Miscellaneous Topics, National Security

RNSK Vol I, Edition 7

August 9, 2021

 

A Tale of Two “Skits”

 

It has been a wild ride in America since March 2020 when the COVID-19 pandemic hit.  No one I’ve spoken to can recall a time when there was so much unrest in society.  Even all the unrest in the 1960s related to civil rights, the Cold War, and the Vietnam War, pale in comparison to 2020.  In 2020-2021, we’ve had police brutality, rioting, extensive destruction of government & personal property, multiple crime waves, subversion, racism, inner-city murders on an unprecedented scale, assault & battery in broad daylight, and hate crimes of every type.  In fact, who would have thought that one of the most security-conscious environments, passenger airliners, would see so many on-board fights & unruly passengers?  It was a chaotic year that surprised and disturbed most of us.  I saw things that I never dreamed I would see in my lifetime.

Back in 1970 I was a junior in high school.  I had always been interested in the behind-the-scenes stuff that it took to make movies & T.V. shows.  So, I took an elective that year in school called “Technical Theater.”  We learned all about building sets, lighting, filming, script supervision, etc.  The Technical Theater class served as the production crew for any school plays or concerts.

One day we were gathered in the school’s theater waiting for a beginner’s acting class to finish before we could start some set construction.  The beginners were doing improvised, satirical skits, so we casually watched the last two.

In the first skit the teens all lined-up facing the audience.  When the teacher called, “action,” the students all started acting like little kids who were standing in a line.  They fidgeted, whispered to each other, and jabbed elbows into their neighbor.  Typical little kids with ants-in-their-pants.  One kid took a step forward and said, “the first grade class of Mary Louise Phillips Elementary School will now say the Pledge of Allegiance to the Flag.” The kid got back in line and told the others, “right hand over your heart, ready…begin…”

As they started to say the pledge, some elbowing got out of hand and two boys shoved each other.  Finally, one of them was knocked to the ground, and the other kid kicked him.  At this point the Pledge stopped, and all of the kids in the line ran up to the kid on the ground.  Rather than helping him up, they jumped-in with the bully who started it, and pretended to give this kid a class “A” beat-down!  When they were done, they got back in line.  The kid on the ground was now “dead.”  After the kids were lined-up again, they cleared their throats and said “…with liberty and justice for all.”

It was supposed to be satirical and we all chuckled mildly.  At the time I thought, “well, that was pretty far-fetched…ha!…like that would ever happen in real life.”

The second skit had the students laying on the stage as if they were relaxing under some trees in the park.  One kid declared, “it’s a nice day.”  Another said rather laconically, “yep, it’s a nice day.”  A third kid apparently thought the second kid was being mockingly sarcastic, so he ran over to the second one and loudly yelled in his face, IT’S A NICE DAY!!!”  The rest of the kids started chanting, “it’s a nice day…it’s a nice day…it’s a nice day,” as they closed-in on the second kid.  The second kid tried to leave, but the group shoved him to the ground and beat the living daylights out of him!  Once the second kid acted like he was knocked-out, the others laid down to relax on the grass again.  The very first kid who made the nice day comment piped-up and said, “you know, it REALLY is a nice day.”

Hmmm…So, what is the tale of the two skits?  In a Vietnam Era, American high school, I saw two skits with ridiculously weird outcomes.  There’s no way that either scenario could occur in real life, right?  A group of ordinary people could never be so unbalanced that they would assault another person for no apparent reason.  I held this belief over the past 50 years; there was NO tale to tell about the two skits…they were just part of a scriptwriter’s imagination.

Then 2020 came around and changed how I felt about the Tale of the Two Skits.  The screwy circumstances in the skits were no longer implausible.  We are in an era of contempt by many toward our national symbols…The Pledge of Allegiance, The National Anthem, and the U.S. Flag.  And the contempt for these symbols has now transcended the average citizen to public institutions and elected officials.  What used to be symbols of unity, are now lightning rods of divisiveness.

What about the kids in the first skit symbolizing what is normally a benign gathering…saying the Pledge of Allegiance?  Kids and adults will both act out sometimes, and the level of behavior used to be more commensurate to the situation.  We were taught that if you need to argue, do it behind closed doors, or take it outside if it is really heated.  Nowadays people seem determined that whatever might occur between two people is not taken off-line; it is going down right where they stand in the grocery line, in the bleachers at a ball game, or a local park while kids play on the nearby jungle gym.  What used to be two people discussing differing viewpoints, is now an open disagreement.  An open disagreement is now a serious argument.  A serious argument is now a shoving match.  A shoving match is now physical assault.  Physical assault is now battery with the intent to do serious physical harm.  The intent to do serious physical harm has now escalated into the use of weapons for defensive self-protection.  And finally, defensively brandishing a weapon to break-free from a fight is now using a weapon to permanently stop an altercation with someone, by killing them.

In the second skit, the teenager who took exception to what the second kid said, did so by simply reacting and immediately passing judgment.  No wisdom or discernment was applied…just react and judge.  American society is experiencing an unprecedented wave of public reaction & judgment.  Wisdom, discernment and cooler heads prevailing, seems lacking in 2020 America.

In today’s world, the Tale of Two Skits from 50 years ago would still be considered satirical.  But, do the two scenarios, or something similar, still seem like an absurd piece of fiction in 2021?  The underlying human behavior (not actual school kids or teens in a park) and the outcomes seem quite plausible to me.  If the American Dream could be compared to a sunny day, I would say the sun is still there…it just does not rise as high as it used to.

I feel certain that someday American society will exceed the fiction of The Tale of Two Skits…sigh…

Ciao,

Steve Miller, IAPWE – Certified & Member
Managing Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@millermgmtsys.com

Standard
Military Operations, History & Cyber Warfare, National Security, Weapon Systems

RNSK Vol I, Edition 6

September 29, 2020

America’s Strategic Reserves-Part I

IMG_0756   photo courtesy of the Defense Logistics Agency 

Introduction

During the recent COVID-19 Pandemic, there was much discussion about the materials, products and equipment contained in the Strategic National Stockpile (SNS).  People wondered what was in the SNS, who decided what to put into it,  how much is stored in it, where the SNS is located, the policies & procedures for replenishing it, and the logistics for accessing the stockpile for use.  It seems appropriate at this time to educate everyone about America’s strategic reserves.  The fact is: there is more than one type of reserve stockpile, with different governing statutes for each one of them.  These four reserves are in chronological order, with the longest tenured reserve listed first:

  • The National Defense Stockpile (DNS)
  • The Strategic Petroleum Reserve (SPR)
  • The Strategic National Stockpile (SNS)
  • The National Veterinary Stockpile (NVS)

The Strategic National Stockpile is the program that has been so heavily covered by the news media throughout the COVID-19 Pandemic.  For purposes of our discussion here, the National Defense Stockpile will be discussed first.  The NDS came into existence 35 years before the Strategic Petroleum Reserve; much of the institutional learning, best practices, and the do’s & don’ts of managing such a huge undertaking, became the blueprint for the three follow-on programs.  The DNS will be discussed first to set the table.  Subsequent editions of the RNSK will cover each stockpile type separately.

The National Defense Stockpile (NDS)

The NDS first came into being in 1939 when the U.S. Congress passed the Strategic and Critical Materials Stock Piling Act.  President Franklin D. Roosevelt pressed for the law, but, it was no easy feat.  Starting in 1934, and continuing through 1939, Congress passed a series of increasingly stringent neutrality laws.  The laws were intended to minimize the chance of America getting dragged into another foreign war, such as World War I.  The possibility of another large scale conflict was a legitimate concern throughout the 1930s.  When the first neutrality law was passed in 1934, Hitler and the Nazis had been in power over a year, and Japan had invaded and occupied the northern region of China, known as Manchuria, in 1931.  When President Roosevelt championed the Stock Piling Act, many members of Congress thought it was just another indication of the country heading to war.  Fortunately, there were enough Senators and Representatives who recognized the need to stockpile critical resources, regardless of any future war, and got the stockpile law passed.

