Category: Infiltration

The Muslim Brotherhood: Doctrine, Strategy, Operations and Vulnerabilities

Want to discover the vulnerabilities of the Muslim Brotherhood? Study its doctrine, strategy and operations worldwide. That’s what I set out to do in my chapter, “The Muslim Brotherhood: Doctrine, Strategy, Operations and Vulnerabilities,” appearing in the newly published book, Meeting the Ideological Challenges of Islamism: How to Combat Modern Radical Islam. The work was edited by Anna Bekele and...

No Defeat Jihad Summit strategy author was invited to White House CVE summit

Among the many experts and practitioners invited to participate in the White House’s Countering Violent Extremism strategy summit, not one was involved with the Defeat Jihad Summit strategy sponsored earlier this month. This is significant, as the Defeat Jihad Summit authors approach the issue as an ideological one, requiring ideological warfare – something that the White House has opposed. Equally...

Attacking NATO where it has no defense

Russia’s successful subversion and partition of Ukraine can be replicated inside NATO countries without triggering the collective defense provisions of Article 5 of the Alliance’s treaty. We commented on this in a recent piece titled “Against All Odds: Why Putin is Winning.” In that article, we noted a concern by Paul A. Goble, considered the dean of experts on nationalities...

Captured documents show how congressman & aides helped enemy

Attached are the documents captured by US troops in Grenada in October 1983, as in Class 4 of the Public Diplomacy and Political Warfare course. They are not required reading for the final (though you are welcome to use them as examples in the final exam), but are here for your edification. 1. Letter from Carlottia Scott, chief of staff...

Muslim Brotherhood influence operations – The missing Wikipedia page

Someone pulled down a thoughtful Wikipedia page, “Muslim Brotherhood Influence Operations,” early in 2012. Having rediscovered a copy of the vandalized page, I post it here for the permanent record. What follows is taken verbatim from that Wikipedia page: Muslim Brotherhood Influence Operations From Wikipedia, the free encyclopedia Jump to: navigation, search According to Peter Probst, a global terrorism expert...

The dog that didn’t bark: Mullahs cover hearing on VOA, but don’t comment on regime bias

The mullahs’ reporting of the April 7 US congressional hearing about pro-regime bias at the Voice of America reads like Sherlock Holmes’ case of the dog that didn’t bark. In solving a murder mystery, Holmes reasoned that because the dog at the victim’s home didn’t bark, it must have known the killer. By deduction, the great detective solved the mystery....

Text of KGB Chairman’s memo to Andropov about US senator

The following is the translated text of a classified memorandum from KGB Chairman Viktor Chebrikov (pictured) to Soviet Communist Party chief and former KGB chairman Yuri Andropov, dated May 14, 1983. I will hand out a photocopy of the original Russian document in class. KGB is the Russian initials for “Committee for State Security.” In the memo, the KGB Chairman...

Russia: Death and Resurrection of the KGB

Russia: Death and Resurrection of the KGB J Michael Waller Demokratizatsiya: The Journal of Post-Soviet Democratization, Summer 2004      “We represent in ourselves organized terror–this must be said very clearly.” Feliks Dzerzhinsky, founder of Cheka   The roots of all of the most efficient political police systems in modern history can be traced to December 20, 1917. On that...

Terrorist recruitment and infiltration in the US: Prisons and military as an operational base

“Terrorist Recruitment and Infiltration in the United States: Prisons and Military as an Operational Base,” testimony before the Subcommittee on Terrorism, Technology and Homeland Security, Committee on the Judiciary, U.S. Senate, October 14, 2003.

How terrorists use ‘civil liberties’ arguments to undermine the war effort

by J. Michael Waller Insight, March 4, 2003 Terrorists and their supporters are doing their best to weave themselves into the political fabric of American society, say specialists in homeland security. They are operating front groups and charities to finance their operations, and they are running influence operations to weaken federal antiterrorism laws under the guise of protecting civil liberties. The...