HOMELAND SECURITY ADVISORY COUNCIL - WEAPONS OF MASS EFFECT TASK FORCE ON Preventing the Entry of Weapons of Mass Effect Into the United States
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
HOMELAND SECURITY ADVISORY COUNCIL WEAPONS OF MASS EFFECT TASK FORCE ON Preventing the Entry of Weapons of Mass Effect Into the United States January 10, 2006 Page 1 of 39
Table of Contents Executive Summary 3 I Introduction 10 Purpose 10 Scope and Approach 10 II Current State 12 The Threat 12 General Observations on WME Prevention 12 Critical Deficiencies 14 III Addressing the Critical Deficiencies 15 Conceptual Framework 15 Moving from a Framework to Solutions: A Risk Reduction Approach 17 Layered Approach 19 Management Process 20 IV Path Forward: Developing, Deploying, and Managing A Layered Defense System 21 Authority, Alignment, and Incentives 21 Deterrence 23 Risk and System Management 24 Innovation 25 Appendix A Detailed Supporting Actions 27 Appendix B Member Biographies 35 Glossary 39 Page 2 of 39
EXECUTIVE SUMMARY Throughout history societies have been and limits of acceptability since restrictions threatened by enemies willing to attack ci- on the movement of cargo and people ulti- vilian targets with weapons of catastrophic mately pose a risk to the flow of commerce impact. As the weapons and the people who and to personal freedom. Despite these lim- would use them have changed over time, its, the country can and should be better pro- defensive strategies and systems have tected from the threat posed by the entry of evolved as well. A central tenet of Cold War WME. strategy was to deter first use of nuclear weapons by the Soviet Union. The vast de- Charge to the Task Force structive potential of such weapons made a The Homeland Security Advisory Council, nuclear exchange totally unacceptable; every an independent advisory body offering ad- possible measure was taken to avoid nuclear vice, analysis and recommendations to the war including massive investments in capa- Secretary of Homeland Security, charged a bilities to detect weapon launch and assure Task Force composed of Council members, retaliatory capability. With the demise of the Senior Advisory Council members and gov- Soviet Union, the nature of the threat has ernment representatives with recommending changed but the danger has not necessarily specific steps the nation can take to prevent diminished. We still face the potential for the entry into the country of weapons of hundreds of thousands of casualties and mass effect and the people who would use massive economic disruption from attacks them. Preventing the entry of the people on our homeland. who would use such weapons is of great im- portance in that WME and components of The United States is vulnerable to massive WME as defined in this study are found loss of life and economic devastation from within the United States. Preventing the use the covert or terrorist delivery of a weapon of WME by individuals who may already be of mass effect (WME). 1 This is an unac- in the U.S. is not within the scope of the ceptable condition. As an open society, the charge. U.S. will never be able to construct impene- trable defenses to the entry of such weapons The Task Force decided that a systematic or the people who would use them. Attempts approach must guide its work and the rec- to “seal off” the borders to such entry have ommendations it provides to the secretary. limits—physical limits in our ability to de- The Task Force met with experts from in- tect weapons or people entering the country side and outside of government at all levels to understand current plans, systems and 1 Weapons of mass effect, or WME, are weapons practices in WME prevention and receive capable of inflicting grave destructive, psychological input on how to improve upon current capa- and/or economic damage to the United States. These bilities. The Task Force developed a systems include chemical, biological, nuclear, radiological, or explosive weapons. While the Task Force recognizes view of WME prevention, assessed the gap the significant differences in the nature of these between the current fragmented system and weapons, they share many common elements in a more unified approach, and made recom- terms of the requirements for preventing entry into mendations to close the gaps. the U.S. For the purposes of this study, cyber threats are not considered since cyber attacks can be launched from outside the country. Page 3 of 39
Findings range of potential threat scenarios com- The Threat pound the complexity. An attack on our country by a WME is ar- guably the gravest danger to American na- Critical Deficiencies tional security. Different WME scenarios— The Task Force identified critical deficien- use of nuclear, biological, chemical, radio- cies in the current state of WME prevention: logical, or conventional weapons against the absence of a systematic, risk-based ap- U.S. targets—have different likelihoods and proach to investment; dispersed capabilities, impacts, including civilian casualties in the leadership and decision making; inadequate hundreds of thousands. Regardless of the attention to engaging foreign partners; deter- scenario, the consequences are almost uni- rence concepts in need of updating; need for maginable. Preventing WME use on U.S. greater urgency and priority for investments soil must become our most urgent priority in technological innovation; and lack of citi- and the subject of focused and integrated zen engagement. effort. That it isn’t today is a grave concern. Addressing Critical Deficiencies Determining the magnitude of resources that Conceptual framework. To decrease the risk should be devoted to negating WME threats of a successful WME penetration of U.S. is greatly complicated by the fact that such borders, the WME prevention system should threats (hopefully) have a very low probabil- be designed to address WME threats as ity of occurrence, at least at the present time, close to the point of origin as possible. To but have extremely significant conse- achieve that objective, the U.S. should im- quences. In addition, the probability of at- plement a WME prevention strategy and tacks of the type discussed in this report is system which has the following three never likely to be reduced to zero. Nonethe- thrusts: less, the likelihood that a specific attack can be prevented is significantly enhanced if the • Neutralize known terrorists country is willing to invest precious re- • Secure or eliminate sources of WME sources on WME prevention. and/or critical components • Detect and interdict WME in transit General Observations WME prevention is a daunting management, The first thrust, neutralizing terrorists, is technical, operational, and systems chal- primarily a responsibility of the military and lenge and although significant progress has the intelligence community. The second been made in recent years, much remains to thrust, securing or eliminating sources of be done. Authority, decision making, and WME, is also a joint responsibility of sev- operational control are distributed across eral government agencies, with the newly- individuals and organizations at multiple established National Counterproliferation levels. The multiple participants involved in Center (NCPC) in a coordinating role. WME prevention share a common focus on security yet are diverse in mandates, mem- This report focuses primarily on the third berships, capabilities, cultures, and motiva- thrust, detecting and interdicting WME in tions. This diversity is an advantage only if transit, while recognizing that the first two it is managed systematically; it is not today. are essential, interrelated, and ultimately The uncertainty over the threat and the wide preferable elements of a prevention strategy and that a systems view of the problem and Page 4 of 39
