Islam Under Scrutiny by Ex-Muslims

The Terrorist Watch

Ronald Kessler has written an extremely important book, The Terrorist Watch, that discloses the inside story of the War on Terrorism. He takes a complex subject full of long functional names and leads the reader to relatively easy comprehension. He has exposed the incredibly difficult counterterrorism job of protecting this nation from Islamic extremists. This book was very difficult to write but Kessler has humanized the people of the FBI and CIA by telling their personal story as part of the massive efforts they undertook that overhauled our defenses from September 11, 2001 to today. There has not been a successful al Qaeda attack on American soil since 9/11. And these folks are entitled to our praise for their fine work. Along the way, Kessler reveals the distortions and harm that the left leaning media and especially the New York Times and Washington Post have done to the nation’s efforts to protect our citizens.

Mr. Kessler performed the difficult task of providing a documented and readable history of the 7 year period starting in 2000, but he reaches back in history when the circumstances require. There are no footnotes, but the work retains an academic documented quality by providing prolific actual quotes from interviews of the approximately 50 government employees which Kessler interviewed to bring the story together.

Almost fiction like, the author starts the book with a Prologue which brings the reader into the world of counter intelligence as it is today. He displays the immense power and cooperation between agencies that is being brought to bear now. Then he steps back in time and in conjunction with cases in progress involving the infamous names like Khalid Sheik Mohammad, Jose Padilla, Abu Zabaydah and others, he introduces the major stumbling blocks facing the FBI, CIA and other intelligence agencies that existed from 2001.

A most significant stumbling block in 2001 was the artificial legal “Chinese Wall” in place at each criminal investigative agency to isolate the crime enforcement personnel of the agency from the intelligence personnel. Kessler does a good job of explaining how that procedure came into being. It isn’t simple to explain but he does a good job. An attorney in the FBI Office of Intelligence Policy Review (OIPR) came up with the idea of using the mechanism of the Chinese Wall to be extra sure that a criminal indictment was never thrown out because the prosecutor had used information to make his criminal case where that information had been obtained under an investigation authorized under the Foreign Intelligence and Surveillance Act (FISA). This Wall procedure required the FBI to maintain separate files for Intelligence Investigations and Criminal Investigations and disallowed the Criminal prosecutors access to Intelligence files. This fear of overturn arose because evidence obtained in foreign electronic interception of a communication that originates outside US is not necessarily subject to the same Constitutional requirements for a search warrant as is an interception (search) in the US of a US person.

The above paragraph is to explain the problem to be addressed by the “Chinese Wall”. But it is understandable that most non-lawyers will still be confused. The Chinese wall mechanism is a well known procedure in many other legal situations. But the above paragraph was simply the definition of the nature of the issue. Even more burdensome was the fact that there were rules set in place by the OIPR to handle exceptions. These rules were extraordinarily complex and were not generally understood even by the attorneys in the OIPR. Further, OIPR put out the word that anyone who violated the rules was going to be disciplined. So, as is the usual case with human beings, everyone in the agency opted to take the easy way out. The FBI, CIA and other Intelligence agencies adopted the practice of never permitting criminal prosecutors or intelligence investigators to see the other investigators files. Although this was an interpretation unwisely set in place by Attorney General Janet Reno and therefore was only applicable to the FBI and the Justice Department, it eventually was adopted by the CIA as well. This “Chinese Wall” problem explains why the FBI was unaware that the CIA had intercepted several al Qaeda transmissions that might have related to the 9/11 plot including a message on 9/10/01 that stated “Tomorrow is zero day.” None of that information was shared with the FBI.

Immediately after 9/11/01 bombing, President Bush asked for an investigation of the “Wall” problem which showed that no Court had ever thrown out a case because of the feared mixing of information. Unfortunately, the OIPR had adopted an overkill solution that was too complex for the problem and the work around was too easy. The “risk avoidance” or CYA solution was predictable. Every manager needs to be on guard because every perceived possible future problem is not necessarily a real problem, or the fix, as here, can be worse than the problem. FBI Director Mueller immediately withdrew the “Wall” requirement and Congress specifically removed any Wall requirement in the Patriot Act in 2003. As an aside, the Patriot Act amendment kicked off major left-leaning media objections to alleged expansion of governmental power and potential violations of the civil rights of American citizens.

The FBI and CIA immediately after 9/11/01 with President Bush’s full support attacked its other problems including its incredibly outdated computer record systems, diminished morale at the CIA because of President’s Clinton’s de-emphasis in counterterrorism, and inadequate human intelligence at the CIA.

