CIA Transnational Anti-terrorism Activities
   HOME

TheInfoList



OR:

After the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
lost its role as the coordinator of the entire
United States Intelligence Community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
(IC), special coordinating structures were created by each president to fit his administrative style and the perceived level of threat from terrorists during his term. The US has a different counter-terrorist structure than many of its close allies such as Australia, Canada, France, and the United Kingdom. Each has a structure that fits its particular legal system and culture. A contentious issue is whether there needs to be a domestic intelligence service separate from the FBI, which has had difficulty in breaking away from its law enforcement roots and cooperating with other intelligence services. The
National Counterterrorism Center The National Counterterrorism Center (NCTC) is a United States government organization responsible for national and international counterterrorism efforts. It is based in Liberty Crossing in McLean, Virginia. The NCTC advises the United States ...
(NCTC) is no longer in the CIA proper, but is in the Office of the Director of National Intelligence (ODNI). The NCTC, however, contains personnel from the CIA,
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,
Department of Justice A justice ministry, ministry of justice, or department of justice, is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
, and from other members of the IC. A
counterterrorism center The U.S. Central Intelligence Agency's Mission Center for Counterterrorism (often referred to as the Counterterrorism Mission Center or CTMC, formerly the Counterterrorism Center, or simply CTC) is a division of the CIA's Directorate of Operation ...
did exist in the CIA before the NCTC was established. Given the restrictions of the
National Security Act of 1947 The National Security Act of 1947 (Act of Congress, Pub.L.]80-253 61 United States Statutes at Large, Stat.]495 enacted July 26, 1947) was a law enacting major restructuring of the Federal government of the United States, United States governmen ...
, which created the CIA but strictly forbade it from having any domestic police authority, the role of the CIA still has multiple dimensions. The Directorate of Operations (CIA), Directorate of Operations (DO) of the CIA can infiltrate or otherwise gain human intelligence (
HUMINT Human intelligence (HUMINT, pronounced ) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imager ...
) from terrorist organizations, their supporters, or from friendly foreign intelligence services. The NCS has a covert operations capability that, possibly in combination with military units from the
United States Special Operations Command The United States Special Operations Command (USSOCOM or SOCOM) is the unified combatant command charged with overseeing the various special operations component commands of the Army, Marine Corps, Navy, and Air Force of the United States A ...
(USSOCOM), may take direct military action against terrorist groups outside the United States. The key CIA counter-terror partner is the FBI, which has the domestic operational responsibility for counter-terrorism, which includes both domestic intelligence collection and domestic police work. In the highly decentralized police system of the United States, the FBI also provides liaison and operates cooperatively with state and local police agencies, as well as with relevant federal units, e.g., the
United States Coast Guard The United States Coast Guard (USCG) is the maritime security, search and rescue, and Admiralty law, law enforcement military branch, service branch of the armed forces of the United States. It is one of the country's eight Uniformed services ...
, which has an important role in preventing terrorist infiltration by sea. Military units have a specialized Counterintelligence Force Protection Source Operations capability to protect their personnel and operations.


Intelligence Community view of terrorism

The
United States Intelligence Community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
had dealt with terrorism long before the
September 11, 2001 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
, including support of guerrillas against the Soviets in Southeast Asia, and other places where the guerrillas' methods may have included terror. In Asia, Latin America, and Africa, the US worked with various foreign governments to suppress terrorism. While government research suggests personality traits that may be common to a substantial number of terrorists, terrorism has few other constants. It has taken place on every continent except Antarctica. In all these cases, intelligence support from the CIA was required. In some of them, clandestine intelligence collection and covert action by CIA personnel, or those they sponsored, dealt with terrorists and performed counter-terrorist roles. Many studies of the analysis of, and countermeasures to, terrorism remain classified. Declassified CIA documents on terrorism date back to the late 1970s. According to a 1979 report Western Europe often had opposing terrorist groups in the same conflict at that time, such as nationalists and separatists in Northern Ireland, Spanish nationalists and Basque separatists in Spain and others like them in Turkey. Transnational terrorism was still unusual, although the report noted that the Basque group ETA was active in France as well as Spain. There are relevant observations from government reports by researchers who have various levels of access into the IC, including the
Federal Research Division The Federal Research Division (FRD) is the research and analysis unit of the United States Library of Congress. The Federal Research Division provides directed research and analysis on domestic and international subjects to agencies of the Unite ...
(FRD) and
Congressional Research Service The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
of the
Library of Congress The Library of Congress (LOC) is a research library in Washington, D.C., serving as the library and research service for the United States Congress and the ''de facto'' national library of the United States. It also administers Copyright law o ...
. A 1999 FRD study examined some changes from terrorists of the past, especially the emergence of terrorist acts carried out by individuals and members of small, ''ad hoc'' groups largely unknown to security organizations. Tactics, as well as sources, had changed, with the greater use of suicide attacks and attacks by women and children. A very significant concern has been the possible use by terrorists of
weapons of mass destruction A weapon of mass destruction (WMD) is a Biological agent, biological, chemical weapon, chemical, Radiological weapon, radiological, nuclear weapon, nuclear, or any other weapon that can kill or significantly harm many people or cause great dam ...
(WMD).


Weapons of mass destruction

Terrorists have already made multiple attacks using WMD, such as chemical attacks by Aum Shinrikyo. A 1996 CIA presentation reviewed the history to date, including Iraq's (now defunct) programs. Researchers for a 1999 General Accounting Office study had classified access, and concluded that terrorists could use some chemicals like chlorine with relative ease for an attack, while other agents, chemical and biological, would require greater sophistication.


Collection approach


HUMINT

Efforts to use
HUMINT Human intelligence (HUMINT, pronounced ) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imager ...
operations with non-official cover, especially in the areas outside the groups' staging areas, have been disappointing. Stepped-up efforts to use non-official cover, especially in Europe, began by creating covers in investment banks and consulting firms. Only several years later was it realized that terrorists would have little to do with such organizations. Another realization was that, even with excellent cover, HUMINT successes would be unlikely to recruit people deep inside the terrorist cells. Where HUMINT had more potential, and where the cover organizations needed to change to help find appropriate targets, was on the fringes of the terrorist organizations, either groups from which the group would need goods or services, or from people with awareness of the groups but not supporting them. For example, there are reports that 15 cargo ships are linked to al-Qaeda, whose activities at port might draw the attention of security officials, or even low-level dockworkers or craftsmen.