an integrated effort across all three thrusts is Based on historical success in other complex critical. systems, the Task Force believes that “layer- ing” defensive capabilities would provide The Task Force found it useful to conceive the necessary redundancy, flexibility, and of the WME prevention problem as consist- robustness so that failure of any one element ing of three dimensions: 1) how WME mate- of the system is not catastrophic, and the riel or people move across international bor- protective effect of individual elements is ders toward a location in the United States— cumulative or multiplicative. In the case of the geographical or spatial dimension; 2) WME prevention, a “layer” is any combina- what can be done along the path from source tion of the above three dimensions that re- to target—the functional dimension; and 3) duces the risk of entry of WME capability. how the functions are carried out and by whom—the operational dimension. Management process. An integrated, sys- tem-wide WME prevention management Risk reduction and layered approach. Re- process must be established as the basis for ducing or minimizing the risk of a WME subsequent system design and implementa- entering the U.S. should be the central deci- tion decisions. Through an architecturally- sion-making criterion for designing, devel- driven system definition, design, and man- oping, deploying, and operating a WME agement process, decision makers can per- prevention system. Risk reduction analyses form risk assessments and determine the should be structured to address the funda- value of different components of a system mental choices available to the country in by seeing their functions, costs and interac- confronting the WME prevention challenge. tions in broader context rather than in isola- With a broad systems view, fundamental tion. Gaps in capability can be more readily questions can be asked and answered, such identified along with alternative pathways as: for filling those gaps and reducing risk. • What should be the relative balance of Recommendations investments for the three basic thrusts: The Task Force generated many suggestions neutralizing terrorists, securing potential for improving WME defense. Recommenda- WME sources, and detecting WME in tions were organized to address the major transit? areas of concern with the current WME pre- • Are investments correctly balanced be- vention system—authority, alignment and tween air, land and sea corridors as a incentives, deterrence, risk and system man- function of threat and risk? agement, and innovation. Specific support- • How should investments in alternative ing implementation actions are offered in detection technologies be balanced in re- each of these areas. lation to the threat? • What interfaces must exist between dif- Leadership ferent entities with complementary func- tions? Recommendations Strengthen leadership structures. Clarify Resource allocation decisions must be based lines of authority and control by having the on the greatest security impact rather than president designate the Secretary of Home- parochial interests. land Security as the lead individual respon- sible for preventing WME attacks in the Page 5 of 39
United States and strengthen his/her access in consultation with state governors to re- to the information and assets needed to carry spond to terrorist attacks or emergencies that out this function. The secretary should im- exceed the states’ resources. Governors and mediately initiate a risk assessment and sys- their respective homeland security advisors tem management effort and adopt a model should plan more effectively for a wide such as a Joint Program Office to coordinate range of contingencies that will inevitably the program elements and control the inte- require the unique capabilities of the mili- grated WME prevention budget. Strengthen tary. the White House Homeland Security Coun- cil (HSC) to make it comparable in authority Supporting Actions and responsibility to the National Security Improve interagency coordination. Develop Council (NSC). policies, planning, and processes that sup- port an integrated program budget and facili- Engage internationally. Better engage for- tate joint efforts across the federal govern- eign governments and multilateral organiza- ment. Develop a government-wide system tions with more individuals in the diplomatic that rewards interagency cooperation and corps responsible for WME prevention, and coordination focused on preventing the entry together focus more effort on developing a of WME. Institutionalize response organiza- common understanding of the WME threat tions such as the Interagency Incident Man- posed by terrorism, sharing best practices agement Groups to take on prevention func- for preventing WME attacks, and develop- tions during non-emergency periods. ing the strategic cooperation necessary to deploy and manage a mutually reinforcing Eliminate unnecessary bureaucratic re- layered defense. dundancies. De-conflict overlapping or con- flicting requirements placed on industry, Require joint effort. Break down organiza- such as multiple background checks and cer- tional barriers between the Department of tifications for cross-border truckers, while Homeland Security (DHS) and other agencies retaining redundancies that are built into the by creating incentives and opportunities for layered defense system. career advancement based on such joint effort and cultivating a joint culture through more Create country or region-specific DHS cross-training and transfer of personnel be- portfolios. Provide each U.S. Mis- tween different agencies involved in WME sion/Embassy with clear-cut DHS strategic prevention. guidance. Leverage existing DHS resources currently assigned to U.S. Mis- Improve WME intelligence. The traditional sions/Embassies abroad. Create dedicated customer set for WME intelligence does not DHS foreign service attaché positions. fully accommodate the challenges posed by today’s WME threat and the role played by Selectively engage multilateral organiza- DHS. Include DHS as a principal driver for tions on homeland security-related issues. WME intelligence collection and analysis. Use strategic partnerships as force multipli- ers and a means to extend reach into regions Clarify the Department of Defense (DOD) that are breeding grounds for terrorism. role in disaster response. At the federal level, Northern Command, the Pentagon, and DHS should develop a cohesive strategy Page 6 of 39
