COUNTER TERRORISM PROJECT

AN OPEN SOURCE VIRTUAL INTELIGENCE SHARING PORTAL TO COUNTER THE GLOBAL THREAT OF TERRORISM THROUGH INNOVATIVE APPROACHES

Saturday, March 29, 2008

Report20060203.pdf (application/pdf Object)

Quadrennial Defense Review Report

Such terrorist networks oppose globalization
and the expansion of freedom it brings.
Paradoxically, they use the very instruments of
globalization – the unfettered fl ow of information
and ideas, goods and services, capital, people
and technology – as their preferred means of
attack. Th ey target symbols of modernity like
skyscrapers with civilian jetliners used as missiles.
Th ey exploit the Internet as a cyber-sanctuary,
which enables the transfer of funds and the crosstraining
of geographically isolated cells. Th ey use
cell phones and text messaging to order attacks
and detonate car bombs. They send pre-recorded
video messages to sympathetic media outlets to
distribute their propaganda “free of charge” and
to spread their ideology of hate. They encourage
terrorist “startup franchises” around the world
that conduct attacks in copy-cat fashion. They
depend on 24/7 news cycles for the publicity
they seek to attract new recruits. Th ey plan to
attack targets from safe-houses half a world away.
Th ey seek weapons of mass destruction from
transnational proliferation networks.

Progress to Date. Th e foundation for net-centric
operations is the Global Information Grid
(GIG), a globally interconnected, end-to-end set
of trusted and protected information networks.
Th e GIG optimizes the processes for collecting,
processing, storing, disseminating, managing and
sharing information within the Department and
with other partners. Th e Department has made
steady progress implementing net-centric systems
and concepts of operation. It has deployed an
enhanced land-based network and new satellite
constellation as part of the Transformational
Communication Architecture to provide
high-bandwidth, survivable internet protocol
communications. Together, they will support
battle-space awareness, time-sensitive targeting
and communications on the move.

Authorities developed before the age of the
Internet and globalization have not kept pace
with trans-national threats from geographically
dispersed non-state terrorist and criminal
networks. Authorities designed during the Cold
War unduly limit the ability to assist police forces
or interior ministries and are now less applicable.
Adversaries’ use of new technologies and
methods has outstripped traditional concepts of
national and international security. Traditional
mechanisms for creating and sustaining
international cooperation are not sufficiently
agile to disaggregate and defeat adversary
networks at the global, regional and local levels
simultaneously. Supporting the rule of law and building civil

0 Comments:

Post a Comment

<< Home