The NDS statutes are contained in Title 50, Chapter 98, United States Code, and have been amended from time-to-time.  The law provides for the acquisition and retention of certain strategic and critical materials to reduce and mitigate U.S. dependence on foreign sources or single points of failure in the strategic materials supply chain in times of national emergency. These materials are purchased and stored, forming what is known as the National Defense Stockpile.

The NDS Manager is the Secretary of Defense, however, he does not manage the stockpile directly.  The NDS falls under the Assistant Secretary of Defense for Sustainment. The actual managing organization is the Defense Logistics Agency, led by a three-star Admiral or General, in Ft. Belvoir, VA.  A civil service manager runs the Strategic Materials Directorate, also at Ft. Belvoir.  In addition to the noted Defense Department organization just discussed, Title 50, Chapter 98, USC, also assigns certain limited duties to the Interior Department and the Agriculture Department.  Although the Defense Department manages the actual stockpile operations, and is charged with acquiring the designated strategic materials listed in the statutes, the other two executive departments have NDS duties related to the research, development and contingency plans of domestic sources of supply.  For example, the Interior Department’s U.S. Geological Survey is responsible for strategic preparedness in a national emergency for various NDS metals and minerals that can be exploited domestically.  Similarly, the Agriculture Department utilizes its Agricultural Research Service and U.S. Forest Service to conduct R&D and contingency plans to capitalize on agricultural products that could be diverted for alternative uses to supplement possible NDS shortfalls in a national emergency.

The List of NDS Strategic Materials

The NDS statutes currently list 64 strategic materials in four major categories: Compounds, Metals, Non-Metals, and Rare Earth Elements.  As a point of clarification, Rare Earth Elements are often mistaken for precious metals, such as gold, silver and platinum, assuming a high value metal is synonymous with the term “Rare.”  In actuality, “Rare Earth” refers to the fact that these elements are “rarely” found in nature in their pure form; they are mixed-in with other kinds of ore, making the mining and pure element extraction process difficult and expensive.  The list of materials below are managed directly by the NDS at their several depot locations.

Aluminum (Al/13) Graphite/Carbon (C/6) Quartz Crystal
Antimony (Sb/51) Hafnium (Hf/72) Rhenium (Re/75)
Arsenic (As/33) Holmium (Ho/67) Samarium (Sm/62)
Barium Sulfate (BaSO4) Indium (In/49) Scandium (Sc/21)
Beryllium (Be/4) Iridium (Ir/77) Selenium (Se/34)
Bismuth (Bi/83) Lanthanum (La/57) Silicon (Si/14)
Boron (B/5) Lead (Pb/82) Strontium (Sr/38)
Cadmium (Cd/48) Lithium (Li/3) Tantalum (Ta/73)
Calcium Fluoride (CaF2) Lutetium (Lu/71) Tellurium (Te/52)
Cerium (Ce/58) Magnesium (Mg/12) Terbium (Tb/65)
Chromium (Cr/24) Manganese (Mn/25) Thulium (Tm/69)
Cobalt (Co/27) Mercury (Hg/80) Tin (Sn/50)
Copper (Cu/29) Molybdenum (Mo/42) Titanium (Ti/22)
Dysprosium (Dy/66) Neodymium (Nd/60) Tungsten (W/74)
Erbium (Er/68) Nickel (Ni/28) Vanadium (V/23)
Europium (Eu/63) Niobium (Nb/41) Ytterbium (Yb/70)
Gadolinium (Gd/64) Palladium (Pd/46) Yttrium (Y/39)
Gallium (Ga/31) Platinum (Pt/78) Zinc (Zn/30)
Germanium (Ge/32) Praseodymium (Pr/59) Zirconium (Zr/40)

The following seven materials are managed directly by the Interior Department on behalf of the NDS.

Cesium (Cs/55)
Helium (He/2)
Natural Rubber
Potash (potassium compounds)
Rubidium (Rb/37)
Silver (Ag/47)
Uranium (U/92)

The NDS Management Process & Locations

NDS materials are stored at 6 locations throughout the U.S. and have a current market value of approximately $1.1 billion.  These material depots are located on U.S. Government property managed by the Defense Logistics Agency, and are used for many other DoD programs, including equipment repair & storage, weapons & munitions magazines, surplus equipment disposal, and others.  Although the NDS does not publicly disclose how much material they have on-hand, or what is stored in each location, there is no need to make their whereabouts classified information.  The NDS depots are already located on heavily guarded military installations, and even if a major theft were to occur, the items in storage are industrial grade materials that would be extremely difficult to sell on the black market without getting caught.  All six depots are extremely large, multi-building installations that are located well inside the country’s international boundaries.  An enemy attack by air or ground forces would be a high risk, one-way mission by those involved.  Since individual NDS materials are each stored at multiple locations, it would be nearly impossible to launch six massive raids in a coordinated, simultaneous attack.  About the only way an adversary could deliver a knockout blow to the NDS would be by nuclear weapons at all six depots at once.  It would be no easy task.

Locations

  • Hammond, IN
  • Hawthorne, NV
  • Lordstown, OH
  • Pt. Pleasant, WV
  • Scotia, NY
  • Wenden, AZ

Historical Perspective of the National Defense Stockpile

The average person, American or otherwise, has only a cursory understanding of the depths and implications of a worldwide war, such as World War I from 1914-1918, and World War II from 1939-1945.  Wars conducted since 1945 have all been regionalized, and primarily affected just the engaged belligerent nations.  In terms of economic impact, human sacrifice and other privations of war, the most seriously affected are the nations where the heaviest combat operations occurred.  For belligerents in a regional conflict who had no actual combat operations on their own soil, such as the United States during the Vietnam War, daily life at home was virtually unaffected for 95% of the population.

Global warfare, however, is much different.  It is not just a clash of opposing military forces, but, creates hardships and sacrifice in all walks of life.  As the name implies, global warfare has few geographic, economic, or human boundaries…all aspects of global life are “fair game.”

In most wars, global or regional, they begin with a clash of military forces from opposing sides.  Naval warships are attacked and possibly sunk; military aircraft bomb adversary forces and installations; adversaries shoot down each other’s planes, and adversary armies engage each other.  These force-on-force confrontations, known as tactical warfare, are what the average person thinks of in terms of what war is.

But, when wars spread into other countries, become protracted, and consume ever greater amounts of manpower and materials, tactical warfare becomes less able to bring victory to one adversary versus another.  At this point both sides continue to engage in tactical warfare to essentially keep the pressure on, but, now strategic warfare enters the picture.  The essence of strategic warfare is to disable an adversary’s means and will to wage war.  This can take many forms, including: information warfare, espionage, sabotage, clandestine intelligence operations, infrastructure destruction, and commerce or trade warfare.  The NDS’s primary role is to deter or mitigate an adversary’s efforts to disrupt commerce by denying the U.S.’s ability to obtain the raw materials necessary to wage war.

