More by David Firester at Lima Charlie News

24 Dec

To my readers, most of my written content is being published by Lima Charlie News, where they have given me two titles: Associate Editor | Intelligence and National Security Correspondent. This page will be left as it is for archival purposes. For more recent work I have written, please visit the following link: David Firester at Lima Charlie News.

U.S. pledges $60 million to support Africa ‘G5 Sahel’ counterterrorism efforts

30 Oct

U.S. pledges $60 million to support Africa ‘G5 Sahel’ counterterrorism efforts

The Burgeoning Threat Emanating from Iran and its Implications for U.S. Defense Posture

29 Oct

Originally published on Lima Charlie News, David Firester discusses the implications of Iran’s enhanced defense profile.

Reconsidering our Iranian Nuclear Policy in light of a changing threat landscape

Post-9/11 Jihadist Attacks in the U.S.

31 Jul

The following is a list of Jihadist-inspired terrorism attacks inside the U.S. since 9/11/01. The list excludes foiled attempts, but includes failed attempts. I will separately endeavor to prepare a list of foiled attacks at a later period.[1] I define failed attacks as those for which an individual initiated the sequence of attacking, but was unsuccessful in achieving their full range of objectives. I define foiled attacks as those for which an individual hadn’t had an opportunity to initiate the sequence of attacking, but for which they had demonstrated an intention (and possibly coupled with the capability) to do so. All attack information comes from open sources and is verifiable by simple internet searches. Any disputation of facts is welcome.

As some may notice, the list also excludes other forms of domestic terrorism (actual, failed and foiled). Another word of caution for using this short dataset is that affiliation with a specific transnational Jihadist organization can sometimes be difficult to discern. Anyone wishing to research organizational affiliation, should either consult at least two corroborating open sources, or read the official indictments attending any subsequent prosecution.

Bottom Line Up Front (BLUF):

A summary glance at the data reveals that from December 2001 through June 2017 (the period covered herein):

  • 111 people have been killed and 461 have been wounded.
  • 5 attacks list two attackers, for a total of 36 suspects
  • 33 out of the 36 suspects (92%) were American citizens at the time they conducted their assault. The database does not, however, record naturalized citizens’ countries of origin.
  • Chosen weapons in each attack included and rate of killed/wounded:
    • 3 exclusively using explosives (0 killed)
    • 3 using a combination of explosives and firearms (18 killed/316 wounded)
    • 10 exclusively using firearms (88 killed/105 wounded)
    • 10 exclusively using knives[2] (5 killed/14 wounded)
    • 1 exclusively using a vehicle (0 killed/9 wounded)
    • 2 using a combination of vehicle and knife (0 killed/17 wounded)
  • Although firearms alone killed the most (80%) and explosives alone killed the least (0%), the most violent, casualty-producing combination seems to have been explosives with firearms, representing 10% of the attacks, with 16% killed and 68% wounded.
Attack Graphic

Domestic Attack Data

Concluding Analytical Remarks

One conclusion that could readily be drawn is that Jihadist-inspired attacks may be affiliated with an organization per se, however, the attackers don’t always seem to express a clear affiliation. Despite individual allegiances to organized external terrorist groups, each attacker appears to have adhered to a Jihadist ideology. As the Islamic State’s power profile dwindles, as did al-Qa’ida’s in the past, there is reason to believe that although it may reduce some of the entity’s cyber presence, it is likely not going to eliminate Jihadist attacks.

I’d like to invite any serious analyst who seeks to collaborate in constructing an open-source, publicly available, database of foiled attacks to join me in that endeavor. Additionally, anyone who is presently working on a terrorism project that desires review, assistance, editing, or a contributing author is welcome to reach out to me or my associates at TRAC Intelligence, LLC.

[1] As certain names will appear in a separate database, they are deliberately being excluded here. For instance, two separate attacks connected to the June 2015 arrests of Munther Saleh, Imran Rabbani and Fareed Mumuni, also resulted in the arrests of Nader Saadeh, Aala Saadeh and Samuel Rahamin Topaz. The latter three did not initiate the sequence of attacking and hence would appear in a “foiled attack” database.

[2] Edged weapons are included in the “knives” category for the sake of convenience.

The Islamic State Attacks the Islamic Republic of Iran

7 Jun

The Iranian Parliament in Tehran; June 7, 2017. Image, courtesy of Radio Free Europe

An analysis of the Islamic State’s Attack on Iran, by David Firester, founder and CEO of TRAC Intelligence, a premier threat analysis firm.

It seems the chickens have come home to roost. The world’s leading state sponsor of terrorism has just been terrorized by the world’s leading terrorist organization in twin assaults on Iran’s parliament and the shrine of its revolution’s beloved leader. The irony is profound. This is not, however, an occasion for celebration, as terrorism must always be condemned and never condoned. Nonetheless, it is a time for some reflection. Continue reading

The Challenge of Looking Beyond The Islamic State: Trump’s Foreign Policy Inheritance

21 Dec


Is the Islamic State Worth Destroying?  From a moral standpoint, one can’t help but answer the question in the affirmative.  How can one sit idly by, as the world did when Fascism spread throughout Europe and Southeast Asia?  Then again, none of the major powers really became heavily involved until either a surprise attack befell them, and/or their treaty obligations with another major power required them to act.  Even then, the British merely sent an Expeditionary Force and the U.S. steered clear of major combat operations in Europe, until the enemy’s weaknesses could be favorably exploited.  Nonetheless, acting against modern-day fascists is a worthy cause.  And fascism is precisely the term to describe the so-called Islamic State and their ilk.

Continue reading

Russian Hacking Accusations Sours Russia-US Relations

20 Oct

Russian Hacking Accusations Sours Russia-US Relations

In the age of cloud computing for everything from picture storage to banking, cyber security is one of the most important security issues on the international stage. The recent hacking allegations against Russia, not to mention the internet being used as a recruitment tool for ISIS terrorist cells, points to a new kind of war.
Continue reading

Deep red state split over latest Trump allegations

19 Oct

Deep red state split over latest Trump allegations

Donald Trump continues to be barraged by ghosts and skeletons from his past. Happy Halloween, Mr. Trump. The truth of the allegations appears to be in the eye of the beholder. Dems love it. Reps think it’s nonsense … and so the wheel continues to spin along a fairly normal axis, even in this unusual year. Continue reading

Technology and Terror: How Tech is involved with Modern Terrorism

13 Oct

Technology and Terror: How Tech is involved with Modern Terrorism

The scourge of terrorism has been with the world for centuries, but the 21st century has seen an almost unprecedented resurgence in hateful, murderous behavior. Unfortunately, in many ways the technological revolution brought about by the advent of the internet and personal computers has facilitated this rise, in four particular ways. Continue reading

Police Threaten Boycott Over Colin Kaepernick’s Protest

13 Sep

Police Threaten Boycott Over Colin Kaepernick’s Protest

Police in Santa Clara are the ones who provide security for the home games of the 49ers with usually about 70 of their officers. But their union has said they are not certain they want to continue to protect a team that is willing to put up with one of the team members (Colin Kaepernick) criticizing police for what they feel amounts in many cases to doing the job they have been tasked to do. Kaepernick has made his very public stand, or rather sit, at a couple of the team’s games now and has vowed to continue sitting through the National Anthem in the regular season games as well.

Continue reading

Van Susteren out at Fox

13 Sep


Greta Van Susteren is out at Fox News, leaving the company last week and offering a mea culpa to former colleague Gretchen Carlson on her way out.

After Carlson filed a sexual harassment suit against Ailes, Van Susteren initially offered doubts as to the legitimacy of the claims, supporting Ailes and downplaying any reports from Carlson … or the 20 other women who came forward with similar complaints.

Continue reading

GOP legislators fearing Hispanic blowback

7 Sep

150806123730-donald-trump-campaign-store-780x439GOP legislators fearing Hispanic blowback

One of the unspoken whispers fluttering back and forth in the back halls and byways of the GOP machine this election cycle is what will happen to the down-ticket vote. Republicans have been gaining with Hispanics in national polls in recent years, but Trump remains a polarizing figure in that voting bloc. Case in point: a top seller in South Texas? Donald Trump piñatas.

Continue reading

David Firester’s Critical Review of McCauley & Moskalenko’s book, Friction: How Radicalization Happens to Them and Us

4 Sep

cvr_frictionDavid Firester’s Critical Review of McCauley & Moskalenko’s book, Friction: How Radicalization Happens to Them and Us

The Path to Policy Hell is Paved with Well-Intentioned Academic Work

Summary, Analysis, Observations and Questions:  McCauley C. & S. Moskalenko.  2001.  Friction: How radicalization happens to them and us.  New York: Oxford University Press.

By David Firester

I wrote the following long critique on the above book last year.  However, I never published it here, until now.  Since it has received such great acclaim in academia, I felt it was important to critically assess its place in the academic world of terrorism studies.  To this end, I have authored what I would say is merely the tip of the iceberg in terms of exposing academically misguided research.  I offer it to you, the public, to consider what I have said and juxtapose it to the book’s content itself.

Continue reading

Reflecting on the Wisdom of an Intelligence Professional, by Way of a Book Review

4 Sep


David Firester’s Book Review of Crumpton, Henry A. The Art of Intelligence: Lessons from a Life in the CIA’s Clandestine Service. Penguin, 2012.

The allure of Hank Crumpton’s book, for the layperson, is probably that it’s an eye-opening journey through the seemingly secretive intelligence world.  To the student of intelligence, however, it is both a cautionary tale and a road map that indicates what sorts of obstacles may lay ahead.  The book’s title tells us much of what we need to know about its contents.  First, the notion of an “art” of intelligence is, as Crumpton mentions, a conjoining of concepts laid out by two of history’s great thinkers: Allen Welsh Dulles and Sun Tzu (13).  The former was a more contemporary American intelligence leader and the latter was an ancient Chinese military theoretician.  Both of their works continue to be used today, as a tool for thinking about strategy and tactics.

Continue reading

David Firester’s Book Review of Lieutenant General (ret.) Michael T. Flynn’s Book, The Field of Fight: How We Can Win the Global War Against Radical Islam and Its Allies

2 Sep


Book Review of Flynn, M. T., & Ledeen, M. A. (2016). The field of fight: How we can win the global war against radical Islam and its allies. New York: St. Martin’s Press.

By David Firester

Continue reading

Burkini ban spikes sales

30 Aug


France has a terror problem. No one can seriously debate that fact, or the international impression left on people in and out of the country who have watched multiple mass terrorist attacks across the country.

Continue reading

The Advantages Of Early Involvement

22 Aug


One of the key aspects of successful management is knowing when to get involved in the process. Jump in too early and your team will lose its ability to make decisions on their own. Jump in too late and they will have some ideas too far along in the process to make the best changes.

