The Cure for Radical Islam Is Nationalism

 

The Cure for Radical Islam Is Nationalism

By Lawrence Sellin, Colonel, U.S. Army (ret.)

For too long, many presumed experts have attempted to solve the problem of radical Islam by dissecting religious texts or recommending the support of so-called “moderate” Islamic factions.

It is a fool’s errand.

The problem with radical Islam, like other forms of political extremism, is that it is hegemonistic and totalitarian. In a world where democratic institutions remain fragile, national security options are often imperfect and contesting monolithic threats short of war may be best executed by navigating or leveraging inherent geopolitical strata and fractures.

The single, most relevant impediment to radical Islam is ethnic and cultural nationalism.

Tribal, ethnic, cultural and linguistic characteristics are primordial, traditionally hereditary and often the default forms of social identification that predate organized religion. It is only when religious practices were incorporated into those forms of identity that religion became a significant factor or sometimes a substitute for traditional identity.

That is, when religion goes beyond individual or group spiritual beliefs and begins to have not just social, but also political influence, it reaches, or is promoted as, a form of hereditary identification.

Nevertheless, tribal, ethnic, cultural and linguistic identity remain fault lines even in societies where Islam is the dominant religion. Kurdish nationalism in regions where radical Islam is an ever-present menace is an example most familiar to Americans.

Nowhere, however, are fault lines more consequential for U.S. policy than in Pakistan, the Yugoslavia of South Asia.

Yugoslavia was established in the aftermath of World War I as a pan-Slavic solution to the political volatility many blamed for the outbreak of the war. It was cobbled together as a federation of six republics with borders drawn along ethnic and historical lines, most of which were remnants of the defeated Austro-Hungarian Empire.

Ethnic separatism eventually overcame the presumed unifying concept of pan-Slavism and Yugoslavia did not survive the century in which it was created.

Likewise, Pakistan is an artificial state created by the British during the partition of India, based on the ideology of Islam and composed of ethnic groups that never interacted in any significant way. Pakistan’s Sunni “Islamization” program, begun by President Zia-ul-Haq (1977-1988), which involved the proliferation of Islamic schools “madrasas” and the promotion of Islamic law “Sharia,” was specifically designed to create national unity by suppressing ethnic separatism and religious diversity. As a result, radical Islamic groups, including the Taliban, have proliferated in Pakistan, becoming increasingly more extreme.

Traditionally secular and tolerant, Pakistan’s southwest province of Balochistan has been the home of a festering ethnic insurgency since 1948, when it was deprived of independence and forcibly incorporated into Pakistan. Despite its mineral wealth, the Baloch have been intentionally kept underdeveloped by the Pakistan government, and have been subjected to extensive Islamization, oppression and alleged extrajudicial killings by the Pakistani military.

As a result of both official neglect and intent, the Pakistani province of Balochistan now possesses all the elements of instability, including political corruption, criminal gangs, drug trafficking, a plethora of Islamic extremist groups and an extensive Taliban infrastructure along its common border with Afghanistan.

A secular and independent Balochistan would drive a stake into the heart of radical Islam and change the strategic dynamics in a region, where U.S. influence is rapidly shrinking.

The Pashtun Tahafuz (Protection) Movement (PTM) is a campaign for Pashtun human rights based in the Federally Administered Tribal Areas (FATA) of Khyber Pakhtunkhwa, and the Balochistan provinces of Pakistan. The Pakistani government views the PTM as an ethnic separatist movement and has made efforts to suppress it. Those efforts include alleged government-inspired attacks conducted by the Taliban on the PTM and the incorporation of FATA into Khyber Pakhtunkhwa Province.

The latter was ostensibly designed to dilute the influence of the PTM as a substrate for ethnic self-determination and the potential for the PTM to loosen the Taliban’s grip on the Pashtuns, both of which might interfere with Pakistan’s plans for Afghanistan, and, indirectly, China’s regional ambitions.

How does ethnic and cultural nationalism translate into strategic options for the United States?

Other than a “presence,” the U.S. has little negotiating leverage in Afghanistan, even for a graceful exit.

There are simple explanations for why the U.S. has not succeeded in Afghanistan after 17 years. Afghanistan is a landlocked country and Pakistan does not share the same aspirations for Afghanistan as the United States. Pakistan has stymied U.S. efforts in Afghanistan by controlling the operational tempo through its support of the Taliban and Haqqani network and by maintaining a stranglehold on the supply of our troops.

Blackmail largely restrains the United States from attacking insurgent safe havens in Pakistan because, by doing so, there is a risk that further destabilization of Pakistan would allow terrorists to obtain nuclear weapons. So the stalemate continues and the Pentagon’s fallback strategy — more counterinsurgency and nation building — remains the status quo.