In both world wars, after the opening rounds of force-on-force combat engagements on the sea, in the air, and on the ground, the major combatants began commerce warfare.  This was most evident in the Atlantic Ocean where submarines of the German Kreigsmarine waged unrestricted warfare on all Allied merchant shipping.  Submarines of the American Navy waged unrestricted submarine warfare in the Pacific Ocean on all Japanese merchant shipping.  By the end of the war, American submarines had destroyed or sunk 75% of all Japanese merchant vessels.  This choked-off Japan’s ability to obtain oil, rubber, and many critical metals needed to produce aircraft, ships and weapons.  The NDS program is designed to counter the effects of strategic commerce warfare stemming from a major military conflict, or an embargo imposed by an unfriendly nation.  The United States uses embargoes and sanctions against certain countries quite effectively.  This is especially true when a country does not have a robust strategic national stockpile program that covers multiple categories of raw material, oil, equipment, medical supplies, etc.

Implications of Commerce Warfare, Embargoes and Sanctions in 2020

In today’s terms, the United Nations Conference on Trade and Development (UNCTAD) estimates that roughly 80 percent of all global trade – by rail, truck, ship and plane – is transported by sea. Of the total global trade volume by all means, 34% of it passes through the South China Sea by ship!

south-china-sea

Country % Share of World GDP Trade Value through South China Sea (USD billions) South China Sea Trade As % of All Trade in Goods
United States 24.5 208 5.72
China 14.8 1470 39.5

The United States and China represent the two largest shares of the world’s total Gross Domestic Product (GDP).  Of the top 10 countries with goods transiting the South China Sea, nearly 40% of Chinese goods transported by all means moves by ship through the South China Sea.  By comparison, India and Brazil at 30% & 23%, respectively, are the next highest behind China.  Of the other top 10 South China Sea users, The United States is ninth, and Canada is tenth at less than 3%.  The vast majority of ocean trade bound for the United States heads directly into the Pacific Ocean bound for Seattle/Tacoma, San Francisco Bay or Los Angeles/Long Beach.

It is quite clear that the South China Sea is a critical trade route for China.  Most traffic takes the shortest route through the Malacca Straight between Indonesia and Malaysia.  Alternative routes are not only more expensive and time consuming, but, also pose a greater security risk for China.  This is why China has spent the past 15+ years claiming islands and building military bases in the South China Sea.  These moves have been heavily disputed in international court by Vietnam, The Philippines and Taiwan.  Thus far, court cases have ruled against China, but, they refuse to recognize these decisions.  The United States’ strategic partnering with The Philippines and Vietnam has taken on greater importance in the past decade.  The U.S. Navy continues to sail its ships through the South China Sea based on freedom of navigation under international maritime law.  China heavily disputes America’s presence.  Strategic military analysts have stated for nearly 20 years that if a large scale war was to break out somewhere, it would likely be in the South China Sea.  This situation has led to China’s massive shipbuilding program, putting its Navy on a par with the U.S. Navy in terms of the number of vessels.

Analyzing the Most Critical NDS Materials

Whereas, China’s greatest strategic concern is the risk of moving materials through the South China Sea, America’s risks are more diverse.  Some of the risk stems from large coastlines on three major oceans, and many critical NDS materials are not easily sourced in the U.S.  The NDS sources a number of critical materials from countries such as China, and some of the less stable third-world countries in Asia and Africa.  Any of these states could experience a supply chain disruption due to political instability, military actions, or disagreements over trade.  In most cases the NDS has sourcing alternatives in-place for the more risky material acquisitions. The following list of materials are some of the most challenging in terms of acquiring sufficient quantities for emergency stockpile use.

  • Barium Sulfate (BaSO4)  More than 90% of this compound sold in the US is used as a weighting agent in fluids used in the drilling of oil and natural gas wells.  Substitute materials have thus far not been commercially viable. Although Barium Sulfate resources exist in the U.S., they have never been commercially developed.  The greatest risk with this material is that everything is imported from four major sources, with China being number one at 58%, and then India, 17%; Morocco, 12%; Mexico, 11%.
  • Cadmium (Cd/48)   Cadmium is generally recovered from zinc ores, and most of the world’s primary cadmium metal is produced in Asia, and leading global producers are China, the Republic of Korea, and Japan. The U.S. has negligible Cadmium resources and imports come from: China, 25%; Australia, 22%; Canada, 21%; Peru, 10%; and other, 22%.
  • Cesium (Cs/55)   The metal ignites spontaneously in the presence of air and reacts explosively in water. Because of this reactivity, cesium is classed as a hazardous material and must be stored and transported in isolation from possible reactants. The U.S. only uses a 6,000-7,000 lbs of cesium per year. There are no domestic sources of cesium, so everything is imported.  The NDS does not publish cesium import statistics, but, Canada is believed to be the primary supplier.  Cesium is an uncommon element that can be mined in only a few places in the world.  Canada accounts for more than two-thirds of world reserves.
  • Gallium (Ga/31)   Gallium is used primarily in integrated circuits (cell phones, especially smart phones, wireless internet); optoelectronic devices (laser diodes, LEDs, photo-detectors, and solar cells).  Gallium-based ICs are used in many defense-related electronics, and no effective substitutes exist for Gallium in these applications. It is not produced in the U.S., and demand is satisfied solely by imports from China, 50%; United Kingdom, 18%; Germany, 10%; Ukraine, 9%; and several lesser sources.  China’s Gallium resources, and the U.S.’s lack of resources, poses a national security risk to the United States.
  • Tungsten (W/74)  Tungsten is a heavy, hard metal that is stronger than any other known element.  It is very expensive, and due to its mechanical properties it is used in wear-resistant alloys, in nickel super-alloys for high-temperature sections of jet engines, armor penetrating projectiles, aircraft weights and counterweights, and small arms ammunition. China ranks first in the world in terms of tungsten resources and reserves and has some of the largest deposits. Canada, Kazakhstan, Russia, and the U.S. also have significant tungsten resources.  The U.S., however, has not had an operating tungsten mine since 2015.  All tungsten is imported from the following countries: China, 31%; Bolivia, 10%; Germany, 9%; Spain, 6%; and all others, 44%.
  • Arsenic (As/33)  When the average person hears the word “arsenic,” their first thought is, “oh, that’s a poison.”  It is a fact that arsenic is used in pesticides and herbicides.  In terms of being a critical NDS material, however, arsenic has a very important usage in the production of Gallium-Arsenide (GaAs) semiconductors for solar cells, space research, and telecommunications.  It is also used for specialty optical products, and in electronic components for short-wave infrared technology.  Many defense-related electronic products would be hard pressed to meet their performance specifications without GaAs components.  Arsenic is rarely found as a pure element, and is often found in copper, gold and lead deposits.  When these metals are refined into their purest form, the by-product is set aside for further extraction of any remaining elements, like arsenic, if economically feasible.  The easiest ore to recover arsenic from is arsenic trioxide, but, it has only been found in China and Morocco. Morocco does not have the ability to refine the material, so, they sell it for export.  Several other countries have arsenic refining capability.  China, on the other hand, has an extensive arsenic trioxide refining capacity, and accounts for 93% of refined arsenic sold worldwide.  This poses a national security threat to the U.S. because the other countries that can refine arsenic have only a small fraction of China’s processing capacity.  The US is 100% import reliant for its arsenic needs.
  • Germanium (Ge/32)  Germanium is mainly a byproduct of zinc ore processing. Germanium is a semiconductor, with electrical properties between those of a metal and an insulator.  Other than electronic components, germanium is used in telecommunication fiber optics, lenses for infrared (IR) devices in military applications, and solar cells.  Fiber-optic cable manufacturing accounts for about one-third of global germanium consumption.  Although China remains the leading global producer of germanium, the U.S. has substantial reserves of recoverable germanium contained in zinc deposits in Alaska and Tennessee. The U.S. imports refined germanium from the following countries: China, 59%; Belgium, 22%; Germany, 9%; Russia, 7%; and others, 3%.
  • Rare earth elements – Cerium (Ce/58), Dysprosium (Dy/66), Erbium (Er/68), Europium (Eu/63), Gadolinium (Gd/64), Holmium (Ho/67), Lanthanum (La/57), Lutetium (Lu/71), Neodymium (Nd/60), Praseodymium (Pr/59), Scandium (Sc/21), Terbium (Tb/65), Thulium (Tm/69), Ytterbium (Yb/70), and Yttrium (Y/39).  Rare earths are relatively abundant in the Earth’s crust, but minable concentrations are less common than for most other ores.  Nearly all countries have rare earth elements, but, because extraction and processing costs are high, most countries do not invest their time or money to develop the industry.  China accounts for 80% rare earth materials mined and sold worldwide.  Other producers include: Estonia, Japan, Malaysia, Brazil, Australia, and India.  The U.S. has not made much effort to mine and produce rare earth materials on its own; they are 100% reliant on imports.  The estimated distribution of rare earths by end use are as follows: catalysts, 75%; metallurgical applications and alloys, 5%; ceramics and glass, 5%; polishing, 5%; and others, 10%.

