FREE BOOKS

Author's List




PREV.   NEXT  
|<   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  
exploit. We will continue to work with foreign partners and international organizations to help prevent conflict and respond to state failure by building foreign capacity for peace operations, reconstruction, and stabilization so that countries in transition can reach a sustainable path to peace, democracy, and prosperity. Where physical havens cross national boundaries, we will continue to work with the affected countries to help establish effective cross-border control. Yet some countries will be reluctant to fulfill their sovereign responsibilities to combat terrorist-related activities within their borders. In addition to cooperation and sustained diplomacy, we will continue to partner with the international community to persuade states to meet their obligations to combat terrorism and deny safehaven under U.N. Security Council Resolution 1373. Yet safehavens are not just limited to geographic territories. They also can be non-physical or virtual, existing within legal, cyber, and financial systems. --+_Legal safehavens_+. Some legal systems lack adequate procedural, substantive, and international assistance laws that enable effective investigation, prosecution, and extradition of terrorists. Such gaps offer a haven in which terrorists and their organizations can operate free from fear of prosecution. In the United States we have developed a domestic legal system that supports effective investigation and prosecution of terrorist activities while preserving individual privacy, the First Amendment rights of association, religious freedom, free speech, and other civil rights. We will continue to work with foreign partners to build their legal capacity to investigate, prosecute, and assist in the foreign prosecution of the full range of terrorist activities--from provision of material support to conspiracy to operational planning to a completed act of terrorism. --+_Cyber safehavens_+. The Internet provides an inexpensive, anonymous, geographically unbounded, and largely unregulated virtual haven for terrorists. Our enemies use the Internet to develop and disseminate propaganda, recruit new members, raise and transfer funds, train members on weapons use and tactics, and plan operations. Terrorist organizations can use virtual safehavens based anywhere in the world, regardless of where their members or operatives are located. Use of the Internet, however, creates opportunities for us to exploit. To counter terrori
PREV.   NEXT  
|<   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   >>  



Top keywords:

prosecution

 
foreign
 

safehavens

 
continue
 

members

 

terrorists

 

countries

 

effective

 

virtual

 

international


organizations

 

activities

 
Internet
 

terrorist

 

systems

 

terrorism

 
rights
 

combat

 
physical
 

capacity


exploit
 

partners

 

operations

 

investigation

 

provision

 

assist

 

investigate

 

prosecute

 

material

 

privacy


conspiracy

 

operational

 

support

 
Amendment
 
planning
 

individual

 

States

 
freedom
 

speech

 

supports


system

 

preserving

 

domestic

 

religious

 

association

 
developed
 

develop

 
Terrorist
 

weapons

 

tactics