Institutionalize DHS participation in Engage citizens. Bridge the preparedness NATO through a “reinforced North Atlan- gap between an overextended National tic Council (NAC.)” Through NAC pursue Guard and the crisis management needs of common objectives, share best practices, the federal and state level leadership by en- and develop joint competencies. gaging citizen volunteers. Proposals such as the non-expeditionary Home Guard, operat- Participate in joint contact/working groups. ing under gubernatorial control, and other Work bilaterally on WME prevention pro- volunteer-based measures can provide grams. Americans with a way to contribute to na- tional preparedness and demonstrate na- DHS leadership should actively task WME tional resilience by assisting law enforce- intelligence analysis. WME intelligence has ment and other officials with support such as traditionally been applied to supporting de- traffic control and delivery of food and wa- marches about treaty violations and sanc- ter during a crisis. tions. Today, the Weapons of Mass Destruc- tion (WMD) intelligence consumer should Supporting Actions be defined by a broader constellation of au- Create uncertainty for potential attackers. thorities, to include DHS, Health and Hu- Complicate their plans and force them into man Services, and the Federal Bureau of In- modes of operation that are more susceptible vestigation (FBI). Preventing WME attacks to detection and interdiction. on the homeland requires a forthright role for DHS in the consumption of intelligence Understand and prevent radicalization. analysis. Target root causes of international terrorism. Deterrence Build in adaptive capability. Use constant change in defensive posture to increase un- Recommendations certainty for would be attackers and to Make deterrence policy clear. The president counter changes in their tactics. should announce, and the national leadership should reiterate, a policy of swift, certain, Adapt or update existing models for mar- and severe consequences for any nation as- shalling citizenry. The Civil Air Patrol, the sociated with a terrorist act using WME. Coast Guard Auxiliary, and the National De- fense Executive Reserve should be adapted Expand deterrence into the WME context. and serve as models for a “Home Guard” Beyond retaliation, which registers little with specialized skills such as quarantine with a committed terrorist group, the layered implementation, vaccine administration, and defense system increases uncertainty and crisis communications. therefore the likelihood of failure for poten- tial attackers thus diminishing the attractive- Risk and System Management ness of WME use in the view of a potential perpetrator desiring massive effect. When Recommendations coupled with resilience in managing the af- Institute a risk-based process for resource termath of an attack, this enhanced defen- allocation. An open transparent process for sive posture should be a component of ex- targeting prevention funding should be insti- panded deterrence. tuted. To ensure that investments deal with the greatest needs from a national as well as Page 7 of 39
a local perspective, consider establishing an Establish joint government/industry work- independent body, comparable to the Base ing groups. Pattern the groups after the ex- Realignment and Closure Commission isting National Security Telecommunica- (BRAC) as a check and balance to review tions Advisory Committee to promote coor- integrated WME prevention budget alloca- dinated government/private sector counter- tions and provide insulation from political terrorism efforts. liabilities. Promote Standards for Products Useful in Improve private sector contributions to the the Anti-terrorism Campaign. Through na- process for risk management. Outside ex- tional standards, create the potential for a perts can help design and evaluate the ap- large enough market to warrant industry in- proach to managing risk. Public-private vestment. partnerships remain a valuable vehicle for this involvement, but require different ap- Provide Selective Indemnification. Indem- proaches for the demands of developing and nify firms that are seeking to assist in the managing a layered prevention strategy. war on terrorism with indemnification against adverse consequences which they Initiate a system management effort. The could not reasonably be expected to have Secretary of Homeland Security should foreseen. adopt one of several architecturally-based models of integrated systems management Create a system management board. Since to help guide and oversee the planning, de- WME prevention spans multiple organiza- velopment, and integration of the national tions, the Board should include representa- WME prevention system. tives of component elements of the WME prevention system and should meet periodi- Supporting Actions cally with the WME System Manager. The Help industry make the business case for Board should be the forum for stakeholder security and determine if/when government agencies to participate in risk assessments should provide assistance. The federal gov- and decision making on aspects of the WME ernment should assist the private sector in prevention system. making the business case for security by, for example, developing cost benefit analysis Appoint a WME system manager. Have models, creating market-based incentives for him/her report directly to the secretary and security investments, and clarifying the di- have authority to manage investments in viding line between government and private system capabilities. sector responsibilities. Publish a DHS directive on WME preven- Study the security risks posed by U.S. com- tion system management. Specify the roles, panies operating globally and outsourcing authorities, and organizational relationships to foreigners. Security experts throughout in the system management process, includ- the private sector are concerned that, due to ing the DHS role as lead, the system ap- increased overseas operations, outsourcing proval processes, national and international and supply chains, increasing numbers of relationships, and the role of the system people from foreign countries now have ac- management board. cess to substantial information about U.S. companies and their business models. Page 8 of 39