Continue reading

Terrorism in the West, Again

18 Aug


One of the consistencies with regard to terrorism is that it is nearly impossible to predict, with any precision, where future attacks may occur.  This is not news.  What is, however, is that terrorist practitioners have sunk to a new level; even as we can’t imagine there are lower levels to which they could descend.  By riding the wave of instability in the Middle East, the leading transnational terrorist organization, the so-called Islamic State, has found a way to project power into the heart of Western civilization.

Continue reading

Zika becoming a PR crisis for Brazil games

15 Aug

Zika 1_1453986083873_772711_ver1.0

For millions across the globe, knowing what to make of the Zika virus has become a frustrating mental calculation. Headlines are dire, but stories seem to ramble and offer a lot of statistics and corollary worries. But at least one U.S. Olympic athlete is taking no chances.

Continue reading

4 Tips for Better Security at Home

10 Aug


Property crimes, such as burglary, remain a concern for many in the U.S., but there are ways that you can improve the security of your home and protect your family and possessions.
Continue reading

Trump finally admits a mistake

8 Aug

Trump finally admits


Given how the PR gaffes have been stacking up, coupled with the GOP team’s work to have their candidate strike a more presidential pose, it had to happen sooner or later. Last week it did. Donald Trump admitted a mistake. Then, with standard Trump deftness, he pivoted and turned that mistake into a jab at his opponent. Folks who want to talk about Trump being “new” to this political thing may want to pay attention. This guy is not any kind of wet behind the ears.

Continue reading

Protesters extinguish Olympic torch

2 Aug

Protesters extinguish Olympic torch

With less than a week to go before the Rio Olympics kicked off, protesters were nearly constant in Brazil’s two largest cities, Rio de Janeiro and Sao Paulo. Things got so bad at one point that protesters last week blocked the Olympic procession, grabbed the torch and extinguished the flame. You know, the Olympic Flame, the one representing brotherhood and competition and unity that’s never supposed to go out? Yeah, they snuffed that one. If they were looking for international headlines, they got them.

Continue reading

Israel faces off with Facebook on terror worries

26 Jul

facebook-76536_1920 (1)

It’s a nugget tucked away in just about every story about specific Middle Eastern terror attacks. How “successful” terror groups are using social media to recruit and “radicalize” youth. Tucked away, but salt in a wound of countries and people who have fought desperately not only for the right to exist but the right to live free. A right infringed every day by murderers.

Continue reading

The Top Five Universities for Studying Political Science in the United States Reasons to Pursue a Political Science Degree

19 Jul


There are a number of reasons why choosing to study political science is a good idea. For starters, political science examines the core principles behind how Western government is structured, and, as such, is useful in many fields. Learning about political science helps in understanding how the United States government works, and this, in turn, leads to having a better grasp on how the United States exists within the context of the entire world.

Continue reading

Ashley Madison is back with different bosses

18 Jul


Not that long ago, a betting man may have sworn jilted wives would be the group to bring website Ashley Madison down. Turns out, a massive data breach sealed the deal. But the data breach revealed more about the “cheating” website than a list of men looking to mess around. It pulled the curtain back revealing countless fake profiles and a host of other issues that embarrassed the company right along with the users.

Continue reading

It’s Time For The Olympics To Tie Into Everything

18 Jul


The Olympic Games are nearly here, and that means it’s time for the Big Brands to do their best to connect with the world’s biggest sporting extravaganza. It’s already popping off across NYC as top brands from Coke to Samsung try to be the first in and make the biggest splash.

Continue reading

Good news for Olympic fans

13 Jul


The Rio de Janeiro 2016 Olympics and Paralympics have faced difficult issues, and the PR in most cases could not be much worse. First, Brazil is right in the heart of the worst of the Zika virus scare area. And that scare has been bad enough that even some of the athletes are willing to walk away from a once every four years opportunity – and because the athletic life of a competitor could easily come to an end before another four years passes, that might mean the end of any Olympic dreams for those walking away. Still, to some, the risk is great enough that they are doing just that.

Continue reading

Clinton’s email woes not over yet

11 Jul
Hillary Clinton email controversy

Hillary Clinton email controversy

There’s a ton of controversy circling around Hillary Clinton and those emails this week as the FBI recommended no criminal action be taken against her for not keeping top secret information secure – they did recommend administrative action.

According to Paul Ryan, administrative action in this situation would translate to cutting her off from any access to classified or top secret documents in the future. And now that the possibility of criminal charges has been set aside, the State Department has reopened their investigation into the matter. And if “administrative” action is recommended by them, “we have a problem, Houston!”

Continue reading

Debunking the Myth of “Jewish Terrorism.” A Micro-Level Assessment of the 2015 Data

9 Jul

By: David Firester

The Global Terrorism Database (GTD), which is managed by the University of Maryland’s federally funded National Consortium for the Study of Terrorism and Responses to Terrorism (START) recently released its 2015 user-friendly database to the public.  The significance of such a robust catalogue of terrorism is that it is used to generate scholarly articles and to supply the Department of State, among other agencies, with a factual basis on which to author official reports.  In turn, such reports may be used to buttress open-source foreign policy assessments and perhaps inform decision makers.  It is therefore very important to understand the degree of accuracy associated with the GTD’s statistics, as well as the attendant policy implications that might be drawn from them.  Although there are many areas in which to focus one’s review of the database, this article is primarily concerned with the inferences that might be mistakenly arrived at with regard to the situation in Israel.  I have found a few trends, and some factual errors, which I will highlight and analyze below.  My aim here is to alert future researchers and decision makers to the distortion of material facts, and the attendant conclusions, that may be discerned from this particular macro-level database.

The “Israel” Dataset

The GTD indicates that there were 58 incidents of terrorism in Israel (excluding the West Bank and Gaza) in 2015.  Of that number, 8 were said to be committed by “Israeli Extremists” (7), or “Jewish Extremists” (1).  In reviewing these instances, I found that one such event may not have occurred at all (201510030023).  The single source cited could not be found in any online search (e.g., Lexis Nexis, Google Scholar and general Google searches yielded no results).  Additionally, no attack type, no weapon type, and no named perpetrator were listed in the database.  Nonetheless, the GTD summarized the incident in the following way, “Assailants attacked an Arab driver in Jerusalem, Israel. A pedestrian was wounded in the attack. No group claimed responsibility for the incident; however, sources attributed the attack to Israeli extremists” [emphasis added].  A single illusive source is hardly evidence of an event having transpired.

In researching another incident (201510130038), committed by “Israeli Extremists,” it initially appeared to me that the GTD missed an Arab terrorism event (in East Talpiot/Armon HaNatziv).  That attack resulted in 2 Israeli deaths, one of whom was an American citizen, despite the fact that the GTD reported zero American deaths, coded as “nkillus,” for 2015 inside Israel.  This came to light as I was reading the two source documents the GTD attributed to the “Israeli Extremists” attack.  Both articles cited 4 other Palestinian attacks, of which the GTD only accounted for 3.  I did discover, however, that the GTD coded the East Talpiot/Armon HaNatziv event as occurring in the “West Bank and Gaza Strip” dataset.  The database specifically names the intersection of Olei HaGardom St. and Moshe Barazam Street [sic; Barzani is the correct spelling] as the location in which the attack occurred.  Although the attack did take place on the first of the two named streets, there is no indication that it did so at the intersection of the second.

A reasonable question to ask is why such a minute detail matters for the integrity of the database.  The answer is that if the attack were to truly have taken place where the GTD says it did, then it would support a narrative that the lethal attack on Israelis (and in this case an American) occurred in the so-called “occupied territories,” thus lending credence to the oft-cited attack rationale associated with “resistance to the occupation.”  Indeed, the GTD gives the coordinates 31.749712/ 35.236954, which is a Jewish neighborhood in East Jerusalem.  This seemingly minor detail also informs the analyst as to where the GTD has decided to draw its own lines.

The “West Bank and Gaza” Dataset

Beyond the “recognized” borders of the State of Israel, which the GTD has apparently defined for researchers (see my above analysis), they consider the “West Bank and Gaza” in a separate dataset.  With regard to Jewish or Israeli perpetrators, they code them as either “Israeli Extremists,” (always listed as plural) or “Israeli Settler” (always listed as singular).  Such a distinction appears to be arbitrary, but one matter worth consideration is that to call someone a “settler” undermines the legitimacy of their legal status as a citizen.  In this respect, the GTD staff is discriminating in a way that appears to be other than neutral.

To summarize the statistics, the combined total number of attacks for 2015 in the “West Bank and Gaza” dataset numbered 247, with 120 non-perpetrator deaths (including 3 U.S. citizens), and 242 injuries (including 3 U.S. citizens).  The number of attacks attributed to “Israeli Extremists” was 5 and “Israeli Settler” was 14, for a total of 19 out of the 247 attacks, or just under 8%, being committed by Jews/Israelis.  It should be noted that all attacks in Gaza, which numbered 32, exclusively featured Arab attackers and/or Arab victims and resulted in no fatalities.

With regard to the “West Bank” portion of the dataset, looking closely at the alleged attacks by Israeli settlers/extremists, reveals some strange coding preferences that require further analysis.  For instance, on October 9 in Kiryat Arba, an event (201510130063) occurred, for which the perpetrating party was coded as “Israeli Settler.”  According to the GTD, the incident resulted in no injuries and no weapons were used.  The single source upon which the GTD relied was from a Palestinian news agency, Ma’an, which produced pictures that didn’t necessarily indicate an act of violence per se.  Rather, while carefully reviewing the photographic “evidence,” it appears that the Palestinian journalists entered a Jewish neighborhood to report on an incident occurring nearby, in which a Palestinian dressed as a journalist, stabbed an Israeli soldier, and were subsequently being forced to lower their cameras.  This event took place during the most violent month of October and given the above-described specific circumstances was likely a defensive measure, rather than an act of “terrorism” that the GTD ascribes to “Israeli Settler[s].”  In the database, there is room to indicate if there is doubt that an act is terroristic in nature.  None was conveyed for the instant case.

Another incident is even more troubling, because it actually didn’t happen.  While attempting to corroborate the single source cited for an alleged attack on a mosque in Mughayir, it became apparent that the GTD actually recycled an article from al Jazeera that dated from 2011. Indeed, all of the alleged “facts” in the GTD database were identical to the story that was promulgated by al Jazeera four years earlier.

For two “terrorism” incidents (201502250058/201502250059), which involved the alleged firing of automatic weapons at Palestinian homes, the GTD used a single, uncorroborated, source: The Muslim News.  Judging from the language used in the article, there is reason to believe that it may not have occurred.  Even still, there could at least have been an indicator as to the veracity of its alleged occurrence.  The GTD’s staff doesn’t issue such assessments.  That is the job of the analyst.

