supports
terrorism confirms that the best way to WMD, will be one of our highest priorities.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

15
Objective: Identify terrorists and terrorist The Intelligence Community will continue
organizations. “Know your enemy” is one of to enhance its collection on terrorist WMD
the most accepted maxims in warfare. capabilities, including bioterrorism threats
Unfortunately, our knowledge of the inner against agriculture and the food supply.
workings of some terrorist organizations Objective: Locate terrorists and their
remains incomplete. The Intelligence organizations. The shadowy nature of
Community and law enforcement agencies terrorist organizations precludes an easy
will therefore continue their aggressive efforts analysis of their capabilities or intent. The
to identify terrorists and their organizations, classic net assessment of the enemy based on
map their command and control and support the number of tanks, airplanes, or ships does
infrastructure, and then ensure we have broad, not apply to these non-state actors. For intel-
but appropriate, distribution of the intelli- ligence to succeed in this war on terrorism,
gence to federal, state, and local agencies as the United States must not only rely on tech-
well as to our international allies. While we nical intelligence, but renew its emphasis on
will not ignore regional or emerging threats, other types of intelligence needed to get
our operational efforts and intelligence will inside the organizations, locate their sanctu-
focus primarily upon the most dangerous aries, and disrupt their plans and operations.
groups, namely, those with global reach or The Intelligence Community will review its
aspirations to acquire and use WMD. current capability to gather human and tech-
We will prioritize our efforts based on the nical intelligence on terrorist organizations
immediate threat and our national interests. and make recommendations, as necessary, to
Based on this prioritization and mapping of expand its recruitment, training, and opera-
terrorist organizations, we will determine tions. The Intelligence Community will
where to position forces and collection assets continue its comprehensive effort to acquire
to identify terrorist ground, air, maritime, new reporting sources, then use those sources
and cyber activities. Timely and advanta- to penetrate designated terrorist organizations
geous positioning of these assets will be to provide information on leadership,
crucial for obtaining intelligence and devel- plans, intentions, modus operandi, finances,
oping options for decisive action. communications, and recruitment. The law
A key component of this force and asset enforcement community, using the leverage
alignment will be our ability to understand provided by our criminal justice system, will
the terrorist intent through technical and continue its efforts to identify and locate
document exploitation. This will require a terrorist organizations operating at home
dramatic increase in linguistic support. and abroad.
Consequently, all government agencies will Our regional partners are often better
review their language programs to ensure poised than the United States to gain access
adequate resources are available to meet to information and intelligence. Therefore,
this demand. the intelligence and law enforcement

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

16
communities will continue to expand and Goal: Deny Sponsorship, Support,
improve their relations with their foreign and Sanctuary to Terrorists
counterparts in an effort to take better The National Strategy’s second front stresses
advantage of their source reporting. denying terrorists the sponsorship, support,
Objective: Destroy terrorists and their and sanctuary that enable them to exist, gain
organizations. Once we have identified and strength, train, plan, and execute
located the terrorists, the United States and their attacks. The United States has a long
its friends and allies will use every tool avail- memory and is committed to holding
able to disrupt, dismantle, and destroy their terrorists and those who harbor them account-
capacity to conduct acts of terror. The final able for past crimes. The states that choose to
element to the Defeat goal is an aggressive, harbor terrorists are like accomplices who
offensive strategy to eliminate capabilities provide shelter for criminals. They will be held
that allow terrorists to exist and operate— accountable for the actions of their “guests.”
attacking their sanctuaries; leadership; The strategy to deny sponsorship, support,
command, control, and communications; and sanctuary is three-fold. First, it focuses
material support; and finances. on the responsibilities of all states to fulfill
While divulging the details of this aspect their obligations to combat terrorism both
of the strategy would be imprudent, we will within their borders and internationally.
focus our efforts on three pillars. First, we Second, it helps target U.S. assistance to those
will expand our law enforcement effort to states who are willing to combat terrorism,
capture, detain, and prosecute known and but may not have the means. And finally,
suspected terrorists. Second, America will when states prove reluctant or unwilling to
focus decisive military power and special- meet their international obligations to deny
ized intelligence resources to defeat terrorist support and sanctuary to terrorists, the
networks globally. Finally, with the cooper- United States, in cooperation with friends
ation of its partners and appropriate and allies, or if necessary, acting independ-
international organizations, we will ently, will take appropriate steps to convince
continue our aggressive plan to eliminate them to change their policies.
the sources of terrorist financing. The goal of this front is to choke off the
To synchronize this effort, the lifeblood of terrorist groups—their access to
Department of State will take the lead in territory, funds, equipment, training, tech-
developing specific regional strategies for nology, and unimpeded transit. This approach
the defeat of terrorism. We will further will therefore weaken terrorist organizations
leverage regional relationships, by ensuring and their ability to conduct operations. Of
appropriate allied participation with the particular importance is working to prevent
regional Combatant Commanders as they terrorists from acquiring the capability to use
prosecute the war on terrorism. chemical, biological, radiological, or nuclear
weapons, or high-yield explosives.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