Wrapping It Up

The Congress of the United States has authorized the NDS to sell commodities that are excess to Department of Defense needs.  Sales of excess NDS materials produce revenue for the Treasury General Fund and a variety of defense programs such as the Foreign Military Sales program, military personnel benefits, and the buy-back of broadband frequencies for military use. The sales revenue also funds NDS operations to make it a self-sustaining organization.  Because of the broad portfolio of materials held by the NDS, there is no private sector company in the world that sells this wide range of commodities and materials.

Approximately 35% of the 64 types of material held by the NDS are traded on the open commodities markets.  Examples include copper traded on the London Metals Exchange, platinum traded on the New York Mercantile Exchange, and rubber on the Tokyo Commodities Exchange.  Because the NDS purchases these traded commodities in such high volume, they buy them directly from the exchanges, and not from individual private sector companies or sellers.  This means NDS staff members involved in these transactions have to hold commodities broker licenses.

Since the NDS is a U.S. Government agency, everything they buy and sell is done via announced solicitations.  This allows qualified contractors to submit sealed bids for the purchase of commodities from the NDS.  In October 2019, for example, the NDS announced that at various dates to be determined in FY2020, there may be potential sales of the following materials from NDS inventory: Beryllium, Chromium, Germanium Scrap, Manganese, Nickel Alloys, Platinum, Iridium, Tantalum Carbide Powder, Titanium Based Alloys,  Tungsten Metal Powder, and Zinc.  The October 2019 announcement also indicated the maximum amount the NDS planned to sell of each material.

The NDS also announces every October their potential fiscal year material purchases and the maximum amount they might buy.  The FY2020 potential purchases included: Antimony, Boron, Carbon Fiber, Cerium, Cadmium Zinc Tellurium (CZT), Electrolytic Manganese, Lanthanum, various explosives, Silicon Carbide Fibers, Tantalum, Tin, and Tungsten-Rhenium Alloy.

Aside from the buying, selling and storage of strategic and critical materials, NDS staff members also hold top secret security clearances for the work they do.  Part of their job is to analyze open source intelligence, as well as, clandestinely collected intelligence, so, they can stay ahead of any developing issues that could constrain American access to materials contained in the NDS.  For example, Indonesia is the largest seller of rubber to the United States.  If there was a movement afoot to nationalize the rubber industry by the Indonesian government, this could disrupt the supply chain and impact DoD requirements for rubber.  The NDS may determine the situation in Indonesia requires implementing a contingency plan to protect America’s supply chain of rubber.

Ciao,

Steve Miller, IAPWE – Certified & Member
Managing Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@millermgmtsys.com

Photo by Pixabay on Pexels.com
Standard
Foreign Policy Research & Analysis, Intelligence Collection, Analysis & Estimates, National Security, Terrorism Information

RNSK Vol I, Edition 5

September 3, 2020

Transnational Organized Crime: What Makes It An American National Security Interest?  

NGO: Transnational Organized Crime Groups Make US$ 2.2 trillion a Year   photo courtesy of Global Financial Integrity

Introduction

The expanding size, scope, and influence of transnational organized crime and its impact on U.S. and international security and governance represents one of the most important challenges to nearly every country. During the past 20 years, technological innovation and globalization have proven to be an overwhelming force for good. However, transnational criminal organizations have taken advantage of our increasingly interconnected world to expand their illicit enterprises.

Threat Risks From Transnational Organized Crime

• Penetration of Foreign Government Institutions, Corruption, and Threats to Their Governance. Developing countries with weak rule of law can be particularly susceptible to Transnational Organized Crime (TOC) penetration. TOC penetration of states is deepening, leading to co-option in a few cases and further weakening of governance in many others. The apparent growing nexus in some states among TOC groups and elements of government—including intelligence services—and high-level business figures represents a significant threat to economic growth and democratic institutions.

• Threats to the Economy, U.S. Competitiveness, and Strategic Markets. Transnational Organized Crime threatens U.S. economic interests and can cause significant damage to the world financial system through its subversion, exploitation, and distortion of legitimate markets and economic activity. U.S. business leaders worry that U.S. firms are being put at a competitive disadvantage by Transnational Organized Crime and corruption, particularly in emerging markets where many perceive that rule of law is less reliable. The World Bank estimates over $1 trillion is spent each year to bribe public officials, causing an array of economic distortions and damage to legitimate economic activity. The price of doing business in countries affected by Transnational Organized Crime is also rising as companies budget for additional security costs, adversely impacting foreign direct investment in many parts of the world.

• Crime-Terror-Insurgency Nexus. Terrorists and insurgents increasingly are turning to Transnational Organized Crime to generate funding and acquire logistical support to carry out their violent acts. The Department of Justice maintains a classified report known as the Consolidated Priority Organization Targets (CPOT) list. The last time CPOT was declassified via a FOIA request was 2015.  That edition of the CPOT listed a total of 63 organizations, 29 of which, are significant international drug trafficking organizations (DTOs) that threaten the United States, AND have links to terrorist groups. Involvement in the drug trade by the Taliban and the Revolutionary Armed Forces of Colombia (FARC) has been critical to the ability of these groups to fund terrorist activity. The U.S. Law Enforcement and  Intelligence Community is concerned about Hezbollah’s drug and criminal activities, as well as indications of links between al-Qaeda in the Lands of the Islamic Maghreb and the drug trade. Further, the terrorist organization al-Shabaab has engaged in criminal activities such as kidnapping for ransom and extortion, and may derive limited fees from extortion or protection of pirates to generate funding for its operations.  ISIS has also been very active in the TOC arena.

• Expansion of Drug Trafficking. Despite demonstrable counter-drug successes in the past 8-9 years, particularly against the cocaine trade, illicit drugs remain a serious threat to the health, safety, security, and financial well-being of Americans. The demand for illicit drugs, both in the United States and abroad, fuels the power, impunity, and violence of criminal organizations around the globe. Mexican DTOs have escalated their violence to consolidate their market share in the Western Hemisphere, protect their operations in Mexico, and expand their reach into the United States. In West Africa, Latin American cartels are exploiting local criminal organizations to move cocaine to Western Europe and the Middle East. Kenya, in Eastern Africa, has become a major distribution hub for heroin coming from Afghan DTOs to Europe and the United States. Many of the well-established organized criminal groups that had not been involved in drug trafficking—including those in Russia, China, Italy, and the Balkans—have now established ties to drug producers to develop their own distribution networks and markets.

