Exploring the Dangers of Huawei’s Control of Communications and Data in Spain

Executive Summary

Through the efforts of high ranking Spanish politicians of both major parties, Huawei Technologies, a Chinese telecommunications giant, has been contracted by the Spanish government to manage critical systems, including judicially authorized wiretaps and the Sistema Integrado de Interceptación Legal de las Telecomunicaciones (SITEL), despite Spain’s alignment with European Union (EU) and NATO policies restricting Huawei’s role in 5G infrastructure although, ironically, the government of Pedro Sánchez has included Huawei in the Security Operations Center (SOC) 5G, a public entity in charge of the supervision and certification of security in 5G networks and services, joining representatives of NOKIA and Ericsson.

China’s involvement in sensitive communications and data systems raises significant concerns about US national security, cybersecurity, and geopolitical risks posed by Huawei’s role in Spain, with a particular focus on the potential threats to US personnel stationed at military bases and stations in Rota, Algeciras, Morón, Torrejón and elsewhere.

These bases are critical to US and NATO operations in Europe, the North Atlantic and North Africa, and Huawei’s access to sensitive data could compromise operational security, intelligence-sharing, and the safety of US forces.

Focusing specifically on the security implications for US military bases in Spain—Naval Station Rota, Morón Air Base, Torrejón Air Base, Algeciras (and other strategic ports),—given Huawei Technologies’ role in managing Spain’s sensitive communications, data systems, including judicial wiretaps, SITEL, and the proliferation of Chinese made EVs known to collect an abundance of data.

The presence of US personnel at these bases, which are critical to US and NATO operations, amplifies concerns about Huawei’s potential to compromise operational security, intelligence-sharing, and personnel safety.

This Report explores the specific vulnerabilities, risks to US base security, and mitigation strategies to safeguard US forces in Spain, and provides recommendations to mitigate these risks and strengthen Spain’s alignment with Western security frameworks.

Introduction

Huawei’s growing presence in Spain’s telecommunications and data infrastructure, particularly through contracts to manage judicial wiretaps and support SITEL, has sparked alarm among Spanish law enforcement, EU partners, and US officials.

While Spain has restricted Huawei’s role in 5G network cores, its continued reliance on the Chinese company for sensitive systems creates a paradox that undermines national and allied security. This is especially concerning given the presence of US military personnel at key bases in Spain, including Naval Station Rota, Algeciras (a frequent port for US naval operations), Morón Air Base, and Torrejón Air Base.

These bases support critical US and NATO missions, including missile defense, air mobility, and intelligence operations. This white paper analyzes the dangers of Huawei’s control over Spain’s communications and data systems, with a focus on:

1. National Security Risks:

The potential for Chinese government access to sensitive data under China’s 2017 National Intelligence Law.

2. Cybersecurity Vulnerabilities:

Technical risks in Huawei’s systems that could be exploited to compromise data.

3. Risks to US Personnel:

The specific threats to US military operations and personnel at Rota, Algeciras, Morón, and Torrejón.

4. Geopolitical Implications:

The impact on Spain’s relationships with the US, EU, and NATO

5. Case Studies and Precedents

Data breach cases in the UK, US, Africa and the Snowden case.

6. Chinese EVs:

The risk posed by Chinese electric vehicles’ increased use in Spain

7. Recommendations:

Policy measures to protect US personnel and align Spain with allied security standards.

Background

Huawei’s Role in Spain

In the context of the Socialist government’s increasing isolation in the world stage and an almost irrational and anachronic animosity towards the West, Spain has moved closer to Iran, Russia, China and terrorist organizations like Hamas. This is not dictated by any kind of affinity on the part of the Spanish people, but by the stubborn refusal of an unpopular government to move aside and, to the degree it is capable, create conditions to finance its permanence in power.

Thus, Huawei has been awarded contracts worth €12.3 million to provide storage systems (OceanStor 6800 V5) for judicial wiretaps and technical support for SITEL, a system used by Spanish law enforcement and intelligence agencies to intercept communications related to terrorism, organized crime, and espionage. Despite Spain’s exclusion of Huawei from 5G network cores—following EU and NATO recommendations, although the government included the company as an advisor in SOC-5G, —these contracts, awarded between 2021 and 2025, highlight a contradictory approach to cybersecurity. The Spanish government claims compliance with the National Cryptologic Center’s guidelines, but concerns persist about Huawei’s access to sensitive data, and the Spanish government continues to grant them almost unfettered access.

US Military Presence in Spain

Spain hosts several critical US military installations:

Naval Station Rota, is a joint US-Spanish naval base hosting US Navy destroyers equipped with Aegis missile defense systems, critical for NATO’s ballistic missile defense. NAVSTA Rota supports Naval Forces Europe Africa Central (EURAFCENT), 6th Fleet and Combatant Commander strategic priorities by providing airfield and port facilities, security, force protection, logistical support, administrative support and emergency services to all U.S. and NATO forces. Situated on a 6,100-acre Spanish Navy base, NAVSTA Rota provides cargo, fuel and logistics support to units transiting the region, supporting U.S. and NATO ships with three active piers; U.S. Navy and U.S. Air Force aircraft with a 670-acre airfield; and the largest weapons and fuels facilities in Europe, all located within a single, secure fence-line.

Algeciras, is a strategic port used by US naval vessels for resupply and operations in the Mediterranean. Alas, last year Spanish authorities refused entry to American flagged ships bound for Israel, and recently the Federal Maritime Commission excluded Algeciras from a key route, in favor of Tanger Med in Morocco.

Zaragoza Air Base,once an American base, was transferred to Spain in 1992, but remains a key hub for US Air Force mobility and logistics operations in Europe, same as Torrejón Air Base, once home to the US Air Force’s 16th Air Expeditionary Wing, and NATO’s Combined Air Operations Centre, now relegated to mostly for official visits. Zaragoza was used during the Gulf War, Operation Kosovo and the war in Afghanistan.

Morón Air Base, since 2015, has been home to up to 3,000 US military and civilian personnel and 40 aircraft of the Special Purpose Marine Air-Ground Task Force – Crisis Response – Africa.

These bases rely on secure communications, intelligence-sharing, and coordination with Spanish authorities and NATO to execute missions effectively. Huawei’s involvement in Spain’s communications infrastructure introduces potential vulnerabilities that could directly impact base security.

Global Concerns About Huawei

Huawei’s ties to the Chinese Communist Party (CCP) and its obligations under China’s 2017 National Intelligence Law have led to bans in the US, UK, Australia, and several EU countries.

This National Intelligence Law mandates Chinese companies to assist state intelligence efforts, raising well-founded fears that Huawei’s systems could be used for espionage or sabotage. Reports of vulnerabilities in Huawei’s equipment, including unpatched interfaces and potential backdoors, further heighten these concerns.

It is, therefore, naïve and irresponsible to consider Huawei as anything other than an instrumentality of the Chinese government and the Communist Party of China at the service of its intelligence services and military operations.

1. National Security Risks

Chinese Government Access to Sensitive Data

China’s National Intelligence Law compels Huawei to cooperate with state intelligence agencies, creating a pathway for the CCP to access data stored on Huawei’s OceanStor systems.

In Spain, these systems handle judicial wiretaps, which include communications related to national security threats. Unauthorized access by Beijing could expose sensitive intelligence, including data relevant to US military operations, movements of US military and civilians at US military posts not only in US bases but at all military installations, given Spain’s role as a NATO ally.

Compromised Intelligence-Sharing

The US has expressed concerns about Spain’s Huawei contracts, with lawmakers like Senate Intelligence Committee Chairman Tom Cotton warning that intelligence-sharing could be curtailed if vulnerabilities persist. In a letter to DNI Tulsi Gabbard on 17 July, 2025, Senator Cotton and Congressman Crawford wrote: “Since the first Trump administration, the United States has waged a whole of government effort to remove the threat Huawei equipment poses to American networks, infrastructure, and privacy. Until Spain follows suit, the U.S. Government should ensure that any information shared with the Spanish government is redacted of details that should not be shared with the CCP.”

The Five Eyes alliance (US, UK, Canada, Australia, New Zealand) and NATO rely on secure data exchange, and any breach in Spain’s systems could expose US and allied intelligence, compromising missions supported by Rota, Morón, and Torrejón.

For example, at Rota, where 4,000 US personnel and families reside, compromised data could facilitate foreign intelligence operations, including surveillance or recruitment attempts.

Technical Vulnerabilities in Huawei Systems

Reports, such as the 2019 UK National Cyber Security Centre Assessment, have identified flaws in Huawei’s software, including unpatched vulnerabilities and poor engineering practices. These weaknesses in the OceanStor systems or SITEL infrastructure could be exploited to:

· Install backdoors for real-time data access.

· Deploy malware to disrupt base communications or logistics.

· Manipulate data to mislead US or Spanish intelligence efforts.

Such vulnerabilities could directly affect the operational readiness of bases like Morón, where secure logistics are critical, or Torrejón, where NATO’s air operations depend on reliable command systems.

US shares sensitive intelligence with Spain through NATO and bilateral agreements, particularly for counterterrorism and missile defense operations at Rota and Morón. Huawei’s access to Spanish systems could lead to leaks, prompting the US to restrict intelligence-sharing. This would:

· Limit situational awareness for US personnel, increasing operational risks.

· Weaken joint US-Spain missions, such as those supported by Morón’s air mobility hub.

· Undermine NATO’s collective defense, particularly at Torrejón’s CAOC, whose primary mission is to “plan, direct, coordinate, monitor, analyse and report on the operations of Air Policing means assigned to it in peace time. The unit’s area of responsibility comprises European NATO airspace south of the Alps. Hence Combined Air Operations Centre Torrejón is responsible for some of NATO’s special Air Policing arrangements, such as Air Policing over Albania, Montenegro, North Macedonia and Slovenia.”

2. Cybersecurity Vulnerabilities

Technical Weaknesses in Huawei’s Systems

A 2019 UK National Cyber Security Centre report identified “significant” flaws in Huawei’s software, including poor engineering practices and vulnerabilities that could be exploited by state or non-state actors. The OceanStor 6800 V5 systems used for wiretap storage may contain similar weaknesses, such as unpatched telnet interfaces or embedded malware, as reported in other Huawei devices. A breach of these systems could allow adversaries to access or manipulate data critical to law enforcement and intelligence operations.

Insider Threats and Lack of Transparency

Huawei’s opaque governance, with reported ties to the CCP through its trade union committee and leadership (e.g., former chairwoman Sun Yafang’s Ministry of State Security background), raises concerns about insider threats. Employees or subcontractors could be pressured to install backdoors or leak data, compromising Spain’s surveillance systems and, by extension, US military communications.

3. Risks to US Personnel

Operational Security at US Bases

US personnel at Rota, Algeciras, Morón, and Torrejón rely on secure communications for mission planning, logistics, and intelligence coordination. Huawei’s access to SITEL and wiretap data could allow adversaries to intercept communications related to US operations, such as ship movements at Rota or air missions from Morón. This could enable adversaries to track US forces, predict operational patterns, or disrupt missions.

Espionage and Targeting of Personnel

Sensitive data stored on Huawei systems could include communications involving US personnel, such as intercepted calls or metadata related to military activities. If accessed by the CCP, this data could be used to target US service members for espionage, blackmail, or cyberattacks. For example, compromised communications could reveal personal details about personnel at Torrejón, increasing their vulnerability to foreign intelligence operations.

Impact on NATO Missions

Rota and Torrejón are integral to NATO’s missile defense and air operations. A breach of Spanish communications systems could undermine NATO’s ability to respond to threats, such as Russian aggression in Eastern Europe or missile launches from rogue states. This would directly affect US personnel tasked with executing these missions.

4. Geopolitical Implications

Strained US-Spain Relations

The US has urged Spain to reconsider Huawei’s role, with warnings from officials like Assistant Secretary of Defense Celeste Wallander about the risks to bilateral defense cooperation. Continued reliance on Huawei could lead to reduced US investment in Spanish bases or restrictions on joint operations, weakening the US-Spain defense partnership. In a hearing on US Military Posture and National Security Challenges in Europe, Dr. Wallader stated: “I think the areas of our greatest concern are when China is, largely through technology companies–Huawei is the kind of poster child for that–and so we work closely in sharing intelligence and our information about the risks that that creates for countries in Europe and, more broadly, globally, for them to be able to control their infrastructure, to control their communications. So that is one major line of

effort.

But the other major concern is when we see China seeking majority control of ports, and while there were some instances in Europe some time ago where countries did not take that seriously, they are now very much attuned to that and have taken steps to make sure that even if there is investment it does not allow…”

EU and NATO Misalignment

Spain’s permissive stance on Huawei diverges from the policies of 11 EU countries, including Germany and Sweden, which have restricted or banned Huawei (and ZTE) from critical infrastructure. Besides these eleven countries, 21 have implemented rules allowing their national authorities “to restrict or prevent suppliers considered as high-risk for 5G networks, when deemed necessary.”

Alas, a back door opened wide in Spain creates a potential “weak link” in the EU’s digital security framework, undermining collective defense efforts and exposing NATO operations to risk.

Continued use of Huawei could also embolden other NATO countries to relax restrictions on high-risk vendors, creating broader vulnerabilities for US forces in Europe.

4.3 Human Rights Concerns

Huawei’s technologies have been linked to the CCP’s surveillance of Uyghurs in Xinjiang, raising ethical concerns about their use in democratic countries. Spain’s reliance on Huawei for surveillance systems risks normalizing technologies associated with human rights abuses, potentially eroding public trust in government institutions and complicating US-Spain cooperation on democratic values.

Case Studies and Precedents

United States

The US banned Huawei from its networks in 2012 and added it to the Entity List in 2019, citing espionage risks. In 2022, the Biden administration prohibited Huawei equipment in telecommunications, labeling it an “unacceptable risk.” These measures reflect concerns about Huawei’s potential to compromise military and intelligence operations.

United Kingdom

The UK’s 2020 decision to remove Huawei from 5G networks by 2027 followed a National Cyber Security Centre report highlighting software vulnerabilities. The UK’s experience underscores the risks of relying on Huawei for critical systems, particularly in a NATO context.

African Union Data Breach In 2018

Le Monde reported that Huawei equipment at the African Union headquarters was linked to data breaches allegedly orchestrated by the Chinese government. This incident illustrates the risks of Huawei’s involvement in sensitive systems, with direct relevance to Spain’s wiretap storage.

Snowden

In 2013, Edward Snowden’s leaks exposed US intelligence-sharing vulnerabilities, impacting operations at bases like Rota. A Huawei breach could have similar consequences, exposing NATO and US plans.

4. Chinese EVs in Spain

The impact of Chinese electric vehicles (EVs) in Spain, particularly near US military bases, raises their own significant concerns about national security, data privacy, and geopolitical implications, especially in light of the Israeli investigation into potential spying and data collection by Chinese EVs.

Chinese EV brands like BYD, MG Motor, and Chery have gained traction in Spain due to their competitive pricing, and the Spanish governments commitment to expand its relations with China. The global electric car market is projected to reach 22 million sales by 2025, with China leading in adoption and manufacturing. In Spain, Chinese brands dominate the affordable EV segment, with models like the BYD Atto 3 being particularly popular.

If the use of these EVs near military bases were not a matter of serious concern, their adoption by the Spanish armed forces brings a new level of risk to the fore. The Spanish Army has acquired 170 Chinese-made electric vans for military use, at a cost of €2.5 million (U$S 2.9 million). These vehicles are used in sensitive areas, including near US military bases, such as those in Rota and Morón.

In August 2025, the Israeli Defense Forces (IDF) implemented a comprehensive ban on Chinese-made vehicles entering military bases, citing fears of data leaks from onboard cameras, sensors, and connected systems. This followed an initial restriction in July 2025 at the Gideonim Communications Corps base and was expanded due to concerns that Chinese EVs could record audio, video, and geolocation data, posing a threat to military operations. The IDF also suspended a tender for BYD Atto 3 vehicles after cybersecurity warnings.

But Israel is not alone in its concerns. The UK banned Chinese EVs from military sites in April 2025, citing espionage risks, and instructed personnel to park these vehicles at least two miles from sensitive sites like RAF Wyton. The US has also proposed regulations to prohibit Chinese tech in connected vehicles due to concerns about data collection and potential remote manipulation.

Indeed, Chinese EVs are equipped with advanced sensors, cameras, and connectivity features that collect vast amounts of data (e.g., up to 1400 GB per hour, though only a fraction is transmitted). Under China’s National Intelligence Law, Chinese companies may be compelled to share data with the government, that is with the Chinese Communist Party, raising fears of espionage, especially near sensitive military installations.

As a former MI6 boss (Ian Williams) so poignantly put it: “EVs are also the perfect tools for sabotage, surveillance and espionage – as well as targeted assassinations.”

5. Implications for US Personnel in Spain

Compromised Operational Security

A breach of Huawei-managed systems could expose communications related to US naval operations at Rota or air missions at Morón and Torrejón, enabling adversaries to disrupt logistics, missile defense, or intelligence operations.

Reduced Intelligence-Sharing

US concerns about Huawei could lead to restrictions on intelligence-sharing with Spain, limiting the information available to US personnel at Spanish bases. This could hinder mission planning and situational awareness, increasing risks to personnel.

Economic and Strategic Dependencies

Spain’s increasing reliance on Huawei risks creating long-term dependencies on Chinese technology, potentially limiting US access to alternative, secure systems for joint operations. This could complicate US efforts to maintain secure communications at its, and NATO’s bases.

6. Recommendations

To mitigate the risks posed by Huawei’s role in Spain’s communications systems and protect US personnel, the following measures are recommended:

· Conduct a Joint US-Spain Security Review

The US and Spain should jointly assess Huawei’s role in SITEL and wiretap storage, focusing on risks to US bases. The review should involve the US Department of Defense and Spain’s National Intelligence Centre (CNI).

· Phase Out Huawei Equipment

Spain should establish a timeline to replace Huawei’s OceanStor systems and SITEL support with equipment from trusted vendors (e.g., Nokia, Ericsson). This aligns with Germany’s 2026 deadline for removing Huawei from 5G networks.

· Strengthen Base Communications Security

The US should deploy independent, encrypted communications systems at Rota, Morón, Zaragoza and Torrejón to reduce reliance on Spanish infrastructure potentially compromised by Huawei, and harden its communications.

· Enhance EU-NATO Coordination

Spain should collaborate with the EU and NATO to develop a unified framework for excluding high-risk vendors from sensitive systems, ensuring alignment with allies and protecting US and NATO personnel.

· Increase Transparency and Oversight

Until Huawei is removed from Spanish communications altogether, Spain should mandate regular audits of Huawei’s systems by the National Cryptologic Center and share results with US and NATO partners to rebuild trust.

· Engage in Bilateral Dialogue

The US and Spain should hold high-level talks to address Huawei concerns, emphasizing the importance of secure communications for joint defense operations and the safety of US personnel.

· Ban Chinese-made electric vehicles

Chinese EVs should not be allowed in an area of at least five miles from any military base, and most certainly should not be permitted to enter any military installation.

· Deploy Independent Systems

It is imperative that, as soon as feasible, Spain move towards replacing Huawei technology with safe and reliable systems readily available in the West. In a rather incomprehensible statement outside of the context of the subservience of Spanish politicians to Chinese ambitions, Esteban González Pons, until recently EU Vice-President, and currently the Vice-Secretary-General of the main opposition party in Spain, declared: “Without Huawei, 5G is not possible.

It should come as no surprise that there is an investigation in Belgium of over 15 European Parliamentarians, including González Pons, for alleged payments received from Huawei to promote it. Selling influence frequently falls into such absurd affirmations.

Operation “Follow the money” must be supported and corrupt politicians risking the lives of NATO forces must be rooted out of the European Parliament.

· Secure Satellite Communications

Expand use of US-controlled satellite networks for sensitive operations, particularly at Rota for naval coordination and Torrejón and Morón for NATO air operations.

The technology is available, trusted and ready to be deployed.

· Regular Cybersecurity Audits

Conduct frequent audits of base networks to detect and mitigate vulnerabilities, ensuring no integration with Huawei-managed systems.

Conclusion

Huawei’s control of sensitive communications and data systems in Spain, and Chinaa’s corrupt meddling in European affairs poses significant risks to national security, cybersecurity, and the safety of US personnel at Rota, Algeciras, Morón, Torrejón and, indeed, every post in the European and North African theater.

The potential for Chinese government access to judicial wiretaps, coupled with Huawei’s technical vulnerabilities and Spain’s divergence from EU and NATO policies, threatens operational security and intelligence-sharing.

By implementing the recommended measures—phasing out Huawei equipment, strengthening base communications, and enhancing allied coordination—Spain can mitigate these risks, protect US personnel, and reinforce its commitment to Western security frameworks.

Alas, phasing out Huawei equipment is no longer sufficient, without an effective control of an increasing number of Chinese EVs in circulation, even in use by the Spanish military forces.

It is imperative that the US move now to mitigate these risks and ensure the safety of our installations and security of our military personnel.

References

Huawei’s paradox in Spain: No to 5G, but yes to wiretap storage

Spain under fire for contracting Huawei to store judicial wiretaps – POLITICO Fears over Huawei’s use in Spain’s intelligence and police systems

Spain’s Huawei Deal Is a Wake-Up Call for U.S. Federal Procurement Reform – War on the Rocks

Spain chooses Huawei for intelligence wiretaps despite risks –

Spain awards Huawei contracts to manage intelligence agency wiretaps | The Record from Recorded Future News

Spain denies security risk claims against Huawei following US criticism – Huawei Central

Spain’s Sánchez dodges backlash over Huawei deal amid EU and US concerns – Euractiv

Spain confirms using Huawei to store judicial wiretaps, denies security risk | The Straits Times

Spain awarded €12.3 million in contracts to Huawei

Spain: Huawei must not be allowed access to wiretap data in the EU – ARTICLE 19

Huawei to supply Spain with wiretap storage​| Cybernews

Is China’s Huawei a Threat to U.S. National Security? | Council on Foreign Relations

British Watchdog Finds ‘Serious’ Huawei Security Vulnerabilities | CRN

UK intelligence finds ‘new risks’ linked to Huawei – POLITICO

The Huawei Dilemma: Why Europe Needs Strong Intelligence Guardrails – The Cipher Brief

US military bases in Spain and their importance

Spain’s contribution to integrated air defense in Europe. Global Affairs. University of Navarra

Israel suspects espionage and bans Chinese cars from all military bases!

Are Chinese electric cars coming to spy on us? | The Week

Chinese electric cars prompt security fears as ‘every major defence supplier is concerned about tech’

The horrifying reality of how China could cripple Britain in one move | World | News | Express.co.uk

The horrifying truth about how China could cripple Britain in just seconds – by barely lifting a finger… as former MI6 boss makes desperate plea to end our reliance on Beijing: IAN WILLIAMS | Daily Mail Online

Los 24 años de Huawei en España: contratos con administraciones, vídeos promocionales y road shows – Libre Mercado

El Gobierno incluye a Huawei en el organismo público que controla el 5G | Economía | EL PAÍS

Estados Unidos expulsa a España de una ruta de comercio marítimo estratégica

United States drops Port of Algeciras from one of its key maritime routes

Huawei, F-35s, and Algeciras: Spain Drifting Away from the U.S. ━ The European Conservative

Maersk Shifts Major Shipping Route from Algeciras to Tanger Med

Naval Station Rota

https://www.cotton.senate.gov/news/press-releases/intel-chairs-cotton-and-crawford-to-gabbard-review-intelligence-sharing-with-spain
https://www.ncsc.gov.uk/annual-review/2019/ncsc/index.html
https://ac.nato.int/about/caoc/torrejon
https://www.congress.gov/event/118th-congress/house-event/LC72759/text
https://www.euronews.com/next/2024/08/12/eleven-eu-countries-took-5g-security-measures-to-ban-huawei-zte
https://gaceta.es/europa/sin-huawei-no-hay-5g-posible-la-defensa-de-gonzalez-pons-del-gigante-chino-en-europa-20250313-1340
https://gaceta.es/europa/sin-huawei-no-hay-5g-posible-la-defensa-de-gonzalez-pons-del-gigante-chino-en-europa-20250313-1340

Beyond the Hype: Recent Wars Expose the Myth of Adversarial Strength and Force a U.S. Rethink on Global Threats

As global tensions sweep across headlines, American policymakers and the public alike are beginning to reevaluate what truly constitutes a threat. The Iran-Israel “Twelve-Day War” and the ongoing Russia-Ukraine conflict have brought into sharp relief the need to recalibrate how the United States and its allies judge adversarial strength. Today, a clear reassessment is critical—one that puts aside the veils wrought by media-driven perceptions and political agendas and focuses squarely on the real capabilities of those challenging Western interests.

On June 13, 2025, Israel launched a bold and coordinated strike against Iranian military and nuclear facilities, a move that quickly became known as the “Twelve-Day War.” In less than two weeks, Israel decisively dismantled both Iran’s offensive and defensive capabilities—a result that stunned a world conditioned to fear Iran’s perceived military prowess. Israeli operations neutralized Iranian military leadership, destroyed nuclear assets, and crippled air defenses, all while neutralizing retaliatory attacks delivered via Iran’s proxies: Hamas, Hezbollah, and the Houthis. Despite initial fears, these attacks failed to alter the strategic situation. Israel’s technological superiority and the defensive cooperation from the United States overwhelmed Iran’s responses.

This outcome revealed a crucial truth: Iran’s real strength was not its direct military power, but rather its ability to finance and coordinate proxy groups throughout the region. For years, the Gulf and broader Middle East have lived under the shadow of Iran’s expanding influence, largely due to Tehran’s capacity to fund armed loyalists. The country’s reputation as a regional giant—amplified by repeated media cycles and political rhetoric—was in fact out of step with reality. Closer scrutiny of the ways Iran launders oil profits and funds its proxies could have led to a more honest assessment of its true threat level. Policymakers focusing only on Iran’s weapons arsenal risked missing the financial and diplomatic networks driving its influence.

Iran’s threat to regional stability essentially operates through relationships with its proxies. By funneling money, equipment, and training to Hamas, Hezbollah, and Houthi groups, Iran has expanded its reach and destabilized Western interests with asymmetric tactics and gray-zone warfare. Yet, Israel’s rapid disruption of Iranian command centers exposed the vulnerability underlying this approach. The real Achilles’ heel was not just military weakness, but the fragility of Tehran’s external relationships, supply lines and financial channels. U.S. intelligence and recent analyses now highlight Iran’s strengths in missile and drone development, cyber operations, and propaganda campaigns, but suggest these tools do not represent the existential threat they are sometimes portrayed to be.

Countering Iran’s strength, therefore, means going beyond headline military assets to targeting the economic arteries sustaining its power. That includes a sharper diplomatic focus on Iraqi relations, and more aggressive pressure on oil laundering operations—the very mechanisms that fund Iran’s destabilizing activities. Western strategy must recognize that Iran’s real leverage is economic and indirect, not conventional military might.

