Joint Chiefs Chairman: 'There Is a Significant Threat Stream'

Gen. Martin Dempsey speaks with ABC News Chief Global Affairs Correspondent Martha Raddatz in the Pentagon on Aug. 2, 2013. Gen. Martin Dempsey speaks with ABC News Chief Global Affairs Correspondent Martha Raddatz in the Pentagon on Aug. 2, 2013. Office of the Chairman of the Joint Chiefs of Staff

On Saturday, most of the United States' top national security officials met to discuss the possible terrorist threat that has already caused the closure of 21 U.S. embassies and a global travel warning for Americans through the rest of August. The global travel warning is the first issued by the U.S. since the tenth anniversary of the September 11th attacks. According to CBS, the threat is "the most specific, credible threat information in years," and that the plot is underway and the team looking to carry it out is already in place.

On Sunday, an interview with one of those national security advisers, Joint Chiefs of Staff Chairman Martin Dempsey, was aired on a Sunday morning news show to hammer in just how serious the government sees this threat.

Dempsey told This Week guest-host Martha Raddatz that "there is a significant threat stream and we're reacting to it." He also said that "the intent is to attack Western, not just U.S. interests."

Also on This Week, Rep. Pete King, R-N.Y., emphasized that the threatened attack could be anywhere--the Middle East, Europe, the United States, or a "combined" attack. "We need to be ready for everything," he told Raddatz. The congressman said that "al-Qaida is, in many ways, stronger than it was before 9/11." But King did come to the defense of the Obama administration in how it is handling this new threat, saying that "we can't criticize them for doing too little with Benghazi, and now criticize them for doing too much."

From his post outside of government, Michael Hayden, the former Director of National Intelligence, told Fox News Sunday that "this does look quite serious," and "the al-Qaida danger is not yet over." On the same show, Rep. Justin Amash, R-Mich., said that this new threat just illustrates why "in a dangerous world, you need the fourth amendment, you need the Constitution."

Conservative pundits on Fox News Sunday were quick to pin some blame for the threat on the president. "A year ago the president said 'al-Qaida is on the run,' and now we seem to be on the run," said Bill Kristol. Former senator Jim DeMint said "our attempt to placate parts of the world, reset whether it's Russia or somewhere else, are clearly not working. And the perception of weakness in this administration is encouraging this kind of behavior."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.