While investigating a vandalism attack (201503040051), which likely did occur and was categorized by Israeli authorities as “Jewish terror,” according to one of the two sources the GTD used, an event (201411120036) from the previous year was mentioned. In that event, it was alleged by local Palestinians that a mosque in Mughayir was set ablaze by Jews.  As the article points out, however, the police determined that the cause of the fire was faulty wiring.  To their credit, the GTD did state that it may not have been terrorism, although the incident remains in the database from 2014.  The unfortunate result is that deficient Palestinian engineering is given the equivalent status of an act of Jewish terrorism in the database.

In another likely case of an electrical fire having been mistaken as a Jewish terror attack (201508240041), the GTD, again to its credit, did indicate doubt that terrorism was afoot.  However, as in the previous unlikely incident, this too is counted in the aggregate as resulting from Jewish terror.

Severity of Jewish/Israeli Attacks

For all of the purported Israeli attacks inside Israel (not including the West Bank and Gaza), only 1 (5%) resulted in the death of a (non-Arab) civilian, whereas the total number of recorded deaths (not including those of the perpetrators) in Israel for 2015 was 20.  In the instant case, the only one in which the GTD labeled the single assailant as “Jewish Extremists” [sic], the perpetrator attacked a Gay Pride parade for the second time and was consequently sentenced to life in prison. This event was very much an anomaly in that attacks against fellow Israelis for their sexual orientation is a rare occurrence.  What is notable is that not only does the State of Israel apprehend, prosecute and punish Israelis who perpetrate violence against Arabs, but also against those who attack gays.  Although I may be stating the obvious, for context’s sake it is well-known that Israeli tolerance of others’ identities is evidenced by the fact that it is by far the only gay-friendly country in the region (to include Arab-controlled territory in the West Bank and Gaza).

With regard to attacks by Jews/Israelis in the West Bank (recalling that Gaza had none), only 1 of the 19 was lethal, but it resulted in 3 deaths, accounting for about 2.5% of all deaths caused by terrorism in this particularly named area.  It was the July 31 arson attack against a Palestinian home, for which a man and a minor were originally indicted, although it remains unclear if the man had acted alone.  Nonetheless, Israeli authorities have been actively pursuing the suspect’s potential ring of similar offenders.  Again, we have prima facie evidence that the Israeli government takes Jewish violence seriously.  Of the 19 attacks carried out by Jews/Israelis, 12 (63%) were with an incendiary device, 4 by firearms (21%), 1 chemical [tear gas] (5%), 1 melee (5%) and 1 unknown (5%).


What a database can’t provide is context.  This effort requires an analyst.  For example, in the “Israel” dataset, 2 attacks, or 25% of all Israeli/Jewish attacks, were arsons against churches.  In another example, an attack was alleged to have occurred in Netanya (201510090056), in which the GTD cites “sources attributed the attack to Israeli extremists.”  Again, there was an uncorroborated single source, which, when checked, referenced a different article in which the account (in Hebrew) described a back and forth exchange between Jews and Arabs, the latter of whom were allegedly shouting, “Allahu Akbar.”  At the time in which this incident took place, 6 Palestinian terrorist attacks had already occurred inside Israel that month and 9 in the “West Bank and Gaza.”  Indeed, October was the most violent month in 2015, featuring 26 out of 58 attacks, or 45% for the “Israel” dataset that year.  Of this figure, 5 of the 26 attacks were coded as Israeli/Jewish, 19% of the monthly total, representing 63% of the 8 that occurred that year in the “Israel” dataset.

In the “West Bank and Gaza” dataset, October was, similar to attacks in the “Israel” dataset, the most violent month of the year.  It featured 72 attacks, or 29% of the total number of attacks in the West Bank and Gaza.  For a comparative assessment, the previous 7 months featured a total of 74 attacks.  The proportion of attacks by “Israeli Extremists,” or “Israeli Settlers,” when compared to attacks by others in that month was 6 out of 72, or 8% (in line with the previously addressed annual percentage).

Combining the two datasets (see Appendix A), the data shows that of the total 305 terrorist attacks the GTD recorded for 2015, 27 (9%) were committed by Jews/Israelis, which if adjusted for the aforementioned fact that at least one attack didn’t occur and several others could not be substantiated would reduce the percentage to something around 8%. Privileging the raw figures provided by the GTD, during the month of October, the total ratio of Jewish attacks to that of the Palestinians was 11:98, or 11%.

Analysts may be inclined to explore two distinct causal factors to explain the October violence.  First, any actions of the Israeli military should be considered.  Such actions do not meet the GTD’s definition of terrorism and would therefore not appear in the database.  Secondly, any widespread Palestinian media campaigns that aimed to incite violence, which the GTD also doesn’t include, should be investigated.  A single Israeli military action, or Palestinian broadcast, would likely not account for the level of violence that persisted at a high tempo beyond the month of October.  Therefore, one should gauge their search results with an eye toward intensity, duration and chronological sequencing.

Conclusion and Implications

The complete picture of the data is represented in Table 1 (Appendix A), which can be summarized as follows.  Jewish terrorism during 2015 represented approximately 10% of the total monthly attacks for the year, with 4 months having no attacks.  The monthly percentage never exceeded 11%, even in the most violent month of October.  The overall statement about non-Jewish terror is that it was quite the opposite.  The average monthly attacks were 90% and there were no months in which non-Jewish (read: Arab) attacks numbered less than 5.  There were some months, however, when Jewish attacks were 0 and the non-Jewish attacks were as follows: January (15), April (14), May (10) and September (13).  During months when Jewish attacks were 1, non-Jewish attacks were as follows: March (5), June (8), and in two extraordinary months, November (49) and December (42).

In light of these statistics, one of the trends that appear to be obvious is that the Palestinian attack intensity increased in October, with no apparent connection to any Israeli attacks having occurred the previous month.  Another trend appears to be that once Israeli terrorism was at its peak in October, it quickly diminished to 1/month for the next two months.  This was despite the third apparent trend, which was that non-Israeli terrorism slowly diminished during the same period.  One could therefore say that Arab terrorism ratcheted up quickly, but down slowly (and painfully).  One additional insight is that Arab terrorism appears causally unconnected with Jewish terrorism.

Although the GTD does capture a fair number of incidents, its database is largely populated by students, who respond to directions provided to them by algorithms.  The result is that one who is unaware of the context of particular conflicts, as well as some of the nuances that attend it, may not generate an accurate threat picture with regard to terrorism.  For instance, the Israeli Security Agency (Shabak) composes its own, publicly available, annual reports on terrorism.  Its 2015 report reflects statistics that differ markedly from those of the GTD database, but more scholars and policy analysts may be inclined to use the latter, rather than the former.

The reasons that the GTD’s aggregate data differs from that of the Shabak’s are threefold.  First, there is a difference in the way attacks are calculated.  The GTD doesn’t include many of the failed or foiled attacks, nor does it consider most rocket/missile/mortar attacks originating in Gaza.  This is a bit odd, considering that the GTD’s “Data Collection Methodology” includes “an intentional act of violence, or threat of violence by a non-state actor” [emphasis in the original].  One might be inclined to assume that the GTD considers Hamas to be a state actor.  However, this would be out of step with the fact that they did record a Hamas assassination attempt within Gaza (201502160091) in 2015.  Additionally, the GTD recorded (in the Israel dataset) only one rocket fired from Gaza (201510100023), but indicated that the assailants were “unknown,” therefore not coding them as “Palestinian Extremists.”  To wit, there are only Palestinians living in Gaza and the act of firing on a civilian population is patently extreme.

The other requirements that the data must meet also render the exclusion of Hamas/Gaza as suspicious.  According to the GTD’s methodology, two of the following three criteria must be met:

  1. The violent act was aimed at attaining a political, economic, religious, or social goal;
  2. The violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and
  3. The violent act was outside the precepts of International Humanitarian Law.

In looking at projectile attacks emanating from Gaza, one can’t logically conclude that it fails to meet the benchmarks set forth by the GTD.  In fact, Hamas’s attacks qualify on each of the 3 grounds.  It cannot reasonably be argued otherwise, unless the data coders are in agreement that such actions are somehow legitimate.  This would place the GTD firmly in the camp of those who assert the rights of Hamas/Gaza to attack Israel.  Such an inference, if it were correct, would undermine the credibility of START as a nonpartisan think tank.  After all, the center is a “Department of Homeland Security Center of Excellence.”

The second reason that the GTD’s data differs from that of the Shabak’s has to do with the way in which it distinguishes territorial lines.  As was already mentioned, the GTD has two distinct datasets for “Israel” and the “West Bank and Gaza.”  Scholars who miss this fact will arrive at some very skewed conclusions.  Even when accounting for this fact, however, the statistics are still vastly different.

Thirdly, the GTD doesn’t appear to retrospectively analyze the data it collects, although its leading scholars use the data to produce peer-reviewed journal articles and books.  Again, I have listed a few occasions in which a matter was either reported to be a terrorist incident when it turns out not to have been, or an incident was said to have taken place when it seems likely that it did not.  I have also pointed out the many events that the database has missed.  The unfortunate consequence is that the GTD’s aggregate data enables those who conduct macro-level studies to manipulate it in such a way as to draw imprecise conclusions.  This is the precise reason why I have offered a micro-level assessment of the GTD’s database with regard to a specific independent variable, Israeli/Jewish terrorism.



David Firester is the founder and CEO of TRAC Intelligence (Threat, Reporting, and Analysis Consultants), which is a premier threat analysis firm. TRAC Intelligence provides threat assessment in the private sector.



Appendix A: Visual Data

Despite the various faults with the data, identified above, the following is a visual summary of the GTD’s combined datasets, “Israel” and the “West Bank and Gaza.”

Table 1: Average Monthly Attacks in “Israel” and the “West Bank and Gaza” 2015


Graph 1: Numerical Expression of Average Monthly Attacks in “Israel” and the “West Bank and Gaza”


Graph 2: Percentage Expression of Average Monthly Attacks in “Israel” and the “West Bank and Gaza”


Potentially Misleading Statistics on Global Terrorism

30 Jun

Potentially Misleading Statistics on Global Terrorism

Recently, the 2015 statistics were released by the Global Terrorism Database (GTD), hosted at the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START).  Prior to making the data publicly available, of course, scholars associated with START took the liberty of publishing their own articles while access was monopolized.  The State Department also got a head-start on putting out its 2015 report on terrorism, based largely on START’s work.  This is somewhat fitting, as START’s funding comes exclusively from federal dollars.  Aside from a little monopolization of publicly funded databases, there are some important misleading conclusions that the layperson might be inclined to draw.  I will explain how and why this is the case.