Changing the geopolitical dynamics of the Afghanistan conflict by exploiting ethnic nationalism could provide both short-term leverage in peace negotiations and long-term strategic influence.

It doesn’t take a strategic genius to conclude that Balochistan is a regional center of gravity.

The China-Pakistan Economic Corridor, the majority of which runs through Balochistan, is the linchpin of China’s Belt and Road Initiative, a collection of infrastructure projects and a transportation route that connects China to the Pakistani ports of Gwadar and Karachi on the Arabian Sea. Without the CPEC, the Belt and Road Initiative — China’s blueprint for global domination — is dead in the water.

You get to the Taliban through Pakistan and you get to Pakistan through China. Ethnic separatism is Pakistan’s pressure point, but it is China that will ultimately feel the pain.

Article

Lawrence Sellin, Ph.D. is a retired U.S. Army Reserve colonel, an IT command and control subject matter expert, trained in Arabic and Kurdish, and a veteran of Afghanistan, northern Iraq and a humanitarian mission to West Africa.

A nything Can Happen: The Pentagon Report has A Ring II it.

Not from the C.I.A. (means Central Intelligence Agency) Report…Not from the N.S.A. (means National Security Agency) Report…not from Obama (the thing that was never vetted by the F.B.I. with SSN: 042-68-4425 and documents signed by Pelosi and McAuliffe)…not from Hillary Clinton’s and John Kerry’s State Department for a reason, but a report from the Pentagon fore a reason.

What is the D.O.J. and the F.B.I. covering up?

 

Breaking News!

Our Counter-Intelligence System IS broken because it was sabotaged. SUA has primary source intel showing how America and our Intelligence Apparatus have been hijacked, held hostage and extorted by the Deep State for years.

Go figure.

FILE PHOTO: The Pentagon in Washington, U.S., is seen from aboard Air Force One, March 29, 2018. (III 2 9 11 ) REUTERS/Yuri Gripass/File Photo…&…U…=. Empowering Sustainable Decisions.

Pentagon report accuses China of trying to undermine US defense industry

By Joshua Berlinger and Ryan Browne

10/5/2018

(CNN)The Pentagon released a report Friday accusing China of seeking to undermine the US military’s industrial base, the latest in a series of US jabs at Beijing.

“China represents a significant and growing risk to the supply of materials and technologies deemed strategic and critical to US national security,” the report said.
“China’s trade dominance and its willingness to use trade as a weapon of soft power increases the risks America’s manufacturing and defense industrial base faces in relying on a strategic competitor for critical goods, services, and commodities,” the report adds.
The study, mandated by US President Donald Trump last year in an executive order, identified nearly 300 “vulnerabilities” that could affect the supply of critical materials and other supplies essential to support the United States military.

One of the most pressing concerns is Beijing’s control over the supply of critical technologies and materials, which could pose a significant risk to US industries that are vital to national security, the report said.

“China’s aggressive industrial policies have already eliminated some capabilities with critical defense functions, including solar cells for military use, flat-panel aircraft displays, and the processing of rare earth elements,” the report says, adding “China’s actions seriously threaten other capabilities, including machine tools; the production and processing of advanced materials like biomaterials, ceramics, and composites; and the production of printed circuit boards and semiconductors.”
China controls the vast majority of the world’s rare earths materials that are used to produce high-tech defense equipment. The US did not mine any rare earths domestically in 2017, instead importing an estimated $150 million, according to the United States Geological Survey.

Analysts in Washington have long warned that Beijing could exploit the US military and defense manufacturers’ reliance on China, which from 2013 to 2016, accounted for 78% of all rare earth imports into the US.

“Diversifying away from complete dependency on sources of supply in politically unstable countries who may cut off US access” is one of the report’s central recommendations.

“A core threat to the American industrial base comes from China,” White House Trade Adviser Peter Navarro wrote in an opinion piece for The New York Times discussing the year-long study.

“The broader goal, as the report makes clear, is to ‘diversify away from complete dependency on sources of supply in politically unstable countries who may cut off US access,'” he added.

The Trump administration plans to address supply bottlenecks and potential failure points using the same strategy employed during the Cold War and World War II — pumping millions of dollars into US companies that produce items critical to the US military, like high-performance aluminum, steel, tungsten and carbon fibers.

The funds will “address critical bottlenecks, support fragile suppliers, and mitigate single points-of-failure,” according to the report.

Defense officials said that one such investment will include a $250 million increase for small and medium manufacturers in the submarine supply chain.

The commitments fall in line with President Trump’s campaign promise to invest more in domestic manufacturing jobs and rely less on trade with China.