Innovation and practice and ensuring there is no retribu- tion for candid contributions. Recommendations Make detection a priority for innovation. Make “Red Teaming,” the process of gam- The secretary, the HSC, and the president ing an adversary’s actions, a more integral should make it among the highest national part of training and routine operations. priorities to bring together elements of the Purposefully testing a system, people, and research community to undertake transfor- equipment to probe for weaknesses can im- mational research. prove their security by mimicking the tech- niques the adversary would use to carry out Encourage and nurture new ideas. Create a an attack. When done at the system (rather process that encourages new ideas from than component) level, management can people within and external to the department identify system improvements. by encouraging out of the box ideas from all levels across the homeland security and re- Create a long-range review process akin to lated communities and providing a clear the DOD’s “Quadrennial Defense Review” path for those ideas to gain visibility, be that takes into account strategy, research tested, and ultimately be acted upon by deci- and development, budgeting, and other fac- sion makers. tors. Investments in infrastructure, science, and technology require long-range planning. Supporting Actions Management and operators must systemati- The Domestic Nuclear Detection Office cally feed requirements into the research and (DNDO) model should apply to other WME system development process and provide threats such as biological, radiological, and continuous updates. Such a tool would need chemical agents and explosives. Rapid pro- to go beyond DHS and include all relevant gress can be made by marshaling relevant agencies to be effective. assets across the executive branch to focus efforts on research, development, testing, and evaluation of transformational detection capabilities and strategies. Wherever possi- ble, technologies should be developed that have dual use benefits (e.g., detecting drug contraband as well as WME). Develop and apply performance metrics to guide organizational behavior toward long- term goals. When necessary, officials out- side of the organization that will be assessed should set performance metrics. Systematically institute frank and candid “after action reports.” Management must value frank and constructive criticism by and of all parties (supervisors and subordi- nates) by incorporating input into planning Page 9 of 39
I. INTRODUCTION Purpose Defining the Border As an independent advisory body, the The Task Force assumed that the U.S. bor- Homeland Security Advisory Council der was the last line of defense. However, (HSAC) exists to provide advice, analysis, the term “border” should include the physi- and recommendations to the Secretary of cal border, institutional borders such as the Homeland Security to support the creation Air Defense Identification Zones (ADIZ), or and implementation of actionable policy. other potential inspection locations such as The HSAC charged this Task Force to pro- international airports. vide a framework and associated recom- mendations to prevent the introduction of Non-proliferation Weapons of Mass Effect (WME) and/or per- Non-proliferation and the securing of exist- sons who would use them from reaching ing weapons, although perhaps the best U.S. soil. For the purpose of this discussion, WME defense, are not addressed in detail in the Task Force defined WME as weapons this report since there are already several capable of inflicting grave destructive, psy- well-studied programs, including those un- chological, and/or economic damage on our dertaken by the newly-established National nation. These include chemical, biological, Counterproliferation Center (NCPC) and nuclear, radiological, or explosive weapons. other agencies. The Task Force stresses the While the Task Force recognizes the signifi- importance of aggressively pursuing the cant differences in the nature of these weap- very basic nonproliferation goals of securing ons, they share many common elements in known sources of nuclear weapons and other terms of the requirements for preventing en- WME materiel with significantly greater try into the U.S. For the purposes of this financial and political investments. study, cyber threats are not considered since cyber attacks can be launched from outside Minimizing the Consequence of a WME the country. Attack Should prevention systems fail, the conse- Scope and Approach quences of a WME attack can be limited. The challenge in WME defense is to reduce The response to Hurricane Katrina demon- the risk of WME entry, while minimizing strated how far we must go to have the ca- impacts on legitimate commerce and pas- pabilities and the leadership to mitigate the senger traffic. The Task Force focused on impact of even foreseen natural disasters. the introduction of weapons, weapon com- Reducing the ultimate effect of a WME at- ponents, and persons into the country. Re- tack reduces the attractiveness of WME to lated issues of preventing attacks carried out an adversary. Reducing the impact of a by persons already in the United States were WME attack is addressed only briefly in this of concern but beyond the scope of this ef- study as it is, in part, the subject of another fort. HSAC Task Force on critical infrastructure resilience. Several other considerations impinged on the scope of this study: While the scope of the Task Force’s work was limited as described above, the devel- opment of a WME prevention system must Page 10 of 39
be broadly scoped to take into account all Executive Committee, Lockheed Martin aspects of the problem. Corporation. Members of the Task Force met on 12 occa- Supporting official (prior to his departure sions between March and October of 2005 from the Transportation Security Admini- and received input from a diverse group of stration (TSA)). Rear Admiral David M. experts from within and outside government Stone, USN (Ret.), Assistant Secretary, including presentations on the activities of TSA, Department of Homeland Security multiple agencies at all levels of U.S. gov- (DHS). ernment, American allies, and the private sector given by officials and subject matter Land Domain Subgroup experts from the strategic, tactical, and op- Chair. Dr. James Schlesinger, Chairman, erational levels. The Task Force gathered Board of Trustees, The MITRE Corporation; information on current systems, plans, and former Secretary of Energy, Assistant to the practices in WME prevention and current President, Secretary of Defense, and Direc- understanding of the threat. The elements of tor of Central Intelligence. a systems approach to WME prevention were identified. Requirements to reach a Supporting official (prior to his departure more unified, systematic approach to WME from Customs and Border Protection). Mr. prevention were defined and the Task Force Robert Bonner, Customs Commissioner, developed recommendations on evolving DHS national capability toward this goal. Sea Domain Subgroup Organized functionally into three intercon- Chair. Dr. David Abshire, President, Center nected subgroups, the Task Force examined for the Study of the Presidency and Presi- major WME threats, vulnerabilities, and dent of the Richard Lounsbery Foundation; cross-cutting factors from the perspectives former Ambassador to NATO, Counselor to of the major corridors of WME entry: air, the President, and co-founder and CEO of land, and sea. An HSAC or Senior Advisory the Center for Strategic and International Council member chaired each subgroup with Studies. a senior government representative serving as a senior subject matter expert. Task Force Supporting official. Vice Admiral Terry Chair, Dr. Lydia Thomas, President and Cross, Vice Commandant, United States Chief Executive Officer of Mitretek Systems Coast Guard, DHS. and Co-Chair of the National Academies Government-University-Research Roundta- Primary federal participants included the ble and Dr. Jared Cohon, Vice Chair, Presi- HSAC Executive Director, Daniel Oster- dent of Carnegie Mellon University, pre- gaard, and two Task Force Directors, Kath- sided. The following served as Subgroup ryn Knapp and Richard Davis. Benjamin Chairs. Gray served as an Associate Director. Air Domain Subgroup Chair. Mr. Norman Augustine, Member of the President’s Council of Advisors on Sci- ence & Technology; former Chairman of the Page 11 of 39
