Pelosi Hires Soros’ Right-Hand Man

Pelosi Hires Soros’ Right-Hand Man
By John Perazzo
FrontPageMagazine.com | February 27, 2007

One can learn a great deal about the values and core beliefs of a political figure by taking note of the people he or she assigns to key government posts. Consider, for instance, what we can learn about House Speaker Nancy Pelosi on the basis of her February 8th appointment of Joseph Onek to be her Senior Counsel. “This is a critical time for the Congress and the country,” Onek said following his appointment, “and I thank the Speaker for the opportunity to return to government service and work on behalf of the American people.”  
 
But who is Joseph Onek, and how exactly does he define working “on behalf of the American people”? A not insignificant clue is provided by the fact that Onek, a 1967 graduate of Yale Law School, is currently a
Senior Policy Analyst for George Soros’s Open Society Institute (OSI), one of the world’s major financiers of the political far Left. OSI is a member of the benignly named Peace and Security Funders Group, an association of more than 50 foundations that earmark a sizable portion of their $27 billion in combined assets to leftist organizations that undermine the war on terror in several interrelated ways:

  • by characterizing the United States as an aggressively militaristic nation that exploits vulnerable populations all over the globe
  • by accusing the U.S. of having provoked, through its unjust policies and actions, the terror attacks against it, and consequently casting those attacks as self-defensive measures taken in response to American transgressions
  • by depicting America’s military and legislative actions against terror as unjustified, extreme, and immoral
  • by steadfastly defending the civil rights and liberties of terrorists whose ultimate aim is to facilitate the annihilation of not just the United States, but all of Western civilization
  • by striving to eradicate America’s national borders and institute a system of mass, unregulated migration into and out of the United States — thereby rendering all distinctions between legal and illegal immigrants anachronistic, and making it much easier for aspiring terrorists to enter the U.S.  Toward this end, OSI has poured rivers of money into the coffers of the Mexican American Legal Defense and Education Fund, the Immigrant Legal Resource Center, theNational Immigration Law Center, the National Immigration Forum, the National Council of La Raza, and the American Immigration Law Foundation.

In September 2002, Joseph Onek’s OSI also made a $20,000 grant to the Legal Defense Committee of Lynne Stewart, the criminal-defense attorney who had unlawfully abetted her incarcerated client, Omar Abdel Rahman, in transmitting messages to the Islamic Group, the Egypt-based terrorist organization he headed. At the time of Stewart’s crime, Rahman was already serving a life sentence for his role in masterminding the 1993 World Trade Center bombing; he also had conspired, unsuccessfully, to plant additional bombs at the United Nations building, FBI offices in New York, the Lincoln and Holland Tunnels, and the George Washington Bridge.  
 
OSI’s money is further apportioned to a far-flung variety of leftist groups, including: 

The Open Society Institute’s funding priorities reflect a vision of America as a nation infested with all manner of inequity, a country in desperate need of radical social and economic transformation. It is more than noteworthy that Joseph Onek has secured for himself a leadership position within this Institute.   
 
Another highlight of Mr. Onek’s resume is his current position as
Senior Policy Analyst for the Open Society Policy Center (OSPC), which, like OSI, was founded by the billionaire leftist George Soros. Established in the aftermath of September 11th, this organization helped draft the Civil Liberties Restoration Act, which in June 2004 was introduced in the Senate by Democrats Ted Kennedy, Patrick Leahy, Russell Feingold, Richard Durbin, and Jon Corzine. The Act was designed to roll back, in the name of defending civil liberties, vital national-security policies that had been adopted following the 9/11 terrorist attacks.  
 
OSPC’s range of concerns extends also to “the proper treatment of detainees” — a polite reference to the bloodthirsty
al Qaeda combatants captured on Middle Eastern battlefields and currently incarcerated in Guantanamo Bay.  
 
Extending its advocacy on behalf of inmates to the American prison system at large, OSPC considers “rehabilitation,” rather than punishment, to be the proper function of criminal justice. Key to the attainment of this objective, in OSPC’s calculus, are colossal boondoggles whereby American taxpayers foot the bill for a multitude of “needed services and treatment” programs designed to help ease prison inmates’ transition back into society after their release.  
 
Joseph Onek’s busy life also requires that he reserve some time for his duties as Senior Counsel for the Constitution Project (CP), an organization that
seeks “solutions to difficult legal and constitutional issues.” These “solutions” are essentially calls for the United States to abandon every aggressive anti-terrorism and anti-crime measure it has ever initiated, on grounds that such measures violate the rights and freedoms of suspected wrongdoers.  
 
Onek serves as Director of CP’s
Liberty and Security Initiative (LSI), which flatly rejects most of America’s post-9/11 homeland security efforts as misguided “government proposals that [have] jeopardized civil liberties.” Specifically, LSI:

  • opposes President Bush’s decision to try suspected terrorists in military tribunals rather than in civilian courts
  • opposes “the use of profiling” in law-enforcement and intelligence work alike
  • holds that state and local law-enforcement agencies should be uninvolved in pursuing suspected terrorists
  • opposes government efforts to “conduct surveillance of religious and political organizations”
  • opposes “increased federal and state wiretap authority and increased video surveillance”
  • calls for the creation of a commission “to investigate the abuse of people held at detention facilities such as Abu Ghraib and Guantanamo Bay” (“When you think about it,” Onek says, “Guantanamo became a symbol around the world for American disrespect for law.”)

Onek was formerly the Director of the Center for Law and Social Policy (CLSP), which promotes the familiar leftist theme of massive taxpayer expenditures, coupled with a diminution of personal responsibility, as the proper means of achieving virtually every societal objective one can name. For example, CLSP:

  • proposes increased funding for “child care and early education initiatives” such as Head Start
  • opposes “family cap” policies that would make welfare recipients ineligible for incrementally higher payments if they procreate further while on public assistance
  • advocates “a comprehensive range” of new, government-funded services for “low-income children and their parents”
  • calls for “reorienting the child support program into an income support program, emphasizing the need to improve family resources by providing tailored services to both parents”
  • aims to make more money available to cover the cost of college tuition and “college support services” for “low-income adults”
  • proposes to help ex-prisoners “find work, get safe housing, go to school, and access public benefits.”

To disseminate his perspectives to the widest possible audience, Onek has been an occasional guest blogger on the website of the American Constitution Society for Law and Policy (ACS), a Washington, DC-based think tank that seeks to radicalize American jurisprudence by recruiting and indoctrinating law students, law professors, attorneys, and judges — and helping them to acquire positions of power. The roster of speakers who address ACS conventions includes such luminaries as Ralph Nader and the communist icon Angela Davis.  
 
Apart from the foregoing organizational affiliations, Onek has also held important posts in two presidential administrations. Under
President Clinton, he served as State Department Rule of Law Coordinator and Principal Deputy Associate Attorney General. In the latter role, Onek was a key figure in the Justice Department headed by Attorney General Janet Reno and Assistant Attorney General Jamie Gorelick. You might recall that Gorelick in 1995 issued the monumentally important “wall memo” to then-FBI Director Louis Freeh and U.S. Attorney Mary Jo White. Titled “Instructions on Separation of Certain Foreign Counterintelligence and Criminal Investigations,” Gorelick’s memo read:  
 
“We believe that it is prudent to establish a set of instructions that will more clearly separate the counterintelligence investigation from the more limited, but continued, criminal investigations. These procedures, which go beyond what is legally required, will prevent any risk of creating an unwarranted appearance that FISA [Foreign Intelligence Surveillance Act of 1978] is being used to avoid procedural safeguards which would apply in a criminal investigation.”  
 
