You are currently browsing the daily archive for February 2, 2017.
America’s Department of Homeland Security could be actively fighting terrorism — had the Obama administration not taken away a valuable tool: a database developed by Philip Haney, author of See Something, Say Nothing, which went on sale on May 24, 2016.
Earlier that year, Haney wrote an article for The Hill, ‘DHS ordered me to scrub records of Muslims with terror ties’. Please read it in full. Obama and his people threw the intelligence community under the bus.
On Christmas Day in 2009, a Nigerian terrorist attempted to blow up Northwest Airlines Flight 253, which was to take off from Amsterdam and land in Detroit. Fortunately, the explosives in the man’s underwear failed to detonate and passengers were able to subdue him until police arrested him.
Afterwards, Haney says (emphases mine):
Following the attempted attack, President Obama threw the intelligence community under the bus for its failure to “connect the dots.” He said, “this was not a failure to collect intelligence, it was a failure to integrate and understand the intelligence that we already had.”
Haney, a founding member of the Department of Homeland Security in 2003, explains:
Just before that Christmas Day attack, in early November 2009, I was ordered by my superiors at the Department of Homeland Security to delete or modify several hundred records of individuals tied to designated Islamist terror groups like Hamas from the important federal database, the Treasury Enforcement Communications System (TECS). These types of records are the basis for any ability to “connect dots.” Every day, DHS Customs and Border Protection officers watch entering and exiting many individuals associated with known terrorist affiliations, then look for patterns. Enforcing a political scrubbing of records of Muslims greatly affected our ability to do that. Even worse, going forward, my colleagues and I were prohibited from entering pertinent information into the database.
A few weeks later, in my office at the Port of Atlanta, the television hummed with the inevitable Congressional hearings that follow any terrorist attack. While members of Congress grilled Obama administration officials, demanding why their subordinates were still failing to understand the intelligence they had gathered, I was being forced to delete and scrub the records. And I was well aware that, as a result, it was going to be vastly more difficult to “connect the dots” in the future—especially before an attack occurs.
On June 26, 2016 FaithFreedom.org interviewed Haney. The transcript is lengthy and eye-opening. I recommend people read this for a full understanding of why terror attacks continue. Again, the scrubbed database has a lot to do with it. The interview by Frank Gaffney, a friend of his, centres around Haney’s book, which had been on sale for a month. Excerpts and a summary follow.
Years before Haney entered the DHS, he was an entomologist — a scientist who studies insects. He worked with farmers in the Middle East. To better communicate with them and understand local culture, he learned Arabic, then Koranic Arabic.
His work speciality was studying ants. He published several scientific papers on them.
Knowing Arabic, understanding Middle Eastern culture and studying ant behaviour prepared him for the future, although he did not know that at the time. He told Gaffney:
… two of the qualities of an entomologist that have direct application to counter-terrorism are close attention to detail and observation of behaviour. All living creatures have behaviour patterns that they follow. And in entomology, if you want to learn how to control a pest, you have to know how it behaves. So watching that gives you clues to points along their life cycle that you might be able to intervene and help the farmer reduce his pesticide costs. And attention to detail, that’s another key component of counter-terrorism. That’s what we call connecting the dots. Well, it has direct application in science as well. You connect dots, you make observations, your write things down on your famous clipboard, and pretty soon a picture emerges. Then you do statistical analysis on it. Develop your premise and prove that it was true. Well, the other component is, being a specialist in ants, I simply began to follow the trail and I would find the nest. And in counter-terrorism, you do the same thing.
One of the things that many people in Western countries refuse to do is to connect terrorism with Islam. We speak of ‘moderate Islam’ or may even know Muslims who are more secular than religious. Haney says that the United States, for example, sees a ‘composite’ view of Islam:
the full spectrum from virtual complete disavowal of following shariah all the way up to extremely strict application of shariah. We see that in some of these emerging areas of cities around America where it’s becoming more and more obvious that they’re implementing shariah all the way to, you know, people you might call secular Muslims that don’t appear to observe any of the mandates of shariah. It’s all in a kaleidoscope right here in the United States. We can see every portion of it, every form of expression of shariah that exists in the world is being expressed right here in the America, the whole spectrum.
Haney gives a detailed explanation of the manifestations of jihad, which can differ according to group.
About the Muslim Brotherhood (MB), he explains:
it’s a global organisation and they have very strict rules and regulations they follow. Everything that the Muslim Brotherhood does is based on shariah law. This isn’t a political organisation that happens to be Islamic. This is an Islamic organisation whose highest goal is to implement shariah law. Therefore, of all organisations, they’re going to be most strictly observant of the subtle elements of shariah law. And their role, like in the United States, is to make sure that the Muslim community is doing their utmost to submit to the regulations and guidelines found in shariah law, one step at a time.
Furthermore, the MB have a document which:
states plainly that the global organisation has set up a shura council, a guidance council, here in North America, which means includes Canada, for a very distinct purpose. That very distinct purpose is to bring to the North American Muslim community, create an observant Muslim base. Again, this is in the first paragraph of the first page. The observant Muslim base. That is al-Musima [PH], al-Islamiyah, al-Qaeda, in Arabic. And I’m sure everybody listening heard the third word and have heard that word many times before, al-Qaeda. The observant Muslim, al-Qaeda, in North America. That’s important because al-Qaeda is not actually an organisation. Even though there are some jihad groups we know of as al-Qaeda. al-Qaeda is an abstract concept. It means the base. The base of operation. The Muslim Brotherhood’s goal is to have all Muslims in the United States observant and essentially submitted to the standards and guidelines of shariah law. And once they do that, that’s a base and from there, they go out and do promotion of Islam –
It’s the same in Europe, by the way.
