As for the FBI and the Clintons, Remember FileGate

Image result for clinton filegate

 Louis Freeh, Director of FBI from 1993 – 2001  James Comey, Director of FBI, appointed by Barack Obama and in 1996, Comey acted as deputy special counsel to the Senate Whitewater Committee

Is it any wonder that Comey gladly resides in the Clinton web of corruption? Is it any wonder the Department of Justice resides there as well? Since the media wont remind you…..I will. Take a walk on the wild history side….

Alexander, et al. v. FBI (Nos. 96-2123/97-1288) – “Filegate”

In the early 1990’s, President and Hillary Clinton violated the privacy rights of their perceived political enemies by wrongly accessing and misusing the FBI files of Reagan and Bush I staffer and others. This scandal became known as “Filegate.” In pursuing its Filegate investigation, Judicial Watch learned with the help of whistleblowers Sheryl Hall and Betty Lambuth that the Clinton-Gore White House had hidden over 1.8 million e-mails from courts, Congressional investigators and independent counsels for nearly two years. Plans were also uncovered to destroy the files. To keep the e-mails secret, Clinton-Gore White House officials threatened contractors and staff with their jobs or jail time. Once the failure to produce the e-mails was revealed, the cover-up began; a cover-up that included obstruction and false testimony. Then, on hearing the testimony of the White House whistleblowers, a federal court judge ordered the testimony of former high-level Clinton-Gore White House officials in a court hearing to examine the threats, obstruction and alleged false testimony.Evidence showed that the e-mails are incriminating and covered virtual all of the Clinton-Gore scandals, yet these e-mails were not considered by Independent Counsel Robert Ray who gave the Clinton-Gore White House a clean bill of health. (View ethics complaint.)In January 2001, the e-mail files were placed under custody of the National Archives (NARA) and were restored, costing the American tax-payers over $13 million.In December 2002 the court ordered the files be searched. The NARA is responsible for responding to all special access requests and subpoenas that are made pursuant to the Presidential Records Act (PRA). The PRA generally restricts public access to the Clinton Presidential and Gore Vice Presidential records for five years after the end of the administration and for specific records for an additional seven years. Judicial Watch is representing plaintiffs in a class-action suit filed by the White House employees of Reagan and George H.W. Bush administrations whose FBI files were wrongly accessed by the Clinton White House. The FBI and White House are being sued for breach of the Federal Privacy Act while other individuals, including Hillary Clinton, are being sued for invasion of privacy.

Related reading: Clinton Foundation Failed to Disclose 1,100 Foreign Donations 

Related reading: Charles Ortel: States and Foreign Governments Investigating Clinton Foundation ‘Charity Fraud’

 

Going further:

Iran, China Lead the World in Stealing U.S. Military Equipment and Technology According to Justice Department Documents Uncovered by Judicial Watch

Judicial Watch has launched an investigation regarding covert efforts by foreign nations to violate our export control laws. And here’s what we’ve found out so far: Since the 9/11 terrorist attacks, Iran and China lead the world in stealing sensitive U.S. military equipment and technology according to documents obtained through the Freedom of Information Act (FOIA) from the Justice Department’s National Security Division.

The documents include a report entitled, “Significant Export Control Cases Since September 2001,” prepared by the Counter Espionage Section (CES), which includes the charges, investigative agency, defendants and disposition of each case.

According to this report, which was originally labeled “For Official Use Only,” Iran and China were cited for 31 and 20 violations respectively between September 29, 2001 and May 16, 2008.

And here are just a few of the “significant” cases listed by the CES:

  • U.S. v. Eugene Hsu, et al. (9/21/01): Eugene Hsu, David Chang and Wing Chang were charged with “Conspiracy and an attempt to export military encryption units to China through Singapore.” All received guilty verdicts however Wing Chang is still listed as a fugitive.
  • U.S. v. Avassapian (12/03): Sherzhik Avassapian was a Tehran-based broker working for the Iranian Ministry of Defense when he attempted to “solicit and inspect F-14 fighter components, military helicopters and C-130 aircraft which he intended to ship to Iran via Italy.” Avassapian pleaded guilty to issuing false statements.
  • U.S. v. Kwonhwan Park (11/04): Kwonhwan Park was charged with “Exporting Black Hawk engine parts and other military items to China.” Pleaded guilty and sentenced to 32 months in prison.
  • U.S. v. Ghassemi, et al. (10/06): Iranian national Jamshid Ghassemi and Aurel Fratila were charged with “Conspiracy to export munition list items &emdash; including accelerometers and gyroscopes for missiles and spacecraft &emdash; to Iran without a license.” Ghassemi and Fratila are at large in Thailand and Romania respectively. Justice is currently seeking their deportation.

