Exploring the Dangers of Huawei’s Control of Communications and Data in Spain

Executive Summary

Through the efforts of high ranking Spanish politicians of both major parties, Huawei Technologies, a Chinese telecommunications giant, has been contracted by the Spanish government to manage critical systems, including judicially authorized wiretaps and the Sistema Integrado de Interceptación Legal de las Telecomunicaciones (SITEL), despite Spain’s alignment with European Union (EU) and NATO policies restricting Huawei’s role in 5G infrastructure although, ironically, the government of Pedro Sánchez has included Huawei in the Security Operations Center (SOC) 5G, a public entity in charge of the supervision and certification of security in 5G networks and services, joining representatives of NOKIA and Ericsson.

China’s involvement in sensitive communications and data systems raises significant concerns about US national security, cybersecurity, and geopolitical risks posed by Huawei’s role in Spain, with a particular focus on the potential threats to US personnel stationed at military bases and stations in Rota, Algeciras, Morón, Torrejón and elsewhere.

These bases are critical to US and NATO operations in Europe, the North Atlantic and North Africa, and Huawei’s access to sensitive data could compromise operational security, intelligence-sharing, and the safety of US forces.

Focusing specifically on the security implications for US military bases in Spain—Naval Station Rota, Morón Air Base, Torrejón Air Base, Algeciras (and other strategic ports),—given Huawei Technologies’ role in managing Spain’s sensitive communications, data systems, including judicial wiretaps, SITEL, and the proliferation of Chinese made EVs known to collect an abundance of data.

The presence of US personnel at these bases, which are critical to US and NATO operations, amplifies concerns about Huawei’s potential to compromise operational security, intelligence-sharing, and personnel safety.

This Report explores the specific vulnerabilities, risks to US base security, and mitigation strategies to safeguard US forces in Spain, and provides recommendations to mitigate these risks and strengthen Spain’s alignment with Western security frameworks.

Introduction

Huawei’s growing presence in Spain’s telecommunications and data infrastructure, particularly through contracts to manage judicial wiretaps and support SITEL, has sparked alarm among Spanish law enforcement, EU partners, and US officials.

While Spain has restricted Huawei’s role in 5G network cores, its continued reliance on the Chinese company for sensitive systems creates a paradox that undermines national and allied security. This is especially concerning given the presence of US military personnel at key bases in Spain, including Naval Station Rota, Algeciras (a frequent port for US naval operations), Morón Air Base, and Torrejón Air Base.

These bases support critical US and NATO missions, including missile defense, air mobility, and intelligence operations. This white paper analyzes the dangers of Huawei’s control over Spain’s communications and data systems, with a focus on:

1. National Security Risks:

The potential for Chinese government access to sensitive data under China’s 2017 National Intelligence Law.

2. Cybersecurity Vulnerabilities:

Technical risks in Huawei’s systems that could be exploited to compromise data.

3. Risks to US Personnel:

The specific threats to US military operations and personnel at Rota, Algeciras, Morón, and Torrejón.

4. Geopolitical Implications:

The impact on Spain’s relationships with the US, EU, and NATO

5. Case Studies and Precedents

Data breach cases in the UK, US, Africa and the Snowden case.

6. Chinese EVs:

The risk posed by Chinese electric vehicles’ increased use in Spain

7. Recommendations:

Policy measures to protect US personnel and align Spain with allied security standards.

Background

Huawei’s Role in Spain

In the context of the Socialist government’s increasing isolation in the world stage and an almost irrational and anachronic animosity towards the West, Spain has moved closer to Iran, Russia, China and terrorist organizations like Hamas. This is not dictated by any kind of affinity on the part of the Spanish people, but by the stubborn refusal of an unpopular government to move aside and, to the degree it is capable, create conditions to finance its permanence in power.

Thus, Huawei has been awarded contracts worth €12.3 million to provide storage systems (OceanStor 6800 V5) for judicial wiretaps and technical support for SITEL, a system used by Spanish law enforcement and intelligence agencies to intercept communications related to terrorism, organized crime, and espionage. Despite Spain’s exclusion of Huawei from 5G network cores—following EU and NATO recommendations, although the government included the company as an advisor in SOC-5G, —these contracts, awarded between 2021 and 2025, highlight a contradictory approach to cybersecurity. The Spanish government claims compliance with the National Cryptologic Center’s guidelines, but concerns persist about Huawei’s access to sensitive data, and the Spanish government continues to grant them almost unfettered access.

US Military Presence in Spain

Spain hosts several critical US military installations:

Naval Station Rota, is a joint US-Spanish naval base hosting US Navy destroyers equipped with Aegis missile defense systems, critical for NATO’s ballistic missile defense. NAVSTA Rota supports Naval Forces Europe Africa Central (EURAFCENT), 6th Fleet and Combatant Commander strategic priorities by providing airfield and port facilities, security, force protection, logistical support, administrative support and emergency services to all U.S. and NATO forces. Situated on a 6,100-acre Spanish Navy base, NAVSTA Rota provides cargo, fuel and logistics support to units transiting the region, supporting U.S. and NATO ships with three active piers; U.S. Navy and U.S. Air Force aircraft with a 670-acre airfield; and the largest weapons and fuels facilities in Europe, all located within a single, secure fence-line.

Algeciras, is a strategic port used by US naval vessels for resupply and operations in the Mediterranean. Alas, last year Spanish authorities refused entry to American flagged ships bound for Israel, and recently the Federal Maritime Commission excluded Algeciras from a key route, in favor of Tanger Med in Morocco.

Zaragoza Air Base,once an American base, was transferred to Spain in 1992, but remains a key hub for US Air Force mobility and logistics operations in Europe, same as Torrejón Air Base, once home to the US Air Force’s 16th Air Expeditionary Wing, and NATO’s Combined Air Operations Centre, now relegated to mostly for official visits. Zaragoza was used during the Gulf War, Operation Kosovo and the war in Afghanistan.

Morón Air Base, since 2015, has been home to up to 3,000 US military and civilian personnel and 40 aircraft of the Special Purpose Marine Air-Ground Task Force – Crisis Response – Africa.

These bases rely on secure communications, intelligence-sharing, and coordination with Spanish authorities and NATO to execute missions effectively. Huawei’s involvement in Spain’s communications infrastructure introduces potential vulnerabilities that could directly impact base security.

Global Concerns About Huawei

Huawei’s ties to the Chinese Communist Party (CCP) and its obligations under China’s 2017 National Intelligence Law have led to bans in the US, UK, Australia, and several EU countries.

This National Intelligence Law mandates Chinese companies to assist state intelligence efforts, raising well-founded fears that Huawei’s systems could be used for espionage or sabotage. Reports of vulnerabilities in Huawei’s equipment, including unpatched interfaces and potential backdoors, further heighten these concerns.

It is, therefore, naïve and irresponsible to consider Huawei as anything other than an instrumentality of the Chinese government and the Communist Party of China at the service of its intelligence services and military operations.

1. National Security Risks

Chinese Government Access to Sensitive Data

China’s National Intelligence Law compels Huawei to cooperate with state intelligence agencies, creating a pathway for the CCP to access data stored on Huawei’s OceanStor systems.

In Spain, these systems handle judicial wiretaps, which include communications related to national security threats. Unauthorized access by Beijing could expose sensitive intelligence, including data relevant to US military operations, movements of US military and civilians at US military posts not only in US bases but at all military installations, given Spain’s role as a NATO ally.

Compromised Intelligence-Sharing

The US has expressed concerns about Spain’s Huawei contracts, with lawmakers like Senate Intelligence Committee Chairman Tom Cotton warning that intelligence-sharing could be curtailed if vulnerabilities persist. In a letter to DNI Tulsi Gabbard on 17 July, 2025, Senator Cotton and Congressman Crawford wrote: “Since the first Trump administration, the United States has waged a whole of government effort to remove the threat Huawei equipment poses to American networks, infrastructure, and privacy. Until Spain follows suit, the U.S. Government should ensure that any information shared with the Spanish government is redacted of details that should not be shared with the CCP.”

The Five Eyes alliance (US, UK, Canada, Australia, New Zealand) and NATO rely on secure data exchange, and any breach in Spain’s systems could expose US and allied intelligence, compromising missions supported by Rota, Morón, and Torrejón.

For example, at Rota, where 4,000 US personnel and families reside, compromised data could facilitate foreign intelligence operations, including surveillance or recruitment attempts.

Technical Vulnerabilities in Huawei Systems

Reports, such as the 2019 UK National Cyber Security Centre Assessment, have identified flaws in Huawei’s software, including unpatched vulnerabilities and poor engineering practices. These weaknesses in the OceanStor systems or SITEL infrastructure could be exploited to:

· Install backdoors for real-time data access.

· Deploy malware to disrupt base communications or logistics.

· Manipulate data to mislead US or Spanish intelligence efforts.

Such vulnerabilities could directly affect the operational readiness of bases like Morón, where secure logistics are critical, or Torrejón, where NATO’s air operations depend on reliable command systems.

US shares sensitive intelligence with Spain through NATO and bilateral agreements, particularly for counterterrorism and missile defense operations at Rota and Morón. Huawei’s access to Spanish systems could lead to leaks, prompting the US to restrict intelligence-sharing. This would:

· Limit situational awareness for US personnel, increasing operational risks.

· Weaken joint US-Spain missions, such as those supported by Morón’s air mobility hub.

· Undermine NATO’s collective defense, particularly at Torrejón’s CAOC, whose primary mission is to “plan, direct, coordinate, monitor, analyse and report on the operations of Air Policing means assigned to it in peace time. The unit’s area of responsibility comprises European NATO airspace south of the Alps. Hence Combined Air Operations Centre Torrejón is responsible for some of NATO’s special Air Policing arrangements, such as Air Policing over Albania, Montenegro, North Macedonia and Slovenia.”

2. Cybersecurity Vulnerabilities

Technical Weaknesses in Huawei’s Systems

A 2019 UK National Cyber Security Centre report identified “significant” flaws in Huawei’s software, including poor engineering practices and vulnerabilities that could be exploited by state or non-state actors. The OceanStor 6800 V5 systems used for wiretap storage may contain similar weaknesses, such as unpatched telnet interfaces or embedded malware, as reported in other Huawei devices. A breach of these systems could allow adversaries to access or manipulate data critical to law enforcement and intelligence operations.

Insider Threats and Lack of Transparency

Huawei’s opaque governance, with reported ties to the CCP through its trade union committee and leadership (e.g., former chairwoman Sun Yafang’s Ministry of State Security background), raises concerns about insider threats. Employees or subcontractors could be pressured to install backdoors or leak data, compromising Spain’s surveillance systems and, by extension, US military communications.

3. Risks to US Personnel

Operational Security at US Bases

US personnel at Rota, Algeciras, Morón, and Torrejón rely on secure communications for mission planning, logistics, and intelligence coordination. Huawei’s access to SITEL and wiretap data could allow adversaries to intercept communications related to US operations, such as ship movements at Rota or air missions from Morón. This could enable adversaries to track US forces, predict operational patterns, or disrupt missions.

Espionage and Targeting of Personnel

Sensitive data stored on Huawei systems could include communications involving US personnel, such as intercepted calls or metadata related to military activities. If accessed by the CCP, this data could be used to target US service members for espionage, blackmail, or cyberattacks. For example, compromised communications could reveal personal details about personnel at Torrejón, increasing their vulnerability to foreign intelligence operations.

Impact on NATO Missions

Rota and Torrejón are integral to NATO’s missile defense and air operations. A breach of Spanish communications systems could undermine NATO’s ability to respond to threats, such as Russian aggression in Eastern Europe or missile launches from rogue states. This would directly affect US personnel tasked with executing these missions.

4. Geopolitical Implications

Strained US-Spain Relations

The US has urged Spain to reconsider Huawei’s role, with warnings from officials like Assistant Secretary of Defense Celeste Wallander about the risks to bilateral defense cooperation. Continued reliance on Huawei could lead to reduced US investment in Spanish bases or restrictions on joint operations, weakening the US-Spain defense partnership. In a hearing on US Military Posture and National Security Challenges in Europe, Dr. Wallader stated: “I think the areas of our greatest concern are when China is, largely through technology companies–Huawei is the kind of poster child for that–and so we work closely in sharing intelligence and our information about the risks that that creates for countries in Europe and, more broadly, globally, for them to be able to control their infrastructure, to control their communications. So that is one major line of

effort.

But the other major concern is when we see China seeking majority control of ports, and while there were some instances in Europe some time ago where countries did not take that seriously, they are now very much attuned to that and have taken steps to make sure that even if there is investment it does not allow…”

EU and NATO Misalignment

Spain’s permissive stance on Huawei diverges from the policies of 11 EU countries, including Germany and Sweden, which have restricted or banned Huawei (and ZTE) from critical infrastructure. Besides these eleven countries, 21 have implemented rules allowing their national authorities “to restrict or prevent suppliers considered as high-risk for 5G networks, when deemed necessary.”

Alas, a back door opened wide in Spain creates a potential “weak link” in the EU’s digital security framework, undermining collective defense efforts and exposing NATO operations to risk.

Continued use of Huawei could also embolden other NATO countries to relax restrictions on high-risk vendors, creating broader vulnerabilities for US forces in Europe.

4.3 Human Rights Concerns

Huawei’s technologies have been linked to the CCP’s surveillance of Uyghurs in Xinjiang, raising ethical concerns about their use in democratic countries. Spain’s reliance on Huawei for surveillance systems risks normalizing technologies associated with human rights abuses, potentially eroding public trust in government institutions and complicating US-Spain cooperation on democratic values.

Case Studies and Precedents

United States

The US banned Huawei from its networks in 2012 and added it to the Entity List in 2019, citing espionage risks. In 2022, the Biden administration prohibited Huawei equipment in telecommunications, labeling it an “unacceptable risk.” These measures reflect concerns about Huawei’s potential to compromise military and intelligence operations.

United Kingdom

The UK’s 2020 decision to remove Huawei from 5G networks by 2027 followed a National Cyber Security Centre report highlighting software vulnerabilities. The UK’s experience underscores the risks of relying on Huawei for critical systems, particularly in a NATO context.

African Union Data Breach In 2018

Le Monde reported that Huawei equipment at the African Union headquarters was linked to data breaches allegedly orchestrated by the Chinese government. This incident illustrates the risks of Huawei’s involvement in sensitive systems, with direct relevance to Spain’s wiretap storage.

Snowden

In 2013, Edward Snowden’s leaks exposed US intelligence-sharing vulnerabilities, impacting operations at bases like Rota. A Huawei breach could have similar consequences, exposing NATO and US plans.

4. Chinese EVs in Spain

The impact of Chinese electric vehicles (EVs) in Spain, particularly near US military bases, raises their own significant concerns about national security, data privacy, and geopolitical implications, especially in light of the Israeli investigation into potential spying and data collection by Chinese EVs.

Chinese EV brands like BYD, MG Motor, and Chery have gained traction in Spain due to their competitive pricing, and the Spanish governments commitment to expand its relations with China. The global electric car market is projected to reach 22 million sales by 2025, with China leading in adoption and manufacturing. In Spain, Chinese brands dominate the affordable EV segment, with models like the BYD Atto 3 being particularly popular.

If the use of these EVs near military bases were not a matter of serious concern, their adoption by the Spanish armed forces brings a new level of risk to the fore. The Spanish Army has acquired 170 Chinese-made electric vans for military use, at a cost of €2.5 million (U$S 2.9 million). These vehicles are used in sensitive areas, including near US military bases, such as those in Rota and Morón.

In August 2025, the Israeli Defense Forces (IDF) implemented a comprehensive ban on Chinese-made vehicles entering military bases, citing fears of data leaks from onboard cameras, sensors, and connected systems. This followed an initial restriction in July 2025 at the Gideonim Communications Corps base and was expanded due to concerns that Chinese EVs could record audio, video, and geolocation data, posing a threat to military operations. The IDF also suspended a tender for BYD Atto 3 vehicles after cybersecurity warnings.

But Israel is not alone in its concerns. The UK banned Chinese EVs from military sites in April 2025, citing espionage risks, and instructed personnel to park these vehicles at least two miles from sensitive sites like RAF Wyton. The US has also proposed regulations to prohibit Chinese tech in connected vehicles due to concerns about data collection and potential remote manipulation.

Indeed, Chinese EVs are equipped with advanced sensors, cameras, and connectivity features that collect vast amounts of data (e.g., up to 1400 GB per hour, though only a fraction is transmitted). Under China’s National Intelligence Law, Chinese companies may be compelled to share data with the government, that is with the Chinese Communist Party, raising fears of espionage, especially near sensitive military installations.