Kessler provides the entire engaging story relating to the reliance by Secretary of State Powell on information from German intelligence in preparing his speech to the UN in which he asserted that Saddam had weapons of mass destruction. Powell had refused to use the US generated intelligence information and he independently reached the same conclusion. Ultimately the Iraqi source that had provided intel to German Intelligence was much later proven to be unreliable. He turned out to be a lower level Iraqi employee in the Saddam nuclear program that was seeking asylum in Germany. Again, the left media accused General Powell and the Bush Administration of intentionally lying in the run up to the Iraq war about Saddam’s possession of WMD.

The real facts underlying the Washington Post story of Dana Priest relating to alleged thousands of CIA’s prisoners being held in secret prisons around the world to enable the CIA to torture prisoners. This story earned her a Pulitzer Prize and caused many European nations to cease cooperating with the US in Afghanistan. The facts were that there were no secret prisons and fewer than 100 prisoners had been rendered to anti-terrorist agencies of countries cooperating with the US in the war on terror. Also many of those prisoners originated in those countries.

Kessler also related the embarrassing story about Brandon Mayfield. Brandon was a US attorney, a recent convert to Islam, that had given funds indirectly to Hamas. His finger print had showed up on a plastic bag discovered in the Spanish train bombing and he was planning a trip to Barcelona. Multiple experts had confirmed the finger print match. Brandon was arrested but there was no other links. Ultimately, in a raid on the terrorist hideout in Spain, the Jihadists blew themselves up to escape capture and the authorities found a finger, the print of which perfectly matched the plastic bag print. Mayfield got $2M settlement and the FBI imposed a higher standard requiring a greater level of assurance on a finger print match.

There are many more interesting stories including the identity leak of Valerie Plame as a CIA agent. Although this investigation lead to the conviction of Vice President Chaney’s deputy for lying to the FBI, in the end, Richard Armatage, the ex-Deputy Sec. of State, a critic of the Bush Administration was revealed to be the leak to Robert Novak. Although both the Washington Post and NYT were on a daily rampage to show Chaney was the source of the Plame link, when the true identity of the leaker broke, the Washington Post ran it on Page 6 and the NYT ran it on Page 12. I find both those papers disgusting.

This book describes several investigations in minute detail. The manpower and the resources it takes to gather all the facts about the alleged actors and the potential links of their brothers, sisters and friends, the travels of each, schools of each, etc, etc mushrooms gigantically. Everyday the investigators evaluate the risk of the advancement of the plot to the point where continuation of the investigation risks injury to citizens and property. Sometimes where an investigation is centered abroad, and there are domestic actors linked to the plot, when we are warned by the foreign agency that it is going to roll up the plot in their country, the US must make the decision if it is better to place the US actors under 24/7 surveillance to see their response to the foreign arrest or to arrest them. How and where they respond when the branch of their plot is arrested is frequently revealing of the cell.

Home grown US terrorists are a new concern. Several networks have already been rolled up involving prison grown networks of Islamic extremists with serious plans of bombing and destruction. Fortunately these groups have not been sophisticated so far.

The public is aware of only the tip of the counter-terror iceberg. In 2007, there were 60-70 terror plots in US being investigated every day. Every morning in the NCTC at 8:00 AM the Threat Matrix involving these treats is evaluated. Vice Admiral Redd, NCTC, with his small group of representatives from all the security agencies prepares a list of 25-30, which list is further reduced to 10-20. These are brought into the daily video conference involving the President, Nat. Security Council, DHS, and Nat. Intelligence Director. In 2004 alone, the Justice Department reported 379 convictions related to terrorism.

The NCTC is a 10,000 sq. ft. facility built like a TV network control center with 32 large screens and 350 computer stations. They operate a web page for 5000 world wide intelligence analysts. They control the no-fly list, and they are available for instant communication country-wide access from police, customs or immigration officers having a suspicious incident involving a terror risk. Someone on the no-fly list, if stopped for a traffic violation, can be held for a surveillance interview. There are 400,000 names on the NCTC list of terrorist entities.

Kessler points out that a major concern of our all of counter-terror officials is the demoralizing effect of the attacks by the left leaning media. The effectiveness of the terror investigations depends to great degree on the assistance and cooperation of the public. To the extent that the left is successful in engendering suspicion of the counter efforts it will further damage our security. At the current level, even though less than 1% of the open tips actually have lead to a terrorist, they are a valuable eye on the ground that has been extremely important especially regarding the new home grown Jihadist threat.

This book is a MUST READ for all Americans. It contains stories of hundreds of specific events, arrests and convictions and hundreds of details that could not be mentioned in this report.


If you like this essay: Stumble it   Stumble Upon Toolbar digg it reddit

Amil Imani is an Iranian born, pro-democracy activist who resides in the United States of America. He is a poet, writer, literary translator, novelist and an essayist who has been writing and speaking out for the struggling people of his native land, Iran. Amil Imani's Home Page: www.amilimani.com.