Turning to Russia, the ongoing war with Ukraine stands as a dramatic case study in misperception versus reality. When Russia first invaded, the world largely expected Ukraine to be swiftly subjugated. Instead, as of August 2025, Ukraine continues to resist, and Russian forces have suffered extraordinary losses—U.K. MOD estimates, “approximately 1,000,000 casualties (killed and wounded). Of these, it is likely around 250,000 Russian soldiers are killed or missing.” The scale of attrition has exposed vulnerabilities that most analysts and policymakers failed to anticipate.

From the Obama era through the first Trump and Biden administrations, the U.S. saw Russia as its dominant adversary. Yet this protracted war, now stretching beyond three years, has forced a reassessment. Russia remains formidable in domains such as cyberwarfare and disinformation, but the narrative of unstoppable power has been undermined by the realities of battlefield attrition, tactical missteps, and the resilience of Ukrainian defense.

This uncertain situation also points to the importance of strategy in Western commitments. The incremental, “just enough” military aid provided to Ukraine has proved problematic: it keeps the war ongoing without ensuring victory or a swift conclusion. I have long argued that only robust support or no involvement at all would have served Western interests—a half-measure merely prolongs the suffering, with no strategic benefit.

Despite initial beliefs in their overwhelming strength, both Russia and Iran have demonstrated that their “bark” has been far more formidable than their “bite.” Their leaders—Putin and the Ayatollah—have preferred to project war through perceived rather than actual strength, investing heavily in propaganda campaigns and influence operations – something that Western mainstream-media was all too willing to follow. This approach shapes perceptions internationally even as their actual capabilities have been exposed as more limited than once feared.

For U.S. policymakers, these conflicts stress the urgent necessity to reassess threats. Real danger to America does not always come from adversaries dominating the news cycle with bold rhetoric, but from those who wield tangible capacity to disrupt security and economic stability. Greater emphasis must be placed on understanding the financial and shadow networks behind proxy wars, the vulnerabilities hidden beneath the surface, and the subtle threats—cyber, economic, diplomatic—that don’t make headlines.

As President Trump and European leaders host Ukraine’s Volodymyr Zelensky at the White House in hopes of negotiating peace, the lessons of the past year have come into stark notice: reputation and rhetoric alone do not define adversarial strength. Real assessment must be built on honest appraisal of capability and intent, not amplified fears or outdated narratives.

The world is more uncertain than ever, but recent events have helped to shatter some longstanding assumptions. Iran, once considered an unassailable regional force, saw its military infrastructure dismantled in less than two weeks. Russia, assumed to be an existential threat to American and European stability, remains embroiled in a war it cannot win easily. The common thread is clear: threats must be measured by real capabilities rather than reputation alone.

For American security, the challenge moving forward is to see through the noise, to base policy on reality rather than perception, and to ensure that future responses are built on genuine understanding. Only by doing so can the U.S. and its allies secure lasting peace, deter aggression, and shape a future that matches the gravity of the moment.

Eli M. Gold is the president of the Gold Institute for International Strategy, a Washington, DC- based think-and-do tank.

The Cartel of the Wretched

This paper investigates the sprawling transnational corruption network known as the Cartel of the Wretched.      

Led by Dmitry Romanovich Li, a former schoolteacher turned oligarch, whose influence has infiltrated Uzbekistan’s political, economic, and energy sectors. Described as a “puppet master,” Li heads a vertically integrated cartel that manipulates critical industries—finance, energy, mining, telecommunications, healthcare, and public procurement—under the cover of Uzbekistan’s sovereignty and President Shavkat Mirziyoyev’s reformist agenda.

Alongside key operatives Prime Minister Abdulla Aripov and Minister of Economy and Finance Jamshid Kuchkarov, Li’s cartel controls over $14 billion in assets, generating an estimated $3 billion annually through illicit means.

At the heart of this network lies Octobank, a financial hub facilitating money laundering, sanctions evasion, and the diversion of state resources.

The cartel’s energy sabotage strategy caps renewable capacity at 20 GW— contradicting the president’s 50% renewable energy target by 2030—and prioritizes gas power plants aligned with Russia’s 2027 gas supply plans, deepening Uzbekistan’s energy dependency from Russia. Economically, this has led to a 23% drop in energy production since 2000 and a 54% decline in per capita energy supply, exacerbating living conditions and environmental hazards.

Geopolitically, the cartel’s ties to Kremlin-backed elites and its role in evading Western sanctions threaten regional stability and expose Western investors to significant risks. Evidence of violence, including assassination attempts and mysterious deaths, underscores the cartel’s ruthless enforcement mechanisms.

We urge immediate action from the Uzbek government and the international community to dismantle this shadow empire and safeguard Uzbekistan’s future.

To read the full paper click here

Eli M. Gold is the president of the Gold Institute for International Strategy, a Washington, DC- based think-and-do tank.

National Security Strategy

The purpose of this National Security Strategy (NSS) is to identify three strategically significant but neglected threats and opportunities that directly impact U.S. national security long-term. The first is an “uncomfortable truth” for much of official Washington. America’s authoritarian adversaries have infiltrated and subverted from within every key American government agency and institution. This is not a new phenomenon, but the current depth, breadth, and ferocity of such is unprecedented. The underappreciated reason for this is that, unlike during the Cold War, America’s authoritarian adversaries see their transformation of America into an authoritarian regime, like them, as a matter of life-or-death for their continued survival.

The second neglected threat addressed by this NSS is another uncomfortable truth. It is a byproduct, or natural consequence, of the aforementioned ideological infiltration of our government and institutions. Today, a significant percentage of America’s most senior leaders, including government and military officials, have adopted Beijing’s and Moscow’s strategic objectives for America as their own. This has resulted in a level of U.S. policy convergence with Beijing and Moscow that is weakening the U.S. and its allies while strengthening our strategic adversaries.

The third threat addressed by this NSS is a natural outgrowth of the second. Like America, most of our democratic allies face a plague of foreign adversary internal subversion. Given this common threat, instead of each ally addressing it alone, we should confront it together and see this shared, persistent, threat as an opportunity to professionalize the crafting and execution of alliance strategy against these and other challenges to our alliances.

Read More

The Failures of the Intelligence Agencies and the Secret ServiceSecurity Planning for Major Presidential Events in 2025 and Beyond

EXECUTIVE SUMMARY

In the wake of President Trump’s decisive win of the White House and the successful GOP wins of the House and Senate, the political arena in Washington has shifted from preventing a Trump win to sabotaging his “Promises Made, Promises Kept” agenda. Ranking Democrats, donors, governors and mayors in many blue states are launching concerted offensives to thwart the Trump agenda as much as possible as outlined in The New York Times:[1] As of this writing, leading Democrats are working hard to “Trump proof” earlier liberal initiatives and delay the confirmation of numerous, key Trump cabinet positions and dilute the 2nd Trump administration’s agenda.[2] [3] Senator Tom Cotton described it as follows: “What this is really about is trying to drag out all of these nominations to play procedural games,”[4]

Looking forward to President Trump’s second term, the following concerns with suggested remedies are set forth in this article.

1. The benefits of robust integrated security preparation for official events to include the State of the Union and beyond;

2. Improving the Secret Service, its performance and future viability as the nation’s elite protective federal agency; and

3. Reforming the deep state to prevent sabotaging the current and future U.S. Presidents and implementing reforms identified by several Inspectors General reports.

The Need for Effective, Integrated Security Planning for the State of the Union (Joint Session of Congress) and Future Official Events

In an effort to provide context to factors that may fuel potential protests and unrest with upcoming events to include the Joint Session of Congress (scheduled for March 4, 2025) and beyond, the following is set forth.

Key in the security planning process is and will be trusting the Intelligence Community (IC). The Trump administration is in the process of installing its IC leader picks. It is expected the security planning processes and critically, the integrated representation among the law enforcement jurisdictions will be effective. (We have seen this play out for both the 2024 election certification and the 2025 Inauguration.)

Concern over providing security for presidential events moving forward is based on the recent history of intelligence failures.[5] [6] For example the intelligence provided by the FBI and the DHS Office of Intelligence Analysis (I&A) to Capitol Police Chief Sund and the U.S. Park Police (USPP) prior to January 6, 2021 was incomplete and omitted threats targeting the election certification.

The Capitol Police (USCP), DC Metropolitan Police (DCMP), the USPP, the U.S. Secret Service and the public all deserve accurate and complete information from these agencies with respect to anticipated crowd size, crowd composition and planned protests for major events. Scalable security planning requires this for every U.S. President. If existing intelligence warrants it, a National Special Security Event (NSSE) should be declared by DHS.[7]

Moving forward in 2025 the Secret Service and other law enforcement agencies are collectively facing a disturbing quandary of mistrust across the board…discriminating fact from disinformation is becoming increasingly challenging as of this writing. The need for integrated, robust and effective operational planning with involved law enforcement jurisdictions is a serious concern.[8] Further, the critical and immediate need for the FBI and I&A to be transparent, diligent and forthcoming with ALL relevant intelligence (real time) impacting the Trump administration cannot be overstated.

These concerns during the current Trump administration are legitimate. The lack of the IC’s integrated planning with law enforcement is well documented in Chief Sund’s book, Courage Under Fire, Under Siege and Outnumbered 58-1 On January 6th. Notably, among other revelations, Sund’s book details: “An exposé of critical intelligence and military failures surrounding January 6 and the subsequent attempts to cover them up”[9]

Steps need to be taken immediately to ensure transparency of all agencies’ official preparations and actions.

What Can be Done Immediately?

Looking forward to the State of the Union, the USCP, Secret Service and FBI, the Senate leadership, the House of Representatives leadership and the Senate and House Sergeants at Arms need to support the following unified and unequivocal actions and message:

· There will be ZERO TOLERANCE for any disruption during the State of the Union Address and beyond;

· This official position needs to be unanimous and declared applicable nationwide;

· Prepare pre-recorded safety and security messages for dissemination to the public;

· For the Metropolitan DC area—The DCNG, the DC Mayor, the D.C. Metropolitan Police (DCMP), the Arlington Police Department (APD) and USPP will partner with the USCP and the Secret Service and craft Memoranda of Understanding (MOUs) to devise integrated security plan(s);

· Establish a clear, chain-of-command communications security assets approval process among all concerned prior to any major events;

· Provide dedicated and tested communication links to the National Threat Assessment Center (NTAC) to facilitate immediate intelligence and incident reporting from all law enforcement sectors, local, state and federal; and

· Review prior event after-action reports, identify missteps and establish consensus for corrections among concerned law enforcement agencies.

The State of the Secret Service – Can it be Saved?

A serious concern that January 6, 2021 brought into focus, and more recently with the two assassination attempts of President-elect Trump in July and September of 2024, the competence of the Secret Service. Directly connected is its relationship with the IC and the Biden Administration. Equally troubling is the lack of protective resources, i.e. experienced protective agents, counter-sniper teams, technical security teams, counter-surveillance and intelligence teams and worse—weak leadership—have profoundly hampered the Secret Service mission. In addition, Diversity, Equity and Inclusion (DEI) policy initiatives, excessive demands to staff 35 protective details (for a variety of government officials), lack of mandated training, diluted hiring practices and very low morale have exacerbated the agency’s problems.

Today’s Secret Service finds itself in the midst of a cauldron of divisive issues that has been boiling in recent years. Given this, it is critical to identify strategies and plans to improve its protective competence and get ahead of any post-election potential unrest with growing domestic and foreign threat levels. This may prove to be a herculean task since successful mitigation is predicated on open and coordinated bipartisan support. This may be a naïve goal given the division in the nation’s populous, even now, post-election. It appears the basis of the contention up to the election and now, despite the clear Trump election victory, was to beat Trump. Now many Democrat leaders are vowing to sabotage the Trump administration’s proposed initiatives.

These factors and others continue to affect the effective protective operations of the Secret Service.

Considering these circumstances and alarmingly, two assassination attempts, the identification of Iranian assassination plots coupled with the recent operational failures of the Secret Service to implement basic protective security measures—their mission capability will require profound changes.

Reports continue among the Trump detail security agents, whistleblowers and former President Trump and now President Trump, the FBI has selectively and slowly released assassination plot and other threat information to the Secret Service. This has created distrust between the FBI and the Secret Service. On October 26, 2024, Business & Politics (BPR) reported “the DHS Office of General (OIG) admitted to Senator Grassley the DHS has a troubling history of obstruction, which Grassley cited as a “major red flag” for oversight.” Violations of the Whistleblower Protection Enhancement Act (WPEA) are also being reported.[10] Other disturbing whistleblower reports allege “Acting Secret Service Director Rowe ‘blocked’ OIG auditors from reviewing former President Donald Trump’s security protocols.”[11]

Most disturbing, there is evidence of mistrust within the Secret Service ranks. For its mission to survive, the leadership must be overhauled, top to bottom. It will require a thorough assessment to redefine its mission and test its capability in the face of the emerging threats from enemy states. This cannot be accomplished in-house.

Following the Capitol protests in 2020, USCP Chief Sund implemented a pro-active intelligence gathering approach but received no threat intelligence by the FBI, Secret Service, DHS and DCMP. Sund stated “there was no indication that a well-coordinated, armed assault on the Capitol might occur on January 6.” This assessment was based on intelligence or the lack thereof provided to Sund. On January 4th and January 5th, Sund hosted two intelligence meetings with the USCP Intelligence and Inter-Agency Coordination Division and with a dozen of the top law enforcement and military officials from Washington, D.C., including the FBI, U.S. Secret Service and the National Guard.[12]

Sund stated: “During both meetings, no entity, including the FBI, provided any intelligence indicating that there would be a coordinated violent attack on the United States Capitol by thousands of well-equipped armed insurrectionists.”

In the Department of Homeland Security Inspector General’s (DHSIG’s) Final Report: The Secret Service’s Preparation for, and Response to, the Events of January 6, 2021 dated July 13, 2024, by Joseph V. Cuffari, Ph.D., the Inspector General reported intelligence failures and policy related operational failures.[13] Six recommendations were made to improve preparedness between the Secret Service and the USCP. A few have been met.

The burning question—with this backdrop, how can the Congress and law enforcement officials adequately rely on intelligence agency reporting, the current administration’s support (or the lack thereof) and media reporting to prepare for potential disruptions in 2025? To effectively prepare for the State of the Union, the Secret Service should establish specific and stringent MOUs with the FBI and the I&A to ensure they share timely and thorough intelligence impacting their protectees and NSSE’s in the future. This was not done prior to January 6, 2021. For example, security planning for NSSE events in DC should include close collaboration with military counterparts. This will ensure the DCNG and the DCMP are able to more seamlessly expedite crowd control responses. Critically, an agreed upon communications (tested) protocol among these agencies is required.

It has been observed by many law enforcement authorities the Secret Service is operating under a flawed threat model, i.e. a 1960’s era lone assassination threat. Today’s Secret Service has not fully embraced emerging technologies. The agency has not studied terrorist threat methodologies to see its benefit in varying environments.

The Secret Service published its <a href=”https://www.secretservice.gov/sites/default/files/reports/2023-01/usss-ntac-maps-2016-2020.pdf”> Secret Service Threat Assessment Centers Mass Attacks in Public Places Guidance in January 2023 through its National Threat Assessment Center (NTAC). This guidance focuses primarily on behavioral threat assessment metrics based on meta-data gleaned from 173 shooting attacks. It appears the current protective training model does not fully incorporate this guidance and is based more on reactive threat responses rather than proactive threat identification. Very little, if any study and/or training focuses on terrorist pre-attack behaviors i.e. recognizing and mitigating Islamic radicalization, attack planning (target selection, probing, testing), the purchase of precursor bomb making materials and countering multi-coordinated attacks.

Matthew Crooks clearly defeated the Secret Service at its own game. How is this possible? Are the Secret Service advance procedures too canned, too predictable? Strategic planning organizations in the public and private sector, especially in high threat environments, employ Red Team planning. At a basic level this means considering the adversary’s perspective and attack plan. Protectors should simulate attacks as an adversary would and fortify against them with security planning. In other words, wear two hats—your “good guy hat and the bad guy hat.” This is fairly obvious to seasoned military planners and strategists, However, since this strategy appears to be absent from the security planning where two assassination attempts occurred in Pennsylvania and Florida in 2024, it requires review. In simple terms…advance planners need to ask themselves: If I were a shooter or bomber, how would I identify the security plan’s vulnerabilities? What weakness would I exploit? Security planners need to ask what are we doing to fix them? This needs to be an evolving, on-going process. The Army does this on a continuing basis.

There is no evidence the Secret Service conducts any substantive Red Team exercises. The irony is Crooks, the would-be assassin who shot at Trump in Butler, PA and Ryan Routh, who attempted an assassination from a sniper position along a fence line at the Trump International Golf Course at West Palm Beach, FL, conducted better pre-attack planning than the Secret Service’s protective (counterattack) advance security team. Routh’s ability to get within easy shooting range, and remain virtually undetected for12-hours, exposed many other security operational weaknesses. To be clear both assassination attempts, one an actual AK shooting and one pre-empted, were catastrophic failures. This is a jolting and tragic wake-up call. Crooks’ and Routh’s budgets were probably less than $500 respectively. The Secret Service Presidential Campaigns and NSSE budget is reported to be ~$73.3 million from the Office and Management and Data. Clearly the security failures are not due to a lack of money.

What if the attacks at Butler or West Palm Beach had been planned by well-trained terrorists using multiple, simultaneous attack methods as witnessed in the series of coordinated Islamist terrorist attacks on Friday, 13 November 2015 in Paris, France? The Secret Service and the IC at large should be acutely focused on the possibility of diversionary, multitargeted attack scenario planning prior to any major event. Attack methods used by terrorists seen in many asymmetrical attacks seen recently worldwide should be planned for. Other salient examples include Mumbai (2009), Brussels (2016) and Barcelona (2017). DHS has published planning guidance to identify and prevent Complex Coordinated Terrorist Attacks (2018). Would the Secret Service be able to detect an attack plan like these let alone respond to them?

Since the 9/11 attacks billions of tax dollars have been invested in defense strategy revisions, police, military and emergency responder training, communications upgrades and field exercises to better equip all concerned to address evolving threats. The National Response Framework (2019) defines five core capacities to guide the training of the response community: prevent, protect, mitigate, respond, recover. The purpose is to “better integrate government and local response efforts.” Simply stated, all security partners need to focus more on prevention and work as a cohesive team. It appears these capacities were not incorporated in the security plan at Butler, PA or West Palm Beach, FL.

This guidance needs to be incorporated and operationally reinforced into all joint security efforts in the field; not only in training.

When operationally required, agents from other DHS agencies selected to support Secret Service protective details should be required to meet the same protective training metrics required of Secret Service agents. The required training hours should be increased as outlined in the Secret Service Fiscal Years 2021-2025 Human Capital Strategic Plan.

The Secret Service needs to redefine its protective mission. The current policies and procedures are based on dated threat models. The old threat models guiding the Secret Service culture are myopic and limit creative thinking. More effective proactive strategies, policies and training that match evolving attack methods are needed:

· Move the Secret Service back to the U.S. Treasury Department;

· Re-examine basic security procedures;

· Recognize and respond to lone shooter profile behaviors;

· Incorporate Red Team planning and training;

· Review lone shooter and coordinated terrorist attack methodologies;

· Develop security advance training to include preventive and deterrent attack strategies;

· Require the IC to proactively and thoroughly brief the Secret Service PID and protective details with ongoing and timely protectee threat intelligence;

· Develop specific integration protocols with public safety counterparts;

· Require a Secret Service supervisor partnered with the local jurisdiction law enforcement supervisor to review the security advance Incident Action Plans (IAPs) and visit each site to be visited prior to the protectee’s arrival.

· Conduct post event hot washes and train to correct missteps;

· Partner with elite military forces, i.e. Delta and Seal teams to revise a range of protective measures and training;

· Reinstate annual physical medical screening with a coronary emphasis;

· Reinstate mandatory quarterly physical fitness testing for all gun carrying personnel;

· Develop scalable protective training based on emerging attack methodologies with a terrorist focus; and

· Specifically study and create protective training scenarios that identify terrorist simultaneous attack planning targeting routes, site access/egress locations, command posts, agent and law enforcement personnel staging areas and respective equipment.

Equally troubling, the recommendations set forth by the 435-page U.S. Secret Service: An Agency in Crisis from December 2014 (after serious security failures prompted this inquiry) as of this writing, have yet to be fully implemented. Conspicuously absent among them remains—the failure of protective detail agents to complete consistent training—“at least 12% of work hours by fiscal year 2025.” According to Jason Chaffetz, the agency has woefully failed to achieve this training target. He says the Secret Service has been on notice since 2015 to implement effective changes, namely training and accountability to prevent the failures. Many key recommendations have not been met.[14]

The collective observations and recommendations outlined above are further delineated, along with others, in the FINAL REPORT OF FINDINGS AND RECOMMENDATIONS completed by the Task Force on the Attempted Assassination of Donald Trump, dated December 5, 2024. This report was issued by Chairman Mike Kelly (R-PA) and Jason Crow (D-CO).[15] These recommendations should be prioritized with elite military forces. Establish scalable protective survey plans that can effectively adapt to changing locales and environments.

The world of team sports provides a compelling metaphor for how games are won. Team members are assigned positions based on ability and experience. They rehearse their plays incessantly until they get it right. Success in the protective security arena requires the same focus.

If the Secret Service team expects to win their zero-fail mission, they will need to rebuild a foundation of trust—first. Leadership deficits, disparate experience levels, inconsistent training, dated technology and other security advance omissions are fixable. Restoring trust among their fellow agents and with their brothers and sisters in blue and critically with their prized asset—the protectee—poses their biggest challenge. Winning is impossible without trust.

Is the Country Being Effectively Protected by its Intelligence Agencies?

To fully answer this, a hard look at the intelligence agencies and their successes and failures need to be critically examined in 2025. There have been more than 70 successful terrorist interdictions since 9/11. Unfortunately there has been an increase of serious failures in the last eight years, many preventable, in the homeland that dilute these successes. Many observers and media outlets are reporting partisan politics has rendered the agencies responsible for investigating and preventing many attacks in the past four years less proactive and less effective. Congressional committees and Inspectors General reports conducted in response to whistleblower testimony and media reporting show the FBI reallocated its resources from its primary mission to protect the nation from domestic and international terrorism. Their focus has shifted from cyber-threats, organized crime, violent crimes, human trafficking etc. to lesser crimes with a political bent. This shift in focus by the FBI along with collaboration with DHS has added to the rise of Domestic Terrorism.[16] According to the U.S. Government Accountability Office (GAO) there has been a 357% increase in domestic terrorism from 2013 – 2023.[17]

After the 9/11 attacks on September 11, 2001, a candid review of the nation’s intelligence failures—contributing causes, i.e. agency information sharing dysfunction and the “siloed” structure of the IC; namely the CIA, FBI, NIA, DIA and the NSA was reviewed. The 9/11 Commission Report, released on July 22, 2004 examined these failures in detail.[18] Notably, the consensus finding was and unfortunately remains today—the intelligence agencies lack imagination and do not effectively share domestic and foreign threat information, particularly with a terrorist nexus. Bureaucratic and administrative restrictions delay the release of “sanitized” threat information that is in large part, not immediately useful by its consumers. Among the 9/11 Commission’s many recommendations—create a DHS in an effort to centralize 22 different federal agencies into one department. The intent was to unify security operations to be more responsive and less siloed in its handling of, sharing and responding to threat information to the homeland.

Unfortunately, this has not happened. DHS has been widely criticized for being stymied by bureaucratic dysfunction. Many have observed the amalgamation of the 22 agencies, in many cases, has had the opposite effect…these agencies, many of which with a more than a 100-year history, were not fully on board to “play in one sandbox” and share their tools risking the loss of their respective agency eminence.[19] As a result some argue many agencies hold onto information to be able to control investigations, justify funding, etc. Several studies show the goal of more effective information sharing has not been achieved despite the creation of several Presidential Directives enacted post 9/11 and the creation of more than 80 Joint Terrorism Task Forces (JTTFs).[20]

The numerous recent intelligence failures we are seeing and continue to experience is alarming. The conclusions of many Inspectors General reports and House Committee Hearings have revealed the key intelligence agencies, CIA, FBI and others are not fully effective protecting Americans. It has been proven these agencies have been weaponized against conservatives and directly at Donald Trump and his family. This leads us to only one conclusion —our IC is broken. This is supported by the footnoted documents referenced in this writing. Among the many glaring facts: 51 former intelligence officials declared the Hunter Biden laptop, disinformation—later proven to be false. Further, the CIA admitted many of the 51 signatories were paid CIA contractors.[21] [22]

Several FBI, IRS and Secret Service whistleblowers including former FBI agents Richard Stout and Nicole Parker (and many others) have publicly called out the credibility of the FBI; specifically the leadership who have not prioritized the core mission of the FBI.[23] On December 9, 2024, Senator Grassley sent a letter to FBI Director Wray citing as many as 60 examples of the FBI’s blatant failures to uphold the rule of law and obstruct the work of the Congress. The letter stated, “the FBI has shown an outright distain for congressional oversight during your tenure.”[24] Instead, recent FBI Directors, Comey and Wray chose to violate their oaths denying fair and due process rights to several hundreds of citizens and Brady rule violations for political purposes. Whistleblower testimony corroborates the FBI leadership, at many levels, were aware of this but continued this blatant dereliction of duty anyway.

It has been empirically shown the FBI and the DOJ, under the Biden Administration, have implemented an ongoing two-tier system of justice strategy targeting Republicans at large, prominent conservatives and Donald Trump while ignoring instances of clear federal statute violations (with undeniable probable cause) by the Democrats and leftists. “These include pay-to-play schemes by the Bidens and the Clintons.”[25] Not the least of which are the 18 instances of arson and vandalism targeting pregnancy resource and other faith-based centers by the group Jane’s Revenge which the FBI has not addressed.[26]

Basically, the FBI has shifted its focus and resources from counter-intelligence, established terrorist threats, China hacking our nation’s IT infrastructure, sex trafficking of minors and organized crime to targeting Catholics, declaring parents attending school board meetings ”domestic terrorists,” investigating thousands of January 6th attendees and protesters and arresting pro-life demonstrators. Among the most egregious investigations and warrant executions was the unprecedented search of former President Trump’s residence, staging evidence and doctoring photos in August 2022 to justify prosecutions.[27]

Equally egregious, FBI failures identified by Senator Grassley included serious threats posed by foreign actors treated with tepid urgency if at all. For example, the FBI did not thoroughly vet Afghan evacuees under the Operations Allies Welcome (OAW), at least 50 of which were later flagged with “potentially security concerns.” This and the “open border” policy of the Biden administration, the dilution of ICE resources, restricting ICE’s arrest and deportation enforcement purview, defunding the police and weak enforcement of crimes committed by a high number of migrants entering the U.S. illegally has increased the nation’s vulnerability.[28] On June 25, 2024, DHS identified more than 400 crossed the U.S. border with an ISIS-affiliated network.[29]

Another disturbing example of the egregious failures and unlawful government oversight is documented in Senator Ron Wyden’s (D-ORE.) recent release of documents confirming the NSA and the FBI are unlawfully purchasing Americans’ internet browsing records and personal data.[30]

Restoring faith in America’s intelligence agencies to prevent what we have witnessed for at least the last eight (8) years will require significant reforms.[31] Essentially, there is a call for more transparency and bi-partisan oversight across the board.[32] Various national polls reflect more than 60% of Americans do not trust the government—especially the FBI.[33]

The GAO found the greatest number of domestic terrorism attacks are committed by either racially or ethnically motivated violent extremists, (this includes homegrown violent extremism) many of whom have been radicalized since 2010.[34] A few notable examples include:

· May 3, 2024 – Two Jordanian foreign nationals attempted to force their way onto Marine Base Quantico. Both were in the country unlawfully;

· May 9, 2024 – Trevor Bickford of Maine received a 27-year prison sentence for attempting to kill police officers in Times Square in 2022. He claimed he wanted “to wage Jihad and kill as many targets as possible;” and

· June 9, 2024 – 8 Tajikistan nationals were arrested in New York, Philadelphia and Los Angeles with ties to ISIS plotting terrorist attacks in the U.S.