SIGINT

Signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
, or SIGINT, is a common tool in espionage, although it has been hard to apply to anti-terrorism activities. The
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), the organization formally responsible for SIGINT within the United States intelligence community, was used to targeting conventional
military communications Military communications or military signals involve all aspects of communications, or conveyance of information, by armed forces. Examples from '' Jane's Military Communications'' include text, audio, facsimile, tactical ground-based communica ...
systems, while terrorists lacked dedicated communications systems, confronting the NSA with the prospect of "picking out the needles of terrorist transmissions in the haystack". While some information has been gained, SIGINT is only effective against cells if the group is unaware they are being monitored. Once known communication methods have been compromised, terrorists switch to other means. Terrorists may employ various
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
techniques, including the use of non-electronic messengers to avoid interception, employ
encrypted In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
message systems, or exploit public Internet connections such as Internet cafes. The actual interception of messages is probably not done by the CIA, but by NSA or possibly Service Cryptologic Elements (SCE): tactical SIGINT detachments attached to military tactical units. Important communications intercepts have been achieved, with the results clearly available to the CIA. There are cases, however, where a joint CIA-NSA organization places clandestine intercept equipment. The
National Security Archive The National Security Archive is a 501(c)(3) non-governmental, non-profit research and archival institution located on the campus of the George Washington University in Washington, D.C. Founded in 1985 to check rising government secrecy, the N ...
commented, "In 1987, Deputy Director for Science and Technology Evan Hineman established ... a new Office for Special Projects. Concerned not with satellites, but with emplaced sensors – sensors that could be placed in a fixed location to collect signals intelligence or
measurement and signature intelligence Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often inc ...
(MASINT) about a specific target. Such sensors had been used to monitor Chinese missile tests, Soviet laser activity, military movements, and foreign nuclear programs. The office was established to bring together scientists from the DS&T's Office of SIGINT Operations, who designed such systems, with operators from the Directorate of Operations, who were responsible for transporting the devices to their clandestine locations and installing them." While communications intercepts are usually highly classified, they have come up in US Congressional testimony on terrorism. For example, an FBI official testified with regard to the
1998 United States embassy bombings The 1998 United States embassy bombings were attacks that occurred on August 7, 1998. More than 220 people were killed in two nearly simultaneous car bomb, truck bomb explosions in two East African capital cities, one at the Embassy of the Uni ...
in Kenya and Tanzania, which took place so closely in time that the terrorist teams can reasonably be assumed to have coordinated their operations in near real-time.
There was independent proof of the involvement of Bin Laden, Al-Qaeda and EIJ
Egyptian Islamic Jihad The Egyptian Islamic Jihad (EIJ; ), formerly called simply Islamic Jihad () and the Liberation Army for Holy Sites, originally referred to as al-Jihad, and then the Jihad Group, or the Jihad Organization, was an Egyptian Islamist group active ...
in the bombings. First, the would-be suicide bomber, al-Owhali, ran away from the bomb truck at the last minute and survived. However, he had no money or passport or plan by which to escape Kenya. Days later, he called a telephone number in Yemen and thus arranged to have money transferred to him in Kenya. That same telephone number in Yemen was contacted by Osama Bin Laden's satellite phone on the same days that al-Owhali was arranging to get money.
They have also been revealed in legal proceedings against terrorists, such as ''United States v. Osama bin Laden et al.'', indictment, Nov. 4, 1998, and updates.


IMINT

The sort of
imagery intelligence Imagery intelligence (IMINT), pronounced as either as ''Im-Int'' or ''I-Mint'', is an intelligence gathering discipline wherein imagery is analyzed (or "exploited") to identify information of intelligence value. Imagery used for defense intell ...
(IMINT), often from satellites, used against nation-states is of limited use in tracking the movement of groups of small size and little physical infrastructure. More success has come from
unmanned aerial vehicles An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Dron ...
(UAV), which are hard to see and hear, to do such things as follow cars, or loiter above a building, photographic traffic in and out, often with low-light or infrared sensors that work in apparent darkness. For instance, the CIA experimented with the
MQ-1 Predator The General Atomics MQ-1 Predator (often referred to as the Predator drone) is an American remotely piloted aircraft (RPA) built by General Atomics that was used primarily by the United States Air Force (USAF) and Central Intelligence Agency ...
, a small remote-controlled reconnaissance aircraft, to try to spot Bin Laden in
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan, is a landlocked country located at the crossroads of Central Asia and South Asia. It is bordered by Pakistan to the Durand Line, east and south, Iran to the Afghanistan–Iran borde ...
, producing probable sightings of the al-Qaeda leader after a series of flights in autumn 2000, overseen by CTC officials and flown by USAF drone pilots at the CIA's Langley headquarters.


FININT

Financial intelligence Financial intelligence (FININT) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Generally the term applies in the context of law enfo ...
 – "following the money" – often can trace the organization behind a particular attack. Once that organization is identified, value transfers from it can point to other operational cells. The term ''value'' includes cash and negotiable documents, but also materials such as gems, opium and drugs, and precious metals. The Treasury Department's
Office of Foreign Assets Control The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the United States Department of the Treasury, United States Treasury Department. It administers and enforces economic and trade economic sanctions, ...
(OFAC) has the power to "freeze" the accounts of organizations suspected of funding terrorist activities. Terrorist groups use three types of financing, which are increasingly difficult to track by U.S. intelligence, including the CIA: :# Charities, which use both conventional financial institutions and informal value transfer systems, :#
Informal value transfer system An informal value transfer system (IVTS) is any system, mechanism, or network of people that receives money for the purpose of making the funds or an equivalent value payable to a third party in another geographic location, whether or not in the ...
s such as ''
hawala Hawala or hewala ( , meaning ''transfer'' or sometimes ''trust''), originating in India as havala (), also known as in Persian, and or in Somali, is a popular and informal value transfer system based on the performance and honour of a hug ...
'' and ''
hundi A hundi or hundee is a financial instrument that was developed in Medieval India for use in trade and credit transactions. Hundis are used as a form of remittance instrument to transfer money from place to place, as a form of credit instrument ...
'' :# "Commodities- or trade-based money laundering includes the smuggling of bulk cash and the evasion of federal reporting requirements used to track money laundering with commodities such as diamonds, precious metals, gold, and tobacco." The CIA is most likely to gain awareness of commodities and trade transfers outside the United States. According to the
Center for Defense Information The Center for Defense Information (CDI) is a nonprofit, nonpartisan organization based in Washington, D.C. It specialized in analyzing and advising on military matters. History The Center for Defense Information was founded in 1971 by an indepen ...
(CDI), intelligence agencies help OFAC build its "freeze list" by sending it lists of individuals and organizations believed to be associated with terror, but not all such suspects go onto the freeze list, since the intelligence community can use financial transactions as a means of tracking them. One of the challenges of anti-terrorist FININT is that surveillance of transactions only works when the value transfers go through conventional, regulated banks and other financial institutions. Many cultures use informal value transfer systems, such as the ''hawala'' widely used in the Middle East and Asia, where value is transferred through a network of brokers, who operate with funds often not in banks, with the value transfer orders through personal communications among brokers, who know one another and operate on a paperless honor system. According to CDI,
The founder of Al Barakaat, Shaykh Ahmed Nur Jimale, is believed to be an associate of bin Laden who invested in and is still an owner of the organization. Al Barakaat is a financial, telecommunications and construction group headquartered in Dubai and operating largely out of Somalia. It was founded in 1989 and operates in 40 countries around the world. ... The Treasury Department said the raids on Nov. 7 resulted in the blocking of approximately $971,000 in Al Barakaat assets.


Analytic approach

The National Security Archive makes the point that the US government and intelligence community did not suddenly come upon terrorism on September 11, 2001. Understanding the IC and political perceptions of the past help predict the future, identify weaknesses, and develop strategies.
... at the beginning of the Reagan administration, Secretary of State
Alexander Haig Alexander Meigs Haig Jr. (; 2 December 192420 February 2010) was United States Secretary of State under President Ronald Reagan and White House chief of staff under Presidents Richard Nixon and Gerald Ford. Prior to and in between these cabine ...
announced that opposition to terrorism would replace the Carter administration's focus on advancing human rights throughout the world. Although opposition to terrorism never really became the primary focus of the Reagan administration or successor administrations, each of these paid significant attention to the issue and produced many important documents that shed light on the policy choices faced today. Terrorism has been the subject of numerous presidential and Defense Department directives as well as executive orders. Terrorist groups and terrorist acts have been the focus of reports by both executive branch agencies (for example, the State Department, CIA, and FBI) as well as Congressional bodies – including the Senate Select Committee on Intelligence and the Congressional Research Service. The General Accounting Office has also produced several dozen reports evaluating the U.S. government's ability to prevent or mitigate terrorist strikes ...
The CIA's Directorate of Intelligence produces analytic products that can help identify terrorist groups, their structure, and plans. These may benefit from signals intelligence from the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), from imagery intelligence from the
National Reconnaissance Office The National Reconnaissance Office (NRO) is a member of the United States Intelligence Community and an agency of the United States Department of Defense which designs, builds, launches, and operates the reconnaissance satellites of the U.S. f ...
(NRO) and
National Geospatial-Intelligence Agency The National Geospatial-Intelligence Agency (NGA) is a combat support agency within the United States Department of Defense whose primary mission is collecting, analyzing, and distributing geospatial intelligence (GEOINT) to support national se ...
(NGA), from the
Financial Crimes Enforcement Network The Financial Crimes Enforcement Network (FinCEN) is a bureau within the United States Department of the Treasury that collects and analyzes information about financial transactions to combat domestic and international money laundering, terrori ...
(FinCEN) of the Department of the Treasury, and from other specialized agencies.


