Sk B9 Team Monograph Outlines Fdr- Draft Monograph Outlines 7-29-03- Incl Withdrawal Notice 168

  • Uploaded by: 9/11 Document Archive
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Sk B9 Team Monograph Outlines Fdr- Draft Monograph Outlines 7-29-03- Incl Withdrawal Notice 168 as PDF for free.

More details

  • Words: 4,327
  • Pages: 28
Unclassified with SECRET Attachments

NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES Draft Monograph Outlines as of 7/29/03 Team 1A (Commission Sensitive) Team 2 (SECRET) Team 3 (Commission Sensitive) Team 4 (LES) Team 5 (Commission Sensitive) Team 6 (Commission Sensitive) Team 7 (Commission Sensitive) Team 8 (Commission Sensitive)

Unclassified with SECRET Attachments

Commission Sensitive TEAM 1A MONOGRAPH OUTLINE The September 11 Conspiracy I.

Overview of Conspiracy

II.

Formation of the Conspiracy A. Antecedents of Plan to Conduct Attacks Using Civil Aircraft 1. Air France Hijacking by GLA Terrorists - Dec. 1994 2. Manila Air (Bojinka) - 1994-95 3. Murad debriefing by Philippine National Police - 1995 4. Other B. Hatching of 9/11 Plot 1. Conception of Operation 2. Kuala Lumpur meeting - Jan. 2000 3. Detailing of Nawaf Al-Hazmi (NAH) and Khalid Al-Mihdhar (KAM) to US 4. Recruiting of Hamburg Cell in Germany, Pakistan, Afghanistan - 1999-2000

III.

Preliminary Phase of Operation A. San Diego 1. Arrival of NAH and KAM in LA - 1/15/00 2. Activities in LA [to be investigated] 3. Meet Al-Bayoumi and Move to SD - 2/00 4. Activities in SD a. Move into Parkwood Apartments b. Open BOA account c. Buy car d. Move to Muppet's House e. KAM departs f. NAH's life in SD - 6/00-12/00 [to be investigated] B. Hamburg Cell Pilots' Preparation 1. Researching Flight Schools - early 2000 2. Preparing for Travel to US - spring 2000 3. Al-Shehhi, Atta, Jarrah Arrive in US - May-June 2000 4. Financial Support from Operatives in UAE 5. Flight Training - June-Dec. 2000 C. Substitution of Hanjour for NAH as 4th Pilot - Dec. 2000 1. Hanjour arrives in SD 2. Hanjour and NAH travel to Arizona

Commission Sensitive

Commission Sensitive IV.

Consolidation Phase A. Bin Al-Shibh Trip to Obtain Further Instructions for Atta - Jan. - June 2001 1. Meetings with UBL, KSM, Abu Hafs Al-Masri in Afghanistan 2. Meeting with KSM in Karachi B. Travel of Non-Pilot Hijackers to US 1. Selection of Operatives in Afghanistan 2. Arrangements to Travel to US 3. Arrival of Operatives in US 4. Infusion of Additional Financing C. Transcontinental Test Flights by the Four Pilots - May - Aug. 2001 1. Information pilots were able to obtain 2. Las Vegas Rendezvous D. Bin Al-Shibh's Coordination Role 1. Spain meeting and in phone contacts with Atta - summer 2001 2. Contact with and money transfer to Moussaoui - July - Aug. 2001 3. Receipt of 9/11 date from Atta and communication thereof to KSM E. Acquisition of Tickets for 9/11 Flights

IV.

Execution A. Assembling of Flight Teams 1. AA #11: Atta, Al-Suqami, Waleed & Wail Al-Shehri, Al-Umari 2. UA #175: Al-Shehhi, Banihammad, Ahmed & Hamza Al-Ghamdi, Mohand Al-Shehri 3. AA #77: Hanjour, NAS, KAM, Majed Moqed, Salim Al-Hazmi 4. UA #93: Jarrah, Saeed Al-Ghamdi, Al-Haznawi, Al-Nami B. Return of Excess Funds to Operatives in UAE C. September 11 Hijackings and Crashes

IV.

