-Caveat Lector-

 http://www.gcn.com/cgi-bin/udt/im.display.printable?client.id=gcndaily2
&story.id=21451

Gary Hart: Code Red is coming

03/20/03
By William Jackson,
GCN Staff
The war with Iraq has increased the risk of a terrorist attack on America,
said former Sen. Gary Hart, who now is co-chairman of the Commission on
National Security for the 21st Century.

“Don’t be surprised if in the coming hours or days we go to Code Red,”
Hart said this morning in Washington. “It is almost inevitable.”

Hart was part of a panel of experts gathered by George Washington
University and webMethods Inc. of Fairfax, Va., to discuss the role of
technology in national security.

The commission predicted in 1999 that America would suffer a major
terrorist attack, and Hart was predicting such an attack as late as early
September 2001. He said the present administration wasted valuable time
in setting up a homeland security agency, which the commission
recommended in January 2001.

The Sept. 11 attacks “were not Pearl Harbor,” he said. “America was
warned.” Despite the attention to terrorism since then, “the country is
not today prepared for retaliatory terrorist attacks.”

The panelists included former Clinton administration national security
adviser Sandy Berger; former CIA director James Woolsey; Mark Forman,
the Office of Management and Budget’s associate director for IT and e-
government; and former Virginia Gov. James Gilmore, now chairman of the
National Advisory Commission on Terrorism. All agreed that for technology
to be effective in national security there must be integration between
federal agencies, and between federal, state and local governments.

But several panelists warned of such integration becoming a threat to
privacy and civil liberties. There is an inevitable conflict between liberty
and security, Woolsey said, and in time of war, liberty generally loses. He
added that although use of tools such as the data mining applications to
be developed in the Total Information Awareness program will have to be
closely watched, “We have to find ways to make use of generally available
information.”

Gilmore said there has not been enough public debate about the costs of
improved security.

“We have an obligation to think about the uses of technology and to think
about what applications we want and what applications we don’t want,”
he said.


© 2003 PostNewsweek Tech Media, a division of Post Newsweek Media
Forwarded for your information.  The text and intent of the article
have to stand on their own merits.
~~~~~~~~~~~~~~~~~~~~
In accordance with Title 17 U.S.C. section 107, this material
is distributed without charge or profit to those who have
expressed a prior interest in receiving this type of information
for non-profit research and educational purposes only.
~~~~~~~~~~~~~~~~~~~~
"Do not believe in anything simply because you have heard it. Do
not believe simply because it has been handed down for many genera-
tions.  Do not believe in anything simply because it is spoken and
rumoured by many.  Do not believe in anything simply because it is
written in Holy Scriptures.  Do not believe in anything merely on
the authority of teachers, elders or wise men.  Believe only after
careful observation and analysis, when you find that it agrees with
reason and is conducive to the good and benefit of one and all.
Then accept it and live up to it." The Buddha on Belief,
from the Kalama Sutra

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http://archive.jab.org/[EMAIL PROTECTED]/
 <A HREF="http://archive.jab.org/[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to