17
Non-state actors play an important role We will not have a single, inflexible
in the international environment. Non- approach to handling the recognized state
governmental organizations are important sponsors of terrorism. Each case is unique,
in combating international terrorism and we with different interests and legacy issues
will work with them to prevent terrorists involved. Each situation demands specifi-
from taking advantage of their services. cally tailored policies.
Objective: End the state sponsorship of We will be open to overtures from states
terrorism. The United States will assume a that want to put their sponsorship of
clear and pragmatic approach in prosecuting terrorism behind them, but we will not
the campaign against terrorism. This will compromise on the essential principle that
include incentives for ending state sponsor- there are no “good” or “just” terrorists. We
ship. When a state chooses not to respond to will be relentless in discrediting terrorism as
such incentives, tough decisions will be a legitimate means of expressing discontent.
confronted. At all times within this new To ensure we have a well orchestrated and
dynamic we will balance a nation’s near-term synchronized policy, the Department of State
actions against the long-term implications will take the lead in developing policy action
and consequences. plans that employ both incentives and disin-
The United States currently lists seven state centives to end state sponsorship of
sponsors of terrorism: Iran, Iraq, Syria, Libya, terrorism. All appropriate departments and
Cuba, North Korea, and Sudan. We are firmly agencies will engage key allies to develop
committed to removing countries from the list common or complementary strategies to
once they have taken the necessary steps support the above plans. So that no state
under our law and policy. A checkered past miscalculates U.S. resolve, we will articulate
does not foreclose future membership in the these policy goals through appropriate public
coalition against terrorism. and diplomatic channels.
It is important for all countries to adopt a Objective: Establish and maintain an
“zero tolerance” policy for terrorist activity international standard of accountability
within their borders. In the new global environ- with regard to combating terrorism. In addi-
ment it is also important for states to under- tion to U.S. pressure to end state sponsorship,
stand how terrorists and their supporters may we will strongly support new, strict standards
use legitimate means of communication, com- for all states to meet in the global war against
merce, and transportation for illegal activities. terrorism. States that have sovereign rights
Each state that gets out of the business of also have sovereign responsibilities. UNSCR
sponsoring terrorism represents a significant 1373 clearly establishes states’ obligations
step forward and offers a tangible measure of for combating terrorism.
success. America will never seek to remove This resolution calls upon all member
states from the sponsorship list by lowering states to cooperate to prevent terrorist
the bar; instead, these states should be attacks through a spectrum of activities,
encouraged—or compelled—to clear the bar. including suppressing and freezing terrorist

