Current and Future Security Threats Ten Years after 9/11
|
|
- Anastasia McGee
- 7 years ago
- Views:
Transcription
1 Transcript Current and Future Security Threats Ten Years after 9/11 The Honorable Michael Chertoff Managing Principal and co-founder, Chertoff Group; and former Secretary of the US Department of Homeland Security ( ) Chair: Nik Gowing BBC World News Monday 5 September 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author(s)/ speaker(s) and Chatham House should be credited, preferably with the date of the publication or details of the event. Where this document refers to or reports statements made by speakers at an event every effort has been made to provide a fair representation of their views and opinions, but the ultimate responsibility for accuracy lies with this document s author(s). The published text of speeches and presentations may differ from delivery.
2 Nik Gowing: My name is Nik Gowing. I m a main presenter for BBC World News we broadcast right around the world but my job today is to make sure you get as much access as you d like to Michael Chertoff, the former Director for Homeland Security until three years ago, who was in the job for four years. He now runs his own consulting company employing about 40 people in Washington DC. Before that he was a Federal Judge on the US Court of Appeals for the Third Circuit and spent a decade as a federal prosecutor. Michael Chertoff: Thank you for hosting me. I appreciate the opportunity to speak at Chatham House. Now all my public life I ve heard of Chatham House rules and people say: Oh we re going to do Chatham House rules so I thought great, I ll get to go to the original Chatham House where the rules were formed. And then imagine my surprise when I find out they re not operable here today. I guess that counts as irony but that s fine, I m happy to be on the record. I m delighted also to be here with such a distinguished group of people. I know you re very interested in world affairs and in security matters and I hope we can have a discussion about this today because I want to make sure I leave plenty of time for questions. There s no doubt, because of the impending tenth anniversary of September 11, that there is a heightened period of interest in what has gone on since September 11 in terms of security and what lies ahead and I want to cover both of those areas with you this afternoon. I d like to make the argument that while September 11 itself did not cause a paradigm shift in the notion of security, it did reveal that a paradigm shift had occurred. It made manifest a serious of trends which I believe had been latent in security during the latter part of the last century. And here s what I mean. If you go back to the 20th Century, to the Cold War, there was a view of security that neatly bifurcated security issues into two categories. On the one hand there were issues of war and those were dealt with through the military. There was a distinctive set of doctrines and legal authorities that governed military behaviour and that was generally thought to deal with matters that occur when you re having other nation states as your adversary and really dealing outside of your own borders. 2
3 Then on the other hand there was law enforcement. Law enforcement was viewed as focused on crime, something that was domestic generally speaking or had had effects mainly that were within one s own borders, and that had a completely different set of authorities and institutions and laws that governed and for much of the latter part of the 20th Century how we dealt with security issues depended upon which category we put the issue into. So when we had wars like we had in Kuwait in 1990, that was a military problem and it was dealt with exclusively through the military agencies of the United States. When we had problems with transnational organized criminal gangs, that was viewed as a law enforcement problem and although the military was able to assist in a certain restricted way, by and large the authorities and the institutions that were engaged in fighting organized crime were law enforcement. I think actually that that model began to break down during the last decade of the last century but what became clear on 9/11 was how far from reality that model was. Think for a moment about what happened. On 9/11 the organization that carried out the attack was a transnational network. It operated with its headquarters in Afghanistan but the principal leaders of the hijacking were trained and radicalized in Germany, the financing came from the Middle East and the attack occurred in the United States. It was most definitely an international and transnational attack. It was not a nation state but the devastation that was caused was comparable to that of the most serious attacks the United States has ever sustained in any of its wars. Pearl Harbor resulted in fewer deaths than 9/11. So that in terms of outcome and consequence it would be very difficult to describe it as a criminal act you d have to describe it as comparable to an act of war. And so in my view it took the concept of terrorism to an entirely new level, and I m not just talking about the issue of quantity of deaths or the fact that there was an astronomical impact on our economy because of the loss of the World Trade Center and all the economic side effects that we felt with air traffic and other areas of transportation, but because it actually broke a barrier. It moved terrorism into the kind of attack that could have an earth-shattering catastrophic affect on a city or state or even a country. Another way to look at this concept of paradigm shift is to go to an earlier stage of our history. If you go back to the 1940s and 1950s when the nuclear bomb was first developed and exploded in Japan and then of course the Soviets developed their own bomb, now some people argued: Well, that s 3
