Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence, United States Senate, One Hundred Seventh Congress, Second Session : Current and Projected National Security Threats to the United States, February 6, 2002U.S. Government Printing Office, 2002 - 348 pages |
From inside the book
Results 1-5 of 55
Page 9
... cooperation from allies around the world , we are uncovering terrorists ' plans and breaking up their cells . These efforts have yielded the arrest of nearly 1,000 al - Qa'ida operatives in over 60 countries , and have disrupted ...
... cooperation from allies around the world , we are uncovering terrorists ' plans and breaking up their cells . These efforts have yielded the arrest of nearly 1,000 al - Qa'ida operatives in over 60 countries , and have disrupted ...
Page 13
... cooperation between them is possible even though Saddam is well aware that such activity would carry serious consequences . ( U ) In Iran , we are concerned that the reform movement may be losing its momentum . For almost five years ...
... cooperation between them is possible even though Saddam is well aware that such activity would carry serious consequences . ( U ) In Iran , we are concerned that the reform movement may be losing its momentum . For almost five years ...
Page 14
... cooperation and common cause with us in Afghanistan are being eclipsed by Iranian efforts to undermine US influence there . While Iran's officials express a shared interest in a stable government in Afghanistan , its security forces ...
... cooperation and common cause with us in Afghanistan are being eclipsed by Iranian efforts to undermine US influence there . While Iran's officials express a shared interest in a stable government in Afghanistan , its security forces ...
Page 15
... cooperation between Israel and the Palestinian Authority - and the escalating and uncontrolled activities of the Palestine Islamic Jihad and HAMAS make any progress cxtremely difficult . • We are concerned that this environment creates ...
... cooperation between Israel and the Palestinian Authority - and the escalating and uncontrolled activities of the Palestine Islamic Jihad and HAMAS make any progress cxtremely difficult . • We are concerned that this environment creates ...
Page 17
... cooperation to Iran . • Chinese firms have in the past supplied dual - use CW - related production equipment and technology to Iran . We remain concerned that they may try to circumvent the CW - related export controls that Beijing has ...
... cooperation to Iran . • Chinese firms have in the past supplied dual - use CW - related production equipment and technology to Iran . We remain concerned that they may try to circumvent the CW - related export controls that Beijing has ...
Other editions - View all
Common terms and phrases
11 September ability ABM Treaty Afghanistan agencies al-Qa'ida American assessment ballistic missile biological BOMBING Chairman GRAHAM challenges Chechnya chemical China COMMITTEE ON INTELLIGENCE conflict diamonds CONGRES CONGRESS THE LIBRARY continue cooperation counterterrorism countries criminal Cuba deploy Director TENET economic efforts extremists facilities forces foreign global HIV/AIDS Hizballah hold on power ICBM impact increase infrastructure Intelligence Community Intelligence Community's interests international terrorism investigations Iran Iran's Iraq Islamic law enforcement LIBRA LIBRARY OF CONGRESS Libya likelihood mass destruction Middle East military missile capabilities missile defense national security North Korea nuclear weapons operations Pakistan Palestinian political pose potential President Bush proliferation Pyongyang RARY reform regime regional remains RESS Russia Saddam September 11 Shahab-3 significant strategic Taliban target terrorist activities terrorist attacks terrorist groups terrorist threat trends United Usama Bin Ladin Vice Chairman SHELBY war on terrorism weapons of mass
Popular passages
Page 165 - Every nation, in every region, now has a decision to make: Either you are with us, or you are with the terrorists. From this day forward, any nation that continues to harbor or support terrorism will be regarded by the United States as a hostile regime.
Page 90 - Investigation (FBI) defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives...
Page 165 - Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.
Page 219 - Are less expensive than developing and producing ICBMs. • Can be covertly developed and employed; the source of the weapon could be masked in an attempt to evade retaliation. • Probably would be more reliable than ICBMs that have not completed rigorous testing and validation programs. • Probably would be more accurate than emerging ICBMs over the next 15 years. • Probably would be more effective for disseminating biological warfare agent than a ballistic missile. • Would avoid missile defenses.
Page 173 - The efforts of the Government of Iran to acquire weapons of mass destruction and the means to deliver them and its support of acts of international terrorism endanger the national security and foreign policy interests of the United States and those countries with which the United States shares common strategic and foreign policy objectives.
Page 127 - September 1 1 attacks demonstrated the nation's dependence on critical infrastructure systems that rely on electronic and computer networks. Further, he noted that attacks of this nature would become an increasingly viable option for terrorists as they and other foreign adversaries become more familiar with these targets and the technologies required to attack them.
Page 174 - Should you have any questions regarding this matter, please do not hesitate to contact me.
Page 91 - ... occur totally outside the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. (d) "Sabotage...
Page 91 - International terrorism" means activities that— (1) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States...
Page 108 - A web site hack that shuts down an e-commerce site can have disastrous consequences for a business. An intrusion that results in the theft of credit card numbers from an online vendor can result in significant financial loss and, more broadly, reduce consumers' willingness to engage in e-commerce.