Recent intelligence failures are compounded by disjointed inter-agency information sharing, fewer proactive responses to threat intelligence, poor monitoring of social media posts and not responding to credible law enforcement reporting. A key policy failure is the open U.S. border and restricting the Border Patrol’s ability to identify illegal crossings and account for “gotaways.” Collectively, these intelligence failures have led to increases in a wide range of crimes as follows:

· A resurgence of terrorist attacks;

· Human trafficking;

· Drug trafficking;

· Attacks targeting law enforcement officers and their equipment;

· Homegrown violent extremism;

· Lone wolf attacks at mass gatherings;

· Hate crimes;

· Attacks on churches;

· Active school shooter attacks;

· Attacks on family planning centers; and

· Cyber-attacks/Ransomware attacks.

Fixing this will require honest, bipartisan commitment. The IC, above all, will need to be accountable to their staffs and the American people. The proposed remedies (some of which cited below) are required to ensure the respective intelligence agencies are transparent with the appropriate federal and local law enforcement agencies. This is needed to prevent a repeat of the abuses identified earlier that targeted a variety of individuals and groups by the Biden administration.

· Establish a special bipartisan committee with full access to all intelligence and threats to ensure proportional decisions and actions to protect the homeland are made above politics and reviewed before being implemented;

· Ensure the investigations conducted by the intelligence agencies are strictly within their jurisdictional purviews;

· Assess the effectiveness of the collaborative sharing information practices and formal agreements between the FBI and DHS. A 2023 GAO study shows threat information is not shared effectively by them and is not immediately useful. This GAO report identified a key reason for this serious information sharing dysfunction:[35]

“FBI officials told us they did not use the data DHS collects on domestic terrorism incidents because they weren’t aware DHS was collecting it. DHS officials in turn told us they didn’t share their incident data with their FBI counterparts because they weren’t asked for it.”

· Verify that any unmasking follow CIA & FBI rules. The names of many U.S. citizens were improperly released instead of or with foreign targets;[36]

· Enact strict verification processes to prevent using circular reporting by “creating” false and damaging information, leaking it to the press and then opening investigations based on that. It has been established the FBI under Director Comey and other FBI officials engaged in this practice; and

· Enact strict adherence to verification processes to ensure the basis of any Section 702 Foreign Intelligence Surveillance Act (FISA) application requests are factual. Rampant abuse of the FISA process by Director Comey and other FBI officials (from 2016 – 2017 and beyond) has been confirmed by the DOJ IG.[37]

On December 9, 2019, Attorney General William Barr stated the DOJ IG determined the evidence put forth to the FISA Court to secure warrants to surveil the Trump campaign and his administration “were not factual, omitted consistently exculpatory information.” AG Barr further stated: “ The malfeasance and misfeasance detailed in the Inspector General’s report reflects a clear abuse of the FISA process;”[38] [39]

Looking Forward

As we begin 2025 and we assess the state of our government, the state of our safety, the state of our security, our sovereignty and most important, America’s pre-eminence on the planet; now is a great opportunity to work to rejuvenate the bedrock principles that make us the sterling example of freedom and strength. It is possible to reignite the nation’s status as the “Shining City on a Hill” as President Reagan described it.

It will take an honest commitment for the new Trump administration to set things right. In the last several years many of our agency heads and politicians put egos and politics ahead of the nation’s guiding principles. How many of them were boy scouts and forgot the first point of the scout law?: “A scout is trustworthy.” How many attended military academies and committed to the credo?: “A cadet shall not lie, cheat, steal or tolerate anyone the does.” How many swore allegiance to the United States and their Oath of Office (5 US Code Sec. 3331)?: “I do solemnly swear I will support and defend the Constitution of the United States against all enemies, foreign and domestic…I take this obligation freely without purpose of evasion…”

If there was ever a time in the history of our nation when accountability, honest introspection and reform is critically needed…it is NOW!

[1] https://www.nytimes.com/2024/11/16/us/politics/democrats-anti-trump-battle-plan.html

[2] https://www.politico.com/news/2024/11/20/democrats-trump-foes-governors-attorneys-general-interest-groups-00190177

[3] https://www.washingtonexaminer.com/news/campaigns/presidential/3238783/shell-shocked-democrats-struggle-mount-resistance-trump/

[4] https://www.cbsnews.com/news/trump-nominees-confirmation-delay-senate-democrats/

[5] https://www.peters.senate.gov/newsroom/in-the-news/peters-report-details-failures-ahead-of-jan-6-attack-calls-for-changes

[6] https://www.peters.senate.gov/newsroom/press-releases/peters-report-finds-significant-intelligence-failures-by-fbi-and-dhs-in-lead-up-to-january-6th-capitol-attack

[7] https://www.secretservice.gov/protection/events/credentialing

[8] This basic requirement was not included or thoroughly implemented per USSS protective operational SOPs prior to two assassination attempts targeting Trump.

[9] https://www.blackstonepublishing.com/blogs/news/former-capital-police-chief-steven-a-sund-set-to-publish-a-new-book-about-the-attack-on-january-6-with-explosive-never-before-revealed-information

[10] https://www.bizpacreview.com/2024/10/26/whistleblowers-claim-secret-service-employees-working-with-trump-were-made-to-sign-ndas-1497932/

[11] https://nypost.com/2024/10/09/us-news/secret-service-blocked-watchdog-to-hide-inconsistent-security-protocols-at-trump-events-whistleblower/

[12] https://abcnews.go.com/Politics/capitol-police-chief-steven-sund-entire-intelligence-community/story?id=75729882

[13] https://www.lawfaremedia.org/article/dept.-of-homeland-security-oig-releases-report-on-secret-service-s-response-to-jan.-6-attack-on-the-u.s.-capitol

[14] https://oversight.house.gov/wp-content/uploads/2015/12/Oversight-USSS-Report.pdf

[15] https://taskforce.house.gov/sites/evo-subsites/july13taskforce.house.gov/files/evo-media-document/12-5-2024-Final-Report-Redacted.pdf

[16] https://www.gao.gov/assets/gao-23-104720-highlights.pdf

[17] https://www.gao.gov/products/gao-23-104720

[18] https://9-11commission.gov/report/911Report_Exec.pdf

[19] https://www.thoughtco.com/department-of-homeland-security-4156795

[20] https://www.congress.gov/117/meeting/house/114425/witnesses/HHRG-117-JU08-Wstate-JonesS-20220217.pdf

[21] https://www.newsweek.com/hunter-biden-laptop-jim-jordan-facebook-disinformation-twitter-1767369

[22] https://www.msn.com/en-us/news/politics/cia-admits-some-signatories-of-hunter-biden-laptop-letter-were-paid-contractors/ar-BB1oVNjs

[23] https://ijr.com/richard-stout-how-to-reform-our-politically-weaponized-fbi-and-restore-public-trust/

[24] Letter from Chairman Charles Grassley, Se. Comm. on Fin., to Director Wray (Dec. 9, 2024), https://www.grassley.senate.gov/imo/media/doc/grassley_to_fbi_-_failures.pdf

[25] https://thehill.com/opinion/criminal-justice/3671392-nearly-half-of-the-country-now-has-serious-doubts-about-the-fbi-heres-why/

[26] https://www.foxnews.com/politics/zero-arrests-16-janes-revenge-attacks-pro-life-organizations

[27] https://www.foxnews.com/politics/house-judiciary-committee-investigates-alteration-evidence-seized-fbi-trump-classified-records-probe

[28] https://www.dhs.gov/news/2024/10/02/dhs-2025-homeland-threat-assessment-indicates-threat-domestic-and-foreign-terrorism

[29] https://homeland.house.gov/wp-content/uploads/2024/10/CHS-10.3.24-Terror-Threat-Snapshot.pdf

[30] Senator Ron Wyden (D-ORE.) recent report by Ars Technica states the NSA has admiied to buying records

[31] https://www.thecipherbrief.com/column_article/the-intelligence-community-is-broken-heres-how-we-fix-it

[32] https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/3224584/how-trump-can-intelligently-reform-the-intelligence-community/

[33] https://thehill.com/opinion/criminal-justice/3671392-nearly-half-of-the-country-now-has-serious-doubts-about-the-fbi-heres-why/

[34] https://www.gao.gov/blog/rising-threat-domestic-terrorism-u.s.-and-federal-efforts-combat-it

[35] https://www.gao.gov/assets/gao-23-104720-highlights.pdf

[36] Lt. General Flynn and other Trump administration officials were improperly unmasked during 2016 – 2017.

[37] Section 702 authorizes targeted foreign intelligence information collection related to terrorism. U.S. persons may not be targeted and their names indiscriminately used without a specific nexus to terrorism.

[38] https://clayhiggins.house.gov/2019/12/09/higgins-ig-report-confirms-obama-era-fbi-abused-fisa-process/

[39] https://thehill.com/policy/national-security/4012650-fbi-misused-surveillance-tool-fisa-section-702/

The Failures of the Intelligence Agencies and the Secret Service Preparing for 2025 Post-election Protests and Beyond

EXECUTIVE SUMMARY

In the wake of the ever-increasing Presidential campaign rhetoric from both the Democrats and the Republicans since the 2020 election, disturbing narratives have focused, fairly or unfairly, on the outcome and results of the 2024 Presidential election. The Republicans continue to be riled for numerous reasons—citing unfair MAGA characterizations, the vilification of anyone who attended the January 6, 2021 protests, the unfettered immigration of millions of unvetted multi-national migrants, inflation, lawlessness, escalating war(s) in the Middle East and numerous, disturbing examples of a two-tiered justice system targeting former President Trump and many of his former staff. The Democrats have been ignoring these claims or minimizing their effects stating these issues are being exaggerated for political purposes. Instead, the White House and their minions defaulted to women’s abortion rights, healthcare benefits, DEI ideology, defunding the police, supporting Palestinian sympathizers’ rights and “saving democracy.” The Democrats have continually defaulted to blaming Trump for “inciting” the violent protests at the Capitol on January 6, 2021 and an exponential array of problems plaguing America. These divergent positions have sparked outrage since then on both sides. As a result, the lead up to the 2024 election was contentious and the Trump win has law enforcement circles concerned that post-election events have the potential to be contentious and disruptive.[1] [2]

This article, written before the election, is being updated as of January 6, 2025 in light of the convincing Trump Presidential win and his Cabinet and officials’ selections. Ranking Democrats, donors, governors and mayors in many blue states have begun to launch concerted offensives to thwart the Trump agenda as much as possible as outlined in The New York Times:

The panels range from sweeping subjects — “Making Meaning and Meeting the Moment: Resistance and Reorienting” and “It’s Time to Resist: The Fight Against Project 2025” — to more focused discussions about abortion rights, immigration, racial justice, taxes, countering disinformation and other issues, according to a draft agenda.[3]

Several of Trump’s cabinet nominees and other White House team picks have already been targeted with bomb threats and “swatting.”[4] These efforts to disrupt the transition to the Trump administration has the potential to inflame supporters from both sides.

Prior to the election politically charged bi-partisan rhetoric fostered a remarkable awakening in the populus of the country. Given this and the convincing Trump win, the stage was/is seemingly set for potential unrest prior to the Inauguration of President-elect Trump on January 20, 2025. There were and are numerous overlapping concerns that contribute to this. Key among them are the intelligence agencies’ warnings that foreign enemy states, i.e. Russia, China and Iran are planning to wreak post-election havoc. The Trump campaign and Harris campaign had reported hacks and disruptions into its servers. Iran openly revealed assassination plots targeting Trump. As of November 8, 2024, the FBI had confirmed Iran was planning a Trump assassination with two suspects arrested in the U.S. and one other identified in Iran.[5] Adding to this disturbing threat information, intelligence and public media reporting indicates current enemy states: China, Russia and North Korea are partnering with the professed unifying goal of undermining the U.S. election process. Further, intelligence agencies have shared concerns these enemy states pose collective threats to the U.S. and in “multiple parts in the world simultaneously.”[6] Alarmingly, FBI Director Wray has acknowledged a dangerous influx of more than 100 known terrorists and thousands of dangerous criminals across the southern and northern borders, but admits their whereabouts are unknown.

Notably numerous congressional hearings, Inspectors General reports and media reports confirm the Department of Justice (DOJ), the intelligence agencies—especially the FBI, have failed to fulfill their respective missions. This includes misrepresenting the COVID origins, implementing a two-tired justice system targeting Trump and associated conservatives, targeting Right to Life advocates, proposing classifying parents as “domestic terrorists”…all while turning a blind eye to the criminal schemes of President Biden and the Clintons.[7]

In the context of what has transpired before the election and now post-election 2024; three key elements are being addressed accordingly:

1. The benefits of robust integrated security preparation as a deterrent to post election protests prior to the Inauguration;

2. Improving the Secret Service; its performance and future as the nation’s elite protective federal agency;

3. Reforming the deep state leading up to prevent sabotaging the current and future presidents and implementing reforms identified by the several congressional committee investigative and Inspectors General reports.

Factors Contributing to Inauguration Day Protest Concerns and Future Post Election Events

In an effort to provide context to factors that may fuel potential protests and unrest following the election and during the Inauguration of Donald Trump as the 47th President of the United States and beyond, the following, verified background is being set forth. It is important to understand the factors contributing to the ongoing vitriol, particularly from the Democrats pre and post the 2024 election. This includes disparaging political comments made by many former and current Democrat Cabinet level officials, many of their respective staff members, military officials, state and local officials, numerous media outlets and corporate leaders. This unprecedented level of divisive rhetoric, demonization, vilification (based on fabricated claims), has deteriorated to personal assaults and has infected large swaths of the populus. With the abandonment, in some cases, of any serious effort to clarify and fact check claims promulgated from both sides, the partisan division grew to dangerous levels in the country. Even more alarming, these circumstances have signaled opportunities for enemy state regimes to exploit the United States to gain economic advantage and power, especially during the presidential transition. There are innumerable examples of this. Salient among them are the withdrawal of the U.S. presence from Afghanistan, funding Iran with billions of dollars and the disinformation infecting the country’s social media outlets to include information concerning China, Russia and Iran. The resulting divisive political rancor has intensified since 2016 and there is no indication of any let up. All of this points to potentially dangerous unrest in the months to come.

Following the 2016 Donald Trump presidential victory, his 2020 presidential bid and now his second election as the 47th President of the United States, empirical and documented evidence show former President Trump, members of his family, his newly named staff members and other surrogates have been subjected to innumerable political assaults and threats. Historically these included frivolous claims of Russian collusion, accusations of improper collaboration with Ukraine, targeted entrapment investigations against his staff, mainstream media outlets promulgating false and damaging narratives and recruiting 51 intelligence officials to engage in election interference. This includes the fabrication of prosecutions and convictions based on tenuous legal grounds violating due process by the Justice Department—all in an effort to delegitimize the Trump presidency and his 2024 presidential bid.[8] Few media outlets have reported these politically damaging efforts. Many can be traced directly to the leaders and staffs of the Democrat party. They blatantly misrepresented Trump’s 2024 Campaign promises and voiced plans to derail Trump’s transition with a variety of tactics. Enemy states are expected to exploit this misinformation in manipulative ways. Many media outlets have reported ranking democrat efforts to “Trump proof” his administration with last-minute executive orders.[9]

The New Yorker reported Russia and Iran were using Artificial Intelligence (AI) to promulgate “deep fakes” ahead of the election to spread “conspiratorial narratives” and amplifying “divisive U.S. issues to denigrate the election process.[10] Now we can expect this to reimplemented, post-election, to disrupt the transition.

Prior to the decisive Trump re-election ranking Democrats, namely Jamie Raskin, Ranking Member of the Committee on Oversight and Accountability and several senior Democrats in Congress would not commit to certifying the results of the 2024 Presidential election if former President Donald Trump won.[11] [12] [13]

These articles highlight the importance of preparing de-escalation measures to avoid a repeat of the disruption and protests of the January 6, 2021 experience

As of this writing it appears there are plans in the works by leading Democrats to “Trump proof” earlier liberal initiatives and dilute the 2nd Trump administration’s agenda.[14] [15]

The Need for Effective, Integrated Security Planning for the Inauguration and Future Events

Capitalizing on the January 6, 2021 protests/riots, Russia and Iran were considering a repeat in the event of a Trump lost.[16] The National Intelligence Council (NIC) in a memorandum dated October 8, 2024, reports several disruptive scenarios were and are being planned by Russia and Iran with the goal to denigrate the U.S. political process and transfer of power.[17]

There is a documented history of intelligence failures highlighting this concern. If the tepid intelligence provided by the FBI and the DHS Office of Intelligence Analysis (I&A) to Capitol Police Chief Sund and the U.S. Park Police (USPP) prior to January 6, 2021 of planned riots is any indication of what to expect during the Inauguration and beyond, there are legitimate concerns. (The vote certification on January 6, 2025 was conducted without incident). The Capitol Police (USCP), DC Metropolitan Police (DCMP), the USPP, the U.S. Secret Service and the public deserve accurate and complete information from these agencies with respect to anticipated crowd size, crowd composition and planned protests for major events. Scalable security planning requires this. This was not the case prior to January 6, 2021. In fact the January 6, 2021 vote certification was not declared a National Special Security Event (NSSE) by DHS despite the fact the existing intelligence fit the DHS vulnerability rating criteria to declare it. This designation is required when a planned major event is a potential target of terrorism or other criminal activity.[18] Had the Secret Service Protective Intelligence Division (PID) been included in the full disclosure of the existing intelligence regarding anticipated crowd sizes, planned protests and violence for January 6, 2021 they would have made the case to declare the vote certification an NSSE.

Several post January 6, 2021 after-action reviews have documented a myriad of intelligence and planning failures by the FBI, DHS-I&A and the Secret Service leading up to and after the 2021 protests.[19] [20] Worse, indications of disruptive protests by several groups known to the FBI and

I&A with active investigations were not shared with the USCP and other planners. Evidence of alarming social media posts and protest meetings documented in investigations by many FBI field offices were diluted and and/or simply not shared. Reports, studies and testimony of these failures have been drowned out by those that chose to use January 6th as a political tool to dominate the political discussion with a version that appeared to be used to suit a partisan agenda. Two post January 6th reports dated June 27, 2023 and July 10, 2023 document the investigations by U.S. Senator Gary Peters, Chairman of the Senate Homeland Security and Governmental Affairs Committee cite significant intelligence failures by the FBI and I&A leading up to the January 6, 2021 protest.[21]

Former USCP Chief Sund stated that January 6 was a ‘Cover-Up’ by intelligence officials in power at the time and “they were aware of the attack in advance and covered it up by failing to disseminate the information to those who needed it.”[22] In an interview with Tucker Carlson that never aired, Sund repeated this claim and subsequent congressional investigations corroborated this. In this interview and in his book: Courage Under Fire, Sund explains, with definitive chronological clarity, supported by documents, that he was denied access to the DC National Guard troops for 71 minutes after asking for them at 1 PM on January 6. Sund further stated it took more than three hours after that during an excruciating “approval process” for the District of Columbia National Guard (DCNG) troops to be mobilized. Major General William Walker, commander of the DCNG stated during a Joint hearing he was not given the authorization to deploy them. General Walker stated: “the delay was caused at least in part over concerns of the optics of sending uniformed troops to the scene.” General Walker further testified he received an “unusual” restrictive order to delay a quick troop deployment without the “explicit” approval of of then-Secretary of the Army Ryan McCarthy.[23] On January 11, 2021, Sund told the Washington Post he disagreed with Nancy Pelosi’s claim that “Additional security could have been provided but no one from the Capitol requested it.” Sund maintains his six separate requests were denied. He also warned federal officials “if they don’t’ get their act together, it will happen again.”[24]

Reports of several requests for intelligence information, prior to January 6, 2021, by Chief Sund are well documented and are confirmed in the following congressional investigative reports. Numerous committee reports outline failures of the FBI and I&A to share intelligence with law enforcement preparing for the January 6, 2021 vote certification. These have been sparsely reported/referenced in media reporting of the January 6th Hearings and Investigations; among them:

· Anna Skinner, Ex-Capitol Police Chief Sounds Alarm That Jan. 6 Was ‘Cover-Up’, NEWSWEEK, (August 6, 2023);

· Alana Wise, DOD Took Hours To Approve National Guard Request During Capitol Riot, Commander Says, NPR, (March 3, 2021);

· Todd Spangler, Peters’ report details failures ahead of Jan. 6 attack, calls for changes, DETROIT FREE PRESS, (June 8, 2021);

· HSGAC Majority Staff Report, Chairman Gary Peters, Planned in Plain Sight: A Review of the Intelligence Failures in Advance of January 6th, 2021, (June 2023);

· Committee on House Administration, Chairman Brian Steil, DoD Inspector General Concealed January 6 Evidence,(November 21, 2024); [25]

· DOJ OIG, REP-250-011, “A Review of the Federal Bureau of Investigation’s Handling of Its Confidential Human Sources and Intelligence Collection Efforts in the Lead Up to the January 6, 2021 Electoral Certification” (December 2024).

The key findings are as follows: [26] [27]

  • FBI and I&A received numerous early warnings, tips, and other intelligence about plans for violence on January 6th;
  • FBI produced only two limited raw intelligence documents related to January 6th, both issued the night before the attack, and I&A did not issue any intelligence products specific to January 6th;
  • Despite claims by some agency officials and analysts, FBI and I&A have authority to monitor open-source intelligence, including social media – and agency guidelines require them to report certain online threats; and
  • FBI and I&A failed to follow agency guidelines on the use of open-source intelligence.

A detailed review of all the findings were documented in the Planned In Plain Sight – A Review of the Intelligence Failures in Advance of January 6, 2021.[28] Specifically, this review by the United States Senate Committee On Homeland Security & Governmental Affairs stated:

“The Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS) Office of Intelligence and Analysis (I&A) – obtained multiple tips from numerous sources in the days and weeks leading up to the attack that should have raised alarms. Rather, those agencies failed to fully and accurately assess the severity of the threat identified by that intelligence and formally disseminate guidance to their law enforcement partners with sufficient urgency and alarm to enable those partners to prepare for the violence that ultimately occurred on January 6th. At a fundamental level, the agencies failed to fulfill their mission and connect the public and nonpublic information they received. Internal emails and

documents obtained by the Committee demonstrate the breadth and gravity of the threats these agencies received related to January 6th. For example, FBI and the Department of Justice (DOJ) received tips and information from multiple sources, including:”

· In December 2020, FBI received a tip that the Proud Boys planned to be in DC and “[t]heir plan is to literally kill people. Please, please take this tip seriously and investigate further.”

· On Jan. 3, 2021, FBI also became aware of multiple posts calling for armed violence, such as a Parler user who stated, “[b]ring food and guns. If they don’t listen to our words, they can feel our lead. Come armed”; plans to “set up ‘armed encampment’ on the[National] Mall”; and a tip about “a TikTok video with someone holding a gun saying, ‘storm the Capitol on January 6th.’”

· On January 4th, DOJ leadership noted multiple concerning posts, including “[c]alls to occupy federal buildings,”discussions of “invading the capitol building,” and individuals “arm[ing] themselves and to engage in political violence at the event.”

In addition, on March 22, 2022, the DHS Office of Inspector General (DHSIG) also noted in its report the I&A had identified viable threats prior to January 6, 2021 but did not issue any intelligence products before the U.S. Capitol breach.

On December 29, 2020, the I&A’s Counterterrorism Mission Center (CTMC) sent a Request for Information (RFI) to the Open-Source Collection Operation for threat information concerning the January 6 events to include:

· Online calls by event organizers to bring weapons to lawful protesters to counter protests;

· An increase in lawful protesters / counter protesters in DC, carrying, brandishing or using lethal weapons, such as firearms or edged weapons;

· Specific, directed threats of violence towards…prominent ideological adversaries or figures associated with an ideological movement; and

· Violent extremists posing a threat to individuals to include law enforcement and government officials holding opposing views prior to scheduled events.

Further, collectors of the sources messaged each other with related concerns but did not issue intelligence reports. In sum, no warnings were issued claiming these threats and other direct threats “did not fit the guidelines.” They were not widely disseminated, until after January 6, 2021.[29]

These and other specific threats were not shared with the USCP despite Chief Sund’s intelligence requests and two (2) intelligence assessment meetings with the FBI and the I&A prior to the January 6, 2021 vote certification and subsequent riots.

These facts were further corroborated by Joseph V. Cuffari, Inspector General in his report dated March 4, 2022: I&A Identified Threats prior to January 6, 2021, but Did Not Issue Any Intelligence Products before the U.S. Capitol Breach. The direct responsibility and culpability of the intelligence agencies, namely the FBI and the I&A, has been conflated and in many cases conspicuously absent from media reporting and investigations to include the January 6th Committee.

The DHSIG in their report evaluating the Secret Service’s preparation and response to the events of January 6, 2021 determined the Secret Service PID prepared two (2) reports indicating the likelihood of violence based on various reports, sources and tips but did not take commensurate protective actions.

The facts cited above added to the concerns about the security planning prior to the 2025 vote certification and the upcoming Inauguration. Many leaders and rank and file members of the USCP, the DCMP, the DCNG, the Republican House and Senate and media outlets expressed this. There are valid reasons for this. It is noted the original DoD Office of Inspector General (DoD IG) Report No. 2022-039, dated November 16, 2021 entitled: “Review of the DoD’s Role, Responsibilities, and Actions to Prepare for and Respond to the Protest and its Aftermath at the U.S. Capitol Campus on January 6, 2021,” was submitted as the final review of the DoD’s actions on January 6, 2021. Due to the numerous investigations, reports and testimony of officials with direct knowledge and roles prior to and during January 6 vote certification, conflicting facts were uncovered.