Sidebars to Address Loose Ends, Alternative Theories and Popular Misconceptions A. B. C. D.

VI.

DSM "Holy Tuesday" Second Wave of Attacks Other

Glossary of Who's Who in Conspiracy

Commission Sensitive

WITH DRAWAL NOTICE RG: 148 Box: 00004 Series: Copies: 1

Folder: 0009 Document: 6 Stephanie Kaplan Files Pages: 3 ACCESS RESTRICTED

The item identified below has been withdrawn from this file: Folder Title: Team Monograph Outlines Document Date: Document Type:-tettef- D^--H»-e Special Media: From: To: Subject:

Team 2: U.S. Intelligence Management, Collection, and Analysis

In the review of this file this item was removed because access to it is restricted. Restrictions on records in the National Archives are stated in general and specific record group restriction statements which are available for examination.

NND: 301 Withdrawn: 06-20-2008

by:

RETRIEVAL #: 301 00004 0009 6 System DocID: 2868

Unclassified - Commission Sensitive

TEAM 3 MONOGRAPH OUTLINE Counterterrorism Policy

X

How did the United States try to fight terrorism before 9-11? -, Narrative: What did senior decision makers see as the U.S. "strategy " infighting terrorism? Infighting al-Qa 'ida? 1 . How did they articulate this strategy? 2. Was it shared at all senior levels? 3. Was it shared with the field (commands, CIA stations, diplomatic posts, etc)? How was it understood by those in the field? 4. Did policymakers recognize the unusual nature of the al-Qa'ida challenge? 5. How did the strategy evolve over time and adapt to developments? 6. Key decision points linked to events a) Which specific policy responses were considered after each key event (i.e. African Embassy and U.S.S. Cole bombings)? b) What were the "windows for the use of force" for each considered response and did the U.S.G. miss these "windows"? 7. Policy statements, documents, bureaucratic changes, and other manifestations Description of each Department or Agency participation 1 . Did the CIA contribute with robust covert action efforts? a) What instruments did the CIA use and why? b) What contributions did these instruments make? (1) To counterterrorism (2) To efforts against al-Qa 'ida c) What were the limits of each instrument? Were instruments used in a timely fashion?

Unclassified - Commission Sensitive

Unclassified - Commission Sensitive d) What instruments were not used? (1) Why were they ruled out? (2) What contribution might they have made? e) What obstacles impaired the CIA's ability to target Bin Ladin? 2. Did the DoD and the military consider the full range of its capabilities? a) What instruments did the military use and why? b) What contributions did these instruments make? (1) To counterterrorism (2) To efforts against al-Qa 'ida b) What were the limits of each instrument? Were instruments used in a timely fashion? c) What instruments were not used? (1) Why were they ruled out? (2) What contribution might they have made? d) What obstacles impacted the military's ability to use force against alQa'ida? Was it limited to "TLAM therapy"? e) What was the extent of the DoD's cooperation with the CIA? To what extent did it support the CIA's covert action mission? f) What steps, between 1 998-200 1 , did the DoD prepare for a 9- 1 1 attack? g) To what extent did the DoD participate in homeland defense?

Jf. Did the DoJ ensure a robust legal strategy and response? a) What instruments did the DoJ use?

Unclassified — Commission Sensitive

Unclassified - Commission Sensitive b) What contributions did these instruments make? (1) To counterterrorism (2) To efforts against al-Qa 'ida c) What were the limits of each instrument? Were instruments used in a timely fashion? d) What instruments were not used? (1) Why were they ruled out? (2) What contribution might they have made? e) How legalistic were the lawyers? What was their relationship with those operating in the field? f) Were there times when a legal response was not appropriate? g) Was the legal strategy coordinated and consistent with the overall U.S. strategy? >? 4; To what extent did the State Department properly emphasize counterterrorism •^ in overall diplomacy? What were State's priorities from 1998-2001? a) What instruments were used and what contributions did they make? (1) To counterterrorism (2) To efforts against al-Qa 'ida b) What were the limits of each instrument? Were instruments used in a timely fashion? c) What instruments were not used? (1) Why were they ruled out? (2) What contribution might they have made? Coordination a) Did agencies coordinate with each other? How did they do so?

