National Strategy for Combating Terrorism Part 2
You’re reading novel National Strategy for Combating Terrorism Part 2 online at LightNovelFree.com. Please use the follow button to get notification about the latest chapter next time when you visit LightNovelFree.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy!
With regard to our own efforts, our comprehensive approach for addressing WMD terrorism hinges on six objectives, and we will work across all objectives simultaneously to maximize our ability to eliminate the threat.
--+_Determine terrorists' intentions, capabilities, and plans to develop or acquire WMD_+. We need to understand and a.s.sess the credibility of threat reporting and provide technical a.s.sessments of terrorists' WMD capabilities.
--+_Deny terrorists access to the materials, expertise, and other enabling capabilities required to develop WMD_+. We have an aggressive, global approach to deny our enemies access to WMDrelated materials (with a particular focus on weapons-usable fissile materials), fabrication expertise, methods of transport, sources of funds, and other capabilities that facilitate the execution of a WMD attack. In addition to building upon existing initiatives to secure materials, we are developing innovative approaches that blend cla.s.sic counterproliferation, nonproliferation, and counterterrorism efforts.
--+_Deter terrorists from employing WMD_+. A new deterrence calculus combines the need to deter terrorists and supporters from contemplating a WMD attack and, failing that, to dissuade them from actually conducting an attack. Traditional threats may not work because terrorists show a wanton disregard for the lives of innocents and in some cases for their own lives. We require a range of deterrence strategies that are tailored to the situation and the adversary. We will make clear that terrorists and those who aid or sponsor a WMD attack would face the prospect of an overwhelming response to any use of such weapons. We will seek to dissuade attacks by improving our ability to mitigate the effects of a terrorist attack involving WMD--to limit or prevent large-scale casualties, economic disruption, or panic.
Finally, we will ensure that our capacity to determine the source of any attack is well-known, and that our determination to respond overwhelmingly to any attack is never in doubt.
--+_Detect and disrupt terrorists' attempted movement of WMD-related materials, weapons, and personnel_+. We will expand our global capability for detecting illicit materials, weapons, and personnel transiting abroad or heading for the United States or U.S. interests overseas. We will use our global partners.h.i.+ps, international agreements, and ongoing border security and interdiction efforts. We also will continue to work with countries to enact and enforce strict penalties for WMD trafficking and other suspect WMD-related activities.
--+_Prevent and respond to a WMD-related terrorist attack_+. Once the possibility of a WMD attack against the United States has been detected, we will seek to contain, interdict, and eliminate the threat.
We will continue to develop requisite capabilities to eliminate the possibility of a WMD operation and to prevent a possible follow-on attack. We will prepare ourselves for possible WMD incidents by developing capabilities to manage the range of consequences that may result from such an attack against the United States or our interests around the world.
--Define the nature and source of a terrorist-employed WMD device.
Should a WMD terrorist attack occur, the rapid identification of the source and perpetrator of an attack will enable our response efforts and may be critical in disrupting follow-on attacks. We will develop the capability to a.s.sign responsibility for the intended or actual use of WMD via accurate attribution--the rapid fusion of technical forensic data with intelligence and law enforcement information.
+Deny terrorists the support and sanctuary of rogue states+. The United States and its allies and partners in the War on Terror make no distinction between those who commit acts of terror and those who support and harbor terrorists. Any government that chooses to be an ally of terror has chosen to be an enemy of freedom, justice, and peace. The world will hold those regimes to account. To break the bonds between rogue states and our terrorist enemies, we will work to disrupt the flow of resources from states to terrorists while simultaneously working to end state sponsors.h.i.+p of terrorism.