(By the way, in taking a look at the sentences given to those who are caught, the relatively light punishments do not seem to fit the serious crimes, which is one reason why this problem is getting worse. Just 32 months in prison for trying to steal military equipment and send it to a nation hostile to the United States?)

Lest anyone think this data is historical in nature and does not reflect today’s reality, in October 2008, the Department of Justice announced that criminal charges had been issued against more than 145 defendants in the previous fiscal year. And approximately 43% of these new cases involved munitions or other restricted technology bound for Iran or China.

A Justice Department press release included in our materials noted: “The illegal exports bound for Iran have involved such items as missile guidance systems, Improvised Explosive Device (IED) components, military aircraft parts, night vision systems and other materials. The illegal exports to China have involved rocket launch data, Space Shuttle technology, missile technology, naval warship data, Unmanned Aerial Vehicle or ‘drone’ technology, thermal imaging systems, military night vision systems and other materials.”

The bottom line here: These documents show that Iran and China have concerted efforts to obtain U.S. military technology in violation of our laws. And the Obama administration needs to maintain vigilance against the illegal efforts of enemies such as Iran to obtain our sensitive technologies.

And this new information is a useful reality check as to the intentions of Iran as this administration continues to kow-tow to Iran over its nuclear weapons program.

Judicial Watch Pushes for Victory in Filegate Lawsuit

If there is one legal case that exemplifies the “never-give-up” attitude of Judicial Watch and its attorneys it is the Filegate lawsuit, which was filed 13 years ago when Bill and Hillary Clinton still occupied The White House. As long-time readers of the Weekly Update know, over the years, Judicial Watch has continued to aggressively pursue justice in this matter, earning some key victories along the way (like the discovery of the hidden White House emails, to name just one example).

And just this week, on October 19, we filed a “Cross-Motion for Summary Judgment,” asking the U.S. District Court to rule in favor of two Filegate victims, Cara Leslie Alexander and Joseph P. Duggan [Cara Leslie Alexander, et al. v. FBI, et al., C.A. No. 96-2123 (RCL)].

At its core, Judicial Watch’s Filegate lawsuit is the Clinton White House’s illegal maintenance of the private FBI files of hundreds of former Reagan and Bush officials.

Specifically with respect to Judicial Watch’s clients, the Clinton White House procured their private FBI files in 1993 and 1994 respectively by claiming the two individuals required access to the Clinton White House. One problem. Neither individual worked for the White House any longer and therefore did not require access. This was simply a ruse by Clinton officials to get their hands on the files, something they did with regularity. In fact, one FBI official testified they made 488 such requests based on the bogus claim of “access” in a single year!

And to make matters worse, not only did the Clinton White House misstate the facts to get the private FBI files, it held on to them for almost three years!

Now, after 13 years of pushing the same tired justification for this illegal handling of private information, the FBI and the Obama White House (defending corruption in the Clinton White House) have asked the court to rule in its favor by filing a “Motion for Summary Judgment.” (A “summary judgment” is granted when there is no genuine issue of material fact in dispute and the moving party is entitled to judgment as a matter of law.) We filed our own Cross Motion for Summary Judgment in reply, and here is our basic argument:

Over the long and complex history of this matter, certain key facts have remained irrefutable. First, FBI background investigation files are perhaps some of the most sensitive records that the federal government maintains on individuals.

Second, the FBI has never disputed that it sent literally hundreds of these files to the Office of Personnel Security (“OPS”), a component of Executive Office of the President (EOP), despite the fact that OPS’s requests for the records were, in the FBI’s own words, “without justification and served no official purpose.” Indeed, the FBI has admitted that it failed to “institute sufficient protections to effectively safeguard the records”…and that their handling of the matter resulted in “egregious violations of privacy.”

…There can be no genuine dispute that the FBI violated the Privacy Act by failing to establish appropriate administrative safeguards to insure the security and confidentiality of its background investigation files and that its failure to do so was in flagrant disregard for Plaintiffs’ rights under the Privacy Act.

Third, regardless of the circumstances under which OPS acquired the records at issue, there has never been any dispute that OPS continued to maintain them long after it was known that the persons who were the subjects of these records never worked at the Clinton White House and had no need for access to the Clinton White House.

As we further noted in our Cross Motion, even Bill Clinton himself has said his administration should be held accountable. Clinton told historian Taylor Branch in preparation for his recently published book, “those files did not belong at The White House,” and that they “should have been isolated and returned immediately.” According to Branch, Clinton said “[h]is administration should and would be held accountable.”