4 just a bigger bomb, there s nothing different, there s no paradigm shift; an atomic bomb is just a bomb with a bigger bang. But I think wiser heads recognize that it wasn t just a matter of scale. It had actually qualitatively changed the nature of warfare and out of that arose a doctrine that created a very clear red line about not moving from conventional bombs to nuclear, even low-yield nuclear bombs, because of the recognition that would put you in a different paradigm. What I would argue is that terrorism likewise on 9/11 shifted paradigm and we began to see a scale of terrorism that demonstrated that conventional ideas of criminal prosecution were not adequate to the task. Looking back ten years where are we? I would argue that strategically what has happened is the concept of security has no longer relevance as a binary system between war and law enforcement. It s now about a spectrum where the tools that you use to combat terrorism have to be all of the tools of national power that includes the military, it includes law enforcement, it includes in fact elements of civilian agencies like the health authorities, like the disaster management authorities. In many respects this is encapsulated in the mandate of the Department of Homeland Security which I led from 2005 to 2009 because the doctrine of that department recognized that the variety of tools that would have to be applied to security would be much greater than was conceived of in the last century. If you look for example at the kinds of tools that the Department of Homeland Security coordinated or deployed and many of these were actually owned by other Departments but organized and managed through the Department of Homeland Security we had of course law enforcement authorities but we also coordinated with the military authorities at the Department of Defence. The health authorities were involved in the event that we were dealing with a biological threat or biological warfare. Transportation was involved because any attack on the United States obviously implicated the integrity of the transportation system, and so on and so on. So what you see is that the concept of security became much broader than could be embraced by the prior doctrine. Now this has some real implications for our doctrine and our legal authorities because we built the series of legal authorities in the 20th Century that were very much driven by the idea that some agencies focused on war fighting and overseas security and some focused on domestic security, and very little overlap between the two. In fact those of you who are familiar with our intelligence community know that there were very, very serious restrictions placed upon the ability of our 4
5 intelligence agencies to collect information about US persons on domestic matters and that was a reflection of this binary attitude and yet in the modern day and age, and 9/11 exemplifies it, it s very hard to see where overseas and at home separate. The plots span the borders, the personnel may easily be US persons as well as foreign persons, the communication, the travel, everything will involve both things that occur inside the United States and outside the United States and a set of authorities built on the premise that you can have a centre of gravity with security problems that is either overseas or at home simply doesn t mesh with reality. So it s my contention that we have to actually model a brand new strategy and doctrine for national security, one that embraces a very broad spectrum of capabilities, one that involves both traditional law enforcement agencies but also those that have been viewed as social services or civilian agencies, and they have to be coordinated in a way that allows them to operate seamlessly when they re responding to an emergency, particularly one that s driven by an act of terrorism. That is I think where we are with the modern doctrine of national security. You may ask the question, why has it changed. Why has this new paradigm arisen? As I said earlier, it s not because of 9/11 but it s what 9/11 made manifest and represented. Two trends have caused what I think is a profound change in the threat picture one is globalization, and the other is technology. Globalization means that for the first time a network can span the globe, it can communicate, travel and move money around the globe and it can form a set of relationships and in fact an agreement or a conspiracy as easily as a group of people meeting in a particular single geographic location. That s an enormous increase in scale. It means that like-minded people bound only by an ideology can now find each other and work together and can actually carry out activities simultaneously on other parts of the world. The second and equally profound change is the technological leverage that these groups now have. In the old days if you really wanted to have an impact in terms of damage you had to be a nation state, you had to be able to bring artillery and eventually bombers and missiles into the battlefield in order to really have major destruction of your enemy. Terrorists, even back in the days of the IRA, could detonate bombs and they could kill a relatively small number of people but they couldn t bring a catastrophic result to a city. 9/11 demonstrated that technology has now moved beyond that and I venture to say actually that was relatively modest compared to what we could see. A 5