As a former MI6 boss (Ian Williams) so poignantly put it: “EVs are also the perfect tools for sabotage, surveillance and espionage – as well as targeted assassinations.”

5. Implications for US Personnel in Spain

Compromised Operational Security

A breach of Huawei-managed systems could expose communications related to US naval operations at Rota or air missions at Morón and Torrejón, enabling adversaries to disrupt logistics, missile defense, or intelligence operations.

Reduced Intelligence-Sharing

US concerns about Huawei could lead to restrictions on intelligence-sharing with Spain, limiting the information available to US personnel at Spanish bases. This could hinder mission planning and situational awareness, increasing risks to personnel.

Economic and Strategic Dependencies

Spain’s increasing reliance on Huawei risks creating long-term dependencies on Chinese technology, potentially limiting US access to alternative, secure systems for joint operations. This could complicate US efforts to maintain secure communications at its, and NATO’s bases.

6. Recommendations

To mitigate the risks posed by Huawei’s role in Spain’s communications systems and protect US personnel, the following measures are recommended:

· Conduct a Joint US-Spain Security Review

The US and Spain should jointly assess Huawei’s role in SITEL and wiretap storage, focusing on risks to US bases. The review should involve the US Department of Defense and Spain’s National Intelligence Centre (CNI).

· Phase Out Huawei Equipment

Spain should establish a timeline to replace Huawei’s OceanStor systems and SITEL support with equipment from trusted vendors (e.g., Nokia, Ericsson). This aligns with Germany’s 2026 deadline for removing Huawei from 5G networks.

· Strengthen Base Communications Security

The US should deploy independent, encrypted communications systems at Rota, Morón, Zaragoza and Torrejón to reduce reliance on Spanish infrastructure potentially compromised by Huawei, and harden its communications.

· Enhance EU-NATO Coordination

Spain should collaborate with the EU and NATO to develop a unified framework for excluding high-risk vendors from sensitive systems, ensuring alignment with allies and protecting US and NATO personnel.

· Increase Transparency and Oversight

Until Huawei is removed from Spanish communications altogether, Spain should mandate regular audits of Huawei’s systems by the National Cryptologic Center and share results with US and NATO partners to rebuild trust.

· Engage in Bilateral Dialogue

The US and Spain should hold high-level talks to address Huawei concerns, emphasizing the importance of secure communications for joint defense operations and the safety of US personnel.

· Ban Chinese-made electric vehicles

Chinese EVs should not be allowed in an area of at least five miles from any military base, and most certainly should not be permitted to enter any military installation.

· Deploy Independent Systems

It is imperative that, as soon as feasible, Spain move towards replacing Huawei technology with safe and reliable systems readily available in the West. In a rather incomprehensible statement outside of the context of the subservience of Spanish politicians to Chinese ambitions, Esteban González Pons, until recently EU Vice-President, and currently the Vice-Secretary-General of the main opposition party in Spain, declared: “Without Huawei, 5G is not possible.

It should come as no surprise that there is an investigation in Belgium of over 15 European Parliamentarians, including González Pons, for alleged payments received from Huawei to promote it. Selling influence frequently falls into such absurd affirmations.

Operation “Follow the money” must be supported and corrupt politicians risking the lives of NATO forces must be rooted out of the European Parliament.

· Secure Satellite Communications

Expand use of US-controlled satellite networks for sensitive operations, particularly at Rota for naval coordination and Torrejón and Morón for NATO air operations.

The technology is available, trusted and ready to be deployed.

· Regular Cybersecurity Audits

Conduct frequent audits of base networks to detect and mitigate vulnerabilities, ensuring no integration with Huawei-managed systems.

Conclusion

Huawei’s control of sensitive communications and data systems in Spain, and Chinaa’s corrupt meddling in European affairs poses significant risks to national security, cybersecurity, and the safety of US personnel at Rota, Algeciras, Morón, Torrejón and, indeed, every post in the European and North African theater.

The potential for Chinese government access to judicial wiretaps, coupled with Huawei’s technical vulnerabilities and Spain’s divergence from EU and NATO policies, threatens operational security and intelligence-sharing.

By implementing the recommended measures—phasing out Huawei equipment, strengthening base communications, and enhancing allied coordination—Spain can mitigate these risks, protect US personnel, and reinforce its commitment to Western security frameworks.

Alas, phasing out Huawei equipment is no longer sufficient, without an effective control of an increasing number of Chinese EVs in circulation, even in use by the Spanish military forces.

It is imperative that the US move now to mitigate these risks and ensure the safety of our installations and security of our military personnel.

References

Huawei’s paradox in Spain: No to 5G, but yes to wiretap storage

Spain under fire for contracting Huawei to store judicial wiretaps – POLITICO Fears over Huawei’s use in Spain’s intelligence and police systems

Spain’s Huawei Deal Is a Wake-Up Call for U.S. Federal Procurement Reform – War on the Rocks

Spain chooses Huawei for intelligence wiretaps despite risks –

Spain awards Huawei contracts to manage intelligence agency wiretaps | The Record from Recorded Future News

Spain denies security risk claims against Huawei following US criticism – Huawei Central

Spain’s Sánchez dodges backlash over Huawei deal amid EU and US concerns – Euractiv

Spain confirms using Huawei to store judicial wiretaps, denies security risk | The Straits Times

Spain awarded €12.3 million in contracts to Huawei

Spain: Huawei must not be allowed access to wiretap data in the EU – ARTICLE 19

Huawei to supply Spain with wiretap storage​| Cybernews

Is China’s Huawei a Threat to U.S. National Security? | Council on Foreign Relations

British Watchdog Finds ‘Serious’ Huawei Security Vulnerabilities | CRN

UK intelligence finds ‘new risks’ linked to Huawei – POLITICO

The Huawei Dilemma: Why Europe Needs Strong Intelligence Guardrails – The Cipher Brief

US military bases in Spain and their importance

Spain’s contribution to integrated air defense in Europe. Global Affairs. University of Navarra

Israel suspects espionage and bans Chinese cars from all military bases!

Are Chinese electric cars coming to spy on us? | The Week

Chinese electric cars prompt security fears as ‘every major defence supplier is concerned about tech’

The horrifying reality of how China could cripple Britain in one move | World | News | Express.co.uk

The horrifying truth about how China could cripple Britain in just seconds – by barely lifting a finger… as former MI6 boss makes desperate plea to end our reliance on Beijing: IAN WILLIAMS | Daily Mail Online

Los 24 años de Huawei en España: contratos con administraciones, vídeos promocionales y road shows – Libre Mercado

El Gobierno incluye a Huawei en el organismo público que controla el 5G | Economía | EL PAÍS

Estados Unidos expulsa a España de una ruta de comercio marítimo estratégica

United States drops Port of Algeciras from one of its key maritime routes

Huawei, F-35s, and Algeciras: Spain Drifting Away from the U.S. ━ The European Conservative

Maersk Shifts Major Shipping Route from Algeciras to Tanger Med

Naval Station Rota

https://www.cotton.senate.gov/news/press-releases/intel-chairs-cotton-and-crawford-to-gabbard-review-intelligence-sharing-with-spain
https://www.ncsc.gov.uk/annual-review/2019/ncsc/index.html
https://ac.nato.int/about/caoc/torrejon
https://www.congress.gov/event/118th-congress/house-event/LC72759/text
https://www.euronews.com/next/2024/08/12/eleven-eu-countries-took-5g-security-measures-to-ban-huawei-zte
https://gaceta.es/europa/sin-huawei-no-hay-5g-posible-la-defensa-de-gonzalez-pons-del-gigante-chino-en-europa-20250313-1340
https://gaceta.es/europa/sin-huawei-no-hay-5g-posible-la-defensa-de-gonzalez-pons-del-gigante-chino-en-europa-20250313-1340

Beyond the Hype: Recent Wars Expose the Myth of Adversarial Strength and Force a U.S. Rethink on Global Threats

As global tensions sweep across headlines, American policymakers and the public alike are beginning to reevaluate what truly constitutes a threat. The Iran-Israel “Twelve-Day War” and the ongoing Russia-Ukraine conflict have brought into sharp relief the need to recalibrate how the United States and its allies judge adversarial strength. Today, a clear reassessment is critical—one that puts aside the veils wrought by media-driven perceptions and political agendas and focuses squarely on the real capabilities of those challenging Western interests.

On June 13, 2025, Israel launched a bold and coordinated strike against Iranian military and nuclear facilities, a move that quickly became known as the “Twelve-Day War.” In less than two weeks, Israel decisively dismantled both Iran’s offensive and defensive capabilities—a result that stunned a world conditioned to fear Iran’s perceived military prowess. Israeli operations neutralized Iranian military leadership, destroyed nuclear assets, and crippled air defenses, all while neutralizing retaliatory attacks delivered via Iran’s proxies: Hamas, Hezbollah, and the Houthis. Despite initial fears, these attacks failed to alter the strategic situation. Israel’s technological superiority and the defensive cooperation from the United States overwhelmed Iran’s responses.

This outcome revealed a crucial truth: Iran’s real strength was not its direct military power, but rather its ability to finance and coordinate proxy groups throughout the region. For years, the Gulf and broader Middle East have lived under the shadow of Iran’s expanding influence, largely due to Tehran’s capacity to fund armed loyalists. The country’s reputation as a regional giant—amplified by repeated media cycles and political rhetoric—was in fact out of step with reality. Closer scrutiny of the ways Iran launders oil profits and funds its proxies could have led to a more honest assessment of its true threat level. Policymakers focusing only on Iran’s weapons arsenal risked missing the financial and diplomatic networks driving its influence.

Iran’s threat to regional stability essentially operates through relationships with its proxies. By funneling money, equipment, and training to Hamas, Hezbollah, and Houthi groups, Iran has expanded its reach and destabilized Western interests with asymmetric tactics and gray-zone warfare. Yet, Israel’s rapid disruption of Iranian command centers exposed the vulnerability underlying this approach. The real Achilles’ heel was not just military weakness, but the fragility of Tehran’s external relationships, supply lines and financial channels. U.S. intelligence and recent analyses now highlight Iran’s strengths in missile and drone development, cyber operations, and propaganda campaigns, but suggest these tools do not represent the existential threat they are sometimes portrayed to be.

Countering Iran’s strength, therefore, means going beyond headline military assets to targeting the economic arteries sustaining its power. That includes a sharper diplomatic focus on Iraqi relations, and more aggressive pressure on oil laundering operations—the very mechanisms that fund Iran’s destabilizing activities. Western strategy must recognize that Iran’s real leverage is economic and indirect, not conventional military might.

Turning to Russia, the ongoing war with Ukraine stands as a dramatic case study in misperception versus reality. When Russia first invaded, the world largely expected Ukraine to be swiftly subjugated. Instead, as of August 2025, Ukraine continues to resist, and Russian forces have suffered extraordinary losses—U.K. MOD estimates, “approximately 1,000,000 casualties (killed and wounded). Of these, it is likely around 250,000 Russian soldiers are killed or missing.” The scale of attrition has exposed vulnerabilities that most analysts and policymakers failed to anticipate.

From the Obama era through the first Trump and Biden administrations, the U.S. saw Russia as its dominant adversary. Yet this protracted war, now stretching beyond three years, has forced a reassessment. Russia remains formidable in domains such as cyberwarfare and disinformation, but the narrative of unstoppable power has been undermined by the realities of battlefield attrition, tactical missteps, and the resilience of Ukrainian defense.

This uncertain situation also points to the importance of strategy in Western commitments. The incremental, “just enough” military aid provided to Ukraine has proved problematic: it keeps the war ongoing without ensuring victory or a swift conclusion. I have long argued that only robust support or no involvement at all would have served Western interests—a half-measure merely prolongs the suffering, with no strategic benefit.

Despite initial beliefs in their overwhelming strength, both Russia and Iran have demonstrated that their “bark” has been far more formidable than their “bite.” Their leaders—Putin and the Ayatollah—have preferred to project war through perceived rather than actual strength, investing heavily in propaganda campaigns and influence operations – something that Western mainstream-media was all too willing to follow. This approach shapes perceptions internationally even as their actual capabilities have been exposed as more limited than once feared.

For U.S. policymakers, these conflicts stress the urgent necessity to reassess threats. Real danger to America does not always come from adversaries dominating the news cycle with bold rhetoric, but from those who wield tangible capacity to disrupt security and economic stability. Greater emphasis must be placed on understanding the financial and shadow networks behind proxy wars, the vulnerabilities hidden beneath the surface, and the subtle threats—cyber, economic, diplomatic—that don’t make headlines.

As President Trump and European leaders host Ukraine’s Volodymyr Zelensky at the White House in hopes of negotiating peace, the lessons of the past year have come into stark notice: reputation and rhetoric alone do not define adversarial strength. Real assessment must be built on honest appraisal of capability and intent, not amplified fears or outdated narratives.

The world is more uncertain than ever, but recent events have helped to shatter some longstanding assumptions. Iran, once considered an unassailable regional force, saw its military infrastructure dismantled in less than two weeks. Russia, assumed to be an existential threat to American and European stability, remains embroiled in a war it cannot win easily. The common thread is clear: threats must be measured by real capabilities rather than reputation alone.

For American security, the challenge moving forward is to see through the noise, to base policy on reality rather than perception, and to ensure that future responses are built on genuine understanding. Only by doing so can the U.S. and its allies secure lasting peace, deter aggression, and shape a future that matches the gravity of the moment.

Eli M. Gold is the president of the Gold Institute for International Strategy, a Washington, DC- based think-and-do tank.

The Cartel of the Wretched

This paper investigates the sprawling transnational corruption network known as the Cartel of the Wretched.      

Led by Dmitry Romanovich Li, a former schoolteacher turned oligarch, whose influence has infiltrated Uzbekistan’s political, economic, and energy sectors. Described as a “puppet master,” Li heads a vertically integrated cartel that manipulates critical industries—finance, energy, mining, telecommunications, healthcare, and public procurement—under the cover of Uzbekistan’s sovereignty and President Shavkat Mirziyoyev’s reformist agenda.

Alongside key operatives Prime Minister Abdulla Aripov and Minister of Economy and Finance Jamshid Kuchkarov, Li’s cartel controls over $14 billion in assets, generating an estimated $3 billion annually through illicit means.

At the heart of this network lies Octobank, a financial hub facilitating money laundering, sanctions evasion, and the diversion of state resources.

The cartel’s energy sabotage strategy caps renewable capacity at 20 GW— contradicting the president’s 50% renewable energy target by 2030—and prioritizes gas power plants aligned with Russia’s 2027 gas supply plans, deepening Uzbekistan’s energy dependency from Russia. Economically, this has led to a 23% drop in energy production since 2000 and a 54% decline in per capita energy supply, exacerbating living conditions and environmental hazards.

Geopolitically, the cartel’s ties to Kremlin-backed elites and its role in evading Western sanctions threaten regional stability and expose Western investors to significant risks. Evidence of violence, including assassination attempts and mysterious deaths, underscores the cartel’s ruthless enforcement mechanisms.

We urge immediate action from the Uzbek government and the international community to dismantle this shadow empire and safeguard Uzbekistan’s future.

To read the full paper click here

Eli M. Gold is the president of the Gold Institute for International Strategy, a Washington, DC- based think-and-do tank.

National Security Strategy

The purpose of this National Security Strategy (NSS) is to identify three strategically significant but neglected threats and opportunities that directly impact U.S. national security long-term. The first is an “uncomfortable truth” for much of official Washington. America’s authoritarian adversaries have infiltrated and subverted from within every key American government agency and institution. This is not a new phenomenon, but the current depth, breadth, and ferocity of such is unprecedented. The underappreciated reason for this is that, unlike during the Cold War, America’s authoritarian adversaries see their transformation of America into an authoritarian regime, like them, as a matter of life-or-death for their continued survival.

The second neglected threat addressed by this NSS is another uncomfortable truth. It is a byproduct, or natural consequence, of the aforementioned ideological infiltration of our government and institutions. Today, a significant percentage of America’s most senior leaders, including government and military officials, have adopted Beijing’s and Moscow’s strategic objectives for America as their own. This has resulted in a level of U.S. policy convergence with Beijing and Moscow that is weakening the U.S. and its allies while strengthening our strategic adversaries.

The third threat addressed by this NSS is a natural outgrowth of the second. Like America, most of our democratic allies face a plague of foreign adversary internal subversion. Given this common threat, instead of each ally addressing it alone, we should confront it together and see this shared, persistent, threat as an opportunity to professionalize the crafting and execution of alliance strategy against these and other challenges to our alliances.