For these reasons, Barry Loudermilk, Chairman of the Subcommittee on Oversight sent a letter to Inspector General Robert P. Storch, dated November 21, 2024 requesting “a full correction” to the DoD IG’s inaccurate findings and statements regarding the intelligence and security failures on January 6.[30] Numerous, key witnesses, eight (8), were intentionally not interviewed. Subsequent investigations determined their accounts of the DoD’s command responses to urgent requests directly contradicted the DoD IG’s report. Chairman’s Loudermilk’s conclusion: “The inability of the DoD IG to adequately review these and other DoD actions on January 6 has informed the Subcommittee’s finding that DoD IG is complicit in intentionally concealing DoD actions to delay the DCNG’s response to the Capitol on January 6.”

Additionally, recent some media outlets are reporting, due to these and other exacerbating circumstances, law enforcement may not be adequately prepared for the Inauguration on January 20, 2025. Tenuous relationships and the history of selective information sharing between the FBI and the USCP along with the Secret Service has fostered a level of skepticism regarding intelligence gaps. This distrust has further eroded the trust in the intelligence agencies, particularly with the FBI with the release of Senator Grassley’s letter dated December 9, 2024 to FBI Director Wray detailing the extent of FBI’s abuses.[31] In addition, the Secret Service is facing scrutiny due a “loss” relevant emails from January 6, 2021 and continuing into 2024 to include sparse information releases following the two Trump assassination attempts and related missteps. In the wake of the Chairman Kelly’s Final Report by the U.S. House of Representatives Task Force on the Attempted Assassination of Donald Trump, the ability of the Secret Service to protect Trump and other protectees is being called into question.[32] This is in part being attributed to a lack of reliable intelligence, a lack of competence, lack of requisite funding, lack of training and as whistleblowers contend—partisan pressure from the current administration and DHS to dilute security resources for the Trump detail. Due to these and other facts, the ability of the USCP and the Secret Service to maintain order and security in its preparation for the Inauguration on January 20, 2025 and beyond is a concern and is being questioned.

Moving forward in 2025 the Secret Service and other law enforcement agencies are collectively facing a disturbing quandary of mistrust across the board…discriminating fact from disinformation is becoming increasingly challenging as of this writing. The need for integrated, robust and complete operational planning with the USCP, the Secret Service, USPP, DCMP along with the DCNG is a serious concern. Further, the critical and immediate need for the FBI and I&A to be transparent, diligent and forthcoming with ALL relevant intelligence (real time) impacting the Inauguration and future events is mandatory.

These concerns in 2025 are legitimate based on documented facts of poor integration among law enforcement agencies, diluted threat information sharing and attempts to coverup the intentional, delayed responses of DoD resources to the Capitol riots on January 6, 2021. Specifically, the in-depth chronology of the preparations, miscommunications and intentional delays to release DCNG troops, DCMP police officers and crowd suppression resources are well documented in Chief Sund’s book, Courage Under Fire, Under Siege and Outnumbered 58-1 On January 6th. Notably, among other revelations, Sund’s book details “An exposé of critical intelligence and military failures surrounding January 6 and the subsequent attempts to cover them up.”[33]

These critical intelligence sharing omissions and others did not allow the responsible law enforcement authorities, i.e. the USCP and the DCNG to adequately prepare for and rehearse responses to large, unruly crowds that flooded the Capitol grounds and some entering the Capitol building. In view of all the above facts, the appointment of the January 6th Committee by Nancy Pelosi and the integrity of its subsequent investigation has been questioned by many. Steps need to be taken immediately to ensure transparency of all agencies’ official preparations and actions.

What Can be Done Immediately?

In addition to the USCP, Secret Service and FBI, the Senate and the House of Representatives leadership; Leader McConnell, Leader Schumer, Speaker Johnson and Minority Leader Jeffries, the Senate and House Sergeants at Arms and the collective membership need to come forth with the following unified and unequivocal actions and message:

· There will be ZERO TOLERANCE for any disruption during the transfer of power and for any official post-election events ow and in the future.

· This official position needs to be unanimous and declared applicable nationwide;

· Enlist the media outlets to convey this message to the nation;

· Prepare pre-recorded messages for dissemination to the public;

· For the Metropolitan DC area—The DCNG, DC Mayor Muriel Bowser, the DCPD, the Arlington Police Department, and USPP will partner with the USCP and the Secret Service and craft Memoranda of Understanding (MOUs) and devise an integrated plan(s) based on prior events held on the Mall;

· Establish a clear, chain-of-command communications approval process among the Chief of the USCP, the DCNG and the respective Pentagon leadership to minimize any troop and other responder deployment delays to the Capitol/contiguous areas for crowd control needs;

· Provide dedicated and tested communication links to the National Threat Assessment Center (NTAC) to facilitate immediate intelligence and incident reporting from all law enforcement sectors, local, state and federal;

· Provide dedicated communication links with the FBI/Behavioral Threat Assessment Center to monitor terrorist threats and Russian, Venezuelan and migrant gang activity; and

· Establish consensus among law enforcement agencies via MOUs for timely information sharing of protest and/or riot planning and critically— response criteria and notifications.

Collectively these recommendations and the following examples underscore the critical need to implement effective integration and transparency during security planning for government sponsored events, especially MOU’s. The January 6 Select Committee proceedings did not include fair, bi-partisan representation. Subcommittee investigations into the committee’s findings and the DoD’s handling of their response to the Capitol riots uncovered evidence that show the following:[34]

· Thousands of hours of video footage taken at the Capitol on January 6th were hidden and some destroyed;

· Several key witnesses were not included or their testimony was not included in the January 6 Committee inquiry.

· “Liz Cheney colluded with “star witness” Cassidy Hutchinson without Hutchison’s lawyer’s knowledge.”

· The DoD intentionally delayed the deployment of DCNG troops when urgently requested;

· The DoD IG intentionally failed to disclose evidence contradicting their false conclusions;

· The actions of the highest senior DoD officials, i.e. Secretary of the Army’s failure to honor the DCNG repeated deployment requests;

· The DCNG were prepared, ready and able to respond with a timely deployment;

· The Secretary of the Army falsely stated to Congressional leadership that he told the sheltering Members of Congress: “We have the greenlight. We are moving” at 3:18PM; and

· The DCNG in fact did not leave the Armory until 1700 (5PM).[35]

The recommendations cited below by Senator Gary Peters need to be institutionalized and implemented now and for future events. [36]

  • Conduct internal after-action reviews on the intelligence collection, analysis, and dissemination processes in the lead-up to January 6th;
  • Improve FBI and I&A policies, guidelines, and procedures for collecting, analyzing, and disseminating intelligence to partner agencies;
  • Improve inter-agency coordination for significant events and consider designating a lead federal agency; and
  • Responsibly reassert Congressional oversight authorities over the Executive Branch.

The State of the Secret Service – Can it be Saved?

A serious concern that January 6, 2021 brought into focus, and more recently with the two assassination attempts of Trump in July and September of 2024, is the competence of the Secret Service. Directly connected is its relationship with the intelligence agencies and the Biden Administration. Equally troubling is the lack of protective resources, i.e. experienced protective agents, counter-sniper teams, technical security teams, counter-surveillance and intelligence teams and worse—weak leadership—have profoundly hampered the Secret Service mission. In addition, Diversity, Equity and Inclusion (DEI) policy initiatives, excessive demands to staff 35 protective details (for a variety of government officials), lack of mandated training, diluted hiring practices and very low morale have exacerbated the agency’s problems.

Today’s Secret Service finds itself in the midst of a cauldron of divisive issues that has been boiling in recent years. Given this, it is critical to identify strategies and plans to improve its protective competence and get ahead of any post-election potential unrest with growing domestic and foreign threat levels. This may prove to be a herculean task since successful mitigation is predicated on open and coordinated bipartisan support. This may be a naïve goal given the division in the nation’s populous, even now, post-election. It appears the basis of the contention up to the election and now, despite the clear Trump election victory, was to beat Trump. Now many Democrat leaders are vowing to sabotage the Trump administration’s proposed initiatives. Many Democrat representatives, current and former government officials (and former intelligence officials) have stated this through media outlets. With the upcoming Inauguration of President-elect Trump, these facts need to be addressed now and beyond the Inauguration into the next four years of the Trump administration.

These factors and others continue to affect the effective protective operations of the Secret Service.

Considering these circumstances and alarmingly, two assassination attempts, the identification of Iranian assassination plots coupled with the recent operational failures of the Secret Service to implement basic protective security measures—their mission capability will require profound changes.

Reports continue among the Trump detail security agents, whistleblowers and former President Trump and now President Trump, the FBI has selectively and slowly released assassination plot and other threat information to the Secret Service. This has created distrust between the FBI and the Secret Service. On October 26, 2024, Business & Politics (BPR) reported “the DHS Office of Inspector General (OIG) admitted to Senator Grassley the DHS has a troubling history of obstruction, which Grassley cited as a “major red flag” for oversight.” Violations of the Whistleblower Protection Enhancement Act (WPEA) are also being reported.[37] Other disturbing whistleblower reports allege “Acting Secret Service Director Rowe ‘blocked’ OIG auditors from reviewing former President Donald Trump’s security protocols.” [38]

Most disturbing, there is evidence of mistrust within the Secret Service ranks. For its mission to survive, the leadership must be overhauled, top to bottom. It will require a thorough assessment to redefine its mission and test its capability in the face of the emerging threats from enemy states. This cannot be accomplished in-house.

Following the Capitol protests in 2020, USCP Chief Sund implemented a pro-active intelligence gathering approach but received no threat intelligence by the FBI, Secret Service, DHS and DCMP. Sund stated “there was no indication that a well-coordinated, armed assault on the Capitol might occur on January 6.” This assessment was based on intelligence or the lack thereof provided to Sund. On January 4th and January 5th, Sund hosted two intelligence meetings with the USCP Intelligence and Inter-Agency Coordination Division and with a dozen of the top law enforcement and military officials from Washington, D.C., including the FBI, U.S. Secret Service and the National Guard.[39]

Sund stated: “During both meetings, no entity, including the FBI, provided any intelligence indicating that there would be a coordinated violent attack on the United States Capitol by thousands of well-equipped armed insurrectionists.”

In the DHSIG’s Final Report: The Secret Service’s Preparation for, and Response to, the Events of January 6, 2021 dated July 13, 2024, by Joseph V. Cuffari, Ph.D., the Inspector General reported intelligence failures and policy related operational failures.[40] Six recommendations were made to improve preparedness between the Secret Service and the USCP. A few have been met.

The burning question—with this backdrop, how can the Congress and law enforcement officials adequately rely on intelligence agency reporting, the current administration’s support (or the lack thereof) and media reporting to prepare for potential disruptions in 2025? To effectively prepare for Inauguration Day, the Secret Service should establish specific and stringent MOUs with the FBI and the I&A to ensure they share timely and thorough intelligence impacting their protectees and NSSE’s in the future. This was not done prior to January 6, 2021. Further, security planning with the USCP and the DCMP, should include ongoing collaboration with military counterparts. This includes the DCNG and the DCMP to expedite crowd control responses. Critically, an agreed upon communications (tested) protocol among these agencies is required.

It has been observed by many law enforcement authorities the Secret Service is operating under a flawed threat model, i.e. a 1960’s era lone assassination threat. Today’s Secret Service has not fully embraced emerging technologies. The agency has not studied terrorist threat methodologies to see its benefit in varying environments.

The Secret Service published the <a href=”https://www.secretservice.gov/sites/default/files/reports/2023-01/usss-ntac-maps-2016-2020.pdf”> Secret Service Threat Assessment Centers Mass Attacks in Public Places Guidance in January 2023 through its National Threat Assessment Center (NTAC). This guidance focuses primarily on behavioral threat assessment metrics based on meta-data gleaned from 173 shooting attacks. It appears this guidance is not consistently followed in the current protective training model. The current training model is based more on reactive threat responses rather than proactive threat identification. Very little, if any study and/or training focuses on terrorist pre-attack behaviors i.e. recognizing and mitigating Islamic radicalization, attack planning (target selection, probing, testing), the purchase of precursor bomb making materials and countering multi-coordinated attacks.

Matthew Crooks clearly defeated the Secret Service at its own game. How is this possible? Are the Secret Service advance procedures too canned, too predictable? Strategic planning organizations in the public and private sector, especially in high threat environments, employ Red Team planning. At a basic level this means considering the adversary’s perspective and attack plan. Protectors should simulate attacks as an adversary would and fortify against them with security planning. In other words, wear two hats—your “good guy hat and the bad guy hat.” This is fairly obvious to seasoned military planners and strategists, However, since this strategy appears to be absent from the security planning where two assassination attempts occurred in Pennsylvania and Florida in 2024, it requires review. In simple terms…advance planners need to ask themselves: If I were a shooter or bomber, how would I identify the security plan’s vulnerabilities? What weakness would I exploit? Security planners need to ask what are we doing to fix them? This needs to be an evolving, on-going process. The Army does this on a continuing basis.

There is no evidence the Secret Service conducts any substantive Red Team exercises. The irony is Crooks, the would-be assassin who shot at Trump in Butler, PA and Ryan Routh, who attempted an assassination from a sniper position along a fence line at the Trump International Golf Course at West Palm Beach, FL, conducted better pre-attack planning than the Secret Service’s protective (counterattack) advance security team. Routh’s ability to get within easy shooting range, and remain virtually undetected for12-hours, exposed many other security operational weaknesses. To be clear both assassination attempts, one an actual AK shooting and one pre-empted, were catastrophic failures. This is a jolting and tragic wake-up call. Crooks’ and Routh’s budgets were probably less than $500 respectively. The Secret Service Presidential Campaigns and NSSE budget is reported to be ~$73.3 million from the Office and Management and Data. Clearly the security failures are not due to a lack of money.

What if the attacks at Butler or West Palm Beach had been planned by well-trained terrorists using multiple, simultaneous attack methods as witnessed in the series of coordinated Islamist terrorist attacks on Friday, 13 November 2015 in Paris, France? The Secret Service and the IC at large should be acutely focused on the possibility of diversionary, multitargeted attack scenario planning prior to the Inauguration (or any future major event). There are many analyses of asymmetrical attack methods that should be studied. Other salient examples include Mumbai (2009), Brussels (2016) and Barcelona (2017). DHS has published planning guidance to identify and prevent Complex Coordinated Terrorist Attacks (2018). Would the Secret Service be able to detect an attack plan like these let alone respond to them?

Since the 9/11 attacks billions of tax dollars have been invested in defense strategy revisions, police, military and emergency responder training, communications upgrades and field exercises to better equip all concerned to address evolving threats. The National Response Framework (2019) defines five core capacities to guide the training of the response community: prevent, protect, mitigate, respond, recover. The purpose is to “better integrate government and local response efforts.” Simply stated, all security partners need to focus more on prevention and work as a cohesive team. It appears these capacities were not incorporated in the security plan at Butler, PA or West Palm Beach, FL.

This guidance needs to be incorporated and operationally reinforced into all joint security efforts in the field; not only in training.

Agents from other DHS agencies sed to support Secret Service protective details should be required to meet the same protective training metrics required of Secret Service agents. The required training hours should be increased as outlined in the Secret Service Fiscal Years 2021-2025 Human Capital Strategic Plan.

The Secret Service needs to redefine its protective mission. The current policies and procedures are based on dated threat models. The old threat models guiding the Secret Service culture are myopic and limit creative thinking. More effective proactive strategies, policies and training that match evolving attack methods are needed:

· Move the Secret Service back to the U.S. Treasury Department;

· Re-examine basic security procedures;

· Recognize and respond to lone shooter profile behaviors;

· Incorporate Red Team planning and training;

· Review lone shooter and coordinated terrorist attack methodologies;

· Develop security advance training to include preventive and deterrent attack strategies;

· Require the IC to proactively and thoroughly brief the Secret Service PID and protective details with ongoing and timely protectee threat intelligence;

· Develop specific integration protocols with public safety counterparts;

· Require a Secret Service supervisor, partnered with the local jurisdiction law enforcement supervisor, to review the security advance Incident Action Plans (IAPs) and visit each site to be visited prior to the protectee’s arrival.

· Conduct post event hot washes and train to correct missteps;

· Partner with elite military forces, i.e. Delta and Seal teams to revise a range of protective measures and training;

· Reinstate annual physical medical screening with a coronary emphasis;

· Reinstate mandatory quarterly physical fitness testing for all gun carrying personnel;

· Develop scalable protective training based on emerging attack methodologies with a terrorist focus; and

· Specifically study and create protective training scenarios that identify terrorist simultaneous attack planning targeting routes, site access/egress locations, command posts, agent and law enforcement personnel staging areas and respective equipment.

Equally troubling, the recommendations set forth by the 435-page U.S. Secret Service: An Agency in Crisis from December 2014 (after serious security failures prompted this inquiry) as of this writing, have yet to be fully implemented. Conspicuously absent among them remains—the failure of protective detail agents to complete consistent training—“at least 12% of work hours by fiscal year 2025.” According to Jason Chaffetz, the agency has woefully failed to achieve this training target. He says the Secret Service has been on notice since 2015 to implement effective changes, namely training and accountability to prevent the failures. Many key recommendations have not been met.[41]

The collective observations and recommendations outlined above are further delineated, along with others, in the FINAL REPORT OF FINDINGS AND RECOMMENDATIONS completed by the Task Force on the Attempted Assassination of Donald Trump, dated December 5, 2024. This report was issued by Chairman Mike Kelly (R-PA) and Jason Crow (D-CO).[42] These recommendations should be prioritized with elite military forces. Establish scalable protective survey plans that can effectively adapt to changing locales and environments.

The world of team sports provides a compelling metaphor for how games are won. Team members are assigned positions based on ability and experience. They rehearse their plays incessantly until they get it right. Success in the protective security arena requires the same focus.

If the Secret Service team expects to win their zero-fail mission, they will need to rebuild a foundation of trust—first. Leadership deficits, disparate experience levels, inconsistent training, dated technology and other security advance omissions are fixable. Restoring trust among their fellow agents and with their brothers and sisters in blue and critically with their prized asset—the protectee—poses their biggest challenge. Winning is impossible without trust.

Is the Country Being Effectively Protected by its Intelligence Agencies?

To fully answer this, a hard look at the intelligence agencies and their successes and failures need to be critically examined in 2025. There have been more than 70 successful terrorist interdictions since 9/11. Unfortunately there has been an increase of serious failures in the last eight years, many preventable, in the homeland that dilute these successes. Many observers and media outlets are reporting partisan politics has rendered the agencies responsible for investigating and preventing many attacks in the past four years less proactive and less effective. Congressional committees and Inspectors General reports conducted in response to whistleblower testimony and media reporting have shown the FBI reallocated its resources from its primary mission to protect the nation from domestic and international terrorism. Their focus has shifted from cyber-threats, organized crime, violent crimes, human trafficking etc. to lesser crimes with a political bent. This shift in focus by the FBI along with collaboration with DHS has added to the rise of Domestic Terrorism.[43] According to the U.S. Government Accountability Office (GAO) there has been a 357% increase in domestic terrorism from 2013 – 2023.[44]

After the 9/11 attacks on September 11, 2001, a candid review of the nation’s intelligence failures—contributing causes, i.e. agency information sharing dysfunction and the “siloed” structure of the IC; namely the CIA, FBI, NIA, DIA and the NSA was reviewed. The 9/11 Commission Report, released on July 22, 2004 examined these failures in detail.[45] Notably, the consensus finding was and unfortunately remains today—the intelligence agencies lack imagination and do not effectively share domestic and foreign threat information, particularly with a terrorist nexus. Bureaucratic and administrative restrictions delay the release of “sanitized” threat information that is in large part, not immediately useful by its consumers. Among the 9/11 Commission’s many recommendations—create a DHS in an effort to centralize 22 different federal agencies into one department. The intent was to unify security operations to be more responsive and less siloed in its handling of, sharing and responding to threat information to the homeland.

Unfortunately, this has not happened. DHS has been widely criticized for being stymied by bureaucratic dysfunction. Many have observed the amalgamation of the 22 agencies, in many cases, has had the opposite effect…these agencies, many of which with a more than a 100-year history, were not fully on board to “play in one sandbox” and share their tools risking the loss of their respective agency eminence.[46] As a result some argue many agencies hold onto information to be able to control investigations, justify funding, etc. Several studies show the goal of more effective information sharing has not been achieved despite the creation of several Presidential Directives enacted post 9/11 and the creation of more than 80 Joint Terrorism Task Forces (JTTFs).[47]

The numerous recent intelligence failures we are seeing and continue to experience is alarming. The conclusions of many Inspectors General reports and House Committee Hearings have further revealed the key intelligence agencies, CIA, FBI and others are not fully effective protecting Americans. It has been proven these agencies have been weaponized against conservatives and directly at Donald Trump and his family. This leads us to only one conclusion —our IC is broken. This is supported by the footnoted documents referenced in this writing. Among the many glaring facts: 51 former intelligence officials declared the Hunter Biden laptop, disinformation—later proven to be false. Further, the CIA admitted many of the 51 signatories were paid CIA contractors.[48] [49]

Several FBI, IRS and Secret Service whistleblowers including former FBI agents Richard Stout and Nicole Parker (and many others) have publicly called out the credibility of the FBI; specifically the leadership who have not prioritized the core mission of the FBI.[50] On December 9, 2024, Senator Grassley sent a letter to FBI Director citing as many as 60 examples of the FBI’s blatant failures to uphold the rule of law and obstruct the work of the Congress. The letter stated, “the FBI has shown an outright distain for congressional oversight during your tenure.”[51] Instead, recent FBI Directors, Comey and Wray chose to violate their oaths denying fair and due process rights to several hundreds of citizens and Brady rule violations for political purposes. Whistleblower testimony corroborates the FBI leadership, at many levels, were aware of this but continued this blatant dereliction of duty anyway.

It has been empirically shown the FBI and the DOJ, under the Biden Administration, have implemented an ongoing two-tier system of justice strategy targeting Republicans at large, prominent conservatives and Donald Trump while ignoring instances of clear federal statute violations (with undeniable probable cause) by the Democrats and leftists. “These include pay-to-play schemes by the Bidens and the Clintons.”[52] Not the least of which are the 18 instances of arson and vandalism targeting pregnancy resource and other faith-based centers by the group Jane’s Revenge which the FBI has not addressed.[53]

Basically, the FBI has shifted its focus and resources from counterintelligence, established terrorist threats, China hacking our nation’s IT infrastructure, sex trafficking of minors and organized crime to targeting Catholics, declaring parents attending school board meetings ”domestic terrorists,” investigating thousands of January 6th attendees and protesters and arresting pro-life demonstrators. Among the most egregious investigations and warrant executions was the unprecedented search of former President Trump’s residence, staging evidence and doctoring photos in August 2022 to justify prosecutions.[54]

Equally egregious, FBI failures identified by Senator Grassley included serious threats posed by foreign actors treated with tepid urgency if at all. For example, the FBI did not thoroughly vet Afghan evacuees under the Operations Allies Welcome (OAW), at least 50 of which were later flagged with “potentially security concerns.” This and the “open border” policy of the Biden administration, the dilution of ICE resources, restricting ICE’s arrest and deportation enforcement purview, defunding the police and weak enforcement of crimes committed by a high number of migrants entering the U.S. illegally has increased the nation’s vulnerability.[55] On June 25, 2024, DHS identified more than 400 crossed the U.S. border with an ISIS-affiliated network.[56]

Another disturbing example of the egregious failures and unlawful government oversight is documented in Senator Ron Wyden’s (D-ORE.) recent release of documents confirming the NSA and the FBI are unlawfully purchasing Americans’ internet browsing records and personal data.[57]

Restoring faith in America’s intelligence agencies to prevent what we have witnessed for at least the last eight (8) years will require significant reforms.[58] Essentially, there is a call for more transparency and bi-partisan oversight across the board.[59] Various national polls reflect more than 60% of Americans do not trust the government—especially the FBI.[60]

The GAO found the greatest number of domestic terrorism attacks are committed by either racially or ethnically motivated violent extremists, (this includes homegrown violent extremism) many of whom have been radicalized since 2010.[61] A few notable examples include:

· May 3, 2024 – Two Jordanian foreign nationals attempted to force their way onto Marine Base Quantico. Both were in the country unlawfully;

· May 9, 2024 – Trevor Bickford of Maine received a 27-year prison sentence for attempting to kill police officers in Times Square in 2022. He claimed he wanted “to wage Jihad and kill as many targets as possible;” and

· June 9, 2024 – 8 Tajikistan nationals were arrested in New York, Philadelphia and Los Angeles with ties to ISIS plotting terrorist attacks in the U.S.

Recent intelligence failures are compounded by disjointed inter-agency information sharing, fewer proactive responses to threat intelligence, poor monitoring of social media posts and not responding to credible law enforcement reporting. A key policy failure is the open U.S. border and restricting the Border Patrol’s ability to identify illegal crossings and account for “gotaways.” Collectively, these intelligence failures have led to increases in a wide range of crimes as follows:

· A resurgence of terrorist attacks;

· Human trafficking;

· Drug trafficking;

· Attacks targeting law enforcement officers and their equipment;

· Homegrown violent extremism;

· Lone wolf attacks at mass gatherings;

· Hate crimes;

· Attacks on churches;

· Active school shooter attacks;

· Attacks on family planning centers; and

· Cyber-attacks/Ransomware attacks.

Fixing this will require honest, bipartisan commitment. The IC, above all, will need to be accountable to their staffs and the American people. The proposed remedies (some of which cited below) are required to ensure the respective intelligence agencies are transparent with the appropriate federal and local law enforcement agencies. This is needed to prevent a repeat of the abuses identified earlier that targeted a variety of individuals and groups by the Biden administration.

· Establish a special bipartisan committee with full access to all intelligence and threats to ensure proportional decisions and actions to protect the homeland are made above politics and reviewed before being implemented;

· Ensure the investigations conducted by the intelligence agencies are strictly within their jurisdictional purviews;

· Assess the effectiveness of the collaborative sharing information practices and formal agreements between the FBI and DHS. A 2023 GAO study shows threat information is not shared effectively by them and is not immediately useful. This GAO report identified a key reason for this serious information sharing dysfunction:[62]

“FBI officials told us they did not use the data DHS collects on domestic terrorism incidents because they weren’t aware DHS was collecting it. DHS officials in turn told us they didn’t share their incident data with their FBI counterparts because they weren’t asked for it.”

· Verify that any unmasking follow CIA & FBI rules. The names of many U.S. citizens were improperly released instead of or with foreign targets;[63]

· Enact strict verification processes to prevent using circular reporting by “creating” false and damaging information, leaking it to the press and then opening investigations based on that. It has been established the FBI under Director Comey and other FBI officials engaged in this practice; and

· Enact strict adherence to verification processes to ensure the basis of any Section 702 Foreign Intelligence Surveillance Act (FISA) application requests are factual. Rampant abuse of the FISA process by Director Comey and other FBI officials (from 2016 – 2017 and beyond) has been confirmed by the DOJ IG.[64]

On December 9, 2019, Attorney General William Barr stated the DOJ IG determined the evidence put forth to the FISA Court to secure warrants to surveil the Trump campaign and his administration “were not factual, omitted consistently exculpatory information.” AG Barr further stated: “ The malfeasance and misfeasance detailed in the Inspector General’s report reflects a clear abuse of the FISA process;”[65] [66]

Looking Forward

As we begin 2025 and we assess the state of our government, the state of our safety, the state of our security, our sovereignty and most important, America’s pre-eminence on the planet; now is a great opportunity to work to rejuvenate the bedrock principles that make us the sterling example of freedom and strength. It is possible to reignite the nation’s status as the “Shining City on a Hill” as President Reagan described it.