The report comes amid a rapidly deteriorating relationship between the United States and China, fueled in part by the ongoing trade war between the world’s two biggest economies.

Beijing and Washington have also sparred recently over the status of Taiwan and China’s growing military presence in the South China Sea, where it has militarized and occupied artificial islands in violation of international law.

A senior official in the Trump administration said Thursday the White House has chosen to embrace a much more assertive public approach in dealing with China.

The strategy was evident Thursday when US Vice President Mike Pence accused China of using trade and its military to undermine the US political system and exploit American businesses.

“As we speak, Beijing is employing a whole-of-government approach, using political, economic, and military tools, as well as propaganda, to advance its influence and benefit its interests,” Pence said in his speech to the Hudson Institute.

China’s Foreign Ministry denied any wrongdoing and called the allegations “nothing but speaking on hearsay evidence, confusing right and wrong and creating something out of thin air.”

The news came as Bloomberg News published a bombshell report alleging the Chinese military hid tiny microchips in computer motherboards sold to major US companies such as Amazon and Apple.

That technology allowed hackers to access any network that included the altered equipment, according to Bloomberg. Apple and Amazon have both denied the report.

The Chinese Foreign Ministry didn’t respond to a request for comment on Friday, which is a public holiday in the country.

Article

 

A

The Fifth Column Sabotage Against The USA and Our Critical Infrastructure

 

The Fifth Column Sabotage Against The USA and Our Critical Infrastructure

By Tom Marin and Paul Vallely, MG U.S. Army (ret.)
July 2011

The Development and Execution of Joint Operations (both Civilian and Military) to respond to dynamic threats against the United States has now reached a point of criticality. Over the course of the last several years, some Americans are gradually waking up to the fact that our “essence of being” as a nation and as individuals is under a constant state of attack and this attack has been implemented methodically and slowly over time by enemies who despise our way of life. What is occurring to our great country is so heinous that it patronizes each one of us, who we are, our heritage and what we stand for as a nation.

During World War II, America, The Sleeping Giant, as quoted by the Japanese Admiral Yamamoto, woke up; and The Greatest Generation as noted by Tom Brokaw, stood up and went off to fight “The Total Collective Effort of Evil” in their time.

Evil has many forms, and simply stated, it is a word to describe the acts of omission or acts of commission to inflict wanton harm or destruction or, according Wiktionary, a deliberate violation of some accepted moral code of behavior, i.e. a fiduciary obligation. Evil, as defined by The Free Dictionary, is that which causes harm, misfortune, or destruction: as in a leader’s power to do both good and/or evil. Americans responded by waging “total war” against evil perpetrated by German Nazism and Japanese Militaristic Imperialism in which the goals were to subjugate free people and farm resources under a new order of fascism.

The numbers alone reflect the concentrated, focused effort by Americans: 16,596,639 served; 416,837 were killed or missing; and over 683,846 were wounded. For me, the only way to adequately explain this focused and united American effort is to quote Edmund Burke: All that is necessary for the triumph of evil is that good men do nothing. This quote by Burke, an Irish philosopher, captures “the American essence of being” for all our generations, throughout our American history, except maybe for one, the current one…

Right now, we are living in confusing and turbulent times in which the safety and security of our country is at risk. The critical event of the sabotage that occurred on 9-11 is one of many in a timeline of numerous acts of sabotage and terror by people who want to change our way of life and subjugate our citizens to their way of “order and control”. War and sabotage have been utilized as tools throughout history to affect change and to subjugate people.

Our current operating environment is one in which our critical infrastructure and citizenry has been severely weakened due to entangling alliances, which our first American President, George Washington, specifically warned against, deceptive and defective policies enacted by negligent Congressional representation, and the so-called “business practices” of corporate America and Wall Street.

The citizens of America now find themselves in a borderless environment, in more ways than one, an unsafe environment down to the household level, and being “directed” by a bureaucratic entity that has evolved into something that is nothing more than just another “enterprise” that serves itself rather than the citizens that fund it. Current events reported in the news clearly show that our critical infrastructure has been severely compromised. These events combined with the extensive loss of jobs, homes, retirement savings, and the mortgaging of our future to foreign entities have developed into a “perfect storm” of new potential threats that can be implemented and coordinated in multiple stages to take away what is left of our American identity.

Before we review a potential strategy to respond to these emerging threats, we must remember to toast them and say “Thank You!!!” to the enablers and active participants in creating this perfect storm. As we toast and give thanks to these great Americans, we must reassure them of our resolve and that we remember and will hold them accountable for selling US all out and betraying the fiduciary trust we bestowed upon them in the positions they have held and misused their positions in committing negligent acts in order that they could aggrandize themselves at the expense of our entire nation, The United States of America.

So here we are.

