FREE BOOKS

Author's List




PREV.   NEXT  
|<   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  
ganda, recruit new members, raise funds and other material resources, provide instruction on weapons and tactics, and plan operations. Without a communications ability, terrorist groups cannot effectively organize operations, execute attacks, or spread their ideology. We and our partners will continue to target the communication nodes of our enemy. --Propaganda operations, which are used by terrorists to justify violent action as well as inspire individuals to support or join the movement. The ability of terrorists to exploit the Internet and 24/7 worldwide media coverage allows them to bolster their prominence as well as feed a steady diet of radical ideology, twisted images, and conspiracy theories to potential recruits in all corners of the globe. Besides a global reach, these technologies allow terrorists to propagate their message quickly, often before an effective counter to terrorist messages can be coordinated and distributed. These are force multipliers for our enemy. --+_Deny terrorists entry to the United States and disrupt their travel internationally_+. Denying our enemies the tools to travel internationally and across and within our borders significantly impedes their mobility and can inhibit their effectiveness. They rely on illicit networks to facilitate travel and often obtain false identification documents through theft or in-house forgery operations. We will continue to enhance the security of the American people through a layered system of protections along our borders, at our ports, on our roadways and railways, in our skies, and with our international partners. We will continue to develop and enhance security practices and technologies to reduce vulnerabilities in the dynamic transportation network, inhibit terrorists from crossing U.S. borders, and detect and prevent terrorist travel within the United States. Our efforts will include improving all aspects of aviation security; promoting secure travel and identity documents; disrupting travel facilitation networks; improving border security and visa screening; and building international capacity and improving international information exchange to secure travel and combat terrorist travel. Our National Strategy to Combat Terrorist Travel and our National Strategy for Maritime Security will help guide our efforts. --+_Defend potential targets of attack_+. Our enemies are opportunistic, exploiting vulnerabilities and seeking alternatives to tho
PREV.   NEXT  
|<   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  



Top keywords:

travel

 

terrorists

 

terrorist

 

security

 
operations
 

borders

 

international

 

improving

 

continue

 

vulnerabilities


inhibit

 

technologies

 

networks

 
secure
 
efforts
 
enhance
 

documents

 

National

 

Strategy

 

ideology


States

 

internationally

 

ability

 
United
 

enemies

 

potential

 
partners
 
forgery
 

layered

 
protections

exploiting
 

system

 
people
 

American

 
seeking
 

facilitate

 

mobility

 
effectiveness
 

impedes

 

significantly


alternatives

 
identification
 

obtain

 

illicit

 
practices
 

facilitation

 

border

 

Security

 
disrupting
 

identity