It will take an honest commitment for the new Trump administration to set things right. In the last several years many of our agency heads and politicians put egos and politics ahead of the nation’s guiding principles. How many of them were boy scouts and forgot the first point of the scout law?: “A scout is trustworthy.” How many attended military academies and committed to the credo?: “A cadet shall not lie, cheat, steal or tolerate anyone the does.” How many swore allegiance to the United States and their Oath of Office (5 US Code Sec. 3331)?: “I do solemnly swear I will support and defend the Constitution of the United States against all enemies, foreign and domestic…I take this obligation freely without purpose of evasion…”

If there was ever a time in the history of our nation when accountability, honest introspection and reform is critically needed…it is NOW!

[1] https://www.gpb.org/news/2024/10/21/law-enforcement-officials-prepare-for-possible-post-election-violence-in-dc

[2] https://www.govexec.com/federal-news/2024/10/law-enforcement-officials-prepare-possible-post-election-violence-dc/400374/

[3] https://www.nytimes.com/2024/11/16/us/politics/democrats-anti-trump-battle-plan.html

[4] https://www.bbc.com/news/articles/cj6kj383k4ko

[5] https://www.politico.com/news/2024/11/08/donald-trump-iran-assassination-plot-00188498

[6] https://www.cnn.com/2024/10/24/asia/russia-china-north-korea-iran-new-axis-intl-hnk/index.html

[7] https://thehill.com/opinion/criminal-justice/3671392-nearly-half-of-the-country-now-has-serious-doubts-about-the-fbi-heres-why/

[8] https://nypost.com/2022/03/18/intelligence-experts-refuse-to-apologize-for-smearing-hunter-biden-story/

[9] https://www.usatoday.com/story/news/politics/elections/2024/12/14/biden-trump-laws-judges-regulations-legacy/76865964007/

[10] https://www.newyorker.com/magazine/2024/10/28/the-us-spies-who-sound-the-alarm-about-election-interference

[11] https://www.theatlantic.com/politics/archive/2024/02/democrats-congress-trump-january-6/677545/

[12] https://americanmilitarynews.com/2024/08/video-democrat-congressman-calls-for-civil-war-conditions-to-disqualify-trump-if-he-wins/#google_vignette

[13] https://www.politico.com/news/magazine/2024/10/20/trump-overturn-2024-election-plan-00184103

[14] https://www.politico.com/news/2024/11/20/democrats-trump-foes-governors-attorneys-general-interest-groups-00190177

[15] https://www.washingtonexaminer.com/news/campaigns/presidential/3238783/shell-shocked-democrats-struggle-mount-resistance-trump/

[16] https://www.nytimes.com/2024/10/22/us/politics/election-warning-russia-iran.html

[17] https://www.odni.gov/files/ODNI/documents/assessments/NICM-Declassified-Foreign-Threats-to-US-Elections-After-Voting-Ends-in-2024.pdf

[18] https://www.dhs.gov/publication/special-event-assessment-rating-sear-events-fact-sheet

[19] https://oig.justice.gov/sites/default/files/reports/25-011.pdf

[20] OIG-24-42-Aug24-Redacted copy.pdf

[21] https://www.peters.senate.gov/newsroom/in-the-news/peters-report-details-failures-ahead-of-jan-6-attack-calls-for-changes

[22] https://www.newsweek.com/ex-capitol-police-chief-sounds-alarm-jan-6-cover-1817365

[23] https://www.npr.org/2021/03/03/973292523/dod-took-hours-to-approve-national-guard-request-during-capitol-riot-commander-s

[24] https://www.npr.org/2021/01/11/955548910/ex-capitol-police-chief-rebuffs-claims-national-guard-was-never-called-during-ri

[25] https://cha.house.gov/press-releases?ID=1E353E41-4087-428A-A477-B70E5FD46FA1

[26] https://www.peters.senate.gov/newsroom/in-the-news/peters-report-details-failures-ahead-of-jan-6-attack-calls-for-changes

[27] https://www.peters.senate.gov/newsroom/press-releases/peters-report-finds-significant-intelligence-failures-by-fbi-and-dhs-in-lead-up-to-january-6th-capitol-attack

[28] https://www.hsgac.senate.gov/wp-content/uploads/230627_HSGAC-Majority-Report_Executive-Summary_Jan-6-Intel.pdf

[29] https://www.oig.dhs.gov/sites/default/files/assets/2022-04/OIG-22-29-Mar22-Redacted.pdf

[30] https://cha.house.gov/_cache/files/2/2/22c7bff3-c7be-4ba9-b539-767ec0fda0ac/DA74D6968E28C88C7160A0ED12148C84.11.21.2024-loudermilk-dod-ig-letter.pdf

[31] Letter from Chairman Charles Grassley, Se. Comm. on Fin., to Director Wray (Dec. 9, 2024), https://www.grassley.senate.gov/imo/media/doc/grassley_to_fbi_-_failures.pdf

[32] https://taskforce.house.gov/sites/evo-subsites/july13taskforce.house.gov/files/evo-media-document/12-5-2024-Final-Report-Redacted.pdf

[33] https://www.blackstonepublishing.com/blogs/news/former-capital-police-chief-steven-a-sund-set-to-publish-a-new-book-about-the-attack-on-january-6-with-explosive-never-before-revealed-information

[34] https://cha.house.gov/press-releases?ID=1E353E41-4087-428A-A477-B70E5FD46FA1

[35] https://cha.house.gov/2024/12/chairman-loudermilk-releases-second-january-6-2021-report

[36] https://www.peters.senate.v/newsroom/in-the-news/peters-report-details-failures-ahead-of-jan-6-attack-calls-for-changes

[37] https://www.bizpacreview.com/2024/10/26/whistleblowers-claim-secret-service-employees-working-with-trump-were-made-to-sign-ndas-1497932/

[38] https://nypost.com/2024/10/09/us-news/secret-service-blocked-watchdog-to-hide-inconsistent-security-protocols-at-trump-events-whistleblower/

[39] https://abcnews.go.com/Politics/capitol-police-chief-steven-sund-entire-intelligence-community/story?id=75729882

[40] https://www.lawfaremedia.org/article/dept.-of-homeland-security-oig-releases-report-on-secret-service-s-response-to-jan.-6-attack-on-the-u.s.-capitol

[41] https://oversight.house.gov/wp-content/uploads/2015/12/Oversight-USSS-Report.pdf

[42] https://taskforce.house.gov/sites/evo-subsites/july13taskforce.house.gov/files/evo-media-document/12-5-2024-Final-Report-Redacted.pdf

[43] https://www.gao.gov/assets/gao-23-104720-highlights.pdf

[44] https://www.gao.gov/products/gao-23-104720

[45] https://9-11commission.gov/report/911Report_Exec.pdf

[46] https://www.thoughtco.com/department-of-homeland-security-4156795

[47] https://www.congress.gov/117/meeting/house/114425/witnesses/HHRG-117-JU08-Wstate-JonesS-20220217.pdf

[48] https://www.newsweek.com/hunter-biden-laptop-jim-jordan-facebook-disinformation-twitter-1767369

[49] https://www.msn.com/en-us/news/politics/cia-admits-some-signatories-of-hunter-biden-laptop-letter-were-paid-contractors/ar-BB1oVNjs

[50] https://ijr.com/richard-stout-how-to-reform-our-politically-weaponized-fbi-and-restore-public-trust/

[51] Letter from Chairman Charles Grassley, Se. Comm. on Fin., to Director Wray (Dec. 9, 2024), https://www.grassley.senate.gov/imo/media/doc/grassley_to_fbi_-_failures.pdf

[52] https://thehill.com/opinion/criminal-justice/3671392-nearly-half-of-the-country-now-has-serious-doubts-about-the-fbi-heres-why/

[53] https://www.foxnews.com/politics/zero-arrests-16-janes-revenge-attacks-pro-life-organizations

[54] https://www.foxnews.com/politics/house-judiciary-committee-investigates-alteration-evidence-seized-fbi-trump-classified-records-probe

[55] https://www.dhs.gov/news/2024/10/02/dhs-2025-homeland-threat-assessment-indicates-threat-domestic-and-foreign-terrorism

[56] https://homeland.house.gov/wp-content/uploads/2024/10/CHS-10.3.24-Terror-Threat-Snapshot.pdf

[57] Senator Ron Wyden (D-ORE.) recent report by Ars Technica states the NSA has admiied to buying records

[58] https://www.thecipherbrief.com/column_article/the-intelligence-community-is-broken-heres-how-we-fix-it

[59] https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/3224584/how-trump-can-intelligently-reform-the-intelligence-community/

[60] https://thehill.com/opinion/criminal-justice/3671392-nearly-half-of-the-country-now-has-serious-doubts-about-the-fbi-heres-why/

[61] https://www.gao.gov/blog/rising-threat-domestic-terrorism-u.s.-and-federal-efforts-combat-it

[62] https://www.gao.gov/assets/gao-23-104720-highlights.pdf

[63] Lt. General Flynn and other Trump administration officials were improperly unmasked during 2016 – 2017.

[64] Section 702 authorizes targeted foreign intelligence information collection related to terrorism. U.S. persons may not be targeted and their names indiscriminately used without a specific nexus to terrorism.

[65] https://clayhiggins.house.gov/2019/12/09/higgins-ig-report-confirms-obama-era-fbi-abused-fisa-process/

[66] https://thehill.com/policy/national-security/4012650-fbi-misused-surveillance-tool-fisa-section-702/

China’s Rising Influence in the South China Sea: Implications for ASEAN and Global Stability

Evolving security dynamics in the South China Sea reveal a dangerous and highly volatile mix of aggressive posturing, legal defiance, and strategic manipulation.

As China increasingly asserts its claims over the fraught seascape and the vast mineral wealth lying underneath, the United States continues to demonstrate a military presence of its own, strengthening its relations with India and several ASEAN member states to bolster its position. Complicating this scenario even further are lingering fears that China will materialize a non-consensual unification with Taiwan within the next five years — an invasion that promises devastating losses to both sides.

The strategic importance of the South China Sea cannot be overstated: whoever controls it, controls the future of East Asia. With an estimated $3.37 trillion of goods – nearly 21% of all global trade – transiting annually, this body of water is not just a regional flashpoint, but a crucial economic lifeline.

Last year, Chinese Premier Li Qiang warned that misperceptions, diverging interests, and external interferences may give rise to a “new Cold War” in the region. As these tensions continue to grow, it is not simply the future of one of the world’s most vital maritime corridors that hangs in the balance, but the stability of the world order itself.

To download this paper Click Here.

The Failed Assassination of Former President Trump in Butler, PAHow did the Secret Service Miss the Warnings?

The Failed Assassination of Former President Trump in Butler, PAHow did the Secret Service Miss the Warnings?

The country and the rest of the world are still incredulous—how could a 20-year-old lone gunman manage to defeat the nation’s elite protectors and fire 8 rounds from an AK that nearly inflicted a fatal skull injury on a Presidential nominee? By divine intervention and the momentary distraction of the shooter by a Butler, PA police officer, Former President Trump escaped an assassination at a rally in Butler, PA on Saturday, July 13th. Now, more than three weeks later, despite two Congressional Oversight hearings with now former Director Cheatle and Acting Director Rowe there are still many unanswered questions and very troubling facts continue to emerge. Former Director Cheatle’s vacuous responses to the Oversight Committee’s questions and Acting Director Rowe’s equally indirect answers and misinformed statements on July 30th (including the FBI’s limited statements) have allowed serious questions to linger. Numerous theories, some supported with facts and other less credible, have been developing. Numerous articles have been published. Senator Grassley, as reported by Real Clear Politics, RCP on July 22nd, has received agency whistleblowers’ information, audio and texts from Butler law enforcement officers. These have exposed many disturbing, negligent lapses and security omissions contradicting many claims made by Cheadle and Rowe.

As of this writing, the Secret Service has been guarded with their responses to the Oversight Committee’s inquiry and to the public. Rowe’s limited statements seem to contradict evidence from Butler law enforcement authorities and video evidence obtained from the public.

In an effort to set the record straight and in the spirit of urging critical reforms, the following factual information supported by video evidence and statements from Butler Police officers and SWAT officers assigned to the rally on July 13th with direct operational knowledge, is set forth. It is critically important to bring clarity to the information being reported.

This review will highlight key omissions of protective advance procedures during the security planning of the July 13, 2024 rally. . Many recommendations set forth by the 435-page U.S. Secret Service Protective Mission Panel’s report from December 2014 (after serious security failures prompted this inquiry) were not fully implemented. Conspicuously absent among them was and remains—the failure of protective detail agents to complete consistent training—“at least 12% of work hours by fiscal year 2025.” According to Jason Chaffetz, the agency has woefully failed to achieve this training target. He says the Secret Service has been on notice since 2015 to implement effective changes, namely training and accountability to prevent the failures like those seen in Butler, PA.

The intent is to fact check the numerous statements and theories put forth by self-proclaimed experts and balance those with some credible authorities. In the spirit of separating facts from theory—context, background and explanations of the facts as we know them are sorely needed. Effective, tested protective strategies and advance procedures will be presented as a basis of comparison.

Normally I would not comment with this amount of detail on related matters. However, this assassination attempt has exposed systemic operational failures of the Secret Service’s protective arm and the advance team’s preparations. For example Real Clear Politics, RCP on July 30 referenced CNN reports and admissions by Rowe that expose the fact that security resources were denied for the Trump detail despite repeated requests by the detail agents. This has been an on-going complaint by detail agents and whistleblowers for at least two years. Denied resources for Trump rallies include counter sniper teams, drones, canine teams, metal detection equipment and other matériel. Further, documents show where Rowe decided unilaterally to restrict counter sniper teams to any Trump event beyond driving distance outside of D.C. While Cheatle, Rowe and the Secret Service spokesman initially denied this, whistleblower reports has forced them to confront their denials. RCP further reports the Butler rally was not allocated any counter sniper teams but Secret Service management reversed the decision and sent two teams to Butler with one day to conduct a survey that normally takes two to three days to complete.

This is appalling given the thousands of on-going death threats directed at Trump and the Iranian assassination plot discovered before the Butler rally.

All of us need to avoid feeding into conspiracies. Fair-minded folks want the forensics experts to complete their investigation and analysis based on facts. Hopefully this will minimize theories that are gaining attention. Additionally, when unsupported theories are not checked, there is a risk of feeding into them and they seemingly become more credible. The other risk is people tend to lose their objectivity and unintentionally get drawn into these conspiracies. With the cascade of information bombarding us, we have difficulty discriminating credible facts from fiction and “exciting” and “dramatic” theories. Everyone needs to be reminded to take a deep breath, pause and consider verified facts. To do this effectively, it is important to understand context and known factors.

The following is set forth based on what has been reported by credible, law enforcement agencies and other official sources on the ground at the Butler rally site, information from a closed-door Oversight Hearing, others familiar with the facts (as best that can be determined) and video evidence leading up to, during and after the assassination attempt. The FBI is continuing their investigation.

Tragedies as serious as a nearly successful assassination resulting in injuring a Presidential nominee, the death of one spectator and serious injuries of two other supporters is not an isolated event. There were and are a host of diverse factors at play at the Butler rally before and during that impacted the attack. Contributing factors are multi-factored and complex. Agency mission, leadership, federal statutes, intelligence information, agency policies, training, security resources, physics, human factors, political tension and others play a role.

Isolating these elements and assigning a predictive value of each poses a near impossible challenge.

Suffice it to say the collective circumstances (as we now know) at play leading up to, during and immediately following the attack are very disturbing and are indicative of the Secret Service’s negligent execution of their protective plan. Before we can move forward, key omissions and departures from established protective procedures need to be identified. This will give insights on factors that contributed to the security vulnerabilities and failings at the rally. Hopefully, this will help guide our understanding and conclusions based on fact and verified evidence. Most important, the ultimate goal is to learn how we can collectively, from our respective vantage points, do everything possible to prevent attacks like this from happening in the future.

While rare (the last assassination attempt of a president occurred 43 years ago), none of us are naïve enough to think a breakdown in security would never occur again. However, ensuring that effective, scalable security procedures are consistently implemented will minimize the possibility of a repeat (as much as humanly possible), is the goal moving forward. Hopefully this review will ensure a more diligent focus on preventive security measures. If a response is needed, it will be immediate and effective.

What we do know now is the earlier blame shifting of security responsibility, communications breakdowns and serious omissions of basic security advance operating procedures are worse than originally reported. The security missteps point to profound negligence in the execution of the security plan. Key to understanding the egregious breakdown in security is answering how the shooter slipped through the cracks after being observed by local counter snipers at a picnic table on July 13th at 4:26 PM. A Beaver County counter sniper’s text message released by Beaver County officials reported initial sightings of a suspicious individual about 100 minutes before the shooting. He was observed by a Pennsylvania State Police Officer with a range finder exhibiting suspicious behavior. His photo was reportedly sent to the Police Command Post. Apparently this information was not passed to the Secret Service Security Room at this first sighting. A video taken more than an hour before the shooting, at about 5:06 PM, shows Crooks in front of the AGR building. This sighting of a suspicious person was reported to police by spectators. Police on the ground were looking for him up to the time of the shooting.

On July 23, 2024, the New York Times reported the FBI determined a local SWAT team spotted Crooks on the roof of a warehouse about 18 minutes before Trump took the stage (about 5:44 PM) and 27 minutes before the assassination attempt (6:11:33 PM). Why was this report of a man on a roof lost and/or not reported to the Secret Service and the other officers at the rally?

On July 19, 2024, CBS News reported information from three sources that closed door meetings between Secret Service/FBI officials and law makers the Secret Service was aware of a suspicious person 20 minutes before the shooting began. At 5:51 PM State Police alerted the U.S. Secret Service about a suspicious person within a minute of this sighting.

Why were the Trump protective detail agents not immediately notified? Why was Trump not informed? Trump took the stage at 6:02 PM, a full 17 minutes after multiple reports of a suspicious person with a range finder were received and passed to law enforcement radio channels? The Secret Service treated this as a generic suspicious-person-notice until minutes before the shooting.

The delayed, ineffective response to these warnings violates the Secret Service’s core protective responsibility to notify the protective detail and the post agents of potential threats when the behaviors fit the lone shooter profile. Crooks’ behavior was not “merely suspicious.” The first sightings of Crooks alarmed police officers. To deem Crooks’ behavior as merely suspicious is irresponsible. Further, in the context of the thousands of documented threats received by the Trump detail, the Secret Service Intelligence Division and the Iranian assassination plot received before the rally, an urgent and heightened alert and response to the reported behaviors were clearly in order. The Secret Service’s own threat assessment center provides guidance to employees and law enforcement agencies to assist in the detection of would be attackers (See Planning-page 12-18). Why were these lone shooter profile behaviors, that fit those being exhibited by Crooks, not considered when these reports were received?

Crooks exhibited many of the predictive behaviors identified by the Secret Service and other numerous post shooting attack studies associated with lone shooters. The investigation to date shows Crooks visited the rally site at least twice before the rally and once (leaving and returning) the same day before the attack. Crooks evaluated the rally site two hours before the rally with his own drone, probed security at various locations, brought a range finder and paced nervously before leaving, apparently eluding officers trying to locate him. All of these behaviors, sightings and notifications by local police officers and spectators, were not prioritized as a threat by the Secret Service until Crooks was seen with a rifle on the AGR building. Why didn’t the Secret Service agents and the Secret Service counter sniper teams link these behaviors to the behavioral profile known to be typical of lone shooters? Cheatle lamely claimed to the Oversight Committee the suspicious behavior was only “suspicious” and not deemed a threat until Crooks was seen with a gun on the roof of the AGR building. Not prioritizing this as a threat and alerting the Trump detail immediately about Crook’s’ early behaviors, known to be linked to the behavioral profile of known shooters, is nothing short of negligent. On July 30, 2024, at the Oversight Committee hearing, Rowe gave an equally evasive answer to Senator’s Lee’s question as to why Trump was allowed on the stage with the behaviors cited above. Rowe stated (0-:27) a threat needs a weapon “it comes to weapon, a potential threat, is he carrying an IED…? To be characterized as a threat, Rowe’s statement that Crooks needed to have been seen with a gun or IED before decisive intervention should be taken is naïve. This exposes his lack of understanding and failure to link Crooks’ behavior as more than suspicious despite sightings of Crooks with a gun well before the shooting.. Assessments like this chill decisive decision making. Similar indecision allowed Omar Gonzalez to scale the White House fence on September 19, 2014, overpower a Uniformed Division Officer and enter the Diplomatic Entrance of the White House.

The behavioral profiles cited in the Secret Service Threat Assessment Centers Mass Attacks in Public Places Guidance recommendations, published in January 2023, define behaviors displayed by Crooks’ as threatening. Similar pre-attack behaviors are clearly linked to shootings and have been validated in published metadata summarizing the conclusions of studies of mass shootings in the past 40+ years. Crooks’ behavior should have been linked to the lone shooter behavioral profiles. Crooks exhibited many of these behaviors before Trump took the stage. To attempt to ”dilute” these disturbing behaviors that exceed the baseline of normal spectator behaviors, is negligent. If the Detail Leader and shift agents protecting Trump were notified after the first sightings (they were not), Trump would have been held in the limo or holding room or taken off the stage until the suspicious person was located.

Not informing the Detail Leader, Trump and the rally security agents about the suspicious person from the early sightings, especially his nervous movements, possessing a range finder and evading police is among the most egregious failures at the Butler rally. The Police Command Post and the Secret Service Security Room should have informed the Secret Service detail protecting Trump—immediately.

The FBI investigation has now confirmed Crooks exhibited many other pre-attack behaviors, i.e. using aliases to purchase precursor bombmaking materials and researching the DNC schedule in Chicago and historical assassination details.

The most important protective tool required to effectively protect people and assets are competent security team members, a thorough security advance and a diligent review of the security measures before the visit of the protectee. The security advance elements, resources and physical response protocols need to be rigorously applied and continually refined to match evolving threats and be scalable to adapt to changing circumstances.

Any effective dignitary security advance requires teamwork by developing a cohesive team with ALL partners in the city and jurisdiction being visited, especially the public safety responders.

Presidential advances and Presidential campaign advances with heightened political tension with thousands of protectee death threats require diligent attention to every facet of the security preparations. Commensurate manpower, resources, a scalable security plan and oversight that match threat levels is required! This is a tall order but needs to be done.

Information gleaned from the Butler County law enforcement agencies assigned to the rally site, whistleblowers and members of the public to include videos taken, before, during and after the shooting are detailed below. All point to the fact many immutable tenets of protection were not followed, not implemented and/or ignored.

U. S. Secret Service Legal Authority

Before the deviations from and omissions of well-established Secret Service advance procedures are identified and explained, the legal protective authority needs to be referenced. Very few media outlets are reporting this.

The jurisdictional investigative and protective authority of the Secret Service is defined in the United States Code, Title 18 Section 3056. As it relates to Presidential and Vice-Presidential candidates, the following section of the Code specifically applies.

Title 18 U.S.C.’ 3056(a)(7) authorizes the U.S. Secret Service to provide protection for major Presidential and Vice-Presidential candidates.

This authority cannot be abdicated to local law enforcement. Former Director Cheatle and Acting Director Rowe erroneously stated it could be. Cheatle claimed local law enforcement were responsible for the security of the AGR Building in Butler, PA. Crooks fired eight (8) AR rounds from the roof in the direction of the stage hitting Trump and three others. Cheatle specifically stated the AGR building was outside the security perimeter and the building was not swept. Cheatle essentially blamed local law enforcement for the security failure.

On July 30, 2024, Acting Director Rowe testified: “We made an assumption that there was going to be uniformed presence out there, that there would be sufficient eyes to cover that, that there was going to be the local counter sniper teams.”

These claims fly in the face of the statements of the local police officers assigned to support the sectors and posts at the Butler rally. Cheatle and Rowe attempted to shift blame and responsibility to local law enforcement. This is not supported by law nor precedent. It is simply not tenable.

The USSS is always responsible for identifying and preventing any threat regardless of its origin; inside or outside established “secure” perimeters during an official event. This has never been proffered as a defense for absolution of protective responsibility in the history of the Secret Service. The Secret Service is the overall lead agency responsible for all Presidential candidate security arrangements. This is not delegable.

On July 20, 2024,The New York Times reported that several local officers, including Butler County Sheriff Michael Slupe, stated:

None of the law enforcement agencies that assisted the Secret Service that day — the Pennsylvania State Police, the Butler Township Police Department, the Butler County Sheriff, Pittsburgh Bureau of Police or the multicounty tactical teams—say they were given responsibility for watching the zone outside the Secret Service’s fenced security perimeter…More specifically, the local law enforcement officials stated that none of them were assigned to safeguard the complex of warehouses just north of the farm show grounds including the AGR building.

Alarmingly, statements made by the local agencies indicate the majority of their assignments were to provide security inside or along the perimeter fencing leaving the outside perimeter beyond the fencing exposed. The only outer perimeter police presence were officers assigned to direct traffic. There were however, three local counter snipers assigned to use the 2nd floor window from inside of a building adjacent to the AGR building. They were instructed to monitor the inner perimeter crowd only.

Butler Township Commissioner Edward Natali stated unequivocally:

“There were seven officers all assigned to traffic detail. Period!! The BTPD was NOT responsible for securing AGR or any other location…“Anyone who says so, reports on it, implies it, etc… is uninformed, lying, or covering their own backsides.”

The seven Butler Township police officers were assigned traffic posts but once there was a suspicious person notification, four of the seven officers left their posts to look for him.

Anyone familiar with basic security understands that limiting exposure requires creating strong, integrated and functional perimeters. Limiting your focus on the inner perimeter is just plain myopic, especially in an environment with upswept and unposted buildings in the outer perimeters less than 150 yards away from the protectee. It appears the Secret Service advance team forgot one of the most basic security perimeter concepts—all rings of security need to be fortified and integrated into the overall security plan. It needs to be one team, one fight. An absence of security or weakness in the outer security perimeters reduces the time needed to respond to a threat and shortens the distance between the attacker and the protectee—all factors favorable to the attacker.

Security Advance Omissions Leading to Critical Failures

Normally a Presidential and/or Presidential candidate security advance, especially one conducted for a candidate nominee of Trump’s stature and threat level, should include tested advance protection procedures that have been implemented consistently by the Secret Service for decades. These are well documented in Candidate Nominee Operations directives and manuals. Terminology of these may vary but their security function is clear. Omissions of these could lead to catastrophic consequences. In Butler there were key omissions and an assassination nearly occurred as a result.

Credible sources, whistleblower reports, local police agency statements and Oversight Committee hearing testimony identified negligent deviations and omissions of standard Secret Service protective operation procedures.

