773 <6
~c:. a/}/1 ,~cfl
___ ------.......;t'
Law Enforcement Sensitive
Participants - Commission:
Depty. Exec. Dir. 202-331-4063
Chris Kojm
Leader, Team 5 202-401-1726
M. Elizabeth Swope
Counsel, Team 5 202-401-1747
Susan Ginsburg
Counsel, Team 5 202-401-1705
Janice Kephart-Roberts
Team 3 202-331-4079
Scott Allan
Documents/handouts received by the Commission:
S/CT Organization Plan
Designating Foreign Terrorist Organizations Under U.S. Law
S/CT Mission
State Department Basic Authorities Act of 1956
TEXT:
The State Department is the most important government agency in the "war on
terrorism," because it is American diplomacy that enables other agencies - security,
military-to go forward effectively. The two most important functions of S/CT are
leadership and representation, especially regional geographic representation,
development of contacts. There are those who help us and those who don't. S/CT's
mission is to build the will and capacity to counter terrorism. Aspiration is for S/CT
officers to be knowledgeable in CT policies, integrate world counterrorism structure that
makes sense, need to re-prioritize use of time and resources.
• Post 9/11 meeting in the sit room on borders.
Observation made that we have "no defended border" between US and Canada, so
escalated relations with the Canadians on border topics.
•
Document fraud. Not involved in technical aspects - CA and DS.
Watchlist. Live discussions on future of the watchlist process. Today's NSC deputies
meeting attended by CA AlS Maura Harty backed up by S/CT person. S/CT participates
(?) in Senior Steering Group at TIlC, with INR, DS, CA. Foresees integration of
watchlist at TIIC. Congress said there is not enough commonality, and broadest possible
access is key. DHS is really only a customer, so should not run the system. DHS focus is
assessing US vulnerabilities, Hoover Dam. Master database does not present a problem
•
for TIPOFF .
Designations of foreign terrorists by State and Treasury post 9/11 carried out pursuant
to Exec Order 13224. 250 individuals and groups.
Prior to 9/11, pursuant to Foreign Terrorist Organization process, 36 foreign terrorist
organizations. Emphasized importance of balancing designation with other interests,
such as intelligence activity. Object is not to designate, but to use as one tool to "get
terrorists. "
Border screening. "Unwise to initiate policies that are fishing expeditions, to see what
we come up with." Policy is open doors, secure borders. Idea is to protect but not hassle.
•
"Criteria of who to stop still emerging." Must identify measurables of who we want to
stop. By country? Geneder? 3rd country passports because that's what US interested in .
Country policy coordination and guidelines is from NSC, with broad brush stroke.
Policy Coordinating Committee and CSG.
Terrorist flr:::Je .. Biggest growth area for S/CT. Training to financial units and
lawmakers. Important thing is "taking money away from the right people."
, .
•
70
,
Appropriations for Fiscal Year 1999 (Public
. 91
91
t;~t ..~r·st;~ ..Ad";;;i~~t;~ti~~·~r·F~;~~
..M:
d·~~~~~·~~g;.~~··~~~~:~~:::~:~:::::~:~~::~~~~~~~~~~~~~~::~:
91
91
(Publie Law 96-449) .. 93
1. State Department Basic Authorities Act of 1956
Public Law 84-885 [So 2569], 70 Stat. 890, approved August 1, 1956, as
amended
* * * * * * *
(£)1 COORDINATOR FOR COUNTERTERRORISM.-
(1) IN GENERAL.-There is within the office of the Secretary of
State a Coordinator. for Counterterrorism (in this paragraph re-
ferred to as the 'Coordinator') who. shall be appointed by the Presi-
dent, by and with the advice and consent of the Senate .
. . (2) DUTIES.-
(A) IN GENERAL-The Coordinator shall perform. such duties
and exercise such powers as the Secretary of State shall pre-
scribe.
(B) DurIES DESCRIBED.-The principal duty of the Coordina-
tor shall be the overall supervision (including policy oversight
of resources) of international counterterrorism activities. The
Coordinator shall be the principal adviser to the Secretary of
State on international countertelTOrism. matters. The Coordina-
tor shall be the principal counterterrorism official within the
senior management of the Department of State and shall re-
port directly to the Secretary of State.
(3) RANK AND STATUS .OF AMBASSAOOR.-The Coordinator shall
have the rank and status of Ambassador at Large." ..