Regular research

The Department of State, with CIA assistance, prepares an annual volume called ''Patterns in Terrorism''. FBI reporting is more irregular, but does do problem descriptions as well as specific reports.


Virtual station and cross-functional team research

While the initial implementation, the
Bin Laden Issue Station The Bin Laden Issue Station, also known as Alec Station, was a standalone unit of the Central Intelligence Agency in operation from 1996 to 2005 dedicated to tracking Osama bin Laden and his associates, both before and after the 9/11 attacks. I ...
, did not work well, there has been an Intelligence Community effort to avoid the problems of
stovepiping In intelligence gathering, stovepiping is the presentation of information without proper context. It can be caused by the specialized nature or security requirements of a particular intelligence-collection technology. Alternatively, the lack of c ...
, especially where it involves lack of communication between analysts and operators. There is a continuing controversy about ensuring
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI) information gets to analysts; the FBI culture has been extremely decentralized, so "dots to be connected" in two field offices were not shared; this was particularly relevant in the aftermath of the
September 11 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
. The overall problems of stovepiping and encouraging cross-functional teams, in the context of terrorism, has been addressed by, among other groups, the House Intelligence Committee. One of their chief recommendations was:
FBI's main problem going forward is to overcome its information sharing failures. "Ensuring adequate information sharing" should be communicated throughout the Bureau as the Director's top priority, and a clear strategy incorporating the personnel dimension, the technical dimension, and the legal dimension of the information-sharing problem should be developed and communicated immediately.
Their recommendations for the CIA included: Under Porter Goss, for a variety of reasons, including innovation, the CIA has proposed moving its
National Resources Division The National Resources Division (NR) is the domestic division of the United States Central Intelligence Agency. Its main function is to conduct voluntary debriefings of U.S. citizens who travel overseas for work or to visit relatives, and to recru ...
, concerned with issues in the U.S., to Denver, letting it work more freely than under Headquarters bureaucracy. Some officers believe this is a bad idea and would hurt information sharing, the critical problem with the FBI. With regard to the prohibition on the CIA having any domestic law enforcement powers:
... FBI is having significant problems developing its own domestic intelligence branch and the CIA is generally viewed across the intelligence community as more experienced and skilled at handling foreign informants who eventually return abroad, where the CIA has the lead in intelligence gathering and operations.


Regional analytic operations

The CIA (and its predecessors) has a long history of placing selected collection and analytic functions (e.g.,
Foreign Broadcast Information Service The Foreign Broadcast Information Service (FBIS) was an open source intelligence component of the Central Intelligence Agency's Directorate of Science and Technology. It monitored, translated, and disseminated within the U.S. government openl ...
intercept locations) in places where they can coordinate with regional intelligence agencies, and also have access to people with native-level understanding of languages and culture.


Intelligence and terrorism in the 1970s

While there were no major foreign terror actions in the US during the early part of the decade, there were actions against US personnel and facilities in other countries. Terrorism was definitely present as a worldwide phenomenon, and the CIA produced regular reports on it. Terrorism in the US was not necessarily directed at American organizations. For example, exiled Chilean Foreign Minister Orlando Letelier was killed by a car bomb in Washington, D.C. Subsequent investigations suggested the bombers may have had CIA ties in Chile. "... in February 1976, President Gerald Ford signed Executive Order (EO) 11905 which forbade all U.S. government employees from engaging in or conspiring to engage in political assassination" (Section 5(g)).


1978

Ford's EO was superseded by
President Jimmy Carter James Earl Carter Jr. (October 1, 1924December 29, 2024) was an American politician and humanitarian who served as the 39th president of the United States from 1977 to 1981. A member of the Democratic Party, Carter served from 1971 to 1975 ...
's EO 12036, which tightened restrictions on intelligence agencies. The ban on assassinations was continued by President Ronald Reagan in 1981, ( EO 12333, Sec 2.11) and extended to apply specifically to intelligence agencies. This ban remains in effect today, although challenges were mounted by Rep.
Bob Barr Robert Laurence Barr Jr. (born November 5, 1948) is an American attorney and politician who served as president of the National Rifle Association from 2024 to 2025. He previously served as a federal prosecutor and as a U.S. Representative, repr ...
, R-Ga, including sponsoring the Terrorist Elimination Act of 2001. Italian Prime Minister Aldo Moro was seized by the Red Brigades and later killed, which brought additional NATO attention to the problem.


1979

In January, Iranian militants captured the buildings and staff of the US embassy in Tehran. A number of CIA operational documents were reconstructed. In November, there was Muslim-on-Muslim violence with the seizure of the Grand Mosque in Mecca. French security forces assisted the Saudis in recapturing the building, indicating that ''ad hoc'' alliances would form for both terrorism and counterterrorism.


Intelligence and terrorism in the 1980s

It became increasingly obvious in the 1980s that there is no generally accepted definition of terrorism, as a unique offense. For example, many discussions of terrorism emphasize it is directed against noncombatants. Attacks by non-state actors, such as the
1983 Beirut barracks bombing On October 23, 1983, two truck bombs were detonated at buildings in Beirut, Lebanon, housing American and French service members of the Multinational Force in Lebanon (MNF), a military peacekeeping operation during the Lebanese Civil War. The ...
of US and French troops under UN auspices, are more problematic. The Beirut attacks are usually called "terrorism" in news reports, but if terrorism is assumed to be against noncombatants, they may not qualify. The organizers and attackers might well be categorized as illegal combatants under the Geneva Conventions, but the Conventions do not define terrorism. During this decade, the US supported Muslim fighters against the Soviets in
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan, is a landlocked country located at the crossroads of Central Asia and South Asia. It is bordered by Pakistan to the Durand Line, east and south, Iran to the Afghanistan–Iran borde ...
. The training and arms supplied may have helped start transnational jihadist groups.