In considering the recent GTD data release, Andrew Flowers (of FiveThirtyEight) did interpret something correctly when he observed that “Terrorism Declined Last Year- but Not in the West.”  In his brief article, he correctly cited START’s GTD statistics that support the claim that terrorism was reduced abroad from the previous year (2014). However, in his search to understand why, he interviewed the GTD’s program manager, Erin Miller, who stated that “it’s possible that ‘2014 was just a really bad year and 2015 was still violent but somewhat less so by comparison.'”  This is somewhat incomplete, because it doesn’t take into account the shifting sands, so to speak, in the battle against the Islamic State (IS) transnational terrorist army.  For instance, the introduction of Russian Airstrikes would have had some impact on the Islamic State’s ability to act effectively in carrying out terrorist attacks in the region.  Additionally, the combined efforts of the Iraqi/Iranian governments and U.S. (and allied) air support had to have hindered some of the key logistical elements that IS would have needed to attack locally.

Another area in which START’s GTD is less than helpful is in their methodology.  The GTD claims, and Ms. Miller is cited by Flowers as stating that, the classification for terrorism includes “threatened or actual use of illegal force and violence by a nonstate actor…”[Emphasis added.]  The problem is that the database doesn’t include failed or foiled attacks; many of which were Islamist-inspired.  In 2015 alone there were at least 56 arrests on ISIL-related charges in the U.S. (note that the figure might be higher, as the report only covered the period ending November 12, 2015).  This statistic is not captured in GTD’s database, while many of the alleged “terrorism” events didn’t meet their own criteria to be so labled (6 out of 38, or 16%).  Yet, Flowers cites Miller’s example of church arsons in what appears to be an effort to claim racially motivated (read: right-wing) violence.  The implication one might incorrectly discern is that there are fewer instances of Islamist violence, or planned violence, than other sorts of terrorism, or suspected terrorism.

A more appropriate set of conclusions to be drawn are two-fold.  First, terrorism abroad has been hindered in the Middle East as a result of a broad offensive against its primary perpetrators.  Much of the IS-related attacks in the region have been carried out as operational-level strikes that support the ongoing insurgency.  The second conclusion is that domestically, terrorism has been on the rise, but Islamist-inspired terrorist plots have been disrupted far more frequently as a result of law enforcement’s due diligence.

Although Mr. Flowers mentions “the killing of three Muslims in Chapel Hill, North Carolina” as the “fourth-deadliest attack in the U.S. last year,” he doesn’t mention that even the GTD doubts it was motivated by anti-Muslim hate.  Absent in many discussions of global terrorism trends (including the piece under review here) is that of the 10 most deadly terrorist organizations in 2015 a full 90% were Islamists (mostly allied with IS and a couple with al-Qaeda).  This is, of course, obscured by focusing on the extremely rare instances in which Muslims are killed by non-Muslims and ignoring the patent fact that most Muslims (and many non-Muslims; especially in the Middle East and Europe) are victims of Islamist terror.

David Firester is the founder and CEO of TRAC Intelligence (Threat, Reporting, and Analysis Consultants), which is a premier threat analysis firm. TRAC Intelligence provides threat assessment in the private sector.




Wage Fight Reaches Christie’s Desk in NJ

29 Jun

Wage Fight Reaches Christie’s Desk in NJ

The minimum wage debate has landed in New Jersey prompting a showdown not just between the state legislature and the governor’s office but between two warring political factions in an election year. Continue reading

Resetting The Balance Between Marketing Work And Real Life

28 Jun

Resetting The Balance Between Marketing Work And Real Life

Hopefully, your marketing work in 2016 is off to a roaring start. You don’t want to experience burnout in the next few months, though! It’s important to keep your professional life from overwhelming your personal one, and everyone on your team has a similar need for a good work-life balance. Here are some good general principles to help you strike a balance between work and life that maximizes productivity and minimizes stress. Continue reading

Framing Orlando: An Act of Terrorism or a Hate Crime?

13 Jun

Framing Orlando: An Act of Terrorism or a Hate Crime?

The murder of 49 Americans in a Gay Nightclub is both an act of terrorism and a hate crime. The elite Left will play down the shooter’s Muslim identity and then proceed to shift the focus to push a narrative that “guns kill people” and not the people themselves or the ideology that fuels their murder sprees. Contrary to that position, however, it is more reasonable to assert that Islamic Jihadist Terrorism is itself based on a hate-filled ideology. It is both hate and terror.  It is not all about guns, but in the coming days Americans will be bombarded with a heavy dose of propaganda that makes it seem to be so.

Yesterday, a radical Islamist carried out his hate-filled act of violence against a Western target.  He, who shall not be named here, deliberately sought to inflict pain, death and ultimately terror upon people who were pursuing their happiness as they saw fit.  The inclination of some is to try to understand why this has happened and look for a means to avoid it in the future.  The bad news is, many politicians are afraid to combine the words “Radical” and “Islam.”  What is worse, however, is that many will now try to retrospectively reconstruct what caused this violence to take place and then take the sort of misguided action that logically flows from their pronouncements.  So, what can we expect from the American Left?

One can expect that a discussion of “gun control” will ensue, as it already has.  The reason is that the shiny object represents a low-hanging fruit, which makes the politician’s job easier.  This is because politicians need to be seen as acting on the heels of a national tragedy.  Treating a symptom as though it were a cause is the fastest way to do this and the American political Left is very adept in this regard.

The aforementioned tactic is very attractive and powerful, even in the face of contradictory evidence.  Some examples to consider are the fact that the mass casualty attacks in London, Madrid, Brussels, Paris (twice), and yes, Boston, largely featured explosives.  To be sure, firearms were present in the Paris attacks, but they were wielded by the terrorists.  Citizens, after all, are not allowed to defend themselves by owning firearms in France.

Some additional evidence undermining the “guns kill people” diatribe could be seen in the fact that terrorist attacks needn’t be carried out by any firearms.  The Palestinians, ever the terrorism innovators, have shown that vehicles and kitchen knives (and the potential use of terror tunnels) can cause mass casualties.

With regard to global terrorism trends, between 1970 and 2014, as reported by the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START) Global Terrorism Database (GTD), bombings/explosions have accounted for approximately 68,779 attacks in that period (see Table 1).  Astonishingly, the trend over the past several years has been an exponential annual increase, more than tripling between from 2011 to 2014 (see Table 2).[1]

The GTD data from 2015 has yet to be released and therefore doesn’t include the two Paris attacks, nor the Brussels attack.[2]  The sum total of bombings, however, is reported to be approximately twice the number of assaults by firearms.  Nonetheless, one can see that a murderous rampage doesn’t require a firearm; commitment will suffice.

People carry out mass casualty attacks against a variety of targets for diverse reasons, to include the efforts of a suicidal man who hurled a homemade bomb at an airport check-in counter in China today.  Only four people were injured, but the non-firearm attack could have easily produced deaths and more injuries.  However, it seems that the more recent attacks against the West have been fueled by a hateful ideological set of priorities.  Two operational principles, taken from the lexicon of political science, should be kept in mind as the aftermath of the Orlando event unfolds.  First, politicians will attempt to “cue” people who seek to understand where it is they stand on this particular issue.  The second is the “framing” of the issue, which is the effort to assert that something is a case of one thing and not another.

The cueing by politicians on the Left will likely be coordinated by what some call an Advocacy Coalition Framework (ACF).  This network doesn’t merely consist of political people, but includes news outlets, think tanks and academics who share a similar ideology.  People who generally tend to agree with the general view of a particular party, politician, news outlet, or blogger, will tend to tune into the source that is most pleasing to them.  Hence, if you are a Leftist, you will not be reading The Wall Street Journal or listening to Fox News; you’ll be tuned into satirical “info-tainment” such as The Daily Show, or reading The New York Times.

The ACF will work to frame the event as part of a series of mass casualty violent shooting incidents, with most of the emphasis placed on the weapons chosen.  The least emphasis, and what really makes for bad policy, will be placed on calling out the root cause of this specific type of mass casualty event: radical Islam.[3]  This pathway is disastrous, but it is predictable.  In fact, feel free to return to this prediction in the weeks and months ahead.

Table 1: Global Terrorist Bombings 1970 – 2014



Source: GTD, as of June 13, 2016

Table 2: Global Terrorist Bombings 2011 – 2014

Year No. of Attacks
2011 2605
2012 5087
2013 6684
2014 8802

Source: GTD, as of June 13, 2016


[1] Although bombings outnumber shootings, this should not be eclipsed by the fact that they often go hand-in-hand and may form part of a larger combined arms campaign.  Additionally, the GTD fails to account for many types of incidents where a death or injury did not occur.  In this regard, the thousands of missiles launched into Israel from Gaza are almost completely missed in the data.

[2] A preliminary report, however is available online and has been generated in a more robust format by the U.S. State Department.

[3] When using the terms “radical Islam” in combination, one shouldn’t think that the notion that the ideas are radical to Westerners necessarily indicates that they are so for Muslims in general.

Orcid QR Code for David FiresterFor more academic work, visit David Firester on


Blackberry Releases New Crisis Communications Platform

8 Jun

Blackberry Releases New Crisis Communications Platform

AtHoc, a division of Blackberry recently released an updated version of their crisis communications platform. This new version brings additional capabilities with it allowing customers, including the Pentagon, more pre-planning resources and automated processing of activities related to crisis communication. Continue reading

Trump & Clinton Trade Blows in First Salvo of November Election

6 Jun

Clinton vs trump

He’s been teasing it for months now, through the tough primary contest, and now Donald Trump has begun to unleash on Hillary Clinton. The presumptive Democratic presidential nominee is hitting back. Continue reading

Public Opinion Analysis: Being a Committed Leftist is Linked to Disdain for Israel

3 Jun Wide gap between Clinton & Sanders supporters in their views of Israel chart

Over the past couple of years, I have been quietly building on a theory that what really causes the American Left, and perhaps their foreign ideological brethren, to favor the Palestinians over Israel is actually rather simple to understand.  The Left thrives on, and is obsessed with creating new categories of underdogs[1] (the poor, minorities, or anyone whose reduced power position is assumed to render them ‘oppressed’).  This usually requires a narrative fallacy, such as unarmed black males are unjustifiably killed by armed white police officers (“Black Lives Matter”), or that the Palestinians are the perpetual victims of the State of Israel (the BDS crowd).  The thing about narrative fallacies is that they can be rather attractive, particularly for people with a penchant for intellectual laziness.  Populist rhetoric seems to pay dividends for politicians, but there seems to be some limit to its policy effects. Continue reading

LG is Losing Ground to Apple’s Old Models

13 May

LG is Losing Ground to Apple’s Old Models

It’s one thing when you’re best is losing a head-to-head battle against your competition’s top products, but what do you do – and what do you think – when your best is still being outsold by a company’s earlier model? That seems to be the spot LG finds itself in these days.