• Human Smuggling/Trafficking. Human smuggling is the facilitation, transportation, attempted transportation, or illegal entry of a person or persons across an international border, in violation of one or more country’s laws, either clandestinely or through deception, whether with the use of fraudulent documents or through the evasion of legitimate border controls. It is a criminal commercial transaction between willing parties who go their separate ways once they have procured illegal entry into a country. The vast majority of people who are assisted in illegally entering the United States and other countries are smuggled, rather than trafficked. International human smuggling networks are linked to other transnational crimes including drug trafficking and the corruption of government officials.  In the past few years trafficking in children has begun to pick-up.

• Weapons Trafficking. Criminal networks and illicit arms dealers also play important roles in the black markets from which terrorists and drug traffickers procure some of their weapons. As detailed in the 2010 UN Organization on Drugs & Crime report, The Globalization of Crime (Note: this report was a massive undertaking and cannot be replicated yearly, however a new one was in preparation for 2020 before the COVID-19 Pandemic, so it is unlikely to be published this year), the value of the documented global authorized trade in small arms (i.e.; handguns, rifles, shotguns, machine guns) has been estimated at approximately $2.08 billion in 2010, with unrecorded but legal transactions making up another $120 million or so. The most commonly cited estimate for the size of the illicit market is approximately 20% of the legal market. According to the head of UNODC, these “illicit arms fuel the violence that undermines security, development and justice” worldwide. U.S. Federal law enforcement agencies have intercepted large numbers of weapons or related items being smuggled to China, Russia, Mexico, the Philippines, Somalia, Myanmar, Mali, Somalia, Turkmenistan, Syria and Yemen.  It is important to note this discussion does NOT include heavier weaponry, such as: Rocket Propelled Grenades, anti-tank rockets, heavy barrel machine guns (like the U.S. M2 .50 caliber machine gun, for example), fragmentation grenades, 40mm grenade launchers, mortars & field artillery.

• Intellectual Property Theft. TOC networks are engaged in the theft of critical U.S. intellectual property, including through intrusions into corporate and proprietary computer networks. Theft of intellectual property ranges from movies, music, and video games to imitations of popular and trusted brand names, to proprietary designs of high-tech devices and manufacturing processes. This intellectual property theft causes significant business losses, erodes U.S. competitiveness in the world marketplace, and in many cases threatens public health and safety. Between FY 2003 and FY 2010, the yearly domestic value of customs seizures at U.S. port and mail facilities related to intellectual property right (IPR) violations leaped from $94 million to $188 million. Products originating in China accounted for 66% of these IPR seizures in FY 2010.  Estimates for 2020 are in excess of $450 million, and China still leads the pack.

• Cybercrime. TOC networks are now significantly involved in cybercrime, as it has become increasingly difficult to launder money, and/or defeat institutional security systems which are controlled by networked computer systems.  Cybercrime costs consumers tens of billions of dollars annually, threatens sensitive corporate and government computer networks, and undermines worldwide confidence in the international financial system. Through cybercrime, transnational criminal organizations pose a significant threat to financial and trust systems—banking, stock markets, e-currency, and value and credit card services—on which the world economy depends. For example, some estimates indicate that online frauds perpetrated by Central European cybercrime networks have defrauded U.S. citizens or entities of more than $1 billion in a single year. According to the U.S. Secret Service, which investigates cybercrimes through its 31 Electronic Crimes Task Forces, financial crimes facilitated by anonymous online criminal elements, result in billions of dollars in losses to the Nation’s financial infrastructure. The National Cyber Investigative Joint Task Force, led by the Federal Bureau of Investigation (FBI), functions as a domestic focal point for 18 federal departments or agencies to coordinate, integrate, and share information related to cyber threat investigations, as well as make the Internet safer by pursuing terrorists, spies, and criminals who seek to exploit U.S. system.

Information Warfare. The 2016 Presidential Election demonstrated that shadowy foreign government agencies, in concert with private TOC groups, have a significant capability of committing Information Warfare by exploiting America’s open society and means of mass communication.  Common social media platforms, such as YouTube, Twitter, Instagram, TikTok, SnapChat, Facebook, Google, and others, have been infiltrated to influence public thinking.  Other aspects of criminal information warfare include developing misleading documents, such as the now debunked dossier procured by the Democratic National Committee that attempted to implicate the Trump Campaign in colluding with Russia to rig the election.  This dossier was actually used as evidence by the FBI to get a warrant to tap the phones of a Trump Campaign staffer.  We are seeing just the tip of the iceberg in TOC involvement in information warfare.  The allure of adversary governments using TOCs for these activities is simple:  TOCs are adept at working in the shadows, below the radar, because getting caught is not as big of a problem as losing tens or even hundreds of millions of dollars in the process.  TOCs could care less about their operatives going to jail; they are not happy about losing money.  Adversary governments and terrorist groups are more than willing to pay for access to a TOCs well-developed network of money launderers, cyber criminals, black bag experts, etc.  At this juncture, no one really knows how much money TOCs are pulling-in to facilitate information warfare projects.  It now appears that some of these same shadowy TOCs are acting as conduits for money, planning and organizing insurrection and subversive activities in the U.S.

Ciao,

Steve Miller, IAPWE – Certified & Member
Managing Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@millermgmtsys.com

Standard
National Security, Terrorism Information, The Judiciary, u.s. constitution, U.S. Presidency

RNSK Vol I, Edition 3

Written Statement of
William P. Barr
Attorney General

Committee on the Judiciary
U.S. House of Representatives
July 28, 2020

    

https://upload.wikimedia.org/wikipedia/commons/4/45/William_Barr.jpg

 

On July 28, 2020, United States Attorney General, William Barr, will testify in front of the Judiciary Committee of the U.S. House of Representatives.  I want to call your attention to Attorney General Barr’s prepared statement released today, July 27th, and will be read into the Judiciary Committee’s proceedings by Barr.  The unabridged content of AG Barr’s statement is shown below.

My purpose in bringing this statement to your attention is simply due to the near identical wording in his statement about the current spate of domestic violence issues, and the outcome of that violence, in comparison to my words cited in last weeks RNSK Volume I, Edition 2.  It is important to me that my readers recognize that what I write is factual, and correctly analyzed.  It is not a fanciful opinion of little value to the discerning public.

Here are some excerpts from Barr’s Statement:

“I want to address a different breakdown in the rule of law that we have witnessed over the past two months. In the wake of George Floyd’s death, violent rioters and anarchists have hijacked legitimate protests to wreak senseless havoc and destruction on innocent victims. The current situation in Portland is a telling example. Every night for the past two months, a mob of hundreds of rioters has laid siege to the federal courthouse and other nearby federal property.

What unfolds nightly around the courthouse cannot reasonably be called a protest; it is, by any objective measure, an assault on the Government of the United States.

Largely absent from these scenes of destruction are even superficial attempts by the rioters to connect their actions to George Floyd’s death or any legitimate call for reform.

Nor could such brazen acts of lawlessness plausibly be justified by a concern that police officers in Minnesota or elsewhere defied the law.

Remarkably, the response from many in the media and local elected offices to this organized assault has been to blame the federal government. To state what should be obvious, peaceful protesters do not throw explosives into federal courthouses, tear down plywood with crowbars, or launch fecal matter at federal officers. Such acts are in fact federal crimes under statutes enacted by this Congress.”

I invite you to read the rest of AG Barr’s prepared statement, and watch his Congressional testimony on July 28th at 10am EDT.  Most major television news outlets will carry the proceedings live.

Ciao,

Steve Miller
Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@millermgmtsys.com

470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_1470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_2470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_3470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_4470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_5470621233-Written-Statement-of-AG-Barr-HJC-07-28-20_Page_6

 

Standard
National Security, Terrorism Information, u.s. constitution, U.S. Presidency

RNSK Vol I, Edition 2

Defending the U.S. Against Foreign & Domestic Enemies

macarthur_manila

“I am concerned for the security of our great Nation; not so much because of any treat from without, but because of the insidious forces working from within.”