Read More

China’s Rising Influence in the South China Sea: Implications for ASEAN and Global Stability

Evolving security dynamics in the South China Sea reveal a dangerous and highly volatile mix of aggressive posturing, legal defiance, and strategic manipulation.

As China increasingly asserts its claims over the fraught seascape and the vast mineral wealth lying underneath, the United States continues to demonstrate a military presence of its own, strengthening its relations with India and several ASEAN member states to bolster its position. Complicating this scenario even further are lingering fears that China will materialize a non-consensual unification with Taiwan within the next five years — an invasion that promises devastating losses to both sides.

The strategic importance of the South China Sea cannot be overstated: whoever controls it, controls the future of East Asia. With an estimated $3.37 trillion of goods – nearly 21% of all global trade – transiting annually, this body of water is not just a regional flashpoint, but a crucial economic lifeline.

Last year, Chinese Premier Li Qiang warned that misperceptions, diverging interests, and external interferences may give rise to a “new Cold War” in the region. As these tensions continue to grow, it is not simply the future of one of the world’s most vital maritime corridors that hangs in the balance, but the stability of the world order itself.

To download this paper Click Here.

The Failed Assassination of Former President Trump in Butler, PAHow did the Secret Service Miss the Warnings?

The Failed Assassination of Former President Trump in Butler, PAHow did the Secret Service Miss the Warnings?

The country and the rest of the world are still incredulous—how could a 20-year-old lone gunman manage to defeat the nation’s elite protectors and fire 8 rounds from an AK that nearly inflicted a fatal skull injury on a Presidential nominee? By divine intervention and the momentary distraction of the shooter by a Butler, PA police officer, Former President Trump escaped an assassination at a rally in Butler, PA on Saturday, July 13th. Now, more than three weeks later, despite two Congressional Oversight hearings with now former Director Cheatle and Acting Director Rowe there are still many unanswered questions and very troubling facts continue to emerge. Former Director Cheatle’s vacuous responses to the Oversight Committee’s questions and Acting Director Rowe’s equally indirect answers and misinformed statements on July 30th (including the FBI’s limited statements) have allowed serious questions to linger. Numerous theories, some supported with facts and other less credible, have been developing. Numerous articles have been published. Senator Grassley, as reported by Real Clear Politics, RCP on July 22nd, has received agency whistleblowers’ information, audio and texts from Butler law enforcement officers. These have exposed many disturbing, negligent lapses and security omissions contradicting many claims made by Cheadle and Rowe.

As of this writing, the Secret Service has been guarded with their responses to the Oversight Committee’s inquiry and to the public. Rowe’s limited statements seem to contradict evidence from Butler law enforcement authorities and video evidence obtained from the public.

In an effort to set the record straight and in the spirit of urging critical reforms, the following factual information supported by video evidence and statements from Butler Police officers and SWAT officers assigned to the rally on July 13th with direct operational knowledge, is set forth. It is critically important to bring clarity to the information being reported.

This review will highlight key omissions of protective advance procedures during the security planning of the July 13, 2024 rally. . Many recommendations set forth by the 435-page U.S. Secret Service Protective Mission Panel’s report from December 2014 (after serious security failures prompted this inquiry) were not fully implemented. Conspicuously absent among them was and remains—the failure of protective detail agents to complete consistent training—“at least 12% of work hours by fiscal year 2025.” According to Jason Chaffetz, the agency has woefully failed to achieve this training target. He says the Secret Service has been on notice since 2015 to implement effective changes, namely training and accountability to prevent the failures like those seen in Butler, PA.

The intent is to fact check the numerous statements and theories put forth by self-proclaimed experts and balance those with some credible authorities. In the spirit of separating facts from theory—context, background and explanations of the facts as we know them are sorely needed. Effective, tested protective strategies and advance procedures will be presented as a basis of comparison.

Normally I would not comment with this amount of detail on related matters. However, this assassination attempt has exposed systemic operational failures of the Secret Service’s protective arm and the advance team’s preparations. For example Real Clear Politics, RCP on July 30 referenced CNN reports and admissions by Rowe that expose the fact that security resources were denied for the Trump detail despite repeated requests by the detail agents. This has been an on-going complaint by detail agents and whistleblowers for at least two years. Denied resources for Trump rallies include counter sniper teams, drones, canine teams, metal detection equipment and other matériel. Further, documents show where Rowe decided unilaterally to restrict counter sniper teams to any Trump event beyond driving distance outside of D.C. While Cheatle, Rowe and the Secret Service spokesman initially denied this, whistleblower reports has forced them to confront their denials. RCP further reports the Butler rally was not allocated any counter sniper teams but Secret Service management reversed the decision and sent two teams to Butler with one day to conduct a survey that normally takes two to three days to complete.

This is appalling given the thousands of on-going death threats directed at Trump and the Iranian assassination plot discovered before the Butler rally.

All of us need to avoid feeding into conspiracies. Fair-minded folks want the forensics experts to complete their investigation and analysis based on facts. Hopefully this will minimize theories that are gaining attention. Additionally, when unsupported theories are not checked, there is a risk of feeding into them and they seemingly become more credible. The other risk is people tend to lose their objectivity and unintentionally get drawn into these conspiracies. With the cascade of information bombarding us, we have difficulty discriminating credible facts from fiction and “exciting” and “dramatic” theories. Everyone needs to be reminded to take a deep breath, pause and consider verified facts. To do this effectively, it is important to understand context and known factors.

The following is set forth based on what has been reported by credible, law enforcement agencies and other official sources on the ground at the Butler rally site, information from a closed-door Oversight Hearing, others familiar with the facts (as best that can be determined) and video evidence leading up to, during and after the assassination attempt. The FBI is continuing their investigation.

Tragedies as serious as a nearly successful assassination resulting in injuring a Presidential nominee, the death of one spectator and serious injuries of two other supporters is not an isolated event. There were and are a host of diverse factors at play at the Butler rally before and during that impacted the attack. Contributing factors are multi-factored and complex. Agency mission, leadership, federal statutes, intelligence information, agency policies, training, security resources, physics, human factors, political tension and others play a role.

Isolating these elements and assigning a predictive value of each poses a near impossible challenge.

Suffice it to say the collective circumstances (as we now know) at play leading up to, during and immediately following the attack are very disturbing and are indicative of the Secret Service’s negligent execution of their protective plan. Before we can move forward, key omissions and departures from established protective procedures need to be identified. This will give insights on factors that contributed to the security vulnerabilities and failings at the rally. Hopefully, this will help guide our understanding and conclusions based on fact and verified evidence. Most important, the ultimate goal is to learn how we can collectively, from our respective vantage points, do everything possible to prevent attacks like this from happening in the future.

While rare (the last assassination attempt of a president occurred 43 years ago), none of us are naïve enough to think a breakdown in security would never occur again. However, ensuring that effective, scalable security procedures are consistently implemented will minimize the possibility of a repeat (as much as humanly possible), is the goal moving forward. Hopefully this review will ensure a more diligent focus on preventive security measures. If a response is needed, it will be immediate and effective.

What we do know now is the earlier blame shifting of security responsibility, communications breakdowns and serious omissions of basic security advance operating procedures are worse than originally reported. The security missteps point to profound negligence in the execution of the security plan. Key to understanding the egregious breakdown in security is answering how the shooter slipped through the cracks after being observed by local counter snipers at a picnic table on July 13th at 4:26 PM. A Beaver County counter sniper’s text message released by Beaver County officials reported initial sightings of a suspicious individual about 100 minutes before the shooting. He was observed by a Pennsylvania State Police Officer with a range finder exhibiting suspicious behavior. His photo was reportedly sent to the Police Command Post. Apparently this information was not passed to the Secret Service Security Room at this first sighting. A video taken more than an hour before the shooting, at about 5:06 PM, shows Crooks in front of the AGR building. This sighting of a suspicious person was reported to police by spectators. Police on the ground were looking for him up to the time of the shooting.

On July 23, 2024, the New York Times reported the FBI determined a local SWAT team spotted Crooks on the roof of a warehouse about 18 minutes before Trump took the stage (about 5:44 PM) and 27 minutes before the assassination attempt (6:11:33 PM). Why was this report of a man on a roof lost and/or not reported to the Secret Service and the other officers at the rally?

On July 19, 2024, CBS News reported information from three sources that closed door meetings between Secret Service/FBI officials and law makers the Secret Service was aware of a suspicious person 20 minutes before the shooting began. At 5:51 PM State Police alerted the U.S. Secret Service about a suspicious person within a minute of this sighting.

Why were the Trump protective detail agents not immediately notified? Why was Trump not informed? Trump took the stage at 6:02 PM, a full 17 minutes after multiple reports of a suspicious person with a range finder were received and passed to law enforcement radio channels? The Secret Service treated this as a generic suspicious-person-notice until minutes before the shooting.

The delayed, ineffective response to these warnings violates the Secret Service’s core protective responsibility to notify the protective detail and the post agents of potential threats when the behaviors fit the lone shooter profile. Crooks’ behavior was not “merely suspicious.” The first sightings of Crooks alarmed police officers. To deem Crooks’ behavior as merely suspicious is irresponsible. Further, in the context of the thousands of documented threats received by the Trump detail, the Secret Service Intelligence Division and the Iranian assassination plot received before the rally, an urgent and heightened alert and response to the reported behaviors were clearly in order. The Secret Service’s own threat assessment center provides guidance to employees and law enforcement agencies to assist in the detection of would be attackers (See Planning-page 12-18). Why were these lone shooter profile behaviors, that fit those being exhibited by Crooks, not considered when these reports were received?

Crooks exhibited many of the predictive behaviors identified by the Secret Service and other numerous post shooting attack studies associated with lone shooters. The investigation to date shows Crooks visited the rally site at least twice before the rally and once (leaving and returning) the same day before the attack. Crooks evaluated the rally site two hours before the rally with his own drone, probed security at various locations, brought a range finder and paced nervously before leaving, apparently eluding officers trying to locate him. All of these behaviors, sightings and notifications by local police officers and spectators, were not prioritized as a threat by the Secret Service until Crooks was seen with a rifle on the AGR building. Why didn’t the Secret Service agents and the Secret Service counter sniper teams link these behaviors to the behavioral profile known to be typical of lone shooters? Cheatle lamely claimed to the Oversight Committee the suspicious behavior was only “suspicious” and not deemed a threat until Crooks was seen with a gun on the roof of the AGR building. Not prioritizing this as a threat and alerting the Trump detail immediately about Crook’s’ early behaviors, known to be linked to the behavioral profile of known shooters, is nothing short of negligent. On July 30, 2024, at the Oversight Committee hearing, Rowe gave an equally evasive answer to Senator’s Lee’s question as to why Trump was allowed on the stage with the behaviors cited above. Rowe stated (0-:27) a threat needs a weapon “it comes to weapon, a potential threat, is he carrying an IED…? To be characterized as a threat, Rowe’s statement that Crooks needed to have been seen with a gun or IED before decisive intervention should be taken is naïve. This exposes his lack of understanding and failure to link Crooks’ behavior as more than suspicious despite sightings of Crooks with a gun well before the shooting.. Assessments like this chill decisive decision making. Similar indecision allowed Omar Gonzalez to scale the White House fence on September 19, 2014, overpower a Uniformed Division Officer and enter the Diplomatic Entrance of the White House.

The behavioral profiles cited in the Secret Service Threat Assessment Centers Mass Attacks in Public Places Guidance recommendations, published in January 2023, define behaviors displayed by Crooks’ as threatening. Similar pre-attack behaviors are clearly linked to shootings and have been validated in published metadata summarizing the conclusions of studies of mass shootings in the past 40+ years. Crooks’ behavior should have been linked to the lone shooter behavioral profiles. Crooks exhibited many of these behaviors before Trump took the stage. To attempt to ”dilute” these disturbing behaviors that exceed the baseline of normal spectator behaviors, is negligent. If the Detail Leader and shift agents protecting Trump were notified after the first sightings (they were not), Trump would have been held in the limo or holding room or taken off the stage until the suspicious person was located.

Not informing the Detail Leader, Trump and the rally security agents about the suspicious person from the early sightings, especially his nervous movements, possessing a range finder and evading police is among the most egregious failures at the Butler rally. The Police Command Post and the Secret Service Security Room should have informed the Secret Service detail protecting Trump—immediately.

The FBI investigation has now confirmed Crooks exhibited many other pre-attack behaviors, i.e. using aliases to purchase precursor bombmaking materials and researching the DNC schedule in Chicago and historical assassination details.

The most important protective tool required to effectively protect people and assets are competent security team members, a thorough security advance and a diligent review of the security measures before the visit of the protectee. The security advance elements, resources and physical response protocols need to be rigorously applied and continually refined to match evolving threats and be scalable to adapt to changing circumstances.

Any effective dignitary security advance requires teamwork by developing a cohesive team with ALL partners in the city and jurisdiction being visited, especially the public safety responders.

Presidential advances and Presidential campaign advances with heightened political tension with thousands of protectee death threats require diligent attention to every facet of the security preparations. Commensurate manpower, resources, a scalable security plan and oversight that match threat levels is required! This is a tall order but needs to be done.

Information gleaned from the Butler County law enforcement agencies assigned to the rally site, whistleblowers and members of the public to include videos taken, before, during and after the shooting are detailed below. All point to the fact many immutable tenets of protection were not followed, not implemented and/or ignored.

U. S. Secret Service Legal Authority

Before the deviations from and omissions of well-established Secret Service advance procedures are identified and explained, the legal protective authority needs to be referenced. Very few media outlets are reporting this.

The jurisdictional investigative and protective authority of the Secret Service is defined in the United States Code, Title 18 Section 3056. As it relates to Presidential and Vice-Presidential candidates, the following section of the Code specifically applies.

Title 18 U.S.C.’ 3056(a)(7) authorizes the U.S. Secret Service to provide protection for major Presidential and Vice-Presidential candidates.

This authority cannot be abdicated to local law enforcement. Former Director Cheatle and Acting Director Rowe erroneously stated it could be. Cheatle claimed local law enforcement were responsible for the security of the AGR Building in Butler, PA. Crooks fired eight (8) AR rounds from the roof in the direction of the stage hitting Trump and three others. Cheatle specifically stated the AGR building was outside the security perimeter and the building was not swept. Cheatle essentially blamed local law enforcement for the security failure.

On July 30, 2024, Acting Director Rowe testified: “We made an assumption that there was going to be uniformed presence out there, that there would be sufficient eyes to cover that, that there was going to be the local counter sniper teams.”

These claims fly in the face of the statements of the local police officers assigned to support the sectors and posts at the Butler rally. Cheatle and Rowe attempted to shift blame and responsibility to local law enforcement. This is not supported by law nor precedent. It is simply not tenable.

The USSS is always responsible for identifying and preventing any threat regardless of its origin; inside or outside established “secure” perimeters during an official event. This has never been proffered as a defense for absolution of protective responsibility in the history of the Secret Service. The Secret Service is the overall lead agency responsible for all Presidential candidate security arrangements. This is not delegable.

On July 20, 2024,The New York Times reported that several local officers, including Butler County Sheriff Michael Slupe, stated:

None of the law enforcement agencies that assisted the Secret Service that day — the Pennsylvania State Police, the Butler Township Police Department, the Butler County Sheriff, Pittsburgh Bureau of Police or the multicounty tactical teams—say they were given responsibility for watching the zone outside the Secret Service’s fenced security perimeter…More specifically, the local law enforcement officials stated that none of them were assigned to safeguard the complex of warehouses just north of the farm show grounds including the AGR building.

Alarmingly, statements made by the local agencies indicate the majority of their assignments were to provide security inside or along the perimeter fencing leaving the outside perimeter beyond the fencing exposed. The only outer perimeter police presence were officers assigned to direct traffic. There were however, three local counter snipers assigned to use the 2nd floor window from inside of a building adjacent to the AGR building. They were instructed to monitor the inner perimeter crowd only.

Butler Township Commissioner Edward Natali stated unequivocally:

“There were seven officers all assigned to traffic detail. Period!! The BTPD was NOT responsible for securing AGR or any other location…“Anyone who says so, reports on it, implies it, etc… is uninformed, lying, or covering their own backsides.”

The seven Butler Township police officers were assigned traffic posts but once there was a suspicious person notification, four of the seven officers left their posts to look for him.