Unclassified - Commission Sensitive

Unclassified - Commission Sensitive b) Did the White House ensure proper coordination and leadership on counterterrorism issues? 6. Did counterterrorism support and attention go beyond senior (political) levels of the agencies to include the civil service (and vice-versa)? 7. Did support and attention extend to the USG field offices, which would be coordinating efforts in the field? C. Were there gaps in U.S. strategy? 1. What gaps existed, if any, given the threat that was emerging? 2. Did policymakers recognize the gaps? If not, why not? 3. Did policymakers try to fill them? 4. Why were certain instruments not used? 5. Why did policymakers select cruise missiles strikes after the 1998 Embassy bombings. Why were other responses not employed? 6. Why was there no response to the attack on U.S.S. Cole? 7. Given the gaps in our strategy, was sufficient attention given to homeland defense? II. Did we miss opportunities to stop al-Qa'ida before 9-11? A. Could we have stopped al-Qa 'ida in Sudan? 1. Was Bin Ladin recognized as a problem during his time in Sudan? Was alQa'ida? To what extent did we discuss the Bin Ladin and al-Qa'ida issues with Sudan? What about the presence of terrorists in general? 2. What other goals did the United States have in Sudan? 3. What leverage did the United States have with Sudan? With its neighbors? 4. What instruments were considered for pressing Sudan? Which ones were used and why? 5. Why was Bin Ladin expelled? B. Could we have stopped al-Qa 'ida in Afghanistan? Unclassified - Commission Sensitive

Unclassified - Commission Sensitive 1. When was Bin Ladin, and al-Qa'ida, recognized as a problem by senior policymakers? 2. What other goals did the United States have in Afghanistan? With its neighbors? To what extent did regional relations shape our Afghan policy? 3. What leverage did the United States have over the Taliban? Were there indirect forms of leverage (e.g. through Pakistan)? 4. What instruments were considered? Which ones were used and why? 5. How successful were the various instruments? C. Was stopping al-Qa 'ida apriority in the many permissive environments in which it operated? 1. Identify range of al-Qa'ida operating environments and select several (Pakistan, Germany, and Saudi Arabia) for particular scrutiny. a) Describe the al-Qa'ida problem b) Type of activity conducted in the country c) Government response, or lack thereof d) Degree of government cooperation with al-Qa'ida (or penetration), if any 2. Explaining U.S. policy a) Was al-Qa'ida recognized as a problem by senior policymakers in the United States with regard to the various countries? b) What other goals did the United States have in these countries? How much did these conflict with our counterterrorism agenda? c) What leverage did the United States have? d) What instruments were considered? Which ones were used and why? e) Why did the various instruments fail or succeed?

III. To what extent did the following bear on our efforts to fight terrorism and al-Qa'ida?

Unclassified - Commission Sensitive

Unclassified - Commission Sensitive A. Conflicting priorities/focus B. Resources C. Recognition of the enormity of the threat D. Levels of popular support for dramatic change 1. How strong was the opposition? 2. Was there an attempt to shape/lead public opinion? E. Levels of foreign government support 1. Regimes that supported al-Qa'ida 2. Regimes sympathetic to al-Qa'ida's ideology 3. Regimes fearful of a confrontation with Islamists 4. Regimes that did not enjoy close relations with the United States 5. Lack of regime capacity for cracking down on al-Qa'ida (i.e. resources, civil liberty issues, etc) F. Poor bureaucratic coordination and communication in the U.S. G. Possible disconnects between Washington and the field H. "Somalia syndrome "/casualty aversion I. President Clinton's political troubles J. Bureaucratic resistance (discuss for various bureaucracies, as appropriate, including the U.S. military) 1. Did not see al-Qa'ida as their institution's mission 2. Did not see al-Qa'ida as a sufficient threat 3. Institution unable to contribute due to lack of capabilities K. Attitudes towards using covert action L. Many to add here Unclassified - Commission Sensitive

Unclassified - Commission Sensitive

IV. Have these issues been addressed? A. Sufficient money? B. Sufficient focus? C. Degree ofinstitutionalization? D. New problems that have emerged?