We agree.

But the Obama administration has taken the legal position that the Privacy Act does not apply to the Executive Office of the President and the Clinton FBI files scandal was not a scandal.

This will be worrying to those of us concerned about the Obama White House’s collecting “fishy” emails and compiling an enemies list of new organizations, radio hosts, businesses, and industry associations to attack and smear. Is the Obama defense of the FBI files scandal less about that Clinton scandal and more about what his White House is up to now?

Judicial Watch Unveils ACORN Affiliate Map

Another week. Another ACORN scandal story. You will recall a few weeks ago, two young conservative journalists caught ACORN workers red-handed trying to advise the undercover reporters on how to evade paying taxes, immigration, and child prostitution laws. Well, there’s another tape. This according to The Associated Press:

The new videotape shows filmmakers Hannah Giles and James O’Keefe, posing as a prostitute and her boyfriend, soliciting advice about a possible housing loan from workers in the Philadelphia office of ACORN Housing Corp…The Philadelphia visit is significant because of a dispute over statements ACORN has made defending what took place when Giles and O’Keefe visited the Philadelphia office last summer.

Supporters of O’Keefe and Giles said ACORN has lied about whether the two were thrown out of the Philadelphia office, how much time they spent there and whether they explicitly told ACORN workers that Giles was a prostitute….

Okay, so we all know about ACORN’s alleged corruption. We knew it when ACORN workers in Florida registered Mickey Mouse to vote in the last presidential election. We knew it when the New York Times reported that the ACORN founder’s brother embezzled almost a million dollars from the organization. We knew it when the Nevada Secretary of State told Fox News that the ACORN chapter in his state hired convicts still in prison for canvassing voters. A criminal prosecution of the organization is proceeding there. All this is why the U.S. Congress took steps to sever the group’s funding, the IRS and the U.S. Census Bureau severed ties with the group.

But as much as we know about ACORN corruption, we know so very little about how ACORN actually operates. The organization’s complicated structure has made it difficult to identify how many affiliates are associated with the organization. And that’s just the way ACORN likes it.

As Rep. Darrel Issa, Ranking Member of the House Committee on Oversight and Reform, put it in his detailed report on ACORN’s alleged criminal activity: “Both structurally and operationally, ACORN hides behind a paper wall of nonprofit corporate protections to conceal a criminal conspiracy on the part of its directors, to launder federal money in order to pursue a partisan political agenda and to manipulate the American electorate.”

Well, to help shed some light on ACORN and its operations, Judicial Watch has created a Google Earth map identifying 281 known ACORN branches and associated organizations. The idea is to compile and organize as much information as possible on ACORN-related organizations. You can check out the map for yourself here, but this is a brief summary of what ACORN organizations and affiliates the map includes:

  • ACORN – Founded in 1970, with national headquarters in New Orleans, New York, and Washington, DC. ACORN has over 75 regional offices throughout the U.S., and works on issues including voter registration, raising minimum wage, improving education, and providing affordable housing to low-income members.
  • ACORN Housing Corporation – ACORN Housing is the most prominent offshoot of ACORN, and provides services to clients trying to obtain affordable housing. ACORN Housing was created in 1987, and receives funding from the Department of Housing and Urban Development.
  • ACORN Affiliates – Judicial Watch created a category for all affiliates that are tied with ACORN, including the ACORN Institute, ACORN International, and ACORN Law for Education Representation & Training.
  • ACORN Housing Affiliates – This category specifies associates of ACORN Housing. Many of these housing companies, including ACORN Community Land Association, 385 Palmetto Street Housing Company, and MHANY 2003 HDFC, work closely with ACORN Housing and receive funds from them.
  • Other ACORN Affiliates – In addition to the numerous offices ACORN and ACORN Housing have throughout the U.S., there are additional organizations that are affiliated with ACORN, although their names might imply differently. These groups include Citizens Consulting Incorporated and Citizens Services Incorporated, both of which are responsible for organizing many of ACORN’s activities. Other known affiliates include the Affiliated Media Foundation Movement, the American Environmental Justice Project, AGAPE Broadcasting Foundation, the Working Families Organization, and the Hospitality Hotel and Restaurant Organizing Council.

This new research tool is just one component of Judicial Watch’s large-scale investigation of ACORN. As I’ve mentioned previously, Judicial Watch currently has over two dozen FOIA requests related to ACORN activities. Click here to find out more.

 

Movie: Hillary’s America, in Theaters July 22

Logos

Coming to theaters July 22.

Hillary’s America, the latest film from the creators of America: Imagine The World Without Her and 2016: Obama’s America takes audiences on a gripping journey into the secret history of the Democratic Party and the contentious rise of presidential candidate Hillary Clinton.