Anyone familiar with basic security understands that limiting exposure requires creating strong, integrated and functional perimeters. Limiting your focus on the inner perimeter is just plain myopic, especially in an environment with upswept and unposted buildings in the outer perimeters less than 150 yards away from the protectee. It appears the Secret Service advance team forgot one of the most basic security perimeter concepts—all rings of security need to be fortified and integrated into the overall security plan. It needs to be one team, one fight. An absence of security or weakness in the outer security perimeters reduces the time needed to respond to a threat and shortens the distance between the attacker and the protectee—all factors favorable to the attacker.

Security Advance Omissions Leading to Critical Failures

Normally a Presidential and/or Presidential candidate security advance, especially one conducted for a candidate nominee of Trump’s stature and threat level, should include tested advance protection procedures that have been implemented consistently by the Secret Service for decades. These are well documented in Candidate Nominee Operations directives and manuals. Terminology of these may vary but their security function is clear. Omissions of these could lead to catastrophic consequences. In Butler there were key omissions and an assassination nearly occurred as a result.

Credible sources, whistleblower reports, local police agency statements and Oversight Committee hearing testimony identified negligent deviations and omissions of standard Secret Service protective operation procedures.

It is noted many of the security omissions have been acknowledged by Cheatle and Rowe. Other missteps have been denied despite local police officer statements/texts, whistleblower reports, Secret Service emails and media reporting.

Security Advance Omissions/Oversights:

· Assigning an inexperienced agent to lead the advance in Butler, PA.

· Middle perimeter security manpower included 1-2 Secret Service agents, far fewer than comparable size rallies.

· The security plan was inner perimeter focused with less emphasis on the outer perimeters.

· Local police officers were too siloed and not integrated with the overall security plan.

· Unclear radio communications reporting procedures.

· No officers were assigned to monitor the perimeter beyond the rally perimeter fence to include the AGR building and other warehouses.

· Secret Service did not attend a police meeting with local police counterparts. This prevented functional pairing of Secret Service agents and police officers.

· No helicopter surveillance was provided.

· The Secret Service did not deploy a drone and declined one offered by local law enforcement.

· No Counter Surveillance Unit or Intelligence Unit were available.

· The Secret Service counter sniper team was deployed one day before the rally.

· Four local counter sniper units were located inside the rally perimeter fence; three others inside an adjacent building (next to the AGR building) to monitor the rally

· Secret Service agents did not monitor the AGR building.

· The Secret Service counter sniper teams were not operationally integrated with the local sniper teams.

· No supervisor site review or walk-thru was conducted before the rally.

Resulting Operational Failures:

There were numerous failures resulting from not following established security advance procedures. On July 19, 2024, Breitbart reported nine critical, interconnected planning failures. These are all the result of a negligent failure to follow established advance procedures. These are valid but deserve more context. The following failures are identified to date.

Collectively these oversights led to critical operational failures, the most egregious of which was not communicating Crooks’ threatening behavior to the entire security team when it was first noted by the police at least an hour before the shooting. There were several opportunities after the first sighting of Crooks that should have been communicated to all the police officers and the agents assigned to the rally and critically, to the Trump detail agents.

Given the number of police agencies assigned, the potential for disjointed communications, coordinated through two separate communications hubs, should have been anticipated. A dedicated emergency reporting channel should have been set up and tested. These communications and related technology updates to include drones have been acquired but the Secret Service has been slow to adapt and implement them.

The Secret Service advance agent should have requested the local snipers to take positions outside the AGR building.

The Secret Service drone was not utilized in Butler. Inexplicably, the Secret Service turned down a drone offered by the local police.

A counter-surveillance agent or roving intelligence team should have been available to respond to reports of a suspicious person.

The advance agent should have met with the Secret Service counter sniper teams and local sniper teams to establish a joint workable operations plan. The Secret Service counter sniper survey should have been jointly reviewed with the local sniper teams. This would have identified vulnerable areas and clarified the rules of engagement and statutory authorities. This would have provided would have provided for better sector surveillance and a more cohesive operational team. This would have made life and death split-second decision making more accurate. The fact the Secret Service counter sniper teams did not have communications with the local sniper teams. Collectively, these factors and others contributed to delays.

Secret Service emails reported by Real Clear Politics obtained by Senator Grassley determined 1 – 3 Secret Service agents were assigned to support the Butler rally. Whereas 12 Secret Service agents were assigned to First Lady Dr. Jill Biden for a function in Pittsburgh the same day. The majority of security posts were assigned and held by Homeland Security agents. Current and former Secret Service personnel expressed concern over this and similar disparate resource allocations, i.e. giving Biden more resources than Trump. Trump detail agents have reported this disparity for at least two years prior to the Butler assassination attempt. At the July 30th Oversight hearing Senator Cruz asked Rowe about these and other documented discrepancies, Rowe’s stated rationale was “the sitting president holds national command authority to launch a nuclear strike, sir.” Rowe’s answer (4:30-7:34) did not address threat levels against Trump and how that would affect security resource allocations and the actual numbers disparity.

Senator Grassley, Real Clear Politics and whistleblower reports exposed that Cheatle and Rowe were directly involved in denying requests for needed crowd screening equipment, additional agency manpower, counter sniper teams and other resources for Trump rallies.

It is noted that Rowe was evasive and did not answer the question: “Did you directly approve withholding security resource allocations for Former President Trump vis à vis President Biden events?” This disparate resource allocation exposes more vulnerability to Trump. Notably, no Secret Service counter sniper teams were given to support Trump’s rallies prior to the Butler, PA rally. To rely on local sniper team(s) as the sole sniper resource, with admitted radio interoperability problems between the local police and the Secret Service, poses numerous operational risks.

Two Secret Service counter sniper teams were assigned to the Butler rally a day before the event. Normally, counter sniper teams are deployed 2 – 3 days prior to an event for the current sitting president. At the Butler rally two Secret Service counter sniper teams and local sniper resources were used. At the July 30th Oversight Hearing, Senator Lindsey Graham asked Rowe if the Iranian assassination plot factored into the security footprint. Rowe replied: “Secret Service does a threat based protective model.” Whistleblower reports, Real Clear Politics and Representative Mike Waltz dispute this since the Trump detail agents claim additional security resources have been historically denied. denied and prior to the Butler rally by Secret Service managers, (i.e. Cheatle and Rowe). Secret Service spokesman Anthony Guglielmi and Rowe claim otherwise. In fact Rowe testified these assertions are false.

Nowhere in the U.S. Code, Title 3056(a)(7) is there a caveat for less effective or fewer security resources when there is a clear, on-going death threat level which Trump clearly had and continues to have. The mission of the Secret Service requires it to deploy resources commensurate with the protectee’s threat level as much as possible. Every Secret Service protectee deserves this. To do otherwise invites an attack as we saw in Butler. It is well documented, supported by decades of metadata, that many would-be attackers, especially lone attackers study their targets, note and exploit vulnerabilities.

Approximately a week after the assassination attempt, several local law enforcement officers from Butler, PA appeared on ABC News and asserted the Secret Service advance team did not coordinate or meet with them before the rally. Jason Woods, the lead sniper stated: “We were supposed to get a face-to-face briefing with the Secret Service members whenever they arrived, and that never happened.” Further, Woods stated: “So I think that was probably a pivotal point, where I started thinking things were wrong because it never happened,” Woods said. “We had no communication.”

Investigations have determined the Secret Service detail agents protecting Trump were not notified of this suspicious person at any time from the first sighting up to the time he was sighted on the roof. It is noted other Secret Service agents were informed at least 20 minutes before the first bullets were fired. The detail agents should have been notified immediately as soon as a suspicious person was spotted on the roof of the AGR building, at the very least at 5:53 PM. At this point, the suspicious person was no longer “suspicious” by any definition.

There is no way this can be excused. This was now an imminent threat! This notice should have given the detail at least during the 17 minutes and 30 seconds (when Crooks was seen on the roof of the AGR building) to inform the Detail Leader to make the decision to remain in the limo or in the holding room until the threat had been resolved.

There are many hundreds of examples in Secret Service history when a protectee has been moved to or held in a holding room or removed from a site when threats and vulnerabilities are identified.

During the hearings, Rowe acknowledged some radio transmissions were and lost and not relayed. He attributed the miscommunications and delays to the Secret Service’s encryption algorithms. He stated integrating the encrypted system would take many weeks. Certainly that is not a reasonable solution during an emergency and cumbersome since each jurisdiction has their own radio technology. Radio interoperability has long been a problem for responders. It was cited in the 9/11 Commission Report following the Al Qaeda terrorist attacks on September 11, 2001. Since then, significant government resources have been provided to law enforcement agencies to achieve better radio interoperability technology among agencies. Notably, following the Oversight Committee Report – U.S Secret Service: An Agency in Crisis, infrastructure investments were made starting in 2017 to facilitate the integration of radio communications between Secret Service and local police. This technology was available but not implemented at the Butler rally.

To blame secure radio encryptions for the delay in getting immediate messages from police officers to the Police Command Post and the Secret Service Security Room is not an excuse.

Creative and imaginative thinking including using common sense solutions like cell phones, jointly staffing Command Posts and or Security Rooms with local police radios would have minimized urgent threat notification delays. Simply having someone physically dispatch to the Command Post to personally deliver urgent messages during the approximately 20-minutes Crooks was sighted on the roof might have saved the day.

The Secret Service Presidential candidate advance teams are normally staffed by agents assigned to the field offices within the jurisdictional, geographic boundaries of the closest field office. Agents are also detailed from other offices as manpower needs and availability dictate. The security advance procedures for a Presidential and a Presidential nominee should have equivalently experienced personnel, resources and technology vis-à -vis for a sitting president’s advance. There should be no qualitative difference—the same protective standards should remain consistent. Whistleblower reports indicate the site advance agent assigned to the Butler rally was not experienced with large-scale advances.

For example, the middle perimeter was staffed with Homeland Security Investigative Agents reportedly with little to no experience with Secret Service protection assignments.

Strategic Failures

Among numerous burning questions: How could a lone 20-year-old with relatively cheap equipment, i.e., a drone, range finder and his father’s AR rifle defeat the Secret Service with 22 agents and approximately 80 additional law enforcement officers assigned to secure the Buller, PA rally site?

Obviously money and supposedly years of sophisticated dignitary protection training, state-of-the-art security surveillance technology, access to classified threat intelligence, an expensive array of assault weapons, encrypted communications systems—all failed. What was missing? Was it leadership? Was it a flawed security strategy? Was it incompetence? Was it an inability to assess risk? Was it an inability to communicate? Was it an inability to craft an effective protective security plan? Was it a combination of all of these?

Or…was it a lack of imagination? The experience and millions of dollars’ worth of equipment available to the Secret Service appeared to be no match for understanding and effectively implementing these tools to counter a lone 20-year-old shooter. Was the Butler, PA attack a one-off or does this expose profound weaknesses of the protective arm of the Secret Service?

Matthew Crooks clearly defeated the Secret Service at its own game. How is this possible? Are the Secret Service advance procedures too canned, too predictable? Strategic planning organizations in the public and private sector, especially in high threat environments, employ Red Team teaming. At a basic level this means considering the adversary’s perspective and goals. Simulate an attack as an adversary would and fortify against it with your security planning. In other words, wear two hats—your good guy hat and the bad guy hat. This will be fairly obvious to seasoned military planners and strategists, However, since this strategy appears to be absent from the security planning at Butler, it deserves to be mentioned. In simple terms…advance planners need to ask themselves: if I were a shooter or bomber, where are the vulnerabilities in this plan? What weakness would I exploit? Then as a security planner I need to ask what am I doing to fix them? This needs to be an evolving, on-going process. These are basic strategic security planning questions. The Army does this on a continuing basis.

There is no evidence the Secret Service conducts any substantive Red Team exercises. The irony here is Crooks did it for them by exposing the security plan’s egregious weaknesses. This is a jolting and tragic wake-up call. Crooks’ budget was probably less than $500. The Secret Service Presidential Campaigns and National Special Security Events budget is reported to be ~$73.3 million from the Office and management and Data. Clearly the security failures are not due to a lack of money.

It is as though Crooks had the Candidate Nominee Operations advance manual and observed the security advance planning. Crooks visited the site, researched Trump’s schedule, surveyed the site and stage with a drone and probed and tested security.

Leadership should have given the security advance team the training and tools needed to at least be on par with Crooks. Clearly the planning should have expanded the security footprint well beyond the security perimeter defined by the fence. Assuming the outer perimeters were covered by local law enforcement without the requisite police meetings was negligent.

What if the attack had been planned by well-trained terrorists using multiple, simultaneous attack methods as witnessed in the series of coordinated Islamist terrorist attacks on Friday, 13 November 2015 in Paris, France?

Homeland Security published planning guidance to prevent Complex Coordinated Terrorist Attacks (2018). Other salient examples include Mumbai (2009), Brussels (2016) and Barcelona (2017).

Would the Secret Service be able to detect an attack plan like these let alone respond to them?

Since the 9/11 attacks billions of dollars of government resources have been invested in defense strategy revisions, police, military and emergency responder training, communications upgrades and field exercises to better equip all concerned to address evolving threats. The National Response Framework (2019) defines five core capacities to guide the training of the response community: prevent, protect mitigate, respond, recover. The purpose is to “better integrate government and local response efforts.” Simply stated, all security partners need to focus more on prevention and work as a cohesive team.

This guidance needs to be incorporated and operationally reinforced into all joint security efforts.

Goals Moving Forward

To learn the Secret Service systematically failed to protect one of the nation’s Presidential candidate nominees is extremely troubling. The implications are staggering. Given the assassination attempt of Trump at Butler, PA and the security vulnerabilities this has exposed, restoring the pre-eminence of the Secret Service is critical. The highest priority needs to be given to finding long-term solutions. This has national security implications.

Solutions moving forward are challenging since the security failures are a multi-factored problem. Among the most important—stronger leadership, better recruiting, balanced funding allocation, refining intelligence sharing, consistent training, accountability and continuing oversight. The implementation of key protective training initiatives and procedures require review. These include simulated attack exercises, 4th Shift Training field scenarios and practicing advance agent procedures and protocols. It appears many were omitted and/or not followed during the security planning of the July 13th rally.

Immediate recommendations should include committing to a thorough review and implementation of existing protective security policies and procedures. The budget allocations should be balanced more equally for investigations vis à vis protection. The current Secret Service allocations are approximately 70% for the investigative arm and 30% for the protection arm respectively.

Importantly, manpower supplementation for protective details from Homeland Security, should require protective training on par with the protective training metrics required of Secret Service agents. The required training hours for all protective agents should be increased as outlined in the GAO January 2022 Human Capital Strategic Plan.

The Secret Service needs to bring clarity to the remaining questions surrounding the assassination attempt more than three weeks later. Their protectees, the American public, and government legislators deserve it.

The world of team sports provides a compelling metaphor for how games are won. Team members are assigned positions based on ability and experience. They rehearse their plays incessantly until they get it right.

If the Secret Service team expects to win their zero-fail mission, they will need to rebuild a foundation of trust—first. Leadership deficits, disparate experience levels, inconsistent training, dated technology, and other security advance omissions are fixable. Restoring trust with the brothers and sisters in blue and with your prized asset—your protectee poses your biggest challenge. Winning is impossible without trust.

J. Lawrence Cunningham is a Senior Law Enforcement Fellow at the Gold Institute for International Strategy, a Washington, DC-based, foreign policy and national security think tank. Prior to joining the Gold Institute he served as special agent-in-charge in the U.S. Secret Service.

Retired Army General: ‘Somebody Failed to Appreciate the Militarily Significant Aspects of Terrain’

IMAGE: Layout of the Butler Farm Show fairgrounds, Butler, Pa., where a sniper fired several shots at President Donald J. Trump, and hit his right ear, during his July 13, 2024, rally there. The shooter was roughly 150 yards away from Trump, and to the left of the president and Secret Service counter-snipers. (RedState graphic by Neil W. McCabe from Google Earth image)

(This article first appeared in RedState.com: https://redstate.com/mccabe/2024/07/14/retired-army-general-somebody-failed-to-appreciate-the-militarily-significant-aspects-of-terrain-n2176868)

By: Neil W. McCabe, Media Fellow

The retired Army general officer who led Kurdish Peshmerga guerilla troops in Iraq and who now serves as a senior staffer for a Florida congressman told RedState, as a military man, the Secret Service must look at what went wrong before the July 13 assassination attempt on President Donald J. Trump.

“They’ve got to do an absolutely serious after-action review, not just for their sake, not just for the sake of any future presidents, but the sake of this country,” said Brig. Gen. Ernest C. Audino, who was commissioned as a second lieutenant upon his graduation from the U.S. Military Academy at West Point, N.Y.

