A Quote by Dana Boente

Cyber terrorists are no different from other terrorists: No matter where they hide, we will track them down and seek to bring them to the United States to face justice. — © Dana Boente
Cyber terrorists are no different from other terrorists: No matter where they hide, we will track them down and seek to bring them to the United States to face justice.
Conservatives believe that we need to defeat radical Islam not because we want war but because ISIS and other radical Islamist are enemies of peace and that's why we need a president, who in which under whom the best intelligence agencies in the world will find terrorists and the best military in the world will destroy them. And if we capture them alive, a president that will bring them to the United States. A president that will grant them a court-appointed lawyer, a president that will send these terrorists where they belong, to Guantanamo Bay, Cuba.
Before the 11th of September, in my discussions with many officials of the United States, some of them are Congressmen, I used to say that "don't deal with terrorists as playing games." It's a different story. You're going to pay the price if you're not wise in dealing with terrorists.
The fact of the matter is that the United States faces real threats from criminals, terrorists, spies, and malicious cyber actors.
No matter how long it takes, the United States will find and bring to justice the terrorists who are responsible for Kayla's captivity and death, ISIL is a hateful and abhorrent terrorist group whose actions stand in stark contrast to the spirit of people like Kayla.
I was distressed that after 9/11, when the United States was attacked by terrorists, the United States' response was to attack Afghanistan, where some of the terrorists had been.
Never, ever deal with terrorists. Hunt them down and, more important, mercilessly punish those states and groups that fund, arm, support, or simply allow their territories to be used by the terrorists with impunity.
I've set a clear doctrine: America makes no distinction between the terrorists and the countries that harbor them. If you harbor a terrorist, you're just as guilty as the terrorists, and you're an enemy of the United States of America.
In my judgment, the only way to deal with terrorists is to stay on the offensive, is to find them and bring them to justice before they hurt us again.
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
I've directed the full resources of our intelligence and law enforcement communities to find those responsible and bring them to justice. We will make no distinction between the terrorists who committed these acts and those who harbor them.
The problem, of course, is that the vacuum left by Younis Tsouli is quickly being filled by a larger, anonymous group of new cyber terrorists who are competing to follow in his legacy. He has become the inspiration for a second generation of "cyber terrorists" who are studying and learning from his mistakes.
An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.
The [Israelis] believed - they were possessed of an absolute certainty and conviction - that 'terrorists' were in Chatila. How could I explain to them that the terrorists had left, that the terrorists had worn Israeli uniforms, that the terrorists had been sent into Chatila by Israeli officers, that the victims of the terrorists were not Israelis but Palestinians and Lebanese?
If we accept the notion that terrorists will have immunity because as they fire on civilians they hide behind civilians, then this tactic will be legitimized and the terrorists will have their greatest victory.
Our adversaries - terrorists, foreign intelligence services, and criminals - take advantage of modern technology to hide their communications; recruit followers; and plan, conduct, and encourage espionage, cyber attacks, or terrorism to disperse information on different methods to attack the U.S. homeland and to facilitate other illegal activities.
There's only two classes of people: terrorists and non-terrorists. Terrorists come in every flavour: there are Buddhist terrorists right now killing Rohingya in Burma! Buddhists! They're not allowed to kill bugs.
This site uses cookies to ensure you get the best experience. More info...
Got it!