When 9/11 happened, Haney already understood much about Islam. When DHS was established in May 2003, Haney was a Customs and Border Protection officer but was promoted thanks to his intelligence briefings and analyses:
And I was eventually authorised to get pulled completely out of the agricultural arena and I got put into a unit called the Advanced Targeting Unit. Where we look at incoming passengers for possible links to terrorism. And they told me specifically, we want you to keep doing what you have already been doing, which is develop intelligence and help us connect the dots. Well, that’s exactly what I did. And by 2006, I had produced a report on the Muslim Brotherhood network in the United States. And basically outlined all of the major organisations and all of the leaders of these organisations and put them into our database so that my colleagues in other parts of the country would be able to have access to the same information. We’re all on the same page, and we’re all looking at the same individuals and organisations. And initially, I was considered an asset and we had great success. We had a lot of what we called law enforcement actions based on those reports that I put into the system.
Things changed in 2006, when he wrote an article for FrontPage Magazine called ‘Green Tide Rising: Hamas Ascends’ which now appears as ‘The Ascension of Hamas (What Was)’:
Well, that article I shared with some of my CIA colleagues at a training course that I took. And I say CIA openly, because they said so openly. I thought that they would be interested in an article on Hamas, which, after all, was a globally designated terrorist organisation already. But I was wrong. Instead of reading the article and having a discussion about it, they turned me into headquarters and said that I had accessed classified information to write the article. And they charged me with unethical use of classified information and plus the fact that I posted it on an open source website. And they investigated me for it. The entire investigation took eleven months and ultimately I was exonerated.
Then it got worse with the Obama administration, as mentioned above. But there was more:
I was investigated a total of nine times. Before it was all over, the last nine months of my career, they took my gun, they suspended – revoked my secret clearance. They cut off all access to all systems and sequestered me in a little cubicle while I sat there, day by day, waiting to see what the outcome of these three, last of nine, simultaneous investigations – what would happen. The Department of Justice investigated me for – they said that I had misused a government computer and they convened a grand jury. They were going to charge me on criminal charges. In the end, I retired honourable. July 31st, 2015. They dropped the charges on the DOJ case. And nothing else came of the other administrative investigations. I was exonerated.
One possible adverse consequence of the database scrubbing was the San Bernardino attack late in 2015:
The mosque that Syed Farook attended was part of that Tablighi Jamaat network. The administration deleted sixty-seven records out of the system that I had worked on as a component of the Tablighi case. So the question remains, if those records had not been deleted, it’s very plausible that Syed Farook would have never been able to travel to Saudi Arabia and it’s also just as plausible that his pending fiancée would have never been given a visa. And then we would have stopped the attack.
One useful way to think of Islamic groups and movements, Haney says, is to liken them to the NFL. There are different teams, all competing to ultimately win the Superbowl, however, they are all in the same league and abide by the same playbook:
Well, the thing with the Islamic movement is they have a playbook. It’s called shariah law. They are bound by the constraints of shariah law to behave in a very predictable manner. As I mentioned earlier about behaviour, which is why I brought it up. If you put all these allegories together, we can actually expect what they’re going to do. Because they have to live within the boundaries, the communication system as described by shariah law.
This brings me to an article about President Trump’s new head of DHS, James Kelly. On Tuesday, January 31, 2017 the Washington Examiner reported:
“We have to be convinced that people who come here, there is a reasonable expectation that we know who they are, and what they’re coming here for, and what their backgrounds are,” Department of Homeland Security Secretary John Kelly told reporters Tuesday.
Kelly reiterated that Trump’s order — which suspended most travel from Iraq, Iran, Libya, Syria, Sudan, Somalia and Yemen — is “not a ban on Muslims,” contrary to Democratic characterizations of the order. “Religious liberty is one of our most fundamental and treasured values,” he said.
Instead, he argued that the 90-day travel suspension is aimed at countries that don’t have the public institutions required to conduct customary background checks. “There are many countries, seven that we’re dealing with right now, that in our view, in my view, don’t have the kind of law enforcement records-keeping, that kind of thing, that can convince us that one of their citizens is indeed who that citizen says they are and what their background might be,” said Kelly, a retired Marine Corps general who led the U.S. military in South America.
Which brings me to Philip Haney’s database. Now that the Obama administration — with its many ties to the Middle East and Islam — is out of the way, someone somewhere must have a copy of the original. As Lame Cherry wrote on February 1, 2017:
the NAMES OF EVERY MUSLIM TERRORIST WHO HAS SLAUGHTERED AMERICANS DURING THE OBAMA YEARS was on that file and who their contacts were, and the Obama regime ordered this entire protocol to be deleted.
Phillip Haney, has reported to Sean Hannity, that before deleting, he forwarded this system to members of Congress, so it apparently still exists, and Mr. Haney noted that Senator Ted Cruz hinted at the existence of this file network in his public statements.
The reality of this is simple in the Trump Administration must recover this database for National Security, as Phillip Haney literally developed a complete dossier on the Muslim Mafia which has infiltrated the United States from government to press, and Attorney General Jeff Sessions must convene a Grand Jury to indict all those involved in this crime of aiding terrorists, and that starts with image Obama, Valerie Jarrett, CIA Director Clapper and Homeland Security heads, Napolitano and Johnson.
Mr. Haney reported that when queried about this file an his name, Homeland Security Director Jeh Johnson who was involved in hacking Georgia State voting operations, termed it a political matter and claimed to have never heard of Phillip Haney.
N.B.: Jeff Sessions is not yet Attorney General.
In closing, one cannot help but wonder if — and hope that — there is a role for Philip Haney in the Trump administration. Personally, I would have downloaded a copy of the database to a memory stick and kept it securely at home. Perhaps he did.