Douglas MacArthur, General of the Army

There is a reason why our Founding Fathers were concerned about defending the Constitution against enemies foreign and domestic, though this specific language did not expressly come to pass until the enactment of Title 5, Code of Federal Regulations in 1966.

When did our Founding Fathers become aware of the concern over domestic enemies?  For a decade or more prior to 1776, there were violent and divisive elements at work in the 13 colonies, intent upon keeping the oppressive yoke of the British Crown over everyone.  This concern was memorialized and enumerated in the list of grievances noted in the Declaration of Independence.  This was the first document of lasting importance to denounce the practice of fomenting domestic enemies, to wit in reference to King George: “He has excited domestic insurrections amongst us…”  America’s first leaders had no reason to believe that by simply declaring their independence, enemies bent on fomenting domestic insurrection would stop such actions.

The concern over these issues was aptly expressed later on in the Constitutional Convention by John Adams:

“We have no government armed with power capable of contending with human passions unbridled by morality and religion.  Avarice, ambition, revenge, or gallantry, would break the strongest cords of our Constitution as a whale goes through a net.  Ours is made only for moral and religious people.  It is wholly inadequate to the government of any other.”

Considering all of the social strife and upheaval in 2020 America, this article will focus on domestic enemies and disruptive, homegrown violence.

When America declared its independence, the whole world was a potential foreign enemy. It took two years of fighting on its own before France became the first sovereign nation to sign a treaty backing the United States of America. Domestic enemies were a concern because there were people living in the original 13 colonies at the time of the Revolution who did not support American independence. The signers of the Declaration of Independence pledged their lives and all they had for an independent America. Had any of them ever been caught by the British, they would have been tried and executed for treason against the British Crown. Supporters of the Revolution did not even know if they could trust their neighbors or members of their own family.

The Founding Fathers were similarly concerned about future domestic enemies, because from a national security perspective, it is natural to watch for external enemies, but not domestically. Why be concerned about domestic enemies? In simplest terms, our Founding Fathers recognized they were creating a nation with more citizen freedoms than any country on Earth.  Prior to the American Revolution, there had never been a constitutional democracy operated solely of the people, by the people, and for the people.  All previous efforts to create this sort of nation-state failed, largely due to internal upheaval.  The  Founding Fathers recognized the democratic freedoms they hoped to create could be abused & breed internal subversion and violent insurrection.

The need for addressing issues related to domestic enemies, insurrection and subversion first came under the watchful eye of General George Washington when he became commander of the Continental Army.  Dr. Matthew Spalding of The Heritage Foundation stated in a constitutional essay, “In England, subjects were required to swear loyalty to the reigning monarch; many early American documents included oaths of allegiance to the British king. During the American Revolution, General George Washington required all officers and men to subscribe to an oath renouncing any allegiance to King George III and pledging their fidelity to the United States. Most of the new state constitutions included elaborate oaths that tied allegiance to and provided a summary of the basic constitutional principles animating American constitutionalism.”

Washington’s actions became the first practical steps taken to make specific individuals accountable for avoiding the fomentation of insurrection and subversion in the United States.  Washington made good on his promise to enforce the oath when several officers and soldiers banded together with the intent of overthrowing the Continental Congress as a means of addressing their grievances.  When the plot was uncovered, Washington had the men arrested, tried under a summary courts martial, and ultimately convicted for insubordination and treason.  All of the men were punished, and the two most central figures were executed by hanging.

In the 1780s after the Revolutionary War ended in an American victory, the Congress convened a Constitutional Convention.  The Convention delegates from the 13 colonies elected George Washington to preside over the proceedings. The Constitutional Framers clearly wanted to establish a three-part governmental structure comprising a legislature, an executive and a judiciary.  Article I of the Constitution covers the legislature and spells out numerous specific duties the U.S. Congress is empowered to handle.  Article III covering the judiciary is concise and specific in narrowly defining the duties of this branch.  Once these two branches were constitutionally defined, Article II set about the duties of the executive branch.  It is important to note the generally recognized legal principal that once a law defines certain details of what must or must not be done, and no provision is made for any issue that falls outside the scope of the defined details, it means that such issues are not specifically forbidden, and therefore not against the law.  Until the law is revised to more narrowly define an issue outside the current scope, it is essentially lawful.

In order to avoid leaving too many loopholes in the Constitution when it came to defining the duties of each branch of the National Government, the Framers specified the executives duties in Article II to be everything else not assigned to the legislature or the judiciary.  To cement the executive’s all encompassing duties, the Framers added a word-for-word, specific oath of office in Article II, Section 1, Clause 8 of the Constitution:

Before he enter on the Execution of his Office, he shall take the following Oath or Affirmation: — “I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my Ability, preserve, protect and defend the Constitution of the United States.”

Vasan Kesavan, in his Heritage Foundation article on the Presidential Oath of Office said, “The Framers…plainly believed that a special oath for the president was indispensable. At the Constitutional Convention…George Mason and James Madison moved to add the ‘preserve, protect and defend’ language.”  Kesavan went on to say, “The prospect of George Washington’s becoming president cannot be discounted.  The Framers perhaps desired an oath that would replicate the public values of the man who was presiding over the Convention. More significantly, because the presidency was unitary, there were no available internal checks, as there were in the other branches with their multiple members. A specially phrased internal check was therefore necessary, one that tied the president’s duty to “preserve, protect and defend” to his obligations to God, which is how the Founders understood what was meant by an oath or affirmation.”

The first time the Constitutional Framers actually memorialized their concern over foreign or domestic enemies was in Article IV, Section 4, which has become known as the Guarantee Clause, to wit:

“The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against Invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened), against domestic Violence.”

Robert G. Natelson, a Senior Fellow in Constitutional Jurisprudence at Independence Institute, stated “the federal government will assure the states ‘a republican form of government.’ This assurance did not appear in the Articles of Confederation. The guarantee of protection from domestic violence can also be seen as part of the republican guarantee.”  Natelson made a key point in understanding how domestic violence, or the more modern term, “domestic enemies,” related to a republican form of government and protection from invasion.  He stated, in part, “Founding-era dictionaries defined a ‘republic’ as a ‘commonwealth,’ a ‘free state,’ and ‘a state or government in which the supreme power is lodged in more than one.’ In other words, a republic was a state governed by those citizens who enjoyed the franchise rather than by a monarch or autocrat. Accordingly, founding-era dictionaries often defined ‘republican’ as ‘placing the government in the people.”

Natelson went on to point out that the Constitutional Framers generally identified “three criteria of republicanism, the lack of any of which would render a government un-republican.”  Natelson listed the following criteria:

  1. Popular rule. The Founders believed that for government to be republican, political decisions had to be made by a majority (or in some cases, a plurality) of voting citizens. The citizenry might act either directly or through elected representatives. Either way, republican government was government accountable to the citizenry.
  2. There could be no monarch. The participants in the constitutional debates believed that monarchy, even constitutional monarchy, was inconsistent with republican government. When Alexander Hamilton proposed a president with lifetime tenure, the delegates disagreed so strongly that they did not even take the time to respond.
  3. A republic was the rule of law, a concept deemed fundamental to a free state. The Framers believed that ex post facto laws—most kinds of retroactive legislation, for example—were inconsistent with the rule of law, and therefore un-republican.  Simply put, you could not make something against the law, and then rewind the clock to go punish someone who committed or omitted an act not previously defined under the rule of law.

