erdict terrorist ground, air, maritime,
and cyber traffic by positioning forces and assets to deny terrorists
access to new recruits, financing, equipment, arms, and information. As
part of this undertaking, our National Strategy to Combat Weapons of
Mass Destruction addresses the most serious of these threats and
outlines plans and policies to execute timely, effective interdiction
efforts against WMD-related materials, technologies, and expertise.
Some irresponsible governments--or extremist factions within
them--seeking to further their own agenda may provide terrorists access
to WMD. Such actions would be unacceptable to the United States. We are
prepared to act decisively to stop terrorists from acquiring WMD or
precursors.
Interdiction, whether against terrorist material support or WMD, will
be carefully coordinated to ensure prioritization of intelligence,
proper allocation of resources, and, when necessary, swift, decisive
action. We will not permit the world's most dangerous regimes and
terrorists to threaten us with the world's most destructive weapons.
Drug trafficking and protection schemes surrounding the drug trade also
generate vast sums of money for international organized crime
syndicates and terrorist organizations. Laundered through the
international financial system, this money then provides a huge source
of virtually untraceable funds to corrupt officials, bypass established
financial controls, and further other illegal activities, including
arms trafficking and migrant smuggling. These activities ensure a
steady supply of weapons and cash and ease the movement of operatives
for terrorist organizations worldwide. Breaking the nexus between drugs
and terror is a key objective in our war on terrorism and the National
Drug Control Strategy outlines U.S. goals in this area.
The United States will continue to work with our friends and allies to
disrupt the financing of terrorism. We will identify and block the
sources of funding, freeze the assets of terrorists and those who
support them, deny terrorists access to the international financial
system, protect legitimate charities from being abused by terrorists,
and prevent the movement of terrorists' assets through alternative
financial networks.
Sensitive technology in the hands of terrorists can be just as damaging
to our war efforts as weapons and financing. Therefore, we will
continue to pursue an aggressive strategy that identifies sensitiv
|