In short, this mandate stressed the importance of maintaining a legal barrier, or “wall,” barring intelligence investigators and law-enforcement investigators from collaborating and sharing information — even if they were both trailing the same suspect who was plotting a terrorist act. This restriction (which had first been put in place by the
Carter administration) effectively crippled the government’s ability to fight terrorism, and can arguably be blamed for America’s failure to prevent the 9/11 catastrophe. Two noteworthy examples of the policy’s deadly consequences are the following:

  • On August 29, 2001, an FBI investigator in New York desperately pleaded for permission to initiate an intensive manhunt for al Qaeda operative Khalid Almihdar, who was known to be planning something big. The Justice Department and the FBI deputy general counsel’s office both denied the request, explaining that because the evidence linking Almihdar to terrorism had been obtained through intelligence channels, it could not legally be used to justify or aid an FBI agent’s criminal investigation; that is, it would constitute a violation of Almihdar’s “civil rights.” Thirteen days later, Almihdar took over the cockpit of American Airlines Flight 77 and crashed it into the Pentagon.
  • The same wall of separation prevented FBI agents in Minneapolis from searching the computer hard drive of Zacarias Moussaoui  the so-called “20th hijacker” — in August 2001. Had those agents been given access to Moussaoui’s computer, two of the nineteen 9/11 hijackers would have been identified along with the Hamburg-based terrorist cell that planned the attack; it can reasonably be argued that if that had happened, the mass murders of 9/11 could have been averted.

As noted above, it was during the Carter administration that the aforementioned “wall” (dividing law-enforcement from intelligence) was first created to defuse allegations of FBI espionage abuses. And Joseph Onek served as Deputy Counsel to President Carter, advising the latter on all legal issues pertaining to the Presidency.  
 
In other words, Onek has played major roles in the two presidential administrations that did more harm to America’s terror-fighting capacity than any other administrations in U.S. history.  
 
On June 21, 2005, Onek
testified at the invitation of the House of Representatives Homeland Security Committee’s Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. His chief concern involved Section 215 of the Patriot Act, which he referred to as “the so-called library records provision.” “The FBI,” Onek warned, “will seek financial records, employment records, transportation records, medical records and yes, sometimes, library records. … Inevitably, FBI investigations will sweep up sensitive information about innocent, law-abiding people.” 
 
Onek and his fellow critics of the Patriot Act have portrayed Section 215 as an egregious invasion of personal privacy. But as
Heather MacDonald points out, “grand juries investigating crimes have always been able to subpoena the very items covered by 215 — including library records and Internet logs — without seeking a warrant or indeed any judicial approval at all. Section 215 merely gives anti-terror investigators the same access to such records as criminal grand juries, with the added protection of judicial oversight.”  
 
During his June 21 testimony, Onek also expressed deep concern about “the danger that the government will use the information it gathers and shares in ways that unfairly discriminate against Muslim Americans.” “Muslims will appear disproportionately on the government’s computer screens,” he explained, “because they are the people most likely (naturally and innocently) to visit, telephone and send money to places like Pakistan and Iraq. Inevitably, government officials will learn more about Muslim Americans than about other Americans.” He predicted that this would lead to the injustice of Muslims being disproportionately caught violating immigration laws, and that “[t]his unfairness will breed discontent in the Muslim community and undermine the fight against terrorism.”  
 
And then, incredibly, Onek said this: “The government remains free to bring criminal or immigration cases against Muslim Americans, provided that it does not use information generated by anti-terrorist data-mining systems in cases not involving terrorism or violent crime. This limitation will require some segregation of information and impose some burdens on the government. But these burdens are a small price to pay to ensure fairness to all Americans and strengthen the fight against terrorism.”  
 
In other words, Onek continues to advocate the very same “wall” — barring intelligence officials and law-enforcement officials from sharing information and collaborating on investigations — that his former employers at the Clinton Justice Department sanctified in the 1990s.  
 
You have read correctly: Onek favors precisely the policy that made it impossible for the U.S. to avert 9/11, and he characterizes its most (literally) fatal flaw as “a small price to pay.”  
 
There could be no starker illustration of blind devotion to a seemingly enlightened ideology that has, in practice, shown itself to be the wellspring of failed and foolish policy. And this is the man who Nancy Pelosi, the powerful Speaker of the U.S. House of Representatives, has named as her Senior Counsel. The American people should know that.

Click Here to support Frontpagemag.com.

Radical Islam — Ideology, Not Religion

Radical Islam — Ideology, Not Religion

The dramatic events of the last few years have made it plain that the West is in a fight for its life. The terrorist attacks on New York, Washington, Madrid and London have demonstrated with ample clarity the enemy’s commitment to his stated goal of our destruction. The situation could not indeed be more dire, since never before have we faced a foe so dogged and fanatical. Whether we want to admit it or not we are in a war to the death, for the enemy will not relent until he either accomplishes his objective or is himself destroyed in the effort. Given the stakes, it is vitally important that we understand who this enemy is, because only then we’ll be in a position to formulate an effective strategy for the struggle ahead.

Contrary to all appearances, radical Islam — that militant form of Islamic fundamentalism — is not a religious movement. That this is generally not recognized is not surprising given the movement’s exploitation of religious rhetoric and symbols. But a closer look at its modus operandi shows that it is virtually indistinguishable from that of fascism and communism. The striking similarities should alert us to the fact that radical Islam is at bottom a political ideology along the lines of the great totalitarian ideologies of the past.

Like communism and fascism, radical Islam is intrinsically utopian in that it offers itself as the answer to all great problems of man. This feat is to be accomplished by eliminating the root cause from which all human trouble ultimately derives — the lack of true faith. The solution, then, is the conversion of peoples to Islam and the subsequent conforming of their conduct to Shari’a, a God-inspired body of law.

Since Shari’a is the expression of God’s perfect will, societies where it reigns supreme must inevitably experience prosperity, justice and righteousness. Thus in a way, Islamists promise to deliver a kind of paradise on earth. This ambition they share with fascists and communists who also proposed radical measures to stamp out that which they believed was the source of mankind’s all ills. To communists it was social class and private property and to fascists Jews and racial degradation. Doing away with these, they argued, would once and for all set things aright.

Like fascism and communism, Islamic fundamentalism fails to deliver when put into practice. Instead of achieving prosperity and harmony, all Shari’a-dominated societies invariably experience poverty, backwardness, and corruption. Shari’a thus not only fails to live up to its promise, but inflicts hardship and misery on those living under it. Iran, a country currently closest to the Islamist ideal of a fundamentalist state, is a case in point. Poor and troubled, it lags far behind the modern world in nearly all economic and social indicators. So counterproductive is its supposedly divinely-inspired system of government that it cannot ensure a comfortable and dignified existence for its citizens despite the steady inflow of large amounts of petro cash.

The Soviet Union found itself in much the same predicament. A country of vast natural resources, its whole existence was marked by destitution and hardship. Similarly, the last two genuinely communist regimes of today — Cuba and North Korea — are unable to provide even the most basic necessities for its people who are forced to endure untold distress as a result.

Like fascism and communism, radical Islam refuses to acknowledge its glaring failures and instead declares itself — in complete contravention of all facts and reality — an unqualified success. The Soviet Union brazenly boasted of being the most democratic, progressive and prosperous country on earth while in truth the exact opposite was the case. Oppressive, totalitarian and poor, it subjected its population to conditions that could only be described as hellish. So much so that it had to transform its borders into virtual prison walls in order to prevent its people from fleeing in desperation. The same tradition is continued today by Fidel Castro who shamelessly brandishes the rhetoric of triumph and achievement when describing his own failed regime. Hitler likewise insisted on the categorical success of his national socialism despite the cruelties, injustices and contradictions that characterized his enterprise from the beginning.