We now know how we got here and the situational environment for the United States of America is not good. Our critical infrastructure sectors have been compromised and weakened, our borders are wide open, narcoterrorism is on the rise, and law enforcement and emergency services resources are stretched thin and are impacted from curtailed funding. Furthermore, our military is stretched thin around the world. All of our enemies are aware of this and are lining up and have been for a very long time as the noose tightens and our options from being held hostage are consistently being reduced due to lack of commitment to the American way of life by the elitists in Washington.

It is time for us to prioritize our threats from within our own borders and at our southern border and implement flexible strategies for preparation, response, and mitigation and annihilation of threats. Based on the lack of action demonstrated by the federal government in securing our borders and allowing the drug cartels to have open highways into our country, and inadequate response to disasters such as the BP Oil incident, I believe that it is time for our military, or retired military, to assist as special advisors to train up each states national guard, state Defense Force, and public safety and emergency response personnel so that each state can immediately engage a well coordinated response to any threat or critical event.

We must know our enemy and be aware that they have implemented this approach themselves as they have hired mercenaries, implemented political factions, and even sent members to serve in the military to acquire special operations training. State and Local resources need to be trained in specialized counter insurgency techniques that can adapt and complement law enforcement investigations such as in the area of C4iISR and in Command and Control of critical events. Colonel John Vann, one of the early counter insurgency experts, once stated in a briefing after the Tet Offensive, “It’s about the rice”. As far as our southern border is concerned, it is about the drugs.

Narco-terrorism is linked as a tool for our enemies to assist in destroying us from within as part of the master plan to destroy the American way of life. Also, terrorists have numerous options for low level operations from within our own borders. Due to our open borders, the risk is extremely high for numerous events to take place to overwhelm our resources and system much like what has already been done to our critical infrastructure and fabric.

We also must be aware that our enemies have a new economic blueprint for America, giving away our resources. It is about energy and our property, both physical and intellectual. Also, there will be a new code of law to be utilized to supervise and administer our new non-American world. It is about the United Nations not the United States of America. We must counter each tactical goal and disrupt and demolish the master plan – The New Total Collective Effort of Evil that has been perpetrated against us over a long period of time.

In his article Threat Assessments – Joint Strike Force Combat Operations, Paul Vallely, retired U.S. Army Major General, concluded that “our military must be very creative and be able to adapt, improvise, and be ahead of the curve of future thinking in regards to threats to our national security”. Also, in his recent testimony before the Committee of Science, Space, and Technology at the United States House of Representatives, James Carafano, PhD, noted that DHS Science and Technology Directorate had “limited success in partnering with other federal agencies and international partners” and also demonstrated “the inability to manage complex programs.”

Finally, DHS S+T also demonstrated a “lack of response to customer needs and that the Directorate’s portfolios do not adequately reflect their requirements and are not sufficiently responsive to operational needs.” In addition to the above conclusions by both parties, the situational environment has dramatically changed since the War on Terror began when the American Embassy, United States soil, in Iran was invaded and taken over. This initial act, which may be distant in our minds, was a clear message by our enemies, Muslim extremists, that there will be no borders.

To further understand this, one only needs to see where Shiite and Sunni populations reside and you can see how borders literally bleed away. Also, the historical timeline of critical events have clearly proven that our enemies are consistently maintaining their operational plan. We must now also accept the fact that the enemy is not only at the gate, but thanks to the current administration’s lack of enforcement of existing American Laws to protect Libyan, I mean American citizens, there is no gate.

I would also like to note that I sarcastically disagree with one of Dr. Carafano’s conclusions in regards to DHS in that the agency “failed to convert technologies for use by non-federal customers.” Based on my own personal experience, our national telecommunications infrastructure, our telecommunications and information technology, the intellectual property of businesses, the Defense Industrial Base, and individuals has actually been “successfully converted”, mirrored, imprinted, and stolen by non-federal customers: our “good trading partner, China, and the People Liberations Army military – industrial apparatus.

This was achieved by the lack of compliance, enforcement and accountability to laws of the United States in regard to protecting our citizens, strategic assets and our critical infrastructure. The current situation: “Welcome to the great wide open” both in public cyber, net centric, “cloud” operations and our physical national identity.

 

So what do we do from here?

 

  1. – Have a plan for “Total National Security and The Preservation and Protection of our American Identity.”
  • Economic;
  • Social;
  • Education;
  • Law, Civics…amasses Civil and State Judicial talent and power.

(Our current administration’s design is to do the exact opposite of protecting our borders and national identity – and is actually giving away “our secret sauce”) Implement each component of the plan in the shortest amount of time and with the least cost in human and financial capital.