In Hillary’s America, New York Times #1 best-selling author and celebrated filmmaker Dinesh D’Souza reveals the sordid truth about Hillary and the secret history of the Democratic Party. This eye-opening film sheds light on the Democrats’ transition from pro-slavery to pro-enslavement; how Hillary Clinton’s political mentor was, literally, a cold-blooded gangster; and how the Clintons and other Democrats see foreign policy not in terms of national interest, but in terms of personal profit.

Hillary’s America will uncover how their plan is to simply steal America.

BLM/Black Panthers Deadly and International

First, shame on Twitter:

Twitter Rewards Black Lives Matter With Official Emoji Less Than A Day After Dallas

Despite the outbreak of deadly anti-police violence in Dallas yesterday evening, Twitter has chosen today to reward the Black Lives Matter movement with their own custom emoji.

BLM1

When users go to type in the hashtag, Twitter automatically inserts the icon, consisting of white, brown, and black fists alongside it. The emoji was introduced today and users started reporting its visibility at around 10AM PST. Twitter did not respond to a request for comment regarding the precise time it installed the emoji.

Given the fists’ resemblance to the “black power” symbol, the emoji lends the hashtag a positive connotation. The hashtag can also not be tweeted without the emoji, which makes expressing negative opinions regarding the #BlackLivesMatter movement more awkward and difficult for users.

Twitter has still yet to take action regarding the users threatening and inciting violence against cops, who have been allowed to broadcast their incitement unopposed by Twitter both in the days preceding the Dallas shootings and afterwards. More here from Breitbart including tweets from those that are wanting and threatening to kill police.

Some protesters rip out shrubbery at Trump Tower

The movement is almost global:

Brixton protest: Black Lives Matter rally bring London streets to standstill

Hundreds marched on the local police station before a sit-in protest on Brixton High Street

img_0016.jpg Black Lives Matter protesters assemble in the middle of a normally busy street in Brixton, south London, bringing the crossroads to an hours-long standstill Adam Withnall

Dozens of protesters who staged a march over recent police killings in the US have blockaded a crossroads in south London, bringing a number of major streets to a standstill.

Demonstrators chanted “black lives matter” and “racist police, our streets” as they drew large crowds to Windrush Square in Brixton.

Traffic was halted for at least four hours as local buses were re-routed, and there were reports of scuffles between protesters and disgruntled drivers. More here from the IndependentUK.

  FOX2nowVerified account @FOX2now Jul 8

Police say Antonio Taylor, 31, shot a Ballwin police officer in the neck Friday morning.

Then there is Baton Rouge:

The Advocate: Live updates: Crowds return to site of Friday’s protests after tense scene at Baton Rouge police headquarters

John Kerry, Call Holding Line 2, Tehran Terrorism Calling

Iranian commander: Missiles ready for the ‘annihilation’ of Israel

JPost: The deputy commander of Iran’s powerful Revolutionary Guard said the country has over 100,000 missiles in Lebanon alone readied for the “annihilation” of Israel.

Iranian-made Fateh 110 (Conqueror) (L) and Persian Gulf (R) missiles

Speaking before Friday prayers on Iran’s state-run IRIB TV, Hossein Salami also said that Iran has “tens of thousands” of additional missiles that are ready to wipe the “accursed black dot” of Israel off the map, according to a translation from the Farsi by the Middle East Media Research Institute.

Salami is deputy head of the Islamic Revolutionary Guard Corps, which is under the command of the country’s Supreme Leader.

*****

Iran’s Support for Terrorism Under the JCPOA

WashingtonInstitute/Levitt: The Islamic Republic’s terror sponsorship has hardly abated since the nuclear deal was reached, giving the Obama administration another opportunity to reassess these menacing behaviors and hold Tehran accountable.

July 14 will mark one year since the signing of the Joint Comprehensive Plan of Action (JCPOA), the nuclear agreement with Iran. This article is part of a series of PolicyWatches assessing how the deal has affected various U.S. interests, to be released in the days leading up to the anniversary.

When the JCPOA was implemented in January, terrorism-related sanctions remained in place against Iran, and U.S. officials promised they would hold Tehran accountable for any such activity despite the lifting of nuclear sanctions. As Secretary of State John Kerry noted on January 21, “If we catch them funding terrorism, they’re going to have a problem with the United States Congress and with other people, obviously.” And yet, in the year since the deal was signed, Iran’s threatening behavior has not diminished.

