Sunteți pe pagina 1din 16

Standard Endnote Examples June 3, 2004

AAL; CIA; DCI; DHS; DOD; DOJ; DOS; DOT; FAA; FBI; FDNY; GAO; INS;
NORAD; NSA; NSC; NTSB; NYPD; Port Authority; SEC; Treasury; TSA; UAL; USSS.

Sept. 11, 2001. Jan. Feb. Mar. Apr. May June July Aug. Sept. Oct. Nov. Dec.

pp. 24-26; pp. 125-129; 1998-1999; 2001-2004.

Albert Gore interview (May 3, 2004).

Richard B. interview (Feb. 15, 2004).

Richard Clarke interview (Jan. 11, 2004).

Thomas Ridge testimony, May 19, 2004.

George Tenet prepared statement, Apr. 14, 2004, p. 5.

Joint Inquiry interview of Richard Clarke, Dec. 15, 2002.

Joint Inquiry testimony of George Tenet, Jan. 15, 2003 (closed hearing).

DOJ Inspector General interview of John Smith, Oct. 20, 2003.

Testimony of George Tenet before the Senate Select Committee on Intelligence, Mar. 15,
2004, p. 12.

Steve Coll, Ghost Wars: The Secret History of the CIA, Afghanistan, and bin Laden, from
the Soviet Invasion to September 10, 2001 (Penguin, 2004), p. 63.

[subsequent short form:] Coll, Ghost Wars, p. 631, n. 29.

Mark LeVine, "The UN Arab Human Development Report: A Critique," Middle East
Report, July 26, 2002, p. 5 (online at http://www.merip.org/mero/mero072602.html).

DOS cable, London 12345, "Nothing on Moussaoui," Sept. 5, 2001. (S)

CIA cable, Islamabad 12345, "Update on Camps," Feb. 7,1999. (TS,U,NF,OC)

NSC memo, Clarke to Rice, "Not a Plan," Jan. 27, 2001. (TS)

NSC email, Clarke to Berger, "Hair on Fire," Dec. 15, 1999. (S)

DCI letter, Tenet to Berger, "Transmittal of Report," Jan. 1, 2000.

-1 -
FBI report of investigation, interview of John Smith, Oct. 4, 2001.

FBI electronic communication, "Notice to JTTFs," July 1, 2001.

FBI letterhead memorandum, UBL investigation, Jan. 1,2001.

FBI report, "Summary of Penttbom Investigation," Feb. 29, 2004, pp. 20-29. (S,NF,OC)

CIA report, Interrogation of KSM, TD12345-02, Mar. 1,2004. (S,HCS,NF)

CIA analytic report, "UBL Update," CTC 2002-1234G, Feb. 15,1999. (S)

CIA analytic report, "The Plot and the Plotters," June 1, 2003, p. 5. (S)

Ibid., p. 12. (S)

CIA, SEIB, "UBL and the Taliban," Jan. 8, 2000. (S,NF,OC)

CIA, NID, "Pakistan: Latest Developments," Jan. 5, 1998.

CIA briefing materials, "The Threat," undated (appears to be from July 2001).

NSC talking points, "Meeting with Bandar," undated, p. 2.

See, e.g., DOS, Patterns of Global Terrorism 2002, Apr. 2003, p. 83 (online at
www. state. go v/s/ct/rl s/).

See Thomas H. Kean and Lee H. Hamilton, "Progress Report," Washington Post, Mar.
15, 2004, p. A12.

[Don't cite Staff Statements!]