Focus on State Government (Governor, Attorney Generals, and State legislatures) for local level implementation and utilize Congressional Representatives as evangelists of the plan. Everything happens at the last mile. The U.S. government is the people residing within 50 states. If the Congressional Evangelist is not focused on the plan, it should be immediately identified and noted and constantly addressed by the state government and state watchdog groups and local media. (always keep score)

  • Design the plan to be dynamic in achieving both tactical and strategic goals that lead to the accomplishment of the end game
  • Identify resources available to achieve both tactical and strategic goals.
  1. – Implement the plan with a total commitment to National Security and The
  • Preservation and Protection of our American Identity;
  • National identity: infrastructure, borders, heritage;
  • State identity: infrastructure, borders and heritage;
  • Protect American citizens civil rights;
  • Ownership by all.
  1. – Work The Plan
  • Be willing to adapt new tactical strategies without changing the strategic mission;
  • Commit to meeting all objectives and milestones;
  • Transparency: Constantly identify all issues, hard stops, road blocks and impasses and the reasons why objectives are not being met and bring them out immediately for the preservation of resources and meeting the plan’s objectives.
  1. – Utilize full accountability and compliance enforcement using existing laws and be willing to immediately enact new laws at the state level to immediately assist in meeting the plan’s objectives.
  1. – Maintain the Plan in an ongoing dynamic manner that always has America first.


Safety First: Protecting the physical component for Homeland Security

Revise US Military Security Strategy to Joint Strike Force Operations using MG Vallely’s “Lilly Pad” strategy.

  • Special Operations personnel or retired military personnel and professional emergency operations specialists will train state National Guard, State Defense Forces, and law enforcement in coordinated operations.
  • Implement State Virtual Command and Control and Emergency Operations Centers that are securely linked to military Virtual Command and Control Operation Centers (Lilly Pads)
  • Coordinate Special Operations Resources and Virtual Command and Control in order to prevent , mitigate, and respond to a critical event and also to coordinate a criminal law enforcement strike against criminal and terrorist activities within each state’s borders.
  • In order for the dual Lilly Pad implementation to be effective in either a reactive response or criminal law enforcement action, a trusted resource should be utilized to effectively communicate updated intelligence data and incidence response information from the dynamic, ever-changing operating environment of critical event management and planning. We should look to history to identify and utilize an effective “hopper”. In World War II, the United States Navy and the United States Coast Guard were successfully utilized to protect our homeland as the rest of our military went overseas. The combined effort of these joint forces successfully achieved our nation’s goals for homeland defense by effectively communicating intelligence data and incident reports to the military, law enforcement and to international intelligence directorates. Based on the gaps in coordination and communication both in the working operational environment and technological environment, I believe we should implement a similar methodology.
  • The US Navy and US Coast Guard already successfully operate in their environments.
  • Port Security and Drug Interdiction functions mirror law enforcement;
  • There is an established level of trust;
  • The Navy and Coast Guard’s image throughout our history from a civilians perspective, whether it is correct or not, is one that operates outside the parameters of those established in the basement of The DoD establishment at the Pentagon.

This is the type of forward strategic planning and operations that our National Security leaders should be implementing.

Tom Marin and Paul E. Vallely (Chairman Stand Up America).

Article

What is already in place and is going to be implemented.

“All that is necessary for evil to triumph is for good men to do nothing”
– Edmund Burke

Article

a

 

 

 

 

 

SEPT. 11 TERROR ATTACKS: 17 YEARS LATER by Michael Cutler

SEPT. 11 TERROR ATTACKS: 17 YEARS LATER

The disturbing allegiances of the Democratic Party.

 

Preamble by the author:

My article for today is predicated on the undeniable fact that the Damoclean Sword of terrorism still hangs over America as we remember the terror attacks of 9/11.

Nevertheless, the “leadership” of the Democratic Party insist on ordering “Shields Down” by demanding the termination of immigration law enforcement.

The 9/11 Commission identified multiple failures of the immigration system as the vulnerabilities that terrorists, including the 9/11 hijackers exploited, enabling them to enter the United States in the first place and then embed themselves so that they could hide in plain sight as they made their deadly preparations.

 As you read my article you must not forget how Democratic politicians have created “Sanctuary Cities” and “Sanctuary States” that operate in open defiance of our immigration laws, create safe havens for foreign nationals, from all over the world, who would do America and Americans great harm.  This includes foreign criminals as well as international terrorists and so-called “sleeper agents.”  Sanctuary Cities create potential “staging areas” for such criminals and terrorists providing them with access to our entire country and all Americans from coast to coast and border to border.

Ignorance is not bliss.  Knowledge is power, so my article provides some cold hard facts for you to consider and hopefully share with others.

