FREE BOOKS

Author's List




PREV.   NEXT  
|<   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  
exploit. We will continue to work with foreign partners and international organizations to help prevent conflict and respond to state failure by building foreign capacity for peace operations, reconstruction, and stabilization so that countries in transition can reach a sustainable path to peace, democracy, and prosperity. Where physical havens cross national boundaries, we will continue to work with the affected countries to help establish effective cross-border control. Yet some countries will be reluctant to fulfill their sovereign responsibilities to combat terrorist-related activities within their borders. In addition to cooperation and sustained diplomacy, we will continue to partner with the international community to persuade states to meet their obligations to combat terrorism and deny safehaven under U.N. Security Council Resolution 1373. Yet safehavens are not just limited to geographic territories. They also can be non-physical or virtual, existing within legal, cyber, and financial systems. --+_Legal safehavens_+. Some legal systems lack adequate procedural, substantive, and international assistance laws that enable effective investigation, prosecution, and extradition of terrorists. Such gaps offer a haven in which terrorists and their organizations can operate free from fear of prosecution. In the United States we have developed a domestic legal system that supports effective investigation and prosecution of terrorist activities while preserving individual privacy, the First Amendment rights of association, religious freedom, free speech, and other civil rights. We will continue to work with foreign partners to build their legal capacity to investigate, prosecute, and assist in the foreign prosecution of the full range of terrorist activities--from provision of material support to conspiracy to operational planning to a completed act of terrorism. --+_Cyber safehavens_+. The Internet provides an inexpensive, anonymous, geographically unbounded, and largely unregulated virtual haven for terrorists. Our enemies use the Internet to develop and disseminate propaganda, recruit new members, raise and transfer funds, train members on weapons use and tactics, and plan operations. Terrorist organizations can use virtual safehavens based anywhere in the world, regardless of where their members or operatives are located. Use of the Internet, however, creates opportunities for us to exploit. To counter terrori
PREV.   NEXT  
|<   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  



Top keywords:

prosecution

 

foreign

 

safehavens

 

continue

 
members
 

terrorists

 

countries

 

effective

 

virtual

 

international


organizations

 

activities

 

Internet

 
terrorist
 
systems
 
terrorism
 

rights

 

combat

 

physical

 

capacity


exploit

 

partners

 

operations

 
investigation
 

provision

 

assist

 
investigate
 
prosecute
 

material

 
privacy

conspiracy
 

operational

 
support
 

Amendment

 
planning
 

individual

 

States

 
freedom
 

speech

 

supports


system

 
preserving
 

domestic

 

religious

 
association
 

developed

 

develop

 

Terrorist

 
weapons
 

tactics