[Cite team comments in square brackets, bold]

-2-
Page 1 of

Gordon Lederman

From: Steve Dunne


Sent: Thursday, June 03, 2004 6:08 PM
To: cite
Subject: comparing notes

Just fyi, here is how some of my endnotes look after trying to clean them up in a section where I'm mainly relying
on notes of documents:

Ml
See, e.g., CIA briefing materials, "Bombings in Nairobi and Dar es Salaam—An Update," Aug. 14, 1998. (TSi P
[[notes only, bates 0801646, 08015241|
in
For the elements of this plan, see DOD memo, "Modification] 001 to Planning Order," [date]; DOD menrb, "Strike
Execution and IO Plan," [date). For the timing of this plan, see DOD memo, "Chronology of Planning," Dec. 14, 1998.
(TSI Illreview docs at DOD, NCT0067272||
in ' ' '••-,
Richard Clarke interview (Dec. 18, 2003).
I'l
NSC email, Clarke to Ma I fey, "Checklist for Sandy's 1 PM PC," Aug. 8, 1998; (TS) [(notes only|| Samuel Berger
interview, |date|; CIA memo, "Khowst and the Meeting of Islamic Extremist Leaders on 20 Aug.," Aug. 17, 1998. (TS)
Unotcs only, bates 0801S74H
[i]
NSC notes, checklist re military strikes, Aug. 14, 1998 (author appears to be Clarke). (TS)-'|[notes only - appears to be
recommendation, not decision)] On the military plans, see DOD memo, "Modification] 0,02 to Planning Order," (date);
DOD memo, "Chronology of Planning," Dec. 14,1998. (TSj ~| [[review docs at DOD, NCT0067272)|

9/11 Classified Information

6/3/2004
Page 1 of 1

Gordon Lederman

From: Steve Dunne


Sent: Friday, June 04, 2004 9:09 AM
To: Gordon Lederman
Subject: RE: more questions

I would start each one as "NSC memo" or "NSC notes" (whichever seems more appropriate) and then a
title such as "Agenda for. . ."or "Summary of Conclusions o f . . . " and then the date of the document
(which may be the same as or different from the date of the meeting).

Original Message
From: Gordon Lederman
Sent: Thursday, June 03, 2004 5:51 PM
To: Steve Dunne
Subject: more questions

How do we refer to a meeting agenda? Perhaps:


NSC memo, "Agenda for Oct. 3,1997 Meeting,"
Or
NSC agenda,

How about a summary of a meeting? The CSG's were called "summary of conclusions." Perhaps:
NSC document, "Summary of Conclusions of May 4, 1999 Meeting"
or maybe
NSC summary of conclusions, May 4,1999

Thanks.

6/4/2004
Page 1 of 1

Gordon Lederman

From: Steve Dunne


Sent: Friday, June 04, 2004 9:12 AM
To: Gordon Lederman
Subject: RE: cite checking

Yes, call it an NSC memo or NSC notes. You should spell out CSG the first time it appears in the
endnotes in your section, followed by "(CSG)," and then you can use CSG for the rest of the section.

Original Message
From: Gordon Lederman
Sent: Thursday, June 03, 2004 5:42 PM
To: Steve Dunne
Subject: cite checking

I see that the CSG is referred to in the text of 3.4 as "CSG" rather than being spelled out.

Can I refer to it in the endnotes as CSG rather than spelling it out?

And should I call a CSG agenda an NSC document? I presume so, but thought I should check. I could
put "CSG" in the title of the document, if I call it an NSC document.

6/4/2004
Page 1 of 1

Gordon Lederman

From: Steve Dunne


Sent: Friday, June 04, 2004 9:04 AM
To: Gordon Lederman
Subject: RE: another question

I would clean up the capitalization, but I would not add the colon, thus "Urgent re UBL"
Wherever you are relying on notes and not the original document, please put "[[notes only]]" or
something similar in bold at the end so that we know that someone still needs to look at the underlying
document.

Original Message
From: Gordon Lederman
Sent: Thursday, June 03, 2004 7:10 PM
To: Steve Dunne
Subject: another question

The title of an email is given as "urgent re ubl." Can I clean that up to be "Urgent re: UBL"? Also, I don't
have the original of the email but rather Alexis' or Warren's notes, so the lower-case version may just be
her or his shorthand.