“They got to figure out where the failures occurred, and it’s got to be an honest after-action or review—no thin skins—and if you fouled up, own up to it because there were failures along the way,” said the general, who is a senior military fellow at the Washington-based Gold Institute for International Strategies.

“My hypothesis is somebody failed to appreciate the militarily significant aspects of terrain,” he said.

Audino said it is his contingent assessment that mistakes made before the rally led to a potential catastrophe affecting the American political system and the world’s geopolitical stability.

Audino: The terrain tells you where threats can make you vulnerable

The general said that the Army has a process for making threat assessments that would have produced for the Secret Service personnel a limited set of locations where a hostile actor could attack the president.

He said the Army calls the battlespace analysis process OAKOC for obstacles, avenues of approach, key terrain, observation and fields of fire, and cover and concealment.

“Without any other information right now, my guess is there were likely failures during the planning and reconnaissance phase,” said the former director of nuclear support for the Defense Threat Reduction Agency.

“When they received the mission, they should have initiated the reconnaissance out to the area, and someone should have been going through this checklist,” he said.

He said the first item on the checklist is determining the no-go areas on the terrain. These are the places where no one would or could go.

Security personnel next need to figure out the avenues of approach or the go-terrain, he said.

Then, they must determine which pieces of terrain along the avenues of approach that offer advantage to the hostile actor—that’s your key terrain, he said.

Among the sites of key terrain on the Butler Farm Show fairgrounds were the rooftops, Audino added.

“We can say all of those high points in the area like those rooftops, and there weren’t many of them, so it’s not like they were overwhelmed by the sheer number of rooftops. There were only a few that were relevant to the area of operation,” he noted.

Once you have identified key terrain, such as the rooftops in Butler, the military mindset is to determine how the hostile actor could attack, he said.

Audino: Why weren’t the rooftops secured?

“Where could an enemy achieve observation and fields of fire that’s relevant to the mission of this event that’s coming up?” he asked.

Throughout the interview, Audino kept returning to the rooftops, and where a hostile actor could be concealed.

“Once you’ve identified the key terrains, avenues to the terrain, and places in the terrain where the hostile actor could observe his targets and conceal himself, the Soldier is left with a finite set of locations to be secured,” he said.

He said that then you have to find areas where a hostile actor or threat could find cover and concealment.

“Once you’ve identified those areas, then you’ve got to secure them some way,” he continued.

“Why was there no presence on that rooftop or near that rooftop? Why was there no effective fire over watching that rooftop?” he asked.

The general said he understood that security personnel were in position, but they did not stop the attack.

“Was it that they weren’t alert, or they had other sectors they were watching?” he asked.

“There are times when the hostile actor has the advantage because he has initiative, but terrain analysis helps you identify his most likely courses of action,” he said. “But you never have perfect knowledge.”

One factor in the Butler shooting is that law enforcement has a different culture and different processes, he explained.

“From my perspective, the law enforcement mindset is investigatory,” he said.

“It’s a different analysis at some level, first before anything else, the military is looking to destroy the enemy,” he said. “The military is looking across the military aspects of terrain, and they’re accounting for what they know, what they don’t know and what they think.”

“The military approach is to figure out the possible source of threats and how to neutralize the threats,” he said.


Audino: Risk assessment must consider the cost of failure

“In a military operation, the Soldier conducts his risk assessment along with calculating what risks are acceptable and what risks are not acceptable,” the general said.

“We could very well find out that this Secret Service detail wasn’t resourced by the Secret Service commensurate with the threat.”

“Certainly,” he continued, “the assassination of Trump was an unacceptable risk, which meant all the planning had to consider the cost of failure.”

“The threat is significantly higher on this presidential candidate as a former president than virtually any other presidential candidate in history.”

“It’s hard to say much risk here is acceptable because the risk of failure is so high,” the general warned.

“I saw somebody just made a comment publicly that we were one inch away from a civil war–I mean, maybe that’s a stretch, but maybe it’s not.”

Neil W. McCabe is a Washington-based journalist and media consultant. He is a senior NCO in the Army Reserve and Iraq War veteran. Follow him on Twitter: @neilwmccabe2 GETTR/TruthSocial: @ReporterMcCabe

THE GATHERING MIDEAST STORM:ENDURING HISTORY LESSONS

Part One:

Israel’s Relations with the United States

1956-1967……………………………………….……Page 3

Part Two:

Israel’s relations with the United States

1967–2007………………………………………………………….Page 9

Part Three:

The country’s nuclear quest and failed U.S. efforts to stop it.

1968–2023………………………………………… Page 19

Part Four:

Israel’s Timing Dilemma: Lessons Not Yet Learned……. Page 31

Part One:

Israel’s Relations with the United States, 1956-1967

This is the first of four articles covering the interlinked topics of Israel’s relations with the U.S., and the challenge posed by Iran’s nuclear program. Part One focuses on the Suez Crisis of 1956. Its outcome was to reshape the Mideast, and influence U.S. relations with key powers from then to the present, albeit in changing ways. Part Two will cover U.S-Israel relations from the 1967 Six Day War through the 2007 Israeli bombing of the Syrian nuclear reactor. Parts Three and Four will cover U.S. and Israeli relations with Iran, focusing on Iran’s nuclear program.

As Israel turns 75, it faces an acute existential crisis, in the form of an Iran bent on joining the nuclear weapon-state club. Compounding Israel’s peril is that its primary ally, the United States, sports an administration openly hostile to the Jewish state. Team Biden is obsessed with the desire to make a new accord with Iran akin to that made by former president Obama; it is equally obsessed with pressuring Israel to withdraw fully to its pre-1967 boundaries, which former foreign minister Abba Eban famously called “Auschwitz lines.” And with incredibly foolish perversity, it is intent on prioritizing its twin obsessions over the historic Trump-brokered Abraham Accords, which made for the first “warm” peace between Arab and Jew in the 14 centuries since Islam first appeared on the world scene.

To better grasp the dynamic of the U.S.-Israel relationship in this context, it is useful to examine six elevated use-of-force crises that confronted Israel: the 1956 Suez Crisis; the 1967 Six-Day War; the 1973 Yom Kippur War; the 1981 Israeli airstrike on Iraq’s nuclear reactor; the 1991 Gulf War; and the 2007 Israeli airstrike on Syria’s nuclear reactor. In each crisis, in different ways and at different levels of nuclear risk, the prospect of possible use of nuclear weapons played a role in crisis resolution, Iran’s nuclear quest and alliance relations. The prospective consequences of choices made by the players ranged from crisis resolved to calamitous conflict. Lessons that can be learned—albeit so far decidedly not learned by key players—may pave the way for ultimate adoption of a better strategy to prevent Iran from crossing the military nuclear threshold.

Suez 1956. The run-up to the pivotal events of late 1956 began with the 1952 overthrow of Egypt’s King Farouk by a group of Army officers in what became known as the Free Officers Coup. (A brief digression: Two leaders of that group later became president of the nascent Egyptian republic and world famous: Gamal Abdel Nasser, who dominated the Mideast from 1952 to his death in late 1970, mainly due to his triumph during the Suez Crisis; and Anwar el-Sadat, who altered the Mideast diplomatic landscape during his ascendancy, from 1972 until his assassination in 1981.

A landmark, extraordinary book by Hudson Institute scholar Michael Doran, Ike’s Gamble:America’s Rise to Dominance in the Middle East (2016), provides a detailed narrative of the key events, players and the geopolitics surrounding Suez. Doran’s narrative contradicts on many points the conventional wisdom of six decades on Suez, i.e., that it was an American triumph that stood for international law and against arch-colonial powers.

In 1954, Nasser began negotiating for transfer of control over the Suez Canal, the major international waterway linking the Mediterranean Sea with the Arabian Sea; the former gave access to the Atlantic Ocean, the latter, to the Indian Ocean. Opened by France in 1869, it fell under British control when Britain assumed imperial rule over Egypt in 1882. British rule began to unravel in 1945, after the end of World War II; postwar idealism gave birth to decolonization movements in countries that had been colonized in the immediately preceding centuries by the great European powers, thus unleashing what British prime minster Harold Macmillan (1957-62) called “winds of change.” A seminal event was the conference of 29 “non-aligned” Asian and African nations—ostensibly diplomatically neutral but mostly tilting toward the Soviet Union—held in April 1955 at Bandung, Indonesia. Nasser emerged from the conference as the leading Mideast figure.

The United States was a staunch proponent of postwar decolonization under three presidents: Franklin Roosevelt, Harry Truman and Dwight Eisenhower saw a geopolitical opportunity to win friends and influence people in the post-colonial era. In part they were motivated by principled opposition arising from America’s own break with colonial Britain. FDR also met with King Ibn Saud in 1945, seeking access to petroleum. Though Truman had been persuaded to recognize Israel upon its declaring independence in 1948, virtually the entire foreign policy establishment in both parties strongly opposed the decision, and saw America’s future interests in the Mideast aligned with the Arab nations. In 1954 Winston Churchill, midway through his final tenure as prime minister, warned Anthony Eden, who was to succeed him in 1955, about American power:

Up to July 1944, England had a considerable say in things; after that I was conscious that it was America who made the big decisions. She will make the big decisions now. . . . We do not yet realize her immeasurable power.

The Eisenhower administration ardently courted Nasser, believing that he could be coaxed into joining the Western alliance. The centerpiece of the Eisenhower plan for the Mideast was to create an alliance akin to NATO, based upon what they called the Northern Tier: thus they created the Baghdad Pact, centered upon French Syria and British Iraq. Ike’s minions even fantasized that Egypt would join the new alliance. To the contrary, it was anathema to Nasser’s pan-Arabist ambition to become the leader of the entire Arab Mideast.

Nasser dangled possible cooperation with the U.S. in constructing the Aswan High Dam, whilst getting to U.S. to press Britain for concessions over basing rights after conclusion of a Suez agreement. In 1955, Nasser made an a massive arms deal with Czechoslovakia, a member of the Warsaw Pact; the U.S. risibly assumed that because the Czechs had supplied Israel with arms in 1948 and Israel remained in the Western orbit, that Nasser’s Egypt would follow suit. Nasser also made a deal for construction of Aswan, ostensibly offered by the Soviets purely for commercial purposes. The U.S. had attached alliance and security goals to its proposal. Nasser persuaded the Americans that he was in a contest between hard-liners and moderates, with himself supporting the moderate faction. This ruse worked perfectly (as it was to do decades later when Americans sought “moderates” inside the Islamic Republic of Iran to curb the regime’s revolutionary goals.)

When concessions over British basing in the area did not materialize, on June 13, 1956, under pressure from Nasser, British troops ignominiously departed the Canal Zone, thus freeing Nasser to make his move. In August 1956 Nasser nationalized the Canal, triggering the three-month Suez Crisis.

Eisenhower was mesmerized by the Tripartite Declaration of 1950, under which the U.S., U.K. and France guaranteed to come to the aid of nations who they saw as victims of aggression. Saith Ike; “We must honor our pledge . . . we cannot be bound by our traditional alliances.” Ike saw the UN coming front and center to enforce world peace. Thus, he withheld economic aid to our allies, while Nasser sank ships in the Canal, and Syria cut a British oil pipeline. On October 30, Ike said that his allies would “boil in their own oil.” This decision predated the1957 Eisenhower Doctrine, under which the U.S. would defend its Mideast allies from (outside) Soviet and (local) Arab aggression.

Israel saw the Nasser arms deal as prelude to an eventual invasion of an Israel, then confined by the 1949 Armistice agreements, which confined Israel to the “Green” ceasefire lines reached after the 1947-48 War of Independence—during which Israel gained land beyond the 1947 Partition Resolution limits, but lost access to its most sacred sites in Jerusalem.

With a tiny population compared to Egypt, Israel decided to wage preventive war, before a strike became imminent. But Israel needed help, and it was clear that the U.S. would not provide it. So Israel approached Britain and France; the colonial powers hoped that toppling Nasser would possibly check the wave of anti-colonial sentiment. Nasser intensified his use of the Mideast’s most formidable radio broadcast network, built by the U.S. and aided by the CIA. He proved a charismatic propagandist. In this he benefitted from America’s ardently Arabist secretary of state, John Foster Dulles, who, driven by an obsession with Palestine, incredibly, saw in Nasser the leader who could peacefully resolve the Arab-Israeli conflict.

Israel launched its invasion of the Sinai Peninsula on October 28, but the British and French did not carry out their military operations until November 4. By then, all hell had broken loose. Caught by surprise, Ike was furious. Compounding the furor was the November 4 uprising in Hungary, and Ike’s landslide re-election on November 5. The Soviet Union warned that if the war reached Cairo, it might also reach London and Paris; premier Nikolai Bulganin threatened all three countries with a nuclear strike. Ike refused to warn the Soviets not to do so. Britain and France withdrew their troops, and Israel surrendered its military gains after three months of negotiations, in return for a U.S. guarantee that its access to the Red Sea would not be blocked by Egypt. The upshot was that British prime minister Anthony Eden resigned, and Nasser was emboldened. Ike, for his part, saw through the nuclear saber-rattling; Ike’s worry—his military acumen being far better than his geopolitical judgment in Mideast matters—was that if the Canal were seized, Egypt would launch a Soviet-backed guerrilla war.

Eisenhower realized his mistake when on February 14, 1958, while America celebrated Valentine’s Day, Nasser announced the formation with Syria of the United Arab Republic, an arranged territorial marriage that was to last only three years. The colonial regimes in Damascus and Baghdad were violently overthrown by Arab radicals exactly five months later, to be replaced by pro-Soviet rulers. Meanwhile, King Saud withdrew his kingdom from its alliance with the U.S., in favor of neutrality. Thus, unlike Egypt, the Saudis emphatically did not tilt towards the Soviets. In response to the July 14 revolutions, Ike sent Marines to save Lebanon. But overall, the final result of Suez was an historic debacle for the U.S., Britain and France.

Years later—channeling Macbeth’s “If it were done, then ’tis done, then ‘twere well it were done quickly!”—during his retirement Ike said of the 1956 preventive war that “had they done it quickly, we would have accepted it.”

Bottom Line. Doran draws five lessons from Suez, of which two are paramount: (1) the U.S. should support its allies, and not propitiate its enemies; (2) the Palestine-Israeli conflict is not the “central strategic challenge” in the region, but rather a localized conflict. His three others are also worth noting: inter-Arab politics are critical; keep a “tragic” view of the Mideast; and without a clear view of the region, lots of trouble lies ahead.

The tragedy of Suez is that Eisenhower’s advisers, virtually to a man, were ardently pro-Arab, and thus convinced him that for both Egypt and the U.S., Suez was an anti-colonial war. In reality, it was a play by Nasser for pan-Arab geostrategic dominance. Had Nasser been overthrown, a charismatic successor of his caliber was highly unlikely to emerge. In such event, the lethal poison of pan-Arab radicalism might have proven far less influential in the region during the decades that followed.

Part Two:

Israel’s relations with the United States, 1967–2007

The Six-Day War, 1967

If the Suez Crisis was an exemplar of preventive war, the Six-Day War was a classic case of pre-emptive war. in the month run-up to the June 5 beginning of the conflict, Nasser issued a series of bloodcurdling threats calling upon his Arab allies to join him in a war of extermination against the Jewish state. He ordered UN peacekeeping forces, stationed in Sinai since 1956, to first pull back and then, to depart the Sinai. The secretary-general, U Thant of Burma, the first developing-country representative to hold that position, complied.

Israeli prime minister Levi Eshkol had formed a solid friendship with president Lyndon Johnson — both were farmers, and LBJ, a Christadelphian (Brothers in Christ) worshipper, harbored a special feeling for Jerusalem. After Egypt imposed a blockade on the Straits of Tiran on May 22, Eshkol went to his friend asking for American assistance, based upon America’s 1957 post-Suez guarantee from freedom of Israel navigation through the Straits, and the expulsion of UN expeditionary forces in the Sinai.

But while the two heads of state were close, that was hardly the case at the Pentagon or at Foggy Bottom. Mired ever more deeply in the Vietnam War, Defense had no appetite for getting involved in another major conflict. As for State, though less pro-Arab than during Israel’s early years, its Mideast desk still leaned strongly towards the Arabs. The State Department denied that it had guaranteed Israeli safe passage through the Straits after Suez. In Ike’s Gamble (1956), discussed in Part One, Michael Doran notes that it took a press conference called by former president Eisenhower, who reaffirmed that such a commitment had been made, to make State concede. LBJ asked for a fortnight to see if through diplomacy the Straits could be re-opened. Eshkol replied that he would delay as long as possible, but he could not guarantee that Israel could safely hold off a full fortnight.