* * * * * * *
SEC. 36.· DEPARTMENI' OF STA1E REWARDS PROGRAM.
(a) ESTABLISHMENT.-
(1) IN GENERAL-There is established a program for the pay-
ment of rewards to carry out the purposes of this section.
I See. <0 was added by See. 2801(a) of Public Law 105-277 (112 Stat. 2681-824)
222 U.s.C. 2708. Sec 36 WIL8 added by sec. 102 of Public Law 9S-533 (98 Stat. 27OB). It was
~ .. : eubsequently ameDded by Public Law 100-690 (102 Stat. (287); by Public Law 103-236 (lOB
Stat. 619); by Public Law 104-134 (110 Stat. 1321-45); In 1998, sec. 36 was ameDded both by
lee. 2202 of Public Law 105-277 (112 Stat. 2681-805) and subsequently by sec. 101 of Public
Law 105-323 (112 Stat. 3029).
(71)
.oJ ned person " means a person that makes
in section 1604(a).
A
* * * * * *
TITLE V-INTERNATIONAL TERRORISM AND FOREIGN
AIRPORT SECURITY 1
PART A-INTERNATIONAL TERRORISM GENERALLY
SEC. 501.· • •
SEC. 502. COORDINATION OF ALL UNITED STATES TERRORISM-RELAT-
ED ASSISTANCE TO FOREIGN COUN'1RIES.
(a) COORDINATION.~The Secretary 'of State shall be responsible
for coordinating all assistance related to international terrorism
which is provided by the United States Government
(b) REpORTS.-Not later than February 1 each year, the Sec-
retary of State, in -consultation with appropriate United States
Government agencies, shall report to the appropriate committees of
the Congress on the assistance related to international terrorism
which was provided by .the United States Government during the
preceding fiscal year. Such reports may be provided on a classified
basis to the extent necessary, and shall specify the amount and na-
ture of the assistance provided.
(c) RULE OF CONSTRUCTlON.-Nothing contained in this section
shall be construed to limit or impair the authority or responsibility
of any other Federal agency with respect to law enforcement, do-
mestic security operations, or intelligence activities as defined in
Executive Order 12333.2
eign AsaistaDCe Act ot 1961, other than- lSee Section F for the text ot legislation on foreign airport security.
Jt&Dce or meclicine; and 2For text, see U.s. Congreas. House. Committee OD Intemational Relations. LegisUJtioll Oil
r 11 of part I (as enacted by the Freedom tor Russia and Fo~i81l Relationa Th.,!,Ugh 1996, (Washington, G.P.O., 1997). vol. II, sec. D.
J and Open Markets Support Act ot 1992);". (35)
, ~uthorization Act, Fiscal Years 1992 6. Foreign Relations Authorization Act, Fiscal Years 1988
and 1993 ~ .. and 1989
cLaw 102-188 [H.R. 14 5 tat. partial text of Public Law 100-204 [H.R. 1777], 101 Stat. 1331, approved
October 28 , 1991 ,amen d·· y 647, approved
December 22, 1987, as amended
!appropriations for fucal years 1992 and 1993 f th AN ACf To authorize ap'pro'priations for fiscal years 1988 and 1989 for the Depart-
:ment of State, and for other purposes. or e ment of State, the United States Information Agency, the Voice of America, the
Board for International Broadcasting, and for other purposes.
~ Se!Wcteand House of Representatives of the
rica tri ongress assembled , Be it enacted by the Senate and House of Representatives of the
!LE. United States of America in Congress assembled,
SECl'ION 1.1 SHORT TITLE AND TABLE OF CONTENTS.
~~a:9~;. "Foreign Relations Authorization
(a) SHORT TITLE.-This Act may be cited as the "Foreign Rela-
tions Authorization Act, Fiscal Years 1988 and 1989".