6/4/2004
Page 1 of 1

Gordon Lederman

From: Steve Dunne


Sent: Friday, June 04, 2004 9:00 AM
To: Gordon Lederman
Subject: RE: Another question

If you think there is a subject line, I would put "[title]" in bold as a place marker, so that we know to
look for the title when we make a trip to look at the actual documents. Or you could put a description
of the cable, not in quotes, in place of the title - such as CIA cable, Islamabad 1234, Update on UBL,
Jan. 15, 2000. Or you could leave a title out completely if Alexis or Warren don't think there was a
title. I would not say "untitled."

—Original Message—
From: Gordon Lederman
Sent: Thursday, June 03, 2004 8:23 PM
To: Steve Dunne
Subject: Another question

For some cables on which Alexis and/or Warren took notes, they did not write down the subject line of the
cable. So I just leaving out the title completely, rather than saying "untitled" (as there may indeed be a
title on the actual document). Is that ok? Thanks.

6/4/2004
Page 1 of 1

Gordon Lederman

From: Steve Dunne


Sent: Wednesday, June 02, 2004 1:45 PM
To: cite
Subject: a few revisions

Based on the problems with duplicate last names, input from Philip, and discussions with some of you
today, attached is a revised list of endnote examples. The changes are (1) using first and last names
for interviews, etc., rather than just last names; (2) putting the date of a Commission interview in
parens rather than set off by a comma, thus "Richard Clarke interview (Jan. 11, 2004)."; (3) rather
than try to make the fuzzy distinction between classified reports that are "published" and just regular
reports, treat all classified reports as unpublished because they are not available to the public, thus
"FBI report, "Summary of Penttbom Investigation," Feb. 29, 2004, pp. 20-29." and "CIA analytical
report, "The Plot and the Plotters," June 1, 2003, p. 5."; (4) some particular changes for CIA
documents such as SEIBs and NIDs; and (5) calling Powerpoint and similar slide shows the more
generic "briefing materials." After further discussion with Raj, I have not included serial numbers for
FBI documents.

As always, your comments and additions are welcome. Although I will resist changes to forms already
decided, I'm sure this will be a bit of a living document.

6/3/2004
Notes

To help distinguish government documents from published materials, we have cited such
unpublished documents with abbreviated dates (e.g., 30 Nov 89 for November 30, 1989).
Telegrams to or from American embassies are cited by what the State Department calls message
reference numbers, usually accompanied by the subject line of the message and always accom-
panied by the date of transmission. So, for example, State 306045, "Meeting in Moscow," 27 Jun
90, would be a telegram sent overseas from the State Department, with the given, subject line,
on June 27, 1990. Brussels 4567 gives the number of a telegram sent to Washington by the
American embassy in Brussels, just as EmbBerlin 4567 would be the number of a telegram sent
to Washington by the American embassy in East Berlin (the embassy in West Germany was in
Bonn). "Secto" means a telegram sent to Washington by the secretary of state's traveling party.
"USBerlin" is the American mission in West Berlin, "USNATO" the American mission to the
North Atlantic Treaty Organization headquarters in Brussels. All U.S. government memoranda
are cited in this form: [name, not title, of official author] to [name of addressee], "[subject line,
if any]," date memo was sent.
Bureaus of the State Department also have standardized abbreviations. EUR is the Bureau for
European and Canadian Affairs. EUR/CE is that bureau's office for Central European affairs.
EUR/RPM is the bureau's office for regional political-military (NATO) affairs. L is the Office
of the Legal Adviser and L/EUR that bureau's office for European matters. PA is the Bureau for
Public Affairs, S/P the policy planning staff. In the intelligence community there are also
abbreviations. NIC is the National Intelligence Council (coordinating the views of all U.S.
intelligence agencies, including the CIA). SOV M is a memo from the CIA office for Soviet
affairs, and EUR M a memo from the CIA office for European affairs, both in the CIA
Directorate for Intelligence (which does intelligence analysis, as distinct from directorates that
carry out clandestine operations or scientific research).
Other commonly used abbreviations in the notes are FBIS-SOV (Foreign Broadcast Informa-
,,tion Service, Soviet Union), Vestnik (Vestnik Ministertsva Inostrannykh del SSR, a journal tljat
ffecorded the official activities of the Soviet Foreign Ministry), and FRUS (Foreign Relatiow^of
tie United States), the principal published archives of U.S. foreign policy.