It is noted many of the security omissions have been acknowledged by Cheatle and Rowe. Other missteps have been denied despite local police officer statements/texts, whistleblower reports, Secret Service emails and media reporting.

Security Advance Omissions/Oversights:

· Assigning an inexperienced agent to lead the advance in Butler, PA.

· Middle perimeter security manpower included 1-2 Secret Service agents, far fewer than comparable size rallies.

· The security plan was inner perimeter focused with less emphasis on the outer perimeters.

· Local police officers were too siloed and not integrated with the overall security plan.

· Unclear radio communications reporting procedures.

· No officers were assigned to monitor the perimeter beyond the rally perimeter fence to include the AGR building and other warehouses.

· Secret Service did not attend a police meeting with local police counterparts. This prevented functional pairing of Secret Service agents and police officers.

· No helicopter surveillance was provided.

· The Secret Service did not deploy a drone and declined one offered by local law enforcement.

· No Counter Surveillance Unit or Intelligence Unit were available.

· The Secret Service counter sniper team was deployed one day before the rally.

· Four local counter sniper units were located inside the rally perimeter fence; three others inside an adjacent building (next to the AGR building) to monitor the rally

· Secret Service agents did not monitor the AGR building.

· The Secret Service counter sniper teams were not operationally integrated with the local sniper teams.

· No supervisor site review or walk-thru was conducted before the rally.

Resulting Operational Failures:

There were numerous failures resulting from not following established security advance procedures. On July 19, 2024, Breitbart reported nine critical, interconnected planning failures. These are all the result of a negligent failure to follow established advance procedures. These are valid but deserve more context. The following failures are identified to date.

Collectively these oversights led to critical operational failures, the most egregious of which was not communicating Crooks’ threatening behavior to the entire security team when it was first noted by the police at least an hour before the shooting. There were several opportunities after the first sighting of Crooks that should have been communicated to all the police officers and the agents assigned to the rally and critically, to the Trump detail agents.

Given the number of police agencies assigned, the potential for disjointed communications, coordinated through two separate communications hubs, should have been anticipated. A dedicated emergency reporting channel should have been set up and tested. These communications and related technology updates to include drones have been acquired but the Secret Service has been slow to adapt and implement them.

The Secret Service advance agent should have requested the local snipers to take positions outside the AGR building.

The Secret Service drone was not utilized in Butler. Inexplicably, the Secret Service turned down a drone offered by the local police.

A counter-surveillance agent or roving intelligence team should have been available to respond to reports of a suspicious person.

The advance agent should have met with the Secret Service counter sniper teams and local sniper teams to establish a joint workable operations plan. The Secret Service counter sniper survey should have been jointly reviewed with the local sniper teams. This would have identified vulnerable areas and clarified the rules of engagement and statutory authorities. This would have provided would have provided for better sector surveillance and a more cohesive operational team. This would have made life and death split-second decision making more accurate. The fact the Secret Service counter sniper teams did not have communications with the local sniper teams. Collectively, these factors and others contributed to delays.

Secret Service emails reported by Real Clear Politics obtained by Senator Grassley determined 1 – 3 Secret Service agents were assigned to support the Butler rally. Whereas 12 Secret Service agents were assigned to First Lady Dr. Jill Biden for a function in Pittsburgh the same day. The majority of security posts were assigned and held by Homeland Security agents. Current and former Secret Service personnel expressed concern over this and similar disparate resource allocations, i.e. giving Biden more resources than Trump. Trump detail agents have reported this disparity for at least two years prior to the Butler assassination attempt. At the July 30th Oversight hearing Senator Cruz asked Rowe about these and other documented discrepancies, Rowe’s stated rationale was “the sitting president holds national command authority to launch a nuclear strike, sir.” Rowe’s answer (4:30-7:34) did not address threat levels against Trump and how that would affect security resource allocations and the actual numbers disparity.

Senator Grassley, Real Clear Politics and whistleblower reports exposed that Cheatle and Rowe were directly involved in denying requests for needed crowd screening equipment, additional agency manpower, counter sniper teams and other resources for Trump rallies.

It is noted that Rowe was evasive and did not answer the question: “Did you directly approve withholding security resource allocations for Former President Trump vis à vis President Biden events?” This disparate resource allocation exposes more vulnerability to Trump. Notably, no Secret Service counter sniper teams were given to support Trump’s rallies prior to the Butler, PA rally. To rely on local sniper team(s) as the sole sniper resource, with admitted radio interoperability problems between the local police and the Secret Service, poses numerous operational risks.

Two Secret Service counter sniper teams were assigned to the Butler rally a day before the event. Normally, counter sniper teams are deployed 2 – 3 days prior to an event for the current sitting president. At the Butler rally two Secret Service counter sniper teams and local sniper resources were used. At the July 30th Oversight Hearing, Senator Lindsey Graham asked Rowe if the Iranian assassination plot factored into the security footprint. Rowe replied: “Secret Service does a threat based protective model.” Whistleblower reports, Real Clear Politics and Representative Mike Waltz dispute this since the Trump detail agents claim additional security resources have been historically denied. denied and prior to the Butler rally by Secret Service managers, (i.e. Cheatle and Rowe). Secret Service spokesman Anthony Guglielmi and Rowe claim otherwise. In fact Rowe testified these assertions are false.

Nowhere in the U.S. Code, Title 3056(a)(7) is there a caveat for less effective or fewer security resources when there is a clear, on-going death threat level which Trump clearly had and continues to have. The mission of the Secret Service requires it to deploy resources commensurate with the protectee’s threat level as much as possible. Every Secret Service protectee deserves this. To do otherwise invites an attack as we saw in Butler. It is well documented, supported by decades of metadata, that many would-be attackers, especially lone attackers study their targets, note and exploit vulnerabilities.

Approximately a week after the assassination attempt, several local law enforcement officers from Butler, PA appeared on ABC News and asserted the Secret Service advance team did not coordinate or meet with them before the rally. Jason Woods, the lead sniper stated: “We were supposed to get a face-to-face briefing with the Secret Service members whenever they arrived, and that never happened.” Further, Woods stated: “So I think that was probably a pivotal point, where I started thinking things were wrong because it never happened,” Woods said. “We had no communication.”

Investigations have determined the Secret Service detail agents protecting Trump were not notified of this suspicious person at any time from the first sighting up to the time he was sighted on the roof. It is noted other Secret Service agents were informed at least 20 minutes before the first bullets were fired. The detail agents should have been notified immediately as soon as a suspicious person was spotted on the roof of the AGR building, at the very least at 5:53 PM. At this point, the suspicious person was no longer “suspicious” by any definition.

There is no way this can be excused. This was now an imminent threat! This notice should have given the detail at least during the 17 minutes and 30 seconds (when Crooks was seen on the roof of the AGR building) to inform the Detail Leader to make the decision to remain in the limo or in the holding room until the threat had been resolved.

There are many hundreds of examples in Secret Service history when a protectee has been moved to or held in a holding room or removed from a site when threats and vulnerabilities are identified.

During the hearings, Rowe acknowledged some radio transmissions were and lost and not relayed. He attributed the miscommunications and delays to the Secret Service’s encryption algorithms. He stated integrating the encrypted system would take many weeks. Certainly that is not a reasonable solution during an emergency and cumbersome since each jurisdiction has their own radio technology. Radio interoperability has long been a problem for responders. It was cited in the 9/11 Commission Report following the Al Qaeda terrorist attacks on September 11, 2001. Since then, significant government resources have been provided to law enforcement agencies to achieve better radio interoperability technology among agencies. Notably, following the Oversight Committee Report – U.S Secret Service: An Agency in Crisis, infrastructure investments were made starting in 2017 to facilitate the integration of radio communications between Secret Service and local police. This technology was available but not implemented at the Butler rally.

To blame secure radio encryptions for the delay in getting immediate messages from police officers to the Police Command Post and the Secret Service Security Room is not an excuse.

Creative and imaginative thinking including using common sense solutions like cell phones, jointly staffing Command Posts and or Security Rooms with local police radios would have minimized urgent threat notification delays. Simply having someone physically dispatch to the Command Post to personally deliver urgent messages during the approximately 20-minutes Crooks was sighted on the roof might have saved the day.

The Secret Service Presidential candidate advance teams are normally staffed by agents assigned to the field offices within the jurisdictional, geographic boundaries of the closest field office. Agents are also detailed from other offices as manpower needs and availability dictate. The security advance procedures for a Presidential and a Presidential nominee should have equivalently experienced personnel, resources and technology vis-à -vis for a sitting president’s advance. There should be no qualitative difference—the same protective standards should remain consistent. Whistleblower reports indicate the site advance agent assigned to the Butler rally was not experienced with large-scale advances.

For example, the middle perimeter was staffed with Homeland Security Investigative Agents reportedly with little to no experience with Secret Service protection assignments.

Strategic Failures

Among numerous burning questions: How could a lone 20-year-old with relatively cheap equipment, i.e., a drone, range finder and his father’s AR rifle defeat the Secret Service with 22 agents and approximately 80 additional law enforcement officers assigned to secure the Buller, PA rally site?

Obviously money and supposedly years of sophisticated dignitary protection training, state-of-the-art security surveillance technology, access to classified threat intelligence, an expensive array of assault weapons, encrypted communications systems—all failed. What was missing? Was it leadership? Was it a flawed security strategy? Was it incompetence? Was it an inability to assess risk? Was it an inability to communicate? Was it an inability to craft an effective protective security plan? Was it a combination of all of these?

Or…was it a lack of imagination? The experience and millions of dollars’ worth of equipment available to the Secret Service appeared to be no match for understanding and effectively implementing these tools to counter a lone 20-year-old shooter. Was the Butler, PA attack a one-off or does this expose profound weaknesses of the protective arm of the Secret Service?

Matthew Crooks clearly defeated the Secret Service at its own game. How is this possible? Are the Secret Service advance procedures too canned, too predictable? Strategic planning organizations in the public and private sector, especially in high threat environments, employ Red Team teaming. At a basic level this means considering the adversary’s perspective and goals. Simulate an attack as an adversary would and fortify against it with your security planning. In other words, wear two hats—your good guy hat and the bad guy hat. This will be fairly obvious to seasoned military planners and strategists, However, since this strategy appears to be absent from the security planning at Butler, it deserves to be mentioned. In simple terms…advance planners need to ask themselves: if I were a shooter or bomber, where are the vulnerabilities in this plan? What weakness would I exploit? Then as a security planner I need to ask what am I doing to fix them? This needs to be an evolving, on-going process. These are basic strategic security planning questions. The Army does this on a continuing basis.

There is no evidence the Secret Service conducts any substantive Red Team exercises. The irony here is Crooks did it for them by exposing the security plan’s egregious weaknesses. This is a jolting and tragic wake-up call. Crooks’ budget was probably less than $500. The Secret Service Presidential Campaigns and National Special Security Events budget is reported to be ~$73.3 million from the Office and management and Data. Clearly the security failures are not due to a lack of money.

It is as though Crooks had the Candidate Nominee Operations advance manual and observed the security advance planning. Crooks visited the site, researched Trump’s schedule, surveyed the site and stage with a drone and probed and tested security.

Leadership should have given the security advance team the training and tools needed to at least be on par with Crooks. Clearly the planning should have expanded the security footprint well beyond the security perimeter defined by the fence. Assuming the outer perimeters were covered by local law enforcement without the requisite police meetings was negligent.

What if the attack had been planned by well-trained terrorists using multiple, simultaneous attack methods as witnessed in the series of coordinated Islamist terrorist attacks on Friday, 13 November 2015 in Paris, France?

Homeland Security published planning guidance to prevent Complex Coordinated Terrorist Attacks (2018). Other salient examples include Mumbai (2009), Brussels (2016) and Barcelona (2017).

Would the Secret Service be able to detect an attack plan like these let alone respond to them?

Since the 9/11 attacks billions of dollars of government resources have been invested in defense strategy revisions, police, military and emergency responder training, communications upgrades and field exercises to better equip all concerned to address evolving threats. The National Response Framework (2019) defines five core capacities to guide the training of the response community: prevent, protect mitigate, respond, recover. The purpose is to “better integrate government and local response efforts.” Simply stated, all security partners need to focus more on prevention and work as a cohesive team.

This guidance needs to be incorporated and operationally reinforced into all joint security efforts.

Goals Moving Forward

To learn the Secret Service systematically failed to protect one of the nation’s Presidential candidate nominees is extremely troubling. The implications are staggering. Given the assassination attempt of Trump at Butler, PA and the security vulnerabilities this has exposed, restoring the pre-eminence of the Secret Service is critical. The highest priority needs to be given to finding long-term solutions. This has national security implications.

Solutions moving forward are challenging since the security failures are a multi-factored problem. Among the most important—stronger leadership, better recruiting, balanced funding allocation, refining intelligence sharing, consistent training, accountability and continuing oversight. The implementation of key protective training initiatives and procedures require review. These include simulated attack exercises, 4th Shift Training field scenarios and practicing advance agent procedures and protocols. It appears many were omitted and/or not followed during the security planning of the July 13th rally.

Immediate recommendations should include committing to a thorough review and implementation of existing protective security policies and procedures. The budget allocations should be balanced more equally for investigations vis à vis protection. The current Secret Service allocations are approximately 70% for the investigative arm and 30% for the protection arm respectively.

Importantly, manpower supplementation for protective details from Homeland Security, should require protective training on par with the protective training metrics required of Secret Service agents. The required training hours for all protective agents should be increased as outlined in the GAO January 2022 Human Capital Strategic Plan.

The Secret Service needs to bring clarity to the remaining questions surrounding the assassination attempt more than three weeks later. Their protectees, the American public, and government legislators deserve it.

The world of team sports provides a compelling metaphor for how games are won. Team members are assigned positions based on ability and experience. They rehearse their plays incessantly until they get it right.

If the Secret Service team expects to win their zero-fail mission, they will need to rebuild a foundation of trust—first. Leadership deficits, disparate experience levels, inconsistent training, dated technology, and other security advance omissions are fixable. Restoring trust with the brothers and sisters in blue and with your prized asset—your protectee poses your biggest challenge. Winning is impossible without trust.

J. Lawrence Cunningham is a Senior Law Enforcement Fellow at the Gold Institute for International Strategy, a Washington, DC-based, foreign policy and national security think tank. Prior to joining the Gold Institute he served as special agent-in-charge in the U.S. Secret Service.

Retired Army General: ‘Somebody Failed to Appreciate the Militarily Significant Aspects of Terrain’

IMAGE: Layout of the Butler Farm Show fairgrounds, Butler, Pa., where a sniper fired several shots at President Donald J. Trump, and hit his right ear, during his July 13, 2024, rally there. The shooter was roughly 150 yards away from Trump, and to the left of the president and Secret Service counter-snipers. (RedState graphic by Neil W. McCabe from Google Earth image)

(This article first appeared in RedState.com: https://redstate.com/mccabe/2024/07/14/retired-army-general-somebody-failed-to-appreciate-the-militarily-significant-aspects-of-terrain-n2176868)

By: Neil W. McCabe, Media Fellow

The retired Army general officer who led Kurdish Peshmerga guerilla troops in Iraq and who now serves as a senior staffer for a Florida congressman told RedState, as a military man, the Secret Service must look at what went wrong before the July 13 assassination attempt on President Donald J. Trump.

“They’ve got to do an absolutely serious after-action review, not just for their sake, not just for the sake of any future presidents, but the sake of this country,” said Brig. Gen. Ernest C. Audino, who was commissioned as a second lieutenant upon his graduation from the U.S. Military Academy at West Point, N.Y.

“They got to figure out where the failures occurred, and it’s got to be an honest after-action or review—no thin skins—and if you fouled up, own up to it because there were failures along the way,” said the general, who is a senior military fellow at the Washington-based Gold Institute for International Strategies.

“My hypothesis is somebody failed to appreciate the militarily significant aspects of terrain,” he said.

Audino said it is his contingent assessment that mistakes made before the rally led to a potential catastrophe affecting the American political system and the world’s geopolitical stability.

Audino: The terrain tells you where threats can make you vulnerable

The general said that the Army has a process for making threat assessments that would have produced for the Secret Service personnel a limited set of locations where a hostile actor could attack the president.

He said the Army calls the battlespace analysis process OAKOC for obstacles, avenues of approach, key terrain, observation and fields of fire, and cover and concealment.

“Without any other information right now, my guess is there were likely failures during the planning and reconnaissance phase,” said the former director of nuclear support for the Defense Threat Reduction Agency.

“When they received the mission, they should have initiated the reconnaissance out to the area, and someone should have been going through this checklist,” he said.

He said the first item on the checklist is determining the no-go areas on the terrain. These are the places where no one would or could go.

Security personnel next need to figure out the avenues of approach or the go-terrain, he said.

Then, they must determine which pieces of terrain along the avenues of approach that offer advantage to the hostile actor—that’s your key terrain, he said.

Among the sites of key terrain on the Butler Farm Show fairgrounds were the rooftops, Audino added.

“We can say all of those high points in the area like those rooftops, and there weren’t many of them, so it’s not like they were overwhelmed by the sheer number of rooftops. There were only a few that were relevant to the area of operation,” he noted.

Once you have identified key terrain, such as the rooftops in Butler, the military mindset is to determine how the hostile actor could attack, he said.

Audino: Why weren’t the rooftops secured?

“Where could an enemy achieve observation and fields of fire that’s relevant to the mission of this event that’s coming up?” he asked.

Throughout the interview, Audino kept returning to the rooftops, and where a hostile actor could be concealed.

“Once you’ve identified the key terrains, avenues to the terrain, and places in the terrain where the hostile actor could observe his targets and conceal himself, the Soldier is left with a finite set of locations to be secured,” he said.

He said that then you have to find areas where a hostile actor or threat could find cover and concealment.

“Once you’ve identified those areas, then you’ve got to secure them some way,” he continued.

“Why was there no presence on that rooftop or near that rooftop? Why was there no effective fire over watching that rooftop?” he asked.

The general said he understood that security personnel were in position, but they did not stop the attack.

“Was it that they weren’t alert, or they had other sectors they were watching?” he asked.

“There are times when the hostile actor has the advantage because he has initiative, but terrain analysis helps you identify his most likely courses of action,” he said. “But you never have perfect knowledge.”

One factor in the Butler shooting is that law enforcement has a different culture and different processes, he explained.

“From my perspective, the law enforcement mindset is investigatory,” he said.

“It’s a different analysis at some level, first before anything else, the military is looking to destroy the enemy,” he said. “The military is looking across the military aspects of terrain, and they’re accounting for what they know, what they don’t know and what they think.”

“The military approach is to figure out the possible source of threats and how to neutralize the threats,” he said.


Audino: Risk assessment must consider the cost of failure

“In a military operation, the Soldier conducts his risk assessment along with calculating what risks are acceptable and what risks are not acceptable,” the general said.

“We could very well find out that this Secret Service detail wasn’t resourced by the Secret Service commensurate with the threat.”

“Certainly,” he continued, “the assassination of Trump was an unacceptable risk, which meant all the planning had to consider the cost of failure.”

“The threat is significantly higher on this presidential candidate as a former president than virtually any other presidential candidate in history.”

“It’s hard to say much risk here is acceptable because the risk of failure is so high,” the general warned.

“I saw somebody just made a comment publicly that we were one inch away from a civil war–I mean, maybe that’s a stretch, but maybe it’s not.”

Neil W. McCabe is a Washington-based journalist and media consultant. He is a senior NCO in the Army Reserve and Iraq War veteran. Follow him on Twitter: @neilwmccabe2 GETTR/TruthSocial: @ReporterMcCabe

THE GATHERING MIDEAST STORM:ENDURING HISTORY LESSONS

Part One:

Israel’s Relations with the United States

1956-1967……………………………………….……Page 3

Part Two:

Israel’s relations with the United States

1967–2007………………………………………………………….Page 9

Part Three:

The country’s nuclear quest and failed U.S. efforts to stop it.

1968–2023………………………………………… Page 19

Part Four:

Israel’s Timing Dilemma: Lessons Not Yet Learned……. Page 31

Part One:

Israel’s Relations with the United States, 1956-1967

This is the first of four articles covering the interlinked topics of Israel’s relations with the U.S., and the challenge posed by Iran’s nuclear program. Part One focuses on the Suez Crisis of 1956. Its outcome was to reshape the Mideast, and influence U.S. relations with key powers from then to the present, albeit in changing ways. Part Two will cover U.S-Israel relations from the 1967 Six Day War through the 2007 Israeli bombing of the Syrian nuclear reactor. Parts Three and Four will cover U.S. and Israeli relations with Iran, focusing on Iran’s nuclear program.

As Israel turns 75, it faces an acute existential crisis, in the form of an Iran bent on joining the nuclear weapon-state club. Compounding Israel’s peril is that its primary ally, the United States, sports an administration openly hostile to the Jewish state. Team Biden is obsessed with the desire to make a new accord with Iran akin to that made by former president Obama; it is equally obsessed with pressuring Israel to withdraw fully to its pre-1967 boundaries, which former foreign minister Abba Eban famously called “Auschwitz lines.” And with incredibly foolish perversity, it is intent on prioritizing its twin obsessions over the historic Trump-brokered Abraham Accords, which made for the first “warm” peace between Arab and Jew in the 14 centuries since Islam first appeared on the world scene.

To better grasp the dynamic of the U.S.-Israel relationship in this context, it is useful to examine six elevated use-of-force crises that confronted Israel: the 1956 Suez Crisis; the 1967 Six-Day War; the 1973 Yom Kippur War; the 1981 Israeli airstrike on Iraq’s nuclear reactor; the 1991 Gulf War; and the 2007 Israeli airstrike on Syria’s nuclear reactor. In each crisis, in different ways and at different levels of nuclear risk, the prospect of possible use of nuclear weapons played a role in crisis resolution, Iran’s nuclear quest and alliance relations. The prospective consequences of choices made by the players ranged from crisis resolved to calamitous conflict. Lessons that can be learned—albeit so far decidedly not learned by key players—may pave the way for ultimate adoption of a better strategy to prevent Iran from crossing the military nuclear threshold.

Suez 1956. The run-up to the pivotal events of late 1956 began with the 1952 overthrow of Egypt’s King Farouk by a group of Army officers in what became known as the Free Officers Coup. (A brief digression: Two leaders of that group later became president of the nascent Egyptian republic and world famous: Gamal Abdel Nasser, who dominated the Mideast from 1952 to his death in late 1970, mainly due to his triumph during the Suez Crisis; and Anwar el-Sadat, who altered the Mideast diplomatic landscape during his ascendancy, from 1972 until his assassination in 1981.

A landmark, extraordinary book by Hudson Institute scholar Michael Doran, Ike’s Gamble:America’s Rise to Dominance in the Middle East (2016), provides a detailed narrative of the key events, players and the geopolitics surrounding Suez. Doran’s narrative contradicts on many points the conventional wisdom of six decades on Suez, i.e., that it was an American triumph that stood for international law and against arch-colonial powers.

In 1954, Nasser began negotiating for transfer of control over the Suez Canal, the major international waterway linking the Mediterranean Sea with the Arabian Sea; the former gave access to the Atlantic Ocean, the latter, to the Indian Ocean. Opened by France in 1869, it fell under British control when Britain assumed imperial rule over Egypt in 1882. British rule began to unravel in 1945, after the end of World War II; postwar idealism gave birth to decolonization movements in countries that had been colonized in the immediately preceding centuries by the great European powers, thus unleashing what British prime minster Harold Macmillan (1957-62) called “winds of change.” A seminal event was the conference of 29 “non-aligned” Asian and African nations—ostensibly diplomatically neutral but mostly tilting toward the Soviet Union—held in April 1955 at Bandung, Indonesia. Nasser emerged from the conference as the leading Mideast figure.

The United States was a staunch proponent of postwar decolonization under three presidents: Franklin Roosevelt, Harry Truman and Dwight Eisenhower saw a geopolitical opportunity to win friends and influence people in the post-colonial era. In part they were motivated by principled opposition arising from America’s own break with colonial Britain. FDR also met with King Ibn Saud in 1945, seeking access to petroleum. Though Truman had been persuaded to recognize Israel upon its declaring independence in 1948, virtually the entire foreign policy establishment in both parties strongly opposed the decision, and saw America’s future interests in the Mideast aligned with the Arab nations. In 1954 Winston Churchill, midway through his final tenure as prime minister, warned Anthony Eden, who was to succeed him in 1955, about American power:

Up to July 1944, England had a considerable say in things; after that I was conscious that it was America who made the big decisions. She will make the big decisions now. . . . We do not yet realize her immeasurable power.

The Eisenhower administration ardently courted Nasser, believing that he could be coaxed into joining the Western alliance. The centerpiece of the Eisenhower plan for the Mideast was to create an alliance akin to NATO, based upon what they called the Northern Tier: thus they created the Baghdad Pact, centered upon French Syria and British Iraq. Ike’s minions even fantasized that Egypt would join the new alliance. To the contrary, it was anathema to Nasser’s pan-Arabist ambition to become the leader of the entire Arab Mideast.

Nasser dangled possible cooperation with the U.S. in constructing the Aswan High Dam, whilst getting to U.S. to press Britain for concessions over basing rights after conclusion of a Suez agreement. In 1955, Nasser made an a massive arms deal with Czechoslovakia, a member of the Warsaw Pact; the U.S. risibly assumed that because the Czechs had supplied Israel with arms in 1948 and Israel remained in the Western orbit, that Nasser’s Egypt would follow suit. Nasser also made a deal for construction of Aswan, ostensibly offered by the Soviets purely for commercial purposes. The U.S. had attached alliance and security goals to its proposal. Nasser persuaded the Americans that he was in a contest between hard-liners and moderates, with himself supporting the moderate faction. This ruse worked perfectly (as it was to do decades later when Americans sought “moderates” inside the Islamic Republic of Iran to curb the regime’s revolutionary goals.)

When concessions over British basing in the area did not materialize, on June 13, 1956, under pressure from Nasser, British troops ignominiously departed the Canal Zone, thus freeing Nasser to make his move. In August 1956 Nasser nationalized the Canal, triggering the three-month Suez Crisis.

Eisenhower was mesmerized by the Tripartite Declaration of 1950, under which the U.S., U.K. and France guaranteed to come to the aid of nations who they saw as victims of aggression. Saith Ike; “We must honor our pledge . . . we cannot be bound by our traditional alliances.” Ike saw the UN coming front and center to enforce world peace. Thus, he withheld economic aid to our allies, while Nasser sank ships in the Canal, and Syria cut a British oil pipeline. On October 30, Ike said that his allies would “boil in their own oil.” This decision predated the1957 Eisenhower Doctrine, under which the U.S. would defend its Mideast allies from (outside) Soviet and (local) Arab aggression.

Israel saw the Nasser arms deal as prelude to an eventual invasion of an Israel, then confined by the 1949 Armistice agreements, which confined Israel to the “Green” ceasefire lines reached after the 1947-48 War of Independence—during which Israel gained land beyond the 1947 Partition Resolution limits, but lost access to its most sacred sites in Jerusalem.