* * * * * * * * * * * *
SCELLANEOUS FOREIGN POLICY
PROVISIONS TITLE I-THE DEPARTMENT OF STATE
>REIGN POLICY PROVISIONS PART B-DEPARTMENT OF STATE AUTHORITIES AND ACTIVITIES
* * * * * * * * * * * *
SEC. 140.1 ANNUAL COUNTRY REPORTS ON TERRORISM.
mRORIST ASSETS IN THE UNl'IED STA1ES
(a) REQUIREMENT OF .ANNuAL COUNTRY REPORTS
therJft.er~
GRESS -~ 90 da . ON TERROR-
md e~e1Y 365 days the date of ISM.-The Secretary of State shall transmit to the Speaker of the
sulta~on with the Attorney Gene':Je:::dtary
~eDC1es,2 shall submit to the Committee ap-
House of Representatives and the Committee on Foreign Relations
of the Senate, by April 303 of each year, a full and complete report
~e Co~ttee on Finance of the Senate ~ providing-
. (1) detailed assessments with respect to each foreign coun-
~ Affairs 3 and the Committee on Wa
~ or Repre~ntatives a report describing di: try-
(A) in which acts of international terrorism occurred
~~ts.held In the United States by terro~ which were, in the opinion of the Secretary, of major sig-
tiC?nengaged In mternational te .
ie a detailed list and descri~~~f nificance;
(B) about which the Congress was notified during the
· 1.
·puryoses of this section- preceding five years pursuant to section 6(j) of the Export
~r:!~
:i~ ~ corunstries", refers to countries des-
tate under section 4O(d) of the
Administration Act of 1979; and
(C) which the Secretary determines should be the sub-
ject of such report; 4
~tional terrorism" has the m . . (2) all relevant information about the activities during the
~14O(d) of the Foreign Relatio:A~~ryen preceding year of.anyterrorist group, and any umbrella group
'S 1988 and 1989. nza- under which such terrorist group falls, known to be responsible
for the kidnapping or death of an American citizen during the
I RelaUons Autborizat·
;}, &truck out "TreasuJn.ndc~e=
ey General and ap
A
. te·
F'
'.
~&: Ithe994and 1995
reof "Treas-
122 us,o. 2651 note.
222 u.s.c. 2656f.
4 (109 Stat. prop.na investigatIve llgeDciea,". 8Sec. 122 of the Foreign Relations Authorization Act, Fiscal Years 1990 and 1991 (Public Law
lep . 186) pro\'lded that retereDOes to the Committee 101-246; 104 Stat. 27), struck out "March 81" and inserted in lieu thereof -April 30".
· H re&eDtofatiRepvea
shaD be treated as reterriDg to the Co ·t 4 Sec. 578(1) of the Foreign Operations, Export Financing, and Related Programs Appropria-
aente='
ouse reaentativea IIUD.I - tions Act. 1997 (sec. 101(c) of titie I of the Omnibus Consolidated Appropriations Act. 1997; Pub-
Relations Autbo· t· A· lic Law 104-208; 110 Stat. 3009), struck out "'and" at the end of para. (1), struck out a period
· added this JOD ct, Fiscal Y.... 1994 and 1995 at the end of para. (2) ~d inserted instead a semicolon, and added new paras. (8) and (4).
(86) (87)
88
preceding five years, any terrorist group known to be fins
by countries about which Congress was notified during the
ceding year pursuant to section 6(j) of the Export Admini
tion Act of 1979, and any other known international ten
group which the Secretary determines should be the subjE
such report; 4
(3) 4 with respect to each foreign country from whicl:
United States Government has sought cooperation durire
previous five years in the investigation or prosecution of a
of international terrorism against United States citizens (
terests, information on-
(A) the extent to which the government of the fo
country is cooperating with the United States Govern
in apprehending, convicting, and punishing the indiv
or individuals responsible for the act; and
(B) the extent to which the government of the fo
country is cooperating in preventing further acts of tE
ism against United States citizens in the foreign cou
and .
(4)4 with respect to each foreign country from whicl
United States Government has sought cooperation durin;
previous five years in the prevention of an act of interna1
terrorism against such citizens or interests, the informatic
scribed in paragraph (3XB).
(b) PROVISIONS To BE INCLUDED IN REPORT.-The repor
QUired under subsection (a) should to the extent feasible in
(but not be limited to)- .
