Qatar Is Pushing for ‘Social Justice’ Lessons and Arabic Classes in US K-12 Schools
Federal legislation is needed to expose this influence operation
Federal legislation is needed to expose this influence operation
Since 2011, the Islamic Republic of Iran and pro-regime hackers have increasingly utilized digital technology to threaten U.S. national security, conducting dozens of cyber operations against Americans....
Redefining terms like anti-corruption, human rights, democracy, and integrity — even when self-evidently disingenuous — provides China the cover to mimic the mechanisms of good governance while blunting...
In the United States, there are 16 “critical infrastructure” sectors so vital for the fundamental health, safety, and prosperity of the country that their incapacitation or destruction would have catastrophic...
Mitch McConnell is no Vladimir Putin
In recent years, federal law enforcement agencies have repeatedly arrested Hezbollah operatives in the US who were trying to procure weapons and other combat-related equi...
FDD Press Release
Homegrown terrorism has become a topic of discussion in both Canada and the United States. A study by the Canadian Security Intelligence Service...
On July 25, I spoke on a panel at the Potomac Institute for Policy Studies on the topic of Combating Olympic Terrorism (video of which can be found...
Viewing the Occupy Wall Street movement from post-Communist Europe, I can’t stop thinking of October 1917. This date, when the Bolsheviks seized power from the Russian Provisional...
Egypt captured Israeli-American Ilan Grapel to generate popular support among the volatile anti-Western middle class at home
The modern-day John Adams brigade down at King & Spalding has finally found a client too unpopular to merit representation: the American people. That is exactly the same conclusion drawn by E...
Back in January 2010, Secretary of State Clinton gave a pay-any-price, bear-any-burden address calling for the liberation of the global Internet. The price Washington was willing to pay? It promi...
A decade before Operation Aurora—China’s recent hacking spree of at least thirty-four Western companies—the Chinese government attempted to seize American computer code th...
The criminal complaint against Luqman Abdullah and his associates states that when al-Ummah succeeds in establishing a "separate, sovereign Islamic state," they intend for it to be led by Jamil a...
The 1960s were a time of great social upheaval in the U.S. Within the African-American Muslim population, young organizations trumpeted separation from mainstream American culture. Of these group...
“We can’t just be saying, ‘O.K., everything is run by the U.S. government,’ we got to take out the U.S. government. The U.S. government is nothing but Kuffars.”...
July 21, 2009 (Washington, D.C.) -- Danger Zone, FDD's popular and respected radio show about terrorism, democracy and international security issues, now in its 5th year, wi...
In August 2003, a tree fell into a power line on Ohio’s electricity grid, causing more electricity to be rerouted across other high-voltage power lines to compensate. All was seemingly well. Withi...
AL CAPONE HAD BECOME a celebrity criminal by 1931. Everybody knew what he was up to: his litany of offenses included murder, bribery, and running illegal breweries. But the government would have...