Like fascists and communists, Islamists brook no disagreement and seek to stamp out all forms of dissent. Tolerating no opposition, they respond to criticism by intimidation, harassment and not infrequently by murder. What’s more, their repression is not confined only to open disagreement, but is also aimed at those suspected of harboring unwholesome thoughts. Like all totalitarians, Islamists seek to control people’s minds. Even seemingly insignificant remarks and gestures can be interpreted as evidence of a subversive frame of mind. The Taliban regime in Afghanistan, for example, tortured and persecuted for most trivial acts which it took as signs of inward rebelliousness. Pleading and affirmations of orthodoxy by the accused are routinely taken only as further evidence of guilt. Islamists’ methods in treating those deemed ideologically suspect are strongly reminiscent of the methods employed by the KGB and Gestapo.

Like their totalitarian kin, Islamists are aggressively expansionistic. Driven by an irresistible urge to impose on others, their goal is nothing less than global domination. Communists strove for a world wide socialist state, Hitler for a world-controlling Third Reich and Islamists for a world wide caliphate.

Like its two sister ideologies, Islamism seeks to spread itself by militant and violent means. Hitler took over most of Europe by conquest. The communist block was the result of a military takeover by the Soviets who mercilessly destroyed all who stood in their way. Islamists even call the whole non-Muslim world the Dar al-harb or the House of War. According to fundamentalists, Islamic law prescribes perpetual holy war – jihad – to be waged in these territories that is to last until they have been brought into the Dar al-Islam or the House of Islam. There the Muslim law and government will reign supreme.

Like fascists and communists, Islamists are capable of staggering cruelty and exhibit a ready willingness to commit unspeakable atrocities in order to achieve their objectives. Hitler murdered some six million people in concentration camps. The Soviets slaughtered nearly twenty million at home and countless others in the countries they subjugated. The Chinese communists killed nearly forty million. If anything, Islamists exhibit murderous tendencies of even greater intensity. Their acts of terror invariably betray a determination to kill as many innocent people as they possibly can. There can be little doubt that if they should ever achieve power on the scale of their ideological predecessors, they would quickly match and exceed their death toll. After all, Islamists openly tell us that under their rule people will either have to convert or die. Mahmoud Ahmadinejad, presently the most powerful fundamentalist in the world, has repeatedly hinted that he will deploy nuclear weapons once he obtains them. Given where he is coming from, there should be no question that he means what he says.

Although radical Islam may initially appear to be a religious movement, it in reality bears all the hallmarks of an authoritarian ideology. Utopian, militant, expansionistic, murderous, repressive, corrupt, intolerant, and inhumanly cruel, it employs the same methods and tactics as those two terrible ideologies of the 20th century. While the differences between them are largely rhetorical and superficial in nature, their modus operandi is for the most part identical. Having an utter contempt for human life and its intrinsic dignity, they are ever ready to destroy anyone and everyone who rejects their worldview or refuses to comply with their demands.

What Islamists have done is to in effect transform a religious faith into a virulent political ideology. It is imperative that we recognize this so that we can fully grasp the kind of danger we face. There are many who still believe that we can somehow pacify this foe, yet few would ever think it was possible to achieve a lasting truce with the fascists or communists. Notwithstanding their specious rhetoric, we are presently not contending with a band of pious saints who bear legitimate grudges or remediable grievances. We stand against murderous totalitarians who will not relent until their either achieve their goal or are defeated. There simply can be no détente. The only way to achieve a reprieve is to destroy them in the manner of fascism and communism.

Despite the terrible warnings of September 11 and other terrorist tragedies, with the few exceptions the West is largely oblivious to this grievous threat. This despite the painful lessons of history which warn against letting murderous ideologies go unchecked. World War II claimed some forty million people. Had the West curbed nascent fascism while there was still time, it could have saved most of those lives and averted untold pain and destruction. Similarly, had the western powers intervened against the murder-bent Bolsheviks while they struggled to gain their footing after the Revolution, it could have prevented the Gulags, the Cold War and the threat of a nuclear holocaust that nearly became reality.

History clearly teaches that we ignore totalitarian ideologies at our own peril. Refusing to deal with radical Islam decisively while there is still time will have catastrophic consequences in the years to come. The choice is stark: we will either act now or pay a terrible price later.

Scorn poured on James Cameron’s ‘coffin of Christ’

Scorn poured on James Cameron’s ‘coffin of Christ’

 theory

25.02.07 Add your view

James Cameron

Archaeologists and biblical scholars have poured scorn on a Hollywood film director’s sensational claim that he has discovered the coffin of Jesus Christ.

Oscar-winning ‘Titanic’ director James Cameron’s assertion that the bones of Jesus and his family were hidden for centuries in a Jerusalem tomb caused an outcry in the Holy Land.

Scroll down for more

'Jesus' tomb

Even a British archeologist who worked with Cameron, Dr. Shimon Gibson, admitted he’s “sceptical” about the claims that challenge some of the central tenets of Christianity.

'Jesus' tomb

The very fact that Jesus had a grave would contradict the Christian belief that he was resurrected and ascended to heaven.

‘The Lost Tomb of Christ’, a documentary set to air on Channel Four next month, argues that ten ancient ossuaries, small caskets used to store bones, which were found when bulldozers flattened a Jerusalem suburb in 1980, may have contained the remains of Jesus and his wife and child.

One of the caskets even bears the title, ‘Judah, son of Jesus,’ which Cameron claims as evidence that Jesus may have had a son. Another coffin was said to hold the bones of Mary Magdalene, also known as ‘Mariamne’.

Cameron unveiled two of the small limestone caskets at a press conference in New York, but the director could offer little proof to support his claims, other than the mathematical probability of a tomb containing a set of ossuaries with names linked to Jesus.

Of the ten ossuaries found, six were inscribed with the names of Jesus, Mary, Joseph and Mary Magdalene, as well as Judah, Son of Jesus, and a Matthew, of which there were many in Mary’s family, according to Luke 3:23.

Critics said all the names were commonplace in Biblical times.

Apparently surprised at the hostility over his ‘discovery’, the director who famously claimed to be ‘the king of the world’ when he won an Oscar for Titanic, insisted it was not a publicity stunt and said his critics should wait and see the film.

“I’m not a theologist. I’m not an archaeologist. I’m a documentary filmmaker,” he said.

Dr. Gibson, who was one of the first people to examine the caskets 27 years ago, now says: “Entering the tomb in 1980 I didn’t imagine this would become such an international focus.

“These are typical stone caskets from the first century. There are a lot of aspects that need to be looked at. A lot of new research has to be done. I’m sceptical.”

Even Cameron, pushed to support his claims, said statisticians found “in the range of a couple of million to one in favor of it being them.”

Most Christians believe Jesus’ body spent three days at the site of the Church of the Holy Sepulcher in Jerusalem’s Old City. The burial site identified in Cameron’s documentary is in a southern Jerusalem neighborhood nowhere near the church.

Amos Kloner, the first archaeologist to examine the site, said the idea fails to hold up by archaeological standards but makes for profitable television.

“They just want to get money for it,” Kloner said. “It was an ordinary middle-class Jerusalem burial cave,” he added. “The names on the caskets are the most common names found among Jews at the time.”

“The historical, religious and archaeological evidence show that the place where Christ was buried is the Church of the Resurrection,” said Attallah Hana, a Greek Orthodox clergyman in Jerusalem.

Stephen Pfann, a biblical scholar at the University of the Holy Land in Jerusalem who was interviewed in the documentary, said the film’s hypothesis holds little weight.

“I don’t think that Christians are going to buy into this,” he said. “But sceptics, in general, would like to see something that pokes holes into the story that so many people hold dear.”

“How possible is it?” he added. “On a scale of one through ten, with ten being completely possible, it’s probably a one, maybe a one and a half.”

Pfann is even unsure that the name Jesus on the caskets was read correctly. He thinks it is more likely the name Hanun. Ancient Semitic script is notoriously difficult to decipher.

