Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998

Front Cover
U.S. Government Printing Office, 1998 - 177 pages

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 46 - Secure peace; deter aggression; prevent, defuse, and manage crises; halt the proliferation of weapons of mass destruction and advance arms control and disarmament; • Expand exports, open markets, assist American business, foster economic growth and promote sustainable development; • Protect American citizens abroad and safeguard the borders of the United States; • Combat international terrorism, crime and narcotics trafficking; • Support the establishment and consolidation of democracies,...
Page 68 - Warfare (TIW) . . . attacking a nation's or sub-national entity s key industries and utilities — to include telecommunications, banking and finance, transportation, water, government operations, emergency services, energy and power, and manufacturing. These industries normally have key linkages and interdependences, which could significantly increase the impact of an attack on a single component. Threats to critical infrastructure include those from nation-states, state-sponsored subnational groups,...
Page 62 - ... post Cold War era. Reaction to "western dominance." Many individuals, groups, and states fear the global expansion and perceived dominance of western (and especially US) values, ideals, culture, and institutions. Efforts to resist, halt, or undo this trend will spur anti-US sentiments and behavior. International drug cultivation, production, transport, and use will remain a major source of instability, both within drug producing, transit, and target countries, and between trafficking and consumer...
Page 151 - The electron is the ultimate precision guided weapon," Deutch told the committee, "we have evidence that a number of countries around the world are developing the doctrine , strategies and tools to conduct information attacks.
Page 65 - Iran velopment of specific elements of its military posture. Iran recognizes that it cannot hope to match US military power directly and therefore continues to develop capabilities to challenge the US indirectly: through subversion and terrorism directed against US and western interests; the development of air, air defense, missile, mine warfare, and naval capabilities to interdict maritime access in the Gulf and through the Strait of Hormuz; and the pursuit of WMD designed to deter the US and intimidate...
Page 169 - ... the FSU. Since the breakup of the Soviet Union, more extensive downsizing and restructuring of the program have taken place. Many of the key research and production facilities have taken severe cuts in funding and personnel. However, some key components of the former Soviet program may remain largely intact and may support a possible future mobilization Capability for the production of biological agents and delivery systems.
Page 67 - US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead. This basic reality is forcing many of our adversaries (current and potential) to seek other means to attack our interests. In general, we can anticipate an environment in which adversaries seek to avoid traditional conventional warfare with the US, to pursue various strategies to preclude or diminish our military...
Page 28 - ... PROMOTE THE WIDESPREAD AVAILABILITY AND USE OF ANY TYPE OF ENCRYPTION, REGARDLESS OF THE IMPACT ON PUBLIC SAFETY AND NATIONAL SECURITY, AND THESE PROPOSALS DO NOT ADDRESS THE PUBLIC SAFETY ISSUE ASSOCIATED WITH THE AVAILABILITY AND USE OF ENCRYPTION WITHIN THE UNITED STATES. WE ARE NOW AT AN HISTORICAL CROSSROAD ON THIS ISSUE. IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL BE ENHANCED FOR DECADES TO COME. BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL BE UNABLE TO...
Page 67 - Technology, combined with the creative ideas of military thinkers around the world, is leading to the development and application of new forms of warfare, and the innovative modification of traditional military practices. While the US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead.
Page 27 - US -owned commercial airliners in the Far East. His laptop computer, which was seized in Manila, contained encrypted files concerning this terrorist plot. * A subject in a child pornography case used encryption in transmitting obscene and pornographic images of children over the Internet. • A major international drug trafficking subject recently used a telephone encryption device to frustrate court-approved electronic surveillance. And this is just the...

Bibliographic information