Apple’s last four-inch screen iPhone was released way back in September 2013. Since then, the 5, 5S, 6 and 6Plus all had larger screens, essentially “catching up” with the competition from Samsung, LG, and others. At least on paper.

But the real tale of the tape – the sales – offers a much different story. In 2015, Apple sold more than 30 million older iPhones with four-inch screens. These were older models, with less new tech than their competition. But, apparently, when it comes to smartphones, maybe size doesn’t matter.

Cho Ju-no, CEO of LG, disagrees. Not long ago, Cho went on a bit of a rant about Apple bringing substandard, boring handsets back into its lineup. This commentary was in reference to the upcoming iPhone SE, which is Apple’s version of an upgraded 5S.

Cho talked about “adding value” and delivering “fun and exotic” products to customers, specifically touting the LG G5 handset. He scoffed at the SE rollout, calling it “same old technology and features.”

Cho piled on, saying cost-effectiveness is not the top priority. Instead, manufacturers should offer special customer value. He finished by saying he didn’t care much for Apple’s product.

Now, all of this is primo content. It’s the sort of fire-breathing customer-centered vows and vision you want from your CEO. But that doesn’t change one simple fact: LG is losing. Apple is selling iPhones – even the old, obsolete ones – like proverbial hotcakes. Consumers want the brand and the identity more than they do the model or even all the bells and whistles.

Sure, some people will go after the larger screens, better cameras, and other features, but those customers would do that anyway. They’re not buying Apple because they’re not buying Apple. However, consumers loyal to Apple put up with “inferior” products for years to earn the other benefits of having an iPhone – connectivity, collaboration, and equipment crossover between other Apple products.

Cho is right to say his company should not copy what Apple is doing. He needs to keep coming up with new and better … but LG also needs to find a way to instill the sort of customer loyalty that would cause a consumer to buy LG without even considering the competition. Because that’s what he’s up against.

David Firester specializes in intelligence analysis and is based in New York.

Holiday Inn Gets a Surprise Bump from Trump

13 May

Holiday Inn Gets a Surprise Bump from Trump

When presidential candidate Donald Trump tweeted his experience at a Holiday Inn Express, the missive set off a self-sustaining feedback loop that both lauded and lampooned the brand in question – both Trump and Holiday Inn.

On the surface, an “attaboy” from a hotel mogul is a strong endorsement for a hotel chain. They offered good service, Trump, and his entourage appreciated it … end of story, right? Chalk it up as a win.

Not so fast…

In the context, it’s tough to forget the constant commercials from Holiday Inn Express in which unqualified people unfamiliar with a certain job are suddenly able to do things like perform surgery or stop a nuclear cataclysm because they slept at Holiday Inn Express.

And, of course, political newcomer Trump wants to occupy the top political position on the planet…with exactly zero experience. You can see where this is going. And it got ugly fast.

Soon there was a cacophony of voices slamming Trump in various creative and some not so creative ways. Par for the course these days on social media, really … it’s what came of all that arguing that gave both sides some meat on the bone they keep chewing.

By the end of the night, not only was Holiday Inn Express trending on Twitter, but someone had unearthed another story about Trump many people have never heard before.

Trump has a connection with Holiday Inn that, according to his book “Art of the Deal” goes back decades. Back then, he was trying to get the Holiday Inn folks to invest in one of his casino projects, but construction fell behind. So Trump told his construction manager to bring in some heavy equipment and “look busy” … didn’t matter what they were doing as long as they were moving dirt. The ruse worked, and Holiday Inn invested in the deal. Trump supporters said, “well done, Donald, you got the deal and built something good.” But others took a more negative direction with their commentary.

Regardless of which side viewers took, the exchange gave them concrete history on which to base their position. On one side you have the folks who celebrate Trump’s ability to get the job done and get the deal made. On the other you have those who say it’s another example of how his campaign is all about smoke and mirrors.

David Firester is an intelligence analysis expert in New York.

Syrian Penetration of the Southern European Front: Observations and Implications

19 Apr

Syrian Penetration of the Southern European Front: Observations and Implications

Recently, I had occasion to travel to southern Europe.  Specifically, I was on the border of Greece and its northern neighbor, Macedonia.  I was rather interested in gauging the Syrian refugee issue from the standpoint of a passerby.  What I noticed was that all along the road leading from the border toward Thessaloniki one could see gas stations filled with tents, kids playing soccer, women cooking on open fires and men walking along the road; a few of whom were hitchhiking (shown below).

What stood out to me was the sheer number of military age males, many of whom were equipped with cell phones.  The experience generated two questions.  First, where do desperate refugees acquire the funds to purchase cell phones and data/voice plans that would work in Europe?  Secondly, is it possible that the men were merely innocent victims in Syria’s half decade of civil war?

One can only surmise that the first question could be answered with the discovery of additional evidence.  Nonetheless, it is curious.  The second question, however, seems to be more thought-provoking and the answer is partially known.  As anyone keeping up with the news can plainly see, the latest source of attacks in Europe have come from the Arabic-speaking conflict zones.  The Islamists who carried out assaults on Western Europe apparently mixed in with the majority of innocent refugees.  What the men have in common with each other is that they are all fighting age.  What they also have in common is an allegiance to the latest (and most powerful) iteration of political Islam: The so-called Islamic State (IS/ISIS/ISIL/Da’esh).

One may be inclined to believe that the presence of military age males with cellphones among women and children is insufficient evidence of the potential for terrorism to materialize as they move into central and Western Europe.  That is a fair guess.  Yet guessing incorrectly has deadly consequences.  To wit, if one casually peruses YouTube for Syrian war videos, one will notice that not only are there no moderate forces, but nearly all interviewed fighters espouse some degree of Islamist sentiment.  In fact, most videos are posted by various Islamist elements; be they IS, Jabhat al Nusra (the al-Qa’ida branch in Syria), or any of the dozens of other smaller fighting units.

Hence, military age males coming from Syria (and other regional conflict zones of a similar sort) could not entirely be dismissed as mere victims of violence.  With the exception of a number of non-Arab Kurdish factions, it would be counter to the Arab men’s survival instincts to imagine that they fought alongside moderate Arab militias.  This is plausible for one important reason: there are none.  The Free Syrian Army has patently been shown to be a farce and, oddly enough, the Syrian government forces are the only Arab moderates, if the term could be applied at all.

Although the Macedonian government gets it right in not allowing the undocumented to transit through their country without papers that carry them to the other side, this country of limited size and wealth will likely suffer the fate that awaits them when a few bad actors unlawfully slip through the cracks.  As I left Macedonia, it was relayed to me by some civilians that they encountered two Arab men approximately 8.5 miles inside of Macedonia, in a mountainous area that is inaccessible by vehicular means.  The Arab men asked in English where the road to Serbia could be found.  Startled, the civilians pointed in the opposite direction, toward Greece.  Hopefully the Macedonian border guards have since scooped them up.

Beyond Macedonia

While I was at a major train station, Praterstern, in Vienna a few days after my Macedonia/Greece border observation, I noticed something else.  When the sun went down, young Arab males were hanging out at the main exit/entry point to the station.  What they were doing was staring folks down, playing loud Arabic music and generally being rowdy and rude.  For someone to imagine that they are merely displaced and alienated by Austrian society one could easily, yet incorrectly, conclude that their behavior is a result of their isolation; shifting the blame to Austrian society.  This is precisely the sort of tactic that (Leftist) refugee sympathizers typically employ: blame the nation to which an external and unyielding population has sought to establish itself.

Promoting narrative fallacies is bad enough, but the policy implications are far worse.  As I saw pro and anti-immigration protesters gathering in Thessaloniki (Greece) I wondered why it was that anyone would intentionally invite potential terrorists, along with the poor and destitute, that an economically failing country could not afford to absorb.  The myth that poverty causes terrorism has been debunked time and again, as is clearly evident by the billions of poor folks around the world that never choose the strategy as a viable option.  Indeed, even if it were true, it would run counter to one’s own argument to willfully welcome large numbers of poor immigrants who have nothing in common (language, religion, culture, and national experience) with the host country’s inhabitants. Rather, terrorism is caused by those who see fit to employ it as a tool.

At present, terrorism isn’t being used by Swedish Christians, Chinese Buddhists, or Israeli Jews.  Everyone knows who is doing it, but too many are afraid to utter the words describing the faction: Islamist Supremacists/Jihadist Ideologues.


Photographic Evidence:

 The Gas Stations in Which Refugees Were Readily Observed:

The Gas Stations in Which Refugees Were Readily Observed


The Scene from the Northern Location:

The Scene from the Northern Location


 The Scene from the Southern Location:

The Scene from the Southern Location

Military Age Males Walking Roadside:

Military Age Males Walking Roadside

David Firester, Expertise Sought and Offered

7 Apr

Recently, I was cited by Metro News as a terrorism expert.  They had asked me to comment on the new terrorism laws that recently passed in the New York State Senate and were headed to the assembly for a vote.  The paper did an excellent job of quoting me in context.  I thought, however, that I would offer my full sentiments on the matter for which I was contacted.  What follows is a more robust and complete statement of my expert opinion on the topic.  I hope you enjoy!

I was asked two fundamental questions and my answers were as follows:

  1. Do you think that Inc. Penalties for crimes relating to aiding terrorism, using social media to further terror recruitment/cyber terror/, as well prosecuting those who would remain silent with knowledge of terror plots, such as happened in San Bernardino, will have any impact on our ability to combat terrorism here? 

These proposed laws seem to serve two important goals.  First, some would enable citizens to alert the authorities when it appears that another is engaged in advancing terrorist aims either by inciting violence, or condoning it for terrorism’s sake.  Secondly, the bills appear to horizontally extend the impact of laws, which are already on the books, while adapting them to meet the changing threat landscape.  Some examples follow.

Extant laws covering larceny and money laundering may cover traditional crimes that center on personal greed, but terrorists seem to be motivated by a different set of incentives.  Certainly, traditional crime may involve a cyber component, but crafting legislation to go beyond mere criminality is a responsible means by which to deal with someone who is serving broader terrorist aims.  A specific example would be one who steals a credit card and goes online to fraudulently purchase, say, a laptop or pressure cooker, but if it turns out that one has purchased the components of a homemade bomb it is worth having a law that addresses this unique circumstance.