In February, Director of National Intelligence James Clapper testified that “Iran, the foremost state sponsor of terrorism — continues to exert its influence in regional crises in the Middle East through the International Revolutionary Guard Corps-Qods Force (IRGC-QF), its terrorist partner Lebanese Hezbollah, and proxy groups…Iran and Hezbollah remain a continuing terrorist threat to U.S. interests and partners worldwide.” A month later, CENTCOM chief Gen. Joseph Votel testified that Iran had become “more aggressive in the days since the agreement.”

Sponsoring Terrorists in the Levant

Iran has been a consistent supporter of U.S.-designated Palestinian terrorist organizations, including Palestinian Islamic Jihad (PIJ) and Hamas. In August 2015, after four rockets hit the Israeli Golan Heights and Upper Galilee, Jerusalem attributed the attack to a joint effort by PIJ and the IRGC-QF. These claims were substantiated when Israeli counterstrikes against the cell that launched the initial salvo wound up killing an IRGC general, Mohammad Ali Allahdadi.

In September, the Treasury Department designated Maher Jawad Yunes Salah, a dual British-Jordanian citizen who headed the Hamas Finance Committee headquartered in Saudi Arabia. In that capacity, he had been overseeing the transfer of tens of millions of dollars from Iran to the committee; these monies were used to fund Hamas activity in Gaza, including the group’s military “wing,” the Izz al-Din al-Qassam Brigades.

Although Iran and Hamas have argued at times over the latter’s refusal to support the Assad regime in Syria, they rekindled their broken relationship this year. According to a November report issued by Congressional Research Service, “Iran has apparently sought to rebuild the relationship with Hamas by providing missile technology that Hamas used to construct its own rockets, and by helping it rebuild tunnels destroyed in the [2014] conflict with Israel.” At a press conference in 2015, an Iranian Foreign Ministry spokesman asserted that bolstering resistance to Israel — in part by funding Hamas — is a “principled policy.” This support was clarified in February when a Hamas delegation visited Iran for eight days and met with various officials, including IRGC-QF commander Qasem Soleimani. According to a member of the delegation quoted by the Jerusalem Post, Soleimani stated that “Iran was a staunch supporter of the Palestinian resistance before the nuclear deal, and it will remain so after the deal.” Hamas celebrated the trip in a statement of its own, highlighting its “successful and positive meetings with Iranian officials.”

Despite this rapprochement with Hamas, Iran continued its sponsorship of al-Sabirin, a new proxy militant group in Gaza. Led by a former PIJ commander, al-Sabirin reportedly receives $10 million a year from Tehran. Members of the group have also apparently converted to Shia Islam despite operating in Sunni-majority Gaza, adding another level of complexity to the relationship. In December, al-Sabirin claimed responsibility for an explosion that targeted Israeli forces on the border.

Elsewhere in the Levant, Lebanese Hezbollah remains Iran’s primary terrorist proxy. Last month, the group’s secretary-general, Hassan Nasrallah, bluntly declared that “Hezbollah gets its money and arms from Iran, and as long as Iran has money, so does Hezbollah.” Since the JCPOA was signed, the U.S.-designated terrorist organization has engaged in numerous criminal, espionage, and terrorist plots.

In February, the U.S. Drug Enforcement Administration announced that it had uncovered a major drug trafficking and money laundering network during a multinational investigation. The agency named the “Business Affairs Component” of Hezbollah’s External Security Organization as one of the main benefactors of a network that collected and transported “millions of euros in drug proceeds,” which in turn were used to purchase weapons for Hezbollah fighters in Syria.

Last year, less than a week after the JCPOA was signed, Israeli officials arrested a Swedish-Lebanese man, Hassan Khalil Hizran, at Ben Gurion Airport for attempting to gather intelligence on Israeli targets on Hezbollah’s behalf. And just days before the signing, a Lebanese-Canadian man confessed his ties to Hezbollah and said the group had directed him to attack Israeli targets. He was jailed in Cyprus after authorities seized nine tons of a chemical compound used in bombmaking from his home there.

As Hezbollah pours considerable weaponry and manpower into the conflicts in Syria and Iraq, it has also directed third-party actors to carry out terrorist attacks. This January, Israeli authorities arrested five Palestinians for planning an attack “organized and funded by Hezbollah.” According to Israeli officials, the leader of this West Bank cell was recruited by Hassan Nasrallah’s son Jawad. Hezbollah trained and directed the group to surveil Israeli targets, giving the men $5,000 to carry out suicide bombings and other attacks. Based on these and other cases, a senior Israeli official warned in February that Iran was “building an international terror network” of cells with access to weapons, intelligence, and operatives to carry out attacks in the West.