When Israeli aircraft were returning from their surprise strike at Egypt’s air force, having destroyed some 90 percent of the force, Eshkol notified LBJ. Though LBJ did not agree that Israel had to act, he understood that Eshkol felt differently. Another factor that may have influenced LBJ to stand down: the CIA estimated that in event of war, Israel would win easily in a couple days. After two days, Egypt, and its allies, Syria and Iraq, were defeated, save for mop-up operations, with Israeli ground forces marching towards the Suez Canal. But then Jordan’s normally circumspect King Hussein, galvanized by false reports from Radio Cairo recounting a massive Egyptian victory — including destroying the Israeli Air Force — decided to jump in. The upshot was that Israel defeated the Jordanians, seized much of the area west of the Jordan River, and liberated Jerusalem, re-uniting the western and eastern halves after 19 years of separation. Hostilities ended June 11. Israel, in addition to reclaiming Jerusalem, had taken two-thirds of the Golan Heights in the north, eliminating Syria’s ability to shell northern Israel at will. (READ MORE: Six Days, and Forty Years)

Because the war ended with an Israeli triumph, there was no need for Israel to use the atomic bomb. Sources conflict to how many Israel had in 1967. A 2017 New York Times article based on an interview with a former Israeli official, asserts that Israel had only one A-bomb, to be used by exploding it in the Sinai as a warning to Arab adversaries to back off. But a 2013 compilation of global arsenals by the Bulletin of the Atomic Scientists (BAS) shows Israel with two in 1967, 15 in 1973, 33 in 1991, and 80 for 2004-13. A Federation of Atomic Scientists (FAS) 2007 compilation shows two for 1967 and 13 for 1973, with 20-kiloton yields. As of 2007, FAS offers a range of 70 to 400 for Israel, but adds that the most likely figure is close to the low end of the range. If the 1967 number of two is correct, and given a yield of 20 kilotons, roughly comparable to the Nagasaki bomb, their use could have been, in event of imminent total defeat, for the “Samson Option”: taking out Cairo and Damascus as Israel fell to Arab forces. The most recent estimate for Israel’s nuclear arsenal is 90 warheads.

At its founding, prime minister David Ben-Gurion decided to pursue nuclear weapons to prevent a possible second Holocaust. He secured technology from the French, and they built a nuclear reactor at Dimona, which can produce civilian-grade 3.5 percent enriched uranium, and enable extraction of plutonium by reprocessing spent fuel. In April 1963, when Israeli foreign minister Shimon Peres met with JFK in the Oval Office, in response to JFK’s interrogation as to nuclear weapons, Peres improvised on the spot what remains Israel’s stated policy today: Israel will not be the first country to introduce nuclear weapons into the Middle East. Defined narrowly, it means that Israel can produce weapons-grade fuel, but will not mate warheads to any bomb chassis, so long as the Middle East remains nuclear-free.

The Yom Kippur War, 1973

In The Two O’ Clock War: The 1973 Yom Kippur Conflict and the Airlift That Saved Israel (2002), authors Walter J. Boyne and Fred Smith show in harrowing detail how close to destruction Israel found itself, before rallying with U.S. aid to save the day. Egypt and Syria turned the tables, striking the first blow and achieving strategic surprise by attacking on Yom Kippur — coincidentally also the first date of the month of Ramadan — which fell on October 6 that year. As the Arabs were marshaling forces, Israeli prime minister Golda Meir went to the U.S. for prewar aid, only to be told that if she wanted to receive U.S. assistance, Israel must not strike first. Reluctantly she complied. Israel did not order mobilization in advance, difficult in a society far less populous than many Arab countries. Thus, unlike Egypt, Israel is unable to maintain a full-time standing army. (READ MORE: The Yom Kippur War and the Righteous Richard Nixon)

Israel intelligence, usually first-rate, proved catastrophically wrong in 1973, in grossly underestimating the military prowess of its adversaries. Had the war been fought without Israel having the buffer of territory acquired in 1967, the Jewish state would have ceased to exist. Not only did the Arabs fight effectively; they also had amassed from their Russian suppliers thousands of modern “Sagger” wire-guided anti-tank missiles, and thousands of surface-to-air missiles, some portable, all deadly. Over the first fortnight of the three-week conflict, the Israeli airfare and armor suffered heavy losses.

Worse, enmeshed in a protracted, desperate fight for survival, Israeli forces consumed munitions at a far higher rate than anticipated, and began asking the U.S. for resupply after one week. The second week saw the first shipments, but it was not until the third week that the full weight of massive U.S. aid enabled Israel to decisively turn the tide. Even that was made possible by the narrowest of margins: all European countries save Portugal were dependent upon Arab oil, and early in the conflict Saudi Arabia imposed an oil embargo on Europe. As Portugal imported its petroleum needs from its colony, Angola, it was willing to offer its NATO base in the Azore Islands for American shipments. Without this base America’s military transports would have needed to fly 6,000 miles direct, which would have drastically reduced the per-trip cargo load that its nonpareil jet transports, the C-5A Galaxy and C-141 Starlifter, could carry. The shortfall would have to have been made up by many more flights, and thus the time to fully resupply Israel with vital supplies would have been longer. Likely the intense and growing outside pressure to end the military phase and employ diplomacy would have precluded full recovery by Israel of ground lost since Oct. 6.

As noted above, in 1973 Israel had an estimated 13 Nagasaki-yield atomic bombs that it was prepared to use to avoid total defeat. Though no public threat was made it is believed that Israel made it known to its Arab adversaries that it would do so if need be; this may explain why Syrian forces halted after retaking the Golan (which Israel would reconquer before hostilities ended). It is unclear if Egyptian president Sadat intended to retake the entire Sinai, and then invade Israel proper.

The specter of nuclear conflict was also raised in the closing days of the war. Admiral Elmo Zumwalt, who was chief of naval operations at the time, recalled in his memoir, On Watch (1976), that the Sixth Fleet was in a more tense situation vis-a-vis the Soviets than at any time since World War II. In his book Crisis: The Anatomy of Two Major Foreign Policy Crises (2003), Henry Kissinger, who served as national security advisor and secretary of state during the Nixon years, recounts that after the 1973 war, president Nixon told him that the superpowers had been “close to a nuclear confrontation.”

Israel Bombs Osirak, 1981

Israeli prime minister Menachem Begin confronted a different problem in his dealings with the Americans. President Reagan was personally sympathetic to Israel. But the Middle East was peripheral to his overall foreign policy goal: to win the Cold War. Towards that end he selected his national security team with an eye to their views on the Soviet Union and the Cold War. Only one member of his cabinet, UN Ambassador Jeane Kirkpatrick, was passionately committed to siding with Israel in the Middle East. Yet she was selected by Reagan because of an article she published in 1979, stating that human rights abuses were far more pervasive in totalitarian countries, than in mere authoritarian regimes.

Begin sought U.S. approval for a planned raid on Iraqi dictator Saddam Hussein’s “Osirak” nuclear reactor at Tammuz (named for the Babylonian counterpart to the Egyptian god Osiris), which France had built to secure access to Iraqi petroleum. Astonishingly, author Roger W. Claire recounts in Raid on the Sun (2004) on Sept. 8, 1975, two days before Saddam flew to France to sign the agreement, one calling for construction of a nuclear research reactor, he let the cat out of the proverbial bag at a press conference:

The search for a reactor with military potential was a reaction to Israel’s nuclear armament, and the [Franco-Iraqi] agreement was the first actual step in the production of an Arab atomic weapon, despite the fact that the declared purpose for the establishment of the reactor is not for the production of atomic weapons. (Emphasis in original.)

If that were not enough, in 1978 the French developed a new reactor fuel, “Caramel” (so-named for its color), which they planned to test in the Osirak reactor. Instead of loading 93 percent enriched uranium, they would have been using fuel enriched to seven or eight percent, yet capable of carrying out nuclear research. The Iraqis adamantly rejected the idea.

To Begin’s dismay, the administration insisted that diplomacy, which never had stopped a nuclear proliferator, should be used instead of military force. Under what has been called the Begin Doctrine, Israel will not allow any Middle Eastern enemy to cross the nuclear threshold, in order to ensure that no one can perpetrate a Second Holocaust. In Iraq’s case, this would, in Israel’s view, come when an adversary has enough enriched uranium (or reprocessed plutonium) to build a bomb. Once a reactor “goes critical” – begins operation — any strike would release highly radioactive material, which atmospheric winds can carry for hundreds of miles.

In his book, First Strike: The Exclusive Story of How Israel Foiled Iraq’s Attempt to Get the Bomb (1987), author Shalom Nakdimon presents a “what if” alternate scenario, set in 1985: A Boeing 727 commercial jetliner is spotted approaching Tel Aviv from the Mediterranean Sea. It disregards repeated warnings from Israeli jets to change course. A call to Israeli prime minister Begin gets a temporizing response, as Begin recalls Israel’s 1972 shooting down of a Libyan airliner. (The plane, carrying 108 passengers, had accidentally flown over an Israeli military base.) One jet fires an air-to-air missile as an object falls from the plane’s belly. The plane escapes, just as the unknown object explodes over Tel Aviv. It is an Iraqi atom bomb.

On June 7, 1981 the Israeli Air Force carried out a successful strike that destroyed the reactor before it went critical, which at that time was expected within weeks. Further angering the U.S. was that in late June Israel was holding elections, and that its timing would likely help Begin win. Exactly how close Iraq was then could not be pinpointed precisely.

The U.S. reaction was instantaneous and furious. Then-defense secretary Caspar Weinberger wanted an end to U.S. aid and for Israeli leaders to be prosecuted for violating international law. Other senior members of the administration settled on strong condemnation and a delay in sending requested military assets. Ambassador Kirkpatrick was tasked with drafting the UN Security Council resolution condemning the raid; she did her best to limit the harshness of UN Sec. Resolution 487 which was adopted on June 19, 1981.

The Gulf War, 1991

President George H.W. Bush forced Israel to the sidelines, lest the coalition lose Arab countries, whose participation removed any taint of Western imperialism. Israel, which had resolved never to subcontract its security to any country, found itself absorbing “Scud” short-range ballistic missile (SRBM) strikes launched by Iraq; nor was Israel allowed to help hunt for Scud launchers inside Iraq. (SRBM denotes ballistic missiles with a range less than 1,000 km./625 mi.)

During the war, American aircraft destroyed the nuclear facilities Saddam had begun constructing after the loss of Osirak. After the war, then-defense secretary Dick Cheney thanked Gen. David Ivry, who had been ground commander for the 1981 IDF airstrike that took out Osirak. He sent Ivry a post-attack photo of the Osirak reactor, inscribed, “With thanks and appreciation for the outstanding job you did on the Iraqi nuclear program in 1981, which made our job much easier in Desert Storm.” Indeed, there might never have been a Desert Storm in 1991; but for the 1981 airstrike, Saddam likely would have gone nuclear before the Gulf War, and thus also avoided later being toppled in 2003.

Syria, 2007

The story of the 2007 raid is told in Yaakov Katz’s Shadow Strike: Inside Israel’s Secret Mission to Eliminate Syrian Nuclear Power (2019). Israel confronted a situation roughly similar to what it faced in 1981: a rogue nation on the verge of starting operation of a nuclear reactor. The facility was a clone of the reactor built by North Korea at Yongbyon, which in 1994 had become the subject of an “Agreed Framework” under which the North Koreans would enrich uranium for civilian purposes only. But in 2006 it openly violated the accord by testing an atomic bomb. The Israelis were certain that the reactor, outside al-Kibar, a small town far from major urban centers, situated by the Euphrates River, was not part of any civilian electric grid.

In April 2007, prime minister Ehud Olmert sent Mossad chief Meir Dagan to brief the Bush 43 administration. In the wake of the Iraqi WMD fiasco, Bush wanted to be absolutely sure that the reactor was in fact intended for military purposes. Intelligence analysts told the administration senior leaders that the facility very likely was so intended. Bush’s senior advisers were split on whether to take action; Olmert met with Bush and asked him to use American planes to destroy the facility. He also told Bush that if 35 Syrian planes took off for Israel, with two of them carrying nuclear bombs, given direct southward flight time to Israel of one minute, the Israeli Air force would not be able to destroy all the planes. One or both jets with nuclear bombs could well penetrate Israel’s defenses to drop them.

Ensnared in the Iraqi insurgency, Bush demurred. But without specifically giving Olmert a green light, he told Olmert that the U.S. would not attempt to block Israel from striking. Olmert sent in planes to destroy the reactor on Sept. 6, having sent in a clandestine advance party to collect updated soil samples and take new site photographs. The U.S. and Israel maintained strict silence afterward, as did the Syrians — the latter likely to avoid embarrassment at having failed to prevent destruction of the reactor. The only country to react negatively was Turkey, as one of the returning aircraft had dropped an empty fuel tank that drifted across the Turkish border with Syria. Turkey’s president Recep Tayyip Erdogan demanded, and received a public apology from Israel; but Israel told the world that a mishap had occurred during a training flight when one fuel tank landed astray.

The Bottom Line

In the six use-of-force crises spanning five decades that Israel faced, it never received full cooperation from Washington. The degree to which their perceived geostrategic interests were mutual varied considerably. Israel’s leaders concluded that it could mitigate adverse American reaction by avoiding completely surprising the Americans as it did in 1956. American leaders generally found greater stakes elsewhere, and relegated Israel’s concerns to second-tier status. As a result, Israel nearly perished in 1973, and nearly faced a nuclear-armed, hostile Iraq ruled by a Stalinist tyrant.

Part Three:

The country’s nuclear quest and failed U.S. efforts to stop it, 1968–2023

Iran’s Nuclear Quest

Iran’s quest to join the nuclear club can be divided into three phases: (1) its civilian nuclear program (1968–1988); (2) its military nuclear program (1988–2014); and (3) the Joint Comprehensive Plan of Action, or JCPOA (2015–2023).

On July 1, 1968, the text of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) was put out for signature. First-day signatories included the U.S. and Iran, the latter then under the rule of Shah Mohammed Reza Pahlavi. The NPT formally went into effect on March 5, 1970. There are 191 states that are party to the NPT, with five states — U.S., Russia, U.K., France, and China — labeled “nuclear weapon” due to their having manufactured and exploded a nuclear weapon or device prior to Jan. 1, 1967. The NPT incorporated, in broad brushstrokes, U.S. President Dwight D. Eisenhower’s idealistic “Atoms for Peace” proposal, presented to the United Nations General Assembly on Dec. 8, 1953.

Mohammed Reza commenced a civilian nuclear program in 1975, planning to only go military if rival nations did so; in 1975, he told the New York Times:

I am not really thinking of nuclear arms, [b]ut if 20 or 30 ridiculous little countries are going to develop nuclear weapons, then I may have to revise my policies. Even Libya is talking about trying to manufacture atomic weapons.

So long as the shah remained in power, America faced no nuclear risk. However, American policymakers abandoned the shah in 1978 as the Islamic Revolution picked up steam. Carter administration policymakers were unwilling to prop up a leader whom they believed had been installed by a CIA-backed coup in 1953. As Iran scholar Ray Takeyh, in a just-published op-ed, explains, the CIA’s role was marginal at best. In 1951, Mohammed Mossadegh, who had been appointed prime minister by the shah, wanted to nationalize British Petroleum’s extensive petroleum assets without offering compensation. Mossadegh asked President Harry Truman to broker a compromise; serial efforts by Truman and Eisenhower seeking some compensation for BP were adamantly rejected by Mossadegh. The Brits imposed an oil embargo, economically ruinous for an Iran heavily dependent on oil revenues. Mossadegh soon faced opposition across a broad spectrum of society — the military, students, merchants, and, significantly, the clergy. Eisenhower sent CIA officer Kermit Roosevelt to organize a coup, but, in fact, the military had already done the heavy lifting.

Mossadegh sought to exercise total power as if he, and not Mohammed Reza, were the supreme ruler. A vacillating shah, who had been driven into exile, was brought back and his spine stiffened by the military — not the CIA. The shah exercised his constitutional power to fire Mossadegh. These decisive actions caught the CIA flatfooted.

Upon the shah’s overthrow in February 1979, the nuclear program was suspended. Ayatollah Ruhollah Khomeini was preoccupied with seizing total power, which entailed first replacing the provisional government, a task begun in earnest on Nov. 4, 1979, by taking American diplomats hostage. The seizure rallied Iranian students to support the creation of an Islamic regime. Formally named the Islamic Republic of Iran, it was, in fact, a totalitarian clerical fascist regime. Its position was further solidified by America’s April 1980 abysmal failed hostage rescue attempt.

