Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence, United States Senate, One Hundred Seventh Congress, Second Session : Current and Projected National Security Threats to the United States, February 6, 2002
U.S. Government Printing Office, 2002 - 348 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Common terms and phrases
ability activities ACTS Afghanistan agencies al-Qa'ida American ANSWER arms assessment assistance attacks authorities ballistic missile become believe capabilities Chairman challenges chemical China close Committee concern CONGRESS CONGRESS THE LIBRARY continue cooperation countries defense Director TENET domestic East economic effective efforts extent extremists face facilities forces foreign future global going groups impact important improve increase individuals infrastructure Intelligence Community interests involved Iran Iraq Islamic issues law enforcement leaders likelihood maintains major materials means military missile nature North Korea nuclear Office operations organizations Palestinian planning political pose possible potential President problems production questions reform regarding regime regional relations remains response RESS result Russia Saudi Senator September 11 significant status strategic success terrorism terrorist terrorist groups threat trends UNCLASSIFIED United weapons
Page 165 - Every nation, in every region, now has a decision to make: Either you are with us, or you are with the terrorists. From this day forward, any nation that continues to harbor or support terrorism will be regarded by the United States as a hostile regime.
Page 90 - Investigation (FBI) defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives...
Page 165 - Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.
Page 219 - Are less expensive than developing and producing ICBMs. • Can be covertly developed and employed; the source of the weapon could be masked in an attempt to evade retaliation. • Probably would be more reliable than ICBMs that have not completed rigorous testing and validation programs. • Probably would be more accurate than emerging ICBMs over the next 15 years. • Probably would be more effective for disseminating biological warfare agent than a ballistic missile. • Would avoid missile defenses.
Page 173 - The efforts of the Government of Iran to acquire weapons of mass destruction and the means to deliver them and its support of acts of international terrorism endanger the national security and foreign policy interests of the United States and those countries with which the United States shares common strategic and foreign policy objectives.
Page 127 - September 1 1 attacks demonstrated the nation's dependence on critical infrastructure systems that rely on electronic and computer networks. Further, he noted that attacks of this nature would become an increasingly viable option for terrorists as they and other foreign adversaries become more familiar with these targets and the technologies required to attack them.
Page 174 - Should you have any questions regarding this matter, please do not hesitate to contact me.
Page 91 - ... occur totally outside the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. (d) "Sabotage...
Page 91 - International terrorism" means activities that— (1) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States...
Page 108 - A web site hack that shuts down an e-commerce site can have disastrous consequences for a business. An intrusion that results in the theft of credit card numbers from an online vendor can result in significant financial loss and, more broadly, reduce consumers' willingness to engage in e-commerce.