6 terrorist group, for example, that fabricated a biological weapon could potentially cause an earth-shattering impact on a society, particularly if it was a contagious biological agent. likewise a terrorist group that got hold of a radiological bomb not a nuclear bomb, just a radiological bomb while it might not cause mass casualties, could render uninhabitable a significant part of a city. So that smaller and smaller numbers of people can now do more and more damage and when you add that to the global reach which I described that is a recipe for a much heightened threat environment from a much smaller group of people. So how do we deal with this? Fortunately, in the seeds of globalization and technology are also the solutions to some of these threats. For example, as I said, globalization relies on travel, communication and money but every time a terrorist group engages in one of these activities it creates a vulnerability and if you look at what has happened over the last 10 years, what you ll see is that much of what has developed as a national security strategy and again I m talking about everything from law enforcement to kinetic military action and all in between much of what has developed has focused on these three pillars of globalization: travel, communication and finance. For example, we collect much more data about travellers who come into the United States than was the case prior to 9/11 and through that data we are able to connect up and find links among people that would not have been evident to us without that information that allowed us to make those linkages. We ran an experiment some years back using passenger name record information which is collected by the airlines and we discovered that had we used that information on 9/11 or in 2001 we would have been able to connect 15 of the 19 hijackers to each other and to terrorists overseas. That would of course have been a huge step forward in terms of warning. Communications. As you know, ability to use electronic surveillance has given us the ability to penetrate plots while they re in the planning stage rather than waiting until the plot actually comes to fruition and again, that set of capabilities, whilst one that we ve used in the past, has probably become more important now from a security standpoint than ever before. And third, finance. You know because it was made public some years back. Regrettably, the US government was able to use legal authorities to use the interbank system to trace the financial flow of money that was used to finance terror and, again, it was that linkage that enabled us to identify and target people who were potential terrorists. 6
7 What all these have in common is that they re intelligence based security and I would argue that in the 21 Century, much as radar was the early-warning system in the last century, intelligence is the early-warning system of this century. That s why increasingly the focus of our security has to be how do we better collect intelligence, how do we better analyze intelligence and how do we better integrate and operationalize intelligence, because that is going to be how we move forward in the decades to come. With this in mind in terms of where we are tactically and strategically, I want to spend a little bit of time talking about where I think we are with respect to the actual security threats that we face. I m going to omit some things because there s a limited amount of time and I want to leave an opportunity for questions, so I won t talk about Iran and North Korea and the dangers that they pose in terms of geopolitical impact of nuclear weapons in those hands, I m not going to talk about the rise of China and what their new assertiveness in the Pacific is going to be. What I do want to talk about though is certain kinds of threats and I m agnostic as to whether the person who wields the threat is a nation state or not a nation state, although I ll talk a little bit about the terrorists. What is important is the capability in a global environment to use this kind of attack on the West and what the consequences of that are. I have to begin and obviously talk about al-qaeda because that was the group responsible on September 11 almost ten years ago and I think the general consensus view is that the traditional leadership of al-qaeda has been significantly damaged by years of relentless pressure, beginning with the invasion of Afghanistan which drove them out and which disrupted the planning and training and laboratory installations that they had set up within Afghanistan. Does that mean the leadership is decimated and finished? No. Even the death of bin Laden, while a welcome measure of justice, doesn t mean there isn t a younger generation of leaders that are rising. There are folks like Anwar al-awlaki in Yemen or Adnan Shukrijumah, presumably somewhere in South Asia, who actually have experience living in America and they re younger, they may not be as bound by some of the preconceptions that bin Laden and his generation of leaders had and in that sense they could be more innovative and therefore more dangerous. Even with that being said though, the loss of a good deal of accumulated experience in terrorism, most recently symbolized by the reported death of Atiyah Abd al-rahman that s a real loss of assets. It also means the ability 7
8 to focus on substantial planning of major operations is hampered by the fact that terrorists are worried about their own protection. On the other hand, and there s always another hand here, what we ve seen as pressure on South Asia has grown is the spread of the network and the invigoration of the network in other parts of the world. We see that in Yemen where Awlaki was involved in training the underwear bomber who got on the plane to go to Detroit and tried to detonate a bomb in his clothing. He was the inspiration apparently [inaudible] Army Major Nidal Hasan who was the US Army medical doctor who picked up a gun and killed over a dozen people in Fort Hood, and apparently Yemen was the source of the recently disclosed plot to take explosives and put them in printer cartridges and then send them by cargo jets. So clearly we re dealing with much more entrepreneurial terrorism coming from locations that are no longer located in the core where al-qaeda was for the last ten years. We see similar developments in Somalia, in the Maghreb in North Africa, and this suggests that we re going to have to be mindful that we don t get so focused on our operations in one area that we lose sight of the challenges in other areas. Another feature of what has happened in terms of our post 9/11 security is again another tactical shift by the enemy. One of the major focuses that we had in the US, and I think you had it here as well, was making it more difficult to bring operatives from other