Preface
i. Genscher quoted in Richard Kiessler and Frank Elbe, Bin runder Tisch mit scharfen
'cken: Der diplomatische Weg zur deutschen Einheit (Baden-Baden: Nomos, 1993), pp. 14-
Standard Endnote Examples

^ «€lA; DCI; DHS; DOD; DOJ; DOS; DOT; FAA; FBI; GAO; INS; NORAD- NSA; NSC; U At,
NTSB; SEC; Treasury; TSA; USSSy srmH^^g^ (=£/¥)( /OfZ) .,

Sept. 11,2001. Jan. Feb. Mar. Apr. May June July Aug. Sept. Oct. Nov. Dec.

pp. 24-26; pp. 125-129; 1998-1999; 2001-2004.

Gore interview, May 3,20t4.

Richard B. interview, Feb. 15, 2004.


2
Clarke interview, Jan. 11, 2004.

Ridge testimony, May 19, 2004.


v -^-—-^ .. if

Tenet prepared statemenj, Apr. 14, 2004, p. 5.


ree «A-f«'A<. 1*i<n*/» sofe-ftrMftf '5 M/
Joint hiquiry interview of RichaYd Clarke, Dec. 15, 2tt2.

^ 1 Joint Inquiry testimony of George Tenet, Jan. 15, 2i03 (closed hearing).
^ DOJ Inspector General interview of John Smith, Oct. 20,2003.

Testimony of George Tenet before the Senate Select Committee on Intelligence, Mar. 15,
2004, p. 12.

Steve Coll, Ghost

[subsequent short form:] Coll, Ghost Wars, p. i31, n. 29.

Mark LeVine, "The UN Arab Human Development Report: A Critique," Middle East
Report, July 26, 2002, p. 5$ £nline at^ww.merip.org/mero/mero072602.httn

DOS cable, London 1 2345, 'tNothingon Moussaowi," Sept. 5, 200 1 . MS) .


^i^K^J^i^^^ r~ Vi x-^
CIA cable, Islamabad 12345, "Update on Camps," Feb. 1, 1999. (TS) >k J

NSC memo, Clarke to Rice, "Not a Plan," Jan. 27, 2001. (TS)

NSC email, Clarke to Berger, "Hair on Fire," Dec. 15, 1999. (S)

DCI letter, Tenet to Berger, "Transmittal of Report," Jan. 1, 2000.

-1-
FBI Mport of investigation, interview of John Smith, Oct. 4, 2001, p. 2.

FBI electronic communication, "Notice to JTTFs," July 1, 2001.

CIA report, 'SDetafficcSpcAa," T»1234S-02, Mar. 1, 2(mgjff (TS)


\"
CIA report, "UBL Update,"lFeb. 15, 1999. \t Center, Th
LJ^CTC*,
NSC talking points, "Meeting with Bandar," undated, p. 2.

CIA slides, "The Threat," undated (appears to he from July 20011


^->- Ui rf1 CO«-'A«.
V. <

Ibid., p. 12. (S)

Thomas H. Kean and Lee H. Hamilton, "Progress Report," Washington Post, Mar. 15,
2004, p. A12.

't cite Staff Statements!]