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

18
financing, prohibiting their nationals from baseline responsibilities, U.S. efforts can
financially supporting terrorists, denying prioritize support to our allies, protect vital
safe haven, and taking steps to prevent the interests, and assist those international part-
movement of terrorists. Additionally, the 12 ners who prove themselves most willing to
international counterterrorism conventions cooperate in the campaign against terror.
and protocols, together with UNSCR 1373, The steady increase in the number of
set forth a compelling body of international countries that are fully implementing
obligations relating to counterterrorism. We UNSCR 1373 will thus provide a tangible
will continue to press all states to become measure of progress in the years ahead.
parties to and fully implement these conven-
Additionally, we will encourage interna-
tions and protocols.
tional, regional, and subregional organizations
Together, UNSCR 1373, the international to call upon their members to adopt and fully
counterterrorism conventions and protocols, implement the counterterrorist conventions,
and the inherent right under international protocols, and UNSCR 1373, and subse-
law of individual and collective self-defense quently we will support them in their effort.
confirm the legitimacy of the international To help ensure compliance and maintain over-
community's campaign to eradicate terrorism. sight, the U.S. Government will support the
We will use UNSCR 1373 and the interna- establishment of a comprehensive plan to
tional counterterrorism conventions and monitor and, when appropriate, publicize
protocols to galvanize international coopera- nations’ counterterrorist activities.
tion and to rally support for holding
To maintain the momentum since
accountable those states that do not meet
their international responsibilities. September 11 and keep the global war on
terrorism in the forefront, all departments and
This baseline level of commitment has
agencies of the U.S. Government will promote
four other basic advantages. First, it reaf-
combating terrorism as a standard agenda item
firms the primacy of local efforts—the vital
for their bilateral and multilateral discussions.
principle that each nation bears primary
responsibility for fighting terrorism within Objective: Strengthen and sustain the
its territory. Second, it provides an interna- international effort to fight terrorism.
tionally recognized baseline against which Defeating terrorism is our nation’s primary
the efforts of all nations—including the and immediate priority. It is “our calling,” as
United States—can be evaluated. Third, this President Bush has said. But it is not our
foundation does not prevent the formation challenge alone. Unlike the Cold War, where
of coalitions of willing nations for special two opposing camps led by superpower states
tasks above and beyond the requirements vied for power, we are now engaged in a war
of UNSCR 1373 and the international between the civilized world and those that
counterterrorism conventions and protocols. would destroy it. Success will not come by
Fourth, the United States remains free to always acting alone, but through a powerful
emphasize reciprocity in its counterterrorism coalition of nations maintaining a strong,
policies. While we will always meet our united international front against terrorism.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

19
Working with Willing and Able States: future relations need not be constrained by
An essential element of our strategy remains past differences.
working with others to reorient existing Ensuring that the current level of interna-
partnerships and create new mechanisms for tional cooperation is a lasting feature of our
cooperation among the willing and able world will be a defining challenge of this era.
states around the world. No support will be
Enabling Weak States: Some countries are
more important to success than that from
committed to fighting terrorism but lack the
the other nations that have the will and
capacity to fulfill their sovereign responsibili-
resources to combat terrorism with us at the
ties. Some governments, for example, lack
state, regional, and even global level.
the legal framework, training, or technical
In the aftermath of the September 11 capabilities needed to fight money laun-
attacks we have reaped the rewards of the dering. Others do not have the law
investments made in our major alliances enforcement, intelligence, or military capabil-
during the past 50 years. These rewards are ities to assert effective control over their
evident in NATO’s unprecedented invoca- entire territory. After September 11, we
tion of Article V of the NATO Treaty, redoubled our efforts to develop programs
Australia’s invocation of Article IV of the that help them to acquire the necessary capa-
ANZUS Treaty, and in the way both our bilities to fight terrorism through a variety of
NATO and ANZUS allies have matched means, including improved legislation, tech-
words with deeds on every front in the war nical assistance, new investigative techniques,
against terrorism. intelligence sharing, and law enforcement
Military forces representing a broad and military training. For example, we are
coalition of countries from North America, stepping up our efforts in the Balkans to help
Europe, the Middle East and Oceania have governments secure their borders and refo-
participated in vital operations in cusing our assistance to place increased
Afghanistan. Japan has also provided priority on efforts to promote the rule of law.
historic support to the campaign against We are helping the Armed Forces of the
terrorism. Our Western Hemispheric neigh- Philippines to build their capacity to fight
bors invoked the Rio Treaty and have terrorism through a robust training and
shown a commitment to combat terrorism professional education program.
through a new Inter-American Convention The United States will continue to develop
Against Terrorism adopted in June 2002. comprehensive plans to build strong and agile
But these alliances cannot be taken for partnerships, particularly in regions that
granted or remain static. We will strive to historically have been difficult to engage. We
help them evolve to meet the demands of will work together to develop programs to
this new era. train foreign governments in tactics, tech-
At the same time, through our common niques, and procedures to combat terrorism.
efforts against terrorism, we are recasting our We will review funding for international coun-
relations with Russia, China, Pakistan, and terterrorism training and assistance programs
India. The cooperation forged with these coun- and ensure adequate resources are available to
tries in the war on terrorism highlights how our strengthen the capabilities of key states.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