On Sept. 22, 1980, Iraq invaded Iran. In 1985, Saddam Hussein began firing at Iran ballistic missiles armed with chemical warheads. In Revolution & Aftermath: Forging a New Strategy toward Iran, co-authors Eric Edelman and Ray Takeyh note that upon the Aug. 20, 1988, negotiated end to the war, Khomeini decided to resurrect the shah’s nuclear program, this time with nuclear weapons in mind. The regime’s military nuclear program survived Khomeini’s 1989 passing. In 1992, Israel’s then–prime minister, Yitzhak Rabin, became the first Israeli leader to publicly describe Iran’s nuclear program — then known to be a civilian program — as an “existential” threat. The Clinton administration refused to call a civilian nuclear program a threat; in this, it followed prior U.S. administrations. Israel, needless to say, stood its ground.

Per Edelman and Takeyh, throughout the 1990s, Iran simultaneously pursued domestic reform (economic reform, anti-corruption efforts — the latter exempting regime power players from investigation). Left unchallenged were Iran’s clandestine pursuit of nuclear military capability, its use of transnational terror against regime opponents, and its worldwide promotion of revolutionary Islamist ideology. In August 2002, the National Council of Resistance on Iran, the political wing of the alleged terrorist group Mujahideen e-Khalq (MeK), publicly outed Iran’s nuclear quest.

The U.S., preoccupied with the Sunni insurgency in Iraq, did nothing. In 2006, the CIA detected the construction of new underground nuclear facilities, yet, in 2007, it issued a National Intelligence Estimate (NIE) asserting that Iran stopped its nuclear program in 2003. The Bush administration again did nothing. The finding by the CIA was risible: Israel had taken out clandestine nuclear reactors shielded from inspection. But a true civilian program can be verified by regular monitoring operations of the reactor; Israel could be assured that a strike was not necessary unless a sudden transition brought another Saddam or Assad to power. For such an event, Israel could rely on contingency plans. For a civilian program, Iran would have no need to bury the facility underground — and deny access to it.

A golden opportunity for the U.S. and its Western allies came in early 2009, when a manifestly rigged “election” — restricted to candidates approved by the regime — reelected Mahmoud Ahmadinejad president. Protesters took to the streets in huge numbers. American Enterprise Institute scholar Michael Rubin notes that the regime’s “elections” have always been fraudulent, as the regime “eliminate[s] more than 90 percent of the candidates.”

The Green Movement caught the regime off guard. Edelman and Takeyh show just how far off-guard it was by quoting a 2013 statement by Ali Khamenei, successor as Supreme Guide to Khomeini, admitting that the regime had been “on the edge of a cliff.” Gen. Muhammad Ali Jafari, who commanded Iran’s Revolutionary Guard Corps from 2007 to 2013, said that the 2009 election that spawned the Green Movement ushered in “greater danger” for the Islamic Republic than that during the Iraq–Iran War: “We went to the brink of overthrow in this sedition.”

But Khomeini had a friend in Washington, D.C., the recently sworn-in president, Barack Hussein Obama. Obama sided with the regime and deflated the 2009 protest movement. Edelman and Takeyh point out that protests resurfaced in 2018 across a broader spectrum than did the 2009 protests.

In September 2022, a renewed mass protest movement began over the regime forcing women to wear Islamic dress; it spread nationwide but currently appears in remission. This time, unlike earlier, the students, fed up with life under clerical fascism, joined the protests. Many mosques were empty as worshippers joined the street uprising. For the first time, all elements of Iranian society opposed the regime.

Failed Efforts to Stop Iran

Every American administration sought to identify genuine moderates but only succeeded in finding the pseudo-variety. The apogee of such efforts, prior to the ascension of Obama, had come during President Ronald Reagan’s second term. The 1986–87 Iran hostage negotiations ended — Reagan’s contrary intentions notwithstanding — as an arms-for-hostages swap. The upshot was that America delivered Hawk surface-to-air missiles, which Iran used against Iraq; Iran showed its gratitude by taking more Americans hostage. As was memorably put by several Washington wits, “A moderate Iranian is one who has run out of ammunition.”

A final effort came from Israel when, serially in 2010, 2011, and 2012, Prime Minister Benjamin Netanyahu tried to persuade his cabinet to authorize an airstrike on Iran’s nuclear facilities. But only former Prime Minister Ehud Barak — who had defeated Bibi in the 1999 election — would go along.

Life Under the JCPOA: From the Cliff to the Cusp

Obama managed to get Congress by a simple majority to endorse JCPOA as an executive agreement, bypassing the Constitution’s two-thirds supermajority treaty-ratification requirement. In May 2018, President Donald Trump pulled out of the JCPOA, calling it “one of the most incompetently drawn deals I’ve ever seen.” That year, the U.N.’s International Atomic Energy Agency (IAEA) had identified Iran’s unexplained activities.

Trump imposed strict economic sanctions, but our European allies continued to ignore them so as to gain access to Iranian oil. They also are largely ignoring Iran’s growing ballistic missile threat to Europe.

On Jan. 20, 2021, President Joe Biden began occupying the Oval Office. He promptly sought to revive the JCPOA and began negotiations with Iran to get it to reenter an accord that the regime never intended to honor in the first place. In mid-2023, Iran stands on the cusp of nuclear-club membership, having enriched uranium to 60 percent — with some fragments even enriched to 83.7 percent. Estimates earlier this year were that Iran has enough highly enriched uranium (HEU) to make several A-bombs, according to sources of the U.N. (several, no time specified), the U.S. (one in 12 days), and Israel (5 bombs), in a matter of weeks. A more recent and detailed estimate was issued by the Institute for Science and International Security. It concluded that Iran, using its stocks of 60 percent, 20 percent, and 5 percent low-enriched uranium (LEU), could make enough weapons-grade uranium (WGU) to fuel one A-bomb in 12 days, four more within the first month, two more in a second month, and one more in a third month — in all, a total of eight. Intelligence estimates add several months for Iran to fabricate WGU into nuclear warheads. Iran’s near-total lack of cooperation with the IAEA makes definitive verification of these timetables impossible.

But Iran has yet to mate a nuclear warhead to a missile, by far the most feasible delivery system, and how close it is is not clear to analysts. According to Iran Watch, which posts a database of Iran’s extant ballistic missiles, Iran has fielded four missiles with a range of at least 1,600 kilometers. Matching this missile-range table to distances from Iran to Israel shows that Iran’s IRBM arsenal can cover all of Israel. But Iran’s IRBM warhead is much smaller than that of an ICBM (intercontinental ballistic missile) and hence requires more warhead miniaturization.

Nuclear Proliferation: Successes and Failures

Success in stemming the tide of nuclear proliferation has always involved a measure of voluntary conduct. South Africa scrapped its small arsenal (six A-bombs) in 1989, signed the NPT in 1991, and was certified by the IAEA to have completed dismantling its program in 1994. Its decision can be considered semi-voluntary, as sanctions against South Africa were imposed before any knowledge of its atomic program. The benefit derived by South Africa was an end to its pariah-nation status — due primarily to its ending apartheid and the accession of Nelson Mandela as prime minister.

As indicated in Part Two, Iraq’s second nuclear quest was stopped by American airstrikes during the 1991 Gulf War. The year 1994 saw the final withdrawal of Russia from Eastern Europe and the consolidation of all nuclear weapons in the former Soviet Union. Kazakhstan and Belarus sent their nuclear arsenals to the Russian Federation, and Ukraine did so in exchange for the Budapest Memorandum, under which the U.S., Russia, and Great Britain guaranteed Ukraine’s territorial integrity. A final success came in 2004 with the voluntary ending of Libya’s program. Col. Muammar Qaddafi saw the U.S. dismantle Saddam’s regime in 2003 and feared Libya would be next on the list.

Failures fall into several categories. Among U.S. allies, three countries decided to deploy nuclear arsenals: Britain in 1952, France in 1960, and Israel in 1967. The U.S. withheld promised technology sharing, but Britain had learned enough from British scientists working with the Manhattan Project. France developed its own indigenous nuclear program. Israel, pressed hard in 1963 by U.S. President John F. Kennedy to abandon its program, forged ahead nonetheless.

Among U.S. adversaries, the former Soviet Union stole the blueprints for the “implosion” bomb from the Manhattan Project and tested its first bomb in 1949. China initially received help from the Soviets, but after they halted assistance in 1959, China continued its program, detonating its first atomic bomb in 1964 and its first hydrogen bomb in 1967. The soviets considered using nuclear weapons against China’s then-sparse nuclear facilities during the border clashes along the Ussuri River in March 1969. They approached the U.S. through back channels to find out how the Nixon administration felt about it and were told we’d disapprove. The Soviets did not wish to scupper their U.S. détente quest and scrapped attack plans.

Officially neutral but tilting toward the Soviet Union, India conducted its “peaceful” atomic “Smiling Buddha” test in 1974. Pakistan, a sometimes ally of the U.S. that played a double game, began its nuclear Islamic Bomb program after mortal enemy India’s test. U.S. intelligence judged by the late 1980s that Pakistan had joined the nuclear club, but it was not until Pakistan conducted a series of atomic tests in 1998 that its status was confirmed. (Both India and Pakistan, like Israel, declined to join the NPT.) Rogue North Korea signed the “Agreed Framework” accord with the U.S. in 1994, then clandestinely pursued its nuclear quest. In 2002, it withdrew from the NPT, but the U.S. did not consider North Korea to have joined the charmed circle until it actually tested a bomb in 2006.

Political Taxonomy: Identifying True Moderates

As if determined to learn nothing from prior bad misjudgments, seven U.S. administrations abjectly failed to find genuine moderates. As noted earlier, each U.S. president doubled down, looking for moderates within clerical fascist Iran’s governing structure; each failed to grasp that “reformers” left the regime’s revolutionary aspirations untouched, used transnational terror to target enemies of the regime, and engaged in clandestine pursuit of nuclear weapons.

No Iranian moderates were even permitted to run for office or be appointed to high office. Any true moderates would have been purged by the regime.

Evidence-Based Assessments: Avoiding Einstein’s Trap

Albert Einstein famously quipped that insanity is doing the same thing over and over again, expecting a different result. Five interwar examples stand out.

In 1935, Hitler and Mussolini began a series of aggressive moves: Mussolini’s troops invaded Ethiopia; Hitler’s troops moved into the Rhineland in 1936; the Luftwaffe tested warplanes over Guernica, Spain, in 1937; the Anschluss (“connection”) saw the Germans occupy Austria in 1938; and, finally, the Germans got the Allies later that year to surrender the Sudeten province of Czechoslovakia by March 15, 1939.

This final European surrender was the bitter fruit of British Prime Minister Neville Chamberlain’s September 1938 Munich parley with Hitler, after which he declared upon returning home that he had achieved “peace in our time.” His illusions became a cropper on Sept. 1, 1939, when Nazi Germany invaded Poland.

Then there are three historic monumental failures by U.S. intelligence, as first documented (familial pride #1!) by Roberta Wohlstetter in her 1962 Bancroft Prize–winning Pearl Harbor: Warning and Decision. In the 11 days prior to the Sunday, Dec. 7, 1941, attack by the Japanese on Pearl Harbor, Japan’s fleet sailed north of commercial shipping lanes and turned south toward its airstrike launch point. On Saturday night, the Japanese broke off diplomatic negotiations. On Sunday, they planned to deliver a note in Washington at 1 p.m. EST, breaking off diplomatic relations, with no mention of a sneak attack. At that point, the lead Japanese planes would be in the air one hour, halfway to Pearl Harbor. Due to communications problems, the note was not delivered until 2:05 p.m. — 10 minutes after the first planes began their attack at 7:55 a.m. local time. Roberta’s path-breaking book was the first to identify the root causes of the massive intelligence failure: A combination of convenient assumptions and departmental “stovepiping” created background noise that obscured signals that Japan would attack. This was true even though U.S. cryptanalysts had cracked the Japanese secret diplomatic code and intercepted the coded message “east wind, rain” that indicated a surprise attack on Pearl Harbor was imminent.

The second failure was the CIA’s consistent underestimating of Soviet incremental ICBM deployments for 11 years (1962–72) as documented (familial pride #2!) by Albert Wohlstetter in his seminal 1976 article “Racing Forward? Or Ambling Back?” in the book Defending America. Traumatized by an initial, late-1950s overestimation of the rate at which the Soviets could deploy ICBMs, the agency overcorrected for an entire decade, consistently underestimating ICBM deployment as well as MRBM and IRBM deployments — strictly speaking, launchers were counted as actual missile arsenals could not be verified. By 1963, our overestimation of Soviet ICBM launchers was roughly offset by our underestimation of MRBM and IRBM launchers. (The latter two missile types were the ones placed in Cuba in 1962.)

Of 51 CIA-specific estimates of Soviet ICBM deployment in this period — which included multiple estimates within each year — the high number topped actual deployment only twice. The lows never exceeded actual deployments, and the highs were reached only nine times. Errors of underestimation were “substantial,” and the average of the “highs” was under the actual deployments.

Far from learning from its underestimates, the CIA’s errors grow worse over time. In all, the Soviet ICBM buildup ran from 1961 through 1986. In 1979, President Jimmy Carter’s defense secretary, Harold Brown, who had been a physicist with the Manhattan Project and was highly informed about nuclear matters, told Congress, “When we build, they build; when we cut, they build.”

The intelligence community’s third mega-failure was its belief that Saddam still possessed weapons of mass destruction (WMD) in 2003. It was thinly sourced, as it was thought inconceivable that Saddam would surrender his WMD stocks. Saddam could have saved his regime by letting inspectors in, but rather than accept such humiliation, he sacrificed his regime and, eventually, his own life. The intelligence community took a waterline hit to its reputation that will linger for decades.

Bottom Line: Three Harsh Lessons from Iran’s Nuclear Quest

First, diplomacy alone cannot stop determined nuclear proliferators with the resources to develop nuclear weapons.

Second, the political taxonomy of free countries does not conform to the taxonomy of totalitarian nations; moderates as we know them in Western societies simply are not permitted to exist in absolute dictatorships.

Third, policymakers must not persist — let alone double down — on policies whose desired results are repeatedly contradicted by the weight of inconvenient empirical evidence.

Part Four:

Israel’s Timing Dilemma; Lessons Not Yet Learned

Having covered Iran’s nuclear quest and failed efforts to stop its program, we turn in Part 4 to how vulnerable Israel is, how it might resolve its timing dilemma, and what enduring lessons should be learned.

Israel’s Extreme Nuclear-Attack Vulnerability. Begin with the full measure of Israel’s vulnerability if its conflict with Iran goes nuclear.

In event a nuclear Iran strikes Israel, a nuclear retaliatory strike would surely be launched by Israel. A 2007 estimate by Anthony Cordesman of CSIS estimated that in the first 21 days, Israel would suffer 200,000 to 800,000 killed, while Iran would lose 16 to 28 million. Israel, Cordesman writes, would survive, but Iran would cease to exist as a functioning society.

Two key factors should influence such earlier estimates: (a) Israel’s multi-layer ballistic missile defense may destroy many warheads before they land; (b) Israel’s arsenal includes weapons that yield one megaton, vastly greater in destructive power than the estimated 100 kilotons for prospective Iranian warheads.

A grave concern arises out of a Dec. 14, 2001 sermon delivered on Al-Quds Day (the last day of the month of Ramadan) by the late Ali Akbar Hashemi Rafsanjani, then a former president of the Islamic Republic. In the version published by the regime, Rafsanjani said at least this of an Israel-Iran nuclear exchange:

Muslims must surround colonialism and force them [the colonialists] to see whether Israel is beneficial to them or not. If one day, the world of Islam comes to possess the [nuclear] weapons currently in Israel’s possession, on that day this method of global arrogance would come to a dead end. This is because the use of a nuclear bomb in Israel will leave nothing on the ground, whereas it will only damage the world of Islam.

A quotation that emerged later, not in the official transcript, has Rafsanjani stating that in a nuclear exchange, Iran might lose 15 million and Israel 5 million, but Israel would be destroyed whilst Iran would survive as a country. This unconfirmed quotation is fully consistent with the thrust of Rafsanjani’s officially published remarks.