V. Are we doing the right thing now? (And is the lack of attacks tied to this?) A. WMD, loose nukes B. Iraq C. MEPP D. Draining the swamp E. Anti-Americanism F. Are we encouraging other countries (i.e. Saudi Arabia and Pakistan) to cooperate and address terrorism? What is the quality and sincerity of their efforts?

Unclassified - Commission Sensitive

A

^fl^

0 O W

S? O.Oi p

"*?' C/

^

X1 Vn

£

I ^

-f > o

~^ «? ^ 0

if P ^A»^

^,

\

•^^

1

I

\\

^

\

Sf-

)

OL

9- t/

J

Initial Monograph Outline Terrorist Entry Into the US Team 5, Immigration, Nonimmigrant Visas and Border Control Revised August 12, 2003 What happened? *May begin here if information permits I. Entry of the 19 hijackers. A. Visa issuance to the 19 hijackers B. Entry of the 19 hij ackers at ports of entry C. Failed attempts at entry by Sept. 11 plot participants II. Entry by September 11 associates: comparison and contrast with the 19 hijackers III. Previous entries by Al Qaeda and Islamic terrorists, WTC I - September 11. IV. Failed entries by Al Qaeda and Islamic terrorists, 1995 - September 11 plot. V. *A1 Qaeda advance travel planning — probes and critical factors e.g., identity, country of birth, passport, visa, travel route VI. Evolution and variations in terrorist entry, 1990 - Sept 11 attack VII. Border security: Immediate response to the attacks [TBD] A. Leadership actions B. Border controls C. Internal immigration enforcement policy Why did it happen: Did our border control system afford a missed opportunity to prevent the entry of the 19 hijackers or to remove them from the US? ([] indicates tentative inclusion depending on facts to be developed.) I. The role of watchlists and clearances A. TIPOFF: Terrorist Watchlist developed and used for visa processing B. Watchlisting by the CIA 1. Facts relating to the 19 (al Hazmi, al Mihdhar) 2.Other possibilities: institutional role of terrorist watchlisting C. Watchlisting by the NSA 1. Facts relating to the 19 2. Other possibilities: institutional role of terrorist watchlisting D. Watchlisting by the FBI 1. Facts relating to the 19 (Hanjour, Jarrah, flight schools) 2. Other possibilities: institutional role of terrorist watchlisting E. Lookouts by INS and Customs? [- untapped legacy-INS and Customs databases?] F. Assessment and accountability II. [The role of terrorist mobility intelligence in decisions of consular officers abroad and border-related federal inspection services]-^T^ H if\teC |fl ioC^US^/^Cu/'/lJ III. The impact of border security policy on visa and entry decisionmaking 7 A. Counter-terrorism and security policy (FDD's, State S/CT, INR, DS, etc.) B. Country and regional policy (e.g. State/NEA, SA, Egypt, UAE, Lebanon) C. Migration, immigration, and international crime policy (State/CA, PRM, INL) D. Other border control policy (DOJ, INS, FBI) E. Assessment and accountability

M/UTV t>UA^ cuw O/AxU "n*4rt^ c/iiT/v / J 0

IV.

V.

VI.

VII.