Name:     closed
Comment:

Comments Notes: Keep comments short. Our system cannot separate paragraphs. Comments must be relevant to the topic of the article. We did not regulate the comments but if irrelevant comments, materials, adds of other websites etc. are being uploaded, we will have to regulate the comments and even ban the IP addresses of such nuisance posters.


Name: BALAM
Date: Saturday February 09, 2008
Time: 05:32:19 -0700

Comment

ISLAM AND TERRORISM ARE TWO SIDES OF THE SAME COIN.THE WEST CAN NEVER WIN THE WAR AGAINST TERROR,UNTIL AND UNLESS IT UNDERSTANDS THE MIND OF THE ENEMY,WHICH IS ISLAM AND ITS FOLLOWERS.EVERY MUSLIM SHOULD BE TREATED AS TERROR SUSPECT AND KEPT UNDER SURVALENCE TO PROTECT YOUR SELF.ANY MUSLIM CONVICTED OF TERROR,IMMEDIATE EXPULTION OF ITS FAMILY SHOUD BE CARRIED OUT AND GRADUALLY REDUCE THE MUSLIM IMMIGERATION AND THE STOP IT LATER ON ALLTOGATHER .THE WEST CAN EASILY GET CHRISTIAN AND NON-MUSLIM IMMGRANTS TO SATISFY THEIR LABOUR NEEDS.THE LOTTERY VISAS IS A FOOLISH SCHEME.IT COULLD EASILY LET POTENTIAL TERRORIST IN THE WEST.STOP THROWING MONEY AT THE MUSLIM COUNTRIES.YOU CAN NEVER KEEP FEEDING THE SNAKES WHICH CAN POISON YOU WHEN THEY GAIN STRENGTH.USE THE NON-MUSLIMS FROM MUSLIM LANDS WHO WOULD ALWAYS GIVE YOU THE WEST SOUD ADVICE AND WOULD BE LOYAL TO THEIR BENIFACTORS.MAKE HASTE BEFORE IT IS TOO LATE.


Name: Z-u-K
Date: Saturday February 09, 2008
Time: 11:40:48 -0700

Comment

To: the nameless author of the last post addressed to me. Dear Entity Without A Name: 1. If my Qur'an is not wrong, the first three words of the book are: bi (a preposition) - Ismi (name) - Allahi (of Allah): bi-smi-llah(i). So imagine how important names are!! The first meaningful word after the preposition that applies to it, is "Name" :) ---- 2. Speaking of logic, and actually applying it to your second statement, it appears that: a. Monotheism (Tawhid) is the logical conclusion, perhaps the only possible conclussion, of some logical thinking. This seems really odd, considering that the founders of logic, the Greeks, were polytheists :) - b. There is a way to prove, logically, that not only there IS a God, but that there is ONLY ONE God. Wow! I'll be on my toes and holding my breath looking forward to that wonderful piece of logical thinking I am sure you are going to offer in your rebutal. - c. Your cat is capable of logical thinking. No comments, since I have not been introduced to your cat. - d. Your cat, as a result of his enhanced intelectual capabilities, is Monotheist, probably a Muslim. That would certainly contribute to the diversity of the Umma. But until I witness your cat's Shahadda, I am affraid I can only take you on your own word... which, considering the delightful implications of taqiyya, I'd rather not.


Name: Arejaymack
Date: Saturday February 09, 2008
Time: 16:44:37 -0700

Comment

One can talk and sermonize until the cows come home but the first step is to control the leaky borders. How is it that we know there are 10-12 million illegal aliens in this country but cannot find one bin Laden? Our president has been asleep at the office, being disturbed over terrorists half a world away and seemingly, cannot even see what is happening to our southern borders. God help us!!!!!