II. CURRENT STATE The Threat and over land. So, despite the technical dif- An attack on our country by a WME is ar- ficulty, the threat of terrorist use of nuclear guably the gravest danger to American na- weapons is real, as are threats posed by bio- tional security. Different WME scenarios— logical, chemical, and other WMEs. use of nuclear, biological, chemical, radio- logical, or conventional weapons against Determining the magnitude of resources that U.S. targets—have different likelihoods and should be devoted to negating WME threats impacts, including civilian casualties in the is greatly complicated by the fact that such hundreds of thousands. Regardless of the threats (hopefully) have a very low probabil- scenario, the consequences are almost uni- ity of occurrence, at least at the present time, maginable. Preventing WME use on U.S. but have extremely significant conse- soil must become our most urgent priority quences. In addition, the probability of at- and the subject of focused and integrated tacks of the type discussed in this report is effort. That it isn’t today is a grave concern. never likely to be reduced to zero. Nonethe- less, the likelihood that a specific attack can In terms of consequences, if not likelihood, be prevented is significantly enhanced if the nuclear weapons comprise the greatest threat country is willing to invest precious re- against America by a terrorist organization. sources on WME prevention. An explosion of even a low yield device in a large city such as many of those found on Preventing an attack with WME should be both coasts and in the Gulf region would the highest priority and should receive the immediately kill hundreds of thousands of maximum attention from the president, the people, followed by a comparable number of secretary, and the Congress, as well as from deaths as well as economic and psychologi- within the department. The recommenda- cal impacts in the lingering aftermath. tions offered in this report are a first step toward what must be a sustained national Constructing a weapon from nuclear mate- effort. rial would be a very difficult undertaking for a terrorist group, suggesting that it is much General Observations on WME more likely that such a group would attempt Prevention to buy, steal or be given an existing weapon. The Task Force is resolved that concerns Potential sources include the stockpiles of with the current state of WME prevention the former Soviet Union, states hostile to the should be a priority for the nation and must U.S., such as North Korea and Iran, that cur- be addressed. rently possess nuclear devices, and declared nuclear states, such as Pakistan, that could The country has multiple, independently de- lose control of their nuclear arsenal in a po- veloped systems that constitute the de facto litical crisis. national defense against entry of WME. (In this context and throughout this report, the A variety of means of introducing such term “system” includes people, organizations, weaponry into the U.S. is available, includ- processes, and technologies that are applied ing penetrating from the sea, from the air, together to achieve a common objective.) Page 12 of 39
Many WME prevention systems seek to detect share a common focus on security yet are and interdict the illicit entry of people and ma- diverse in mandates, memberships, capabili- teriel of concern. These systems selectively ties, cultures, and motivations. This diversity focus on borders, ports of entry, and modes of is an advantage only if it is managed sys- transport to varying degrees. In many cases, tematically. The uncertainty over the threat there are multiple systems managed by differ- and the wide range of potential threat sce- ent organizations to tackle a single problem. narios compound the complexity. Preventing entry of WME through seaports for example is a focus of several programs, in- In the National Strategy for Homeland Secu- cluding the Container Security Initiative, op- rity (March 2002), the Office of Homeland erated by DHS, and the Megaports Initiative, Security provided a vision to mobilize and which is a Department of Energy program. organize the U.S. to secure the homeland from terrorist attacks. The strategy acknowl- The WME prevention mission is not limited edges that this is an exceedingly complex to detection and interdiction. It is wide rang- mission that requires coordinated and fo- ing and includes organizations and programs cused effort from our entire society—the in intelligence, threat analysis, research and federal, state, local and tribal governments, development, technology acquisition, test the private sector, and the American people. and evaluation, diplomacy, minimizing con- This requirement for coordination and focus sequences, managing recovery, and other has not been reached with regard to U.S. ef- functions. The organizations involved span forts in WME prevention. This Task Force the federal, state and local levels of govern- also acknowledges the need to work collabo- ment, foreign governments and international ratively with foreign governments and mul- organizations, research institutions, and pri- tinational institutions as well. vate industry. In some agencies, dedicated internal units are responsible for functions Vulnerabilities attributable to deficiencies in such as intelligence and threat analysis. In the current state of WME prevention are real other cases those capabilities are a shared and must be addressed. It is essential that the function across agency lines. Some func- distinct entities in WME prevention operate tions are duplicated in multiple locations in a unified manner and that resources be without a rationale other than their legacy allocated based on relative contribution to presence. For example, explosives security risk reduction rather than parochial or legacy groups in DHS can be found under the Im- entitlements. Moving to a more effective migration and Customs Enforcement Federal WME prevention system requires more than Air Marshal Service, the Science and Tech- overhauling strategy. Key investments in nology Directorate, the Office of Infrastruc- infrastructure, technology, and long-range ture Protection, the Office of Domestic Pre- human resources must match the challenge paredness, and the TSA. Similar duplica- at hand. Congress and the Administration tions are evident in other federal agencies. must pursue legislative and policy solutions that provide consistent support for these ob- WME prevention is a daunting management, jectives. technical, operational, and systems chal- lenge. Authority, decision making and op- The Task Force focused its efforts on how to erational control are distributed across par- achieve a unified system with risk-based ticipants at multiple levels. The multiple management. participants involved in WME prevention Page 13 of 39