The primary purpose of the Guarantee Clause was to protect against any kind of monarchy.  Natelson noted, “based on precedents in ancient Greece, the drafters feared that kings in one or more of the states would attempt to expand their power in ways that would destabilize the entire federation. They believed that having a republican government in each state was necessary to protect republican government throughout the United States.”  Relating all of this back to domestic violence or domestic enemies, recall one of the primary grievances the Founding Fathers enumerated in the Declaration of Independence in reference to King George: “He has excited domestic insurrections amongst us…”  Framers of the Constitution did not want any of the states to adopt even a constitutional monarchy, for fear that it could lead to suppression of the rights enumerated in the Preamble, thereby fomenting insurrection, meaning, domestic violence or enabling domestic enemies.  The Preamble states:

“We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.”

After addressing the president’s oath to preserve, protect and defend the Constitution at a macro level, and the governing structure and relationship between the National & State governments, the Framers understood that the president had to rely on others at the national and state levels to support and defend the Constitution on a micro level.  This was covered in the Oaths Clause in Article VI:

The Senators and Representatives before mentioned, and the Members of the several State Legislatures, and all executive and judicial Officers, both of the United States and of the several States, shall be bound by Oath or Affirmation, to support this Constitution….

The Constitution only stipulated exact wording of the presidential oath, but, not for other government officials.  Part of the problem found with the Constitution’s predecessor, the Articles of Confederation, was it so heavily favored state’s right that it rendered the National Government impotent in creating any cohesion between the former 13 colonies.  This became a major reason for convening the Constitutional Convention.  Matthew Spalding noted in his constitutional essay that, “Edmund Randolph proposed, as part of the Virginia Plan, ‘that the Legislative, Executive & Judiciary powers within the several States ought to be bound by oath to support the articles of Union.’ When it was objected that this would unnecessarily intrude on state jurisdiction, Randolph responded that he considered it as necessary to prevent that competition between the National Constitution & laws, and those of the particular States, which had already been felt. The officers of the States are already under oath to the States. To preserve a due impartiality they ought to be equally bound to the National Government. The National authority needs every support we can give it.”  The convention delegates agreed with Randolph, but, rightly opined that the Oaths Clause should be revised to include national officials, and so it was.

The very first law passed by the first session of the House of Representatives was “An Act to regulate the Time and Manner of administering certain Oaths.”  By statute, the oath was simply worded: “I, [name], do solemnly swear (or affirm) that I will support the Constitution of the United States.”  Fred Warner noted in a May 2019 article for the New Right Network, entitled, Domestic Enemy Defined: Jaw-Dropping Realizations, that based on the Constitution and Title 5, Code of Federal Regulations, the following individuals are required to take this oath of office:

  • U.S. Senators and Representatives, both current & past;
  • Members of the Presidential & Vice Presidential Electoral College;
  • Civilian employees of the U.S. Government;
  • Uniformed members of the U.S. military and Coast Guard;
  • Members of state legislatures;
  • Executive or judicial officers of any state.

The simple 1789 oath promulgated by Congress remained unchanged until the Civil War, when they significantly amended the oath’s statute to require civilian employees and military members to not only swear allegiance to the United States, but, also to affirm they had not engaged in any previous disloyal conduct. Congress repealed the latter condition in 1884, leaving wording that is nearly identical to the current oath promulgated in Title 5 in 1966.  Under current law, the parties listed above are required to take the following oath, which is the first time the oath contained the specific language of “…against all enemies, foreign and domestic:”

“I, [name], do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter.” 

The Constitutional Convention dragged on throughout the sweltering Philadelphia summer of 1787.  The final version of the Constitution was a delicate compromise between a national government with enough clout to act on the world stage and bind the states together for the benefit of all, versus allowing individual states to retain a semblance of rights to govern as suited them locally.  States rights advocates were also concerned about a powerful national government trampling an individual citizen’s rights and freedoms.  Many of the states had addressed an individual’s rights in their state constitutions.  Proponents of a strong central government argued that the Constitution enumerated the powers and limits of the national government, which by implication constrained it from infringing upon an individual’s rights, leaving that in the hands of each state government.  The Constitutional language stood, as written, and 39 of the 53 delegates signed-off, which exceeded the agreed upon two-thirds super majority needed to submit it to the state legislatures for comment and ratification.

Not unexpected, James Madison of Virginia, pressed to make an individual citizen’s rights more universally explicit in the national Constitution, rather than the implication that each state could take-up the subject as they pleased at their level.  Ultimately, the Constitution was ratified, as is, and national elections were held in the autumn of 1788 for the President, Vice President, Senators and Representatives.  As soon as the First Congress was convened in 1789, they immediately set about creating the Bill of Rights, the first 10 Constitutional Amendments.  At the time of creation, no one considered there was anything contained in the amendments that particularly related to the individual state’s responsibility for subduing or preventing insurrection, subversion, domestic violence or the rise of domestic enemies. Neither did anyone make the connection of this responsibility based on republican government content in Article IV, Section 4, or the simple wording enacted by the First Congress to fulfill the Oaths Clause, which was: “I, [name], do solemnly swear (or affirm) that I will support the Constitution of the United States.”  Seventy years later the Civil War would change everything.

Of the 10 Amendments included in the Bill of Rights that would later have significance in a state’s responsibility for subduing or preventing insurrection, subversion, domestic violence or the rise of domestic enemies, it was the 10th Amendment.  Charles Cooper, Chairman of Cooper & Kirk, PLLC, a renowned constitutional law firm, wrote: “The Tenth Amendment expresses the principle that undergirds the entire plan of the original Constitution: the national government possesses only those powers delegated to it, and ‘leaves to the several States a residuary and inviolable sovereignty over all other objects.’  In The Federalist No. 39, The Framers of the Tenth Amendment had two purposes in mind when they drafted it. The first was a necessary rule of construction. The second was to reaffirm the nature of the federal system.”  The 10th Amendment reads as follows:

“The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

As envisioned, the entire purpose of the 10th Amendment was to be a footnote of the previous nine, that just because the Bill of Rights was being made universal throughout the entirety of the United States, it did NOT imply that the national government’s reach of responsibility extended into any other areas of governance, except as originally delineated in the Constitution.  Proponents of the 10th Amendment were essentially hearkening back to one of John Heywood’s Proverbs of 1546, “Give him an inch, and he will take a mile.”  The basic concept of the Bill of Rights was, it was a one-time, “package deal,” with no intent to confer any other rights or duties on the national government.  In very simple terms, state’s rights advocates were asserting to the strong central government proponents, “stay out of our business; we will call you when we need you.”  What comes to mind are two old proverbs, “be careful what you wish for, as you just might get it,” and, “live by the sword, die by the sword.”  The southern states would learn this the hard way 70 years later.

When the Civil War broke out in 1860, the United States Government underpinned their opposition to the seceding states using all of the foregoing Constitutional information.  The national and state leaders of the seceding states had taken an oath of office to support the Constitution, which included the republican form of government, and because the 10th Amendment ensured that each state had all the authority to operate its government under the Constitution as it saw fit, and the Constitution gave no policing powers to the national government, ergo, it fell on the state governments to ensure the Preamble’s promise of domestic tranquility, and as Article IV noted, prevent domestic violence.  The United States Government saw that the elected officials of the seceding states had failed in their essential purpose, and thereby violated the Constitution.  Based on the tenets of Article IV, Section 4, “The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against…domestic Violence.”  President Lincoln and by Congressional Resolution, invoked this clause to stop the insurrection, subversion and domestic violence being fomented by people who were deemed domestic enemies of the state.  This same interpretation exists today in 2020 in reference to fomenting of domestic violence by domestic enemies of the state.