The impact of visa administration procedures and practices on visa decisions A. Legal standards B. Clearances and advisory opinions C. Visa Express and other programs D. Forms, interviews, and technology tools E. Department of State Consular Affairs budget and personnel F. State Department evaluation criteria for consular posts F. Assessment and accountability The role of federal inspection at the ports of entry on September 11, 2001 A. Legal standards B. Primary inspection C. Further checking at secondary inspection D. Watchlist/lookout information E. Immigrant compliance history information F. [Technology factors] G. Interview criteria H. Assessment and accountability Potential opportunities for US immigration authorities to detect the 19 hijackers after entry A. 1996 mandated student tracking system B. 1996 mandated exit-entry system C. 1996 mandated biometrics requirement D. Internal immigration enforcement policy and practice E. Technology factors F. Assessment and accountability Border security opportunities: Overall assessment and accountability A. White House B. Intelligence agencies C. Department of State D. Department of Justice, INS, FBI E. Congress

hat border security measures can be undertaken to prevent terrorist access to the US? I. Borders and terrorists (strategic context) yft*' A. Al Qaeda's and other terrorists' targeting within the US -^JC B. Internal and external demand for foreigners' access to the US W\. [Demand for access to US citizens and entities abroad] U. "?D.. Common interests with other countries in border security arrangements , j^j-(t1'E. Border security in balance with the advancement of peace and prosperity VO Vulnerabilities of our border security system (tactical context) icfW- VO V * ' Review of vulnerabilities exploited by the 19 terrorists Review of vulnerabilities exploited by other similar terrorists C. Terrorist mobility patterns and tradecraft D. Relationship of terrorist entry to other transborder crimes: Alien smuggling; illegal financial flows; narcotics trafficking; arms trafficking

III. IV.

Future scenarios Key new anti-terrorism features of the border security system A. Watchlist, security advisory opinions/clearances, and lookout intelligence changes B. Domestic immigration law enforcement C. Immigration compliance systems D. Visa and federal immigration inspection policies 1. reorganization (DHS) 2. additional security reviews 3. visa applications and process changes 4. new compliance systems - student tracking, exit/entry E. Hardening of the northern and southern borders

V. Recommendations. Team 5 has identified seven groupings of border security policy issues from which a few key recommendations will emerge, taking into consideration the current threat, existing systems, and feasibility. The areas are: Intelligence and watchlisting. USG needs to identify terrorist groups and their individual members in manner that facilitates an institutionalized information exchange among border security officials in order to prevent entry of known terrorists or apprehend them if they are already in the US. Related issues are: (1) collection and analysis of border security information and intelligence; (2) institutionalization and organization of such intelligence; (3) ensuring the preservation of individual rights; and (4) the role of the private sector (airlines and other transportation entities). Border Enforcement. Terrorists exploit the US visa process, entry without inspection, asylum claims, amnesty, legal permanent residency, and perhaps refugee programs, immigration law benefits, alien smuggling, and corruption of border officials. Issues involved in shutting down border security loopholes and abuse include: (1) the role of our domestic and international border enforcement policies; (2) the role of technology (cameras, sensors, unmanned aircraft, fences, smart cards, stand alone and interconnected databases, new and renovated entry ports); and (3) the role of the military (national guard, unmanned aircraft). Screening abroad (visas) and inspection at border points. This is a broad area ranging from whether legal standards for assessing potential terrorists' eligibility to enter need to be changed to whether changes in visa and POE screening may be required. Issues include: (1) consideration of possible changes to the visa waiver program, transit without visa and international-to-international transit, entry-exit enforcement; and preclearance/pre-inspection; and (2) the value added of super name checks and other programs instituted since 9-11 to US border security and other national interests. Identity security. USG needs to address terrorists' use of fraudulent and counterfeit supporting documents to attain US-issued travel documents. Such "breeder/feeder" documents include: birth certificates, drivers' licenses, social security cards and other "national" ID cards. Issues include: (1) USG efforts to improve technology (databases, biometrics and machine readable documents) to discourage use of fraud; (2) national