(1) with respect to subsection (aXl}-
(A) a review of major counterterrorism efforts u
taken by countries whiCh are the subject of such repoi
eluding, as appropriate, steps taken in International
(B) the response of the judicial system of each 00
which is the subject of such report with respect to mr
relating to terrorism affecting American citizens or ~
ties, or which have, in the opinion of the Secretary, :
nificant impact on United States counterterrorism ei
including responses to extradition requests; and
(C) ~cant sup~rt, if any, for international t
ism by each country which is the subject of such repoi
eluding (but not limited to}-
(i) p<?litical and financial support;
(ii) diplomatic support through diplomatic re<
tion and use of the diplomatic pouch;
(ill) providing sanctuary to terrorists or ter
grou(.IV)psthand
;e POSItiOns
.. (i1ncluding
U
...; reco rd s ) on
voung ntY'
• Coordinator
for Counterterrorism
Amb. Cofer Black
Personal Assistant
Libby Braun
Principal Deputy
Coordinator
William Pope
Personal Assistant
Sandy Phelps
Staff Assistant
Special Assistant Kathleen H.-Floyd
James Neel
Homeland
Security Unit
•
• Mitch Optican
• Rob Dolce
1
Liaison Officers
II
.Administration Operations
Regional Program~ (Amb. J. Dinger)
Legislation, PD R.Gain
Multilateral
Designations K. Wycoff
K. Aguilar 9/11 Agency Internal Matters
Budget Assistant
I-
Planner S.Bell
Budget Conferences
Implementer
• 08/11/2003
1
SICT Organi1Ation Plan
Deputy Coordinator
Regional and Multilateral
.Affairs and Designations
Karen Aguilar
OMS OMS
M. Jablonsky Pat Chambers
Office Director
Brent Hartley
Multilateral I G-8
• Chris Ensley
• Sally Schlegel
~------------------ -------------------~ II
,------------i------------- Designations
I
Regionals I I
I I
• S. Fox • T. Navratil
I I ~ ~
I I
WHA I I
EAP I I
-Tom Cooney I I
•Erik Rye -Everett Kaplan I I
-Paul Fujimura FTO
-Karen Chandler
•Adam Frankel I
I
I
I
I
Exec Order
- Ms. Sarraf
I-- - • M.Jacks
I
I I
I I
I I
I I I
SA I I
I I FTO
EUR - Mark Wildermuth I I I
- (Marc Norman) • Ruth Parent I I -GS I-- ~ - T. Bacon-
I I Gonzalez I
- (John Sullivan) • Stephanie Molnar I I to be advertised I
I I I
I I I
I I I
I I I
I I I
NEA I FTO I
AF
I ~ I
• Mark Shaheen I I • Rob Goodson I
-Lee MacTaggart I I
- Miller GS Position I I
-FS to be Advertised ,I I
-Katy Gore . I I I
I I
I
I
L --------~
----------------------------------------
2
08/11/2003
SICT Organization Plan
Associate Coordinator
Programs, Legislation and
Public Diplomacy
Karl Wycoff
OMS OMS
Receptionist
J. Redfern
Vacant
Office Director
(and R&DrrSWG)
Mike Jakub
r---------- -----------
Legislative Capacity Building
- Mike Kraft
Wisniewski
Senior Policy
WorkShops
-G. Stinson
-H. Medeiros
----------------------
3
08/11/2003
S/CT Operations
Navy Hill Annex
• OMS
Associate Coordinator
Operations
(Amb. John Dinger)
Deborah Watson
'--------11 R. ~:~~.... 1
__________________
~ ~__-~--~---~---~---~-,~~~~~--~---~---~--~---~---~-_J,
Director of Director Crisis ,:
Plans/Policy Res onse :
,,
I
•
9/11 Agency Internal Matters
Reserve Augmentation
Part-Time and Full-Time
DODReservists
Commo
Support FEST
-Mike Cifarelli Sensitive Support
-Tom McCue i i
9/11 Agency Internal Matters
•Doug Rhodes I I
(IRM)
r
,
I
~--------------------------------------
I '
-------------------------------------
• 4
08/11/2003
9/11 Agency Internal Matters
•
DESIGNATING FOREIGN TERRORIST ORGANIZATIONS UNDER
U.S. LAW
(I) The highjacking or sabotage of any conveyance (including an aircraft, vessel, or vehicle).
(II) The seizing or detaining, and threatening to kill, injure, or continue to detain, another individual in order to
compel a third person (including a governmental organization) to do or abstain from doing any act as an explicit or
implicit condition for the release of the individual seized or detained. .
(III) A violent attack upon an internationally protected person (as defined in section 1116(b)(4) of title 18, United
States Code) or upon the liberty of such a person.
(IV) An assassination.
(b) explosive or firearm (other than for mere personal monetary gain), with intent to endanger, directly or indirectly,
the safety of one or more individuals or to cause substantial damage to property.
(iii) The term "engage in terrorist activity" means to commit, in an individual capacity or as a member of an
organization, an act of terrorist activity or an act which the actor knows, or reasonably should know, affords material
support to any individual, organization, or government in conducting a terrorist activity at any time, including any of
the following acts:
(III) The providing of any type of material support, including a safe house, transportation, communications, funds,
false documentation or identification, weapons, explosives, or training, to any individual the actor knows or has
reason to believe has committed or plans to commit a terrorist activity.
(IV) The soliciting of funds or other things of value for terrorist activity or for any terrorist organization.
(V) The solicitation of any individual for membership in a terrorist organization, terrorist government, or to engage in
a terrorist activity. .
TO: Office of Del. Hutchins
ATTN: Erin
Joanne Accolla
-----Original Message-----
From: Wisniewski, Mark E [mailto:WisniewskiME@STATE.GOV]
Sent: Wednesday, September 10, 2003 3:34 PM
To: 'meswope@9-11commission.gov'
Subject: Terrorist Interdiction Program documents
Ms Swope: I was asked to forward to you copies of electronic documents we have that best
describe the background, purpose and operation of S/CT's Terrorist Interdiction Program.
I understand that you requested this information in the course of your recent meeting with
Ambassador Black. Attached are five products that meet those criteria. I have a couple
more that, although unclassified, have been stored on classified media and hence I must go
through the process with our IT folks to have them properly transferred to unclass media
before I can forward them. I anticipate no more than a one day delay. Three of the four
documents attached represent material the department put together for the annual budget
requests in the 2002 and 2003 timeframes.
rk Wisniewski
CT TIP Program Coordinator
7-6475
«May 03 TIP Commitee Program Review.ppt» «FY 05 Budget Justification.doc» «program
description. doc» «10 03 02 TIP OMB CPD FY04.doc» «02 19 02 PISCES Intro Paper.doc»
1
Terrorist Interdiction Program Description
The effort to deter terrorism, and particularly prevent terrorist attacks on American soil, requires
working with our global friends and allies to establish means to prevent the unrestricted movement
of persons involved in terrorist activities. The Terrorist Interdiction Program (TIP) significantly
contributes to this cause by serving to bolster the border security of countries at a high-risk of
terrorist transit. Terrorists take advantage of nations with little or no effective capability to
identify or track their passage, or otherwise restrict their freedom of movement. TIP is designed to
counter this threat by serving as a foundation for increased counterterrorism cooperation and
providing the means for participating nations to disrupt terrorist activities.
TIP provides selected countries with a computerized system that allows border control officials to
quickly identify suspect persons attempting to enter or leave the country through air, land and sea
ports of entry. TIP also provides selected countries with the means to collect, compare and
analyze traveler information and contribute to the global effort to understand terrorist methods and
track their movements. By assisting countries to better control their borders TIP enhances the
security of Americans both at home and abroad.
TIP is a joint program that installs and maintains the Personal Identification Secure Comparison
and Evaluation System (PISCES) at selected points of entry in a participating country. PISCES
provides a high-speed secure connection from the participating country's central data base of
suspect persons to air, land and sea points of entry where the system is installed. PISCES enables
border officials to quickly input traveler infonnation contained in passports or other official
documents to the database and obtain nearly instantaneous feedback on the traveler's status with
respect to the government's listing of terror suspects. In addition to installing PISCES equipment
at points of entry, and government headquarters facilities of the nation's choosing, TIP provides
comprehensive training in PISCES operation and maintenance, as well as assistance with
optimizing its employment in the country's border control and immigration program.
There are presently 60 countries identified through a USG interagency process as potential
recipients of TIP. These countries were selected based on known terrorist activity or terrorist
transit, a need for the capability that PISCES provides, and the political will to participate with the
United States in this program. While the initial installation of PISCES may only be at the
participating nation's international airport(s), it is a goal of TIP to install the system at all
significant air, land and sea points of entry.
Intelligence collected
Deterrent Value
· ...'Se" .•.'es ....i' i~~'~~"<)' ' ..0 g~i:l·<..i.'<····,··c:.,::
.......•............... n-.
,...
'::<'::."":,, .....
:...
Serves as af~~alpoint for CT Engagement~ith host nation
officials at a new level, with new officials
Intelligence collection - from the moment of engagement
through installation and support phases
Provides continuing, increased access to Host Nation
officials
Terrorist Interdiction Program Description
The effort to deter terrorism, and particularly prevent terrorist attacks on American soil, requires :
working with our global friends and allies to establish means to prevent the unrestricted movement
of persons involved in terrorist activities. The Terrorist Interdiction Program (TIP) significantly
contributes to this cause by serving to bolster the border security of countries at a high-risk of
terrorist transit. Terrorists take advantage of nations with little or no effective capability to
identify or track their passage, or otherwise restrict their freedom of movement. TIP is designed to
counter this threat by serving as a foundation for increased counterterrorism cooperation and
providing the means for participating nations to disrupt terrorist activities.
TIP provides selected countries with a computerized system that allows border control officials to
quickly identify suspect persons attempting to enter or leave the country through air, land and sea
ports of entry. TIP also provides selected countries with the means to collect, compare and
analyze traveler information and contribute to the global effort to understand terrorist methods and
track their movements. By assisting countries to better control their borders TIP enhances the
security of Americans both at home and abroad.
TIP is a joint program that installs and maintains the Personal Identification Secure Comparison
and Evaluation System (PISCES) at selected points of entry in a participating country. PISCES
provides a high-speed secure connection from the participating country's central data base of
suspect persons to air, land and sea points of entry where the system is installed. PISCES enables
border officials to quickly input traveler information contained in passports or other official
documents to the database and obtain nearly instantaneous feedback on the traveler's status with
respect to the government's listing of terror suspects. In addition to installing PISCES equipment
at points of entry, and government headquarters facilities of the nation's choosing, TIP provides
comprehensive training in PISCES operation and maintenance, as well as assistance with
optimizing its employment in the country's border control and immigration program.
There are presently 60 countries identified through a USG interagency process as potential
recipients of TIP. These countries were selected based on known terrorist activity or terrorist
transit, a need for the capability that PISCES provides, and the political will to participate with the
United States in this program. While the initial installation of PISCES may only be at the
participating nation's international airport(s), it is a goal of TIP to install the system at all
significant air, land and sea points of entry.
Background
The Terrorist Interdiction Program (TIP) is the Coordinator for Counterterrorism's
(S/CT) response to the increasing ability of terrorists to cross international boundaries to
stage terrorist attacks and escape undetected. TIP limits terrorists' capabilities to move
freely amongst countries by assisting host countries in securing their borders. The
program has three parts:
PISCES is a database that provides border control officials with information that
allows them to identify and detain or track individuals of interest. The system provides a
high-speed, secure connection from a country's centralized data bank of suspects, located
in the country's intelligence bureau, to points of entry where PISCES is installed. This
allows border control officials to check passports quickly and accurately for the purpose
of identifying terrorist suspects. Officials can also use PISCES to quickly retrieve
information on persons who may be trying to hastily depart the country after a terrorist
incident. Furthermore, TIP will train these border control officials to use PISCES to
collect, compare and analyze data that can be utilized to arrest and investigate suspects.
S/CT selects countries to participate based on the countries' volume of travel and
use as a transit point, available intelligence information, and political will to cooperate.
S/CT plans to add five countries per year over the next six years. This will require a
significant increase in funding given the need to increase the number of installations per
country (approximately $800k per "node"). Addressing multiple transit points within a
country is essential to ensure TIP's maximum effectiveness, especially in countries at
higher risk for transit of suspected individuals. Additionally, the program's success
requires appropriate funding for the sustainment, system development and regional
program management for the long-term. .
Since September 11 and the addition of the Frontline States, we now have
identified 57 countries as potential recipients of TIP. Our initial baseline goal was to
install TIP in one to two airports in up to five countries annually -- a schedule that would
take at least 12 years to complete at the current annual funding level. Supplemental is
thus needed to ramp up installation of PISCES in multiple points of entry in a range of
new countries as well as augment the number of nodes for some countries already in the
TIP program.
Use of Funding
FY 2000
The Secretary allocated $1.25 million in FY 2000 for the TIP. S/CT, in
conjunction with the interagency counterterrorism community, selected Pakistan for the
TIP pilot project. Approximately $1 million was used to develop the PISCES software
for Pakistan. The remaining $250,000 was provided to INTERPOL to upgrade the
INTERPOL NCB in Islamabad, Pakistan.