Critical Deficiencies them to share in the responsibility to se- The WME threat focuses directly on weak- cure the homeland. nesses—vulnerabilities and gaps in our de- fense—not strengths. It adapts and evolves. With these general and specific concerns in To combat this threat our critical deficien- mind, the Task Force developed a systems cies must be assessed and receive immediate view to help improve WME prevention, as- attention from national homeland security sessed the gap between the current frag- leadership. The Task Force explored the root mented WME prevention system and a more causes of such weaknesses in the current unified system, and offered specific recom- WME prevention system. Critical deficien- mendations to close the gap. cies in the current state of WME prevention include the following: • There is no systematic, risk-based ap- proach to a national investment strategy for WME and no unified set of policies, procedures, people, and technology. • Critical WME prevention capabilities and decision making about deploying those capabilities are dispersed within DHS and across the executive branch without a coherent strategy to leveraging them in prevention efforts. As a result, it is not clear who is in charge of decision making for developing, deploying, and managing a WME prevention strategy. • The WME threat is global in scale which requires that DHS engage foreign coun- tries and gain their cooperation. The De- partment and the Executive Branch are not appropriately organized and re- sourced to accomplish this task. • Today’s concepts of deterrence are too reminiscent of the Cold War era and must be updated. • The government is not investing with sufficient urgency and priority in techno- logical innovation that could lead to breakthrough advances in WME preven- tion. • The nation’s armed services, National Guard, and Reserve have served repeat tours fighting terrorism in Iraq and Af- ghanistan but American citizens have not been engaged at a level that allows Page 14 of 39
III. ADDRESSING THE CRITICAL DEFICIENCIES Conceptual Framework This report focuses primarily on the third To decrease the risk of a successful WME thrust, detecting and interdicting WME in penetration of U.S. borders, the WME pre- transit, while recognizing that the first two vention system should be designed to ad- are essential, interrelated and ultimately dress WME threats as close to the point of preferable elements of a prevention strategy, origin as possible. To achieve that objective, and that a systems view of the problem and the U.S. should implement a WME preven- an integrated effort across all three thrusts is tion strategy and system which has the fol- critical. lowing three thrusts: WME prevention is a complicated problem, • Neutralize known terrorists with many interrelated elements and many • Secure or eliminate sources of WME participating agencies, at all levels of gov- and/or critical components ernment and including foreign governments • Detect and interdict WME in transit and private sector entities. The challenge is to coordinate and integrate WME prevention _________________________________ policies, operations, systems development, research, and funding. The Task Force found Screening at foreign ports of origin (e.g., it useful to conceive of the problem of pre- through the Container Security Initia- venting WME entry into the United States as tive) is an example of extending defenses consisting of three dimensions: 1) how closer to the point of origin within a cor- WME materiel or people move across inter- ridor of entry. However, other defenses national borders toward a location in the can be extended to the more easily ma- United States—the geographical or spatial nipulated stages of the supply chain that dimension; 2) what can be done along the occur prior to arrival at the seaport, path from source to target—the functional such as during the phase when shipping dimension; and 3) how the functions are car- containers are packed and sealed. ried out and by whom—the operational di- _________________________________ mension. The first thrust, neutralizing terrorists, is For the spatial dimension, depicted in Figure primarily a responsibility of the military and 1, there are three stages of threat—origin the intelligence community. The second and movement within a foreign country and thrust, securing or eliminating sources of across international borders, international WME, is also a joint responsibility of sev- transit, and entry to the United States and eral government agencies, with the newly- movement to target. Movement can occur established NCPC in a coordinating role. through different combinations of three cor- Detecting and interdicting WME in transit is ridors of entry: land, sea, and air, as illus- similarly a joint effort of multiple entities. trated by the example path depicted in Fig- The Task Force believes that DHS should ure 1. have the lead responsibility to coordinate this aspect of the WME prevention system. Page 15 of 39
Figure 1. The spatial dimension of a WME defense system Therefore, the system must operate flexibly ciated with an attack will incur severe con- at all points across the different corridors of sequences. entry and modes of transport. At each transi- tion point—crossing borders and changing Detection transportation modes—there is a greater op- Identifying the presence of potential perpe- portunity to interrupt the movement of per- trators and/or materiel prior to an attack. sons or WME components. Denial Along the path from origin to target, the Preventing access to source materials, functional dimension includes the following: knowledge, expertise, a consequence-rich target environment, and/or potential recruits. Dissuasion The effort to de-legitimize violent extrem- Disruption ism, radicalization, and terrorist strategies Creating sufficient confusion or uncertainty and practices on a moral, cultural, and social on the part of perpetrators to reduce their basis. ability to succeed and increase their risk of detection and interdiction. Deterrence The ability to convince the enemy that an Interdiction attack will fail, that perpetrators will be cap- Capturing elements of the threat—people tured and prosecuted, and that nations asso- and/or materiel—before they reach their in- tended target. Page 16 of 39