[Cite team comments in square brackets, bold]


Cr

P">P
X- "Tb

-2-
—> A /Ve^<^H_
COMMISSION SENSITIVE

TABLE OF CONTENTS LEAD 1

Letter of Transmittal to the President and Congress


Executive Summary
Preface

ONE A new kind of war


1.1 Inside the aircraft Johnstone/Raidt
1.2 Improvising a homeland defense Azzarello
1.3 National crisis management Hyde
(impact assessment) Blot

TWO The foundation of the new terrorism


2.1 A declaration of war May
2.2 Bin Ladin's appeal in the Islamic world May
2.3 The rise of Bin Ladin and al Qaeda (1988-1992) MacEachin
2.4 Building an organization, declaring war on the United States (1992-1996) Dowling
2.5 Al Qaeda's renewal in Afghanistan (1996-1998) MacEachin

THREE Counterterrorism evolves


3.1 From the old terrorism to the new: the first World Trade Center bombing Tobin
3.2 Adaptation - or non-adaptation - in the law enforcement community FO
3.3 ... the Intelligence Community FO
3.4 ... the State Department and the Defense Department FO
3.5 ...the White House FO
3.6 ... Congress Kojm

FOUR U.S. responses to al Qaeda's initial assaults


4.1 Before the bombings in Kenya and Tanzania Albion
4.2 Crisis: August 1998 Bass
4.3 Diplomacy Allan
4.4 Covert action Jenkins
4.5 Searching for fresh options Albion

FIVE Al Qaeda aims at the American homeland


5.1 Terrorist entrepreneurs Snell
5.2 The "planes operation" De
5.3 The Hamburg contingent De
5.4 A money trail? Roth

SIX From threat to threat


6.1 The Millennium crisis Linden
6.2 Post-crisis reflection: an agenda for 2000 Albion
6.3 The attack on the U.S.S. Cole Grandrimo
6.4 Change and continuity Hurley
6.5 A new strategy? Bass

SEVEN The attack looms


7.1 First arrivals in California Snell
7.2 The 9/1 1 pilots in the United States Jacobson
7.3 Assembling the teams Kim
7.4 Final strategies and tactics Kim

EIGHT "The system was blinking red"


8.1 The summer of threat Grewe
8.2 Late leads? Mihdhar and Moussaoui Grewe

COMMISSION SENSITIVE
COMMISSION SENSITIVE

TABLE OF CONTENTS LEAD 1

NINE Heroism and horror


9.1 Emergency plans Caspersen
9.2 Agencies and firms implement the plans Caspersen
9.3 The World Trade Center Caspersen
9.4 Fateful choices in emergency response Caspersen

TEN Wartime Zelikow, Hurley

ELEVEN Foresight-and Hindsight FO

TWELVE National strategy


12.1 A new world and a new kind of conflict FO
12.2 Measuring success FO
12.3 Coordinating a national strategy FO
12.4 The role of the Congress FO
12.5 From national strategy to coalition strategy FO
12.6 America and the Muslim world Byman
12.7 Central Asia and Arabia Byman
12.8 Reinventing multilateral institutions Hawley

THIRTEEN A different kind of government


13.1 Bridging the foreign-domestic divide Healey
13.2 Assessment and warning Fenner
13.3 Reforming the Executive and the Congress Lederman
13.4 Balancing empowerment and restraint Rundlet
13.5 Harnessing and regulating the power of the information age FO
13.6 Terrorist finance Wille
13.7 Transforming institutions for attacking terrorists Hawley
13.8 Border security Ginsburg
13.9 Homeland defense FO
13.10 Aviation and transportation security Dillingham
13.11 Who is protecting us? Public and private partnerships Farmer
13.12 Mitigating and managing the consequences of catastrophic attack Farmer
13.13 Learning to live in a world of risk FO

A Table of Names Falk


B List of Commission Interviews Campagna
C Timeline: Key Events on 9/1 1 Team 8
D Timeline: Al Qaeda & U.S. Foreign Policy Team 3

End notes

COMMISSION SENSITIVE
COMMISSION SENSITIVE

CHAPTER LEAD |
1. The Foundation of an Islamic Army
1.1 The fatwa of February 1998 May
1.2 Islamist extremism and its appeal in the Islamic world May
1.3 The rise of Bin Ladin and al Qaeda MacEachin
1.4 Al Qaeda and the Muslim world Cowling
1.5 Attacking the United States MacEachin

