What does it take to get Washington’s attention on the border?

Across the country, citizens now scratch their heads and wring their hands wondering what it takes to get Washington’s attention focused on the U.S.-Mexico border. During this election cycle, border security has received some attention, but not what it deserves.

The violence continues, the middle class is fleeing Mexico, and evidence mounts that criminal organizations are increasingly active and influential in the United States. Time has proved that boots on the ground provide a powerful deterrent, and, similar to the surge of troops in Iraq, it can change the dynamics of the situation markedly. Continue Reading

Yes, there is a homegrown terrorism threat

Earlier this year U.S. Rep. Peter T. King, R-N.Y., chaired three hearings on Islamic radicalization in the United States. One challenge was the lack of data in the public debate, which made it easy for critics to dismiss the hearings or the need to investigate this issue.

The Baker Institute Homeland Security and Terrorism Program recognized this deficiency, so I began the task of gathering the data on persons associated with Islamic extremist activities in the United States and on U.S. persons associated with Islamic extremist activities abroad from 2009 to the spring of 2011. After nine months of research on 104 individuals, questions posed by the hearings on radicalization can be answered in my paper, “Analyzing the Islamic Extremist Phenomenon in the United States: A Study of Recent Activity.” Continue Reading

The threat to New York and Washington: What does it mean?

Last night the news broke on a possible threat to New York and/or Washington involving vehicle bombs.

Understanding the significance of the threat is partly dependent on understanding the terminology. The alert cited “specific, credible, but unconfirmed“ information. Credible information was developed overseas, however independent corroborations of the information has not been possible. The credibility of the source is an assessment made by the intelligence community, and it involves not only the reliability of the source, but the likelihood the source would have been given or obtained accurate information. Continue Reading