--+_End state sponsors.h.i.+p of terrorism_+. State sponsors are a critical resource for our terrorist enemies, often providing funds, weapons, training, safe pa.s.sage, and sanctuary. Some of these countries have developed or have the capability to develop WMD and other destabilizing technologies that could fall into the hands of terrorists. The United States currently designates five state sponsors of terrorism: Iran, Syria, Sudan, North Korea, and Cuba. We will maintain sanctions against them and promote their international isolation until they end their support for terrorists, including the provision of sanctuary. To further isolate these regimes and persuade other states not to sponsor terror, we will use a range of tools and efforts to delegitimate terrorism as an instrument of statecraft. Any act of international terrorism, whether committed by a state or individual, is reprehensible, a threat to international peace and security, and should be unequivocally and uniformly rejected. Similarly, states that harbor and a.s.sist terrorists are as guilty as the terrorists, and they will be held to account.
Iran remains the most active state sponsor of international terrorism.
Through its Islamic Revolutionary Guard Corps and Ministry of Intelligence and Security, the regime in Tehran plans terrorist operations and supports groups such as Lebanese Hizballah, Hamas, and Palestine Islamic Jihad (PIJ). Iran also remains unwilling to account for and bring to justice senior al-Qaida members it detained in 2003.
Most troubling is the potential WMD-terrorism nexus that emanates from Tehran. Syria also is a significant state sponsor of terrorism and thus a priority for concern. The regime in Damascus supports and provides haven to Hizballah, Hamas, and PIJ. We will continue to stand with the people of Iran and Syria against the regimes that oppress them at home and sponsor terror abroad.
While Iranian and Syrian terrorist activities are especially worrisome, we are pressing all state sponsors to take the steps that are required to have state sponsors.h.i.+p designation rescinded. Each case is unique, and our approach to each will be tailored accordingly. Moreover, we never foreclose future members.h.i.+p in the coalition against tyranny and terror. The designation of Iraq as a state sponsor was rescinded in 2004 as it transitioned to democracy, ceased its terrorist support, and became an ally in the War on Terror. Similarly, the United States in June 2006 rescinded the designation of Libya, which has renounced terrorism and since September 11 has provided excellent cooperation to the United States and other members of the international community in response to the new global threats we face. Libya can serve as a model for states who wish to rejoin the community of nations by rejecting terror.
--+_Disrupt the flow of resources from rogue states to terrorists_+.
Until we can eliminate state sponsors.h.i.+p of terror, we will disrupt and deny the flow of support from states to terrorists. We will continue to create and strengthen international will to interdict material support, akin to our efforts in the Proliferation Security Initiative--a global effort to stop s.h.i.+pments of WMD, their delivery systems, and related material. We will build international cooperation to financially isolate rogue states and their terrorist proxies. We also will continue to expose the vehicles and fronts that states use to support their terrorist surrogates.
+Deny terrorists control of any nation they would use as a base and launching pad for terror+. Our terrorist enemies are striving to claim a strategic country as a haven for terror. From this base, they could destabilize the Middle East and strike America and other free nations with everincreasing violence. This we can never allow. Our enemies had established a sanctuary in Afghanistan prior to Operation Enduring Freedom, and today terrorists see Iraq as the central front of their fight against the United States. This is why success in helping the Afghan and Iraqi peoples forge effective democracies is vital. We will continue to prevent terrorists from exploiting ungoverned or under-governed areas as safehavens--secure s.p.a.ces that allow our enemies to plan, organize, train, and prepare for operations.
Ultimately, we will eliminate these havens altogether.
--+_Eliminate physical safehavens_+. Physical sanctuaries can stretch across an entire sovereign state, be limited to specific ungoverned or ill-governed areas in an otherwise functioning state, or cross national borders. In some cases the government wants to exercise greater effective sovereignty over its lands and maintain control within its borders but lacks the necessary capacity. We will strengthen the capacity of such War on Terror partners to reclaim full control of their territory through effective police, border, and other security forces as well as functioning systems of justice. To further counter terrorist exploitation of under-governed lands, we will promote effective economic development to help ensure long-term stability and prosperity. In failing states or states emerging from conflict, the risks are significant. Spoilers can take advantage of instability to create conditions terrorists can exploit. We will continue to work with foreign partners and international organizations to help prevent conflict and respond to state failure by building foreign capacity for peace operations, reconstruction, and stabilization so that countries in transition can reach a sustainable path to peace, democracy, and prosperity. Where physical havens cross national boundaries, we will continue to work with the affected countries to help establish effective cross-border control. Yet some countries will be reluctant to fulfill their sovereign responsibilities to combat terrorist-related activities within their borders. In addition to cooperation and sustained diplomacy, we will continue to partner with the international community to persuade states to meet their obligations to combat terrorism and deny safehaven under U.N. Security Council Resolution 1373.