Elimination explosives detectors, and magnetometers), Permanent eradication of the threat. as well as “active interrogation” techniques to help identify the presence of shielded nu- Success in some combination of these func- clear material. Such tools also complement tions contributes to the overall objective of biometric identification systems and data preventing WME from entering the U.S. mining systems. Finally, for each of the above functions, Strategies, policies, programs, and resource there is the operational dimension—how the allocation decisions should be evaluated above functions are carried out and by based on how they contribute to minimizing whom. This third dimension of WME pre- the risk of WME capability entering the vention should include combinations of the country. The remaining challenge is to insti- following elements: tute a mechanism for setting priorities, de- termining what capabilities will be imple- Institutional Elements mented, and then allocating resources tar- Institutions play a role in regulating the geted toward those ends. movement of people and materiel. These institutions include both governmental and Moving from a Framework to Solu- private sector entities. tions: A Risk Reduction Approach Reducing or minimizing the risk of a WME Tools entering the U.S. (risk reduction) should be Institutions have various tools at their dis- the central decision-making criterion for de- posal to undertake their respective responsi- signing, developing, deploying, and operat- bilities. These tools can be categorized as ing a WME prevention system. The Task follows: Force recognized however that while a sharp focus on risk reduction is essential, there are Transactional. Transactional tools are proc- other considerations that can and should en- esses that intersect with the human and the ter into decision-making. These include cost, materiel components of a WME threat. economic impacts, ancillary or secondary Processes associated with purchasing, ship- benefits (e.g., reduction of drug and other ping, travel, customs, immigration, and forms of smuggling), availability of technol- other activities are all potential transactional ogy, international relations, and contingency tools. for unpredictable threats such as natural dis- asters. Informational. Informational tools can be applied at the earliest stages of intelligence Risk reduction analyses should be structured collection and analysis of a threat, or to to address the fundamental choices available guide operations in real time. Watch lists to the country in confronting the WME pre- and command center situational displays are vention challenge. Each option, representing examples of informational tools. different combinations of policies, organiza- tions, technologies, or processes, should be Technological. Detecting people and mate- assessed in terms of its benefits in relation to riel of concern, for example, is dependent, in its costs. Ultimately, the benefit in terms of part on identity management systems and risk reduction is the most important measure sensors. These tools include non-invasive of value. detection systems (e.g., x-rays, radiation and Page 17 of 39
Decision makers can determine the value of net benefit for the nation rather than a nega- different options, make trade-offs, achieve tive attribute. balance in overall capability when they can see the overall WME prevention system in The resource allocation process should broader context rather than the pieces of it in minimize parochial and political influences isolation. With a broad systems view, fun- by incorporating a mechanism for placing damental questions can be asked and an- the national interest above parochial inter- swered, such as: ests. What is needed is a single, integrated WME prevention budget which captures all • What should be the relative balance of funds approved for that mission. Further, the investments for the three basic thrusts: creation of that budget should be a result of neutralizing terrorists, securing potential the risk-based analytical approach discussed WME sources, and detecting WME in above with a mechanism similar to that used transit? in base closure as a check and balance. • Are investments correctly balanced be- _________________________________ tween air, land and sea corridors as a function of threat and risk? Such a mechanism for independently re- • How should investments in alternative viewing resource allocation decisions detection technologies be balanced in re- might be similar to the selection process lation to the threat? in base closure. The Base Realignment • How much of the investment portfolio and Closure Commission (BRAC) rec- should go to longer range technology ommends which American military bases development versus shorter range im- should be closed after receiving input provements? from the Department of Defense and the • What combination of approaches should affected bases and communities. Be- be used for WME detection in non-U.S. cause closing military bases has proven controlled areas? to be politically difficult if not impossi- • What functions should be assigned to ble, the BRAC process assumes political specific government entities? liability while preserving legitimacy by • What interfaces must exist between dif- operating independently and submitting ferent entities with complementary func- recommendations through the President tions? to Congress for an up or down vote on the complete recommendation. This Although the scope of this study is limited, model applies to the politically difficult it is essential that a systems view be adopted challenge of risk-based investment, par- by decision makers that embraces all aspects ticularly when the investments are of the problem. needed to shore up weaknesses rather than reinforce strengths. A risk-based approach tends to be contro- _________________________________ versial since by definition some organiza- tions or programs will “score low” and re- A risk-based approach identifies strengths in ceive less funding than they would other- order to avoid reinforcing them at the expense wise receive under a different scheme (e.g., of known or emerging weaknesses. Investments per capita funding, or equal share distribu- informed by this approach seek to “buy down” tion). This is an expected outcome of a risk- risk by closing gaps in our defenses that terror- based approach and should be viewed as a ists would seek to exploit. Doing so requires Page 18 of 39
knowledge of the enemy—their motivations, geographical/spatial, functional, and opera- capabilities, doctrine, tradecraft, practices, tional—described above. movements, targets and identities—knowledge of our vulnerabilities, and an ability to manage In the above context a “layer” is a concep- consequences. This in turn places a premium on tual designation that nonetheless yields tan- focused intelligence—dynamic, all-source in- gible results. A layer adds value when: 1) a formation processed through an analysis struc- combination of prevention-related capabili- ture that produces focused, timely, predictive, ties are deployed together at some stage of and actionable products. A risk-based approach the progression of the threat from attack also values a strategy for reducing vulnerabili- planning to entry into the country, and 2) ties by hardening targets and diminishing con- that combination of capabilities acts as a sequences by increasing resilience. barrier reducing the risk of entry of a WME. _________________________________ Such an undertaking should be started immedi- ately. It is not new or novel to the U.S. as dis- In a nuclear power plant, for example, cussed below. the layers include geographical/spatial dimensions to include the facility secu- Layered Approach rity with perimeters and barriers; func- The nation has a long history of developing tional dimensions, including identity- and deploying unprecedented systems to ad- based access controls to protect the re- dress complex, variable and evolving actor, control room and other location; threats. These systems have been success- and operational dimensions such as the fully applied in both the civilian and military redundant engineering of reactor control sectors. Examples