1982

In April 1982, President
Ronald Reagan Ronald Wilson Reagan (February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. He was a member of the Republican Party (United States), Republican Party a ...
signed National Security Decision Directive (NSDD) 30 dealing with responses to armed attacks on U.S. citizens or assets. The NSDD created a coordinating body, the Interdepartmental Group on Terrorism, to develop and assign to various executive agencies specific responsibilities when terrorist incidents occurred. The objective was to have in place, before an incident occurred, guidelines for such matters as lines of authority, intelligence responsibilities, and response training. A Special Situation Group (SSG) was established to advise the president, and lead agencies to coordinate responses were named. :# For international terrorist incidents outside U.S. territory, the State Department had the lead role. :# For incidents, the Justice Department was to be the lead agency with the Federal Bureau of Investigation (FBI) in the lead for operational response. :# For plane hijackings within the "special jurisdiction of the United States, the lead agency was the Federal Aviation Administration. :# For planning and managing public health aspects of terrorist incidents, the Federal Emergency Management Agency (FEMA) was the responsible agency. Supporting the SSG was a Terrorist Incident Working Group with representatives from the Departments of State and Defense, the Director of Central Intelligence, the FBI, FEMA, and the National Security Staff. It was to give "direct operational support ... and to provide advice and recommendations during an incident" to the SSG.
In November 1982, following the establishment of the DoD Inspector General, the Deputy Secretary of Defense directed that the Inspector General for Intelligence be redesignated as the Assistant to the Secretary of Defense (Intelligence Oversight) (ATSD (IO)). Today, the ATSD (IO) reports on Intelligence Oversight activities at least quarterly to the Secretary of Defense and, through him, to the Intelligence Oversight Board (IOB), a standing committee of the President's Foreign Intelligence Advisory Board (PFIAB).


1983

The major terrorist incident was the bombing of a UN observer force in Beirut, which led to considerable rethinking of U.S. rules of engagement, the deterrent effect of a US presence, and the issue of force protection intelligence.


1983 Beirut barracks bombing

Suicide attacks in Beirut cost the lives of 241 American and 58 French soldiers, with many casualties. Often called terrorist attacks, this designation seems to be more a facet of the means of attack, and that it was carried out by non-national actors, than that it was intended to terrorize a civilian population. Further complicating the designation is that there is no consensus on who sponsored the attacks. A US court did find Iran responsible, which would make it an attack by a nation-state on military personnel of two other nation-states. In 2001, former Secretary of Defense
Caspar Weinberger Caspar Willard Weinberger (August 18, 1917 – March 28, 2006) was an American politician and businessman. As a Republican, he served in a variety of state and federal positions for three decades, most notably as Secretary of Defense under ...
stated: "But we still do not have the actual knowledge of who did the bombing of the Marine barracks at the Beirut Airport, and we certainly didn't then." Rules of engagement for the Marines were restrictive; they could not set up what would be considered today a safe perimeter against truck bombs. They carried rifles that had to be loaded before use; there were no heavier weapons that could deflect a truck or destroy its engine. The Commission termed this a terrorist attack, and raised questions about the intelligence support available to it (emphasis added):
Intelligence provided a good picture of the broad threat facing the USMNF S multinational forcein Lebanon. Every intelligence agency in the national community and throughout the chain of command disseminated a great amount of analysis and raw data. Key Defense officials and the military chain of command ere alert to, and concerned with, the insights it provided them. There was an awareness of the existing dangerous situation at every level, but no one had specific information on how, where and when the threat would be carried out. Throughout the period of the USMNF presence in Lebanon, intelligence sources were unable to provide proven, accurate, definitive information on terrorist tactics against our forces. This shortcoming held to be the case on October 23, 1983. The terrorist threat was just one among many threats facing the USMNF from the many factions armed with artillery, crew served weapons and small arms.
The USMNF was operating in an urban environment surrounded by hostile forces without any way of pursuing the accuracy of data in order to head off attack. The intelligence structure should be reviewed from both a design and capabilities standpoint. We need to establish ourselves early in a potential trouble spot and find new techniques to isolate and penetrate our potential enemies. Once established, our military forces (and especially ground forces) need to have aggressive, specific intelligence to give the commander the hard information he needs to counter the threats against his force. U.S. intelligence is primarily geared for the support of air and naval forces engaged in nuclear and conventional warfare. Significant attention must be given by the entire U.S. intelligence structure to purging and refining of masses of generalized information into intelligence analysis useful to small unit ground commanders.


1984

In 1984, the CIA both suffered from terrorism directed at it, and also supported anti-Soviet guerrillas in Afghanistan that the Soviets considered terrorists.


Kidnapping of CIA Beirut station chief and US response authorizing preemption

"NSDD 138 was the next known significant Reagan-era action. It was promulgated after the March 16, 1984 kidnapping of the Central Intelligence Agency's Beirut, Lebanon station chief, William Buckley. This NSDD, much of which remains classified, permitted both the CIA and the Federal Bureau of Investigation to form covert operations teams and to use military special operations forces to conduct guerrilla-style war against guerrillas. The NSDD reportedly permits preemptive operations, retaliation, expanded intelligence collection, and when necessary, killing of guerrillas in "pre-emptive" self-defense. States that sponsored guerrillas, or what today would generally be lumped under the term terrorists, could be targeted for operations. These included Iran, Libya, Syria, Cuba, North Korea – all identified before Sept. 11, 2001 by the
State Department The United States Department of State (DOS), or simply the State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs o ...
as state-sponsors of terrorism. Nicaragua and the Soviet Union were reportedly also on the list."


Support to the Afghan resistance

The CIA also channeled US aid to Afghan resistance fighters via Pakistan in a covert operation known as
Operation Cyclone Operation Cyclone was the code name for the United States Central Intelligence Agency (CIA) program to arm and finance the Afghan mujahideen in Afghanistan from 1979 to 1992, prior to and during the military intervention by the USSR in support ...
. It denied dealing with non-Afghan fighters, or having direct contact with bin Laden. However, various authorities relate that the Agency brought both Afghans and Arabs to the United States for military training.


Creation of al-Qaeda

The network that became known as
al-Qaeda , image = Flag of Jihad.svg , caption = Jihadist flag, Flag used by various al-Qaeda factions , founder = Osama bin Laden{{Assassinated, Killing of Osama bin Laden , leaders = {{Plainlist, * Osama bin Lad ...
("The Base") grew out of Arab volunteers who fought the Soviets and their puppet regimes in Afghanistan in the 1980s. In 1984
Abdullah Azzam Abdullah Yusuf Azzam () was a Palestinian-Jordanian Islamist jihadist and theologian. Belonging to the Salafi movement within Sunni Islam, he and his family fled from what had been the Jordanian-annexed West Bank after the 1967 Six-Day War a ...
and
Osama bin Laden Osama bin Laden (10 March 19572 May 2011) was a militant leader who was the founder and first general emir of al-Qaeda. Ideologically a pan-Islamist, Bin Laden participated in the Afghan ''mujahideen'' against the Soviet Union, and support ...
set up an organization known as the Office of Services in
Peshawar, Pakistan Peshawar is the capital and largest city of the Pakistani province of Khyber Pakhtunkhwa. It is the sixth most populous city of Pakistan, with a district population of over 4.7 million in the 2023 census. It is situated in the north-west o ...
, to coordinate and finance the " Afghan Arabs", as the volunteers became known. Azzam and Bin Laden set up recruitment offices in the US, under the name " Al-Khifah", the hub of which was the Farouq Mosque in Brooklyn's Atlantic Avenue. This was "a place of pivotal importance for
Operation Cyclone Operation Cyclone was the code name for the United States Central Intelligence Agency (CIA) program to arm and finance the Afghan mujahideen in Afghanistan from 1979 to 1992, prior to and during the military intervention by the USSR in support ...
".


1986


Foundation of the Counterterrorist Center

In the mid-1980s there was a spate of terrorist activity, much of it by Palestinian organizations. In 1986 the CIA founded the Counterterrorist Center, an interdisciplinary body drawing its personnel from the Directorates of Operations, Intelligence, and other US intelligence organizations. It first got to grips with secular terrorism, but found the upcoming Islamist terror much more difficult to penetrate. In the 1990s the latter became a major preoccupation of the center.