With a tiny population compared to Egypt, Israel decided to wage preventive war, before a strike became imminent. But Israel needed help, and it was clear that the U.S. would not provide it. So Israel approached Britain and France; the colonial powers hoped that toppling Nasser would possibly check the wave of anti-colonial sentiment. Nasser intensified his use of the Mideast’s most formidable radio broadcast network, built by the U.S. and aided by the CIA. He proved a charismatic propagandist. In this he benefitted from America’s ardently Arabist secretary of state, John Foster Dulles, who, driven by an obsession with Palestine, incredibly, saw in Nasser the leader who could peacefully resolve the Arab-Israeli conflict.

Israel launched its invasion of the Sinai Peninsula on October 28, but the British and French did not carry out their military operations until November 4. By then, all hell had broken loose. Caught by surprise, Ike was furious. Compounding the furor was the November 4 uprising in Hungary, and Ike’s landslide re-election on November 5. The Soviet Union warned that if the war reached Cairo, it might also reach London and Paris; premier Nikolai Bulganin threatened all three countries with a nuclear strike. Ike refused to warn the Soviets not to do so. Britain and France withdrew their troops, and Israel surrendered its military gains after three months of negotiations, in return for a U.S. guarantee that its access to the Red Sea would not be blocked by Egypt. The upshot was that British prime minister Anthony Eden resigned, and Nasser was emboldened. Ike, for his part, saw through the nuclear saber-rattling; Ike’s worry—his military acumen being far better than his geopolitical judgment in Mideast matters—was that if the Canal were seized, Egypt would launch a Soviet-backed guerrilla war.

Eisenhower realized his mistake when on February 14, 1958, while America celebrated Valentine’s Day, Nasser announced the formation with Syria of the United Arab Republic, an arranged territorial marriage that was to last only three years. The colonial regimes in Damascus and Baghdad were violently overthrown by Arab radicals exactly five months later, to be replaced by pro-Soviet rulers. Meanwhile, King Saud withdrew his kingdom from its alliance with the U.S., in favor of neutrality. Thus, unlike Egypt, the Saudis emphatically did not tilt towards the Soviets. In response to the July 14 revolutions, Ike sent Marines to save Lebanon. But overall, the final result of Suez was an historic debacle for the U.S., Britain and France.

Years later—channeling Macbeth’s “If it were done, then ’tis done, then ‘twere well it were done quickly!”—during his retirement Ike said of the 1956 preventive war that “had they done it quickly, we would have accepted it.”

Bottom Line. Doran draws five lessons from Suez, of which two are paramount: (1) the U.S. should support its allies, and not propitiate its enemies; (2) the Palestine-Israeli conflict is not the “central strategic challenge” in the region, but rather a localized conflict. His three others are also worth noting: inter-Arab politics are critical; keep a “tragic” view of the Mideast; and without a clear view of the region, lots of trouble lies ahead.

The tragedy of Suez is that Eisenhower’s advisers, virtually to a man, were ardently pro-Arab, and thus convinced him that for both Egypt and the U.S., Suez was an anti-colonial war. In reality, it was a play by Nasser for pan-Arab geostrategic dominance. Had Nasser been overthrown, a charismatic successor of his caliber was highly unlikely to emerge. In such event, the lethal poison of pan-Arab radicalism might have proven far less influential in the region during the decades that followed.

Part Two:

Israel’s relations with the United States, 1967–2007

The Six-Day War, 1967

If the Suez Crisis was an exemplar of preventive war, the Six-Day War was a classic case of pre-emptive war. in the month run-up to the June 5 beginning of the conflict, Nasser issued a series of bloodcurdling threats calling upon his Arab allies to join him in a war of extermination against the Jewish state. He ordered UN peacekeeping forces, stationed in Sinai since 1956, to first pull back and then, to depart the Sinai. The secretary-general, U Thant of Burma, the first developing-country representative to hold that position, complied.

Israeli prime minister Levi Eshkol had formed a solid friendship with president Lyndon Johnson — both were farmers, and LBJ, a Christadelphian (Brothers in Christ) worshipper, harbored a special feeling for Jerusalem. After Egypt imposed a blockade on the Straits of Tiran on May 22, Eshkol went to his friend asking for American assistance, based upon America’s 1957 post-Suez guarantee from freedom of Israel navigation through the Straits, and the expulsion of UN expeditionary forces in the Sinai.

But while the two heads of state were close, that was hardly the case at the Pentagon or at Foggy Bottom. Mired ever more deeply in the Vietnam War, Defense had no appetite for getting involved in another major conflict. As for State, though less pro-Arab than during Israel’s early years, its Mideast desk still leaned strongly towards the Arabs. The State Department denied that it had guaranteed Israeli safe passage through the Straits after Suez. In Ike’s Gamble (1956), discussed in Part One, Michael Doran notes that it took a press conference called by former president Eisenhower, who reaffirmed that such a commitment had been made, to make State concede. LBJ asked for a fortnight to see if through diplomacy the Straits could be re-opened. Eshkol replied that he would delay as long as possible, but he could not guarantee that Israel could safely hold off a full fortnight.

When Israeli aircraft were returning from their surprise strike at Egypt’s air force, having destroyed some 90 percent of the force, Eshkol notified LBJ. Though LBJ did not agree that Israel had to act, he understood that Eshkol felt differently. Another factor that may have influenced LBJ to stand down: the CIA estimated that in event of war, Israel would win easily in a couple days. After two days, Egypt, and its allies, Syria and Iraq, were defeated, save for mop-up operations, with Israeli ground forces marching towards the Suez Canal. But then Jordan’s normally circumspect King Hussein, galvanized by false reports from Radio Cairo recounting a massive Egyptian victory — including destroying the Israeli Air Force — decided to jump in. The upshot was that Israel defeated the Jordanians, seized much of the area west of the Jordan River, and liberated Jerusalem, re-uniting the western and eastern halves after 19 years of separation. Hostilities ended June 11. Israel, in addition to reclaiming Jerusalem, had taken two-thirds of the Golan Heights in the north, eliminating Syria’s ability to shell northern Israel at will. (READ MORE: Six Days, and Forty Years)

Because the war ended with an Israeli triumph, there was no need for Israel to use the atomic bomb. Sources conflict to how many Israel had in 1967. A 2017 New York Times article based on an interview with a former Israeli official, asserts that Israel had only one A-bomb, to be used by exploding it in the Sinai as a warning to Arab adversaries to back off. But a 2013 compilation of global arsenals by the Bulletin of the Atomic Scientists (BAS) shows Israel with two in 1967, 15 in 1973, 33 in 1991, and 80 for 2004-13. A Federation of Atomic Scientists (FAS) 2007 compilation shows two for 1967 and 13 for 1973, with 20-kiloton yields. As of 2007, FAS offers a range of 70 to 400 for Israel, but adds that the most likely figure is close to the low end of the range. If the 1967 number of two is correct, and given a yield of 20 kilotons, roughly comparable to the Nagasaki bomb, their use could have been, in event of imminent total defeat, for the “Samson Option”: taking out Cairo and Damascus as Israel fell to Arab forces. The most recent estimate for Israel’s nuclear arsenal is 90 warheads.

At its founding, prime minister David Ben-Gurion decided to pursue nuclear weapons to prevent a possible second Holocaust. He secured technology from the French, and they built a nuclear reactor at Dimona, which can produce civilian-grade 3.5 percent enriched uranium, and enable extraction of plutonium by reprocessing spent fuel. In April 1963, when Israeli foreign minister Shimon Peres met with JFK in the Oval Office, in response to JFK’s interrogation as to nuclear weapons, Peres improvised on the spot what remains Israel’s stated policy today: Israel will not be the first country to introduce nuclear weapons into the Middle East. Defined narrowly, it means that Israel can produce weapons-grade fuel, but will not mate warheads to any bomb chassis, so long as the Middle East remains nuclear-free.

The Yom Kippur War, 1973

In The Two O’ Clock War: The 1973 Yom Kippur Conflict and the Airlift That Saved Israel (2002), authors Walter J. Boyne and Fred Smith show in harrowing detail how close to destruction Israel found itself, before rallying with U.S. aid to save the day. Egypt and Syria turned the tables, striking the first blow and achieving strategic surprise by attacking on Yom Kippur — coincidentally also the first date of the month of Ramadan — which fell on October 6 that year. As the Arabs were marshaling forces, Israeli prime minister Golda Meir went to the U.S. for prewar aid, only to be told that if she wanted to receive U.S. assistance, Israel must not strike first. Reluctantly she complied. Israel did not order mobilization in advance, difficult in a society far less populous than many Arab countries. Thus, unlike Egypt, Israel is unable to maintain a full-time standing army. (READ MORE: The Yom Kippur War and the Righteous Richard Nixon)

Israel intelligence, usually first-rate, proved catastrophically wrong in 1973, in grossly underestimating the military prowess of its adversaries. Had the war been fought without Israel having the buffer of territory acquired in 1967, the Jewish state would have ceased to exist. Not only did the Arabs fight effectively; they also had amassed from their Russian suppliers thousands of modern “Sagger” wire-guided anti-tank missiles, and thousands of surface-to-air missiles, some portable, all deadly. Over the first fortnight of the three-week conflict, the Israeli airfare and armor suffered heavy losses.

Worse, enmeshed in a protracted, desperate fight for survival, Israeli forces consumed munitions at a far higher rate than anticipated, and began asking the U.S. for resupply after one week. The second week saw the first shipments, but it was not until the third week that the full weight of massive U.S. aid enabled Israel to decisively turn the tide. Even that was made possible by the narrowest of margins: all European countries save Portugal were dependent upon Arab oil, and early in the conflict Saudi Arabia imposed an oil embargo on Europe. As Portugal imported its petroleum needs from its colony, Angola, it was willing to offer its NATO base in the Azore Islands for American shipments. Without this base America’s military transports would have needed to fly 6,000 miles direct, which would have drastically reduced the per-trip cargo load that its nonpareil jet transports, the C-5A Galaxy and C-141 Starlifter, could carry. The shortfall would have to have been made up by many more flights, and thus the time to fully resupply Israel with vital supplies would have been longer. Likely the intense and growing outside pressure to end the military phase and employ diplomacy would have precluded full recovery by Israel of ground lost since Oct. 6.

As noted above, in 1973 Israel had an estimated 13 Nagasaki-yield atomic bombs that it was prepared to use to avoid total defeat. Though no public threat was made it is believed that Israel made it known to its Arab adversaries that it would do so if need be; this may explain why Syrian forces halted after retaking the Golan (which Israel would reconquer before hostilities ended). It is unclear if Egyptian president Sadat intended to retake the entire Sinai, and then invade Israel proper.

The specter of nuclear conflict was also raised in the closing days of the war. Admiral Elmo Zumwalt, who was chief of naval operations at the time, recalled in his memoir, On Watch (1976), that the Sixth Fleet was in a more tense situation vis-a-vis the Soviets than at any time since World War II. In his book Crisis: The Anatomy of Two Major Foreign Policy Crises (2003), Henry Kissinger, who served as national security advisor and secretary of state during the Nixon years, recounts that after the 1973 war, president Nixon told him that the superpowers had been “close to a nuclear confrontation.”

Israel Bombs Osirak, 1981

Israeli prime minister Menachem Begin confronted a different problem in his dealings with the Americans. President Reagan was personally sympathetic to Israel. But the Middle East was peripheral to his overall foreign policy goal: to win the Cold War. Towards that end he selected his national security team with an eye to their views on the Soviet Union and the Cold War. Only one member of his cabinet, UN Ambassador Jeane Kirkpatrick, was passionately committed to siding with Israel in the Middle East. Yet she was selected by Reagan because of an article she published in 1979, stating that human rights abuses were far more pervasive in totalitarian countries, than in mere authoritarian regimes.

Begin sought U.S. approval for a planned raid on Iraqi dictator Saddam Hussein’s “Osirak” nuclear reactor at Tammuz (named for the Babylonian counterpart to the Egyptian god Osiris), which France had built to secure access to Iraqi petroleum. Astonishingly, author Roger W. Claire recounts in Raid on the Sun (2004) on Sept. 8, 1975, two days before Saddam flew to France to sign the agreement, one calling for construction of a nuclear research reactor, he let the cat out of the proverbial bag at a press conference:

The search for a reactor with military potential was a reaction to Israel’s nuclear armament, and the [Franco-Iraqi] agreement was the first actual step in the production of an Arab atomic weapon, despite the fact that the declared purpose for the establishment of the reactor is not for the production of atomic weapons. (Emphasis in original.)

If that were not enough, in 1978 the French developed a new reactor fuel, “Caramel” (so-named for its color), which they planned to test in the Osirak reactor. Instead of loading 93 percent enriched uranium, they would have been using fuel enriched to seven or eight percent, yet capable of carrying out nuclear research. The Iraqis adamantly rejected the idea.

To Begin’s dismay, the administration insisted that diplomacy, which never had stopped a nuclear proliferator, should be used instead of military force. Under what has been called the Begin Doctrine, Israel will not allow any Middle Eastern enemy to cross the nuclear threshold, in order to ensure that no one can perpetrate a Second Holocaust. In Iraq’s case, this would, in Israel’s view, come when an adversary has enough enriched uranium (or reprocessed plutonium) to build a bomb. Once a reactor “goes critical” – begins operation — any strike would release highly radioactive material, which atmospheric winds can carry for hundreds of miles.

In his book, First Strike: The Exclusive Story of How Israel Foiled Iraq’s Attempt to Get the Bomb (1987), author Shalom Nakdimon presents a “what if” alternate scenario, set in 1985: A Boeing 727 commercial jetliner is spotted approaching Tel Aviv from the Mediterranean Sea. It disregards repeated warnings from Israeli jets to change course. A call to Israeli prime minister Begin gets a temporizing response, as Begin recalls Israel’s 1972 shooting down of a Libyan airliner. (The plane, carrying 108 passengers, had accidentally flown over an Israeli military base.) One jet fires an air-to-air missile as an object falls from the plane’s belly. The plane escapes, just as the unknown object explodes over Tel Aviv. It is an Iraqi atom bomb.

On June 7, 1981 the Israeli Air Force carried out a successful strike that destroyed the reactor before it went critical, which at that time was expected within weeks. Further angering the U.S. was that in late June Israel was holding elections, and that its timing would likely help Begin win. Exactly how close Iraq was then could not be pinpointed precisely.

The U.S. reaction was instantaneous and furious. Then-defense secretary Caspar Weinberger wanted an end to U.S. aid and for Israeli leaders to be prosecuted for violating international law. Other senior members of the administration settled on strong condemnation and a delay in sending requested military assets. Ambassador Kirkpatrick was tasked with drafting the UN Security Council resolution condemning the raid; she did her best to limit the harshness of UN Sec. Resolution 487 which was adopted on June 19, 1981.

The Gulf War, 1991

President George H.W. Bush forced Israel to the sidelines, lest the coalition lose Arab countries, whose participation removed any taint of Western imperialism. Israel, which had resolved never to subcontract its security to any country, found itself absorbing “Scud” short-range ballistic missile (SRBM) strikes launched by Iraq; nor was Israel allowed to help hunt for Scud launchers inside Iraq. (SRBM denotes ballistic missiles with a range less than 1,000 km./625 mi.)

During the war, American aircraft destroyed the nuclear facilities Saddam had begun constructing after the loss of Osirak. After the war, then-defense secretary Dick Cheney thanked Gen. David Ivry, who had been ground commander for the 1981 IDF airstrike that took out Osirak. He sent Ivry a post-attack photo of the Osirak reactor, inscribed, “With thanks and appreciation for the outstanding job you did on the Iraqi nuclear program in 1981, which made our job much easier in Desert Storm.” Indeed, there might never have been a Desert Storm in 1991; but for the 1981 airstrike, Saddam likely would have gone nuclear before the Gulf War, and thus also avoided later being toppled in 2003.

Syria, 2007

The story of the 2007 raid is told in Yaakov Katz’s Shadow Strike: Inside Israel’s Secret Mission to Eliminate Syrian Nuclear Power (2019). Israel confronted a situation roughly similar to what it faced in 1981: a rogue nation on the verge of starting operation of a nuclear reactor. The facility was a clone of the reactor built by North Korea at Yongbyon, which in 1994 had become the subject of an “Agreed Framework” under which the North Koreans would enrich uranium for civilian purposes only. But in 2006 it openly violated the accord by testing an atomic bomb. The Israelis were certain that the reactor, outside al-Kibar, a small town far from major urban centers, situated by the Euphrates River, was not part of any civilian electric grid.

In April 2007, prime minister Ehud Olmert sent Mossad chief Meir Dagan to brief the Bush 43 administration. In the wake of the Iraqi WMD fiasco, Bush wanted to be absolutely sure that the reactor was in fact intended for military purposes. Intelligence analysts told the administration senior leaders that the facility very likely was so intended. Bush’s senior advisers were split on whether to take action; Olmert met with Bush and asked him to use American planes to destroy the facility. He also told Bush that if 35 Syrian planes took off for Israel, with two of them carrying nuclear bombs, given direct southward flight time to Israel of one minute, the Israeli Air force would not be able to destroy all the planes. One or both jets with nuclear bombs could well penetrate Israel’s defenses to drop them.

Ensnared in the Iraqi insurgency, Bush demurred. But without specifically giving Olmert a green light, he told Olmert that the U.S. would not attempt to block Israel from striking. Olmert sent in planes to destroy the reactor on Sept. 6, having sent in a clandestine advance party to collect updated soil samples and take new site photographs. The U.S. and Israel maintained strict silence afterward, as did the Syrians — the latter likely to avoid embarrassment at having failed to prevent destruction of the reactor. The only country to react negatively was Turkey, as one of the returning aircraft had dropped an empty fuel tank that drifted across the Turkish border with Syria. Turkey’s president Recep Tayyip Erdogan demanded, and received a public apology from Israel; but Israel told the world that a mishap had occurred during a training flight when one fuel tank landed astray.

The Bottom Line

In the six use-of-force crises spanning five decades that Israel faced, it never received full cooperation from Washington. The degree to which their perceived geostrategic interests were mutual varied considerably. Israel’s leaders concluded that it could mitigate adverse American reaction by avoiding completely surprising the Americans as it did in 1956. American leaders generally found greater stakes elsewhere, and relegated Israel’s concerns to second-tier status. As a result, Israel nearly perished in 1973, and nearly faced a nuclear-armed, hostile Iraq ruled by a Stalinist tyrant.

Part Three:

The country’s nuclear quest and failed U.S. efforts to stop it, 1968–2023

Iran’s Nuclear Quest

Iran’s quest to join the nuclear club can be divided into three phases: (1) its civilian nuclear program (1968–1988); (2) its military nuclear program (1988–2014); and (3) the Joint Comprehensive Plan of Action, or JCPOA (2015–2023).

On July 1, 1968, the text of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) was put out for signature. First-day signatories included the U.S. and Iran, the latter then under the rule of Shah Mohammed Reza Pahlavi. The NPT formally went into effect on March 5, 1970. There are 191 states that are party to the NPT, with five states — U.S., Russia, U.K., France, and China — labeled “nuclear weapon” due to their having manufactured and exploded a nuclear weapon or device prior to Jan. 1, 1967. The NPT incorporated, in broad brushstrokes, U.S. President Dwight D. Eisenhower’s idealistic “Atoms for Peace” proposal, presented to the United Nations General Assembly on Dec. 8, 1953.

Mohammed Reza commenced a civilian nuclear program in 1975, planning to only go military if rival nations did so; in 1975, he told the New York Times:

I am not really thinking of nuclear arms, [b]ut if 20 or 30 ridiculous little countries are going to develop nuclear weapons, then I may have to revise my policies. Even Libya is talking about trying to manufacture atomic weapons.

So long as the shah remained in power, America faced no nuclear risk. However, American policymakers abandoned the shah in 1978 as the Islamic Revolution picked up steam. Carter administration policymakers were unwilling to prop up a leader whom they believed had been installed by a CIA-backed coup in 1953. As Iran scholar Ray Takeyh, in a just-published op-ed, explains, the CIA’s role was marginal at best. In 1951, Mohammed Mossadegh, who had been appointed prime minister by the shah, wanted to nationalize British Petroleum’s extensive petroleum assets without offering compensation. Mossadegh asked President Harry Truman to broker a compromise; serial efforts by Truman and Eisenhower seeking some compensation for BP were adamantly rejected by Mossadegh. The Brits imposed an oil embargo, economically ruinous for an Iran heavily dependent on oil revenues. Mossadegh soon faced opposition across a broad spectrum of society — the military, students, merchants, and, significantly, the clergy. Eisenhower sent CIA officer Kermit Roosevelt to organize a coup, but, in fact, the military had already done the heavy lifting.

Mossadegh sought to exercise total power as if he, and not Mohammed Reza, were the supreme ruler. A vacillating shah, who had been driven into exile, was brought back and his spine stiffened by the military — not the CIA. The shah exercised his constitutional power to fire Mossadegh. These decisive actions caught the CIA flatfooted.

Upon the shah’s overthrow in February 1979, the nuclear program was suspended. Ayatollah Ruhollah Khomeini was preoccupied with seizing total power, which entailed first replacing the provisional government, a task begun in earnest on Nov. 4, 1979, by taking American diplomats hostage. The seizure rallied Iranian students to support the creation of an Islamic regime. Formally named the Islamic Republic of Iran, it was, in fact, a totalitarian clerical fascist regime. Its position was further solidified by America’s April 1980 abysmal failed hostage rescue attempt.

On Sept. 22, 1980, Iraq invaded Iran. In 1985, Saddam Hussein began firing at Iran ballistic missiles armed with chemical warheads. In Revolution & Aftermath: Forging a New Strategy toward Iran, co-authors Eric Edelman and Ray Takeyh note that upon the Aug. 20, 1988, negotiated end to the war, Khomeini decided to resurrect the shah’s nuclear program, this time with nuclear weapons in mind. The regime’s military nuclear program survived Khomeini’s 1989 passing. In 1992, Israel’s then–prime minister, Yitzhak Rabin, became the first Israeli leader to publicly describe Iran’s nuclear program — then known to be a civilian program — as an “existential” threat. The Clinton administration refused to call a civilian nuclear program a threat; in this, it followed prior U.S. administrations. Israel, needless to say, stood its ground.

Per Edelman and Takeyh, throughout the 1990s, Iran simultaneously pursued domestic reform (economic reform, anti-corruption efforts — the latter exempting regime power players from investigation). Left unchallenged were Iran’s clandestine pursuit of nuclear military capability, its use of transnational terror against regime opponents, and its worldwide promotion of revolutionary Islamist ideology. In August 2002, the National Council of Resistance on Iran, the political wing of the alleged terrorist group Mujahideen e-Khalq (MeK), publicly outed Iran’s nuclear quest.

The U.S., preoccupied with the Sunni insurgency in Iraq, did nothing. In 2006, the CIA detected the construction of new underground nuclear facilities, yet, in 2007, it issued a National Intelligence Estimate (NIE) asserting that Iran stopped its nuclear program in 2003. The Bush administration again did nothing. The finding by the CIA was risible: Israel had taken out clandestine nuclear reactors shielded from inspection. But a true civilian program can be verified by regular monitoring operations of the reactor; Israel could be assured that a strike was not necessary unless a sudden transition brought another Saddam or Assad to power. For such an event, Israel could rely on contingency plans. For a civilian program, Iran would have no need to bury the facility underground — and deny access to it.

A golden opportunity for the U.S. and its Western allies came in early 2009, when a manifestly rigged “election” — restricted to candidates approved by the regime — reelected Mahmoud Ahmadinejad president. Protesters took to the streets in huge numbers. American Enterprise Institute scholar Michael Rubin notes that the regime’s “elections” have always been fraudulent, as the regime “eliminate[s] more than 90 percent of the candidates.”

The Green Movement caught the regime off guard. Edelman and Takeyh show just how far off-guard it was by quoting a 2013 statement by Ali Khamenei, successor as Supreme Guide to Khomeini, admitting that the regime had been “on the edge of a cliff.” Gen. Muhammad Ali Jafari, who commanded Iran’s Revolutionary Guard Corps from 2007 to 2013, said that the 2009 election that spawned the Green Movement ushered in “greater danger” for the Islamic Republic than that during the Iraq–Iran War: “We went to the brink of overthrow in this sedition.”

But Khomeini had a friend in Washington, D.C., the recently sworn-in president, Barack Hussein Obama. Obama sided with the regime and deflated the 2009 protest movement. Edelman and Takeyh point out that protests resurfaced in 2018 across a broader spectrum than did the 2009 protests.

In September 2022, a renewed mass protest movement began over the regime forcing women to wear Islamic dress; it spread nationwide but currently appears in remission. This time, unlike earlier, the students, fed up with life under clerical fascism, joined the protests. Many mosques were empty as worshippers joined the street uprising. For the first time, all elements of Iranian society opposed the regime.

Failed Efforts to Stop Iran

Every American administration sought to identify genuine moderates but only succeeded in finding the pseudo-variety. The apogee of such efforts, prior to the ascension of Obama, had come during President Ronald Reagan’s second term. The 1986–87 Iran hostage negotiations ended — Reagan’s contrary intentions notwithstanding — as an arms-for-hostages swap. The upshot was that America delivered Hawk surface-to-air missiles, which Iran used against Iraq; Iran showed its gratitude by taking more Americans hostage. As was memorably put by several Washington wits, “A moderate Iranian is one who has run out of ammunition.”

A final effort came from Israel when, serially in 2010, 2011, and 2012, Prime Minister Benjamin Netanyahu tried to persuade his cabinet to authorize an airstrike on Iran’s nuclear facilities. But only former Prime Minister Ehud Barak — who had defeated Bibi in the 1999 election — would go along.

Life Under the JCPOA: From the Cliff to the Cusp

Obama managed to get Congress by a simple majority to endorse JCPOA as an executive agreement, bypassing the Constitution’s two-thirds supermajority treaty-ratification requirement. In May 2018, President Donald Trump pulled out of the JCPOA, calling it “one of the most incompetently drawn deals I’ve ever seen.” That year, the U.N.’s International Atomic Energy Agency (IAEA) had identified Iran’s unexplained activities.

Trump imposed strict economic sanctions, but our European allies continued to ignore them so as to gain access to Iranian oil. They also are largely ignoring Iran’s growing ballistic missile threat to Europe.

On Jan. 20, 2021, President Joe Biden began occupying the Oval Office. He promptly sought to revive the JCPOA and began negotiations with Iran to get it to reenter an accord that the regime never intended to honor in the first place. In mid-2023, Iran stands on the cusp of nuclear-club membership, having enriched uranium to 60 percent — with some fragments even enriched to 83.7 percent. Estimates earlier this year were that Iran has enough highly enriched uranium (HEU) to make several A-bombs, according to sources of the U.N. (several, no time specified), the U.S. (one in 12 days), and Israel (5 bombs), in a matter of weeks. A more recent and detailed estimate was issued by the Institute for Science and International Security. It concluded that Iran, using its stocks of 60 percent, 20 percent, and 5 percent low-enriched uranium (LEU), could make enough weapons-grade uranium (WGU) to fuel one A-bomb in 12 days, four more within the first month, two more in a second month, and one more in a third month — in all, a total of eight. Intelligence estimates add several months for Iran to fabricate WGU into nuclear warheads. Iran’s near-total lack of cooperation with the IAEA makes definitive verification of these timetables impossible.

