Word: arsenal
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
With barely more than a year and a half left in his term, George W. Bush has finally pulled out a centuries-old weapon in the political arsenal of Washington power players: the dinner party. As politicians of both parties emerge from evenings at the White House impressed with their host (and themselves), they ask the same question: What took the President so long? Here's an affable man with an engaging wife; you'd think he would have used the power of the invitation years ago. Intimate gatherings in the family quarters dazzle even the most hardened pols...
...rates of U.S. missile defense systems are marginal at best. And the most optimistic projections put deployment in Europe more than five years away. Yet if that should reassure Putin, it hasn't. He and the Russians see the deployment as both a potential future threat to their missile arsenal and as an affront to their national security akin to the American view of Khrushchev's deployment of nuclear missiles in Cuba in the early 1960s. So if the systems, which aren't even ready yet, are causing so much agitation in Russia, why is the Administration pushing as hard...
...young policymakers. National Security Adviser Stephen Hadley pursued missile defense with the Soviets as an arms control negotiator in the administration of George H. W. Bush. When he became George W. Bush's deputy National Security Adviser in 2001, he kept a small model of the Soviet ballistic missile arsenal near his desk and spent his first nine months so focused on getting a rollback of the anti-ballistic missile treaty that he was later accused of ignoring the terrorist threat as it built in the run-up to 9/11. Defense Secretary Robert Gates and Secretary of State Condoleezza Rice...
...make matters worse, there are plenty of other weapons in the cybercriminal's arsenal. It's also possible, for example, to pilfer confidential data from secure networks by mounting Trojan e-mail attacks. These infect a PC by e-mail, using a program that runs undetected in the background. Free to perform tasks usually reserved for the system's owner, the invader can remotely swipe passwords, upload documents and transmit new attacks. In a report published in 2005, Britain's government-backed National Infrastructure Security Co-ordination Centre released details of a series of Trojan e-mail attacks...
...kind of germ that makes public-health officials go very pale when they talk about it. TB is bad enough, wasting bodies, ravaging lungs. The multi-- drug-resistant kind is worse. And XDR is the very rare but very awful strain that has all but exhausted the medical arsenal, leaving mainly faith and force as weapons: keep the patient isolated and hope that some treatment works against it, which happens in less than one-third of cases. The good news is that most people infected with the germ won't develop the disease; there have been fewer than 50 cases...