US Military Concerned ISIS Fighters Returning to Caribbean Could Reach Border

U.S. SOUTHCOM commander Gen. John F. Kelly briefs reporters at the Pentagon, on March 13, 2014.

DOD photo by Glenn Fawcett

AA Font size + Print

U.S. SOUTHCOM commander Gen. John F. Kelly briefs reporters at the Pentagon, on March 13, 2014.

A top US commander warns Caribbean and South American countries are unable to track 100 foreign fighters that could return from Syria.

The war in Syria has attracted roughly 100 foreign fighters from the Caribbean who could easily make their way to the United States, said the top U.S. military commander for the southern hemisphere.

With little ability to track and monitor foreign fighters when they return, it would be relatively easy for those fighters to “walk” north to the U.S. border along the same networks used to traffic drugs and humans, according to Gen. John Kelly, commander of U.S. Southern Command.

“They don’t have that ability to track these folks,” Kelly said at a Pentagon briefing on Thursday.

Kelly said he worries whomever is radicalized enough to leave for Syria would return with greater terrorism skills and motivations.

“I would suspect they’ll get good at, while they’re in Syria, get good at killing and pick up some real job skills in terms of explosives and beheadings and things like that. And everyone’s concerned, of course, if they come home. Because if they went over radicalized one would suspect they’ll come home at least that radicalized.”

(RelatedTop General Says Mexico Border Security Now ‘Existential’ Threat to U.S.)

There is no indication of any scheme to attack the United States he said, but Americans “take for granted” the nation’s functioning legal system, agencies like the FBI and the layers of uncorrupt law enforcement that can monitor and track potential terrorists like in the United States. “A lot of these countries just don’t have that.”

Kelly said that some of the fighters are recruited and radicalized off the Internet but that there are “a couple of pretty radical mosques” in the region, as well.

“A hundred certainly doesn’t seem like a lot, it’s not, but the countries they come from have [a] total inability to deal with it,” he said, naming Jamaica, Trinidad & Tobago, Surinam and Venezuela, in particular.

With little military threats to the United States in his region, Kelly is a frequent advocate for helping law enforcement attack the network  — and root causes — of illegal drug and human trafficking into the United States. People, he said, travel freely and “simply walk across borders” in some cases where there is little to stop them.

“It’s the old story of you gotta watch them,” he said. “The CIA, FBI and people like that do a really good job tracking the networks, but you know it only takes – look, there’s a lot of people coming and going, it only takes one to cause you problems.”

With those caveats, Kelly’s concern does not reflect ‘ISIS at the border’ alarmism, rather he casts a watchful eye on the potential trouble of South American, Central American and Caribbean states in tracking returning fighters for themselves. The solution to preventing ISIS from coming through the southern hemisphere will require law enforcement and intelligence partnering with every state in the region, he said.

“The network that comes up through the isthmus and Mexico that carries anything and everything on it … the amount of movement is what I think overwhelms our ability – and the sophistication of the network – overwhelms our ability to stop everything,” he said.

“I think if they get back to some of these countries that I’ve described, it’s pretty easy for them to move around,” he said.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.