Another example would be grand larceny in the second degree, which is a class C felony.  All that is required in this instance is that the value of the sum stolen equals $50,000 or more.  Money laundering in support of terrorism in the second degree is already a class C felony and the monetary threshold is merely $25,000; the same charge in the first degree is a class B felony and the threshold in that instance is $125,000.  Most of the bills under consideration by the New York State Assembly either propose new, or enhance current, legislation that might result in a C felony conviction.  Only one, cyber terrorism, proposes that an A felony be charged and in that instance it deals with mass injury as a result of terrorist activity.

With regard to making a terroristic threat against a police officer, one must bear in mind that offenses, such as assault, are already treated as more serious when they are committed against a law enforcement officer.  This specific bill codifies, and increases the penalties for, combining threats that one directs at both civilians and police officers.

  1. What types of approaches would work? Is there a best strategy to help keep people safe? 

Of late, there has been an increase in cases in which Americans with no prior connection to jihadist terror have somehow demonstrated an ability to radicalize rather quickly.  Although it is difficult to know if the new laws would deter would-be terrorists, it is important to convey to jihadist aspirants that their nefarious intentions can result in more serious punitive measures.

In order to successfully fight terrorism, both at home and abroad, the law is an important tool for police and prosecutors, but also for civilians determined prevent attacks such as the Boston bombing or San Bernardino combined assault.  This proposed legislation enables our frontline law enforcement officers the ability to defend the citizenry, which is their primary function.  However, there are some significant gaps in our defenses.  Specifically, there is no national database of jihadist identifiers, which enable law enforcement to quickly and accurately connect the dots that would raise suspicion levels to a degree worth pursuing in the criminal realm.

Detecting a genuine jihadist threat is important for law enforcement.  So is establishing whether a new threat has emerged and whether it has been detected elsewhere.  As a nongovernmental entity, Jihad Intel seeks to provide law enforcement with the ability to ameliorate the natural shortcomings of the law as it is written.  It lends assistance to those whose job it is to do the dot-connecting, by serving as an open source clearinghouse for jihadist Symbology.  The tool itself may also be used by civilians, who notice something that appears to be associated with terrorism.

Your question specifically asks what approaches and strategy are appropriate.  The answer is that laws by themselves are insufficient.  A “whole of society” approach is needed.  Many crimes are solved when citizens feel comfortable speaking with the police, who then determine whether a criminal or terrorist act is afoot.  The private sector can enhance the speed and efficiency of the public sector where budgetary constraints inhibit progress.  The bills under consideration do seem to serve a more holistic strategy to combating terrorism.

The Islamic State and al-Qa’ida have specifically called for the targeting of both civilians and the police.  In some instances they have been successful.  It is wise to adopt legislation that meets the threats emanating from our enemies abroad.  A major component of their strategy is to penetrate our society and generate terror from within our borders.  The best strategy seeks to neutralize one’s adversary’s strengths.  This legislation is a means by which to do so.

Liberal Academia and My Struggle for Survival

2 Nov

Liberal Academia and My Struggle for Survival

See the attached article on FrontPage Magazine for my experience in the liberal tyranny, as a conservative insurgent.

Policy Proposal to Arm the Teachers

24 Dec


The provision of concealed firearms to teachers in rural/suburban elementary schools.

Issue Overview:

In light of the recent massacre at the Sandy Hook Elementary School in Newtown Connecticut, as well as other contemporary tragedies of a similar sort, policy makers are tasking analysts with evaluating varying forms of legislation that seek to diminish the scale of carnage associated with such forms of mass violence.  Specifically, the area of concern regards elementary and middle schools in rural/suburban areas where police response time may be slow and/or ineffective.

Policy Overview:

Scope: In many urban high schools across the country it has become commonplace to find either a uniformed police officer or guard bearing an unconcealed firearm.  Insofar as metal detectors, entry screening procedures and armed personnel are effective in deterring violence in high schools, it falls beyond the scope of this memorandum.  The reason is that such an armed presence seeks to deter violence largely, although not exclusively, from the student population.

The population within a high school tends, naturally, to be of a different sort than that of an elementary school.  Specifically, students are more capable of committing criminal acts and being charged as adults.  Whereas in an elementary school, the likelihood of a small child unleashing violence on a scale of criminality, whose prevention is sought by this policy, is practically nil.

In a high school environment, students would be more capable of disarming protection personnel.  For example, unconcealed weapons remain in visible holsters, which are designed for varying degrees of retention.  To disarm a police officer or security guard would take an emboldened, albeit rare, effort toward a potentially lethal end.  In an elementary school environment, such an occurrence would be less likely.

Additionally, in the case of a police officer in a school it is assumed that the communications advantage of a police radio provides a force multiplying effect, as other officers may be contacted and respond quickly, particularly in a relatively urban environment.

Intent: For the above-enumerated reasons, the policy focus turns to the elementary (and potentially middle) school environment with specific regard to suburban/rural areas.  With special regard to the protection of children within the elementary education age range, a policy that seeks to provide immediate defense to the most defenseless individuals is addressed here.

Design: Although there may be a number of ways to implement the policy prescription surrounding the arming of some teachers a general set of parameters follows:

–        Conceal/carry permits within the geographical limits of school grounds may be issued by the local pistol permit office.  That is, as a stipulation on the permit itself (e.g. hunting, target practice, and other stipulations are often listed as a means of restricting pistol possession beyond certain boundaries) could indicate the limit of possession.

–        A school psychologist and/or other mental health professional should assess the prospective armed teacher’s mental fitness to possess a weapon on school grounds.

–        An administrator at the level of principal and/or superintendent assesses the teacher’s record of nonviolence, mood stability and appropriate dealing with children.

–        The local law enforcement agency should complete the appropriate background check with specific regard for any criminal accusations of violence.

–        The local law enforcement agency should administer the appropriate “use of force” indoctrination, weapons familiarity, and weapons training necessary to obtain and retain the permit.

–        The local law enforcement agency should incorporate school staff members in “active shooter” training scenarios, with both weapons-bearing teachers and non-weapons-bearing teachers (and administrative personnel).

–        Weapons selection procedures should be in accordance with local law enforcement preferences, along with school administrative final approval.  Limitations to be imposed would likely outlaw any long guns (rifles, shotguns).

–        Annual range fire, mental health assessments, and physical fitness assessments would be a standard practice.

–        Weapons should be owned by the school, stored in a secure location (meeting federal guidelines on proper firearms storage), and be signed in and out before and after school hours, respectively.

–        The size and/or population of the school could limit a certain number of faculty members possessing a firearm.  Perhaps a ratio of one armed teacher per five hundred students may be a suggested guideline.  Alternatively, a ratio of one armed teacher per desired square footage or floor level may be more appropriate.

–        Information coordination between the school and local law enforcement should convey who is assigned a duty weapon for the day.  This minimizes the possibility that an armed teacher, performing their task of defending students from would-be aggressors, is mistakenly identified as the latter.

–        Additional means of reducing confusion might be to have a certain colored weapon of a non-standard variety.  In addition, along with the proper identification that is typically displayed on a visible location of the body, the teacher bearing arms would also have an indicator known to law enforcement to represent the same.

Outcome: Enhancing the defense of students, while offsetting the possible delayed response of law enforcement officers responding to the scene of a mass shooting.

Cost-Benefit Analysis:

Costs: The range of costs depends upon a variety of factors:

–        Whether a teacher’s weapons possession and associated training are funded by a stipend or on a voluntary basis.

–        Whether the cost of weapons procurement is borne by the school, the district, or other local government office.

–        Whether annual mental health assessments, range fire, and certification are costs borne by the school or some other entity.

–        Whether practice ammunition is supplied by the school or the local law enforcement agency.

–        What number of weapons, magazines, ammunition are considered to be necessary.

–        What the insurance implication might be.  This may represent a reduction or an increase depending on the insurance company’s perspective.

–        The length of debate on such matters may be considered as a cost.  It will require time, a possible study of the efficacy of the program, parental consultation, additional board of education meetings, and possible joint operational exercises (with first responders and governmental oversight).

Benefits: The primary and most visible benefit is to provide an adequate and immediate defense in the event of an unlikely, yet mass casualty- inducing traumatic event.  If done properly other benefits may include:

–        Parental satisfaction that school safety is foremost in the minds of their local governmental representatives, law enforcement, and public school administrators.

–        Teachers’ ability to perform a most vital role in saving the lives of their students.

–        Local law enforcement’s ability to close the response time gap in the most urgent of circumstances.

–        Reducing a sense of helplessness for all would-be victims of violent crime.

–        Reducing death rates.


Cost-benefit Summary: While it is difficult to affix a dollar value to each cost, it is nearly impossible to square this with a set of presumed benefits.  For instance, one pistol may cost $450.00.  Annual ammunition for practice, upkeep and persistent availability may be approximately $100.00.  Assuming an annual stipend paid to one teacher for their acceptance of this responsibility could reasonably be $700.00.  Other costs certainly accumulate, but so far the assessment is about $1250.00.  Even if it were to be assessed that additional expenditures per armed teacher were $1000.00, is the benefit of saving one life worth more than $2250.00?  What about two lives, or twenty-six (in the case of Newtown, CT)?

The cost-benefit calculus thus nears the impossible, as expressing costs (if the task can be done in advance) in a mathematically sound manner may not yield a precise result in benefits.  It is with this quandary in mind that other value considerations may likely be more suitable to consider.  Namely, the lives of defenseless children that may be saved by the proactive efforts of a community working toward that end, rather than reacting too late.  Therefore, on a raw cost-benefit basis a net positive cannot be shown to obtain.   This does not, however, render the policy option to be suboptimal and hence ineffectual.


Political Concerns:

The policy outlined above hinges on whether or not it is likely to be politically palatable.  That is, parents would be the crucial audience to consider as bearing the most political weight within the context of a school board’s purview.  Although voters on the state level at large are most likely to have an influence, at the local level it is the parents’ concerns that should be most carefully dealt with for obvious reasons (their children’s safety forms the focal point of this policy).

One manner in which to gauge parental concern may be to poll parents within a school district, offering this policy as a prescription and requesting their feedback.  At least it is possible to gather parental input and understand whether or not the political will exists, is nearly in existence, or needs some tinkering with.  Another means of evaluation would be to offer alternative policy choices, such as providing all schools with armed, uniformed guards and/or police officers.  This may not be a viable option and may create a contravening lobby from within the law enforcement and parental communities.

While it is seemingly nice to have a School Resource Officer (SRO) from a local police department it can be an expensive enterprise.  Police officers require additional training and are generally on the downswing of their career when they become SROs; thus, many are reluctant to be assigned such a detail.  (It also places officers in the position of “baby-sitter” and takes them out of the realm of law enforcement activity, consequently creating a potential for staleness vis-à-vis law matters).  Additionally, some departments are unable to spare an officer each day for each school.  Because this policy option is being presented in the context of small towns and villages, it is likely that a local police department may be inclined toward lobbying against having their officers assigned in such a way.