 

SEPT. 11 TERROR ATTACKS: 17 YEARS LATER

The disturbing allegiances of the Democratic Party.

By Michael Cutler

September 11, 2018

For me, writing about the terror attacks of 9/11 has become something of an annual ritual.

I don’t do this to rehash old news and old concerns but out of my burning desire to prevent future terror attacks by pointing out the vulnerabilities that undermine national security and public safety.  Those threats are as real today as they were on that sunny late summer morning 17 years ago.

Since the terror attacks of September 11, 2001 I have testified before numerous Congressional hearings and provided testimony to the 9/11 Commission and have testified before state legislative hearings across the United States.

Wherever I participate in panel discussions and other public speaking engagements I am frequently asked essentially the same question by concerned members of the audience, “Are we safer today than we were on September 10, 2001?”

From the immigration perspective, my area of expertise, it is clear that we are not only not safer, but increasingly at risk.  In point of fact, today because of the Radical Leftist ideology that the Democratic Party has adopted, America’s threat level has risen precipitously.  I addressed this extreme danger in my recent article, Democrats’ Attack On ICE Agents Is Workingmaking more terrorism inevitable.

Let me be as clear about this as I can.  I am not being partisan, I am being pro-American!

I have been a registered Democrat for more than five decades.  The problem is that Democrats are no longer Democrats but have morphed into a political party of anarchists and seditionists.

The Democratic Party has been hijacked as certainly as were those four airliners on September 11, 2001 turning crowded passenger airliners into de facto cruise missiles.

Sanctuary Cities and Sanctuary States have spread across the United States like a wildfire, obstructing the enforcement of our immigration laws from within the interior of the United States.

The official report, 9/11 and  Terrorist Travel noted:

Thus, abuse of the immigration system and a lack of interior immigration enforcement were unwittingly working together to support terrorist activity. It would remain largely unknown, since no agency of the United States government analyzed terrorist travel patterns until after 9/11. This lack of attention meant that critical opportunities to disrupt terrorist travel and, therefore, deadly terrorist operations were missed.

Mayors of Sanctuary Cities claim to be motivated by compassion but in reality, Sanctuary Cities Protect Crooked Employers and Human Traffickers.

Leaders of the Democratic Party have only shown utter contempt and disdain for immigration law enforcement personnel, thereby endangering the agents’ safety and the safety of their families.  New York’s Governor Cuomo, has referred to ICE agents as “thugs” and has threatened to prosecute these dedicated law enforcement professionals for carrying out their lawful duties.

This also has a chilling effect, dissuading folks who have actionable intelligence from reaching out to ICE.

The second largest continence of federal agent who are assigned to the Joint Terrorism Task Force (JTTF) are the agents of Immigration and Customs Enforcement (ICE).  This is not by chance.  Alien terrorists all violate multiple provisions of our nations immigration laws.

Now the unthinkable has happened as the “leadership” of the Democratic Party has demanded that ICE (Immigration and Customs Enforcement) be disbanded altogether and immigration law enforcement be terminated.

I addressed this suicidal seditionist call to arms of Americans by the now radicalized Democratic Party in my recent article, Immigration Anarchists vs National Security in which I noted that Dismantling ICE would lower America’s shields in a dangerous era.

In the days, weeks and months after the attacks of 9/11 our leaders warned us that for the terrorists to succeed in carrying out deadly terror attacks in the United States they need to “Get it right” only once while our officials needed to “get it right” 100% of the time.

Beyond that slogan, that became a virtual mantra, we must understand what that really means.

There was an old humorous riddle that asked “How many fools does it take to screw in a lightbulb?”  Where terrorists are concerned the equivalent question is “How many terrorists does it take to wreck havoc on America?”  Terrorism has been defined as “asymmetric warfare.”

Terror organizations certainly do not have access to the military firepower that the United States can bring to bear.  However, as we saw on 9/11, just nineteen terrorists inflicted a greater number of casualties on the United States’ mainland than was inflicted by the Japanese fleet on the U.S. at Pearl Harbor on December 7, 1941.

Furthermore, the casualty count continues to climb and it is now estimated that more than 10,000 people continue to suffer grave consequences of the toxins that they ingested when the World Trade Center was reduced to rubble in lower Manhattan.

The horrifying reality is that every single alien who manages to enter the United States, either legally or illegally provides terrorists with that single opportunity that they need to carry out a deadly attack.

Every year tens of millions of aliens enter the United States legally and illegally.  This means that if only a fraction of 1% of the millions of aliens who enter our country annually came with the intentions of launching a massive terror attack, we are in deep trouble.

It was recently reported that last year some 700,000 nonimmigrant aliens who had been lawfully admitted through ports of entry failed to depart from the United States as required.

