Library Documents on Iran's Chemical Program

February 2, 2010
The national security of the United States, our economic prosperity, and the daily functioning of our government are dependent on a dynamic public and private information infrastructure, which includes telecommunications, computer networks and systems, and the information residing within. This critical infrastructure is severely threatened....
May 18, 2009
As required by Section 721 of the Fiscal Year 1997 Intelligence Authorization Act, the following are country summaries of acquisition activities (solicitations, negotiations, contracts, and deliveries) related to weapons of mass destruction (WMD) and advanced conventional weapons (ACW) that occurred from 1 January through 31 December 2008. This...
February 12, 2009
The primary near-term security concern of the United States is the global economic crisis and its geopolitical implications. The crisis has been ongoing for over a year, and economists are divided over whether and when we could hit bottom. Some even fear that the recession could further deepen and reach the level of the Great Depression. Of course...
September 30, 2008
On September 25, 2008, the United States Department of Commerce issued guidance to the U.S. exporting community designed to encourage exporters' vigilance on Iran's efforts to procure items for use in Iran's nuclear and missile programs. This action is part of the United States' broader strategy to ensure that no U.S.-origin items contribute in...
September 10, 2008
MR. DUGUID: Good afternoon, ladies and gentlemen. We are on the record with Acting Assistant Secretary for International Security and Nonproliferation Patricia McNerney, the Principal Deputy Assistant Secretary for Near Eastern Affairs Jeffrey Feltman, and the Director of Treasury's Office of Foreign Assets Control Mr. Adam Szubin. Mr. Szubin will...
February 13, 2008
Globalization has broadened the number of threats and challenges facing the United States. For example, as government, private sector, and personal activities continue to move to networked operations and our digital systems add ever more capabilities, our vulnerability to penetration and other hostile cyber actions grows.
February 13, 2008
February 7, 2008
REYES: Good morning. I think we're ready to go.I just want to take note that the buses are late coming back from the prayer breakfast. So as members come in, that's the reason why they'll be late this morning.I wanted to thank everybody for being here this morning. And at these point, the committee will please come to order.
February 7, 2008
Many of the analytic judgments I present here have benefited from the increasing integration of collection and analysis. Our systematic effort to synchronize requirements across the national intelligence, defense, Homeland security and federal law enforcement communities ensures collection assets will be better utilized and the collection...