20
We will continue to negotiate extradition Compelling Unwilling States: The unwilling
and Mutual Legal Assistance Treaties states are those that sponsor or actively
(MLATs) and expand the international coali- provide sanctuary to terrorists. Those states
tion that supports the war on terrorism. We that continue to sponsor terrorist organiza-
will conduct an extensive review to deter- tions will be held accountable for their actions.
mine the viability of establishing new Objective: Interdict and disrupt material
institutions that may help combat terrorism. support for terrorists. A key component of any
And at every opportunity we will continue to nation’s sovereignty is control of its borders.
enhance international counterterrorism Every nation bears responsibility for the
cooperation through the further expansion people and goods transiting its borders.
and sharing of intelligence and law enforce-
While we expect states to fulfill their obli-
ment information. While focusing on
gations, we will nevertheless be prepared to
terrorism, this effort will strengthen our
strategic alignments and transform the inter- interdict terrorist ground, air, maritime, and
national environment. cyber traffic by positioning forces and assets
to deny terrorists access to new recruits,
Persuading Reluctant States: In waging the
financing, equipment, arms, and informa-
campaign against terrorism, the United States
tion. As part of this undertaking, our
will also confront difficult cases involving
National Strategy to Combat Weapons of
countries that, although capable, prove reluc-
Mass Destruction addresses the most serious
tant to comply with their responsibilities in
of these threats and outlines plans and poli-
the fight against terror. Some countries will
cies to execute timely, effective interdiction
cooperate on some fronts but not others. This
efforts against WMD-related materials,
unwillingness can spring from many sources,
technologies, and expertise.
such as external threats, internal schisms that
enable one faction to use the state to Some irresponsible governments—or
extend tacit or active support to terrorists, extremist factions within them—seeking to
or cultural or political differences that lead further their own agenda may provide
to disagreements over what constitutes terrorists access to WMD. Such actions would
“terrorist” or criminal activity. be unacceptable to the United States. We are
prepared to act decisively to stop terrorists
These cases will be the most delicate.
from acquiring WMD or precursors.
The United States recognizes that some
governments might place themselves in the Interdiction, whether against terrorist
crosshairs—and not just figuratively—by material support or WMD, will be carefully
joining the war against terrorism. Therefore, coordinated to ensure prioritization of intel-
constructive engagement, with sustained ligence, proper allocation of resources, and,
diplomacy and targeted assistance will be used when necessary, swift, decisive action. We
to persuade these regimes to become more will not permit the world’s most dangerous
willing and, eventually able, to meet their inter- regimes and terrorists to threaten us with the
national obligations to combat terrorism. world’s most destructive weapons.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

21
Drug trafficking and protection schemes community must develop procedures and
surrounding the drug trade also generate mechanisms that will eradicate terrorism
vast sums of money for international organ- wherever it exists. An essential part of this
ized crime syndicates and terrorist campaign will be the promotion of interna-
organizations. Laundered through the inter- tional standards of behavior and national legal
national financial system, this money then systems to eliminate terrorist refuges.
provides a huge source of virtually untrace- The United States will work in concert with
able funds to corrupt officials, bypass our international and regional partners to
established financial controls, and further
ensure effective governance over ungoverned
other illegal activities, including arms traf-
territory, which could provide sanctuary to
ficking and migrant smuggling. These
terrorists. Where there is a clear indication of
activities ensure a steady supply of weapons
terrorist activity in these areas, the United
and cash and ease the movement of opera-
States, in conjunction with our friends and
tives for terrorist organizations worldwide.
allies, will work to eliminate these terrorist
Breaking the nexus between drugs and
sanctuaries and preclude any future access to
terror is a key objective in our war on
these areas by terrorist organizations.
terrorism and the National Drug Control
Strategy outlines U.S. goals in this area. The Intelligence Community, in conjunc-
tion with the Department of Defense, the
The United States will continue to work
Department of State, and others, will
with our friends and allies to disrupt the
conduct an annual review and assessment of
financing of terrorism. We will identify and
international terrorist sanctuaries and
block the sources of funding, freeze the assets
of terrorists and those who support them, subsequently develop plans that address the
deny terrorists access to the international denial of these areas.
financial system, protect legitimate charities
from being abused by terrorists, and prevent Goal: Diminish the Underlying
the movement of terrorists’ assets through Conditions that Terrorists Seek
alternative financial networks. to Exploit
Sensitive technology in the hands of terror- The third component of the 4D strategy
ists can be just as damaging to our war efforts is made up of the collective efforts to
as weapons and financing. Therefore, we will diminish conditions that terrorists can
continue to pursue an aggressive strategy that exploit. While we recognize that there are
identifies sensitive information and tech- many countries and people living with
nology and outlines appropriate steps to poverty, deprivation, social disenfranchise-
preclude terrorists from obtaining and ment, and unresolved political and regional
exploiting them. disputes, those conditions do not justify the
Objective: Eliminate terrorist sanctuaries use of terror. However, many terrorist
and havens. Terrorism cannot have a place of organizations that have little in common
refuge. It must be rooted out and destroyed. with the poor and destitute masses exploit
The United States and the international these conditions to their advantage. The

