Skip to content

National Security Strategy 2000

Internationally, our strategy recognizes that the most effective counterdrug operations are mounted at the source where illegal drugs are grown and produced. We seek to stop drug trafficking by bolstering the capabilities of source nations to reduce cultivation through eradication and development of alternative crops, and attack production through destruction of laboratories and control of chemicals used to produce illegal drugs. In the transit zone between source regions and the U.S. border, we support interdiction programs to halt the shipment of illicit drugs. In concert with allies abroad, we pursue prosecution of major drug traffickers, destruction of drug trafficking organizations, prevention of money laundering, and elimination of criminal financial support networks.
Our strategy also includes efforts to build cooperative links with foreign law enforcement agencies, strengthen democratic institutions, assist source nations to root out corruption, and safeguard human rights and respect for the rule of law in both source and transit nations. Additionally, we are engaging international organizations, financial institutions and non-governmental organizations in counterdrug cooperation.

Other International Crime.
A free and efficient market economy requires transparency and effective law enforcement to combat unlawful activities such as extortion and corruption that impede rational business decisions and fair competition. The benefits of open markets are enhanced by fostering the safe and secure international movement of passengers and goods by all modes of transportation. Additionally, the integrity and reliability of the international financial system will be improved by standardizing laws and regulations governing financial institutions and improving international law enforcement cooperation in the financial sector. Corruption and extortion activities by organized crime groups can also undermine the integrity of government and imperil fragile democracies. And the failure of governments to effectively control international crime rings within their borders – or their willingness to harbor international criminals – endangers global stability. There must be no safe haven where criminals can roam free, beyond the reach of our extradition and legal assistance treaties.
We are negotiating and implementing new and updated extradition and mutual legal assistance treaties, and increasing our enforcement options through agreements on asset seizure, forfeiture, and money laundering. The new National Money Laundering Strategy being implemented by the Departments of Treasury and Justice is increasing the effectiveness of America’s efforts both domestically and internationally to deprive organized crime groups the benefit of their illegal profits. Initiatives also are under way to accelerate the criminal identification process and facilitate global participation in the investigation and prosecution of criminal activities through the linking of worldwide law enforcement databases. This will be done in a manner that protects the privacy of U.S. citizens.
Because of the global nature of information networks, no area of criminal activity has greater international implications than high technology crime. Computer hackers and other cyber-criminals are not hampered by international boundaries, since information and transactions involving funds or property can be transmitted quickly and covertly via telephone and information systems. Many of the challenges that law enforcement faces in this area are extremely difficult to address without international consensus and cooperation. We seek to develop and implement new agreements and encourage cooperative research and development with other nations to address high technology crime, particularly cyber-crime.

Defending the Homeland
Our potential enemies, whether nations or terrorists, may be more likely in the future to resort to attacks against vulnerable civilian targets in the United States. At the same time, easier access to sophisticated technology means that the destructive power available to rogue nations and terrorists is greater than ever. Adversaries may be tempted to use long-range ballistic missiles or unconventional tools, such as WMD, financial destabilization, or information attacks, to threaten our citizens and critical national infrastructures at home.
The United States will act to deter or prevent such attacks and, if attacks occur despite those efforts, will be prepared to defend against them, limit the damage they cause, and respond effectively against the perpetrators. At home, we will forge an effective partnership of Federal, state and local government agencies, industry and other private sector organizations.

National Missile Defense
We are committed to meeting the growing danger posed by nations developing and deploying long-range missiles that could deliver weapons of mass destruction against the United States. Informed by the Intelligence Community’s analysis of the August 1998 North Korean flight test of its Taepo Dong I missile, as well as the report of the Rumsfeld Commission and other information, the Administration has concluded that the threat posed by a rogue state developing an ICBM capable of striking the United States is growing. The Intelligence Community estimates that during the next fifteen years the United States will most likely face an ICBM threat from North Korea, probably from Iran, and possibly from Iraq.
We intend to determine in 2000 whether to deploy a limited national missile defense against ballistic missile threats to the United States from rogue states. The Administration’s decision will be based on an assessment of the four factors that must be taken into account in deciding whether to field this system: (1) whether the threat is materializing; (2) the status of the technology based on an initial series of rigorous flight tests, and the proposed system’s operational effectiveness; (3) whether the system is affordable; and (4) the implications that going forward with NMD deployment would hold for the overall strategic environment and our arms control objectives, including efforts to achieve further reductions in strategic nuclear arms under START II and START III.
In making our decision, we will review progress in achieving our arms control objectives, including negotiating changes to the ABM Treaty that would permit the deployment of a limited NMD system. At the Cologne G-8 Summit in June 1999, Presidents Clinton and Yeltsin agreed to begin discussions on START III and the ABM Treaty. Their reaffirmation that under the ABM Treaty the two sides are obligated to consider possible changes in the strategic situation that have a bearing on the Treaty and possible proposals for further increasing the viability of the Treaty opened the door for discussion of proposals for modifying the Treaty to accommodate a limited NMD deployment. The United States will attempt to negotiate changes to the ABM Treaty that would be necessary if we decide to deploy a limited NMD system. At the same time, the Administration has made clear that it will not give any state a veto over any missile defense deployment decision that is vital to our national security interests.

Countering Foreign Intelligence Collection
The United States is a primary target of foreign intelligence services due to our military, scientific, technological and economic preeminence. Foreign intelligence services aggressively

Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29