regulation of breeder/feeder document issuance; and (3) USG prioritization of anti-fraud efforts, including training of border security officials. Immigration law as a counterterrorism tool. USG has instituted use of strengthened immigration laws in response to the 9/11 attacks, including: (1) post 9/11 detention and removal of aliens with outstanding immigration violations; (2) special registration requirements for certain classes of aliens; and (3) student tracking. Issues include: (1) a determination of the usefulness of the policies and practices instituted to implement these laws; (2) their implications for US constitutional rights and foreign policy. International Undertakings. USG has undertaken bilateral, regional and multilateral cooperative efforts on border security, as well as international watchlisting and data sharing. Issues include the value of these efforts, and the instruments used to achieve USG goals in anti-corruption and anti-fraud efforts, visa policy, and secure travel documentation.

Iw^^°

TV) -LiZ^. C"/V) C(jy(]

/q

Commission Sensitive TEAM 7 MONOGRAPH OUTLINE Status of Civil Aviation Security on September 11, 2001 I.

Creation and Evolution of Civil Aviation Security to September 10, 2001 a. Threats to Commercial Aviation prior to Pan Am 103 (SB) 1. Domestic threats 2. International threats 3. Commercial Aviation as terrorism target 4. Hijackings b. Creation and evolution of the system prior to Pan Am 103 1. Legal authorities and statutory requirements (BJ) • Federal Aviation Act of 1958 • Air Transportation Security Act of 1974 2. International Conventions (SB) 3. Role of federal government, airlines and airports (BJ) c. Destruction of Pan Am 103 (1988) and response (JR) 1. Change in perceived threat 2. President's Commission on Aviation Security and Terrorism (1990) • Recommendations • Implementation, statutory and regulatory (including Aviation Security Improvement Act of 1990) • Evolving roles of federal government, airlines and airports d. Destruction of TWA 800 (1996) and response (BJ) 1. Change in perceived threat 2. White House Commission on Aviation Safety and Security (1997) • Recommendations • Implementation (including Federal Aviation Reauthorization Act of 1996 and Airport Security Improvement Act of 2000) • Evolving roles of Federal government, airlines and airports

II.

Civil Aviation Security System on September 10, 2001 a. Congress (JR) 1. Legislation 2. Funding 3. Oversight (including GAO)

Commission Sensitive

Commission Sensitive b. Federal Aviation Administration (BJ) 1. Culture 2. Authorities 3. Organization c. Air Carriers (BJ) 1. FAR 108 and Air Carrier Standard Security Program 2. Screening • Individual screening • Carry on items • Checked baggage screening 3. Access control 4. Other responsibilities d. Airports 1. 2. 3. 4.

(SB) FAR 107 and Airport Security Program Facility Security (including workforce) Access control Law enforcement

III.

Civil Aviation Security Elements on September 10, 2001 (JR) a. Intelligence gathering and threat assessment b. Ticketing and profiling c. Access to secure air operations areas (including workforce security) d. Passenger screening and carry-on baggage screening e. Checked baggage screening f. Cockpit security g. Pilot and crew response protocols h. Federal Air Marshal program

IV.

Aviation and terrorism 1995- September 10, 2001 (SB) a. Incidents 1995-2001 b. Terrorist knowledge of U.S. aviation security system

V.

Conclusion: The World of September 10, 2001 a. Changing threat (SB) b. Intelligence analysis and dissemination (JR) c. Development, implementation and enforcement of security standards (BJ) d. Economics, political will and public opinion (BJ)

Commission Sensitive

COMMISSION SENSITIVE

TEAM 8 MONOGRAPH OUTLINE Immediate Response The newly constituted Immediate Response Team plans to tell the story of the events on 9/11 in a three-part monograph. Part One will narrate the events of that day in an integrated fashion, juxtaposing the real-time responses of the various individuals and agencies with the developments on the hijacked flights in an effort simply to tell the story of the immediate response to the attacks. It will be a straightforward factual account of 9/11, as Team 8 is able to reconstruct the day. It will be accompanied with a graphic presentation of the comprehensive 9/11 timeline. Part Two will evaluate the performance of individual agencies, entities and leaders in responding to the attacks and in interacting with each other. Part Three will mine from the hard experience of 9/11 specific policy recommendations that, if adopted, will enable the United States to respond more effectively in the event of a future attack. Because many of the critical decisions and developments of the day (e.g., the decision to order a shoot down; the decision to close the financial markets) remain uncorrelated to precise time frames, the outline set forth below is necessarily preliminary, and subject to organizational and substantive refinement based on the results of Team 8's investigation.