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

22
September 11 terrorists, for instance, came after its own people—their welfare, health,
predominantly from the ranks of the prosperity, and freedom—and control its
educated and middle-class and served in an borders. The United States is willing to assist
organization led by a millionaire murderer. the civilized world—governments, non-
These efforts to diminish underlying governmental agencies, and public-private
conditions have material as well as intangible partnerships—in undertaking these efforts.
dimensions. Ongoing U.S. efforts to resolve We will continue to expand bilateral and
regional disputes, foster economic, social, multilateral efforts, such as the U.S.–Middle
and political development, market-based East Partnership Initiative, to promote good
economies, good governance, and the rule of governance, the rule of law, respect for human
law, while not necessarily focused on rights, and professionalization of local justice
combating terrorism, contribute to the systems. In particular, we will broaden the
campaign by addressing underlying condi- scope and strength of International Law
tions that terrorists often seek to manipulate Enforcement Academies, and combatant
for their own advantage. Additionally, dimin- commands will address civil-military relations
ishing these conditions requires the United and humanitarian assistance in their Theater
States, with its friends and allies, to win the Security Cooperation Plans. Additionally, the
“war of ideas,” to support democratic values, Chiefs of Mission will support and report on
and to promote economic freedom. U.S. and local efforts to diminish underlying
The United States does not propose to conditions of terrorism and encourage all
undertake this difficult challenge alone. The nations to implement anti-corruption meas-
United States has neither the resources nor ures pursuant to multilateral, regional, or
the expertise to be in every place in the bilateral agreements. A state’s stand on
world. Moreover, the struggle against terrorism will be considered when providing
terrorism is not solely an American struggle. aid to that country.
Our friends and allies face many of the same Objective: Win the War of Ideas Together
threats. It is essential for America to work with the international community, we will
with its friends and allies in this campaign. wage a war of ideas to make clear that all acts
Objective: Partner with the international of terrorism are illegitimate, to ensure that the
community to strengthen weak states and conditions and ideologies that promote
prevent the (re)emergence of terrorism. terrorism do not find fertile ground in any
Weak states and failed ones are a source of nation, to diminish the underlying conditions
international instability. Often, these states that terrorists seek to exploit in areas most at
may become a sanctuary for terrorism. risk, and to kindle the hopes and aspirations
Therefore, we will ensure that efforts of freedom of those in societies ruled by the
designed to identify and diminish conditions sponsors of global terrorism.
contributing to state weakness and failure We must use the full influence of the
are a central U.S. foreign policy goal. The United States to delegitimize terrorism and
principal objective of our collective response make clear that all acts of terrorism will be
will be the rebuilding of a state that can look viewed in the same light as slavery, piracy,

