exploit. We will continue to work with
foreign partners and international organizations to help prevent
conflict and respond to state failure by building foreign capacity for
peace operations, reconstruction, and stabilization so that countries
in transition can reach a sustainable path to peace, democracy, and
prosperity. Where physical havens cross national boundaries, we will
continue to work with the affected countries to help establish
effective cross-border control. Yet some countries will be reluctant to
fulfill their sovereign responsibilities to combat terrorist-related
activities within their borders. In addition to cooperation and
sustained diplomacy, we will continue to partner with the international
community to persuade states to meet their obligations to combat
terrorism and deny safehaven under U.N. Security Council Resolution
1373.
Yet safehavens are not just limited to geographic territories. They
also can be non-physical or virtual, existing within legal, cyber, and
financial systems.
--+_Legal safehavens_+. Some legal systems lack adequate procedural,
substantive, and international assistance laws that enable effective
investigation, prosecution, and extradition of terrorists. Such gaps
offer a haven in which terrorists and their organizations can operate
free from fear of prosecution. In the United States we have developed a
domestic legal system that supports effective investigation and
prosecution of terrorist activities while preserving individual
privacy, the First Amendment rights of association, religious freedom,
free speech, and other civil rights. We will continue to work with
foreign partners to build their legal capacity to investigate,
prosecute, and assist in the foreign prosecution of the full range of
terrorist activities--from provision of material support to conspiracy
to operational planning to a completed act of terrorism.
--+_Cyber safehavens_+. The Internet provides an inexpensive,
anonymous, geographically unbounded, and largely unregulated virtual
haven for terrorists. Our enemies use the Internet to develop and
disseminate propaganda, recruit new members, raise and transfer funds,
train members on weapons use and tactics, and plan operations.
Terrorist organizations can use virtual safehavens based anywhere in
the world, regardless of where their members or operatives are located.
Use of the Internet, however, creates opportunities for us to exploit.
To counter terrori
|