Also, I note that just last night, 8 ISIS-affiliated terrorists were arrested in a mass roll-up in the cities of Los Angeles, New York, and Philadelphia. All of them were ethnic Tajiks from Tajikistan, and all were affiliated with "ISIS-K", also known as "ISIS in Khorasan".
All of them had infiltrated via the southern border owing to the BidenHarris policy of non-enforcement of US borders. All of them had been here a year or less.
They got rolled up because they were dumb enough to use the telephone to discuss making bombs.
If 8 have been caught in a single evening, how many more are here? How many of those are bright enough to follow ISIS OPSEC guidelines and NOT discuss attacks over clear phone lines?
I actually have a copy of the ISIS encryption software package. None of it is original - it's just cobbled together from other primary sources - but it would appear to be very effective at what it is intended to do, if used according to their guidelines. There was a version released into the wild that the NSA had built a back door into after they intercepted the software, but there is no way of knowing what percentage of the software out there has been infected. If security guidelines are followed, then there is every reason to believe that not all of the software packages in use were infected.
We may not see the next attack coming due to that encryption and OPSEC, so why are we allowing them free passage to get in in the first place? To my way of thinking, one of the best ways to prevent them from attacking here would be to simply not allow them into the US in the first place. They can't attack places where they are not there to attack, eh?
.
All of them had infiltrated via the southern border owing to the BidenHarris policy of non-enforcement of US borders. All of them had been here a year or less.
They got rolled up because they were dumb enough to use the telephone to discuss making bombs.
If 8 have been caught in a single evening, how many more are here? How many of those are bright enough to follow ISIS OPSEC guidelines and NOT discuss attacks over clear phone lines?
I actually have a copy of the ISIS encryption software package. None of it is original - it's just cobbled together from other primary sources - but it would appear to be very effective at what it is intended to do, if used according to their guidelines. There was a version released into the wild that the NSA had built a back door into after they intercepted the software, but there is no way of knowing what percentage of the software out there has been infected. If security guidelines are followed, then there is every reason to believe that not all of the software packages in use were infected.
We may not see the next attack coming due to that encryption and OPSEC, so why are we allowing them free passage to get in in the first place? To my way of thinking, one of the best ways to prevent them from attacking here would be to simply not allow them into the US in the first place. They can't attack places where they are not there to attack, eh?
.