Annually more than 6 million applications for various immigration benefits are adjudicated by the overwhelmed and beleaguered adjurations officers of USCIS (United States Citizenship and Immigration Services).  Those benefits include political asylum, the conferring of lawful immigrant status and conferring U.S. citizenship upon resident aliens via the naturalization process.

The 9/11 Commission, to which I provided testimony, warned that immigration fraud was the key method of entry and embedding for terrorists.  These cases are investigated by ICE and are a component of what is known as “interior enforcement” of our immigration laws.

9/11 and  Terrorist Travel reported:

Once terrorists had entered the United States, their next challenge was to find a way to remain here. Their primary method was immigration fraud. For example, Yousef and Ajaj concocted bogus political asylum stories when they arrived in the United States. Mahmoud Abouhalima, involved in both the World Trade Center and landmarks plots, received temporary residence under the Seasonal Agricultural Workers (SAW) program, after falsely claiming that he picked beans in Florida.” Mohammed Salameh, who rented the truck used in the bombing, overstayed his tourist visa. He then applied for permanent residency under the agricultural workers program, but was rejected. Eyad Mahmoud Ismail, who drove the van containing the bomb, took English-language classes at Wichita State University in Kansas on a student visa; after he dropped out, he remained in the United States out of status.

Therefore, each time an alien is granted any immigration benefit or even is able to file for such a benefit, terrorists among them may acquire that opportunity essential for them to be able to launch a deadly attack.

If only a fraction of one percent of the six million applicants for immigration benefits are terrorists, we are indeed in deep trouble.

Yet the leadership of the Democratic Party not only refuses to fund the construction of a wall to secure the southern border to the United States but has demanding that the agency charged with enforcing our immigration laws from within the interior of the United States, ICE (Immigration and Customs Enforcement) be totally disbanded and enforcement of our immigration laws be terminated.

Let’s briefly consider more recent developments.

On November 20, 2013 ABC News reported, “Exclusive: US May Have Let ‘Dozens’ of Terrorists Into Country As Refugees.”  This is not a new problem, on July 13, 2011 the Washington Times published a truly disturbing article, “Visas reviewed to find those who overstayed / Aim is to find any would-be terrorists.”

On September 2, 2014 ABC News reported, “Lost in America: Visa Program Struggles to “Track Missing Foreign Students.”

Here is how this report began:

The Department of Homeland Security has lost track of more than 6,000 foreign nationals who entered the United States on student visas, overstayed their welcome, and essentially vanished — exploiting a security gap that was supposed to be fixed after the Sept. 11, 2001 terror attacks.

“My greatest concern is that they could be doing anything,” said Peter Edge, the U.S. Immigration and Customs Enforcement official who oversees investigations into visa violators. “Some of them could be here to do us harm.”

My recent articles highlighted several cases involving alien terrorists who were fortunately arrested before they could do harm.

Here are a few of those articles that provide unequivocal evidence of the severity of the threats of terrorism that America and Americans face:

Iranian Agents charged With Targeting U.S. LocationsSleeper agents/assassins in our midst?

Somali Refugees Busted In Tucson:  Immigration fraud is at the heart of a terror case . . . again.

Jihadis And Drug Cartels At Our BorderA nightmare on the horizon.

Saudi Graduate Of Al Qaeda Terror Training Camp Arrested In OklahomaAlleged classmate of 9/11 hijackers attended US flight school in 2016.

The Democratic Party leadership has chosen sides.  They stand with transnational gangs and international terrorist organizations.  They stand with human traffickers and crooked employers.

Elections most certainly have consequences, arguably more so this year than any year since the founding of our great nation.

Michael Cutler is a retired Senior Special Agent of the former INS (Immigration and Naturalization Service) whose career spanned some 30 years. He served as an Immigration Inspector, Immigration Adjudications Officer and spent 26 years as an agent who rotated through all of the squads within the Investigations Branch. He has testified before well over a dozen congressional hearings, provided testimony to the 9/11 Commission as well as state legislative hearings around the United States and at trials where immigration is at issue.

 

Article

 

a

 

Freedom of Navigation Doctrine Challenged by James A. Lyons, Adm. USN (ret.)

 

Freedom of Navigation Doctrine Challenged

By: James A. Lyons, Admiral, United States Navy (ret.)

With all the media focus on President Trump’s recent meeting with Russia’s Vladimir Putin, a major event took place last week in the strategic Bab al-Mandab Strait, which received little notice.  The Iranian-backed Houthi rebels in Yemen have acknowledged that they fired a missile supplied by Iran from the vicinity of the port city of Hodeida that hit a Saudi Aramco tanker.  In response, even though there was little damage, Saudi Arabia has suspended all its shipping from transiting the Bab al-Mandab Strait.

