War on terrorism is history in the making, general says

The Defense Department's war on terrorism is the most important military action undertaken by U.S. forces since World War II, according to Gen. Richard Myers, chairman of the Joint Chiefs of Staff. "This is the most significant task I have been asked to undertake," said Myers, who has been in uniform for more than three decades, at a Pentagon press briefing Thursday. He called the war on terrorism different from other recent military actions because it involved a direct attack on the United States homeland. Myers said the United States is prepared to use a "full spectrum" of capabilities to rout the terrorists responsible for the Sept. 11 attacks on the country, including ground troops. He said U.S.-led military forces continue to make progress in destroying the Taliban's Afghanistan infrastructure and said that in the last 24 hours, those forces struck more than a dozen targets, including terrorist camps, missile and vehicle storage areas, airfields and command and control centers. Defense Secretary Donald Rumsfeld stressed that the United States is not leading a single coalition against terrorism, but multiple coalitions that will be flexible and change over time as they are aimed at different enemies. In some cases, nations may not provide military forces but rather diplomatic or financial support. "The mission determines that coalition, the coalition must not determine the mission," he said. Rumsfeld also said the United States would have an interest in "helping" a post-Taliban Afghanistan. But, he said, it was too early to say whether that would entail only economic and humanitarian support or participation in a multinational peacekeeping force. Additionally, Rumsfeld confirmed the presence of Al Qaeda terrorist training camps in Somalia and would not rule out strikes against them.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.