The Gulf

In naming Iran as a major sponsor of terror, the State Department’s 2015 Country Reports on Terrorism revealed that Tehran has “provided weapons, funding, and training to Shia militants in Bahrain,” and that the island state had “raided, interdicted, and rounded up numerous Iran-sponsored weapons caches, arms transfers, and militants” that year. In November, Bahraini authorities arrested forty-seven individuals for their involvement in a terrorist organization linked to the IRGC. And this January, authorities detained six individuals for their involvement in a terrorist cell with claimed links to Iran and Hezbollah. The cell was accused of orchestrating a July 2015 explosion that killed two people outside a girls school in Sitra.

Iran also continued to support Shiite terrorists in Kuwait. In August 2015, local authorities raided a terrorist cell of twenty-six Shiite Kuwaitis, accusing them of amassing “a large amount of weapons, ammunition, and explosives.” After media outlets reported the cell’s alleged links to Iran and Hezbollah, the public prosecutor issued a gag order on the investigation. In January, a local court sentenced two men, one Kuwaiti and one Iranian, to death for spying on behalf of Iran and Hezbollah.

Tehran’s antagonistic relationship with Saudi Arabia also continued this year, mainly through proxy warfare, but also through alleged activities against Saudi targets. In February, the Saudi-aligned Yemeni government asserted that it had evidence of “Hezbollah training the Houthi rebels and fighting alongside them in attacks on Saudi Arabia’s border.” And according to another report that same month, Filipino authorities claimed to thwart an IRGC plot against a fleet of Saudi passenger planes in the Philippines.

Beyond the Middle East

This May, an American drone strike killed Afghan Taliban leader Mullah Akhtar Mohammad Mansour on the Iran-Pakistan border. At the very least, his activities indicated tacit Iranian support for the Taliban, if not more. U.S. authorities had tracked him visiting family in Iran and conducted the strike as he returned to Pakistan. Afterward, Taliban spokesman Zabihullah Mujahid stated that Mansour had been on one of his several “unofficial trips” to Iran because of “ongoing battle obligations.”

Previously, in November, Kenyan authorities arrested two Iranian citizens on charges of plotting to carry out a terrorist attack against Israeli targets in Nairobi. The Iranians were allegedly sent by the IRGC-QF.

A month later, the Nigerian army launched a massive attack on the Shiite town of Zaria after reportedly obtaining intelligence about an assassination attempt on the country’s army chief of staff. The plot was allegedly organized by the Islamic Movement of Nigeria, a Shiite militant group that Iran had previously trained in the assembly of explosives and other skills, according to a former Iranian Foreign Ministry advisor.

Conclusion

At an April 2015 Washington Institute event held three months before the signing of the JCPOA, Treasury Secretary Jack Lew stated, “Make no mistake: deal or no deal, we will continue to use all our available tools, including sanctions, to counter Iran’s menacing behavior.” A year later, President Obama underscored this pledge to Gulf Cooperation Council partners at a Camp David summit: “We have to be effective in our defenses and hold Iran to account where it is acting in ways that are contrary to international rules and norms.”

Today, however, it is clear that Iran’s support for terrorism has only increased since the deal was reached, and officials cannot feign surprise on the matter. In June, for example, senior Treasury official Adam Szubin bluntly concluded, “As we expected, Iran has not moderated this conduct since the implementation of the JCPOA.” Given Iran’s ongoing support for terrorism and regional instability and the administration’s repeated insistence that it would hold Tehran’s feet to the fire on these very issues, the JCPOA’s first anniversary presents Washington with a perfect opportunity to reassess the regime’s menacing behavior and take steps to hold it accountable.

Willful Blindness and DHS Policy CVE Grant Program

Philip B. Haney, a founding member, Department of Homeland Security (DHS) Customs & Border Protection (CBP) and author of the must-read book See Something, Say Nothing

Last week I testified before the Senate Judiciary Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts at a hearing entitled, “Willful Blindness: Consequences of Agency Efforts To Deemphasize Radical Islam in Combating Terrorism.”

Philip Haney/Breitbart: I am a recently retired Customs & Border Protection (CBP) agent. I was named a Founding Member of the Department of Homeland Security (DHS) at its inception on March 01, 2003. During my 12 years serving inside DHS under two administrations, I witnessed a series of events which ultimately prompted me to become a whistleblower, releasing critical documents to Members of Congress as I felt necessary to comply with my oath to the Constitution.

First, in January of 2008, I received what is now known as the “Words Matter Memo,” which was circulated internally by the Civil Rights and Civil Liberties (CRCL) division of DHS. The full title of the document was “Terminology to Define the Terrorists: Recommendations from American Muslims,” and it read in part:

 [T]he experts counseled caution in using terms such as, “jihadist,” “Islamic terrorist,” “Islamist,” and “holy warrior” as grandiose descriptions.