parts of the world into the United States, and so we put into effect quite a robust system of security at the airports and at the seaports and we also stepped up what we do between our ports of entry at the border. The consequence of this is, it s not impossible, but it s considerably more difficult to replicate the kind of movement of people into the United States that occurred in 2001 prior to September 11, and that s a very good thing. Not surprisingly though, the enemy, seeing this occurring and obviously being averse to being deterred by our increased security, began to think of an alternative method of developing operatives and the obvious answer is you pick people who are in place, American citizens, American legal residents, and thereby create weapons actually who are present in the homeland, home grown terrorists. We had home grown terrorism as early as You may remember there was a group up in Lackawanna, New York that had done some training with al-qaeda but no question that the frequency and seriousness of this has increased in the United States and it has certainly been a challenge here, 8
9 witness 7/7 and the August 2006 airline plot which I had the privilege of working with my counterparts here on [inaudible]. This is a challenge because the traditional tools we have built up on collecting and integrating information overseas don t work at home in quite the same way. The signal as they say is quite a bit a lower, the need to communicate using electronic communication is less people can meet face to face and travel, which has been one of the great vulnerabilities of global terrorism, is unnecessary because the people are here already. So that s causing us again to think about what we can do tactically to increase our ability to detect the plots in the homeland. Some of that involves changing our methods of collection and analysis with law enforcement, some of it involves driving education and training to the local police level so that we have many more people who are sensitive to what might be the precursors of a plot, and a lot of it frankly involves enlisting the community, getting the community to recognise that it is in their interest to speak up when something is afoot. And I have to say in many cases some of the most significant progress we ve made in frustrating plots in the United States that are home grown has been because members of the community stepped forward and alerted the police and the law enforcement. There are a couple of other areas that I d like to highlight before we take questions and these are the two areas at the other end of the scale. I ve talked about home grown terrorism. I ve said that the tactics are likely to change. We may see more Mumbai-style attacks and dynamic firearm attacks as opposed to big bombs but in the end I think that on the conventional side in the short-term, while we may see even greater frequency of terrorist attacks, they re likely to be smaller scale in terms of consequence. There are, however, two medium and long-term threats, actually one shortterm and one medium-to-long-term threat, which I think are potentially catastrophic and which we do have to focus on and here again I ll be agnostic as to who might carry these out. The first is cyber attacks. This has become thankfully somewhat more a matter of priority I think for security agencies around the world but it s been going on for a long time. We have seen one person estimated, or one group estimated, a trillion dollars in intellectual property [was] stolen through cyber attacks over the last several years. We ve seen millions of peoples personal data stolen and then those people victimized by cyber criminals. In Estonia in 2007 there was an attack on the government. In Georgia, when the Russians invaded in 2008, they accompanied that invasion with a cyber 9
10 attack on the command-and-control systems in Georgia. What this tells us is that both as a matter of criminality and as a matter of war because I would argue that Georgia s an example of warfare cyber has now become a domain that is as critical as air, land and sea. And what s particularly challenging about cyber is this; again, although nation states may have the edge in terms of sophistication, a sophisticated network can do quite a bit of damage. Second challenge attribution. In the old days if you were attacked it was pretty easy to figure out where the attack came from and that allowed us to come up with a doctrine and a regime of deterrence and response that was actually quite effective during the Cold War. The problem with the lack of attribution for cyber is: how do you deter what you can t prove, because you have deniability and that means we need to think very carefully about what our response would be to certain kinds of attacks. Obviously when we get theft of data we don t treat it as an act of war but supposing we had a major attack on a power system, a power grid or an air traffic system, one that potentially caused not only enormous economic damage but loss of life, would we regard that as an act of war and, if so, what would we feel it necessary to prove in order to retaliate and who would we prove it to? Would we take the position that if the server from which the attack was launched was in another country, that s sufficient grounds to eliminate the server or would we require some proof that it was malicious in intent and it wasn t really a server that was hijacked by some third party? How would we deal with collateral consequences if taking a server down to protect ourselves might have an impact on others who were innocent, who rely on data and the network that runs off of that server? These are very difficult questions and the problem is the notion of an attack is no longer theoretical, it s real, and that means we have to begin to answer these questions sooner rather than later. The second area I worry about is biological terrorism and biological warfare. We know, and the 9/11 Commission Report disclosed, that the terrorists in Afghanistan were experimenting with chemical and biological weapons. In 2001 there was a biological terror attack on the United States. That attack was launched apparently by a single individual who had an agenda in which I think he was trying to warn people about the problem and he was actually quite measured in how he distributed the anthrax. It was highly weaponized but he distributed it by mail and so the number of people who actually died was, again, comparatively small; obviously it s terrible when anybody dies but 10