FY 2001
The Secretary allocated $4 million in FY 2001 for the TIP. The Department will
use approximately $1.5 million to install PISCES in the Karachi, Pakistan International
Airport with associated links to key government ministries and agencies. More
specifically, the funding will be used to install the infrastructure necessary to support
PISCES and establish connectivity between arrival and departure lounges in the Karachi
International Airport, the Federal Investigative Agency (FIA) in Karachi and Islamabad,
the Intelligence Bureau (IB) in Karachi and Islamabad, the National Database and
Registration Authority (NADRA) in Islamabad, and the Islamabad International Airport.
This funding will also purchase the hardware and software necessary for installation and
train border control officials to use PISCES.
The Department will use the remaining $2.5 million for programs in the United
Arab Emirates (UAB), Yemen, Kenya, and South Africa. Approximately $2,355,000 will
be used for site assessments, contractor support, the purchase of hardware and software,
training for border control officials, and the installation of PISCES in the U AE, Yemen,
and Kenya (approximately $785,000 for each country). The Department also plans to use
up to $145,000 for site assessments and contractor support in South Africa.
FY 2002
The President's budget requested $4 million in FY 2002 for the TIP. Of this,
approximately $640,000 will be used to complete installation of PISCES in South Africa
and train border control officials to use PISCES. The remaining funding will be used to
conduct site assessments, install the TIP, and train host country border control officials in
the next priority countries. Prior to the terrorist attacks on 11 September 2001, we
planned to install TIP in Nigeria, the Philippines, Thailand, Bosnia, and Turkey. As a
result of those attacks, the order of priority countries is shifting. FY 2002 program funds
will be targeted towards countries identified as priorities based on more recent
assessments of intelligence, strategic importance to the global counterterrorism campaign,
and political will.
Supplemental funds will enable the Department to provide TlP to countries that
have moved up on the priority list. Greece, for example, is a higher priority country due
to the 2004 Olympics and its requirement for a strong border security system. Funds will
also be needed to meet unforeseen requirements, such as a program in Indonesia, which
the President offered to President Megawati Sukarnoputri in September 2001.
Afghanistan $2.5M
Pakistan $3.25M
India $3.25M
Yemen $1.5M
Mexico $2.5M
Greece $1.5M
Kenya $1.5M
Indonesia $1.5M
philippines $1.5M
S. Africa $1.5M
Tanzania $1.5M
Jordan $1.5M
UAB $.5M
Malaysia $1.5M
Singa~ore ~l.5M
Total $27M
We believe investment in TIP provides a significant diplomatic engagement tool
as well as a tactical intelligence measure that will help tighten the noose at key terrorist
transit points world-wide. By assisting countries in securing their borders, TIP enhances
the security of Americans who live and travel abroad. The program acts as both an entre'
for USG diplomatic engagement with an host nation and acts as a clear indicator of its
willingness to support the global campaign against terrorism.
PISCES
Personal Identification Secure Comparison and
Evaluation System
_~ ••• _ •.. ~_ .. _. ._ •.•• ',_.0" ._~ •• __ ._.,_ -_,' • ---- •..•.• -- •• - •.. -.-- •... -.-.- - ••. - ••• ---.--.- •.• ---------.------ .• - ••••• --- ••• -------.------------ .•• - ... ----.----
•
9/11 Agency Internal Matters
•
•
•
backup software and Microsoft Office suite, inc1uding the Word,.PowerPoint, Excel and
Access programs .
• PISCES uses the Dell 6400 or 4400 servers and Dell 4100 clients. The operating system
is Windows 2000 and the database management system is Oracle. A web browser
interface allows quick access to foreign languages without changing the application code.
It features the JAVA control programming language and compliance with the Open
Database Connectivity Query Standard. The browser controls and supports rapid
response for database functions, peripheral devices, and system administration. The
system also features numerous peripherals to boost its effectives (see box below). All of
these peripherals are modular and insulated from the application software by easily
altered interface routines. That means if a new peripheral is needed, a different brand is
purchased Of a new and improved version is released, the impact of such a change or
upgrade is virtually unnoticed by the user.
Planning for and Installing PISCES
•
team will prepare a list of any additional actions that are necessary to complete the
installation of the system. This is called the After Action Report.
• Step 2: Planning, Ordering and Delivery
Based on the After Action Report the PISCES team will prepare a project plan, system
design, equipment inventories and installation and training plans. They will order all of
the necessary equipment and will configure it for installation, loading the COTS and
PISCES software. The team tests each PISCES system before it is installed to ensure that
it is operating as required. Following the successful completion of this simulation, the
computers will be packed for shipping.
Future enhancements
9/11 Agency Internal Matters
•
As technology becomes more sophisticated, so too do the
practices of criminals and terrorist networks in their quest to
evade detection. PISCES strives to stay one step ahead and
has planned several critical upgrades for future versions of
the system. Biometrics, for example, is a rapidly advancing
and exciting new technology that will further enhance the
effectiveness of the PISCES system. Below is a list of some
of what's to come:
•
Global Programs
• Account ""
TERRORIST INTERDICTION
($ in thousands)
PROGRAM
~ADR'
As Sept. 11 made painfully clear, the United States has a major interest in
preventing terrorists from crossing international borders to attack innocent civilian
populations or to disrupt the internal stability of friendly countries. The Terrorist
Interdiction Program (TIP) is designed to help prevent or disrupt thetravel of terrorists
across international borders into high-risk countries that have little or no means of
quickly identifying such persons. TIP complements existing anti-terrorism training
programs by providing border control systems, incorporating computerized database
programs and rapidly transmitting information to interdict potential terrorists and their
weapons trying to cross international borders. In doing so, TIP bolsters the security of
Americans at home and abroad.
•
Specifically, the TIP program helps recipient nations improve border security by
providing computer hardware, database software, peripheral devices-· such as passport
scanners and finzernrint readers-training, and operational support that enables officials
Since the beginning of the war on terrorism, the President and other top
Administration and Congressional officials have emphasized the global nature of the
terrorist threat and the need for a cooperative global attack to defeat it. This war extends
•
Global Programs
beyond the battlefield in Afghanistan to every country where terrorist cells currently
operate or have the potential to operate because of weak internal defenses.
Because the tactics of terrorist movements today are highly unconventional, the
United States cannot win this war by conventional military means alone. The efforts of
Our armed forces must be complemented by effective, robust capacity-building programs
overseas, which are aimed at bolstering the capabilities of U.S. allies to fight and mitigate
terrorist activities. TIP does this by providing the necessary training, equipment, and
technologies to host nation security and immigration officials. These are the forces that
will be fighting international terrorism on a daily basis, protecting U.S. assets and
interests overseas and preventing terrorists from ever reaching American soil in the first
place.
TIP is also a significant diplomatic engagement tool. The program acts as both an
entre for USG diplomatic engagement with a host nation and acts as a clear indicator of
its willingness to support the global campaign against terrorism.
•
establishing a multiple-layered barrier program comprised of three elements: border
monitoring, using lookout systems and passport scrutiny; updated intelligence and
security databases and communications systems; and development of appropriate
equipment to detect weapons. The program focuses on vulnerable countries that are key
transportation hubs, havens or otherwise important international crossroads identi tied by
intelligence analysis and interagency assessment teams. As demonstrated by the attacks
of Sept. 11, the Cole attack, the Embassy bombings in East Africa in 1998, and other
similar and deadly attacks, intercepting terrorists before they can move into position is
key to preventing terrorist activities and saving lives.
Installing TIP in multiple points of entry within a single country increases its
effectiveness in identifying terrorists as they transit that country's borders. Moreover,
•
building a network of TIP countries exponentially increases the program's effectiveness
by tightening the noose around free movement of terrorist suspects between countries .
But it also increases the cost of the program.
9/11 Agency Internal Matters
Global Programs
• Budgetary Requirements:
.../9/11 Agency Internal Matters
As the President has said repeatedly, the fight against terrorism requires sustained
efforts over time by the U.S/and its allies. Thus, the ramp-up of TIP in FY 2002 with
supplemental funding should not be considered a one-time event. The TIP program
needs to be sustained at ahigher than historical level to ensure that the increased number
of countrie4 Fe provided the system at a faster rate than initially envisioned
and one which corresponds to the heightened security threats to the United States and to I
•
Global Programs
., .
.
,-
'