Afghanistan and its consequences

Blowback (referring to operations launched against an enemy which eventually hurt their originators) into the United States may have come from a pipeline, from Brooklyn, New York, to Peshawar, Pakistan, the gateway to joining the Afghan mujahedin. The Brooklyn end was at the
Al Kifah Refugee Center The Al Kifah Refugee Center is a Charitable organization, charity that was active in the United StatesMaktab al-Khidamat The Maktab al-Khidamat, also Maktab Khadamāt al-Mujāhidīn al-'Arab (Arabic: مكتب الخدمات or مكتب خدمات المجاهدين العرب, MAK), also known as the Afghan Services Bureau, was founded in 1984 by Abdullah Azzam, W ...
("Office of Services") was founded in Peshawar in 1984 by
Abdullah Azzam Abdullah Yusuf Azzam () was a Palestinian-Jordanian Islamist jihadist and theologian. Belonging to the Salafi movement within Sunni Islam, he and his family fled from what had been the Jordanian-annexed West Bank after the 1967 Six-Day War a ...
and
Osama bin Laden Osama bin Laden (10 March 19572 May 2011) was a militant leader who was the founder and first general emir of al-Qaeda. Ideologically a pan-Islamist, Bin Laden participated in the Afghan ''mujahideen'' against the Soviet Union, and support ...
to finance and support this effort. " Cold warriors" in the CIA and US State Department looked favorably on these efforts, and considered that they should be formally endorsed and expanded, perhaps along the lines of the
international brigades The International Brigades () were soldiers recruited and organized by the Communist International to assist the Popular Front (Spain), Popular Front government of the Second Spanish Republic during the Spanish Civil War. The International Bri ...
of the Spanish Civil War. "Bin Laden actually did some very good things", said Milton Bearden, chief of the CIA's Islamabad station in the later 1980s. "He put a lot of money in a lot of right places in Afghanistan. He never came on the screen of any Americans as either a terrific asset or someone who was anti-American." The CIA denied, however, actually assisting the "Arab-Afghans", or having direct contact with Bin Laden. Arrested in the US for the 1998 embassy bombings, was a former Egyptian soldier named Ali Mohamed (sometimes called "al-Amriki", "the American"), who is alleged to have provided training and assistance to Bin Laden's operatives. At that time, however, he was a member of the
United States Army Special Forces The United States Army Special Forces (SF), colloquially known as the "Green Berets" due to their distinctive service Berets of the United States Army, headgear, is a branch of the United States Army United States Army Special Operations Comm ...
. FBI special agent Jack Cloonan calls him "bin Laden's first trainer". Originally an Egyptian army captain, in the 1980s Mohamed came to the US and became a supply sergeant to the Green Berets in
Fort Bragg Fort Bragg (formerly Fort Liberty from 2023–2025) is a United States Army, U.S. Army Military base, military installation located in North Carolina. It ranks among the largest military bases in the world by population, with more than 52,000 m ...
. At the same time he was involved with
Egyptian Islamic Jihad The Egyptian Islamic Jihad (EIJ; ), formerly called simply Islamic Jihad () and the Liberation Army for Holy Sites, originally referred to as al-Jihad, and then the Jihad Group, or the Jihad Organization, was an Egyptian Islamist group active ...
(which "merged" with al-Qaeda in the 1990s), and later with al-Qaeda itself; he boasted of fighting the Soviets in Afghanistan. He had worked for the CIA in the earlier 1980s, but the agency supposedly dropped him after he boasted of his relationship. However, Mohamed's behavior led his commanding officer, Lt. Col. Robert Anderson, to believe he was still a US intelligence asset. ("I assumed the CIA", said Anderson.) In 1989 Mohamed trained anti-Soviet fighters in his spare time, apparently at the al-Khifah center in Brooklyn. He was honorably discharged from the US military in November 1989. Another individual associated with the Brooklyn center was the "Blind Sheikh"
Omar Abdel-Rahman Sheikh Omar Abdel-Rahman (), (ʾUmar ʾAbd ar-Raḥmān; 3 May 1938 – 18 February 2017), commonly known in the United States as "The Blind Sheikh", was a blind Egyptians, Egyptian Islamist militant who served a Life imprisonment, life senten ...
, a leading recruiter of ''mujaheddin'', who obtained US entry visas with the help of the CIA in 1987 and 1990.


Bin Laden's early years: terrorist financier

Sometime in late 1988 or early 1989, Bin Laden set up al-Qaeda from the more extreme elements of the Services Office. However, it was not a large organization at the time; when Jamal al-Fadl (who had been recruited through the Brooklyn center in the mid-1980s) joined in 1989, he was described as Qaeda's "third member". Congressional testimony from then-DCI
George Tenet George John Tenet (born January 5, 1953) is an American intelligence official and academic who served as the Director of Central Intelligence (DCI) for the United States Central Intelligence Agency, as well as a Distinguished Professor in the Pr ...
speaks of knowledge and analysis of Bin Laden, from his early years as a terrorist financier to his leadership of a worldwide network of terrorism based in Afghanistan. According to Tenet, Bin Laden gained prominence during the Afghan war for his role in financing the recruitment, transportation, and training of Arab nationals who fought alongside the Afghan mujahedin against the Soviets during the 1980s. Tenet denied there had been any US government involvement with him until the early nineties.


Intelligence and terrorism in the 1990s

The 1990s were characterized by a wide range of terrorist activities, from a religious cult that used WMDs, to an attack on the World Trade Center by an ''ad hoc'' jihadist group, to coordinated al-Qaeda attacks. Accounts differ on when the United States recognized bin Laden as an individual financier of terror, as opposed to when al-Qaida was recognized as a group. In the early 1990s, Ali Mohamed, a former
United States Army Special Forces The United States Army Special Forces (SF), colloquially known as the "Green Berets" due to their distinctive service Berets of the United States Army, headgear, is a branch of the United States Army United States Army Special Operations Comm ...
supply sergeant, returned to Afghanistan, where he gave training in al-Qaeda camps. According to FBI special agent Jack Cloonan, in one of Mohamed's first classes were Osama bin Laden,
Ayman al-Zawahiri Ayman Mohammed Rabie al-Zawahiri (; 19 June 195131 July 2022) was an Egyptian-born pan-Islamism, pan-Islamist militant and physician who served as the second general emir of al-Qaeda from June 2011 until Killing of Ayman al-Zawahiri, his dea ...
, and other al-Qaeda leaders. According to the ''San Francisco Chronicle'', he was involved in planning the 1998 bombings of US embassies in Africa.


1990

Eventually, the Services office and Al-Kifah were also linked to Sheikh
Omar Abdel-Rahman Sheikh Omar Abdel-Rahman (), (ʾUmar ʾAbd ar-Raḥmān; 3 May 1938 – 18 February 2017), commonly known in the United States as "The Blind Sheikh", was a blind Egyptians, Egyptian Islamist militant who served a Life imprisonment, life senten ...
, an Egyptian religious leader later jailed for the planned New York bombings. He had entered the US with the full knowledge of the CIA in 1990. But by the mid-1990s, America's view of Al-Kifah had changed. It discovered that several of those charged with the World Trade Center bombing and the New York landmarks bombings were former Afghan veterans, recruited through the Brooklyn-based organisation. Many of those the US had trained and recruited for a war they were still fighting, but now it was against America. A confidential CIA internal survey concluded that it was 'partly culpable' for the World Trade Center bomb, according to reports of the time. There had been blowback. Jamal al-Fadl (himself recruited through the Brooklyn center in the mid-1980s) was described as the "third member". Al-Fadl later "defected" to the CIA and provided the agency's Bin Laden unit with a great deal of evidence about al-Qaeda.