11 it was comparatively small. Had that anthrax been put in a New York subway system there would have been many more deaths and probably an unusable subway system. So it s not a theoretical issue. It s a real issue. The ingredients to make a biological weapon exist in nature. What is needed and wanted is the know-how and the intent and that s why I think sooner or later we re going to have to confront this issue. Again, the good news is that there are counter-measures for many of the most likely and dangerous types of biological weapons. The difficulty is in getting governments to focus on the long-term investment, not just in money but in planning and operational training that is necessary to make sure we have an effective response. What I can tell you is that a serious biological attack would have consequences that could rival a nuclear bomb. It might not kill quite as many people in one moment but over time it could have huge casualties and huge economic impact and to make matters more complicated it would be widely distributed because if people had weaponized anthrax or something similar you can bet they wouldn t just fire once, they would fire multiple times. So to me these are two areas that require a lot of work and that we face in terms of challenges. I recognise that we re at a curious time now, ten years after 9/11. There is a great deal of hope that the tenth anniversary and the death of bin Laden can mark a turning of the page and in many ways it may turn the page on a chapter. Maybe al-qaeda 1.0 is wrapping up. The question is, what is al- Qaeda 2.0 going to be, and is it going to be more dangerous? The Arab Spring has caused a lot of hope and promise but I m reminded of the comment that Zhou Enlai is supposed to have made when asked about his views of the French Revolution and he said too soon to tell. I think it s too soon to tell what the Arab Spring means. It could be on the one hand a tremendous example of a way to deal with some of the challenges in the Middle East and South Asia that accomplishes results using the ballot box and the rule of law, and if that succeeds that s going to be a tremendous counter narrative to al-qaeda, but it could also result in a failed state or a partly failed state which experience shows is a fertile breeding ground for terrorism and for criminality. And finally, although I haven t talked much about transnational organized crime, that remains a big challenge and particularly in parts of my own hemisphere you have organized drug cartels that President Calderon of Mexico recently described as having really been terrorists because they 11
12 burned down a casino and killed dozens of people in it. This is a threat again that will mount over time because of globalization and technology and worse yet, we may yet see a time that terrorists and organized criminals make common cause. In North Africa for example, there is evidence that al-qaeda in the Maghreb has been providing a weigh station for narcotics travelling from South America into Europe. All of these lead me to believe that the security challenges of the 21st Century will be right across the spectrum, they will be fragmented rather than one or two big adversaries you have to deal with, they will require a much greater group of capabilities and a much larger group of hands as part of the team, and they will challenge our traditional doctrines and our traditional legal processes for how to deal with security. So welcome to the second decade of the 21st Century, and there ll be very big challenges ahead of us. Thank you. 12
Examples of International terrorist attacks since 9/11
PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the
More informationPOTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
More informationName. September 11, 2001: A Turning Point
Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationAssessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
More informationDoes NATO s Article V Genuinely Protect Its Members?
Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationAssessment of the terror threat to Denmark
28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationTerminology and Scripts: what you say will make a difference in your success
Terminology and Scripts: what you say will make a difference in your success Terminology Matters! Here are just three simple terminology suggestions which can help you enhance your ability to make your
More informationThe Nuclear Weapons Debate
Scottish CND - Education Pack The Nuclear Weapons Debate Scottish CND s educational resource Nuclear Weapons: Yes or No is aimed at late primary to early secondary school pupils. It has 4 units: The Nuclear
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More informationOption 1: Use the Might of the U.S. Military to End the Assad Regime
1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger
More informationOil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
More informationIN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) Criminal No. 01-455-A ) ZACARIAS MOUSSAOUI, ) Defendant ) Statement of Facts
More informationDid the Punishment Fit the Crime?
Teenagers and Criminal Justice Did the Punishment Fit the Crime? Fact Situation Hi, my name is Costas and I m 16. I spent my summer at the courthouse. I was on trial and was found guilty of killing a guy
More informationUnited Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationConversations. He received a B.A. in Mathematics and a Masters of Business Administration, both from Syracuse University.