Collapsing all terrorist organizations into a single enemy feeds the narrative that al-Qaeda represents Muslims worldwide.

We should not concede the terrorists’ claim that they are legitimate adherents of Islam. Therefore, when using the word [Islamic], it may be strategic to emphasize that many so-called “Islamic” terrorist groups twist and exploit the tenets of Islam to justify violence and to serve their own selfish political aims.

Regarding jihad, even if it is accurate to reference the term (putting aside polemics on its true nature), it may not be strategic because it glamorizes terrorism, imbues terrorists with religious authority they do not have, and damages relations with Muslims around the globe.

I submitted a seven-point response listing serious substantive concerns about this memo, but received no response.

On November 24, 2008, a decision came down in the Holy Land Foundation (HLF) trial, the largest terror financing case in American history. During that trial, the federal government had established that a number of organizations were appropriately named as unindicted co-conspirators along with HLF, including the Council on American Islamic Relations (CAIR), the Islamic Society of North America (ISNA), and the North American Islamic Trust (NAIT).

Specifically, the judge ruled that federal prosecutors had “produced ample evidence to establish the associations of CAIR, ISNA and NAIT with HLF… and with Hamas.” In addition, the judge ruled that that these organizations had direct links to the Muslim Brotherhood, one of the oldest and largest Islamic fundamentalist organizations in the world, founded in 1928 in Egypt to reestablish the Caliphate, whose motto includes “Jihad is our way, and death in the service of Allah is the loftiest of our wishes.”

I made note of the decision, and explored links between these groups and potential extremist and terrorist activity. But on October 15, 2009, I was ordered by DHS to ‘modify’ linking information in about 820 subject records in the Treasury Enforcement Communications System, or “TECS records” to remove ‘unauthorized references to terrorism.’ I was further ordered not to input any more Memoranda of Information Received, or MOIRs, to create no more TECS records, and to do no further research on the topics I was exploring.

On November 5, 2009, at Ft. Hood, Texas, Nidal Hasan shot and killed 13 people, including one who was pregnant, and wounded 32 others, while calling out “Allahu akbar!” meaning “God is great” in Arabic.

Hassan was a U.S. Army major who had exchanged emails with leading al Qaeda figure Anwar Awlaki – which the FBI had seen and decided not to take action – in which he asked whether those attacking fellow U.S. soldiers were martyrs. He had also given a presentation to Army doctors discussing Islam and suicide bombers during which he argued Muslims should be allowed to leave the armed forces as conscientious objectors to avoid “adverse events.” The Pentagon refused for five years to grant victims Purple Hearts, designating the attack “workplace violence.”

On January 27-28, 2010 an ‘Inaugural Meeting’ occurred between American Muslim leaders and DHS Secretary Janet Napolitano, hosted by DHS CRCL. The Inaugural Meeting created controversy because it included a number of Islamic fundamentalist individuals and organizations.

For instance, the meeting included at least one organization that was named as an unindicted co-conspirator in the 2008 HLF Trial and established to have associations with the now-shuttered HLF and with Hamas, namely ISNA. According to the Investigative Project on Terrorism (IPT), the group’s representative who attended the meeting, Ingrid Mattson, has “an established pattern of minimizing the nature of extremist forms of Islam and rationalizing the actions of Islamist terrorist movements.” Another invited group, the Muslim American Society (MAS), was actually formed as the United States chapter of the Muslim Brotherhood in 1993.

Likewise, in the Spring of 2010, the Administration convened the Countering Violent Extremism (CVE) Working Group under the authority of the Homeland Security Advisory Council (HSAC), again raising questions because of those named to it.

They included Omar Alomari, who once wrote that jihad was “the benign pursuit of personal betterment. It may be applied to physical conflict for Muslims, but only in the arena of Muslims defending themselves when attacked or when attempting to overthrow oppression and occupation,” asserting further that “”Jihad as a holy war is a European invention, spread in the West”; Mohamed Elibiary, who has asserted that it was “inevitable that [the] ‘Caliphate’ returns” and ultimately was let go from the HSAC amid charges he misused classified documents; and Dahlia Mogahed, who has decried “lethal cocktail of liberty and capitalism” and holds that “Islamic terrorism’ is really a contradiction in terms” to mainstream Muslims “because terrorism is not Islamic by definition.”

So by the Spring of 2010, we had come to the point that a CBP Officer was literally removing information connecting the dots on individuals with ties to known terror-linked groups from TECS, while the Administration was bringing the same individuals into positions of influence, to help create and implement our counter-terror policy, in the context of actual terror attacks taking place.