This view, that Iran would survive and Israel be extinguished, is opposite to the calculations made by Anthony Cordesman noted above. Cordesman knows a lot more about nuclear arsenals than Rafsanjani did. But if today’s Iranian leaders believe as did Rafsanjani that an exchange would “leave nothing on the ground” in Israel, but would “only damage the world of Islam,” they might launch an attack, with catastrophic consequences for both countries, the region and the wider world.

In addition, there is the vast difference geography portends for geostrategic vulnerability to a nuclear strike. Consider these projected world area, population and population density figures, as of July, from the U.S. Census Bureau’s U.S. and World Population Clock (for U.S. figures) and UN population division data (for international figures) reported by Worldometer: Israel is almost exactly the size of New Jersey, into which its 9.1 million people (100th among all nations) are crammed; NJ has 9.3 million. The U.S., population, ranked third, behind China and India, is now 335 million, 37 times that for Israel. Iran ranks 18th worldwide, with 84 million, roughly 9 times Israel’s.

Comparative areas (in square kilometers) are 9.1 million for the U.S., 1.6 million for Iran, 22,600 for NJ, and 21,640 for Israel. Iran’s area is 99.4 percent of the combined areas for France, Spain, Germany and the United Kingdom. Population densities per square kilometer are 36/sq. km for the U.S., 52/sq. km. for Iran and 400/sq. km for Israel; Israel’s population density is thus roughly 8 times Iran’s and 11 times America’s. Thus, Israel—far smaller, and far more densely populated—is vastly more vulnerable to nuclear attack. Put into national security terms, it lacks spatial—i.e., geostrategic—depth.

Israel’s Dilemma: Attack Before 11/3/24 or Await U.S. Election Result. Israel faces two possible ways Iran can trip a redline: (a) miniaturization becomes small enough to mate a warhead to a deliverable device; (b) Russia deploys the S-400 system to protect Iran’s nuclear facilities and key regime sites. If Israel decides to go, it will have to go it alone, as Team Biden is pantingly eager to make some sort of JPCOA-2 deal. Thus, as with Suez in 1956, Israel will have to keep the Americans in the dark as to the actual launch date, details and duration of the mission, else Team Biden will surely tip off the Iranians. (In 2012, when Biden was vice-president, the U.S. leaked Israel’s efforts to gain access for a refueling stopover in Azerbaijan, thus killing the idea.

The Biden administration assessment by Office of the Director of National Intelligence (ODNI) released July 10, finds that Iran hasn’t carried out “the key nuclear weapons development activities that would be necessary to produce a testable nuclear device.” Yet ODNI notes that “Iran has emphasized improving the accuracy, lethality and reliability of its missiles.”

But ODI arrived at its conclusions by using what nuclear expert David Albright, founder of the Institute of Science and International Security, called a “defective, overly defensive definition”:

It is a matter of how Europeans define a nuclear weapon program vs. USA intelligence community’s definition, combined with a serious post-Iraqi WMD [Weapons of Mass Destruction] analytical paralysis. It is amazing that U.S. intelligence community is still digging its heels in and using the defective, overly defensive 2007 NIE [National Intelligence Estimate] framework.

Especially significant is the timing of Iran’s efforts. Iran essentially halted its nuclear program after then-president Donald Trump exited the JCPOA in 2018; Iran then resumed its efforts immediately after the 2020 election of Joe Biden.

Supreme Guide Ayatollah Ali Khamenei has denied that his country is making nuclear weapons, but added to his disclaimer a boast:

We’re not pursuing nuclear weapons due to our Islamic principles. Otherwise, if we had wished too pursue them, no one would have been able to stop us, just as they haven’t been able to stop our nuclear development up until now and won’t be able do so in the future.

RAND analyst Gregory S. Jones published a mini-paper on March 16, concluding that 82.5 percent enriched HEU suffices as weapons-grade material; he notes that South Africa’s nuclear bombs were enriched to 80 percent. Jones flatly stated that Iran’s 83.7 percent enriched HEU is weapons-grade. According to European intelligence sources, Iran is working assiduously to shorten the breakout time to be able to test a nuclear device.

In 2019 the commander-in-chief of Iran’s Revolutionary Guard Corps stated that Iran’s “strategy is to erase Israel from the global political map.” On June 5, the director of the IAEA said that, contrary to a March 4 agreement with the IAEA, Iran’s compliance per the agreement is limited to a “fraction” of its commitments. Iran is constructing a new facility near the Zagros Mountains in central Iran, likely to be buried 80 to 100 meters underground (260 to 328 feet).

Iran’s arsenal of ballistic missiles is by far the largest in the region. It is the only country on the planet to have developed a 2,000 km. (1,250 mi.) range ballistic missile, without a nuclear warhead yet ready for it to carry. Named the Shahab-3, it is a liquid-fueled, road-mobile medium-range ballistic missile (MRBM, denotes ballistic missiles with a range between 1,000 and 3,000 km., equal to between 625 and 1,875 mi.).

Against these growing threats, Israel has a vast array of weaponry it did not have a decade ago: vastly superior air, land and sea assets, plus entirely new drones, etc. Iran’s military capability is far inferior. Islamic Jihad’s May 2023 fusillade of rockets was thwarted by the three-layer missile defense Israel has deployed: Iron-Dome for short-range intercept,, which has a 96 percent intercept success rate; David’s-Sling for medium-range; and Arrow 2 and 3 for long-range. Israel’s defense minister says these defenses can intercept Iran’s alleged hypersonic missile. And coming soon is Iron-Beam, a laser system that not only will intercept missiles, but also artillery shells, drones, etc., made by Rafael Advance Systems, its chairman states that the system will be deployed partially in 2024 and full-scale as soon as 2025. Moreover, Israel has become a leading worldwide supplier of advanced air-, land- and sea-based weapons for Western countries.

A senior Israeli official has stated that “Iran knows that breaking out to 90 percent purity in uranium enrichment will result in an Israeli strike.” Iran to date has yet to advance miniaturization for a warhead, and has not yet mastered all aspects the complex nuclear detonation initiation sequence.

Can Israel destroy all Iran’s nuclear facilities? There is every reason to conclude that Israel can do so. Israel has matchless ground intelligence, most recently evidenced by the Mossad capturing and interrogating—inside Iran—the mastermind who was planning a terror attack aimed at Cyprus. Add in the remote machine-gun assassination of Iran’s master terror planner, Qassem Soleimani, in 2020. A few years ago Israel extricated ten scientists and their families; and the top Iranian scientist, Mohsen Fahkrizadeh, was also assassinated. In 2018 Israel took a huge cache of incriminating documents that proved to the IAEA that Iran had been cheating on the JCPOA. The 2010 Stuxnet worm showed that Israel can deeply penetrate Iran’s cyber networks.

Responses to an Israeli Strike. Any Israeli attack will to a certitude be treated as an act of war by the regime. The upshot very likely will be a multi-front war, with Hezbollah from the north, via Syria and Lebanon; Iran-backed terror squads from the West Bank; and to the south, Hamas terror attacks from Gaza. For his part, Israeli prime minister Netanyahu says that Israel can fight on multiple fronts, and prevail.

This would take place against a backdrop of an America that placates its enemies and oft undermines its foremost Mideast ally, Israel. Europe, in economic thrall to energy from the Mideast will condemn any raid. Greater diplomatic leverage will accrue to Turkey, Iran, China and Russia. In sum, the vacuum created by U.S. lassitude will be occupied by other powers.

The Gatestone Institute’s Col. Richard Kemp, a counter-terrorism expert, exposed the full extent of Team Biden’s appeasement of Iran and Russia: (a) jettisoning most sanctions imposed by president Trump; (b) doing nothing while Iran’s uranium enrichment, confined to 3.67 percent by the JCPOA, skyrocketed to 60 percent overall, with some enrichment to 83.7 percent; (c) having war-criminal Vladimir Putin’s Russia serve as proxy in negotiations with Iran; (d) initial release of $20 billion in frozen Iranian regime assets—this list was complied before Team Biden unfroze $6 billion to secure the release of five hostages; (e) a U.S. commitment not to impose sanctions, and not to bring Iran’s conduct to the UN Security Council—where, unlike in the General Assembly, the U.S. posses a veto; (f) preparing to attempt a bypass of Congressional legislation if a new deal, or understating, is reached with Iran.

Kemp notes that the 2015 Iran Nuclear Agreement Review Act (INARA) specifically requires that any agreement or understanding, formal or informal, be submitted to Congress for review. House Foreign Affairs Committee Chairman Michael McCaul (R-TX) sent a June 15, 2023 letter to President Biden, reminding him of this. Kemp attributes Biden’s efforts to a desire for (a) a perceived foreign policy triumph in the run-up to the 2024 election; (b) a desire to complicate Israeli plans for a strike on Iran’s nuclear facilities; and (c) an abiding belief that containment of a nuclear-armed Iran can be made to work by appeasing the Islamist regime.

But the greatest danger to Israel—and, correspondingly, boon to the Iranian regime—is most fully explained by Hudson scholar Michael Doran in a recent article, “Biden’s Ties That Bind,” showing how Team Biden’s embrace of Israel is intended too suffocate those in Israel who would strike Iran’s nuclear facilities.

Doran sees four tracks Biden pursues: (1) express strong rhetorical support for Israel; (2) sponsor joint military exercises; (3) sponsor close coordination between the U.S. and Israeli militaries, via Israel’s incorporation into CENTCOM (the U.S. command covering the Mideast); and (4) promoting normalization with Saudi Arabia. Collectively, these actions, each individually superficially plausible, entrap not Iran but Israel.

(A recent webinar (34:17) by the bipartisan Mideast Forum credits Team Biden with providing the protesters with cyber-circumvention tools to afford online access to 30 million Iranians, more than one-third of the population. This is one of the few things the U.S. has done to help those protesting the regime’s suppression of dissent.)

The sheer vacuity of these four tracks was exposed when Sen. Tom Cotton questioned SecDef Lloyd Austin at a recent Senate hearing. Cotton noted that Iran had used force against Americans 83 times since Biden took office, and that Biden had retaliated only four times. Doran calls this not a loving embrace, but rather as a “bear hug” designed to prevent independent Israeli military action. Biden’s strategy also targets fissures in Israeli society, among the military, and the Knesset and the voting public. Central to this is demonizing Netanyahu, Israel’s longest-serving and most successful prime minister since founding father David Ben-Gurion.

Biden’s overarching goal is to kick the Iran issue last the November 2024 elections, advertising a breakthrough that is in fact an win for Iran. Doran writes that any failure will be placed on the lack of concessions to Palestinian statehood. He sees the controversy in Israel over judicial reform as literally a godsend, a trifecta for the administration. First, Biden can disguise his fight to destroy Netanyahu under cover of a fight for “democratic values.” Second, American Jews are distracted from the grave, growing threat Iran’s nuclear quest poses. Third, and most importantly, the judicial reform controversy drives a wedge between the senior Israeli military and the political leadership.

According to Doran, Netanyahu shows signs of caving, allowing a 60 percent enrichment threshold for Iran, playing for time until after the 2024 elections. As American appeasement and Iranian enrichment grow with each passing day, Doran concludes: “The Biden administration says it is protecting Israel and preventing Iran from acquiring a nuclear weapon. It is doing the exact opposite.”

There is one final cautionary tale that Israel no doubt keeps in mind when weighing Advice offered by U.S. administrations. Officials from several prior administrations have admitted having given Israel bad advice. Thus, in 2009, Dennis Ross, a longtime promoted of Israel making concession to Arabs, advised the Israelis to send cement—600,000 tons—to Gaza to be used, so he thought, for commercial constructions; he disregarded warnings from the Israelis that the concrete would be diverted to military use; Hamas used the concrete—surprise!—to construct terror tunnels.

Ross and other officials also advised then-president Obama to be low-key as to the Green Movement protests against the regime’s fixed 2009 election, fearing that the U.S. would be blamed for outside interference. The protests were crushed, and with it the best chance missed to topple the clerical fascist regime and end its nuclear program.

Earlier, during the Clinton administration’s second term, Mideast adviser Aaron David Miller suggested—NOT making this up—inviting Palestine Authority terrorist leader Yasser Arafat to visit the Holocaust Museum, in hope that he would offer sympathy and thus propitiate Israelis. Arafat, to his credit, spurned the offer. Fast forward to 2023: Team Biden wants Israel to make concessions to the Palestinians to get the Saudis to join the Abraham Accords. Yet the Saudis are fed up with Palestinian maximal aims—no Jewish state—and stubborn refusal to make concessions for peace. These efforts by Americans to “save Israel from itself” are patronizing exercises: Do we really understand Israel’s national interests better than Israelis do?

All this comes as pressure on Iran over its brutal suppression of protests mounts. This May, 108 former world leaders signed a letter endorsing regime change in Iran. One prominent former American official, John Bolton, UN ambassador under Bush 43 and national security adviser to Donald Trump, said that the death of Supreme Guide Ali Khamenei could cause the collapse of the clerical fascist regime.

Finally, Iran experts Ruel Marc-Gerecht and Ray Takeyh opine that were “Little Satan” Israel to destroy Iran’s nuclear arsenal, it would prove a far graver blow to the regime than were the “Great Satan” U.S. to do so. They add that Iranians have a long history and culture different form the Arabs; they would not rally to the hated regime because Israel destroyed Iran’s nuclear facilities. In the event, the regime’s appeal, they write, is not to Persian nationalism, which could “rally ‘round the flag” after an attack, but rather to an extreme religious ideology the broader public no longer shares.

Bottom Line. Since Iran’s program was revealed in 2002, the Israelis and Americans have been unwilling to, either individually or together, carry out operations that would end Iran’s nuclear program. That Iran is pursuing a military capability has been clear since 2002. The proverbial can has been kicked again and again down the road. Diplomatic efforts continue despite a near-zero record of success; only Trump managed to induce caution in Iran’s rulers. Per the famed quip of 18th century monarch Frederick the Great, “Diplomacy without arms is like music without instruments.” Western countries will be ululating lamentations, if Iran crosses the nuclear threshold and predictably escalates its multi-front war against the West. With the military option on hold, it falls to the courageous protest movement inside Iran to do our work for us. Absent regime change, the odds are that Iran joins the nuclear-weapon state club.

Iran is determined to join the N-club. The U.S., under both former president Obama and President Biden, has been determined to prevent an Israeli military strike against Iran’s nuclear facilities. Israel, for its part, has concluded that its geographic limits make it exceptionally vulnerable to a nuclear strike, far more so than larger Western nations, especially, the United States. Thus, Israel cannot depend upon deterrence, but must instead follow the path chosen by Israel in 1981 and 2007. It is a path fraught with peril, but less perilous than absorbing a nuclear strike.

We persist in declining to permanently learn from experience as indicated above. Our national security, economic well-being, and civilizational survival are a tripartite warning. We must learn these elemental, enduring history lessons before catastrophe strikes.

ABOUT THE AUTHOR:

John Wohlstetter

Senior Fellow

John Wohlstetter is a senior fellow at the Discovery Institute (beg. 2001) and the Gold Institute for International Strategy (beg. 2021); he held a similar position at the London Center for Policy Research (2013-2018). His primary areas of expertise are national security and foreign policy, and the 25th Amendment to the U.S. Constitution. He is author of Sleepwalking With The Bomb (2nd ed. 2014), and The Long War Ahead and the Short War Upon Us (2008). He was founder and editor of the issues blog Letter From The Capitol (2005-2015). He has authored numerous articles in publications, including The American Spectator, National Review Online, The Wall Street Journal, Human Events, The Daily Caller, PJ Media and The Washington Times.

He gave over 1,000 radio interviews (2008-2015), many on nationwide programs, and guest-hosted the August 14, 2013 Dennis Miller Show. He worked on the foreign trading desks at Goldman Sachs (1969-73) & Drexel Burnham Lambert (1973-74). He was an attorney for Contel Corporation (1978-91), practicing general corporate and communications law; he shifted to strategic assessment, a task he also performed at GTE Corporation (1991-2000) and Verizon (2000); he retired in 2000. During his tenure at Contel he served as senior adviser to The Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications.

The Committee, created by the National Research Council, published its final report, Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness (1989). He holds degrees from the University of Miami (B.B.A., 1969, Finance major, Art History minor); Fordham University School of Law (J.D., 1977); and The George Washington University (Public Policy/Telecommunications, 1985). He is a National Trustee of the National Symphony Orchestra (beg. 2014), and served on the NSO Board of Directors (1992-2014). He is a trustee of the Billy Rose Foundation (beg. 1996). He served as a trustee of MyFace (1980-2016), the Washington Bach Consort (2002-2018), and the London Center for Policy Research (2013-2018). He is an amateur concert pianist.