The Government Frets Over an iPhone While Opening Borders to 100,000 Syrians

John Linder, The Blaze, February 26, 2016

We have been inundated with news about whether Apple will yield to pressure from the government to create access to the data in the county-owned iPhone used by the San Bernardino terrorists.

{snip}

Apple argues that the only way to achieve what the government wants is to create new software that will certainly get copied and would mean every iPhone sold will be accessible to hacking by others, including terrorists, to use and abuse all of our data.

{snip}

If one iPhone can get the attention of our government on the suspicion of terrorist contacts that may or may not be there, why is the administration so anxious to force states to accept the resettlement of 100,000 Syrian refugees?

Islamic State terrorists traveling on bogus Syrian passports were embedded with the refugees flowing into Europe. There is no reason to think they would not do the same in those coming to America.

Nor is there any reason to think we can establish a program to detect terrorists in the Syrian refugee invasion. FBI Director James Comey testified to Congress that there are simply no records in the Middle East against which to vet the new refugees.

Illegal immigration at our southern border has already included terrorists from the Middle East. We have stopped known Islamic radicals from Syria, Iraq and Iran.

Judicial Watch reported a year ago that the Islamic State operates a training camp eight miles into Mexico from our border near El Paso, Texas.

Homeland Security officials have recently informed Congress that they have intercepted communications indicating that Islamic State terrorists were planning to enter the United States through our porous southern border.

{snip}

We have opened our borders to illegals. We have waived health rules. We are welcoming up to 100,000 Syrians with the near certainty that terrorists will be among them. We are prepared to spend $4.5 billion to resettle them.

And we are worried about a damn iPhone?

Topics: ,

Share This

We welcome comments that add information or perspective, and we encourage polite debate. If you log in with a social media account, your comment should appear immediately. If you prefer to remain anonymous, you may comment as a guest, using a name and an e-mail address of convenience. Your comment will be moderated.