II. Counterterrorism Evolves


2.1 From the old terrorism to the new: The case of WTCI Tobin
2.2 Adaptation - or non-adaptation - in the law enforcement community FO
2.3 ... the intelligence community FO
2.4 ... the Departments and the Congress FO
2.5 ...the White House FO

III. Responses to al Qaeda*s Initial Assaults


3.1 Before the bombings in Kenya and Tanzania Albion
3.2 Crisis Bass
3.3 Post-crisis diplomacy Allan
3.4 Military options Jenkins
3.5 Clandestine and covert action Albion

IV. Al Qaeda Aims at the American Homeland


4.1 Terrorist entrepreneurs Snell
4.2 Plans, targets, and requirements De
4.3 Choosing the attackers: recruitment, vetting, and training De
4.4 Seeing aircraft as weapons? May
4.5 A money trail? Roth

V. From Threat to Threat


5.1 The Millennium crisis Linden
5.2 Post-crisis reflection: an agenda for 2000 Albion
5.3 The attack on the U.S.S. Cole Grandrimo
5.4 Change and continuity * Hurley
5.5 A new strategy? Bass

VI. The Attack Looms


6.1 Arriving, Waiting in California Snell
6.2 California and Florida Jacobson
6.3 Final strategies and tactics Kim
6.4 Assembling the teams Kim
6.5 The 'summer of threat" Grewe
6.6 Late leads? Al Mihdhar and Moussaoui Grewe

VII. The Four Flights


7.1 The hacking of AA 1 1 and UA 175 Johnstone
7.2 FAA and NORAD Farmer
7.3 Losing AA 77 Farmer
7.4 Improvising a homeland defense Farmer
7.5 The battle for UA 93 Raidt

VIII. Heroism and Horror


8.1 Emergency plans Caspersen
8.2 Agencies and firms implement the plans Caspersen
8.3 The World Trade Center Caspersen
8.4 Fateful choices in emergency response Caspersen

COMMISSION SENSITIVE
COMMISSION SENSITIVE

CHAPTER LEAD 1
IX. Wartime
9.1 Crisis management and domestic responses Hyde
9.2 Initial war planning and the invasion of Afghanistan Hurley
9.3 The emerging shape of a war on terror Byman

X. Problems of Foresight - and Hindsight


10.1 The world of policymakers: appreciations and judgments FO
1 0.2 The blinding effects of hindsight FO
1 0.3 Finding fair verdicts FO

XI. National Leadership and National Strategy


11.1 A new world and a new kind of conflict FO
1 1 .2 Measuring success FO
1 1 .3 Coordinating a national strategy FO
1 1 .4 The role of the Congress FO
11.5 From national strategy to coalition strategy FO

XII. Bringing Foreign Policy Back In


12.1 America and the Muslim world Byman
12.2 Central Asia and Arabia Byman
12.3 Reinventing multilateral institutions Hawley

XIII. Intelligence for a Different World


1 3.1 Bridging the foreign-domestic divide Healey
13.2 Assessment and warning Fenner
1 3.3 Reform ing the Executive and the Congress Lederman

XIV. Protecting Security and Preserving Liberty


14.1 Balancing empowerment and restraint Rundlet
14.2 Harnessing and regulating the power of the information age FO
14.3 Terrorist finance Roth

XV. National Defense


1 5.1 Transforming institutions for attacking terrorists Hawley
15.2 Border security Ginsburg
15.3 Homeland defense FO

XVI. Living in a World of Risk


16.1 Assessing vulnerabilities and judging risks FO
16.2 Aviation and transportation security Dillingham
16.3 Who is protecting us? Public and private partnerships Farmer
16.4 Mitigating and managing the consequences of catastrophic attack Farmer
1 6.5 Learning to live in a world of risk FO

COMMISSION SENSITIVE

S-ar putea să vă placă și