t
group--they make it run. Technology and globalization have enhanced the
ability of groups to recruit foot soldiers to their cause, including
well-educated recruits. We and our partners will not only continue to
capture and kill foot soldiers, but will work to halt the influx of
recruits into terrorist organizations as well. Without a continuing
supply of personnel to facilitate and carry out attacks, these groups
ultimately will cease to operate.
--Weapons, or the tools of terrorists and the means by which they
murder to advance their cause. Terrorists exploit many avenues to
develop and acquire weapons, including through state sponsors, theft or
capture, and black market purchases. Our enemies employ existing
technology--explosives, small arms, missiles and other devices--in both
conventional and unconventional ways to terrorize and achieve mass
effects. They also use non-weapon technologies as weapons, such as the
airplanes on September 11. Our greatest and gravest concern, however,
is WMD in the hands of terrorists. Preventing their acquisition and the
dire consequences of their use is a key priority of this strategy.
--Funds, which provide the fungible, easily transportable means to
secure all other forms of material support necessary to the survival
and operation of terrorist organizations. Our enemies raise funds
through a variety of means, including soliciting contributions from
supporters; operating businesses, NGOs, and charitable fronts; and
engaging in criminal activity such as fraud, extortion, and kidnapping
for ransom. They transfer funds through several mechanisms, including
the formal banking system, wire transfers, debit or "smart" cards, cash
couriers, and hawalas, which are alternative remittance systems based
on trust. Effective disruption of funding sources and interdiction of
transfer mechanisms can help our partners and us to starve terrorist
networks of the material support they require.
--Communications, which allow terrorists the ability to receive, store,
manipulate, and exchange information. The methods by which terrorists
communicate are numerous and varied. Our enemies rely on couriers and
face-to-face contacts with associates and tend to use what is
accessible in their local areas as well as what they can afford. They
also use today's technologies with increasing acumen and
sophistication. This is especially true with the Internet, which they
exploit to create and disseminate propa
|