Chapter V. Strategy for Winning the War on Terror
Section Short-term - Deny terrorists control of any nation to be used as a base for terror.
Strategy for Winning the War on Terror
Over the short term: Four priorities of action
The advance of freedom, opportunity, and human dignity through democracy is the long-term solution to the transnational terror movement of today. To create the space and time for this
long-term solution to take root, we are operating along four priorities of action in the short term.
4. Deny terrorists control of any nation they would use as a base and launching pad for terror. Our terrorist enemies are striving to claim a strategic country as a haven for terror. From this base, they could destabilize the Middle East and strike America and other free nations with ever-increasing violence. This we can never allow. Our enemies had established a sanctuary in Afghanistan prior to Operation Enduring Freedom, and today terrorists see Iraq as the central front of their fight against the United States. This is why success in helping the Afghan and Iraqi peoples forge effective democracies is vital. We will continue to prevent terrorists from exploiting ungoverned or under-governed areas as safehavens – secure spaces that allow our enemies to plan, organize, train, and prepare for operations. Ultimately, we will eliminate these havens altogether.
Ÿ Eliminate physical safehavens. Physical sanctuaries can stretch across an entire sovereign state, be limited to specific ungoverned or ill-governed areas in an otherwise functioning state, or cross national borders. In some cases the government wants to exercise greater effective sovereignty over its lands and maintain control within its borders but lacks the necessary capacity. We will strengthen the capacity of such War on Terror partners to reclaim full control of their territory through effective police, border, and other security forces as well as functioning systems of justice. To further counter terrorist exploitation of under-governed lands, we will promote effective economic development to help ensure long-term stability and prosperity. In failing states or states emerging from conflict, the risks are significant. Spoilers can take advantage of instability to create conditions terrorists can exploit. We will continue to work with foreign partners and international organizations to help prevent conflict and respond to state failure by building foreign capacity for peace operations, reconstruction, and stabilization so that countries in transition can reach a sustainable path to peace, democracy, and prosperity. Where physical havens cross national boundaries, we will continue to work with the affected countries to help establish effective cross-border control. Yet some countries will be reluctant to fulfill their sovereign responsibilities to combat terrorist-related activities within their borders. In addition to cooperation and sustained diplomacy, we will continue to partner with the international community to persuade states to meet their obligations to combat terrorism and deny safehaven under U.N. Security Council Resolution 1373.
Yet safehavens are not just limited to geographic territories. They also can be non-physical or virtual, existing within legal, cyber, and financial systems.
Ÿ Legal safehavens. Some legal systems lack adequate procedural, substantive, and international assistance laws that enable effective investigation, prosecution, and extradition of terrorists. Such gaps offer a haven in which terrorists and their organizations can operate free from fear of prosecution. In the United States we have developed a domestic legal system that supports effective investigation and prosecution of terrorist activities while preserving individual privacy, the First Amendment rights of association, religious freedom, free speech, and other civil rights. We will continue to work with foreign partners to build their legal capacity to investigate, prosecute, and assist in the foreign prosecution of the full range of terrorist activities – from provision of material support to conspiracy to operational planning to a completed act of terrorism.
Ÿ Cyber safehavens. The Internet provides an inexpensive, anonymous, geographically unbounded, and largely unregulated virtual haven for terrorists. Our enemies use the Internet to develop and disseminate propaganda, recruit new members, raise and transfer funds, train members on weapons use and tactics, and plan operations. Terrorist organizations can use virtual safehavens based anywhere in the world, regardless of where their members or operatives are located. Use of the Internet, however, creates opportunities for us to exploit. To counter terrorist use of the Internet as a virtual sanctuary, we will discredit terrorist propaganda by promoting truthful and peaceful messages. We will seek ultimately to deny the Internet to the terrorists as an effective safehaven for their propaganda, proselytizing, recruitment, fund-raising, training, and operational planning.
Ÿ Financial safehavens. Financial systems are used by terrorist organizations as a fiscal sanctuary in which to store and transfer the funds that support their survival and operations. Terrorist organizations use a variety of financial systems, including formal banking, wire transfers, debit and other stored value cards, online value storage and value transfer systems, the informal hawala system, and cash couriers. Terrorist organizations may be able to take advantage of such financial systems either as the result of willful complicity by financial institutions or as the result of poor oversight and monitoring practices. Domestically, we have hardened our financial systems against terrorist abuse by promulgating effective regulations, requiring financial institutions to report suspicious transactions, and building effective public/private partnerships. We will continue to work with foreign partners to ensure they develop and implement similar regulations, requirements, and partnerships with their financial institutions. We also will continue to use the domestic and international designation and targeted sanctions regimes provided by, among other mechanisms, Executive Order 13224, USA PATRIOT Act Section 311, and United Nations Security Council Resolution 1267 and subsequent resolutions. These tools identify and isolate those actors who form part of terrorist networks or facilitate their activities.