Name: agnostic
Date: Saturday February 09, 2008
Time: 19:15:16 -0700

Comment

Those "for islam" commenters are leading us AWAY from the main task: i.e. to alert the reader to the DANGER of the scourge of the incurable cult of Murder, Enslavement, Debauchery, Sex orgies, etc. Feel free to coin adjectives most disparagingly for this is a most degraded cult called ISLAM. They follow not a single school of thought, a single jurisdiction but indulge in lies to eulogise their filthy cult and their psychopath founder. Should one waste one's precious time trying to "reason" with brain-dead zombies such as these as they are true followers of Al-Ghazali who threw out Reason and Rational Thinking and opted for the psychopaths evil to be foisted on the whole world? Deep in their hearts they know the Quran to be false, incoherent ramblings of a mentally deranged man (those whom god wish to destroy he first make mad) hence all that plagiarising, the sheer take-over of hinduism which tehn prevailed in Arabia till the evil one made his presence. Can any muslim aplogist throughout the whole world bring a single hadith or quranic verse to support : mohd was not a pagan, his parents were not pagans for 14 generations, their names were created not by pagans. Can any muslim tell us about muslim names? But a muslim brought up to be unquestioning and the fear of hell impanted into his very soul shudders at the thought of burning in hell therefore cannot bring himself to renounce islam that makes him a withering of a man which he sees but which he cannot shake off for without that cult what worth is he? That evidence abounds that the islamic world is a cesspool, the incubator of terrorism, the call for the death of innocents, muslims who choose to remain as such have no place on this already crowded planet. We are not dealing with muslims here but with ISLAMOFASCISTS. Take the example of Turkey's Erdogan, an islamist to the core, said: “moderate” Islam descriptions are very ugly, it is offensive and an insult to our religion. There is no moderate or immoderate Islam. Islam is Islam and that’s it.” He speaks the truth. Any muslim who even questions the quran is to be deemed an apostate, worse than a non muslim. What does this tell us? ONE WHO BELIEVES IN ISLAM, THE INFALLIBILITY OF THE QURAN AS THE LITERAL WORD OF THEIR ALLH. IF ONE DOES BELIEVE IN THE QURAN THEN ONE IS A MUSLIM BUT CERTAINLY NOT MODERATE BECAUSE THERE ARE NO NON-FASCIST MUSLIMS. NO MODERATE MUSLIMS BECAUSE TO BE NON FASCIST OR MODERATE IS TO BE A NON MUSLIM, A NON BELIEVER IN THE QURAN'S TOTALITY AND INFALLIBILITY, WHICH MEANS THAT A GLOBAL CALIPHATE IS THE GOAL AND DEATH TO THE NON MUSLIMS. HENCE THE 100+ VIOLENT VERSES HAVE TO BE EXERCISED ON THE NON MUSLIMS TO THE HILT, MUCH TO THE DELIGHT OF THESE ISLAMOFASCISTS WHOSE ENTERTAINMENT OF BLOOD AND GORE FULFILLS THEIR EVIL SOULS. That's why they are chosen to be ANNIHILATED SOON.


Name: Igor
Date: Saturday February 09, 2008
Time: 19:23:41 -0700

Comment

Do Islamic cats pray five times per day? ...Speaking of Greek logic, try this: Philosophical Proofs on the Existence of God...Here is a sampling, from http://www.saintaquinas.com/philosophy.html St. Anselm’s Ontological Argument....St. Anselm, the Catholic archbishop of Canterbury and a Doctor of the Church, first formulated the Ontological Argument. This philosophical argument is perhaps the strangest and most hotly debated of the proofs. The argument has attracted the attentions of such notable philosophers as Immanuel Kant (who attacked St. Anselm’s proof) and G.W.F Hegel (who defended Anselm’s proof). The proof is most notable because it alone claims to prove the existence of God by relying independently on human reason without the need for perception or evidence. The proof itself relies on the defined concept of God as a perfect being. St. Anselm’s proof is summarized here: God exists in our understanding. This means that the concept of God resides as an idea in our minds. God is a possible being, and might exist in reality. He is possible because the concept of God does not bear internal contradictions. If something exists exclusively in our understanding and might have existed in reality then it might have been greater. This simply means that something that exists in reality is perfect (or great). Something that is only a concept in our minds could be greater by actually existing. Suppose (theoretically) that God only exists in our understanding and not in reality. If this were true, then it would be possible for God to be greater then he is (follows from premise #3). This would mean that God is a being in which a greater is possible. This is absurd because God, a being in which none greater is possible, is a being in which a greater is possible. Herein lies the contradiction. Thus it follows that it is false for God to only exist in our understanding. Hence God exists in reality as well as our understanding.


Name: Allat
Date: Monday February 11, 2008
Time: 06:56:47 -0700

Comment

Igor and agnostic: Well, nobody has answered my riddle: "What does a tree know that you don't know?"---------This begs the questions as well, "What do Quantum Physicists know, that others don't know?"


Name: Kevin L.
Date: Monday February 11, 2008
Time: 10:19:37 -0700

Comment

to Allat: Why don't you ask a tree?


Name: SomeOne
Date: Wednesday March 05, 2008
Time: 16:23:18 -0700

Comment

Endlich - der erste arabische hardcore Anti-Islam-Blog ist da. http://blog.unmasking-islam.net/ Endlich - der erste arabische hardcore Anti-Islam- Fotoalbum ist da. http://album.unmasking-islam.net/ --- At last - the first Arab hardcore anti-Islam blog is here. http://blog.unmasking-islam.net/ At last - the first Arab hardcore anti-Islam Photo Albums is here. http://album.unmasking-islam.net/ --- أخيرا أول مدونة تعري وتفضح الإسلام http://blog.unmasking-islam.net/ أخيرا أول البوم صور يعري ويفضح الإسلام http://blog.unmasking-islam.net/


 
Hit Counter