There are some who believe that threats propelled them to demand the talks, but I really do not know, ... I know that regional leaders would want to see this issue settled peacefully, and they are all looking forward to a positive outcome.
There are some additional shootings, some additional threats that have been made that we're looking into, ... Whether or not arrests will be made, I can't guarantee at this point. We believe they're responsible for many more shootings than what they've been charged with.
I think that the firepower of the Civil War, the numbers of bodies that were left to rot, the numbers of amputations in the Civil War, all of this created threats to the understanding of the human being as an integral soul, as a body and soul that could be united.
Both teams are a rank lower than us. But they are still threats because they are in our conference and have pushed us in the past.
Both sides threatened to mobilize voters against me. The threats really had the opposite effect.
Nato today faces greater threats to its long-term future than it ever did at the height of the Cold War. Now is the time to replace immobile armies with more flexible, rapid response forces.
I think we need a clear global understanding of the threats and challenges that we all have to face, because to neglect any one of them might fatally undermine our efforts to confront the others.
When I first was contacted, I knew that something had to be done. The two things that kept running through my mind were the earthquake warning in 1990 - even though nothing happened, we dismissed school - and what has been done at other schools when bomb threats have been made.
When I first joined the Treasury some years ago, I can assure you we were not thinking about threats to the financial system emanating from viruses, Trojan Horses, logic bombs or malicious code, ... But we are thinking about those things now, and with good reason.
We need to stay vigilant to stay ahead of the potential security threats that mobile devices pose, both in terms of data security and as avenues for virus or worm activity.