Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998U.S. Government Printing Office, 1998 - 177 pages |
From inside the book
Results 1-5 of 100
Page
... UNITED STATES LIBRARY OF CONGRESS HEARING BEFORE THE OCT 28.1998 TRANCEER SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED FIFTH CONGRESS SECOND SESSION ON CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE ...
... UNITED STATES LIBRARY OF CONGRESS HEARING BEFORE THE OCT 28.1998 TRANCEER SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED FIFTH CONGRESS SECOND SESSION ON CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE ...
Page
... UNITED STATES LIBRARY OF CONGRESS HEARING BEFORE THE OCT 28.1998 TRANCEER SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED FIFTH CONGRESS SECOND SESSION ON CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE ...
... UNITED STATES LIBRARY OF CONGRESS HEARING BEFORE THE OCT 28.1998 TRANCEER SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED FIFTH CONGRESS SECOND SESSION ON CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE ...
Page 2
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998 United States. Congress. Senate. Select Committee on Intelligence. We look ...
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998 United States. Congress. Senate. Select Committee on Intelligence. We look ...
Page 1
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second ... UNITED STATES WEDNESDAY , JANUARY 28 , 1998 U.S. SENATE , SELECT COMMITTEE ON INTELLIGENCE , Washington , DC . The ...
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second ... UNITED STATES WEDNESDAY , JANUARY 28 , 1998 U.S. SENATE , SELECT COMMITTEE ON INTELLIGENCE , Washington , DC . The ...
Page 2
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998 United States. Congress. Senate. Select Committee on Intelligence. We look ...
Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998 United States. Congress. Senate. Select Committee on Intelligence. We look ...
Other editions - View all
Common terms and phrases
ability agencies American areas assess attack ballistic missile biological Bosnia BRYANT capabilities Chairman SHELBY challenge chemical weapons Chemical Weapons Convention China Chinese commitment Committee concern CONGRESS THE LIBRARY continue cooperation counterintelligence counterterrorism countries crisis defense Director TENET drug trafficking economic espionage efforts encryption FBI's forces foreign global Hamas impact increase infrastructure Intelligence Community interests investigation involved Iran Iran's Iranian Iraq Iraqi Israeli issue Khatami law enforcement Lebanon LIBRARY OF CONGRESS major mass destruction military Mir Aimal Kasi monitor National Intelligence Estimate national security North Korea nuclear weapons OAKLEY operations organized crime organized crime groups Pakistan political pose potential programs proliferation Question recent reform regime regional remain Russian organized crime Saddam Hussein sanctions Senator ALLARD SFOR significant South Soviet strategic targets terrorism terrorist groups tion trade secrets United UNSCOM warfare weapons of mass
Popular passages
Page 46 - Secure peace; deter aggression; prevent, defuse, and manage crises; halt the proliferation of weapons of mass destruction and advance arms control and disarmament; • Expand exports, open markets, assist American business, foster economic growth and promote sustainable development; • Protect American citizens abroad and safeguard the borders of the United States; • Combat international terrorism, crime and narcotics trafficking; • Support the establishment and consolidation of democracies,...
Page 68 - Warfare (TIW) . . . attacking a nation's or sub-national entity s key industries and utilities — to include telecommunications, banking and finance, transportation, water, government operations, emergency services, energy and power, and manufacturing. These industries normally have key linkages and interdependences, which could significantly increase the impact of an attack on a single component. Threats to critical infrastructure include those from nation-states, state-sponsored subnational groups,...
Page 62 - ... post Cold War era. Reaction to "western dominance." Many individuals, groups, and states fear the global expansion and perceived dominance of western (and especially US) values, ideals, culture, and institutions. Efforts to resist, halt, or undo this trend will spur anti-US sentiments and behavior. International drug cultivation, production, transport, and use will remain a major source of instability, both within drug producing, transit, and target countries, and between trafficking and consumer...
Page 151 - The electron is the ultimate precision guided weapon," Deutch told the committee, "we have evidence that a number of countries around the world are developing the doctrine , strategies and tools to conduct information attacks.
Page 65 - Iran velopment of specific elements of its military posture. Iran recognizes that it cannot hope to match US military power directly and therefore continues to develop capabilities to challenge the US indirectly: through subversion and terrorism directed against US and western interests; the development of air, air defense, missile, mine warfare, and naval capabilities to interdict maritime access in the Gulf and through the Strait of Hormuz; and the pursuit of WMD designed to deter the US and intimidate...
Page 169 - ... the FSU. Since the breakup of the Soviet Union, more extensive downsizing and restructuring of the program have taken place. Many of the key research and production facilities have taken severe cuts in funding and personnel. However, some key components of the former Soviet program may remain largely intact and may support a possible future mobilization Capability for the production of biological agents and delivery systems.
Page 67 - US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead. This basic reality is forcing many of our adversaries (current and potential) to seek other means to attack our interests. In general, we can anticipate an environment in which adversaries seek to avoid traditional conventional warfare with the US, to pursue various strategies to preclude or diminish our military...
Page 28 - ... PROMOTE THE WIDESPREAD AVAILABILITY AND USE OF ANY TYPE OF ENCRYPTION, REGARDLESS OF THE IMPACT ON PUBLIC SAFETY AND NATIONAL SECURITY, AND THESE PROPOSALS DO NOT ADDRESS THE PUBLIC SAFETY ISSUE ASSOCIATED WITH THE AVAILABILITY AND USE OF ENCRYPTION WITHIN THE UNITED STATES. WE ARE NOW AT AN HISTORICAL CROSSROAD ON THIS ISSUE. IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL BE ENHANCED FOR DECADES TO COME. BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL BE UNABLE TO...
Page 67 - Technology, combined with the creative ideas of military thinkers around the world, is leading to the development and application of new forms of warfare, and the innovative modification of traditional military practices. While the US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead.
Page 27 - US -owned commercial airliners in the Far East. His laptop computer, which was seized in Manila, contained encrypted files concerning this terrorist plot. * A subject in a child pornography case used encryption in transmitting obscene and pornographic images of children over the Internet. • A major international drug trafficking subject recently used a telephone encryption device to frustrate court-approved electronic surveillance. And this is just the...