But Iran has yet to mate a nuclear warhead to a missile, by far the most feasible delivery system, and how close it is is not clear to analysts. According to Iran Watch, which posts a database of Iran’s extant ballistic missiles, Iran has fielded four missiles with a range of at least 1,600 kilometers. Matching this missile-range table to distances from Iran to Israel shows that Iran’s IRBM arsenal can cover all of Israel. But Iran’s IRBM warhead is much smaller than that of an ICBM (intercontinental ballistic missile) and hence requires more warhead miniaturization.

Nuclear Proliferation: Successes and Failures

Success in stemming the tide of nuclear proliferation has always involved a measure of voluntary conduct. South Africa scrapped its small arsenal (six A-bombs) in 1989, signed the NPT in 1991, and was certified by the IAEA to have completed dismantling its program in 1994. Its decision can be considered semi-voluntary, as sanctions against South Africa were imposed before any knowledge of its atomic program. The benefit derived by South Africa was an end to its pariah-nation status — due primarily to its ending apartheid and the accession of Nelson Mandela as prime minister.

As indicated in Part Two, Iraq’s second nuclear quest was stopped by American airstrikes during the 1991 Gulf War. The year 1994 saw the final withdrawal of Russia from Eastern Europe and the consolidation of all nuclear weapons in the former Soviet Union. Kazakhstan and Belarus sent their nuclear arsenals to the Russian Federation, and Ukraine did so in exchange for the Budapest Memorandum, under which the U.S., Russia, and Great Britain guaranteed Ukraine’s territorial integrity. A final success came in 2004 with the voluntary ending of Libya’s program. Col. Muammar Qaddafi saw the U.S. dismantle Saddam’s regime in 2003 and feared Libya would be next on the list.

Failures fall into several categories. Among U.S. allies, three countries decided to deploy nuclear arsenals: Britain in 1952, France in 1960, and Israel in 1967. The U.S. withheld promised technology sharing, but Britain had learned enough from British scientists working with the Manhattan Project. France developed its own indigenous nuclear program. Israel, pressed hard in 1963 by U.S. President John F. Kennedy to abandon its program, forged ahead nonetheless.

Among U.S. adversaries, the former Soviet Union stole the blueprints for the “implosion” bomb from the Manhattan Project and tested its first bomb in 1949. China initially received help from the Soviets, but after they halted assistance in 1959, China continued its program, detonating its first atomic bomb in 1964 and its first hydrogen bomb in 1967. The soviets considered using nuclear weapons against China’s then-sparse nuclear facilities during the border clashes along the Ussuri River in March 1969. They approached the U.S. through back channels to find out how the Nixon administration felt about it and were told we’d disapprove. The Soviets did not wish to scupper their U.S. détente quest and scrapped attack plans.

Officially neutral but tilting toward the Soviet Union, India conducted its “peaceful” atomic “Smiling Buddha” test in 1974. Pakistan, a sometimes ally of the U.S. that played a double game, began its nuclear Islamic Bomb program after mortal enemy India’s test. U.S. intelligence judged by the late 1980s that Pakistan had joined the nuclear club, but it was not until Pakistan conducted a series of atomic tests in 1998 that its status was confirmed. (Both India and Pakistan, like Israel, declined to join the NPT.) Rogue North Korea signed the “Agreed Framework” accord with the U.S. in 1994, then clandestinely pursued its nuclear quest. In 2002, it withdrew from the NPT, but the U.S. did not consider North Korea to have joined the charmed circle until it actually tested a bomb in 2006.

Political Taxonomy: Identifying True Moderates

As if determined to learn nothing from prior bad misjudgments, seven U.S. administrations abjectly failed to find genuine moderates. As noted earlier, each U.S. president doubled down, looking for moderates within clerical fascist Iran’s governing structure; each failed to grasp that “reformers” left the regime’s revolutionary aspirations untouched, used transnational terror to target enemies of the regime, and engaged in clandestine pursuit of nuclear weapons.

No Iranian moderates were even permitted to run for office or be appointed to high office. Any true moderates would have been purged by the regime.

Evidence-Based Assessments: Avoiding Einstein’s Trap

Albert Einstein famously quipped that insanity is doing the same thing over and over again, expecting a different result. Five interwar examples stand out.

In 1935, Hitler and Mussolini began a series of aggressive moves: Mussolini’s troops invaded Ethiopia; Hitler’s troops moved into the Rhineland in 1936; the Luftwaffe tested warplanes over Guernica, Spain, in 1937; the Anschluss (“connection”) saw the Germans occupy Austria in 1938; and, finally, the Germans got the Allies later that year to surrender the Sudeten province of Czechoslovakia by March 15, 1939.

This final European surrender was the bitter fruit of British Prime Minister Neville Chamberlain’s September 1938 Munich parley with Hitler, after which he declared upon returning home that he had achieved “peace in our time.” His illusions became a cropper on Sept. 1, 1939, when Nazi Germany invaded Poland.

Then there are three historic monumental failures by U.S. intelligence, as first documented (familial pride #1!) by Roberta Wohlstetter in her 1962 Bancroft Prize–winning Pearl Harbor: Warning and Decision. In the 11 days prior to the Sunday, Dec. 7, 1941, attack by the Japanese on Pearl Harbor, Japan’s fleet sailed north of commercial shipping lanes and turned south toward its airstrike launch point. On Saturday night, the Japanese broke off diplomatic negotiations. On Sunday, they planned to deliver a note in Washington at 1 p.m. EST, breaking off diplomatic relations, with no mention of a sneak attack. At that point, the lead Japanese planes would be in the air one hour, halfway to Pearl Harbor. Due to communications problems, the note was not delivered until 2:05 p.m. — 10 minutes after the first planes began their attack at 7:55 a.m. local time. Roberta’s path-breaking book was the first to identify the root causes of the massive intelligence failure: A combination of convenient assumptions and departmental “stovepiping” created background noise that obscured signals that Japan would attack. This was true even though U.S. cryptanalysts had cracked the Japanese secret diplomatic code and intercepted the coded message “east wind, rain” that indicated a surprise attack on Pearl Harbor was imminent.

The second failure was the CIA’s consistent underestimating of Soviet incremental ICBM deployments for 11 years (1962–72) as documented (familial pride #2!) by Albert Wohlstetter in his seminal 1976 article “Racing Forward? Or Ambling Back?” in the book Defending America. Traumatized by an initial, late-1950s overestimation of the rate at which the Soviets could deploy ICBMs, the agency overcorrected for an entire decade, consistently underestimating ICBM deployment as well as MRBM and IRBM deployments — strictly speaking, launchers were counted as actual missile arsenals could not be verified. By 1963, our overestimation of Soviet ICBM launchers was roughly offset by our underestimation of MRBM and IRBM launchers. (The latter two missile types were the ones placed in Cuba in 1962.)

Of 51 CIA-specific estimates of Soviet ICBM deployment in this period — which included multiple estimates within each year — the high number topped actual deployment only twice. The lows never exceeded actual deployments, and the highs were reached only nine times. Errors of underestimation were “substantial,” and the average of the “highs” was under the actual deployments.

Far from learning from its underestimates, the CIA’s errors grow worse over time. In all, the Soviet ICBM buildup ran from 1961 through 1986. In 1979, President Jimmy Carter’s defense secretary, Harold Brown, who had been a physicist with the Manhattan Project and was highly informed about nuclear matters, told Congress, “When we build, they build; when we cut, they build.”

The intelligence community’s third mega-failure was its belief that Saddam still possessed weapons of mass destruction (WMD) in 2003. It was thinly sourced, as it was thought inconceivable that Saddam would surrender his WMD stocks. Saddam could have saved his regime by letting inspectors in, but rather than accept such humiliation, he sacrificed his regime and, eventually, his own life. The intelligence community took a waterline hit to its reputation that will linger for decades.

Bottom Line: Three Harsh Lessons from Iran’s Nuclear Quest

First, diplomacy alone cannot stop determined nuclear proliferators with the resources to develop nuclear weapons.

Second, the political taxonomy of free countries does not conform to the taxonomy of totalitarian nations; moderates as we know them in Western societies simply are not permitted to exist in absolute dictatorships.

Third, policymakers must not persist — let alone double down — on policies whose desired results are repeatedly contradicted by the weight of inconvenient empirical evidence.

Part Four:

Israel’s Timing Dilemma; Lessons Not Yet Learned

Having covered Iran’s nuclear quest and failed efforts to stop its program, we turn in Part 4 to how vulnerable Israel is, how it might resolve its timing dilemma, and what enduring lessons should be learned.

Israel’s Extreme Nuclear-Attack Vulnerability. Begin with the full measure of Israel’s vulnerability if its conflict with Iran goes nuclear.

In event a nuclear Iran strikes Israel, a nuclear retaliatory strike would surely be launched by Israel. A 2007 estimate by Anthony Cordesman of CSIS estimated that in the first 21 days, Israel would suffer 200,000 to 800,000 killed, while Iran would lose 16 to 28 million. Israel, Cordesman writes, would survive, but Iran would cease to exist as a functioning society.

Two key factors should influence such earlier estimates: (a) Israel’s multi-layer ballistic missile defense may destroy many warheads before they land; (b) Israel’s arsenal includes weapons that yield one megaton, vastly greater in destructive power than the estimated 100 kilotons for prospective Iranian warheads.

A grave concern arises out of a Dec. 14, 2001 sermon delivered on Al-Quds Day (the last day of the month of Ramadan) by the late Ali Akbar Hashemi Rafsanjani, then a former president of the Islamic Republic. In the version published by the regime, Rafsanjani said at least this of an Israel-Iran nuclear exchange:

Muslims must surround colonialism and force them [the colonialists] to see whether Israel is beneficial to them or not. If one day, the world of Islam comes to possess the [nuclear] weapons currently in Israel’s possession, on that day this method of global arrogance would come to a dead end. This is because the use of a nuclear bomb in Israel will leave nothing on the ground, whereas it will only damage the world of Islam.

A quotation that emerged later, not in the official transcript, has Rafsanjani stating that in a nuclear exchange, Iran might lose 15 million and Israel 5 million, but Israel would be destroyed whilst Iran would survive as a country. This unconfirmed quotation is fully consistent with the thrust of Rafsanjani’s officially published remarks.

This view, that Iran would survive and Israel be extinguished, is opposite to the calculations made by Anthony Cordesman noted above. Cordesman knows a lot more about nuclear arsenals than Rafsanjani did. But if today’s Iranian leaders believe as did Rafsanjani that an exchange would “leave nothing on the ground” in Israel, but would “only damage the world of Islam,” they might launch an attack, with catastrophic consequences for both countries, the region and the wider world.

In addition, there is the vast difference geography portends for geostrategic vulnerability to a nuclear strike. Consider these projected world area, population and population density figures, as of July, from the U.S. Census Bureau’s U.S. and World Population Clock (for U.S. figures) and UN population division data (for international figures) reported by Worldometer: Israel is almost exactly the size of New Jersey, into which its 9.1 million people (100th among all nations) are crammed; NJ has 9.3 million. The U.S., population, ranked third, behind China and India, is now 335 million, 37 times that for Israel. Iran ranks 18th worldwide, with 84 million, roughly 9 times Israel’s.

Comparative areas (in square kilometers) are 9.1 million for the U.S., 1.6 million for Iran, 22,600 for NJ, and 21,640 for Israel. Iran’s area is 99.4 percent of the combined areas for France, Spain, Germany and the United Kingdom. Population densities per square kilometer are 36/sq. km for the U.S., 52/sq. km. for Iran and 400/sq. km for Israel; Israel’s population density is thus roughly 8 times Iran’s and 11 times America’s. Thus, Israel—far smaller, and far more densely populated—is vastly more vulnerable to nuclear attack. Put into national security terms, it lacks spatial—i.e., geostrategic—depth.

Israel’s Dilemma: Attack Before 11/3/24 or Await U.S. Election Result. Israel faces two possible ways Iran can trip a redline: (a) miniaturization becomes small enough to mate a warhead to a deliverable device; (b) Russia deploys the S-400 system to protect Iran’s nuclear facilities and key regime sites. If Israel decides to go, it will have to go it alone, as Team Biden is pantingly eager to make some sort of JPCOA-2 deal. Thus, as with Suez in 1956, Israel will have to keep the Americans in the dark as to the actual launch date, details and duration of the mission, else Team Biden will surely tip off the Iranians. (In 2012, when Biden was vice-president, the U.S. leaked Israel’s efforts to gain access for a refueling stopover in Azerbaijan, thus killing the idea.

The Biden administration assessment by Office of the Director of National Intelligence (ODNI) released July 10, finds that Iran hasn’t carried out “the key nuclear weapons development activities that would be necessary to produce a testable nuclear device.” Yet ODNI notes that “Iran has emphasized improving the accuracy, lethality and reliability of its missiles.”

But ODI arrived at its conclusions by using what nuclear expert David Albright, founder of the Institute of Science and International Security, called a “defective, overly defensive definition”:

It is a matter of how Europeans define a nuclear weapon program vs. USA intelligence community’s definition, combined with a serious post-Iraqi WMD [Weapons of Mass Destruction] analytical paralysis. It is amazing that U.S. intelligence community is still digging its heels in and using the defective, overly defensive 2007 NIE [National Intelligence Estimate] framework.

Especially significant is the timing of Iran’s efforts. Iran essentially halted its nuclear program after then-president Donald Trump exited the JCPOA in 2018; Iran then resumed its efforts immediately after the 2020 election of Joe Biden.

Supreme Guide Ayatollah Ali Khamenei has denied that his country is making nuclear weapons, but added to his disclaimer a boast:

We’re not pursuing nuclear weapons due to our Islamic principles. Otherwise, if we had wished too pursue them, no one would have been able to stop us, just as they haven’t been able to stop our nuclear development up until now and won’t be able do so in the future.

RAND analyst Gregory S. Jones published a mini-paper on March 16, concluding that 82.5 percent enriched HEU suffices as weapons-grade material; he notes that South Africa’s nuclear bombs were enriched to 80 percent. Jones flatly stated that Iran’s 83.7 percent enriched HEU is weapons-grade. According to European intelligence sources, Iran is working assiduously to shorten the breakout time to be able to test a nuclear device.

In 2019 the commander-in-chief of Iran’s Revolutionary Guard Corps stated that Iran’s “strategy is to erase Israel from the global political map.” On June 5, the director of the IAEA said that, contrary to a March 4 agreement with the IAEA, Iran’s compliance per the agreement is limited to a “fraction” of its commitments. Iran is constructing a new facility near the Zagros Mountains in central Iran, likely to be buried 80 to 100 meters underground (260 to 328 feet).

Iran’s arsenal of ballistic missiles is by far the largest in the region. It is the only country on the planet to have developed a 2,000 km. (1,250 mi.) range ballistic missile, without a nuclear warhead yet ready for it to carry. Named the Shahab-3, it is a liquid-fueled, road-mobile medium-range ballistic missile (MRBM, denotes ballistic missiles with a range between 1,000 and 3,000 km., equal to between 625 and 1,875 mi.).

Against these growing threats, Israel has a vast array of weaponry it did not have a decade ago: vastly superior air, land and sea assets, plus entirely new drones, etc. Iran’s military capability is far inferior. Islamic Jihad’s May 2023 fusillade of rockets was thwarted by the three-layer missile defense Israel has deployed: Iron-Dome for short-range intercept,, which has a 96 percent intercept success rate; David’s-Sling for medium-range; and Arrow 2 and 3 for long-range. Israel’s defense minister says these defenses can intercept Iran’s alleged hypersonic missile. And coming soon is Iron-Beam, a laser system that not only will intercept missiles, but also artillery shells, drones, etc., made by Rafael Advance Systems, its chairman states that the system will be deployed partially in 2024 and full-scale as soon as 2025. Moreover, Israel has become a leading worldwide supplier of advanced air-, land- and sea-based weapons for Western countries.

A senior Israeli official has stated that “Iran knows that breaking out to 90 percent purity in uranium enrichment will result in an Israeli strike.” Iran to date has yet to advance miniaturization for a warhead, and has not yet mastered all aspects the complex nuclear detonation initiation sequence.

Can Israel destroy all Iran’s nuclear facilities? There is every reason to conclude that Israel can do so. Israel has matchless ground intelligence, most recently evidenced by the Mossad capturing and interrogating—inside Iran—the mastermind who was planning a terror attack aimed at Cyprus. Add in the remote machine-gun assassination of Iran’s master terror planner, Qassem Soleimani, in 2020. A few years ago Israel extricated ten scientists and their families; and the top Iranian scientist, Mohsen Fahkrizadeh, was also assassinated. In 2018 Israel took a huge cache of incriminating documents that proved to the IAEA that Iran had been cheating on the JCPOA. The 2010 Stuxnet worm showed that Israel can deeply penetrate Iran’s cyber networks.

Responses to an Israeli Strike. Any Israeli attack will to a certitude be treated as an act of war by the regime. The upshot very likely will be a multi-front war, with Hezbollah from the north, via Syria and Lebanon; Iran-backed terror squads from the West Bank; and to the south, Hamas terror attacks from Gaza. For his part, Israeli prime minister Netanyahu says that Israel can fight on multiple fronts, and prevail.

This would take place against a backdrop of an America that placates its enemies and oft undermines its foremost Mideast ally, Israel. Europe, in economic thrall to energy from the Mideast will condemn any raid. Greater diplomatic leverage will accrue to Turkey, Iran, China and Russia. In sum, the vacuum created by U.S. lassitude will be occupied by other powers.

The Gatestone Institute’s Col. Richard Kemp, a counter-terrorism expert, exposed the full extent of Team Biden’s appeasement of Iran and Russia: (a) jettisoning most sanctions imposed by president Trump; (b) doing nothing while Iran’s uranium enrichment, confined to 3.67 percent by the JCPOA, skyrocketed to 60 percent overall, with some enrichment to 83.7 percent; (c) having war-criminal Vladimir Putin’s Russia serve as proxy in negotiations with Iran; (d) initial release of $20 billion in frozen Iranian regime assets—this list was complied before Team Biden unfroze $6 billion to secure the release of five hostages; (e) a U.S. commitment not to impose sanctions, and not to bring Iran’s conduct to the UN Security Council—where, unlike in the General Assembly, the U.S. posses a veto; (f) preparing to attempt a bypass of Congressional legislation if a new deal, or understating, is reached with Iran.

Kemp notes that the 2015 Iran Nuclear Agreement Review Act (INARA) specifically requires that any agreement or understanding, formal or informal, be submitted to Congress for review. House Foreign Affairs Committee Chairman Michael McCaul (R-TX) sent a June 15, 2023 letter to President Biden, reminding him of this. Kemp attributes Biden’s efforts to a desire for (a) a perceived foreign policy triumph in the run-up to the 2024 election; (b) a desire to complicate Israeli plans for a strike on Iran’s nuclear facilities; and (c) an abiding belief that containment of a nuclear-armed Iran can be made to work by appeasing the Islamist regime.

But the greatest danger to Israel—and, correspondingly, boon to the Iranian regime—is most fully explained by Hudson scholar Michael Doran in a recent article, “Biden’s Ties That Bind,” showing how Team Biden’s embrace of Israel is intended too suffocate those in Israel who would strike Iran’s nuclear facilities.

Doran sees four tracks Biden pursues: (1) express strong rhetorical support for Israel; (2) sponsor joint military exercises; (3) sponsor close coordination between the U.S. and Israeli militaries, via Israel’s incorporation into CENTCOM (the U.S. command covering the Mideast); and (4) promoting normalization with Saudi Arabia. Collectively, these actions, each individually superficially plausible, entrap not Iran but Israel.

(A recent webinar (34:17) by the bipartisan Mideast Forum credits Team Biden with providing the protesters with cyber-circumvention tools to afford online access to 30 million Iranians, more than one-third of the population. This is one of the few things the U.S. has done to help those protesting the regime’s suppression of dissent.)

The sheer vacuity of these four tracks was exposed when Sen. Tom Cotton questioned SecDef Lloyd Austin at a recent Senate hearing. Cotton noted that Iran had used force against Americans 83 times since Biden took office, and that Biden had retaliated only four times. Doran calls this not a loving embrace, but rather as a “bear hug” designed to prevent independent Israeli military action. Biden’s strategy also targets fissures in Israeli society, among the military, and the Knesset and the voting public. Central to this is demonizing Netanyahu, Israel’s longest-serving and most successful prime minister since founding father David Ben-Gurion.

Biden’s overarching goal is to kick the Iran issue last the November 2024 elections, advertising a breakthrough that is in fact an win for Iran. Doran writes that any failure will be placed on the lack of concessions to Palestinian statehood. He sees the controversy in Israel over judicial reform as literally a godsend, a trifecta for the administration. First, Biden can disguise his fight to destroy Netanyahu under cover of a fight for “democratic values.” Second, American Jews are distracted from the grave, growing threat Iran’s nuclear quest poses. Third, and most importantly, the judicial reform controversy drives a wedge between the senior Israeli military and the political leadership.

According to Doran, Netanyahu shows signs of caving, allowing a 60 percent enrichment threshold for Iran, playing for time until after the 2024 elections. As American appeasement and Iranian enrichment grow with each passing day, Doran concludes: “The Biden administration says it is protecting Israel and preventing Iran from acquiring a nuclear weapon. It is doing the exact opposite.”

There is one final cautionary tale that Israel no doubt keeps in mind when weighing Advice offered by U.S. administrations. Officials from several prior administrations have admitted having given Israel bad advice. Thus, in 2009, Dennis Ross, a longtime promoted of Israel making concession to Arabs, advised the Israelis to send cement—600,000 tons—to Gaza to be used, so he thought, for commercial constructions; he disregarded warnings from the Israelis that the concrete would be diverted to military use; Hamas used the concrete—surprise!—to construct terror tunnels.

Ross and other officials also advised then-president Obama to be low-key as to the Green Movement protests against the regime’s fixed 2009 election, fearing that the U.S. would be blamed for outside interference. The protests were crushed, and with it the best chance missed to topple the clerical fascist regime and end its nuclear program.

Earlier, during the Clinton administration’s second term, Mideast adviser Aaron David Miller suggested—NOT making this up—inviting Palestine Authority terrorist leader Yasser Arafat to visit the Holocaust Museum, in hope that he would offer sympathy and thus propitiate Israelis. Arafat, to his credit, spurned the offer. Fast forward to 2023: Team Biden wants Israel to make concessions to the Palestinians to get the Saudis to join the Abraham Accords. Yet the Saudis are fed up with Palestinian maximal aims—no Jewish state—and stubborn refusal to make concessions for peace. These efforts by Americans to “save Israel from itself” are patronizing exercises: Do we really understand Israel’s national interests better than Israelis do?

All this comes as pressure on Iran over its brutal suppression of protests mounts. This May, 108 former world leaders signed a letter endorsing regime change in Iran. One prominent former American official, John Bolton, UN ambassador under Bush 43 and national security adviser to Donald Trump, said that the death of Supreme Guide Ali Khamenei could cause the collapse of the clerical fascist regime.

Finally, Iran experts Ruel Marc-Gerecht and Ray Takeyh opine that were “Little Satan” Israel to destroy Iran’s nuclear arsenal, it would prove a far graver blow to the regime than were the “Great Satan” U.S. to do so. They add that Iranians have a long history and culture different form the Arabs; they would not rally to the hated regime because Israel destroyed Iran’s nuclear facilities. In the event, the regime’s appeal, they write, is not to Persian nationalism, which could “rally ‘round the flag” after an attack, but rather to an extreme religious ideology the broader public no longer shares.

Bottom Line. Since Iran’s program was revealed in 2002, the Israelis and Americans have been unwilling to, either individually or together, carry out operations that would end Iran’s nuclear program. That Iran is pursuing a military capability has been clear since 2002. The proverbial can has been kicked again and again down the road. Diplomatic efforts continue despite a near-zero record of success; only Trump managed to induce caution in Iran’s rulers. Per the famed quip of 18th century monarch Frederick the Great, “Diplomacy without arms is like music without instruments.” Western countries will be ululating lamentations, if Iran crosses the nuclear threshold and predictably escalates its multi-front war against the West. With the military option on hold, it falls to the courageous protest movement inside Iran to do our work for us. Absent regime change, the odds are that Iran joins the nuclear-weapon state club.

Iran is determined to join the N-club. The U.S., under both former president Obama and President Biden, has been determined to prevent an Israeli military strike against Iran’s nuclear facilities. Israel, for its part, has concluded that its geographic limits make it exceptionally vulnerable to a nuclear strike, far more so than larger Western nations, especially, the United States. Thus, Israel cannot depend upon deterrence, but must instead follow the path chosen by Israel in 1981 and 2007. It is a path fraught with peril, but less perilous than absorbing a nuclear strike.

We persist in declining to permanently learn from experience as indicated above. Our national security, economic well-being, and civilizational survival are a tripartite warning. We must learn these elemental, enduring history lessons before catastrophe strikes.

ABOUT THE AUTHOR:

John Wohlstetter

Senior Fellow

John Wohlstetter is a senior fellow at the Discovery Institute (beg. 2001) and the Gold Institute for International Strategy (beg. 2021); he held a similar position at the London Center for Policy Research (2013-2018). His primary areas of expertise are national security and foreign policy, and the 25th Amendment to the U.S. Constitution. He is author of Sleepwalking With The Bomb (2nd ed. 2014), and The Long War Ahead and the Short War Upon Us (2008). He was founder and editor of the issues blog Letter From The Capitol (2005-2015). He has authored numerous articles in publications, including The American Spectator, National Review Online, The Wall Street Journal, Human Events, The Daily Caller, PJ Media and The Washington Times.

He gave over 1,000 radio interviews (2008-2015), many on nationwide programs, and guest-hosted the August 14, 2013 Dennis Miller Show. He worked on the foreign trading desks at Goldman Sachs (1969-73) & Drexel Burnham Lambert (1973-74). He was an attorney for Contel Corporation (1978-91), practicing general corporate and communications law; he shifted to strategic assessment, a task he also performed at GTE Corporation (1991-2000) and Verizon (2000); he retired in 2000. During his tenure at Contel he served as senior adviser to The Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications.

The Committee, created by the National Research Council, published its final report, Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness (1989). He holds degrees from the University of Miami (B.B.A., 1969, Finance major, Art History minor); Fordham University School of Law (J.D., 1977); and The George Washington University (Public Policy/Telecommunications, 1985). He is a National Trustee of the National Symphony Orchestra (beg. 2014), and served on the NSO Board of Directors (1992-2014). He is a trustee of the Billy Rose Foundation (beg. 1996). He served as a trustee of MyFace (1980-2016), the Washington Bach Consort (2002-2018), and the London Center for Policy Research (2013-2018). He is an amateur concert pianist.