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

23
or genocide: behavior that no respectable comprehensive settlement to the conflict.
government can condone or support and all The United States can play a crucial role
must oppose. In short, with our friends and but, ultimately, lasting peace can only come
allies, we aim to establish a new interna- when Israelis and Palestinians resolve the
tional norm regarding terrorism requiring issues and end the conflict between them.
non-support, non-tolerance, and active We will also use effective, timely public
opposition to terrorists. diplomacy and government supported
The United States will seek to support media to promote the free flow of informa-
moderate and modern governments, espe- tion and ideas to kindle the hopes and
cially in the Muslim world. We will continue aspiration for freedom of those in societies
assuring Muslims that American values are ruled by the sponsors of global terrorism.
not at odds with Islam. Indeed, the United
States has come to the aid of many Muslims
Goal: Defend U.S. Citizens and
in the past—in Afghanistan, Kuwait,
Interests at Home and Abroad
Bosnia, and Kosovo, to name a few. The
United States will work with such moderate The final tenet of the 4D strategy encom-
and modern governments to reverse the passes our nation’s collective efforts to defend
spread of extremist ideology and those who the United States’ sovereignty, territory, and
seek to impose totalitarian ideologies on our its national interests, at home and abroad.
Muslim allies and friends. This tenet includes the physical and cyber
protection of the United States, its populace,
Finding a solution to the Israeli-Palestinian
property, and interests, as well as the
conflict is a critical component to winning
protection of its democratic principles.
the war of ideas. No other issue has so
colored the perception of the United States We face an adaptive enemy. Empowered
in the Muslim world. The Israeli-Palestinian by modern technology and emboldened by
conflict is critical because of the toll of success, terrorists seek to dictate the timing of
human suffering, because of America’s close their actions while avoiding our strengths
relationship with the state of Israel and key and exploiting our vulnerabilities. In an
Arab states, and because of that region’s increasingly interconnected and technologi-
importance to other global priorities of the cally sophisticated world, where time and
United States. There can be no peace for distance provide less and less protection, we
either side without freedom for both sides. must be prepared to defend our interests, as a
America stands committed to an inde- nation and as citizens.
pendent and democratic Palestine, living Embodied in this strategy is the old adage
beside Israel in peace and security. Like all that the best defense is a good offense. By
other people, Palestinians deserve a govern- improving and coordinating our indications
ment that serves their interests and listens to and threat warnings, we will be able to detect
their voices. The United States will continue terrorist plans before they mature. Through
to encourage all parties to step up to their continuous law enforcement, Intelligence
responsibilities as we seek a just and Community, and military pursuit of terrorist

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

24
organizations, we will disrupt their ability to this task will be the National Strategy for
execute attacks both at home and abroad, Homeland Security. The recommendations
and by expanding our physical and cyber of the National Strategy for Homeland
protection and awareness, we will reduce the Security and the National Strategy for
vulnerability of U.S. personnel, critical Combating Terrorism compliment and rein-
infrastructure, and other U.S. interests. force each other. From enhancing the
Our response to this complex mission analytical capabilities of the FBI and recapi-
requires a coordinated and focused effort talizing the U.S. Coast Guard, to preventing
from our entire society—the federal, state and terrorist use of WMD through better
local governments, the private sector, and the sensors and procedures and integrating
American people. This plan, in concert with information sharing across the federal
the National Strategy for Homeland Security, government, the objectives in these national
the National Strategy to Secure Cyberspace, strategies are vital to our future success in
and the National Strategy for the Physical the war on terrorism.
Protection of Critical Infrastructures and Key Objective: Attain domain awareness.
Assets will help to prepare our Nation for the Today’s world is sharply defined by compres-
work ahead. sion of both time and distance. Key to
The attacks of September 11 demonstrate defending our Nation is the effective knowl-
that our adversaries will engage asymmetri- edge of all activities, events, and trends within
cally, within and across our borders. They any specified domain (air, land, sea, cyber) that
will exploit global systems of commerce, could threaten the safety, security, or environ-
transportation, communications, and other ment of the United States and its populace.
sectors to inflict fear, destruction, and death, This “domain awareness” enables identifica-
to compromise our national security, and to tion of threats as early and as distant from our
diminish public confidence and weaken our borders—including territories and overseas
will to fight. Their attacks may be coordi- installations—as possible, to provide maximum
nated to counter our offensive activities time to determine the optimal course of action.
abroad. Because we are a free, open, and Domain awareness is dependent upon
democratic society, we are, and will remain, having access to detailed knowledge of our
vulnerable to these dangers. Therefore, as adversaries distilled through the fusion of
we seek to engage globally, we must ensure intelligence, information, and data across all
a seamless web of defense across the spec- agencies. It means providing our operating
trum of engagement to protect our citizens forces—afloat, aloft, and ashore, foreign and
and interests both at home and abroad. domestic—with a single integrated operating
Objective: Implement the National matrix of relevant information within their
Strategy for Homeland Security. The estab- specific domain of responsibility. Domain
lishment of the new Department of awareness supports coordinated, integrated,
Homeland Security will help mobilize and and sustained engagement of the enemy
organize our Nation to secure the U.S. across the full spectrum of U.S. instruments
homeland from terrorist attacks. A key to of power.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