Cameron spent two years working with a team of experts to make the controversial film. Director Simcha Jacobovici told the press conference: “For millions of readers, the Da Vinci Code was a fantasy, a fiction. Here is a Judah, son of Jesus, next to a Jesus and a Mariamne.”

Al Gore’s Personal Energy Use Is His Own “Inconvenient Truth”

Al Gore’s Personal Energy Use Is His Own “Inconvenient Truth”

Gore’s home uses more than 20 times the national average

Last night, Al Gore’s global-warming documentary, An Inconvenient Truth, collected an Oscar for best documentary feature, but the Tennessee Center for Policy Research has found that Gore deserves a gold statue for hypocrisy.

  

Gore’s mansion, located in the posh Belle Meade area of Nashville, consumes more electricity every month than the average American household uses in an entire year, according to the Nashville Electric Service (NES).

In his documentary, the former Vice President calls on Americans to conserve energy by reducing electricity consumption at home.

The average household in America consumes 10,656 kilowatt-hours (kWh) per year, according to the Department of Energy. In 2006, Gore devoured nearly 221,000 kWh—more than 20 times the national average.

Last August alone, Gore burned through 22,619 kWh—guzzling more than twice the electricity in one month than an average American family uses in an entire year. As a result of his energy consumption, Gore’s average monthly electric bill topped $1,359.

Since the release of An Inconvenient Truth, Gore’s energy consumption has increased from an average of 16,200 kWh per month in 2005, to 18,400 kWh per month in 2006.

Gore’s extravagant energy use does not stop at his electric bill. Natural gas bills for Gore’s mansion and guest house averaged $1,080 per month last year.

“As the spokesman of choice for the global warming movement, Al Gore has to be willing to walk to walk, not just talk the talk, when it comes to home energy use,” said Tennessee Center for Policy Research President Drew Johnson.

In total, Gore paid nearly $30,000 in combined electricity and natural gas bills for his Nashville estate in 2006.

Is Al Gore mentally ill?

Is Al Gore mentally ill?


Date: 2007-02-24, 11:13PM ESTIS AL GORE MENTALLY ILL?

Al Gore’s increasingly desperate refusal to admit he had lost the presidential election has some observers wondering if he is mentally ill. In fact, he fits the criteria for narcissistic personality disorder to an eerie tee.

A popular Internet message being spread around the globe notes that the description of this disorder sums up Gore’s entire being.

According to the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV), the bible of psychological problems, narcissistic personality disorder is marked by:

“A pervasive pattern of grandiosity (in fantasy or behavior), need for admiration, and lack of empathy, beginning by early adulthood and present in a variety of contexts, as indicated by five (or more) of the following:

“(1) has a grandiose sense of self-importance (e.g., exaggerates achievements and talents, expects to be recognized as superior without commensurate achievements)

“(2) is preoccupied with fantasies of unlimited success, power, brilliance, beauty, or ideal love

“(3) believes that he or she is ‘special’ and unique and can only be understood by, or should associate with, other special or high-status people (or institutions)

“(4) requires excessive admiration

“(5) has a sense of entitlement, i.e., unreasonable expectations of especially favorable treatment or automatic compliance with his or her expectations

“(6) is interpersonally exploitative, i.e., takes advantage of others to achieve his or her own ends

“(7) lacks empathy: is unwilling to recognize or identify with the feelings and needs of others

“(8) is often envious of others or believes that others are envious of him or her

“(9) shows arrogant, haughty behaviors or attitudes.”

AL, THE FAT LADY IS SINGING, AND THE MEN IN THE WHITE COATS ARE COMING!

Place your bets, who will take out Iran’s nuclear sites?

Anti-war cannibalism

Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad

Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad
By: E. Alshech

Alongside military jihad, which has been gaining momentum and extracting an ever growing price from many countries around the globe, Islamists have been developing a new form of warfare, termed “electronic jihad,” which is waged on the Internet. This new form of jihad was launched in recent years and is still in its early stages of development. However, as this paper will show, Islamists are fully aware of its destructive potential, and persistently strive to realize this potential.

Electronic jihad is a phenomenon whereby mujahideen use the Internet to wage economic and ideological warfare against their enemies. Unlike other hackers, those engaged in electronic jihad are united by a common strategy and ideology which are still in a process of formation. This paper aims to present the phenomenon of electronic jihad and to characterize some of its more recent developments. It lays out the basic ideology and motivations of its perpetrators, describes, as far as possible, its various operational strategies, and assesses the short- and long-term dangers posed by this relatively new phenomenon. The paper focuses on electronic jihad waged by organized Islamist groups that mobilize large numbers of hackers around the world to attack servers and websites owned by those whom they regard as their enemies.

Organized Electronic Jihad

In the past few years Islamist websites have provided ample evidence that Islamist hackers do not operate as isolated individuals, but carry out coordinated attacks against websites belonging to those whom they regard as their enemies. [1] As evident from numerous postings on the Islamist websites, many of these coordinated attacks are organized by groups devoted to electronic jihad. Six prominent groups of this sort have emerged on the Internet over the past few years: [2] Hackboy, [3] Ansar Al-Jihad Lil-Jihad Al-Electroni, [4] Munazamat Fursan Al-Jihad Al-Electroni, [5] Majmu’at Al-Jihad Al-Electroni, [6] Majma’ Al-Haker Al-Muslim, and Inhiyar Al-Dolar. [7] All these groups, with the exception of Munazamat Fursan Al-Jihad and Inhiyar al-Dolar, have websites of their own through which they recruit volunteers to take part in electronic attacks, [8] maintain contacts with others who engage in electronic jihad, coordinate their attacks, and enable their members to chat with one another anonymously. The Majmu’at Al-Jihad Al-Electroni website, for example, includes the following sections: A document explaining the nature of electronic jihad, a section devoted to electronic jihad strategy, a technical section on software used for electronic attacks, a section describing previous attacks and their results, and various appeals to Muslims, mujahideen, and hackers worldwide.

A more recent indication of the increasingly organized nature of electronic jihad is an initiative launched January 3, 2007 on Islamist websites: mujahideen operating on the Internet (and in the media in general) were invited to sign a special pact called “Hilf Al-Muhajirin” (“Pact of the Immigrants”). [9] In it, they agree “to stand united under the banner of the Muhajirun Brigades in order to promote [cyber-warfare],” and “to pledge allegiance to the leader [of the Muhajirun Brigades].” They vow to “obey [the leader] in [all tasks], pleasant or unpleasant, not to contest [his] leadership, to exert every conceivable effort in [waging] media jihad… [and to persist] in attacking those websites which do harm to Islam and to the Muslims…” [10] This initiative clearly indicates that the Islamist hackers no longer regard themselves as loosely connected individual activists, but as dedicated soldiers who are bound by a pact and committed to a joint ideological mission.

The Ideology and Ethical Boundaries of Electronic Jihad

Missionstatements posted on the websites of electronic jihad groups reveal that just like the mujahideen on the military front, the mujahideen operating on the Internet are motivated by profound ideological conviction. They despise hackers who “engage in purposeless and meaningless sabotage” [11] or are motivated by desire for publicity or by any other worldly objective. They perceive themselves as jihad-fighters who assist Islam and promote tawhid(Monotheism) via the Internet. [12] More importantly, they view cyberspace as a virtual battlefield in which the mujahideen can effectively defeat the West.

That the mujahideen operating in cyberspace are motivated by ideology, in contrast to many hackers, is illustrated by the following example. Recently, a participant on an Islamist forum posted instructions for breaking into a UK-based commercial website and stealing the customers’ credit card information in order to inflict financial damage on the “unbelievers” (i.e. on the non-Muslims customers and retailers). His initiative sparked a fierce debate among the forum participants, the dominant opinion being that this initiative falls outside the boundaries of legitimate cyber-jihad. One forum participant wrote: “Oh brother, we do not steal… We attack racist, American and Shi’ite [websites] and all corrupt websites.” Another participant reminded the forum members that stealing from unbelievers is forbidden. [13]

Image from Muslim Hackerz website

The Objectives of Electronic Jihad

One objective of electronic jihad which is frequently evoked by the mujahideen is assisting Islam by attacking websites that slander Islam or launch attacks against Islamic websites, or by attacking websites that interfere with the goal of rendering Islam supreme (e.g. Christian websites). More recently, however, the mujahideen have begun to cite additional objectives: avenging the death of Muslim martyrs and the suffering of Muslims worldwide (including imprisoned jihad fighters); inflicting damage on Western economy; affecting the morale of the West; and even bringing about the total collapse of the West.

The following excerpts from Arabic messages posted by Islamist hackers exemplify each of these objectives.

Eliminating Websites That Harm Islam

“The administration wishes to inform you of the following so that you understand our operational methods and our jihad strategy. My brothers, our operational methods are not only to assault… and target any website that stands in the way of our victory… We are indeed victorious when we disable such [harmful] websites, but the matter is not so simple. We target… websites that wage intensive war [against us]… We target them because they are the foremost enemies of jihad in cyberspace; their existence threatens Islamic and religious websites throughout the Internet…” [14]

Avenging the Death of Martyrs and the Suffering of Muslims and Imprisoned Mujahideen Worldwide

“We shall say to the Crusaders and their followers: We take an oath to avenge the martyrs’ blood and the weeping of Muslim mothers and children. The Worshipers of the Cross and their followers have already been warned that their websites may be broken into and destroyed. We must not forget our leaders, our mujahideen, our people and our children who were martyred in Palestine, Iraq, Afghanistan, Chechnya and in other places. We shall take revenge upon you, O Zionists and Worshippers of the Cross. We shall never rest or forget what you did to us. [There are only two options] in electronic jihad for the sake of Allah: Victory or death.

We dedicate these [operations of] hacking [into enemy websites] to the martyr and jihad-fighter sheikh Abu Mus’ab Al-Zarqawi, to the jihad-fighter Sheikh Osama bin Laden, to the imprisoned fighter of electronic jihad Irhabi 007, to the fighter of electronic jihad Muhibb Al-Shaykhan and to all the mujahideen for the sake of Allah…” [15]

Inflicting Economic Damage on the West and Damaging its Morale

“Allah has commanded us in various Koranic verses to wage war against the unbelievers… Electronic jihad utilizes methods and means which inflict great material damage on the enemy and [which also] lower his morale and his spirits via the Internet. The methods of [hacking] have been revealed [to us] by expert [hackers] on the Internet and networks… many of whom engage in purposeless and meaningless sabotage. These lethal methods will be harnessed [for use] against our enemies, so as to inflict the greatest [possible] financial damage [upon them] – which can amount to millions – and [in order] to damage [their] morale, so that [they] will be afraid of the Muslims wherever they go and even when they are surfing the Web.” [16]

Bringing About the Total Collapse of the West

“I have examined most of the material [available] in hacking manuals but have not found articles which discuss… how to disable all the [electronic] networks around the world. I found various articles which discuss how to attack websites, e-mails, servers, etc., but I have not read anything about harming or blocking the networks around the world, even though this is one of the most important topics for a hacker and for anyone who engages in electronic jihad. Such [an attack] will cripple the West completely. I am not talking about attacking websites or [even] the Internet [as a whole], but [about attacking] all the [computer] networks around the world including military networks, and [networks] which control radars, missiles and communications around the world… If all these networks stop [functioning even] for a single day… it will bring about the total collapse of the West… while affecting our interests only slightly. The collapse of the West will bring about the breakdown of world economy and of the stock markets, which depend on [electronic] communication [for] their activities, [e.g.] transfers of assets and shares. [Such an attack] will cause the capitalist West to collapse.

Actual Attacks and Their Effects

Reports on Islamist websites indicate that most of the hacking operations carried out by mujahideen have been aimed at three types of websites:

a) Ideological websites which promote beliefs, doctrines and ideologies which the mujahideen perceive as incompatible with Sunni Islam, such as Christianity, Shi’ism and Zionism. [17]

b) Websites which the mujahideen perceive as defamatory or harmful to Islam. Many of these are private blogs, news blogs and non-Islamic forums (e.g., http://answering-islam.org.uk). [18]

c) Websites which promote behavior that is contrary to the mujahideen’s religious worldview (e.g., http://www.nscrush.org/news/journal, a website associated with a girls’ sports team).

As for websites associated with governments, defense systems, and Western economic interests – Islamist websites present little or no evidence that mujahideen have actually attacked them. There is, however, sufficient evidence to suggest that such sensitive targets continue to be of intense interest to the mujahideen. For example, an Islamist forum recently conducted a survey among its participants regarding the targets they would like to attack. Among the targets suggested were Western financial websites and websites associated with the FBI and CIA. [19] Moreover, in September 2006, an Islamic website posted a long list of IP addresses allegedly associated with key governmental defense institutions in the West, including “the Army Ballistics Research Laboratory,” “the Army Armament Research Development and Engineering Center,” “the Navy Computers and Telecommunications Station,” “the National Space Development Agency of Japan,” and others. [20] The title of the message indicates that the list is meant for use in electronic attacks.

Another message, posted on an Islamist website on December 5, 2006, stated that Islamist hackers had cancelled a planned attack, nicknamed “The Electronic Guantanamo Raid,” against American banks. The posting explained that the attack had been cancelled because the banks had been warned about the attack by American media and government agencies. It stated further that the panic in the media shows how important it is “to focus on attacking sensitive economic American websites [instead of] other [websites, like those that offend Islam]…” The writer added: “If [we] attack websites associated with the stock[market] and with banks, disabling them for a few days or even for a few hours, it will cause millions of dollars’ worth of damage… I [therefore] call upon all members [of this forum] to focus on these websites and to urge all Muslims who are able to participate in this [type of] Islamic Intifada to attack websites associated with the American stock[market] and banks…” [21]

Attack Strategies

Postings on Islamist websites reveal that the cyberspace mujahideen favor two main strategies. The first is to paralyze sites by “swarming”, i.e., flooding them with hits and thus creating a traffic overload. When traffic to the site exceeds the website’s or server’s capacity, the site is blocked to additional users, and in some cases it even crashes. The second strategy is called “ping attack”: special programs are used to flood a website with thousands of e-mails, sometimes containing viruses, thus clogging the website and infecting it. [22] The programs utilized by mujahideen in these attacks are either programs available to the hacker community at large (see image below) or programs created especially for Islamist hackers (see images below). [23]

Program used by the general hacker’s community

Programs created by Islamists

Reports posted by the mujahideen after attacks on websites indicate that these cyber-assaults affect the websites only temporarily, if at all. In many cases the mujahideen themselves admit that their attack was ineffective [24] and that the website returned to normal functioning only minutes or hours after the attack. [25] In light of this, the mujhahideen often resort to another method in an attempt to completely eliminate the targeted site. An Islamist hacker explained the method as follows: “We contact… the server [which hosts the target website] before and after the assault, and threaten [the server admin] until they shut down the target website. [In such cases], the ‘host’ [i.e., server] is usually forced to shut down the website. The battle continues until the enemy declares: ‘I surrender.’” [26]

Islamist websites present very little evidence of more sophisticated attacks utilizing actual hacking techniques (i.e., obtaining the admin password and using admin privileges to corrupt data or damage the server itself). However, two examples do indicate that the cyberspace mujahideen may possess the capability to carry out such attacks. [27] On October 17, 2006, an Islamist website posted a message [28] containing a link to what appeared to be live pictures of Anchorage International Airport taken by the airport’s security cameras. There was also a link to an admin control program allowing surfers to control the airport’s security cameras. If this was an authentic break-in, it indicates that Muslim hackers are capable of hacking even into highly secure servers.

Another example which illustrates the extent of the mujahideen‘s hacking skills is the story of 22-year-old Younis Tsouli from West London, better know as Irhabi 007, who was arrested in 2005 by Scotland Yard. In his short but rich hacking career, Irahbi 007 wrote a hacking manual for mujahideen, instructed Islamist hackers online, and broke into servers of American universities, using them to upload shared files containing jihad-related materials. [29]

Image taken from the Ansar Al-Jihad website

Coordination of Attacks

Islamist websites provide extensive evidence that Islamist cyber-attacks are not random initiatives by individual mujahideen, but are steadily becoming more coordinated. Firstly, announcements of imminent attacks, which appear almost daily, are posted on numerous sites simultaneously. Participants are instructed to look out for postings specifying the time of attack, the URL of the target (usually posted some 30 minutes before the attack itself) and the program to be used for carrying out the attack. Secondly, before the attacks, websites have lately begun to post messages addressed to specific individuals referred to as “attack coordinators,” each of whom is associated with a specific Islamist site. Finally, there is a significant increase in response to the calls for participation in electronic attacks. Recently, for example, a message announcing an attack on a Shi’ite website received 15,000 hits, and approximately 3,000 forum members responded to the message. [30] The attacks, then, seem to be well-organized and supervised by a network of specially appointed individuals on various sites, and they appear to generate high participation level among forum members.

The following three examples demonstrate the coordinated nature of the attacks.

Instructions for Attack Coordinators

On December 21, 2006, the Al-Muhajirun website posted the following message regarding a planned attack: “Our attack will take place this coming Friday… I remind you that the name of the program to be used will not be posted until half an hour to an hour before the attack… Attack coordinators, you worked hard last week… and I ask you to display the same zeal in this [upcoming] attack. I ask [each] individual who intends to serve as attack coordinator on [his] website to reply [to this posting with the message]: “I will be the attack coordinator for this network…” [The coordinator] will be responsible for the following: …urging forum participants [to take part in the attack], while [taking care] not to mention names of ‘Hilf Al-Muhajirin’ members and the names of those who take part in the attack… [The coordinators] must be online at least one full hour before the attack… in order to post links to the programs that will be used and to the [intended target] websites. [They are also] responsible for posting the code-name of the attack, along with the text shown below [which presents some general information about the attack]… ” [31]

Announcement of a Ping Attack Against a Website That Harms Islam

The following message was posted November 23, 2006 on the website Majmu’at Al-Jihad Al-Electroni: “…An attack is about to be carried out by all the Internet mujahideen, may Allah accept it as jihad for His sake… [The targets are] websites that do harm to Islam… The attacks will take place on Saturday, Monday, and Thursday, between 6:00 P.M. and 10:00 P.M., Mecca time, or between 5:00 P.M. and 9:00 P.M. Jerusalem time… The primary [computer] program to be used is Al-Jihad Al-Electroni 1.5… We have been able to create a better version of the [program]… and eliminate most of the problems that were encountered by members [in the past]. [The new version] is much lighter and is capable of producing a much more powerful attack…” [32]

A General Call to Participate in a Virus Attack

“This action is a rapid [response] to [a website] that has annoyed us. This is war… Who is with me and who is against me? Allah is with me… and the Crusader Jew and his followers… are against me. I have… uploaded three viruses and a file which can disable firewalls. I will inform you of the time of the attacks… Whoever wishes to participate in the raid should download the virus he wishes to use and [then] send it [to the target]… I ask that before you do anything on the Internet… my mujahid brother, [please] place your trust in Allah.” [33]

Site infected with virus by Islamist hackers

Electronic Jihad: A Nuisance or a Real Threat?

The evidence presented here shows that electronic jihad is a form of cyber-warfare with ideological underpinnings and defined goals, which manifests in well-coordinated cyber-attacks. Examination of the websites reveals that the Islamist hackers maintain constant communication among themselves, share software and expertise and conduct debates on strategy and legitimate targets. There is also evidence of increasingly efficient coordination of attacks. The mujahideen’s own statements show that they mean to position themselves as a formidable electronic attack force which is capable of inflicting severe damage – greater even than the damage caused by conventional terrorist attacks.

At the same time, however, the information presented here reveals a significant gap between the mujahideen’s aspirations and their actual capabilities. Despite their self-proclaimed intention to target key economic and government systems and websites in order to bring about a total economic collapse of the West, Islamist websites provide no evidence that such targets have indeed been attacked. In actuality, most of the attacks documented on Islamist websites were aimed at sites that are seen by the mujahideen as morally corrupt or offensive to Islam. In addition, most of the attacks were carried out using unsophisticated methods which are not very likely to pose a significant threat to Western economic interests or sensitive infrastructure. In this respect, electronic jihad can still be seen, at least present, as a nuisance rather than a serious threat.

Nevertheless, it is important not underestimate the potential danger posed by this phenomenon. First, as shown above, at least two examples indicate that the mujahideen are already capable of compromising servers, even highly secure ones. Given the increasing communication and the constant sharing of expertise among Islamist hackers, [34] the gap between their goals and their actual capabilities is bound to narrow down. In other words, the mujahideen’s persistent pursuit of expertise in the area of hacking, as reflected in numerous website postings, may eventually enable them to compromise Western websites of a highly sensitive nature.

Second, past experience has shown that even primitive attacks, which do not damage servers, can cause substantial financial damage. For example, after a midair collision between a Chinese fighter jet and an American spy plane on April 1, 2001, Chinese hackers spread a malicious “worm,” known as the “Code Red Worm,” which infected about a million U.S. servers in July 2001 and caused some $2.6 billion worth of damage to computer hardware, software, and networks. [35] On another occasion, a ping attack against the retail giants Yahoo, eBay, and Amazon in February 2000 was estimated to have caused Yahoo alone a loss of $500,000 due a decrease in hits during the attack. [36]

In conclusion, electronic jihad, in its current state of development, is capable of causing some moderate damage to Western economy, but there is no indication that it constitutes an immediate threat to more sensitive interests such as defense systems and other crucial infrastructure. Nevertheless, in light of the rapid evolvement of this phenomenon, especially during the recent months, the Western countries should monitor it closely in order to track the changes in its modes of operation and the steady increase in its sophistication.

*Dr. Alshech is the Director of the Jihad and Terrorism Studies Project.


[1] For early examples of coordinated attacks, see www.3asfh.net/vb/showthread.php?t=18162. See also the following IslamOnline.net article from 2002 about a coordinated attack carried out by mujahideen against a Hebrew newspaper www.islamonline.net/Arabic/science/200205/Article01.shtml. I am indebted to Y. Yehoshua for these references.

[2] Some electronic Jihad groups, such as http://groups.msn.com/falastinhorra , are no longer active.

[3] http://www.hacker-boy.150m.com/.

[4] http://www.al-ansar.150m.com/.

[5] The Islamist website Al-Firdaws announced the establishment of this group (http://www.alfirdaws.org/vb/showthread.php?t=9944 ) but, to our knowledge, it has not launched its own website.

[6] http://www.al-jinan.org. The group’s self-proclaimed title is “Jihad Electroni: The Group Which Specializes in Attacking Israeli Websites and [Websites] Harmful to Islam.”

[7] http://www.mslamh.jeeran.com/.

[8] Electronic jihad groups also use the general Islamist forums to recruit participants for their enterprises.

[9] The name “Hilf Al-Muhajirin” is presumably derived from the name of the forum which launched the initiative (www.mohajroon.com ) and/or from the historical “Hilf Al-Muhajirin” pact which, according to Muslim tradition, was undertaken by the people who migrated with the Prophet Muhammad from Mecca to Medina in 622 CE.

[10] http://208.64.27.42/~taliban/vb/showthread.php?t=40391. It is noteworthy that the wording of the pledge of allegiance to the leader bears a strong resemblance to the wording that appears in various versions of the historical pledge of allegiance between the early Muslims and the Prophet Muhammad.

[11] http://www.al-jinan.org/jihad.htm.

[12] http://alfirdaws.org/vb/showthread.php?t=9944.

[13] This participant cited expatriate Syrian Salafi sheikh Abu Basir Al-Tartusi, who holds that, unlike a Muslim who invades the abode of unbelievers, a Muslim who dwells there and is granted protection (aman) by unbelievers must not steal property from the non-Muslims dwelling in this abode.

See http://www.altartosi.com/book/book03/index.html.

[14] http://www.al-jinan.org.

[15] http://www.al-ansar.150m.com/8.htm.

[16] http://www.al-jinan.org/jihad.htm ; see also http://www.al-ekhlaas.net/forum/showthread.php?t=35424 .

[17] E.g., www.meca-me.org ; http://www.mecalove4all.com/main.php, http://www.islameyat.com/.

[18] See MEMRI Special Dispatch No. 1330, “Islamist Website Calls to Disable German Websites Offensive to Islam,” October 20, 2006, http://memri.org/bin/articles.cgi?Page=subjects&Area=iwmp&ID=SP133006.

See also the forum at http://www.al-boraq.com/showthread.php?t=13896, in which a participant calls upon electronic jihadists to disable a site that defames the Koran in his opinion.

[19] http://www.mohajroon.com/vb/showthread.php?t=38360.

[20] http://www.alnusra.net/vb/showthread.php?t=6946.

[21] http://alfirdaws.org/vb/showthread.php?t=21318 .

[22] For examples of the mujhideen‘s use of viruses, see http://www.mohajroon.com/vb/showthread.php?t=21629 ; http://www.abualbokhary.info/vb3/showthread.php?t=13173.

[23] For the programs most frequently used by the mujahideen, see http://www.al-ansar.150m.com/5.htm.

[24] http://www.mohajroon.com/vb/showthread.php?t=38447.

[25] http://www.al-ansar.150m.com/3.htm.

[26] http://www.al-jinan.org/strategy.htm.

[27] http://alfirdaws.org/vb/showthread.php?t=18266.

[28] See MEMRI Special Report No. 1326, “Islamist Websites Monitor No. 9 – Mujahideen Gather Information on Anchorage International Airport,” October 18, 2006,

http://memri.org/bin/articles.cgi?Page=subjects&Area=iwmp&ID=SP132606.

[29] For more information on Irhabi 007′s activities and arrest, see: http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020.html. Note, however, that hacking a database for the sake of corrupting or stealing data requires greater technical expertise than hacking for the sake of uploading files or defacing a website’s front page.

[30] http://www.mohajroon.com/vb/showthread.php?t=42442.

[31] http://www.mohajroon.com/vb/showthread.php?t=38694.

[32] http://www.elshouraa.ws/vb/showthread.php?t=2635.

[33] http://www.abualbokhary.info/vb3/showthread.php?t=13173. For another example of the mujahideen‘s use of virus, see http://www.mohajroon.com/vb/showthread.php?t=21629.

[34] For examples of mujahideen sharing information and expertise on computer hacking, see

http://www.al-ekhlaas.net/forum/showthread.php?t=27154 ;

http://www.al-ekhlaas.net/forum/showthread.php?t=20305 ;

http://www.al-ekhlaas.net/forum/showthread.php?t=3468 ;

http://www.al-ekhlaas.net/forum/showthread.php?t=34679 ; http://www.abualbokhary.info/vb3/showthread.php?t=19813&highlight=%E6%D5%ED%C9.

[35] Gabriel Weimann, Terror on the Internet (Washington, 2006), pp. 156-157.

[36] http://www.cis.udel.edu/~sunshine/courses/F06/CIS664/class12.pdf ; http://archives.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/index.html.

Peace Process” is a “War Process” – Pipes

Peace Process” is a “War Process” – Pipes

By Daniel Pipes

My Testimony before the House Subcommittee on Israeli-Palestinian Negotiations

The Subcommittee on Middle East and South Asia of the U.S. House Committee on Foreign Affairs held a hearing on February 14, 2007, titled “Next Steps in Israeli-Palestinian Peace Process.” Three witnesses appeared before the subcommittee: Martin Indyk of the Brookings Institution, David Makovsky of the Washington Institute for Near East Policy, and myself. (A complete video of the hearing, nearly three hours long, can be seen on the committee website; the transcript is available on my website.) The Democrats chose Makovsky and Indyk, the Republicans chose me. Gary Ackerman is the chairman of the committee and Mike Pence the ranking minority member.

We three witnesses differ deeply in outlook on the topic of Palestinian-Israeli negotiations and our testimonies made those clear. Makovsky and Indyk endorsed the “peace process” while I likened it more to a “war process.” Makovsky and Indyk differed less widely among themselves but their differences were still clear, with Makovsky seeing the impact of the Mecca Accord in a distinctly more negative way than did Indyk.

But the three of us, I believe, share a concern for the security and welfare of Israel, that it remain a Jewish state. In brief, we are Zionists. Our disagreements concern tactics to achieve this goal.

Given that every poll over decades shows that an overwhelming majority of Americans agree with us, this would seem to be a banal position. But no longer. As a symptom, note the many vociferous attacks on the three of us being invited as witnesses, implying that there was something very amiss in not having anyone represent the eliminate-Israel position.

Daniel Pipes remarks:

    What I’d like to do is complement it by looking at what one might call the big picture.You asked in the title of this hearing, “Next Steps in the Israeli-Palestinian Peace Process.” I shall argue three points: First, the peace negotiations have so far been so counterproductive, they could better be called a war process; that their failure results from an Israeli conceptual error 15 years ago about the nature of warfare; and third, that the U.S. government should urge Jerusalem to forgo negotiations and instead return to its earlier policy of deterrence.

    So first, Mr. Chairman, to review the peace process.

    It is embarrassing to recall today the elation and expectations that accompanied the signing of the Oslo Accords in September 1993 when Prime Minister Yitzhak Rabin shook hands with Yasser Arafat. For some time after this, “The Handshake,” as it was known, served as a symbol of brilliant diplomacy, whereby each side achieved what it most wanted – — dignity and autonomy for the Palestinians; recognition and security for the Israelis.

    President Clinton lauded that deal as, quote, “a great occasion of history,” unquote. Yasser Arafat called it, quote, “An historic event, inaugurating a new epoch,” unquote. Shimon Peres, the prime minister of Israel, discerned in it, quote, “the outline of peace in the Middle East,” unquote.

    These heady expectations were then grievously disappointed. Before Oslo, when Palestinians still lived under Israeli control, they benefited from the rule of law and a growing economy independent of international welfare. They enjoyed functioning schools and hospitals; they traveled without checkpoints and had free access to Israeli territory. They even founded universities.

    Terrorism was declining as acceptance of Israel increased. However, then came Oslo, which brought Palestinians not peace but tyranny, failed institutions, poverty, corruption, a death cult, suicide factories, and Islamist radicalization.

    Yasser Arafat early on promised that the West Bank and Gaza would evolve into what he called, quote, “the Singapore of the Middle East,” unquote, but the reality that he shaped became a nightmare of dependence, inhumanity and loathing.

    As for the Israelis, for them Oslo brought unprecedented terrorism. If the two hands in the Rabin-Arafat handshake symbolize Oslo’s early hopes, it is the two bloody hands of a young Palestinian male who had just lynched Israeli reservists in Ramallah in October 2000 that represented its dismal end.

    Oslo provoked deep internal rifts and harmed Israel’s standing internationally. Israelis watched helplessly as Palestinian rage spiraled upwards, spawning such moral perversions as the United Nations World Conference against Racism in Durban in 2001. That rage also re-opened among Westerners the issue of Israel’s continued existence, especially on the hard left. From Israel’s perspective, seven years of Oslo diplomacy undid 45 years’ success in warfare.

    Palestinians and Israelis agree on little, but they concur that Oslo was a disaster.

    Now, why was it a disaster? Where did things to so badly wrong? Why did the war—the peace process turn into a war process? Where lay the flaws in promising—in so promising an agreement?

    Of its many errors—and I think all analysts will agree there are many—the ultimate mistake lay in Yitzhak Rabin’s misunderstanding of how a war ends. And it’s revealed in his catchphrase; what he said repeatedly: “One does not make war with one’s friends. One makes”—I’m sorry; do that again. “One does not make peace with one’s friends. One makes peace with one’s enemy.”

    The Israeli prime minister implied by this that wars concluded through a mix of goodwill, conciliation, concessions, mediation, flexibility, restraint, generosity and compromise, all topped off with signatures on official documents. In this spirit, his government initiated an array of concessions, hoping that the Palestinians would reciprocate, but they did not. Those concessions, in fact, made matters worse.

    Still in a war mode, Palestinians understood the Israeli efforts to “make peace” as signals, instead, of demoralization and of weakness. The concessions reduced Palestinian awe of Israel, made it appear vulnerable, and incited irredentist dreams of its annihilation. Each Oslo-negotiated gesture by Israel further exhilarated, radicalized, and mobilized the Palestinian body politic. The quiet hope of 1993 to eliminate Israel gained traction, becoming a deafening demand by the year 2000.

    Rabin ensured—made a shattering mistake, which his successors then repeated. One does not in fact make peace with one’s enemy; one makes peace with one’s former enemy—former enemy. Peace nearly always requires one side in a conflict to give up its goals by being defeated. Rather than vainly trying to close down a war through goodwill, the way to end a war, Mr. Chairman, is by winning it.

    “War is an act of violence to compel the enemy to fulfill our will.” That’s what the Prussian strategist Carl von Clausewitz wrote in 1832. War is an act of violence to compel the enemy to fulfill our will. And however much technological advancement there’s been in the nearly two centuries since he wrote that, the basic insight remains valid. Victory consists of imposing one’s will on the enemy by compelling him to give up his war goals. Wars usually end when one side gives up its hope of winning; when its will to fight has been crushed.

    Arabs and Israelis since 1948 have pursued static and binary goals. Arabs have fought to eliminate Israel; Israelis have fought to win their neighbors’ acceptance. The details have varied over the decades, with multiple ideologies, strategies, leading actors and so forth, but the goals have barely changed. The Arabs have pursued their war aims with patience, determination and purpose. In response, Israelis sustained a formidable record of strategic vision and tactical brilliance in the period 1948 to 1993.

    Over time, however, as Israel developed into a vibrant, modern, democratic country, its populace grew impatient with the humiliating, slow, tedious task of convincing Arabs to accept their political existence. By now, almost no one in Israel sees victory as the goal; no major political figure on the scene today calls for victory in war. Since 1993, in brief, Mr. Chairman, the Arabs have sought victory while Israelis have sought compromise.

    It is my view that he who does not win loses. To survive, Israelis must eventually return to the 1990 — pre-1993 — policy of establishing that Israel is strong, tough and permanent, the policy of deterrence. The long, boring, difficult, bitter and expensive task of convincing Palestinians and others that the Jewish state is permanent and that dreams of eliminating it are doomed.

    This will not be quick or easy. Perceptions of Israel’s weakness due to terrible missteps during the Oslo years and even after, such as the Gaza withdrawal of 2005, have sunk into Palestinian consciousness and will presumably require decades of effort to reverse. Nor will it be pretty. Defeat in war typically entails experiencing the bitter crucible of deprivation, failure and despair.

    I look at this process, Mr. Chairman, through a simple prism. Any development that encourages Palestinians to think they can eliminate Israel is negative; any development that encourages them to give up that goal is positive. The Palestinians’ defeat will be recognizable when, over a protracted period and with complete consistency, they prove that they have accepted Israel.

    My third and final point: American policy.

    Like all outsiders to the conflict, Americans face a stark choice. Do we endorse the Palestinian goal of eliminating Israel, or do we endorse the Israeli goal of winning its neighbors’ acceptance?

    To state this choice is to make clear that there is no choice—the first is offensive in intent; the second defensive. No decent person can endorse the Palestinians’ goal of eliminating their neighbor, and along with every president since Harry S Truman and every congressional resolution and vote since then, the 110th Congress must continue to stand with Israel in its drive to win its acceptance.

    Not only is this an obvious moral choice, but I think it’s important to add that a Palestinian defeat at Israel’s hands is actually the best thing that had ever happened to them. Compelling Palestinians finally to give up on their foul, irredentist dream would liberate them to focus on their own polity, economy, society and culture.

    Palestinians need to experience the certitude of defeat to become a normal people—one where parents stop celebrating their children becoming suicide terrorists; where something matters beyond the evil obsession of anti-Zionist rejectionism. Americans especially need to understand Israel’s predicament and help it win its war, for the U.S. government has, obviously, a vital role in this theater.

    My analysis implies a radically different approach for the Bush administration, and for this Congress.

    On the negative side, it implies that Palestinians must be led to understand that benefits will flow only after they prove their acceptance of Israel. Until then, no diplomacy, no discussion of final status, no recognition as a state and certainly no financial aid or weapons.

    On the positive side, the administration and Congress should work with Israel, the Arab states and others to induce the Palestinians to accept Israel’s existence by convincing them the gig is up—the gig is up—that they have lost.

    Diplomacy aiming to shut down the Arab-Israeli conflict is premature until Palestinians give up their hideous anti-Zionist obsession. When that moment arrives, negotiations can re-open with the issues of the 1990s—borders, resources, armaments, sanctities, residential rights—taken up anew. But that moment is years or decades away. In the meantime, a war needs to be won.

[Pipes still holds to his opinion that the Palestinians need to suffer “utter defeat”. Good for him.]

Can a good Muslin become a good American or Canadian?

Can a good Muslin become a good American or Canadian?

I received this email:

I sent that question to a friend who worked in Saudi Arabia for 20 years. The following is his reply:

    Theologically – no. Because his allegiance is to Allah, the moon god of Arabia.Religiously - no. Because no other religion is accepted by his Allah except Islam (Quran, 2:256).

    Scripturally – no. Because his allegiance is to the five pillars of Islam and the Quran (Koran).

    Geographically - no. Because his allegiance is to Mecca, to which he turns in prayer five times a day.

    Socially - no. Because his allegiance to Islam forbids him to make friends with Christians or Jews.

    Politically – no. Because he must submit to the mullah (spiritual leaders), who teach annihilation of Israel and Destruction of America, the great Satan.

    Domestically - no. Because he is instructed to marry four women and beat and scourge his wife when she disobeys him (Quran 4:34).

    Intellectually – no. Because he cannot accept the American Constitution since it is based on Biblical principles and he believes the Bible to be corrupt.

    Philosophically – no. Because Islam, Muhammad, and the Quran do not allow freedom of religion and __expression. Democracy and Islam cannot co-exist.Every Muslim government is either dictatorial or autocratic.

    Spiritually – no. Because when we declare “one nation under God,” the Christian’s God is loving and kind, while Allah is NEVER referred to as heavenly father, nor is he ever called love in The Quran’s 99 excellent names.

Therefore after much study and deliberation….perhaps we should be very suspicious of ALL MUSLIMS in this country. They obviously cannot be both “good” Muslims and good Americans or Canadians.

Follow

Get every new post delivered to your Inbox.

Join 55 other followers