include the following: mechanisms and other safety systems, and the screening and training of opera- • Conventional warfare tors and maintenance staff. • Air defense _________________________________ • Strategic nuclear defense • Crisis management The challenge in WME defense is similar in • Nuclear power safety some respects. Rather than protecting a sin- • Controlling infectious diseases gle fixed asset from a known threat, WME • Preventing entry of foreign animal dis- defense protects multiple assets and popula- eases tions nationwide from multiple, changing • Drug interdiction threats. Layers help counter uncertainty over the exact nature of the risks (targets, weap- Given the nature of the WME threat, the ons, and modes of attack) and exactly how Task Force believes that “layering” our de- and when the protective system will be chal- fensive capabilities is an essential character- lenged. istic of the architecture and would provide _________________________________ the necessary redundancy, flexibility, and robustness so that failure of any one element Example: The passport control process of the system is not catastrophic, and the should be thought of as one layer. It is protective effect of individual elements is deployed at several points prior to the cumulative or multiplicative. In the case of border and seeks to interdict or disrupt WME prevention, a “layer” is any combina- unauthorized entry. The process incor- tion of the three dimensions— porates several of the above tools— Page 19 of 39
institutional (involving joint effort of vate sector, with differing cultures, tech- various national border control authori- nologies, missions, and processes. These ties), transactional, informational and entities must act together in a unified and technological (use of biometrics and coordinated fashion with an integrated gov- networked databases to match identities ernment budgeting and management process to watch lists). that supports such unity of effort. Finally, _________________________________ the value of a program management process is lost without a program manager; one with The question becomes what set of choices in the authority and influence to drive change the layered model provides the greatest risk across the WME prevention system. reduction at a reasonable cost. Many of the layered defense systems men- Management Process tioned above—air defense, strategic nuclear A structured risk analysis process, as out- defense, crisis management—were success- lined above, will define the fundamental ful to some degree because the complex policy direction and operational and techno- planning, development and implementation logical components that represent the opti- was guided by a system architecture process. mum blend of WME prevention mecha- Such architecturally-based management nisms. An integrated, system-wide WME models should be considered for WME pre- prevention management process must be vention, a challenge of comparable if not established as the basis for subsequent sys- greater scope and complexity. tem design and implementation decisions. These include decisions on budget priorities, tradeoffs between competing requirements, and integration of disparate capabilities. In- stituting a risk management and layered ap- proach in the absence of an overarching management process will only yield incre- mental improvements at best. An effective WME prevention system will not emerge from isolated, incremental efforts. Through an architecturally-driven system definition, design, and management process, decision makers can perform risk assess- ments and determine the value of different components of a system by seeing their functions, costs and interactions in broader context rather than in isolation. Gaps in ca- pability can be more readily identified along with alternative pathways for filling those gaps and reducing risk. WME prevention, as with homeland security generally, is a highly federated challenge bringing together multiple participants across agencies of gov- ernment, international bodies, and the pri- Page 20 of 39
IV. PATH FORWARD: DEVELOPING, DEPLOYING, AND MANAGING A LAYERED DEFENSE SYSTEM In its current state, WME prevention is criti- effort goes beyond coordinating individual cally flawed and must be improved. The agency plans to the joint execution of com- various elements of WME prevention do not monly held strategies. work together as an integrated system to achieve the strategic functions of WME de- Strengthen Leadership Structures fense. Resources are not systematically allo- Clarify lines of authority and control by hav- cated based on their contribution to risk re- ing the president designate the Secretary of duction and there is a lack of sufficient ur- Homeland Security as the lead individual gency and priority to technology innovation. responsible for preventing WME attacks in the United States and strengthen his/her ac- Improvement is urgently needed given the cess to the information and assets needed to catastrophic potential of a WME attack. carry out this function. The secretary should Considering the deficiencies in current immediately initiate a risk assessment and WME defenses and the features of a risk- system management effort and adopt a based and layered WME prevention system, model such as a Joint Program Office to co- the Task Force identified four areas for im- ordinate the program elements and control provement. the integrated WME prevention budget. Without becoming overly involved in the • Authority, alignment, and incentives operational dimensions of homeland security • Deterrence policy, a strong HSC is important for coor- • Risk and system management dinating policy, helping to implement re- • Innovation source allocation decisions, and getting agencies to work together. The president The Task Force developed recommendations should give the HSC Director the authority to move toward the goal of a risk-based, and influence to build the HSC into a coun- layered defense system for preventing entry terpart and complement to the NSC as it was of WME into the country. The majority of envisioned in the Homeland Security Act of recommendations can be acted upon within 2002. If the HSC is not strengthened as rec- the secretary’s purview; others require Con- ommended it should be merged with the gressional and/or presidential action. Spe- NSC. cific supporting implementation actions are summarized below and presented with addi- Engage Internationally tional detail in Appendix A. Better engage foreign governments and mul- tilateral organizations to develop a common Authority, Alignment, and understanding of the WME threat, to share best practices for preventing WME attacks, Incentives and to develop the strategic cooperation A layered defense system depends on the necessary to deploy and manage a mutually joint effort of multiple participants domesti- reinforcing layered defense. U.S. homeland cally and internationally, spanning all levels security objectives increasingly require the of government and working across lines be- cooperation of foreign governments, espe- tween the public and private sectors. This cially in pursuit of a layered approach to Page 21 of 39
You can also read