1993

On February 26, 1993, the World Trade Center was bombed. A group of the conspirators were arrested, convicted, and imprisoned. There has been no strong argument that al-Qaeda was involved, although there have been allegations, including by a former
Director of Central Intelligence The director of central intelligence (DCI) was the head of the American Central Intelligence Agency (CIA) from 1946 to 2004, acting as the principal intelligence advisor to the president of the United States and the United States National Se ...
, that Iraq supported the operational cell. In a PBS interview in October 2001, former Clinton-era CIA Director James Woolsey argued a supposed link between Ramzi Youssef and the Iraqi intelligence services. He suggested the grand jury investigation turned up evidence pointing to Iraq that the Clinton Justice Department "brushed aside." Neil Herman, who headed the FBI investigation, noted that despite Yasin's presence in Baghdad, there was no evidence of Iraqi support for the attack. "We looked at that rather extensively," he told CNN terrorism analyst Peter L. Bergen. "There were no ties to the Iraqi government." Bergen writes, "In sum, by the mid-'90s, the Joint Terrorism Task Force in New York, the F.B.I., the U.S. Attorney's office in the Southern District of New York, the C.I.A., the N.S.C., and the State Department had all found no evidence implicating the Iraqi government in the first Trade Center attack." Claims that
Saddam Hussein Saddam Hussein (28 April 1937 – 30 December 2006) was an Iraqi politician and revolutionary who served as the fifth president of Iraq from 1979 until Saddam Hussein statue destruction, his overthrow in 2003 during the 2003 invasion of Ira ...
was behind the bombing are based on the research of Laurie Mylroie of the conservative
American Enterprise Institute The American Enterprise Institute for Public Policy Research, known simply as the American Enterprise Institute (AEI), is a center-right think tank based in Washington, D.C., that researches government, politics, economics, and social welfare ...
.


1995

Only a brief mention of Colombian
FARC The Revolutionary Armed Forces of Colombia – People's Army (, FARC–EP or FARC) was a Marxist–Leninist guerrilla group involved in the continuing Colombian conflict starting in 1964. The FARC-EP was officially founded in 1966 from peasan ...
activity is mentioned in the declassified part of the 1995 Terrorism Review. URL does not go directly to document, but to FOIA Reading Room. Search using "terrorism review" March 1995 actions by the Japanese cult
Aum Shinrikyo , better known by their former name , is a Japanese new religions, Japanese new religious movement and doomsday cult founded by Shoko Asahara in 1987. It carried out the deadly Tokyo subway sarin attack in 1995 and was found to have been respo ...
demonstrated that the use of WMD is no longer restricted to the battlefield. Japanese authorities have determined that the Aum was working on developing the chemical nerve agents sarin and VX. The cult, which attacked Japanese civilians with sarin gas on March 20, 1995, also tried to mine its own uranium in Australia and to buy Russian nuclear warheads.


1996

The attack on the Khobar Towers in Saudi Arabia is the only declassified subject in the 1996 Terrorism Review. URL does not go directly to document, but to FOIA Reading Room. Search using "terrorism review" Responsibility for the attack was, at the time of publication of the Review, not determined. Bin Laden came to the attention of the CIA as an emerging terrorist threat during his stay in Sudan from 1991 to 1996. The Agency, however, began to be concerned than bin Laden would extend his activities beyond Afghanistan. It experimented with various internal organizations that could focus on subjects such as bin Laden specifically and al-Qaeda generally. In 1996 an experimental "virtual station" was launched, modeled on the agency's geographically-based stations, but based in Washington and dedicated to a particular transnational issue. It was placed under the Counterterrorist Center (CTC), and, like the CTC, cut across disciplines and drew its personnel from widely across the CIA and other intelligence agencies.
Michael Scheuer Michael F. Scheuer (pronounced "SHOY-er"), (born 1952) is an American former intelligence officer for the Central Intelligence Agency, blogger, author, commentator and former adjunct professor at Georgetown University's Center for Peace and S ...
, who up to then headed the Center's Islamic extremist branch, was asked to run it. Scheuer, who had noticed a stream of intelligence reports about Osama bin Laden, suggested the station be dedicated to this particular individual. The station began to produce evidence that Bin Laden was not only a financier, but also an organizer of terror. Originally dubbed "Terrorist Financial Links" (TFL), the unit soon became rechristened the
Bin Laden Issue Station The Bin Laden Issue Station, also known as Alec Station, was a standalone unit of the Central Intelligence Agency in operation from 1996 to 2005 dedicated to tracking Osama bin Laden and his associates, both before and after the 9/11 attacks. I ...
. Jamal al-Fadl, who defected to the CIA in spring 1996, began to provide the Station with a new image of the Qaeda leader: he was not only a terrorist financier, but a terrorist organizer too, and sought weapons of mass destruction. FBI special agent Dan Coleman (who together with his partner Jack Cloonan had been "seconded" to the Bin Laden Station) called him Qaeda's "
Rosetta Stone The Rosetta Stone is a stele of granodiorite inscribed with three versions of a Rosetta Stone decree, decree issued in 196 BC during the Ptolemaic dynasty of ancient Egypt, Egypt, on behalf of King Ptolemy V Epiphanes. The top and middle texts ...
".


1998

On August 7, 1998, near simultaneous car bomb attacks struck US embassies, and local buildings, in Dar es Salaam, Tanzania and Nairobi, Kenya. The attacks, linked to local members of the al-Qaeda terrorist network headed by Osama bin Laden, brought bin Laden and al-Qaeda to international attention for the first time, and resulted in the U.S. Federal Bureau of Investigation placing bin Laden on its Ten Most Wanted list. The declassified page of the 1998 Terrorism Review speaks of the release of hostages by Colombia's two major guerrilla organizations, the Revolutionary Armed Forces of Colombia (FARC) and the National Liberation Army (ELN). Kidnapping is the only threat mentioned, with a warning of continued danger to US interests. URL does not go directly to document, but to FOIA Reading Room. Search using "terrorism review" The Review makes no mention of other countries or threats, but only the cover and one page were partially declassified.


