ganda, recruit new members,
raise funds and other material resources, provide instruction on
weapons and tactics, and plan operations. Without a communications
ability, terrorist groups cannot effectively organize operations,
execute attacks, or spread their ideology. We and our partners will
continue to target the communication nodes of our enemy.
--Propaganda operations, which are used by terrorists to justify
violent action as well as inspire individuals to support or join the
movement. The ability of terrorists to exploit the Internet and 24/7
worldwide media coverage allows them to bolster their prominence as
well as feed a steady diet of radical ideology, twisted images, and
conspiracy theories to potential recruits in all corners of the globe.
Besides a global reach, these technologies allow terrorists to
propagate their message quickly, often before an effective counter to
terrorist messages can be coordinated and distributed. These are force
multipliers for our enemy.
--+_Deny terrorists entry to the United States and disrupt their travel
internationally_+. Denying our enemies the tools to travel
internationally and across and within our borders significantly impedes
their mobility and can inhibit their effectiveness. They rely on
illicit networks to facilitate travel and often obtain false
identification documents through theft or in-house forgery operations.
We will continue to enhance the security of the American people through
a layered system of protections along our borders, at our ports, on our
roadways and railways, in our skies, and with our international
partners. We will continue to develop and enhance security practices
and technologies to reduce vulnerabilities in the dynamic
transportation network, inhibit terrorists from crossing U.S. borders,
and detect and prevent terrorist travel within the United States. Our
efforts will include improving all aspects of aviation security;
promoting secure travel and identity documents; disrupting travel
facilitation networks; improving border security and visa screening;
and building international capacity and improving international
information exchange to secure travel and combat terrorist travel. Our
National Strategy to Combat Terrorist Travel and our National Strategy
for Maritime Security will help guide our efforts.
--+_Defend potential targets of attack_+. Our enemies are
opportunistic, exploiting vulnerabilities and seeking alternatives to
tho
|