Yet safehavens are not just limited to geographic territories. They also can be non-physical or virtual, existing within legal, cyber, and financial systems.
--+_Legal safehavens_+. Some legal systems lack adequate procedural, substantive, and international a.s.sistance laws that enable effective investigation, prosecution, and extradition of terrorists. Such gaps offer a haven in which terrorists and their organizations can operate free from fear of prosecution. In the United States we have developed a domestic legal system that supports effective investigation and prosecution of terrorist activities while preserving individual privacy, the First Amendment rights of a.s.sociation, religious freedom, free speech, and other civil rights. We will continue to work with foreign partners to build their legal capacity to investigate, prosecute, and a.s.sist in the foreign prosecution of the full range of terrorist activities--from provision of material support to conspiracy to operational planning to a completed act of terrorism.
--+_Cyber safehavens_+. The Internet provides an inexpensive, anonymous, geographically unbounded, and largely unregulated virtual haven for terrorists. Our enemies use the Internet to develop and disseminate propaganda, recruit new members, raise and transfer funds, train members on weapons use and tactics, and plan operations.
Terrorist organizations can use virtual safehavens based anywhere in the world, regardless of where their members or operatives are located.
Use of the Internet, however, creates opportunities for us to exploit.
To counter terrorist use of the Internet as a virtual sanctuary, we will discredit terrorist propaganda by promoting truthful and peaceful messages. We will seek ultimately to deny the Internet to the terrorists as an effective safehaven for their propaganda, proselytizing, recruitment, fundraising, training, and operational planning.
--+_Financial safehavens_+. Financial systems are used by terrorist organizations as a fiscal sanctuary in which to store and transfer the funds that support their survival and operations. Terrorist organizations use a variety of financial systems, including formal banking, wire transfers, debit and other stored value cards, online value storage and value transfer systems, the informal hawala system, and cash couriers. Terrorist organizations may be able to take advantage of such financial systems either as the result of willful complicity by financial inst.i.tutions or as the result of poor oversight and monitoring practices. Domestically, we have hardened our financial systems against terrorist abuse by promulgating effective regulations, requiring financial inst.i.tutions to report suspicious transactions, and building effective public/private partners.h.i.+ps. We will continue to work with foreign partners to ensure they develop and implement similar regulations, requirements, and partners.h.i.+ps with their financial inst.i.tutions. We also will continue to use the domestic and international designation and targeted sanctions regimes provided by, among other mechanisms, Executive Order 13224, USA PATRIOT Act Section 311, and United Nations Security Council Resolution 1267 and subsequent resolutions. These tools identify and isolate those actors who form part of terrorist networks or facilitate their activities.
+Inst.i.tutionalizing Our Strategy for Long-term Success+
The War on Terror will be a long war. Yet we have mobilized to win other long wars, and we can and will win this one. During the Cold War we created an array of domestic and international inst.i.tutions and enduring partners.h.i.+ps to defeat the threat of communism. Today, we require similar transformational structures to carry forward the fight against terror and to help ensure our ultimate success:
--+_Establish and maintain international standards of accountability_+.
States that have sovereign rights also have sovereign responsibilities, including the responsibility to combat terrorism. The international community has developed a compelling body of international obligations relating to counterterrorism. Twelve universal conventions and protocols in force against terrorism have been developed under the auspices of the United Nations as well as various U.N. Security Council Resolutions related to combating terror. These include UNSCR 1373, which imposes binding obligations on all states to suppress and prevent terrorist financing, improve their border controls, enhance information sharing and law enforcement cooperation, suppress the recruitment of terrorists, and deny them sanctuary.