25
The President has instructed the leaders of unsurpassed participation in global commerce.
the FBI, Central Intelligence, Homeland Infrastructures and systems that support our
Security, and the Department of Defense to economy and national interests are fully inte-
develop a Terrorist Threat Integration Center, grated, often dependent upon those outside of
to merge and analyze all threat information our borders, and span the globe. During times
in a single location. The center is being of rapid, prolonged, and large-scale conflict,
created because our government must have even our military forces must rely upon
the very best information possible to make portions of the global infrastructure to support
sure that the right people are in the right sustained operations abroad.
places to protect the American people. Protection of vital systems is a shared
The National Strategy for Homeland responsibility of the public and private
Security addresses information sharing and sectors, working collectively with the owners,
technology within the United States. The operators, and users of those systems. The
components of this information sharing integrity of critical infrastructures, permitting
apply equally well at home and abroad. national security mobilization and global
Those procedures and systems that facilitate engagement during times of both peace and
interagency, intergovernmental, and private conflict, must be assured. In many cases U.S.
information sharing will be expanded to enterprises overseas are linked or networked to
allow our overseas agencies to have access domestic critical infrastructure, and a terrorist
and input, as necessary. This initiative will event overseas would have a cascading effect
include not only database alignment and the on domestic reliability. To reduce this possi-
horizontal and vertical information flow; it bility, the Department of State will take the
will also optimize disclosure policy and lead and, in conjunction with appropriate
establish a consistent reporting criteria across agencies, identify and prioritize critical infra-
agencies and allies. Additionally, implemen- structure overseas and partner with industry to
tation of both the domestic and international establish cost-effective best practices and stan-
elements of the National Strategy to Secure dards to maximize security. Where
Cyberspace and the National Strategy for the appropriate, we will coordinate with the host
Physical Protection of Critical Infrastructures country to ensure its security and response
and Key Assets are designed to help ensure network is adequate.
that all possible efforts are made to safeguard Sufficient defense is a balance between
critical information networks whether our need to accommodate the enhanced
located in the United States or abroad. flow of “low risk, high volume” people and
Objective: Enhance measures to ensure the goods essential to our economic vitality,
integrity, reliability, and availability of while at the same time focusing energy
critical physical and information-based and resources on the criminal, hostile and
infrastructures at home and abroad. Much of fraudulent few. It places a premium on effec-
our strength as a nation is built upon expan- tive domain awareness activities, such as
sive and efficient transportation, as well as accurate identification of containerized goods
logistic and information systems permitting before they depart for the United States.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

26
Implementation of the U.S. Smart ists consistent with crisis resolution and
Borders Initiatives with Canada and force-protection efforts. All appropriate
Mexico, as well as the Third Border agencies should be prepared with adequate
Initiative for the Caribbean Basin, address resources and authorities to assist in the
potential vulnerabilities in the many critical rescue of U.S. citizens taken hostage abroad
physical and information-based infrastruc- if the circumstances warrant.
tures shared with our two North American In an effort to ensure U.S. law enforcement
allies. Moreover, the U.S. Government's interests are properly addressed between the
comprehensive border management strategy embassy and the host country, the Department
will greatly enhance the ability of the U.S. to of Justice working with the Department of
screen, verify and process the entry of State, will expand, where appropriate, its law
people and goods into the country. enforcement presence abroad to further coun-
Objective: Integrate measures to protect terterrorism interdiction, investigation, and
U.S. citizens abroad. Defense of our prosecution. Additionally, in coordination with
economic vitality must be matched by host governments, the U.S. government will
increased security of U.S. citizens abroad. enhance training of and assistance to host
The nature of the threat confronting our governments in building legal infrastructures to
citizens has expanded. U.S. citizens living or strengthen the rule of law.
traveling abroad may now be at greater risk Objective: Ensure an integrated incident
as potential terrorist targets. Protective management capability. In the end, prevention
measures must benefit facilities privately of catastrophic terrorism is dependent upon
owned by U.S. interests as well as embassies interdiction of people and materials. However,
and military installations abroad. Similarly, solid plans, preparations, and immediate
U.S. travelers and citizens living abroad response remain key to mitigating acts of
must be provided meaningful, up-to-date, terrorism. Unity of effort requires coordination
and coordinated threat information. The not only at the apex of the federal government,
Department of State will work to enhance but also at the operational/tactical level, where
existing programs to inform U.S. citizens response and intervention actions may be taken
traveling or living abroad about the poten- by diverse authorities, acting independently or
tial terrorist threats. in coordination with each other. An effective,
As we continue to pursue terrorist organ- integrated response requires incident manage-
izations of global reach, there may be a rise ment planning, enhanced interoperability, and
in the number of hostages taken overseas. coordination, based on and supported by rapid
The new policy on U.S. citizens taken and effective decision-making.
hostage abroad, which was promulgated by
In an effort to ensure rapid crisis response,
the Department of State in February 2002,
the U.S. will coordinate with host govern-
ensures that each incident receives careful
ments and regional partners to develop plans
review at the federal level. The policy also
for alerting, containing, and, if necessary,
calls for aggressive law enforcement efforts
to apprehend, prosecute, and punish terror- repelling an attack in progress while