Another point of contention may be the visible presence of a gun in schools.  The above-outlined policy offers the opportunity for guns to be invisible to children (hence their concealment), while still being available for use by teachers.  Placing armed, uniformed personnel in an elementary school may not sit well with a lot of students and parents.  The prospect of introducing lethal weapons in plain view of children may be too much for parents to imagine as a solution to the problem at hand.


As a result of the most recent spate of shootings in public places, particularly schools, many citizens will likely demand governmental action.  Calls for stricter gun control will undoubtedly result.  Whether or not gun control legislation can have any positive effect is unknown.  There are enough guns available (both legal and illegal) to pose a threat to innocent school children should a person suffering a psychotic episode desire to cause them harm.

Many citizens will also insist upon changes in the mental health field.  Clearly, this is a noble call, as acts of extreme violence against six-year-old victims could not be sensibly made with a sound mind.  Nonetheless, all psychotic episodes involving murder are unlikely to cease.

As has been discussed, a cost-benefit analysis is somewhat implausible.  However, there is some hope that such an assessment can be made.  There are school districts in which such a policy has been instituted; for instance, the Harrold School District in Wilbarger County, Texas.  In terms of political willpower to commit to such a program, we may look to St. Louis County, Missouri, where County Police Chief Tim Fitch is calling for a similar program.  When faced with circumstances similar to that which has provided an impetus for this policy proposal, it is possible to look at how other countries, such as Israel, have managed a similar program.

Overall, the prospect of arming teachers to protect students will probably hinge on the manner in which the program is proposed to parents on the local level.  On the state and federal levels, legislative battles are bound to take a fair amount of time.  As such tragic incidents involving violence against innocent children are seemingly on the uptick, it is assessed as a worthy objective to offer citizens a proactive policy alternative.  Short-circuiting the rising death toll in schools is the guiding logic that may serve the public interest in the short, medium, and perhaps long term.

Obama’s Foreign Policy Challenge in the Arab World

25 Nov

Obama’s Foreign Policy Challenge in the Arab World.

Obama’s Foreign Policy Challenge in the Arab World

25 Nov

Obama’s Foreign Policy Challenge in the Arab World.

Obama’s Foreign Policy Challenge in the Arab World

25 Nov

“Allah is our objective. The Prophet is our leader. The Qur’an is our law. Jihad is our way. Dying in the way of Allah is our highest hope.”

–        Charter of the Muslim Brotherhood

As the so-called Arab Spring brings Islamists to power, the Obama administration is going to have to deal with its foreign policy implications.  How president Obama does so is going to test his global leadership credentials (assuming that he desires such a place in the world).  As Hamas is emboldened by their Egyptian political parent, The Muslim Brotherhood (MB), and as Islamists battle in Syria for domination of the post-Assad environment the regional landscape in the Middle East appears to be shifting.  The direction of this shift signals the emergence of a new era: Radical Islam’s central place in Arab politics. 

            Some have argued that the Egyptian MB is a force for moderate Islam in the region.  This is a mischaracterization of the facts.  To be less openly violent than al Qa’ida does not automatically place one in the category of moderation.  Egyptian MB President Mohammed Morsi is a wolf in sheep’s clothing.  To believe that he is committed to peace with Israel is to ignore his disdain for the Jewish State and the Jewish people.  Any attempt to try to separate Morsi from his party’s previous (and current) pronouncements reflects a despicable insincerity at best and outright deception at worst.   

       With regard to Syria, one indisputable fact is observable throughout the entirety of the Syrian Civil War (and much of the other so-called Arab Spring uprisings): that Islam is at the center of all that will follow the toppling of the Assad regime.  In support of this claim, I ask that the reader watch a random sample of videos emanating from that conflict.  Count the number of times that the Battle Cry “Allahu Akbar” (God is Great[er than the enemy]) is shouted.  Beyond that, witness the variety of circumstances that characterize the invocation of such an exclamation.  For example, in any of the following cases you will regularly hear the above mentioned refrain: enemy inbound fire, friendly outbound fire, dead Syrian soldiers, dead Syrian civilians (children included), mass atrocity sites (on either side), while riding to battle, while returning from battle, while protesting peacefully on the streets, or randomly firing automatic weapons skyward from the streets. 

     It is clear that secular governments are not going to result from the Middle East’s recent uprising (read: intifada).  This does not mean that democracy is impossible, but it does mean that political Islam is what is sought after.  I’m not going to make the case that Islam and democracy are incongruent.  Indonesia, Turkey, and India already show that to be a false claim.  I am, however, going to stand by the research and personal experience of others (e.g. Daniel Pipes, Walid Phares, Nonie Darwish, Walid Shoebat, Frank Gaffney, Debbie Schlussel, M. Zuhdi Jasser, Ray Ibrahim, Wafa Sultan, Raymond Stock, Boaz Ganor, Eric Allen Bell, Dinesh D’Souza, Jamie Glazov, Steve Emerson, and David Horowitz, to name a few) who show that political Islam in the Arab world has not been a success for democracy.  Consequently, this is not helpful to American interests.  Nor is it helpful to pretend that Islamists are not penetrating the halls of American political power.      

     What does president Obama think about all of this?  I don’t know, but to feign ignorance to the threat of political Islam’s presence at home and abroad is to gesture to America’s enemies (and the enemies of democracy writ large) that folks like Huma Abedin and Mohammed Morsi are not inimical to American foreign policy.  Wake up and smell the Jihad Mr. President!      

Timing is Everything in Politics; No Exceptions for National Security

10 Nov

One of America’s most favorite general officers is in hot water.  Ho hum, right?  Not so fast.  Like many before him, his career has ended because of his sexual misdeeds.  David Petraeus is finished.  The most striking feature of his demise is not so much his alleged extramarital affair.  Rather, it is the timeline in which this event’s revelation has come to light that seems to generate more questions than it does answers.  Closure is not an accurate verb to describe this event.  Rather, it is looking more like sabotage.

It is most troubling that Director of Central Intelligence (DCI) Petraeus’s resignation comes just after the 6 November election, yet just prior to his forthcoming congressional testimony in the Benghazi debacle.  The Washington Post has reported that the FBI “investigators first interviewed Petraeus about two weeks ago.”  That’s funny.  Two weeks ago was precisely when Director Petraeus had claimed his agency’s immunity regarding the 11 September 2012 Benghazi terrorist assault and assassination.  So, why did Petraeus wait until the end of the election to resign, consequently revealing what had likely already been known about his affair?  Simply stated: damage control.  For whom, you ask?  For everyone.

Although much evidence may never become known as to the actual events that brought the CIA Chief down, I’m going to offer what in its skeletal form appears to be a conspiracy theory.  Here it goes:

On or about 24 October 2012 it was revealed by Reuters, and eventually USA Today, that the e-mails sent to the White House Situation Room did reveal the nature and character of the terrorist attacks on 11 September 2012.  That very same article documented White House spokesperson Jay Carney’s attempt to deflect blame toward the Intelligence Community.  As this is a common tactic during the post mortem phase of national crises, Director Petraeus had taken the appropriate step of ensuring that his agency was insulated from blame that did not fall squarely on their shoulders; effectively, the blame was tossed back to the Executive branch.  At almost this exact time, the FBI had “discovered” Petraeus’s affair.  So far, all of this is known to be true.

When attempting to fill in the blanks left by imperfect information it is useful to have an intelligence analyst available to perform the task.  Well, here I am.  So, here comes the fictional element that strives to lessen the gap in knowledge.  The FBI informs Petraeus that they’re aware of his affair.  They inform him that since it is less than two weeks from the election and the President is already taking hits on the Benghazi incident he should remain silent.  He is told that if he resigns after the election the details of the affair (audio, video, pictures?) will be limited.  This would account for the period of two weeks until the Election Day, when Petraeus had reportedly informed Director of National Intelligence James Clapper that he had cheated on his wife.

Conspiratorial per se?  Perhaps.  Something just seems woefully deficient in this story.  Maybe that something is the truth.  As the well-known epitaph is written at the entryway to CIA headquarters, “And ye shall know the truth, and the truth shall make you free.”

Timing is Everything in Politics; No Exceptions for National Security

10 Nov

One of America’s most favorite general officers is in hot water.  Ho hum, right?  Not so fast.  Like many before him, his career has ended because of his sexual misdeeds.  David Petraeus is finished.  The most striking feature of his demise is not so much his alleged extramarital affair.  Rather, it is the timeline in which this event’s revelation has come to light that seems to generate more questions than it does answers.  Closure is not an accurate verb to describe this event.  Rather, it is looking more like sabotage.

It is most troubling that Director of Central Intelligence (DCI) Petraeus’s resignation comes just after the 6 November election, yet just prior to his forthcoming congressional testimony in the Benghazi debacle.  The Washington Post has reported that the FBI “investigators first interviewed Petraeus about two weeks ago.”  That’s funny.  Two weeks ago was precisely when Director Petraeus had claimed his agency’s immunity regarding the 11 September 2012 Benghazi terrorist assault and assassination.  So, why did Petraeus wait until the end of the election to resign, consequently revealing what had likely already been known about his affair?  Simply stated: damage control.  For whom, you ask?  For everyone.

Although much evidence may never become known as to the actual events that brought the CIA Chief down, I’m going to offer what in its skeletal form appears to be a conspiracy theory.  Here it goes:

On or about 24 October 2012 it was revealed by Reuters, and eventually USA Today, that the e-mails sent to the White House Situation Room did reveal the nature and character of the terrorist attacks on 11 September 2012.  That very same article documented White House spokesperson Jay Carney’s attempt to deflect blame toward the Intelligence Community.  As this is a common tactic during the post mortem phase of national crises, Director Petraeus had taken the appropriate step of ensuring that his agency was insulated from blame that did not fall squarely on their shoulders; effectively, the blame was tossed back to the Executive branch.  At almost this exact time, the FBI had “discovered” Petraeus’s affair.  So far, all of this is known to be true.

When attempting to fill in the blanks left by imperfect information it is useful to have an intelligence analyst available to perform the task.  Well, here I am.  So, here comes the fictional element that strives to lessen the gap in knowledge.  The FBI informs Petraeus that they’re aware of his affair.  They inform him that since it is less than two weeks from the election and the President is already taking hits on the Benghazi incident he should remain silent.  He is told that if he resigns after the election the details of the affair (audio, video, pictures?) will be limited.  This would account for the period of two weeks until the Election Day, when Petraeus had reportedly informed Director of National Intelligence James Clapper that he had cheated on his wife.

            Conspiratorial per se?  Perhaps.  Something just seems woefully deficient in this story.  Maybe that something is the truth.  As the well-known epitaph is written at the entryway to CIA headquarters, “And ye shall know the truth, and the truth shall make you free.”