1999

In 1999 DCI
George Tenet George John Tenet (born January 5, 1953) is an American intelligence official and academic who served as the Director of Central Intelligence (DCI) for the United States Central Intelligence Agency, as well as a Distinguished Professor in the Pr ...
launched a grand "Plan" to deal with al-Qaeda. In preparation, he selected new leadership for the Counterterrorist Center (CTC). He placed
Cofer Black Joseph Cofer Black (born 1950) is an American former CIA officer who served as director of the Counterterrorism Center in the years surrounding the September 11th attacks, and was later appointed Ambassador-at-Large and Coordinator for Counter ...
in charge of the CTC, and "Rich B" (a "top-flight executive" from Tenet's own leadership group) in charge of the CTC's Bin Laden unit. Tenet assigned the CTC to develop the Plan. The proposals, brought out in September, sought to penetrate Qaeda's "Afghan sanctuary" with US and Afghan agents, in order to obtain information on and mount operations against Bin Laden's network. In October, officers from the Bin Laden unit visited northern Afghanistan. Once the Plan was finalized, the Agency created a "Qaeda cell" (whose functions overlapped those of the CTC's Bin Laden unit) to give operational leadership to the effort. CIA intelligence chief Charles E. Allen to set up a "Qaeda cell" was put in charge of the tactical execution of the Plan. The CIA concentrated its inadequate financial resources on the Plan, so that at least some of its more modest aspirations were realized. Intelligence collection efforts on bin Laden and al-Qaeda increased significantly from 1999. "By 9/11", said Tenet, "a map would show that these collection programs and human eportingnetworks were in place in such numbers as to nearly cover Afghanistan". (But this excluded Bin Laden's inner circle itself.)
Al Qaeda operated as an organization in more than sixty countries, the CIA's Counterterrorist Center calculated by late 1999 figure that was to help underpin the "War On Terror" two years later Its formal, sworn, hard-core membership might number in the hundreds. Thousands more joined allied militias such as the fghanTaliban or the Chechen rebel groups or Abu Sayyaf in the Philippines or the Islamic movement of Uzbekistan. ...
A heavily redacted CIA document, the 1999 Terrorism Review, reveals concern with Libyan support of terrorism, through its External Security Organization (ESO). URL does not go directly to document, but to FOIA Reading Room. Search using "terrorism review" The ESO is described as responsible for surveillance, assassination, and kidnapping of Libyan dissidents outside the country; examples were given from actions in the United Kingdom and
Egypt Egypt ( , ), officially the Arab Republic of Egypt, is a country spanning the Northeast Africa, northeast corner of Africa and Western Asia, southwest corner of Asia via the Sinai Peninsula. It is bordered by the Mediterranean Sea to northe ...
. Libya was also described as attempting to build influence in sub-Saharan Africa, supporting a range of Palestinian rejectionist groups, and giving funds and equipment to the Moro Islamic Liberation Organization and
Abu Sayyaf Abu Sayyaf (; , ASG), officially known by the Islamic State as the Islamic State – East Asia Province, was a Jihadist militant and piracy, pirate group that followed the Wahhabi doctrine of Sunni Islam. It was based in and around Jolo and B ...
Group in the
Philippines The Philippines, officially the Republic of the Philippines, is an Archipelagic state, archipelagic country in Southeast Asia. Located in the western Pacific Ocean, it consists of List of islands of the Philippines, 7,641 islands, with a tot ...
. In addition, the World Anti-Imperialist Center (Mahatba) and the World Islamic Call Society (WICS) were described as part of terrorist infrastructure. This review does not mention any country, other than Libya, or non-national actor as a sponsor of terrorism, as opposed to an operational terrorist group.


Intelligence and terrorism in the 2000s


2000

On October 12, 2000, three suicide bombers detonated a skiff packed with explosives alongside the American , which was docked in
Aden Aden () is a port city located in Yemen in the southern part of the Arabian peninsula, on the north coast of the Gulf of Aden, positioned near the eastern approach to the Red Sea. It is situated approximately 170 km (110 mi) east of ...
Harbor,
Yemen Yemen, officially the Republic of Yemen, is a country in West Asia. Located in South Arabia, southern Arabia, it borders Saudi Arabia to Saudi Arabia–Yemen border, the north, Oman to Oman–Yemen border, the northeast, the south-eastern part ...
. The blast blew a hole high and wide in the ship's hull, killed 17 of the ship's crew and injured 30. "With just slightly more skilled execution, CIA analysts later concluded, the bombers would have killed three hundred and sent the destroyer to the bottom." The attack on USS ''Cole'' had no warning. However, Kie Fallis at the
Defense Intelligence Agency The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense (DoD) specializing in military intelligence. A component of the Department of Defense and the United States In ...
, from "data mining and analysis", had "predicted" in early autumn 2000 an al-Qaeda attack by an explosives-laden small boat against a US warship. Further, in late September 2000, the DIA experimental data-mining operation Able Danger had uncovered information of increased al-Qaeda "activity" in
Aden Aden () is a port city located in Yemen in the southern part of the Arabian peninsula, on the north coast of the Gulf of Aden, positioned near the eastern approach to the Red Sea. It is situated approximately 170 km (110 mi) east of ...
Harbor,
Yemen Yemen, officially the Republic of Yemen, is a country in West Asia. Located in South Arabia, southern Arabia, it borders Saudi Arabia to Saudi Arabia–Yemen border, the north, Oman to Oman–Yemen border, the northeast, the south-eastern part ...
. Able Danger elevated Yemen "to be one of the top three hot spots for al-Qaeda in the entire world" and, allegedly days before the Cole attack, warned the Pentagon and administration of the danger, but the supposed warnings were ignored.


Clandestine intelligence/covert action

In 2000 the CIA and
USAF The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
jointly ran a series of flights over Afghanistan with a small remote-controlled reconnaissance drone, the
Predator Predation is a biological interaction in which one organism, the predator, kills and eats another organism, its prey. It is one of a family of common List of feeding behaviours, feeding behaviours that includes parasitism and micropredation ...
; they obtained probable photos of Bin Laden.
Cofer Black Joseph Cofer Black (born 1950) is an American former CIA officer who served as director of the Counterterrorism Center in the years surrounding the September 11th attacks, and was later appointed Ambassador-at-Large and Coordinator for Counter ...
and others became advocates of arming the Predator with missiles to try to assassinate Bin Laden and other al-Qaeda leaders.


2001


Covert action


=Paramilitary support

= In the spring of 2001, CIA officers evaluated the forces of Ahmed Shah Massoud, and found his strength less than the previous fall. While the officers gave him cash and supplies, and received intelligence on the Taliban, they did not have the authority to build back his fighting strength against the Taliban.


=Targeted killing in war versus assassination

= While the American President has issued
Executive Order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of the ...
s banning
assassinations Assassination is the willful killing, by a sudden, secret, or planned attack, of a personespecially if prominent or important. It may be prompted by political, ideological, religious, financial, or military motives. Assassinations are orde ...
, none of those actually defined assassination. Using dictionary rather than statutory definition, a common definition is "murder by surprise for political purposes". Jeffrey Addicott argues that if murder is generally accepted as an illegal act in US and international law, so if assassination is a form of murder, the Orders cannot be making legal something that is already illegal. The Hague and Geneva Conventions did not consider non-national actors as belligerents in general war. The Conventions do consider spontaneous rising against invasion and civil war as having lawful combatants, but there are many more restrictions of the status, as legal combatants of fighters who came to a war from an external country. This discussion will not address the controversial issue of illegal combatants, but, following Addicott's reasoning, assumes that violence, in defense to an attack, is legal under Article 51 of the UN Charter. Note that before the attackers in the
September 11, 2001 attacks The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
were identified, the US invoked the NATO treaty, without objection, as a member state that had been attacked. "In the War on Terror, it is beyond legal dispute that the virtual-State al-Qa'eda terrorists are aggressors and that the United States is engaging in self-defense when using violence against them." Black and others became advocates of arming the Predator with
AGM-114 Hellfire The AGM-114 Hellfire is an American missile developed for anti-armor use, later developed for precision drone strikes against other target types, especially high-value targets. It was originally developed under the name " Heliborne laser, fi ...
missiles to try to kill Bin Laden and other al-Qaeda leaders, but there were both legal and technical issues. Tenet in particular was concerned about the CIA moving back into the business of targeted killing. Also, a series of live-fire tests in the Nevada Desert in summer 2001 produced mixed results. In June 2001, at a test site in Nevada in the US, CIA and Air Force personnel built a replica of Bin Laden's villa in Kandahar, Afghanistan. The Predator controllers tested aiming and firing a Predator missile at the house, and post-strike analysis showed it would have killed anyone in the targeted room. The significance of this demonstration was called a "holy grail" by one participant. A weapon now existed which, at long range, could kill Bin Laden shortly after finding him. Practice runs proved reliable, but, according to ''The Washington Post'', the Bush Administration refrained from such action. On September 4, a new set of directives called for increasing pressure against the Taliban until they either ejected al-Qaeda or faced a serious threat to their continued power, but no decision on using this capability had reached President Bush by September 11. Tenet advised caution at the Cabinet-level Principals Committee on September 4, 2001. If the Cabinet wanted to empower the CIA to field a lethal drone, he said, "they should do so with their eyes wide open, fully aware of the potential fallout if there were a controversial or mistaken strike". National Security Adviser
Condoleezza Rice Condoleezza "Condi" Rice ( ; born November 14, 1954) is an American diplomat and political scientist serving since 2020 as the 8th director of Stanford University's Hoover Institution. A member of the Republican Party, she previously served ...
concluded that the armed Predator was required, but evidently not ready, and she advised the CIA to consider restarting reconnaissance flights. The "previously reluctant" Tenet then ordered the Agency to do so. The CIA was authorized to "deploy the system with weapons-capable aircraft".