Conversations on the Cutting Edge www.innovate1st.com November 2008 Building Emerging Businesses at IBM Michael Giersch Vice President, Strategic Planning IBM Mike s current responsibilities include managing
More informationOVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
More informationMobile App Development: How to Create a Useful App
Mobile App Development: How to Create a Useful App Written by Bethany Poole Published May 2016 Topics Apps, Mobile, Micro-Moments These days, it s easy to get caught up in cool, new technology and mobile
More informationLaw Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015
Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina
More informationCyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
More informationENGLISH PLACEMENT TEST
ENGLISH PLACEMENT TEST NAME: Look at these examples. The correct answers are underlined. a) In warm climates people like / likes / are liking sitting outside in the sun. b) If it is very hot, they sit
More informationAt the Frontline: Miami International Airport Security Director Lauren Stover
At the Frontline: Miami International Airport Security Director Lauren Stover by Joel Griffin Created: October 25, 2012 'Airport 24/7: Miami' star discusses how she got involved with the Travel Channel
More informationHere are several tips to help you navigate Fairfax County s legal system.
Since 2004, I ve been a daily presence in the Fairfax County Courthouse and have handled hundreds of drug cases as both a Prosecutor and a Defense Attorney. I have spent the last decade analyzing the legal
More informationCyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
More informationPIONEER INVESTMENT MANAGEMENT USA, INC. Moderator: Christine Seaver July 24, 2014 3:15 pm CT
Page 1 Following is an edited transcript from the July 24, 2014 conference call on Pioneer High Income Trust (ticker: PHT). Investment terms are defined at the end of the transcript. PIONEER INVESTMENT
More informationAPPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
More informationChairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
More informationAugmented reality enhances learning at Manchester School of Medicine
Augmented reality enhances learning at Manchester School of Medicine Welcome to the Jisc podcast. The University of Manchester is taking a unique approach to prescription training for its medical students
More informationTalking to our children about Violence and Terrorism: Living in Anxious times
Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike
More informationForeign Affairs and National Security
Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the
More informationResearch Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
More informationDear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.
Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN
More informationTheme: The Growing Role of Private Security Companies in Protecting the Homeland.
Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist
More informationBush Lets U.S. Spy on Callers Without Courts
Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December
More informationCould a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?
MANAGED IT SERVICES Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? A lot of business owners, executives, and managers have a love-hate relationship with managed
More informationPart I. Getting Started COPYRIGHTED MATERIAL
Part I Getting Started COPYRIGHTED MATERIAL Chapter 1 How to Make Millions on Google and Other Search Engines: My 10-Step Approach W hat do you do? People always ask that question when they first meet
More informationRobin Denburg - Asia Pacific Environmental Exchange
1 of 5 03/31/2005 3:51 PM Robin Denburg Asia Pacific Environmental Exchange Interviewee: Robin Denburg Affiliation: Asia Pacific Environmental Exchange Interviewer: Miguel Bocanegra Date of interview:
More informationHas globalisation made us more catastrophe-prone?
1 South Evaluation Africa sheet The 5 Rainbow Nation 1 After you have tested your skills in the mock exam on pages 110 111 in your textbook, fill in the self-assessment evaluation sheet below. If you think
More informationTest your talent How does your approach to talent strategy measure up?
1 Test your talent How does your approach to talent strategy measure up? Talent strategy or struggle? Each year at Head Heart + Brain we carry out research projects to help understand best practice in
More informationAlthough the dominant military confrontations of the 20 th century were centered on the
To what extent were the policies of the United States responsible for the outbreak and development of the Cold War between 1945 and 1949? Although the dominant military confrontations of the 20 th century
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationThe partnership has also led to a joint library catalogue between Suffolk and Cambridgeshire.