Clearly, the Houthi rebels have seriously challenged the internationally-recognized “Freedom of Navigation” doctrine.  The concept is that the internationally-recognized open waters of the world, including all strategic straits, should remain open and free for all commercial shipping.  By extension, this includes the peaceful transit of naval forces as well.

The Bab al-Mandab Strait, which connects the Indian Ocean/Gulf of Aden with the Red Sea, is one of the world’s key strategic straits.  Others include the Strait of Hormuz, which controls the flow of all oil and gas shipborne traffic in and out of the Persian Gulf.  Next are the Suez Canal and the Strait of Gibraltar, which connect the flow of all shipping in and out of the Mediterranean Sea.  The Strait of Malacca connects the Indian Ocean with the South China Sea.

“Freedom of Navigation” is under attack in the South China Sea, however, because China claims that almost all of the South China Sea is its territorial waters despite a ruling by an international tribunal in The Hague that China’s claim is illegal.  Of course there is also the Panama Canal, which we used to control until President Carter gave it away to Panama.  Today, it is actually under the control of China.  These key strategic choke points must remain open and free to the world’s commercial shipping traffic.

With the current war of words between the Iranian theocracy and the Trump administration, plus Iran’s recent threat to close the Strait of Hormuz, much larger issues are at stake in enforcing the “freedom of navigation” doctrine.  Iran’s role in supporting the Houthi rebels is very transparent.  It is all part of a plan to expand the Iranian Shi’ite crescent to where it becomes the dominant force in the Middle East.

Iran’s clear strategy is to physically surround the Arabian Peninsula with proxy forces supported with its own forces and materiel.  This classic Iranian ploy extends its geo-strategic reach and positions it to attack its arch-enemy, the Kingdom of Saudi Arabia, indirectly, with the ultimate objective of seizing control of the holy cities of Mecca and Medina.  Further, by backing the Houthi rebels in Yemen, it gives Iran the means to gain control of the strategic Bab al-Mandab Strait and threaten not just Saudi shipping but all international shipping.  It cannot be overlooked that more than one-third of the world’s oil in transit passes through this Strait on a daily basis.  Success would give Iran direct control of two of the world’s strategic straits and de facto control of a third, the Suez Canal.  This cannot be allowed to happen.

We cannot forget President Trump’s historic visit to Riyadh in May 2017, nor the links he forged with Sunni partners during that visit.  As a result, we have a Saudi Arabia-led coalition consisting of Egypt, Bahrain, Kuwait, Sudan and the United Arab Emirates (UAE), with US assistance, confronting the Houthi rebels and Iran.  With this impressive alliance, the question becomes, why is it taking so long for the alliance to take back control of the port city of Hodeida?  Such action would isolate the Houthi rebels in the south, and keep them from their bases in the Yemeni highlands.  It would also facilitate the recapture of the capital Sanaa and its airport.  Further, it would be a tremendous psychological blow to the rebels and Iran, and a major step in cutting off a key access point for Iranian support to the rebels.

Preventing Iran’s hegemonic objectives throughout the Middle East and beyond, which include encircling the entire Arabian Peninsula with its oil and gas resources, as well as the ultimate seizure of Islam’s two most holy cities, Mecca and Medina, must be a top Trump administration objective.  It appears that the administration has initiated a staged take-down of the Iranian regime.  Our withdrawal from the nuclear weapons agreement with Iran, known as the Joint Comprehensive Plan of Action (JCPOA), was the first step.  Re-imposing economic sanctions is having a drastic effect on the Iranian regime’s ability to operate.  The Iranian currency, the rial, is in total free fall—even a full week before even more stringent sanctions are scheduled to take hold.  Revamping our Voice of America Farsi language broadcast would be another positive signal to the Iranian freedom fighters.   We must continue other covert support to the Iranian people who are taking to the streets day after day.  And to further complicate matters for the criminal Iranian theocracy we should support an independent Kurdistan.

If, as increasingly seems apparent, the Trump administration has decided on a gradual ratcheting up of measures intended to bring maximum pressure to bear on the Tehran regime, then such steps are necessary parts of the mix.  But even above and beyond these coercive means aimed at collapsing the mullahs’ rule, with the most powerful blue water navy in the world, the U.S. has a unique responsibility to ensure freedom of the seas when threatened by Iran or any other hostile actor.  The de facto threat to shipping through the Bab al-Mandab must not be allowed to stand.

Article

 

James A. Lyons, a retired U.S. Navy admiral, was commander in chief of the U.S. Pacific Fleet and senior U.S. military representative to the United Nations.

 


 

Iran deploys 50 small boats to Strait of Hormuz for large-scale ‘swarming’ exercise

Article

a