Current and Projected National Security Threats to the United States: Hearing Before the Select Committee on Intelligence, United States Senate, One Hundred Seventh Congress, Second Session : Current and Projected National Security Threats to the United States, February 6, 2002U.S. Government Printing Office, 2002 - 348 pages |
From inside the book
Results 1-5 of 46
Page 6
... facilities , famous landmarks , and US infrastructure nodes such as airports , bridges , harbors , and dams . High profile events such as the Olympics or last weekend's Super Bowl also fit the terrorists ' interest in striking another ...
... facilities , famous landmarks , and US infrastructure nodes such as airports , bridges , harbors , and dams . High profile events such as the Olympics or last weekend's Super Bowl also fit the terrorists ' interest in striking another ...
Page 7
... facilities in Afghanistan show that Bin Ladin was pursuing a sophisticated biological weapons research program . • We also believe that Bin Ladin was seeking to acquire or develop a nuclear device . Al - Qa'ida may be pursuing a ...
... facilities in Afghanistan show that Bin Ladin was pursuing a sophisticated biological weapons research program . • We also believe that Bin Ladin was seeking to acquire or develop a nuclear device . Al - Qa'ida may be pursuing a ...
Page 15
... and BW agents complicates our assessment of offensive programs . Many CW and BW production capabilities are hidden in plants that 11 UNCLASSIFIED are virtually indistinguishable from genuine commercial facilities . And UNCLASSIFIED 15.
... and BW agents complicates our assessment of offensive programs . Many CW and BW production capabilities are hidden in plants that 11 UNCLASSIFIED are virtually indistinguishable from genuine commercial facilities . And UNCLASSIFIED 15.
Page 16
... facilities . And the technology behind CW and BW agents is spreading . We assess there is a significant risk within the next few years that we could confront an adversary — either terrorists or a rogue state - who possesses them . ( U ) ...
... facilities . And the technology behind CW and BW agents is spreading . We assess there is a significant risk within the next few years that we could confront an adversary — either terrorists or a rogue state - who possesses them . ( U ) ...
Page 17
... facilities , and its pledge in 1997 not to provide any new nuclear cooperation to Iran . • Chinese firms have in the past supplied dual - use CW - related production equipment and technology to Iran . We remain concerned that they may ...
... facilities , and its pledge in 1997 not to provide any new nuclear cooperation to Iran . • Chinese firms have in the past supplied dual - use CW - related production equipment and technology to Iran . We remain concerned that they may ...
Other editions - View all
Common terms and phrases
11 September ability ABM Treaty Afghanistan agencies al-Qa'ida American assessment ballistic missile biological BOMBING Chairman GRAHAM challenges Chechnya chemical China COMMITTEE ON INTELLIGENCE conflict diamonds CONGRES CONGRESS THE LIBRARY continue cooperation counterterrorism countries criminal Cuba deploy Director TENET economic efforts extremists facilities forces foreign global HIV/AIDS Hizballah hold on power ICBM impact increase infrastructure Intelligence Community Intelligence Community's interests international terrorism investigations Iran Iran's Iraq Islamic law enforcement LIBRA LIBRARY OF CONGRESS Libya likelihood mass destruction Middle East military missile capabilities missile defense national security North Korea nuclear weapons operations Pakistan Palestinian political pose potential President Bush proliferation Pyongyang RARY reform regime regional remains RESS Russia Saddam September 11 Shahab-3 significant strategic Taliban target terrorist activities terrorist attacks terrorist groups terrorist threat trends United Usama Bin Ladin Vice Chairman SHELBY war on terrorism weapons of mass
Popular passages
Page 165 - Every nation, in every region, now has a decision to make: Either you are with us, or you are with the terrorists. From this day forward, any nation that continues to harbor or support terrorism will be regarded by the United States as a hostile regime.
Page 90 - Investigation (FBI) defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives...
Page 165 - Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.
Page 219 - Are less expensive than developing and producing ICBMs. • Can be covertly developed and employed; the source of the weapon could be masked in an attempt to evade retaliation. • Probably would be more reliable than ICBMs that have not completed rigorous testing and validation programs. • Probably would be more accurate than emerging ICBMs over the next 15 years. • Probably would be more effective for disseminating biological warfare agent than a ballistic missile. • Would avoid missile defenses.
Page 173 - The efforts of the Government of Iran to acquire weapons of mass destruction and the means to deliver them and its support of acts of international terrorism endanger the national security and foreign policy interests of the United States and those countries with which the United States shares common strategic and foreign policy objectives.
Page 127 - September 1 1 attacks demonstrated the nation's dependence on critical infrastructure systems that rely on electronic and computer networks. Further, he noted that attacks of this nature would become an increasingly viable option for terrorists as they and other foreign adversaries become more familiar with these targets and the technologies required to attack them.
Page 174 - Should you have any questions regarding this matter, please do not hesitate to contact me.
Page 91 - ... occur totally outside the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. (d) "Sabotage...
Page 91 - International terrorism" means activities that— (1) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States...
Page 108 - A web site hack that shuts down an e-commerce site can have disastrous consequences for a business. An intrusion that results in the theft of credit card numbers from an online vendor can result in significant financial loss and, more broadly, reduce consumers' willingness to engage in e-commerce.