Case study: SPINE 2 What Our questionnaire response tells us that SPINE (Shared Partnership in the East) is: A partnership of library authorities comprising Cambridgeshire, Suffolk and Norfolk, focused
More informationFUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE
FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist
More informationCash Flow Exclusive / September 2015
Ralf Bieler Co-Founder, President, CEO Cash Flow Exclusive, LLC My 2 Cents on The Best Zero-Cost Strategy to Improve Your Business To achieve better business results you don t necessarily need to have
More informationDet talte ord gælder
Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar
More informationFirstly, I would like to thank the organizers of this symposium for
Keynote Address by former Prime Minister of Malaysia Are We Really Civilized? Make War a Crime Mahathir bin Mohamad Firstly, I would like to thank the organizers of this symposium for this opportunity
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationInformation about INTERVENTION ORDERS
Information about INTERVENTION ORDERS This publication has been prepared as a public service initiated by South Australia Police and, while every care has been taken in its preparation, no warranty is
More informationEU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationThe Korean War Veteran. Respect and Appreciation grows for Canada s Military
The Korean War Veteran Internet Journal - November 9, 2011 (Filed from Korea) Respect and Appreciation grows for Canada s Military By Peter Worthington grown across the country. Lieutenant Peter Worthington
More informationSpeech by Prime Minister Jawahar Lal Nehru in the United Nations General Assembly, New York, December 20, 1956.
Speech by Prime Minister Jawahar Lal Nehru in the United Nations General Assembly, New York, December 20, 1956. Towards A World Community The United Nations has grown in the eleven years of its existence.
More informationSubject: Review of Aviation Security in Australia
REF:SM/17/09/03 September 17, 2003 Mr John Carter Committee Secretary Joint Committee of Public Accounts & Audit Parliament House CANBERRA ACT 2600 Dear Mr Carter Subject: Review of Aviation Security in
More informationEspionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
More informationBackground Report: 9/11, Ten Years Later
Background Report: 9/11, Ten Years Later THE UNIQUE NATURE OF 9/11 Among terrorism incidents in the United States and around the world, al-qa ida s attacks on September 11, 21, are notably unique. FATALITIES
More informationFDA 50-State Conference Call OIG Early Alert on FDA s Voluntary Food Recall Initiation Process. June 10, 2016 2:30 pm EDT
Page 1 FDA 50-State Conference Call OIG Early Alert on FDA s Voluntary Food Recall Initiation Process June 10, 2016 2:30 pm EDT Operator: Welcome and thank you for standing by. At this time, all lines
More informationSecurity Management. Security is taken for granted until something goes wrong.
Security Management Security Management Security is taken for granted until something goes wrong. Concerns about security have existed for as long as has mankind. The most obvious manifestation of this
More informationTodd M. Rosenblum. Defining Homeland Security Intelligence
Prepared Remarks Todd M. Rosenblum Deputy Under Secretary of Intelligence Department of Homeland Security Defining Homeland Security Intelligence Washington Institute for Near East Policy June 4, 2010
More informationThe Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York
The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationMS Learn Online Feature Presentation Invisible Symptoms in MS Featuring Dr. Rosalind Kalb
Page 1 MS Learn Online Feature Presentation Invisible Symptoms in MS Featuring Dr. Rosalind Kalb >>Kate Milliken: Hello, I m Kate Milliken, and welcome to MS Learn Online. No two people have exactly the
More informationVulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists
Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental
More informationTop Ten Mistakes in the FCE Writing Paper (And How to Avoid Them) By Neil Harris
Top Ten Mistakes in the FCE Writing Paper (And How to Avoid Them) By Neil Harris Top Ten Mistakes in the FCE Writing Paper (And How to Avoid Them) If you re reading this article, you re probably taking
More informationMonetizing Mobile. How Broadcasters Can Generate Revenue With Mobile Apps. 2016 jācapps
Monetizing Mobile How Broadcasters Can Generate Revenue With Mobile Apps 2016 jācapps Contents Mobile Revenue Growth 4 5 Principles for Monetizing Mobile. 6 1: An Ad is Not an Ad 7 2: Embrace What Differentiates
More information10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationThe first time my triathlon coach saw me swim,
Reaching the Podium: Justin Thomas, CFP How You Can Achieve Your Financial Goals 1 The first time my triathlon coach saw me swim, he wasn t very optimistic. You look like an electrocuted frog, he said.
