Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifth Congress, Second Session ... Wednesday, January 28, 1998U.S. Government Printing Office, 1998 - 177 pages |
From inside the book
Results 1-5 of 20
Page 4
... groups , and organized crime . Recall the enormous disruption to the northeastern United States and Canada caused by recent power outages . These disrup- tions were caused by an ice storm . Imagine if a computer operator in Tehran or ...
... groups , and organized crime . Recall the enormous disruption to the northeastern United States and Canada caused by recent power outages . These disrup- tions were caused by an ice storm . Imagine if a computer operator in Tehran or ...
Page 15
... Organized Crime . - As for international organized crime , the globalization of business and technology have given crime syndicates unprecedented opportunities for illicit activities . Yet law enforcement authorities often remain con ...
... Organized Crime . - As for international organized crime , the globalization of business and technology have given crime syndicates unprecedented opportunities for illicit activities . Yet law enforcement authorities often remain con ...
Page 22
... organized crime , the globalization of busi- ness and technology have given crime syndicates unprecedented op- portunities for illicit activities . Yet law enforcement authorities often remain constrained by national sovereignty and ...
... organized crime , the globalization of busi- ness and technology have given crime syndicates unprecedented op- portunities for illicit activities . Yet law enforcement authorities often remain constrained by national sovereignty and ...
Page 26
... crime and prevent terrorism . There are all kinds of views about this issue ... groups of individuals that are American citizens using violence to commit ... organized federations , such as Hizbollah , Gama'at al- Islamiyyah , Hamas are ...
... crime and prevent terrorism . There are all kinds of views about this issue ... groups of individuals that are American citizens using violence to commit ... organized federations , such as Hizbollah , Gama'at al- Islamiyyah , Hamas are ...
Page 35
... groups , organized crime , domestic and international terrorists , and adversary na- tions are all potential sources of attack . Vulnerabilities Hundreds of information system vulnerabilities are discovered every day - many directly ...
... groups , organized crime , domestic and international terrorists , and adversary na- tions are all potential sources of attack . Vulnerabilities Hundreds of information system vulnerabilities are discovered every day - many directly ...
Other editions - View all
Common terms and phrases
ability agencies American areas assess attack ballistic missile biological Bosnia BRYANT capabilities Chairman SHELBY challenge chemical weapons Chemical Weapons Convention China Chinese commitment Committee concern CONGRESS THE LIBRARY continue cooperation counterintelligence counterterrorism countries crisis defense Director TENET drug trafficking economic espionage efforts encryption FBI's forces foreign global Hamas impact increase infrastructure Intelligence Community interests investigation involved Iran Iran's Iranian Iraq Iraqi Israeli issue Khatami law enforcement Lebanon LIBRARY OF CONGRESS major mass destruction military Mir Aimal Kasi monitor National Intelligence Estimate national security North Korea nuclear weapons OAKLEY operations organized crime organized crime groups Pakistan political pose potential programs proliferation Question recent reform regime regional remain Russian organized crime Saddam Hussein sanctions Senator ALLARD SFOR significant South Soviet strategic targets terrorism terrorist groups tion trade secrets United UNSCOM warfare weapons of mass
Popular passages
Page 46 - Secure peace; deter aggression; prevent, defuse, and manage crises; halt the proliferation of weapons of mass destruction and advance arms control and disarmament; • Expand exports, open markets, assist American business, foster economic growth and promote sustainable development; • Protect American citizens abroad and safeguard the borders of the United States; • Combat international terrorism, crime and narcotics trafficking; • Support the establishment and consolidation of democracies,...
Page 68 - Warfare (TIW) . . . attacking a nation's or sub-national entity s key industries and utilities — to include telecommunications, banking and finance, transportation, water, government operations, emergency services, energy and power, and manufacturing. These industries normally have key linkages and interdependences, which could significantly increase the impact of an attack on a single component. Threats to critical infrastructure include those from nation-states, state-sponsored subnational groups,...
Page 62 - ... post Cold War era. Reaction to "western dominance." Many individuals, groups, and states fear the global expansion and perceived dominance of western (and especially US) values, ideals, culture, and institutions. Efforts to resist, halt, or undo this trend will spur anti-US sentiments and behavior. International drug cultivation, production, transport, and use will remain a major source of instability, both within drug producing, transit, and target countries, and between trafficking and consumer...
Page 151 - The electron is the ultimate precision guided weapon," Deutch told the committee, "we have evidence that a number of countries around the world are developing the doctrine , strategies and tools to conduct information attacks.
Page 65 - Iran velopment of specific elements of its military posture. Iran recognizes that it cannot hope to match US military power directly and therefore continues to develop capabilities to challenge the US indirectly: through subversion and terrorism directed against US and western interests; the development of air, air defense, missile, mine warfare, and naval capabilities to interdict maritime access in the Gulf and through the Strait of Hormuz; and the pursuit of WMD designed to deter the US and intimidate...
Page 169 - ... the FSU. Since the breakup of the Soviet Union, more extensive downsizing and restructuring of the program have taken place. Many of the key research and production facilities have taken severe cuts in funding and personnel. However, some key components of the former Soviet program may remain largely intact and may support a possible future mobilization Capability for the production of biological agents and delivery systems.
Page 67 - US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead. This basic reality is forcing many of our adversaries (current and potential) to seek other means to attack our interests. In general, we can anticipate an environment in which adversaries seek to avoid traditional conventional warfare with the US, to pursue various strategies to preclude or diminish our military...
Page 28 - ... PROMOTE THE WIDESPREAD AVAILABILITY AND USE OF ANY TYPE OF ENCRYPTION, REGARDLESS OF THE IMPACT ON PUBLIC SAFETY AND NATIONAL SECURITY, AND THESE PROPOSALS DO NOT ADDRESS THE PUBLIC SAFETY ISSUE ASSOCIATED WITH THE AVAILABILITY AND USE OF ENCRYPTION WITHIN THE UNITED STATES. WE ARE NOW AT AN HISTORICAL CROSSROAD ON THIS ISSUE. IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL BE ENHANCED FOR DECADES TO COME. BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL BE UNABLE TO...
Page 67 - Technology, combined with the creative ideas of military thinkers around the world, is leading to the development and application of new forms of warfare, and the innovative modification of traditional military practices. While the US and its allies are the source of much of this innovation, others are driven by the dominant military position of the US, and our demonstrated commitment to maintaining our military lead.
Page 27 - US -owned commercial airliners in the Far East. His laptop computer, which was seized in Manila, contained encrypted files concerning this terrorist plot. * A subject in a child pornography case used encryption in transmitting obscene and pornographic images of children over the Internet. • A major international drug trafficking subject recently used a telephone encryption device to frustrate court-approved electronic surveillance. And this is just the...