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

27
ensuring adequate resources are available to training, equipment, and transportation are
mitigate the damage. At the outset of a crisis, available for the Foreign Emergency Support
an interagency team capable of supporting Team. All appropriate departments and
the affected U.S. Embassy with assessments agencies will review and, if necessary amend,
and recommendations is essential. their incident-management procedures for
Consequently, the Department of State, the overseas terrorist incidents involving critical
Department of Defense, and other relevant infrastructure and facilities of U.S. national
agencies shall ensure that adequate staffing, security interest.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

28
CONCLUSION

Political violence may be endemic to the they need to survive. We will win the war of
human condition, but we cannot tolerate ideas and diminish the underlying conditions
terrorists who seek to combine the powers of that promote the despair and the destructive
modern technology and WMD to threaten visions of political change that lead people to
the very notion of civilized society. The war embrace, rather than shun, terrorism. And
against terrorism, therefore, is not some sort throughout, we will use all the means at our
of “clash of civilizations”; instead, it is a disposal to defend against terrorist attacks on
clash between civilization and those who the United States, our citizens, and our interests
would destroy it. around the world.
Given these stakes, we must persevere We will also be resourceful. This strategy
until the United States, together with its relies upon the ingenuity, innovation, and
friends and allies, eliminates terrorism as a strength of the American people. We will
threat to our way of life. As our enemies rally others to this common cause. We will
exploit the benefits of our global environ- not only forge a diverse and powerful coali-
ment to operate around the world, our tion to combat terrorism today, but work
approach must be global as well. When they with our international partners to build
run, we will follow. When they hide, we will lasting mechanisms for combating terrorism
find them. Some battlefields will be known, and for coordination and cooperation.
others unknown. The campaign ahead will Working with states that are both willing
be long and arduous. In this different kind of and able to be full partners in the campaign,
war, we cannot expect an easy or definitive we will attack terrorist groups directly and
end to the conflict. indirectly, help the weak but willing states
This National Strategy reflects the reality build their capabilities to fight terrorism, and
that success will only come through the persuade reluctant states to meet their obli-
sustained, steadfast, and systematic application gations to the international community in
of all the elements of national power— this fight. We will use all our resources and
diplomatic, economic, information, financial, resourcefulness to compel the unwilling
law enforcement, intelligence, and military— states to cease support for terrorism.
simultaneously across four fronts. We will We will be resolute. Others might flag in
defeat terrorist organizations of global reach the face of the inevitable ebb and flow of the
through relentless action. We will deny terror- campaign against terrorism. But the
ists the sponsorship, support, and sanctuary American people will not. We understand

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

29
that we cannot choose to disengage from the wheremore countries and peoples are inte-
world, because in this globalized era, the world grated into a world consistent with the
will engage us regardless. The choice is really interests and values we share with our part-
about what kind of world we want to live in. ners—values such as human dignity, rule of
In waging this war, therefore, we will be law, respect for individual liberties, open
equally resolute in maintaining our commit- and free economies, and religious tolerance.
ment to our ultimate objective. The defeat We understand that a world in which these
of terror is a worthy and necessary goal in values are embraced as standards, not
its own right. But ridding the world of exceptions, will be the best antidote to the
terrorism is essential to a broader purpose. spread of terrorism. This is the world we
We strive to build an international order must build today.

N A T I O N A L S T R A T E G Y F O R C O M B A T I N G T E R R O R I S M

30

Вам также может понравиться