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More informationHypothesis testing. c 2014, Jeffrey S. Simonoff 1
Hypothesis testing So far, we ve talked about inference from the point of estimation. We ve tried to answer questions like What is a good estimate for a typical value? or How much variability is there
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationWomen s Rights: Issues for the Coming Decades
September 24, 2010 Suzanne B. Goldberg Columbia Law School Remarks for the International Conference on the Protection of Women s Rights Women s Rights: Issues for the Coming Decades I am delighted to be
More information7 PROVEN TIPS GET MORE BUSINESS ONLINE
7 PROVEN TIPS GET MORE BUSINESS ONLINE A beginners guide to better SEO About The Author Damien Wilson @wilson1000 Damien is the award winning Managing Director of My Website Solutions where he overlooks
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationTHE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM
THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL
More informationROLES TO ASSIGN. 1. Judge. 2. Courtroom Deputy. 3. Prosecutor 1 opening statement. 4. Prosecutor 2 direct of Dana Capro
ROLES TO ASSIGN 1. Judge 2. Courtroom Deputy 3. Prosecutor 1 opening statement 4. Prosecutor 2 direct of Dana Capro 5. Prosecutor 3 direct of Jamie Medina 6. Prosecutor 4 cross of Pat Morton 7. Prosecutor
More informationTraining NATO for an uncertain future: An interview with Major General Erhard Bühler
25 Neil Webb Training NATO for an uncertain future: An interview with Major General Erhard Bühler In facing potential threats, being lean and agile will be critical. Wolff Sintern Major General Erhard
More informationCarl Weisman Q&A So Why Have You Never Been Married?
Carl Weisman Q&A So Why Have You Never Been Married? 1. Why did you write So Why Have You Never Been Married? I wrote the book because I honestly could not answer the question Why have I never been married?
More informationBBC Learning English Talk about English Business Language To Go Part 1 - Interviews
BBC Learning English Business Language To Go Part 1 - Interviews This programme was first broadcast in 2001. This is not a word for word transcript of the programme This series is all about chunks of language
More informationCBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?
CBO A series of issue summaries from the Congressional Budget Office JULY 20, 2005 Federal Funding for Homeland Security: An Update The terrorist attacks of September 11, 2001, heightened Congressional
More informationTeachingEnglish Lesson plans. Conversation Lesson News. Topic: News
Conversation Lesson News Topic: News Aims: - To develop fluency through a range of speaking activities - To introduce related vocabulary Level: Intermediate (can be adapted in either direction) Introduction
More informationSecurity Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper
More informationINTRODUCTION. The Seven Rules of. Highly Worried People
INTRODUCTION The Seven Rules of Highly Worried People WORRYING IS SECOND NATURE to you, but imagine that someone who has been raised in the jungle and knows nothing about conventional modern life approached
More informationREMARKS BY R. GIL KERLIKOWSKE DIRECTOR OFFICE OF NATIONAL DRUG CONTROL POLICY EXECUTIVE OFFICE OF THE PRESIDENT. before the
REMARKS BY R. GIL KERLIKOWSKE DIRECTOR OFFICE OF NATIONAL DRUG CONTROL POLICY EXECUTIVE OFFICE OF THE PRESIDENT before the CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES DRUG POLICY IN THE AMERICAS JULY
More informationJAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK
JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman
More informationWhat is Organizational Communication?
What is Organizational Communication? By Matt Koschmann Department of Communication University of Colorado Boulder 2012 So what is organizational communication? And what are we doing when we study organizational
More informationCompany: Balfour Beatty Conference Title: Half Year 2011 Results Presenters: Ian Tyler, Duncan Magrath Wednesday 17 th August 2011 15h00 BST
Company: Balfour Beatty Conference Title: Half Year 2011 Results Presenters: Ian Tyler, Duncan Magrath Date: Wednesday 17 th August 2011 15h00 BST Operator: Good day ladies and gentlemen and welcome to
More informationStatement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration
Statement of John Sammon Assistant Administrator for Transportation Sector Network Management Transportation Security Administration U.S. Department of Homeland Security Before the United States House
More informationNational Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
More informationThe Need to Share: The U.S. Intelligence Community and Law Enforcement
The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need
More informationSecurity in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
More informationSeminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006
Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 The views expressed in this paper are those of the author(s) only, and the presence of them, or of links
More informationActs 11 : 1-18 Sermon
Acts 11 : 1-18 Sermon Imagine a church being riven apart by different personalities leading different groups each trying to pull it in different directions. Imagine a church whose future is threatened
More informationE-Government Chair Research Project The use of social media for effective public engagement. Case Study - NZ Transport Agency: Drugged drivers
E-Government Chair Research Project The use of social media for effective public engagement Case Study - NZ Transport Agency: Drugged drivers Author: Summary New Zealand Transport Agency (NZTA) uses a
More informationGovernment Transparency Report. January June 2015
Government Transparency Report January June 2015 Introduction Welcome to our January June 2015 government transparency report. At Tumblr, we re committed to maintaining trust and transparency with our
More information