RE: Israel blocks USA student from entering.
※→ rylah, et al,
In matters such as these connections, Federal Authorities walk softly with a deliberate consideration (the Constitution and the intent of today's law) with the facts and the "actual" threat.
(COMMENT)
The US is not a nation that particularly pursues people or organizations that hold extreme and enthusiastic (but lawful) anti-Government
positions. The US usually wants to either a covert or overt act undertaken in furtherance of a sympathy for an idealized victim (Arab Palestinians) agenda and imminent attack BEFORE they take a police action.
But these organizations are generally on the "recruitment and logistics" end (personnel for induction and materials) of the hostile programs, the discovery of waypoints and transport connection for 'explosives or other lethal devices,' as well as small arms and light weapons (SALW) interdictions in the context of preventing armed extremist objectives.
Included the reasoning of your question is that in order for these organizations to be of any real threat, they must be able to finance and communication with the portals to the extremist and asymmetric activities. In this context, it might be more lucrative to allow them to carry on normal operations for the purpose of conducting 31 USC 312 and Financial intelligence (FININT) as a complement to the more traditional human and communications intelligence (HUMINT and COMINT). One example of this is tracking the activities of Radicalized Islamic Followers establishing their own real and for-profit Internet Service Provider (ISP) for the purpose of supporting clandestine communications and shielded banking systems.
Bottom line is that there are all sorts of ways some of these organizations may be allowed to continue operation.
→or involved in some sort of "direct support" (finance and networking) in the furtherance of some extremist activity. This is a much more advanced and sophisticated set of counter-terrorism exploitation measures (offensive, not defensive). It can be, for example, a 31 USC 312 [Financial intelligence (FININT)] compliment to prevent and counteract the financing of extremist activities, → or the detection and exploitation of the communications networks used by extremist activities.
Most Respectfully,
R
※→ rylah, et al,
In matters such as these connections, Federal Authorities walk softly with a deliberate consideration (the Constitution and the intent of today's law) with the facts and the "actual" threat.
When does public security out weight that interest?
(COMMENT)
The US is not a nation that particularly pursues people or organizations that hold extreme and enthusiastic (but lawful) anti-Government
positions. The US usually wants to either a covert or overt act undertaken in furtherance of a sympathy for an idealized victim (Arab Palestinians) agenda and imminent attack BEFORE they take a police action.
But these organizations are generally on the "recruitment and logistics" end (personnel for induction and materials) of the hostile programs, the discovery of waypoints and transport connection for 'explosives or other lethal devices,' as well as small arms and light weapons (SALW) interdictions in the context of preventing armed extremist objectives.
Included the reasoning of your question is that in order for these organizations to be of any real threat, they must be able to finance and communication with the portals to the extremist and asymmetric activities. In this context, it might be more lucrative to allow them to carry on normal operations for the purpose of conducting 31 USC 312 and Financial intelligence (FININT) as a complement to the more traditional human and communications intelligence (HUMINT and COMINT). One example of this is tracking the activities of Radicalized Islamic Followers establishing their own real and for-profit Internet Service Provider (ISP) for the purpose of supporting clandestine communications and shielded banking systems.
Bottom line is that there are all sorts of ways some of these organizations may be allowed to continue operation.
→or involved in some sort of "direct support" (finance and networking) in the furtherance of some extremist activity. This is a much more advanced and sophisticated set of counter-terrorism exploitation measures (offensive, not defensive). It can be, for example, a 31 USC 312 [Financial intelligence (FININT)] compliment to prevent and counteract the financing of extremist activities, → or the detection and exploitation of the communications networks used by extremist activities.
Most Respectfully,
R