On August 30, 2011, the DHS Chief Council approved a project I initiated looking into Islamic fundamentalist group Tablighi Jamaat (TJ). On November 15, 2011, I began a temporary duty assignment at the National Targeting Center (NTC). A short time later, I was assigned to the Advanced Targeting Team, where I worked exclusively on the TJ Project, which was quickly upgraded to a global-level case.

On March 15, 2012, seven lawyers and three senior executive service (SES) administrators met with management personnel at the NTC to express concern for our focus on TJ, because it is not a designated terrorist group, and therefore the project might be “discriminating” against its members because they are Muslim. On June-July, 2012, the TJ Initiative was ‘taken in another direction,’ (i.e. shut down). The Administration took this action despite the fact that [1] in nine months, we had conducted 1,200 law enforcement actions, [2] I was formally commended for finding 300 individuals with possible connections to terrorism, and [3] 25% of the individuals in Guantanamo Bay had known links to Tablighi Jamaat.

On August 22, 2012, The Institute of Islamic Education (IIE) case that today links both the Darul Uloom Al-Islamiya mosque attended by Syed Rizwan Farook and Tashfeen Malik, the San Bernardino shooters, and the Fort Pierce mosque attended by Omar Mateen, the Orlando shooter, was entered into TECS. But once again, on September 21, 2012, all 67 records in the IIE case were completely deleted (not just ‘modified’) from TECS.

On September 21, 2014, I was relieved of my service weapon, all access to TECS and other programs was suspended, my Secret Clearance was revoked, and I was sequestered for the last 11 months of my career with no assigned duties.

On December 2, 2015, the San Bernardino shootings occurred, and I immediately linked the mosque in San Bernardino to the IIE case (with the 67 deleted records), and to the Tablighi Jamaat case (which was shut down).

On June 09, 2016, the Homeland Security Advisory Council Countering Violent Extremism (CVE) Subcommittee issued an Interim Report and Recommendations. The report recommended in part using American English instead of religious, legal and cultural terms like “jihad,” “sharia,” “takfir” or “umma.”

On June 12, 2016, the shootings in Orlando occurred, and I linked Omar Mateen’s mosque in Fort Pierce, FL to the IIE & TJ case. And on June 19, 2016, Attorney General Loretta Lynch announced that her Department of Justice would release redacted 9-11 call transcripts for Mr. Mateen.

The threat of Islamic terrorism does not just come from a network of armed organizations such as Hamas and ISIS, who are operating ‘over there’ in the Middle East. In fact, branches of the same global network have been established here in America, and they are operating in plain sight, at least to those of us who have been charged with the duty of protecting our country from threats, both foreign and domestic.

The threat we face today, which continues growing despite the willful blindness of those who insist on pretending otherwise, is not “violent extremism,” “terrorism,” or even “Jihad” alone, but rather, the historical and universally recognized Islamic strategic goal of implementing Shariah law everywhere in the world, so that no other form of government (including the U.S. Constitution) is able to oppose its influence over the lives of those who must either submit to its authority, become second-class citizens, or perish.

Ignoring that reality has arguably cost at least the lives of those in Ft. Hood, San Bernardino and Orlando, and will cost many, many more if it is allowed to continue.

FY 2016 Countering Violent Extremism (CVE) Grant Program

Department of Homeland Security: In December, 2015, Congress passed the Department of Homeland Security Appropriations Act, 2016 (Public Law 114-113). Sec. 543 of the Act and the accompanying Joint Explanatory Statement provided $10 million for a “countering violent extremism (CVE) initiative to help states and local communities prepare for, prevent, and respond to emergent threats from violent extremism.”

The Department of Homeland Security issued a notice of funding opportunity on July 6, 2016 announcing the new Countering Violent Extremism Grant Program, the first federal grant funding available to non-governmental organizations (NGOs) and institutions of higher education to carry out countering violent extremism programs.

These new grants will provide state, local and tribal partners and community groups—religious groups, mental health and social service providers, educators and other NGOs—with the ability to build prevention programs that address the root causes of violent extremism and deter individuals who may already be radicalizing to violence.

This initiative builds on Secretary Johnson’s September 2015 announcement of the creation of the Office for Community Partnerships. This Office has worked to take the Department’s CVE mission to the next level and find innovative ways to support local communities and address the evolving threat environment. This grant program supports that line of effort.

For an overview of the program and eligibility, please consult this Fact Sheet.

Interested applicants can view the Notice of Funding Opportunity and begin the application process.

Frequently Asked Questions can be found here.