I. Integrated narrative/Timeline A. AA 11 — First hijacking 1. FAA loses contact with the flight; FAA response, communications with other flights (including UA 175), agencies 2. Cell phone communications 3. Response upon impact a. NY 1. Within the buildings; PA and tenants 2. First responders: FDNY; NYPD: OEM, EMS b. Federal response/critical decision making 1. President/Vice President/White House personnel 2. FAA/DOT

COMMISSION SENSITIVE

COMMISSION SENSITIVE 3. NORAD/DOD 4. Others if relevant, e.g., WHMO, Secret Service B. UA 175 ~ Second hijacking 1. FAA communications with the plane; loss of contact; response 2. Cell phone communications 3. Response upon impact a. NY 1. Within the buildings; PA and tenants 2. First responders: FDNY, NYPD, OEM, EMS b. Federal response/critical decision making 1. President/Vice President/WH personnel 2. FAA/DOT 3. NORAD/DOD 4 Other C. The Twin Towers Collapse: Response a. Building tenants b. PA c. FDNY d. NYPD e. Federal first responders: FEMA; FBI f. OEM g. Mayor's office D. AA77: The Third Hijacking

COMMISSION SENSITIVE

COMMISSION SENSITIVE 1. FAA loses contact with AA 77; response 2. Cell phone communications 3. Response upon impact a. The Pentagon 1. Within the building 2. First responders: Arlington County Police, Fire 3. Federal first responders: FBI, ATF b. Federal response/ critical decision making 1. President/Vice President/WH personnel 2. FAA 3. NORAD/DOD 4. Other E. UA93: The Fourth Hijacking 1. FAA loss of contact 2. Cell phone communications 3. Response upon impact a. In PA: Local first response b. Federal response/critical decision making 1. President/VP/WH personnel 2. FAA/DOT 3. NORAD/DOD 4. Other F. The Remains of the Day: Emergency Response on 9/11 After the Attacks

COMMISSION SENSITIVE

COMMISSION SENSITIVE

1. Critical national decision making a. President/VP/WH personnel b. FAA/DOT c. NORAD/DOD d. Other 2. The New York response a. FDNY b. NYPD c. OEM/Mayor's office d. Federal first responders: FBI, ATF, FEMA 3. The Pentagon a. Arlington County FD, PD b. Federal first responders: FBI, ATF G. Recovery and Initial Lessons Learned: From 9/11 to 9/20 1. The progress of recovery in NY 2. The progress of recovery at the Pentagon 3. Federal Lessons Learned: Homeland Security Czar, Patriot Act H. Continuity of Government/Operations/Business Issues II. Agency/Entity Emergency Response Performance: A Critical Reappraisal A. Federal 1. President/VP/WH personnel 2. FAA/DOT

COMMISSION SENSITIVE

COMMISSION SENSITIVE

3. NORAD/DOD 4. Secret Service B. New York 1. FDNY 2. NYPD 3. OEM 4. Mayor's office 5. Federal first responders: FBI, ATF, FEMA C. The Pentagon 1. Arlington County FD 2. Arlington County PD 3. Federal first responders: FBI, ATF III. Lessons Learned and Best Practices A. Best Practices for Emergency Response 1. Unified command structure 2. Interoperable communications 3. Evacuation procedures: state of the art B. The persistence of bureaucracy 1. Turf wars: FAA/DOD; NYPD/FDNY; FBI/ATF 2. Potential solutions

COMMISSION SENSITIVE

Related Documents


More Documents from "9/11 Document Archive"