World-Wide Attack Matrix

After
9/11 The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
, the CIA was criticized for not having done enough to prevent the attacks. DCI George Tenet rejected the criticism, citing the Agency's planning efforts especially over the preceding two years. His response came in a briefing held on September 15, 2001, where he presented the Worldwide Attack Matrix, a classified document describing covert CIA anti-terror operations in eighty countries in Asia, the Middle East, and Africa. The actions, underway or being recommended, would range from "routine propaganda to lethal covert action in preparation for military attacks," and the plans, if carried out, "would give the CIA the broadest and most lethal authority in its history." Tenet said that the CIA's efforts had put it in a position to respond rapidly and effectively to the attacks, both in the "Afghan sanctuary" and in "ninety-two countries around the world". At the Cabinet-level Principals Committee meeting on terrorism of September 4, 2001, Tenet warned of the dangers of a controversial or mistaken strike with an under-tested armed drone. After the meeting, the CIA resumed reconnaissance flights, the drones now being weapons-capable but as yet unarmed.


2002

Starting on September 11, the strategy was no longer steady escalation, but multiple attacks on multiple fronts. On November 5, 2002, newspapers reported that
al-Qaeda , image = Flag of Jihad.svg , caption = Jihadist flag, Flag used by various al-Qaeda factions , founder = Osama bin Laden{{Assassinated, Killing of Osama bin Laden , leaders = {{Plainlist, * Osama bin Lad ...
operatives in a car travelling through Yemen had been killed by a missile launched from a CIA-controlled Predator drone (a medium-altitude, remote-controlled aircraft). In 2004, the Australian Broadcasting Corporation's (ABC-TV) international affairs program "Foreign Correspondent" investigated this targeted killing and the involvement of then U.S. Ambassador as part of a special report titled "The Yemen Option". The report also examined the evolving tactics and countermeasures in dealing with Al Qaeda inspired attacks.


2004

In June 2004, the U.S. killed Nek Muhammad Wazir, a Taliban commander and al-Qaeda facilitator, in a Predator missile strike in
South Waziristan South Mahsud Waziristan District () was a Districts of Pakistan, district in the Dera Ismail Khan Division of the Khyber Pakhtunkhwa province of Pakistan, before splitting into the Lower South Waziristan District and the Upper South Waziristan D ...
, Pakistan.


2005

On May 15, 2005, it was reported that another of these drones had been used to assassinate al-Qaeda explosives expert Haitham al-Yemeni inside
Pakistan Pakistan, officially the Islamic Republic of Pakistan, is a country in South Asia. It is the List of countries and dependencies by population, fifth-most populous country, with a population of over 241.5 million, having the Islam by country# ...
. In December 2005, Abu Hamza Rabia, an Egyptian who was reportedly al-Qaeda's third in command, was killed in a surprise drone attack in North Waziristan.


2006

On January 13, 2006, the CIA launched an airstrike on Damadola, a Pakistani village near the Afghan border, where they believed
Ayman al-Zawahiri Ayman Mohammed Rabie al-Zawahiri (; 19 June 195131 July 2022) was an Egyptian-born pan-Islamism, pan-Islamist militant and physician who served as the second general emir of al-Qaeda from June 2011 until Killing of Ayman al-Zawahiri, his dea ...
was located. The airstrike killed a number of civilians but not al-Zawahiri. The Pakistani government issued a protest against the US attack, which it considered violated its sovereignty.


2008

In January 2008, Abu Laith al-Libi, one of al-Qaeda's senior figures, was killed in a targeted killing Predator rocket attack in Pakistan. Some intelligence sources describe him as the number three leader of al-Qaeda. In July 2008, Abu Khabab al-Masri, suspected leader of al-Qaeda's chemical and biological weapons efforts, was killed in an attack by U.S. drone-launched missiles on a house in South Waziristan in Pakistan. In October 2008, Khalid Habib, the al-Qaeda regional operations commander in Afghanistan and Pakistan, was killed by a missile launched by a Predator in South Waziristan, Pakistan. In November 2008,
Rashid Rauf Rashid Rauf (; 1981 – 22 November 2008) was an alleged Al-Qaeda operative. He was a dual citizen of Britain and Pakistan who was arrested in Bhawalpur, Pakistan in connection with the 2006 transatlantic aircraft plot in August 2006, a day ...
, a British/Pakistani suspected planner of a 2006 transatlantic aircraft plot, was killed by a missile launched from a U.S. drone in North Waziristan.


2009

In January 2009, Usama al-Kini and Sheikh Ahmed Salim Swedan, alleged orchestrators of the 1998 United States embassy bombings in Kenya and
Tanzania Tanzania, officially the United Republic of Tanzania, is a country in East Africa within the African Great Lakes region. It is bordered by Uganda to the northwest; Kenya to the northeast; the Indian Ocean to the east; Mozambique and Malawi to t ...
, were killed in a Predator strike in northern Pakistan. Later, in August 2009, Baitullah Mehsud, leader of the
Tehrik-i-Taliban Pakistan The Pakistani Taliban, officially the Tehreek-i-Taliban-e-Pakistan (TTP), is an umbrella organization of various Islamist armed militant groups operating along the Durand Line, Afghan–Pakistani border. Formed in 2007 by Baitullah Mehsud, i ...
, was killed in a U.S. drone missile attack in Waziristan.Secret CIA Units Playing a Central Combat Role
,
Bob Woodward Robert Upshur Woodward (born March 26, 1943) is an American investigative journalist. He started working for ''The Washington Post'' as a reporter in 1971 and now holds the honorific title of associate editor though the Post no longer employs ...
, ''The Washington Post'', November 18, 2001, Page A01


Forward Operating Base Chapman attack

On December 30, 2009, a suicide attack occurred at Forward Operating Base Chapman, a major CIA base in the province of
Khost Khōst () is the capital of Khost Province in Afghanistan. It is the largest city in the southeastern part of the country, and also the largest in the region of Loya Paktia. To the south and east of Khost lie Waziristan and Kurram Agency, Kurram i ...
, Afghanistan. Eight people, among them at least six CIA officers, including the chief of the base, were killed and six others seriously wounded in the attack. The attack was the second most deadly attack carried out against the CIA, after the
1983 United States Embassy bombing The April 18, 1983, United States Embassy bombing was a suicide bombing on the Embassy of the United States, Beirut, Embassy of the United States in Beirut, Lebanon, that killed 32 Lebanese, 17 Americans, and 14 visitors and passers-by. The vict ...
in Beirut, Lebanon, and was a major setback for the intelligence agency's operations.


References

{{DEFAULTSORT:Cia Transnational Anti-Terrorism Activities Central Intelligence Agency operations Counterterrorism in the United States Covert organizations Targeted killing