After the Civil War was over, President Abraham Lincoln’s assassination created a major shift in the plans and actions of Reconstruction in the former Confederate states.  Lincoln decided before his 1864 re-election bid to replace his Vice President, Hannibal Hamlin, on the ticket with Andrew Johnson, his Military Governor of Tennessee.  Johnson was an accomplished politician with more than 20 years of experience that included 10 years in the House of Representatives and six years in the Senate.  Had Lincoln not been assassinated, there is no doubt his steadying hand would have made good use of Johnson’s experience with southern politicians, and Reconstruction likely would have been less contentious.  Instead, Johnson found himself pinned between northern politicians bent on punishing the southern states, and southern politicians trying to avoid the severe treatment, and get their states back into play in Washington, D.C.

Numerous bills came across Johnson’s desk that he vetoed as being overly punitive.  One of the most sweeping pieces of legislation was what became the 14th Amendment to the Constitution.  Johnson was eager to get Reconstruction over with, which included some controversial presidential pardons of prominent southerners.  The Congress was determined to not allow former Confederate leaders to simply get re-elected and act like the rebellious Civil War never happened, and they played no part in it.  To that end, the 14th Amendment, Section 3, was ratified and became law in June 1868.  Here is the language of Section 3:

“No person shall be a Senator or Representative in Congress, or elector of President and Vice-President, or hold any office, civil or military, under the United States, or under any State, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any State legislature, or as an executive or judicial officer of any State, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may by a vote of two-thirds of each House, remove such disability.”

Paul Mereno, the William and Berniece Grewcock Chair in Constitutional History at Hillsdale College, said this about the new Section 3, “The disqualification of former rebels for federal and state office was the most controversial section of the Fourteenth Amendment. Some called it vindictive. On the other hand, those who had taken a solemn oath to support the United States and had reneged on the oath could, it was argued, justifiably be prevented from simply re-assuming positions of authority in the government. Moreover, many former U.S. officials who had joined the Confederacy led the resistance to the passage of Reconstruction legislation and had supported the imposition of the onerous Black Codes on the freedmen. Other objections to the Disqualification Clause asserted that it intruded on the president’s pardon power, but obviously a constitutional amendment could modify that previously unlimited power. In any event, Congress might well have thought it prudent to limit President Andrew Johnson’s pro-Southern actions.”  Eventually, Congress removed all disqualifications for previous disloyal conduct in 1898.  The remainder of Section 3 is still in effect when it comes to government officers who may participate in insurrection or rebellion, including terrorist activities.”  In modern practice, the most important aspect of this section is that elected or appointed government officials can be held accountable by commission or omission for insurrection, subversion, domestic violence and/or failure to take action in foiling the acts of domestic enemies.  They themselves could be labeled a domestic enemy for failure to act in the face of insurrection, subversion or domestic violence.

But, even if we hold government officers accountable as noted above, it still does not answer the question: who are the insurgents, subversives and domestic enemies that are committing acts of domestic violence to take down local, state or the Federal Government?  In September 2013, then commander of Thule Air Base, Greenland, Colonel Joseph L. Prue, cited in an Air Force article, “Identifying the domestic enemy,” that “Insurgents are difficult to identify as they typically blend into the population and naturally thrive in a failed state environment.”  Then Connor Boyack of the Libertas Institute said, “the enemy is comprised  of one’s neighbors, friends, business associates, fellow church-goers, or amiable, well known individuals.”  In short, a domestic enemy can literally be anyone.

In May 2016, David Alpher, an adjunct professor from the School for Conflict Analysis and Resolution at George Mason University, wrote an article for The Conversation blog site entitled, “In America, Domestic Extremists Are a Bigger Risk than Foreign Terrorism.”  Alpher’s blog post started with a header line of, “Take America back from those who have stolen it.  Protect America from those who want to destroy it.  Restore the principles that these usurpers betrayed.”  Alpher went on to say, “I have spent nearly 15 years studying how the risk of violence grows within societies around the world, and running programs designed to stem the tide. I have [seen] rhetoric like this, used to mobilize violence in countries like Iraq and Kenya.  This same dynamic is taking shape within American society now.  Fear and anger make for strong motivation.”

Alpher continued his colloquy, “every violent group in history describes its own violence as the legitimate response to a threat that was forced on them.  Groups survive in the long term when that description makes sense to enough of the population to buy them tolerance and safe space to operate, plan and grow; that’s true of terrorism and violent extremism.  Their reasoning usually orbits around the belief that they are defending the Constitution, or stopping the theft of the political process, and resisting the takeover by hostile powers.”

In 2020, just about every American can read the foregoing and shake their head up & down vigorously, and say Alpher’s words are about homegrown Islamic extremists, or Antifa, or the socialist movement fueled by Bernie Sanders & Alexandria Ocasio-Cortez, or the Deep State (whoever that is), or gun-toting right wing radicals, or racial injustice extremists, or the Cancel Culture, or the COVID-19 social backlash, or supporters of Donald Trump.

Here is the conundrum with Alpher’s commentary:  In 2016, all of his words were solely focused on Donald Trump and his supporters.  Supposedly, no one else was to blame.  The reality of how insurgents, subversives and domestic enemies work is: they do not care about the socio-political platform of any of these groups.  Their goal is to create anarchy, mob rule, breakdown of the social structure, overtax the politicians and government agencies, and create an environment of chaos with all of the aforementioned groups pointing fingers at each other.  The domestic enemies win.

I understand the injustice to all minorities, but, the BLM and other groups seeking social justice are getting their movements hijacked by subversives who are exploiting our country’s strife. For all the people who’ve unjustly lost their lives, such as George Floyd and Breonna Taylor, I believe they’re looking down on us & can see the difference between peaceful protest vs subversive actors fomenting riots, destroying property, killing cops and innocents, and the cancel culture. At this time in our country, we are destroying ourselves from within.

Regardless who is right or wrong, there is only one thing that matters right now, and that is reasserting our republican form of government and the rule of law.  We are reminded of these duties stated earlier in Article IV, Section 4, of the Constitution, known as the Guarantee Clause:

“The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against Invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened), against domestic Violence.”

Based on this article in the Constitution, state and local governments have the first line of responsibility to preserve law and order, and restore domestic tranquility.  Allowing mob rule and rioting to go unchecked with the attitude that people will get tired and go home, is weak leadership, and emboldens further violence.  As it is noted in the Guarantee Clause, if the states decline to restore domestic tranquility, then the United States Government is obligated to take action.  And state & local officials who refuse to take action, are abetting domestic enemies and can be held accountable as is noted in the 14th Amendment, Section 3.

It is also important to keep in mind, that state & local law enforcement are being caught in the middle between domestic enemies and government leaders who fail to act properly.  When it comes to foiling domestic enemies, or a first strike by a foreign enemy, it’s not the U.S. military who will protect our national security…it will be local law enforcement. When the World Trade Center was attacked, it was local law enforcement and firefighters who ran TOWARD the danger & lost their lives. We need critical thinking & pondering by everyone to defeat social injustice & subversion.

Americans need to educate themselves on the rights and responsibilities all citizens and government leaders have to preserve, protect and defend the Constitution of the United States of America.

In June 1858 at the state capitol in Springfield, Illinois, Abraham Lincoln delivered his acceptance speech as the Republican nominee for the U.S. Senate.  What is likely one of the best known phrases uttered in a political campaign speech, came from Lincoln that day: “A house divided against itself, cannot stand.” It is my belief that these words in 2020 could never be more true.

I humbly pray that the Lord will grant us wisdom in determining who are America’s real domestic enemies, and hold our leaders and each other accountable to solve this terrible problem.  Amen.

Steve Miller
Editor
The Report on National Security Kinetics™
Seattle, WA. USA
vietvetsteve@reportnatlsecykinetics.com

Standard