The Group of Eight (G-8) along with other multilateral and regional bodies also have been instrumental in developing landmark counterterrorism standards and best practices that have been adopted by international standard-setting organizations. But our obligations are not static. We will collaborate with our partners to update and tailor international obligations to meet the evolving nature of the terrorist enemies and threats we face. We also will work to ensure that each country is both willing and able to meet its counterterrorist responsibilities. Finally, we will not just continually monitor whether we and the community of nations are meeting these standards but will evaluate if we are achieving results both individually and collectively.
--+_Strengthen coalitions and partners.h.i.+ps_+. Since September 11, most of our important successes against al-Qaida and other terrorist organizations have been made possible through effective partners.h.i.+ps.
Continued success depends on the actions of a powerful coalition of nations maintaining a united front against terror. Multilateral groups such as the International Maritime Organization and the International Civil Aviation Organization, as well as regional organizations such as the Asia-Pacific Economic Cooperation, the Organization of American States, NATO, the European Union, the African Union, and the a.s.sociation of South East Asia Nations, among others, are essential elements of this front.
We will ensure that such international cooperation is an enduring feature of the long war we will fight. We will continue to leverage the comparative advantage of these inst.i.tutions and organizations--drawing on what each does best in counterterrorism, from setting standards to developing regional strategies to providing forums for training and education. Indeed, a significant part of this effort includes expanding partners.h.i.+p capacity. We are building the capacity of foreign partners in all areas of counterterrorism activities, including strengthening their ability to conduct law enforcement, intelligence, and military counterterrorism operations. Through the provision of training, equipment, and other a.s.sistance, the United States, along with a coalition of willing and able states and organizations, will enhance the ability of partners across the globe to attack and defeat terrorists, deny them funding and freedom of movement, secure their critical infrastructures, and deny terrorists access to WMD and safehavens. Ultimately, it will be essential for our partners to come together to facilitate appropriate international, regional, and local solutions to the challenges of terrorism.
--+_Enhance government architecture and interagency collaboration_+. In the aftermath of September 11, we have enhanced our counterterrorism architecture and interagency collaboration by setting clear national priorities and transforming the government to achieve those priorities.
We have established the Department of Homeland Security, bringing under one authority 22 Federal ent.i.ties with vital roles to play in preventing terrorist attacks within the Homeland, reducing America's vulnerability to terrorism, and minimizing the damage and facilitating the recovery from attacks that do occur. We have reorganized the Intelligence Community. The Director of National Intelligence (DNI) was created to better integrate the efforts of the Community into a more unified, coordinated, and effective whole. The DNI also launched a new Open Source Center to coordinate open source intelligence and ensure this information is integrated into Intelligence Community products.
In addition, a National Counterterrorism Center (NCTC) was established to serve as a multiagency center a.n.a.lyzing and integrating all intelligence pertaining to terrorism, including threats to U.S.
interests at home and abroad. NCTC also is responsible for developing, implementing, and a.s.sessing the effectiveness of strategic operational planning efforts to achieve counterterrorism objectives. We similarly established a National Counterproliferation Center to manage and coordinate planning and activities in those areas.
The transformation extends to the Federal Bureau of Investigation, which, with the help of legislation such as the USA PATRIOT Act, is now more fully integrated with the Intelligence Community, has refocused its efforts on preventing terrorism, and has been provided important tools to pursue this mission. CIA also has transformed to fulfill its role to provide overall direction for and coordination of overseas human intelligence operations of Intelligence Community elements. In addition, the Department of the Treasury created the Office of Terrorism and Financial Intelligence to arm ourselves for the long term with the intelligence and tools to undercut the financial underpinnings of terrorism around the world.
The Department of Defense also is preparing to meet a wider range of asymmetric challenges by restructuring its capabilities, rearranging its global posture, and adapting its forces to be better positioned to fight the War on Terror. This includes significantly expanding Special Operations Forces, increasing the capabilities of its general purpose forces to conduct irregular warfare operations, and initiating the largest rearrangement of its global force posture since the end of World War II.
The Department of State is implementing a new framework for foreign a.s.sistance to establish more integrated and coherent strategic direction and tactical plans to meet our current and longterm challenges, including terrorism. The State Department also is repositioning its domestic and overseas staff to better promote America's policies and interests and have more direct local and regional impact. This transformational diplomacy positions State to work with partners around the world to build and sustain democratic, well-governed states that will respond to the needs of their people and conduct themselves responsibly in the international system.
We will sustain the transformation already under way in these and other departments and agencies. Moreover, we will continue to build and strengthen a unified team across the counterterrorism community, and a key component of this effort will be fostering "jointness." Where practicable, we will increase interagency and intergovernmental a.s.signments for personnel in counterterrorism-related positions. This will help to break down organizational stovepipes and advance the exchange of ideas and practices for more effective counterterrorism efforts.
--+_Foster intellectual and human capital_+. To better prepare ourselves for a generational struggle against terrorism and the extremist ideologies fueling it, we will create an expert community of counterterrorism professionals. We will continue to establish more systematic programs for the development and education of current professionals in counterterrorism-related fields. We will substantively expand our existing programs with curricula that includes not only training in counterterrorism policies, plans and planning, strategies, and legal authorities, but continuing education in appropriate area studies, religious philosophies, and languages. We also will ensure that personnel throughout all levels of government and in all fields related to combating terror are invited to partic.i.p.ate.
Yet such development and education programs must not be restricted to current counterterrorism personnel. We will support multidisciplinary studies throughout our educational system to build a knowledgeable pool of counterterrorism recruits for the future. The recent National Security Language Initiative is an essential step forward. It will help to expand U.S. foreign language education beginning in early childhood and continuing throughout formal schooling and into the workforce. Our efforts to foster intellectual and human capital also will extend beyond our borders--to academic and non-governmental forums with our international partners to discuss and enhance our knowledge about the critical counterterrorism challenges we confront.
In the War on Terror, there is also a need for all elements of our Nation--from Federal, State, and local governments to the private sector to local communities and individual citizens--to help create and share responsibilities in a Culture of Preparedness. This Culture of Preparedness, which applies to all catastrophes and all hazards, natural or man-made, rests on four principles: a shared acknowledgement of the certainty of future catastrophes and that creating a prepared Nation will be a continuing challenge; the importance of initiative and accountability at all levels of society; the role of citizen and community preparedness; and finally, the roles of each level of government and the private sector in creating a prepared Nation. Built upon a foundation of partners.h.i.+ps, common goals, and shared responsibility, the creation of a Culture of Preparedness will be among our most profound and enduring transformations in the broader effort to protect and defend the Homeland.
+Conclusion+
Since the September 11 attacks, America is safer, but we are not yet safe. We have done much to degrade al-Qaida and its affiliates and to undercut the perceived legitimacy of terrorism. Our Muslim partners are speaking out against those who seek to use their religion to justify violence and a totalitarian vision of the world. We have significantly expanded our counterterrorism coalition, transforming old adversaries into new and vital partners in the War on Terror. We have liberated more than 50 million Afghans and Iraqis from despotism, terrorism, and oppression, permitting the first free elections in recorded history for either nation. In addition, we have transformed our governmental inst.i.tutions and framework to wage a generational struggle. There will continue to be challenges ahead, but along with our partners, we will attack terrorism and its ideology, and bring hope and freedom to the people of the world. This is how we will win the War on Terror.
National Strategy for Combating Terrorism Part 2
You're reading novel National Strategy for Combating Terrorism Part 2 online at LightNovelFree.com. You can use the follow function to bookmark your favorite novel ( Only for registered users ). If you find any errors ( broken links, can't load photos, etc.. ), Please let us know so we can fix it as soon as possible. And when you start a conversation or debate about a certain topic with other people, please do not offend them just because you don't like their opinions.
National Strategy for Combating Terrorism Part 2 summary
You're reading National Strategy for Combating Terrorism Part 2. This novel has been translated by Updating. Author: National Security Council already has 1231 views.
It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.
LightNovelFree.com is a most smartest website for reading novel online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to LightNovelFree.com
- Related chapter:
- National Strategy for Combating Terrorism Part 1