FREE BOOKS

Author's List




PREV.   NEXT  
|<   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  
t group--they make it run. Technology and globalization have enhanced the ability of groups to recruit foot soldiers to their cause, including well-educated recruits. We and our partners will not only continue to capture and kill foot soldiers, but will work to halt the influx of recruits into terrorist organizations as well. Without a continuing supply of personnel to facilitate and carry out attacks, these groups ultimately will cease to operate. --Weapons, or the tools of terrorists and the means by which they murder to advance their cause. Terrorists exploit many avenues to develop and acquire weapons, including through state sponsors, theft or capture, and black market purchases. Our enemies employ existing technology--explosives, small arms, missiles and other devices--in both conventional and unconventional ways to terrorize and achieve mass effects. They also use non-weapon technologies as weapons, such as the airplanes on September 11. Our greatest and gravest concern, however, is WMD in the hands of terrorists. Preventing their acquisition and the dire consequences of their use is a key priority of this strategy. --Funds, which provide the fungible, easily transportable means to secure all other forms of material support necessary to the survival and operation of terrorist organizations. Our enemies raise funds through a variety of means, including soliciting contributions from supporters; operating businesses, NGOs, and charitable fronts; and engaging in criminal activity such as fraud, extortion, and kidnapping for ransom. They transfer funds through several mechanisms, including the formal banking system, wire transfers, debit or "smart" cards, cash couriers, and hawalas, which are alternative remittance systems based on trust. Effective disruption of funding sources and interdiction of transfer mechanisms can help our partners and us to starve terrorist networks of the material support they require. --Communications, which allow terrorists the ability to receive, store, manipulate, and exchange information. The methods by which terrorists communicate are numerous and varied. Our enemies rely on couriers and face-to-face contacts with associates and tend to use what is accessible in their local areas as well as what they can afford. They also use today's technologies with increasing acumen and sophistication. This is especially true with the Internet, which they exploit to create and disseminate propa
PREV.   NEXT  
|<   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  



Top keywords:

terrorists

 

including

 

enemies

 

terrorist

 
couriers
 

technologies

 

transfer

 

material

 

mechanisms

 

exploit


weapons

 

organizations

 

recruits

 
partners
 
groups
 
support
 

ability

 

capture

 

soldiers

 

transfers


soliciting

 

system

 

variety

 
engaging
 

hawalas

 

survival

 
operation
 
contributions
 

formal

 
kidnapping

operating
 

businesses

 
charitable
 

extortion

 
supporters
 

fronts

 

ransom

 
activity
 

criminal

 

banking


starve

 
accessible
 

afford

 

associates

 
numerous
 

varied

 

contacts

 

Internet

 
create
 

disseminate