Election Day 2012: My Civil Rights were Violated for the First Time

7 Nov

So, my faith in America was shaken today.  Not because of the outcome of the election (which has not yet been announced), but because of what had happened to me at the polling place.  On my way into the local college, where my ballot had awaited me I had encountered a young lady who had been adorned with a “Maloney” name tape.  I inquired as to which building was the correct polling location.  She happily pointed and as I walked away she yelled, “Vote Maloney”, in a manner befitting an afterthought, rather than an exclamation.  I chuckled and continued on my mission.

As I reached the 100 foot distance to the building I noticed a man with “Vote Maloney” pamphlets at the doorway.  He asked if I was going to vote and I replied that I was, and further asked him to cease and desist from violating the election laws by moving outside of my constitutional zone of protection (the 100 ft. mark).  He started to argue and I told him he was in violation of the law and if I see him upon exiting I will be following up with the local police department (it later appeared as though he had heeded my advice).

As I entered the cafeteria, where the voting booths were, I was immediately overcome with the sense that things were beginning to look like amateur hour.  The cafeteria was packed with students (on Election Day?  Yes on that holy day).  The folks staffing the tables were disorganized and could not even bring themselves to indicate by a hand-drawn sign which half of the alphabet their side of the table dealt with.  I was annoyed, but not so surprised.  My spirits remained high.

I was directed to another table and did so advance.  When I arrived, I had been in line behind a man who was receiving instructions on how to fill in the circles on the ballot sheet.  Now it was my turn.  The poll worker at the table went to look for my name on the registry.  I pulled out my New York State Driver’s License and indicated that my address was current and I believed I was at the right table.  He then repeated my name and asked, “weren’t you here already”?  I replied that he was likely referring to my brother, who had worked an overnight double shift and had arrived several hours earlier.  Then he found my name in his book.  I noticed that my brother’s name was not listed there as well.  As co-habitants, I would think it would be there, but it wasn’t.  It happens.

He then asked me if I needed directions and I responded that it couldn’t hurt.  So, he instructed me how to darken in the circles all the way and that I should choose one from each column or none at all, but not two.  I watched his fingers as he pointed to what would be a sample selection.  He seemed to make the effort to point to each party.  As a political scientist, I look for such indicators of persuasion.  Thus far, there had been none.  Then it happened.  He said what I thought I would never hear in my lifetime.  He proceeded to implore, “do me a favor, don’t vote for this guy [Maloney].  He’s a carpetbagger from New York City.  He’s not even from this area.  I’m a Democrat [so is Maloney, and ironically so am I- I’m a Democrat In Name Only, or DINO] and I’m not voting for him.”  I’m sure he could see that my face turned pale.  The disbelief had supplanted the elation that I had felt moments earlier.

What the hell just happened?!  I then proceeded to the curtained privacy booth and quickly, but meticulously bubbled in my selections.  I then went to the scanning station and submitted my ballot to the kid operating it.  I say kid, because he’s my neighbor’s son, who didn’t recognize me until I mentioned that I live next door.  He placed my ballot in the machine and it forced itself back out.  He told me that I’d have to re-do the black circles, whereby I looked at the perfectly filled circles and told him to try it again.  He then looked over my “secret” ballot and submitted it again.  It took.  My vote was in (I suppose).  I never saw him press the green “cast” button, but who am I to tell the amateurs how to do their job?

I was still in shock over what had occurred two minutes prior.  I decided to grab some food, since I was already in the cafeteria.  This way I could think about the appropriate course of action.  I sat down to eat, but didn’t feel hungry anymore.  I then called the Orange County Board of Elections and reported the incident.  They asked what the offender’s name was and I walked right up to him and read it off to the person with whom I was speaking.  The man took notice.  That was fine, I meant for him to know that he had been reported.  I hung up the phone and started my meal.

No less than a minute into my meal, the offender (I’m taking the high road and not naming/shaming him, although he deserves it) had approached me.  He asked if I had reported him for telling me who to vote for.  I told him that I absolutely did.  He then proceeded to justify his action by explaining to me that I was the only one he told to do such a thing.  I responded by telling him that I was reporting him for violating my rights and the law.  He responded with, “what are they gonna do, dock my pay”?  That was the wrong question to ask.

What Mr. XYZ didn’t realize was that I have a firm grasp of the law (as I had enforced these very laws as a police officer), am trained in political science, served this country’s military to uphold the very constitution that he just spit on, and was of the opinion that if anything an apology would have been most appropriate.  I said no more.

When I left, I was angrier than I can ever remember being.  It got worse, however.  I called my brother, who had by now been rolling out of bed from his long shift.  I asked him if he had met with a man of similar description, as the man seemed to remember my brother.  Not only did my brother remember him, but he was incensed at the experience that he had with the guy.  My brother then told me that his name was not in their records.  The very same offender handed him a piece of paper and told him to write down in his choices and place it in a plastic bag as a provisional ballot.  No signature or accountability whatsoever!  (If this is the case, anyone could just walk in and announce that he/she is Mr./Mrs. Whosiwhatsit and request a provisional ballot).

When I heard what my little brother had to say, I demanded that he call the Board of Elections as well.  He did so on his way in for yet another shift.  They apologized and said that his vote will not count and he should return to the polling place.  He then informed them that it would be impossible, as he works in a prison and will be arriving there shortly to begin a shift that will carry him beyond the end of the voting day.  I then called the Board of Elections back to follow up with a supervisor.  I spoke with Ms. Louise, who told me that they couldn’t remove the perpetrator from his post due to staff shortages.  Then she asked if I would like to replace him.  I told her that it would cheapen the integrity of my complaint if I did so.

Finally, I spoke with Commissioner Susan Bahren.  She told me that the man would be removed from his post.  I told her that this was not a political matter, but one of constitutional and state law.  My brother and I were violated four hours apart.  It is reasonable to assume that others may have been as well.  Further, it makes a citizen wonder what else goes on in other locations across the county, or the country for that matter.

I thought back to the great pride I had when I was a Deputy Sheriff and a local police officer and was charged with the great and noble responsibility of delivering ballots from polling stations to the Board of Elections.  I recalled how I had dealt with reports of electioneering in a fair and judicious manner, blind to the complainants’ parties and caring only whether or not the law had been violated.  I have always believed that the one sacred place in America was the voting booth.  I am not a religious person.  Suffice it to say that my religion is democracy itself and the polls are my place of worship.  My faith was shattered today.  When I had departed from the Holy American Church of Democracy, I felt all of the warmth leave my body.  I was left with a coldness inside that the freezing temperature outside could not compete with.

Debates: The Pinnacle of American Political Theater

30 Sep

Shortly, we, the American zombies, will sit fastened to our televisions to watch the debates between President Barack Obama and Governor Mitt Romney.  What we will really be seeing is the latest prime time event to arrive on the American media circuit (read: circus).  This is American theater at its best. 

There is no greater show on earth.  Nothing can be more choreographed to account for every step, smile, gesture, and pointed moment of challenge to his adversary.  Broadway actors could only hope to achieve such a level of preparedness and perfection in their own regular performances.  We will look on as both candidates take the stage and greet their opponent with a smile and a disingenuous “good luck.”  Each will wave and point to random members of the audience and mumble some muted, but ostensibly positive remarks.  (Most stage actors will likely notice that they are actually muttering, “peas and carrots, peas and carrots”). 

Each candidate will be careful to look and sound presidential.  Grey hairs will be meticulously dyed to signal wisdom and experience: emphasized at Romney’s sideburns and more evenly distributed around Obama’s head.  Body language will be cautiously scripted to accentuate moments of utter confidence; a finger point, a two-handed podium grab, a stare in the direction of the camera. 

Following the debate, some will sit back and watch folks like Frank Luntz (of Fox News) explain the graphs that indicate the relationship between zingers and their immediate impact on public opinion.  As is customary, the sound bites that will form the essence of campaign commercials until Election Day will be extracted at the close of the debates.  The Governor Rick Perryish, Dan Quayle-like and Joe Bidenesque ones will potentially sustain their opposite number in the polls.  The superior Bill Clintonian and Ronald Reaganian one-liners will likely enter and remain in the collective American memory.  The best ones will become popular bumper stickers. 

Campaign promises such as “Read my lips” and “close Guantanamo” will roll smoothly from their mouths.  They will be designed to mollycoddle the American voter with the oft-absent sense of sincerity that characterizes political campaigns.  Each candidate will attempt to construct a demonic image of his opponent: Romney is a capitalist cannibal, Obama a socialist ideologue.  The message: “I’m the beneficent, and he the maleficent.” 

Let the performances commence.  Let the average American audience feel warm and tingly as their favorite entertainer earns the electoral Oscar.  In the end, likeability is king.  A credible message will be more readily received by the actor who best combines his talents of persuasion, while deflecting the other’s criticism with wit, humor, and the confidence of Captain Sulley Sullenberger.  So recline and relax, or revel and clap at the magic of the showstoppers.  For this is American theater at its best folks!

Occupying the Narrative: Why Class Warfare is a Winning Tactic

23 Sep

As the pending U.S. presidential election moves along its campaign path toward the finish line, the issue of candidate income levels is becoming more of a palpable pivoting point.  That is, the underlying effort to paint the other candidate as more out of touch with the common voter, as being in direct proportion to their wealth, has once again become salient.  This is not a new debate.  Nor is it a new tactic of the American left.

It is common knowledge that at least half of all members of the House and Senate are in the category of the one percent that the Occupy Wall Street (OWS) “occupiers” and their sympathizers seek to castigate.  According to this logic, as candidate Mitt Romney’s income level becomes the big issue for the political left he is out of touch.  So why is it that Americans (and perhaps others) find it so appalling when others do well for themselves?  The answer likely has something to do with underdogma.

Underdogma is a term (and a book title) coined by Michael Prell.  It references the instinct to cast those who “have” in a villainous light, whereas their opposite numbers must be the “have not” victim class.  With near automaticity, scorn is heaped upon those who seem richer, more powerful, and more privileged at the expense of others.  It enables the many to paint the few as controlling and unlike the common person.  It seems to be the guiding logic of liberals, which would explain why OWS receives much less condemnation from the left.  Democrats cannot afford to abandon them.  They lend the most credence to the entitlement philosophy: “give us free stuff.”  It makes sense that the U.S. Capitol building is not more occupied than a park in lower Manhattan.

According to the underdogmatic approach to economics, Mitt Romney is more evil than Barack Obama.  Therefore, this one percenter is not worthy of leading a nation of ninety-nine percenters.  So far, it seems the logic remains intact, and the tactic remains successful.

%d bloggers like this: