Hi Gang:
Earlier today, Sunday, December 6, 2015 I was interviewed by Tucker Carlson on Fox & Friends on the way that Tashfeen Malik, one of the two terrorists who carried out the worst terror attack in the United States since the attacks of 9/11 was able to enter the United States.
Why was it so easy for Tashfeen Malik to enter the US?
Dec. 06, 2015 – 3:23 – Retired senior special agent for INS talks need for stronger vetting on ‘Fox & Friends’
This report focused specifically on the ability of the terrorists to travel around the world, enter the United States and ultimately embed themselves in the United States as they went about their deadly preparations.
Page 54 contained this excerpt under the title “3.2 Terrorist Travel Tactics by Plot”-
Although there is evidence that some land and sea border entries (of terrorists) without inspection occurred, these conspirators mainly subverted the legal entry system by entering at airports.
In doing so, they relied on a wide variety of fraudulent documents, on aliases, and on government corruption. Because terrorist operations were not suicide missions in the early to mid-1990s, once in the United States terrorists and their supporters tried to get legal immigration status that would permit them to remain here, primarily by committing serial, or repeated, immigration fraud, by claiming political asylum, and by marrying Americans. Many of these tactics would remain largely unchanged and undetected throughout the 1990s and up to the 9/11 attack.
Thus, abuse of the immigration system and a lack of interior immigration enforcement were unwittingly working together to support terrorist activity. It would remain largely unknown, since no agency of the United States government analyzed terrorist travel patterns until after 9/11. This lack of attention meant that critical opportunities to disrupt terrorist travel and, therefore, deadly terrorist operations were missed.
Immigration and Terrorism – It’s About More Than Vetting Refugees
October 20, 2015 FrontPage Magazine published my article: