24

DOMESTIC TERRORISM: SLEEPER CELLS & CARTELS

The war is 7,000 miles away. The threat is not. Within hours of Khamenei's assassination on February 28, US intelligence intercepted an encrypted radio transmission believed to be an activation order for Iran-linked sleeper networks. The FBI placed CT units on 24/7 alert. And the agency most equipped to track what came next — FBI's CI-12 — had been gutted days earlier. Six days before Epic Fury, the US provided intelligence leading to the killing of El Mencho, the leader of CJNG — the most militarized cartel in existence, with confirmed Hezbollah financial ties and a presence in all 50 US states. A CIA targeting officer named Sarah Adams has been detailing the attack methodology, vector, and target profile of Islamic jihadist sleeper cells for years. And the Director of the National Counterterrorism Center testified to Congress in December 2025 that 18,000 known and suspected terrorists entered the country under the previous administration. That's just the ones they can identify.

Active Alert — FBI, DHS, Major City PDs on elevated posture as of March 13, 2026
Section I
SLEEPER CELLS — WHAT THEY ARE, HOW THEY WORK, AND WHY THIS MOMENT IS DIFFERENT
Plain Language

A sleeper cell is a group of foreign operatives or sympathizers who live normal lives in a country — holding jobs, paying taxes, blending into communities — while waiting for instructions to act. They are called "sleepers" because they are dormant, sometimes for years or decades, until a handler or activation signal tells them to do something. Iran has used this approach since the 1980s. The Buenos Aires Jewish Community Center bombing in 1994 — which killed 85 people — was carried out by Hezbollah operatives who had been living in South America. After Khamenei's death on February 28, US intelligence intercepted what they believe was an activation broadcast — a coded signal sent via shortwave radio (bypassing the internet, which is blocked in Iran) intended to reach these dormant operatives. Whether the signal was received, and whether any cells will act on it, is what the FBI and DHS are now working to determine around the clock.

The sleeper cell concept is not a conspiracy theory. It is a documented, historically verified tactic used by multiple states and non-state actors. Iran and Hezbollah have been employing it in the Western Hemisphere since at least the early 1980s, when Hezbollah's Unit 910 — its external operations wing — began establishing presence in Lebanese diaspora communities across Latin America and, over time, North America. The Director of National Intelligence's annual threat assessments have confirmed Iran's ongoing maintenance of networks inside the United States capable of conducting targeted operations. Since 2020, federal authorities have neutralized more than 18 Iran-linked plots on US soil, including assassination attempts against Iranian dissidents and at least one plot targeting former National Security Advisor John Bolton. These are not hypothetical capabilities. They are active programs that have already been deployed against targets in America.

The February 28 activation signal described in an ABC News report — citing a federal law enforcement memo — was described as broadcast via a "new radio station with international reach, designed to bypass the internet and cellular networks to reach clandestine operatives." This is the classic number station format: shortwave radio broadcasts of sequences of letters or numbers that appear meaningless to listeners but carry coded instructions to pre-briefed operatives. Number stations were a Cold War staple used by both the US and Soviet intelligence services. Iran's use of them signals an awareness that internet communications are monitored, and an intent to use communication channels that are harder to intercept and attribute. The FBI memo quoted in the ABC report noted there is currently "no operational threat tied to a specific location" — meaning the signal was intercepted but no specific plot has been confirmed. That gap between "signal intercepted" and "plot confirmed" is where the current threat resides: visible enough to generate high alert, ambiguous enough that it cannot be definitively assessed.

What makes this moment structurally different from prior Iran threat elevations is not the existence of the cells — those have been present for decades — but the change in Iran's strategic calculus. Prior Iranian deterrence from large-scale attacks on US soil was driven partly by rational calculation: the regime knew that a successful mass-casualty attack inside America would likely trigger a US military response that could end the regime. That deterrent calculus no longer applies in the same way. The regime is already under existential military pressure. Its Supreme Leader has been killed. Its military and nuclear infrastructure has been struck by hundreds of US and Israeli weapons. The logic of restraint — "don't provoke the Americans to do something worse" — collapses when the Americans have already done something close to the worst imaginable. A regime fighting for its survival may calculate that domestic terror attacks on US soil are now worth the residual risk, as a demonstration of continuing capability and a tool for pressuring Washington toward a ceasefire.

Iran-Linked Plots Neutralized (2020–2026)
18+
Federal authorities neutralized 18+ Iranian-backed plots on US soil including assassination attempts, kidnapping schemes, and targeted killings of Iranian dissidents and US officials.
Encrypted Activation Signal
Feb. 28
Intercepted shortly after Khamenei assassination. Shortwave number station broadcast — designed to bypass internet monitoring. Reached clandestine operatives globally. ABC News / federal memo.
FBI CI-12 Agents Fired Pre-War
~12
Iran counterintelligence unit CI-12 hobbled days before Feb. 28 strikes. DOJ National Security Division lost 50%+ of staff. Senior CT officials pushed out (CNN, March 3, 2026).
DHS Funding Status
Partial Shutdown
DHS operating under partial shutdown — incomplete congressional funding raises resource and coordination concerns at the moment of peak domestic threat. 27+ day shutdown as of March 13.

Section II
THE DOMESTIC THREAT SPECTRUM — FROM LONE ACTORS TO HEZBOLLAH UNIT 910

Not all domestic threat scenarios carry equal probability or consequence. The intelligence community assessment, CIA doctrine, and the historical record of Iranian domestic operations in the West all point to a clear hierarchy of likely threat types — from the most probable (low-sophistication, high-frequency lone actor incidents) to the most consequential (a coordinated, Hezbollah-directed multi-target attack). Understanding this hierarchy matters because it shapes both the appropriate response and the calibration of public concern. Overstating the threat produces panic and distorts policy. Understating it produces complacency and unpreparedness. The honest assessment is that the most likely threats are targeted and low-to-medium casualty; the most dangerous threats are low-probability but genuinely catastrophic.

Threat Category / Actor Assessment
Lone Actor / Self-Radicalized Individual

Person radicalized online or by the war's events who acts independently, without direction from Iran or Hezbollah. March 1 Austin bar shooting — suspect wearing Iranian flag imagery — is a real-world example of how quickly a self-motivated actor can cause mass casualties with no organizational infrastructure. These attacks are nearly impossible to predict or prevent entirely. They require only a motivated individual and widely available means.

Most Probable
Criminal Proxy / Facilitated Attack

Iran or Hezbollah uses existing criminal networks — street gangs, cartel-connected individuals, criminal proxies already established in the US — to conduct an attack. The attacker may not even know they are serving an Iranian intelligence objective. Provides maximum deniability for Tehran. Historically used in Latin America. Increasingly viable in the US as Hezbollah-cartel connections mature.

Elevated Risk
Soft Target Attack — Jewish / Israeli-Linked

Historical Iranian retaliation pattern: Jewish community centers, synagogues, Israeli embassy-adjacent locations. The 1994 Buenos Aires AMIA bombing (85 killed) and 1992 Israeli Embassy bombing (29 killed) are the operational templates. US Jewish Community Centers received elevated threat warnings within 48 hours of the February 28 strikes. These targets require minimal operational complexity to attack but carry high symbolic value and casualty potential.

Historical Pattern
Targeted Assassination — Dissidents / Officials

Iran's most consistently executed domestic threat: assassination or kidnapping of Iranian dissidents, journalists critical of the regime, and US officials involved in anti-Iran policy. Journalist Masih Alinejad survived a 2021 IRGC assassination plot. A 2022 plot targeted John Bolton. Regime opponents, former Trump officials involved in Iran policy, and Iranian-American community figures are likely current targets. These operations are IRGC-directed, professionally planned, and use both direct operatives and criminal contract killers.

Active Program
Coordinated Multi-Site Attack — Hezbollah-Directed

The lowest-probability but highest-consequence scenario: a Hezbollah Unit 910 orchestrated attack on multiple simultaneous targets inside the US, similar to the operational complexity that enabled the Buenos Aires bombings. Hezbollah has had US presence since the 1980s, including operatives who conducted reconnaissance in New York and Michigan (arrested in 2017). A successful coordinated attack would trigger massive domestic political upheaval, potentially accelerating the conflict. Unlikely — but not impossible — and the shifted deterrence calculus post-Khamenei makes it less unlikely than it was pre-February 28.

Low Prob / High Consequence

"Sleeper cells are a potential problem, and of course, there are extra resources being used to fight them. There's an effort to downplay it on the messaging side, but operationally, there is high alert to keep people safe."

Source close to the White House — NewsNation, March 10, 2026

Section III
THE HEZBOLLAH-CARTEL NEXUS — HOW IRAN BUILT INFRASTRUCTURE NEXT DOOR
Plain Language

Most Americans think of the drug cartels and Iran as completely separate threats. They are not. Over the past three decades, Hezbollah — Iran's main foreign proxy — built a sophisticated financial and logistics network across Latin America using the Lebanese diaspora (expatriate communities) in countries like Brazil, Argentina, Venezuela, and Colombia as a base. Hezbollah doesn't traffic drugs directly. Instead, it acts as the money launderer and financial facilitator for cocaine networks: cartels move the drugs, Hezbollah cleans the money and takes a cut that funds its operations in Lebanon and Iran. In Venezuela, this reached state level: the Maduro government's Cartel of the Suns — run by senior Venezuelan military officers — directly partners with Hezbollah, Tren de Aragua, and the Sinaloa Cartel. That network doesn't just move cocaine. It also moves people — including operatives — across the same border gaps that the cocaine crosses. The drug money funds terrorist operations. The trafficking routes carry more than drugs.

Tehran / IRGC
IRAN

Strategic direction and funding for Hezbollah global operations. IRGC provides training, weapons, doctrine, financial support to Hezbollah's external units. The Quds Force manages hemispheric relationships. Venezuela relationship formalized under Chavez / Maduro — advanced drone technology transferred to Caracas.

Hezbollah / Unit 910
FINANCIAL BRIDGE

Acts as financial facilitator and money launderer between Latin American drug networks and Iran. Uses Lebanese diaspora community institutions (mosques, schools, businesses) as cover. "They appoint imams, fund religious centers, control educational programs — through these networks, Hezbollah can interact with local cartels, sell drugs, and channel the profits back to Lebanon." (Citrinowicz, INSS)

Cartel de los Soles / Tren de Aragua / Sinaloa
US BORDER APPROACH

Cartel of the Suns (Venezuelan military-run, Maduro-led, US-designated FTO) coordinates with Tren de Aragua and Sinaloa Cartel. Tren de Aragua established presence across multiple US states. Sinaloa is the primary fentanyl trafficker into the US. Maduro's former spy chief has pleaded guilty and confirmed the operational links between all three organizations and Hezbollah.

The Hezbollah Latin America network is not a recent development — it has been building since the 1980s and has been the subject of repeated US Treasury sanctions, DEA investigations, and State Department designations. What has changed in recent years is its scale, organizational maturity, and the formalization of state backing through Venezuela. The DEA's Project Cassandra investigation (2015) documented the full scope of Hezbollah's "Business Affairs Component" — a dedicated financial crimes unit that launders narcotics proceeds through a global network of shell companies, money services businesses, used car dealerships, and free trade zones. The investigation found that Hezbollah's BAC had processed hundreds of millions of dollars annually in narco-proceeds, returning funds to Hezbollah's treasury in Lebanon and ultimately to Iran's IRGC Quds Force.

Venezuela is the geographic nexus of this network in the Western Hemisphere. Under Nicolas Maduro, Venezuela has become what the Foundation for Defense of Democracies calls "a forward operating base for China, Russia, and Iran in the Western Hemisphere." Maduro and senior Venezuelan officials personally lead the Cartel de los Soles — formally designated as a Foreign Terrorist Organization by the US State Department in late 2025. The Cartel provides material support to both Tren de Aragua and the Sinaloa Cartel. Maduro's former spy chief, General Hugo Carvajal, has pleaded guilty to narco-terrorism charges and confirmed that the relationship between Venezuelan state apparatus, Hezbollah, FARC, and Tren de Aragua is not merely symbiotic — it is operationally integrated. The cartel is not just a drug network. It is a state-embedded logistics hub for a broader anti-US axis that includes Tehran, Beirut, Caracas, and elements of the Sinaloa organization operating inside the United States.

The most concerning operational implication for the current conflict is simple: the same network that moves cocaine across the US southern border has the capacity and established routes to move people — operatives, weapons components, pre-positioned materiel — across the same border. Hezbollah's goal, in the words of former IRGC analyst Walid Phares, has been precisely to "get to the American and Mexican border." That goal is not aspirational. It has been substantially achieved. The question is whether the people who have crossed — in the estimated 1,750+ Iranian nationals who entered the US illegally during 2021–2024, or in the broader flow of "special interest aliens" from the Middle East flagged by Texas law enforcement — include activated operatives waiting for a signal like the one intercepted on February 28.

▶ The Narco-Terror Finance Loop

The cartel-Hezbollah financial relationship creates a self-sustaining loop: cocaine revenue flows through Hezbollah-controlled money launderers, the laundered proceeds fund IRGC operations globally, IRGC funding sustains Hezbollah's military capability, and Hezbollah's security umbrella protects the cartel routes from rivals and law enforcement. Disrupting one node tightens the others but does not break the system. The US maritime strike against a Venezuelan narco-vessel in September 2025 was characterized by retired DEA agent Brian Townsend as "a decisive blow against narco-terrorists" — but it was a single interdiction against a network that moves multiple shipments simultaneously across multiple routes.

The Congressional designation of Cartel de los Soles as a Foreign Terrorist Organization in late 2025 matters because it expands extraterritorial legal jurisdiction and criminalizes material support — including financial services. But designation does not disrupt physical infrastructure. The routes, the money-service businesses, the community institutions used as cover, and the established operational relationships between Hezbollah facilitators and cartel logistics managers continue to function regardless of their legal designation in Washington.


Section IV
THE INSTITUTIONAL GAP — FIGHTING A SOPHISTICATED THREAT WITH A DEGRADED APPARATUS
Plain Language

The United States has some of the best counterterrorism institutions in the world. The FBI's Joint Terrorism Task Forces, the CIA's Iran operations division, the DOJ's National Security Division, and DHS's intelligence fusion centers are genuinely capable organizations staffed by skilled professionals. What has changed in the past 14 months is that many of the most experienced people in these organizations have been fired, forced to resign, or sidelined as part of a broader effort to purge officials who were involved in investigations of Donald Trump. This is not a politically partisan observation — it is an operational fact with direct consequences for the current threat environment. The CI-12 unit that tracked Iranian spies inside the United States was hollowed just days before the war that activated those same networks. The DOJ National Security Division lost more than half its staff during a period when Iran was escalating. These are institutional vulnerabilities that sophisticated adversaries have already assessed and factored into their operational planning.

The FBI's CI-12 — the Washington, DC-based counterintelligence unit specifically dedicated to tracking Iranian threats on US soil — had approximately a dozen agents and staff fired by Director Kash Patel in the days immediately preceding the February 28 strikes. CNN reported on March 3 that the firings were motivated not by performance failures but by each individual's prior involvement in the Mar-a-Lago classified documents investigation. The operational consequences are straightforward: the unit that would normally be managing real-time tracking of suspected Iranian operatives, coordinating with foreign intelligence services on network mapping, and managing informant relationships within Iranian diaspora communities was depleted at precisely the moment it was most needed. Institutional knowledge about specific individuals, operational methods, and ongoing surveillance does not transfer overnight to replacements.

The DOJ National Security Division context is broader and more damaging. CNN's reporting indicates that the NSD — which prosecutes terrorism and foreign intelligence cases and coordinates between law enforcement and the intelligence community on national security threats — has lost more than half of its employees to firings and resignations since January 2025. The office specifically dedicated to counterterrorism has been particularly hard hit. Senior FBI officials who oversaw counterintelligence and international terrorism efforts have been pushed out. These are the officials who maintain the institutional memory of ongoing investigations, the relationships with foreign liaison services, and the prosecutorial expertise to turn intelligence collection into criminal cases that actually disrupt operational networks.

The DHS partial shutdown adds a third layer to the institutional gap. DHS coordinates the domestic threat picture across federal, state, and local law enforcement, runs the National Terrorism Advisory System, and operates the intelligence fusion center network that is supposed to connect local police departments to federal intelligence on emerging threats. A department operating under a 27-day funding gap, with hiring freezes, deferred contractor payments, and potential staff furloughs, is not operating at full capacity during the period of highest domestic threat in recent memory. Senator Ted Cruz and others have raised the specific concern publicly — that fighting Iranian sleeper cells while DHS is partially shut down is a structural risk that no amount of surge overtime can fully compensate for.

None of this means a major domestic attack is inevitable or even likely. The FBI and JTTF still have substantial capacity, state and local law enforcement are on elevated alert, and the most likely scenarios remain lone-actor and targeted-assassination threats rather than large coordinated attacks. But the calibration matters. The institutional degradation is not a partisan talking point — it is an operational reality that Iran's intelligence services have certainly assessed in their own planning. A sophisticated adversary adjusts its operations based on the perceived defensive capacity of its target. When the defensive capacity is visibly weakened — and when those weaknesses are reported in major US newspapers — the adversary's confidence in its own operations' survivability increases.

Domestic Threat Timeline — Key Events and Institutional Context
Jan. 2025 – Feb. 2026
DOJ National Security Division DepletedWaves of firings and resignations reduce NSD by 50%+. Senior FBI counterintelligence and international terrorism officials pushed out. Institutional capacity to track and prosecute foreign intelligence threats substantially degraded over 14 months.
~Feb. 24, 2026
FBI CI-12 Iran Tracking Unit HollowedDirector Kash Patel fires approximately 12 CI-12 agents and staff for their prior involvement in Mar-a-Lago documents investigation. Unit tasked specifically with tracking Iranian threats on US soil. Gutted days before Operation Epic Fury strikes on Iran activate those same networks.
Feb. 28, 2026
Activation Signal Intercepted — Nationwide Alert IssuedEncrypted shortwave number station broadcast intercepted shortly after Khamenei's death. FBI places CT teams on 24/7 alert. DHS issues bulletin warning of lone-wolf and cyber threats. Major city police departments surge patrols at diplomatic missions, religious institutions, and cultural centers.
Mar. 1, 2026
Austin Bar Shooting — Iran Sympathies FlaggedShooter Ndiaga Diagne wearing Iranian flag imagery kills multiple people at Austin bar. JTTF examines whether attack correlates with Iranian activation signals. Case under investigation — no confirmed IRGC direction established, but timing and suspect's documented Iran sympathies under scrutiny.
Mar. 3, 2026
CNN Reports CI-12 Gutting — Response Concerns RaisedCNN publishes confirmed reporting on CI-12 firings and DOJ NSD degradation. DOJ insiders express concern that counterterrorism and intelligence investigations in the wake of Iran operation could be hampered. Hezbollah networks described as still being actively monitored but with reduced personnel and institutional capacity.
Mar. 11, 2026
DHS Shutdown Enters 27th DayDemocrats block legislation to reopen DHS amid ongoing budget dispute. DHS operating under partial shutdown — coordination capacity, hiring, and operational resources constrained at the moment of the highest domestic threat elevation in years. Sen. Cruz publicly calls this "the danger posed by Iranian sleeper cells has never been higher."
Mar. 13, 2026
Ongoing Elevated Alert — No Confirmed Large-Scale PlotAs of today, no confirmed specific large-scale domestic plot has been publicly identified. FBI and JTTF describe themselves as "working 24/7." State and local law enforcement on sustained elevated posture. Intelligence community assesses threat as persistent and credible, with lone-actor and targeted-assassination risks most probable in near term.

Section V
THE HONEST CALIBRATION — SEPARATING SIGNAL FROM NOISE

The domestic threat landscape is genuinely elevated. It is also genuinely susceptible to manipulation — by politicians seeking to justify policy, by media outlets chasing engagement, and by adversaries who benefit from creating fear disproportionate to actual capability. The responsible analysis requires holding both truths simultaneously: the threat is real and the institutional capacity to address it has been meaningfully degraded, and the most likely scenarios are substantially less catastrophic than the worst-case framings in circulation.

What is confirmed and consequential: MuddyWater pre-positioned inside US networks. An activation signal intercepted. CI-12 gutted days before it was most needed. DOJ NSD depleted. DHS partially shutdown. 18+ Iran-linked plots neutralized since 2020 — demonstrating both the existence of operational capability and the intelligence community's ability, when intact, to detect and disrupt it. Hezbollah-cartel narco-financial integration providing established logistics infrastructure near the US border. Tren de Aragua operating inside multiple US states. These are facts, not speculation.

What is contested or uncertain: Whether the intercepted activation signal has produced actionable operative mobilization. Whether any specific plot against a specific US target is currently in execution. Whether Hezbollah would authorize a mass-casualty attack on US soil given the escalatory risk — even with the changed deterrence calculus post-Khamenei. Iranian analyst Rayan Amiri, himself an Iranian refugee and opponent of the regime, offered a calibration that security analysts broadly endorse: "The sleeper cells linked to the Islamist regime in Iran do exist, but their real scope is far smaller than the terrorist regime claims." Tehran uses the threat of activated networks as a psychological tool — a way of imposing fear and constraint on US policy without necessarily needing to act. The threat and the actual capability are not the same thing.

The most honest summary of the current domestic security picture is this: the probability of a large, coordinated, mass-casualty domestic attack remains low. The probability of a targeted assassination, a lone-actor incident, a cyber attack on critical infrastructure, or a criminal-proxy facilitated attack is meaningfully elevated and rising. The institutional capacity to prevent, detect, and disrupt these threats has been weakened at an inopportune moment. The Hezbollah-cartel infrastructure represents a latent operational capacity that was concerning before the war and is more concerning now. And none of this is being managed with the full institutional resources that would normally be available — because those resources were deliberately reduced in the months before the war that activated the threat.

Why the Changed Deterrence Calculus Matters

Iran historically weighed domestic US attacks as too escalatory — the risk of triggering a full US military response outweighed the benefit. That calculus assumed Iran had more to lose than to gain. Post-February 28, with the regime under existential military pressure, nuclear infrastructure struck, and Supreme Leader killed, the cost-benefit calculation is different. A regime in extremis may accept escalatory risks it would have rejected when stable. This is the structural shift that makes the current threat elevation qualitatively different from prior Iran threat warnings.

Tren de Aragua Inside the US

Tren de Aragua, now a US-designated Foreign Terrorist Organization with confirmed Hezbollah-Venezuela state backing, has established presence across multiple US states — documented in federal prosecutions in Texas, Virginia, New York, and other states. TDA's US network was built through illegal border crossings during 2021–2024. It exists primarily for criminal extortion and trafficking — but its established US presence and Venezuela-Hezbollah connections make it a potential facilitation network for a threat that uses criminal cover for intelligence purposes.

The Psychological Warfare Dimension

Iran benefits from the threat of sleeper cell activation even if no cells actually act. The fear of attacks forces resources toward domestic security, diverts political attention from the military campaign, creates domestic pressure for ceasefire negotiations, and degrades social cohesion. Transmitting the activation signal — knowing it would be intercepted — may itself be the operation. The signal produces the desired effect (public alarm, resource diversion, political pressure) without requiring a single operative to pull a trigger. Calibrate accordingly.

The Resilience of Federal Law Enforcement

Despite institutional degradation, the FBI and JTTF retain substantial capability. The surge posture across major city police departments is real and effective for visible target hardening. CISA's critical infrastructure warnings have activated private sector security operations centers. The intelligence community, even depleted, is vastly better equipped to detect and disrupt Iranian operations than at any prior point in history. The degradation is serious. It is not total. And the adversary knows that attacking the United States carries risks that have not been eliminated.

⚠ The Core Risk of Section 24

The domestic threat from Iran-linked networks is elevated, real, and operating against a degraded institutional defense. The activation signal intercepted on February 28 may be psychological warfare, preparation, or a genuine mobilization order — current intelligence cannot definitively distinguish between these possibilities, which is itself the operational problem. The Hezbollah-Venezuela-cartel infrastructure provides a functioning logistics network that reaches the US border, has demonstrated people-movement capability, and has established US-based networks through Tren de Aragua and Hezbollah diaspora community penetration. The most likely near-term threats are targeted assassinations, lone-actor incidents, and criminal-proxy facilitated attacks on soft targets — not a large coordinated mass-casualty operation. But the CI-12 gutting, the DOJ NSD depletion, and the DHS partial shutdown have reduced the institutional capacity to detect and disrupt even the more modest threat scenarios. The combination of an activated adversary and a degraded defender is the core vulnerability of this fault line. It is the one that deserves the closest watch between now and any ceasefire.


Section VI
THE CJNG QUESTION — SIX DAYS, ALL 50 STATES
The Question Nobody Is Asking Loudly Enough

On February 22, 2026 — six days before Operation Epic Fury launched against Iran — the United States provided the intelligence that led to the killing of El Mencho, the founder and supreme leader of the Jalisco New Generation Cartel. They didn't help take down the Sinaloa Cartel, which is larger by revenue. Not the Gulf Cartel. Not MS-13 or Tren de Aragua. They chose CJNG — the most militarized criminal organization in the Western Hemisphere, with documented financial ties to Hezbollah, a paramilitary command structure modeled on special operations doctrine, and confirmed operations in all 50 US states. Six days later, the US went to war with Hezbollah's patron. Whether the CJNG strike was strategic preemptive positioning or coincidental timing, the question demands scrutiny. The alternative reading — that the US deliberately disrupted the command structure of the cartel most capable of domestic operational activation, before activating the threat environment that would give that cartel a motive to act — is not a conspiracy theory. It is a rational intelligence assessment.

CJNG is not simply a drug trafficking organization. It is more accurately described as a paramilitary criminal state that controls territory, collects taxes, administers populations, maintains military hardware, and projects force with capabilities that rival small national armies. The DEA confirms it possesses armored vehicles, surface-to-air missile launchers, rocket-propelled grenades, explosive-carrying drones, and .50-caliber Barrett rifles capable of downing military helicopters — as demonstrated in 2015 when CJNG shot down a Mexican Army Cougar helicopter in Jalisco. It has a dedicated special operations group, a strict professional hitman training program, and has fought coordinated multi-state military campaigns against Mexican government forces and rival cartels simultaneously. In March 2025, volunteers searching for missing relatives discovered a CJNG facility outside Guadalajara containing three cremation ovens, 200 pairs of shoes, and hundreds of bone fragments — a facility that functioned as a school for forced recruitment, torture, and desensitization to killing. A Science magazine study estimated CJNG has between 18,000 and 35,000 people under operational control. The Pentagon-briefed JITC-CC director specifically noted that CJNG movements "were unlike those of the Islamic State or al-Qaeda" — meaning their tactical sophistication exceeded conventional terrorist organizations in key respects.

The Iran-Hezbollah dimension of CJNG's network is documented but systematically underreported. Hezbollah has operated across Latin America since the 1980s, using Lebanese diaspora communities as cover for its narco-financial network. The Brookings Institution documented the emerging possibility of a direct Hezbollah-CJNG partnership that would allow cocaine and methamphetamine to flow into Middle Eastern markets while returning proceeds to Hezbollah's treasury and Iran's Quds Force. CJNG's financial arm, Los Cuinis, uses Chinese Money Laundering Networks (CMLNs) — the same financial architecture Iran's IRGC exploits to move money around US sanctions. Canada's February 2025 FTO designation of CJNG specifically noted its links to FARC and the ELN — both organizations with confirmed Hezbollah operational partnerships going back decades. The connection runs: Iran → Quds Force → Hezbollah → Latin American narco-finance → CJNG money-laundering infrastructure → US financial system.

The fact that gives the timing its full strategic weight: CJNG associates, facilitators, and affiliates operate in almost all 50 US states. The DEA states this explicitly in its public cartel profiles. No other cartel has achieved this national penetration. CJNG's franchise model — regional affiliates operating under the CJNG brand in exchange for operational coordination and revenue-sharing — means the organization functions as a distributed network embedded in every major US metro and many rural trafficking corridors. Every US state has CJNG-affiliated individuals who know each other, have established logistics infrastructure, move people and money across borders, and are connected to a global criminal enterprise with paramilitary capabilities and, through the Hezbollah financial network, documented ties to Iran's intelligence apparatus. That is the infrastructure that existed, in all 50 states, on February 27, 2026. And then the war started.

The Six-Day Window — February 14 to February 28, 2026
Feb. 14, 2026
Largest US Middle East Buildup Since 2003 BeginsPentagon positions aircraft carriers USS Abraham Lincoln and USS Gerald R. Ford, B-2 bombers, and strike packages. By Feb. 19, described as the largest US military positioning in the Middle East since the Iraq invasion. Iran and every regional intelligence service understand what this means.
Feb. 22, 2026
El Mencho Killed — US Intelligence the Decisive FactorMexican Army raids Tapalpa Country Club, Jalisco. JITC-CC Director Brigadier General Calabrese confirms US intelligence "mapped cartel presence and provided intelligence on CJNG movements." El Mencho wounded in firefight, dies en route to Mexico City. Eight CJNG members killed. The leader of the most militarized cartel with Hezbollah financial ties and a 50-state US footprint is dead — six days before the US goes to war with Iran and Hezbollah.
Feb. 22–27, 2026
CJNG Retaliates Nationwide — 252 Blockades, 25 National Guard KilledCJNG demonstrates its power within 24 hours: 252 coordinated roadblocks across multiple states, 25 National Guard deaths, curfews imposed in multiple cities, Guadalajara — population 5 million — becomes a ghost town. Schools closed across several states. This is CJNG's response to losing its leader in Mexico. The same distributed, coordinated capacity exists in every US state where CJNG has affiliate presence.
Feb. 25–27, 2026
Iran Claims Peace "Within Reach" — Oman FM Announces BreakthroughIranian FM Araghchi calls a nuclear deal "within reach." Oman's FM announces Iran has agreed to never stockpile enriched uranium and to accept full IAEA verification. Six hours after the "breakthrough" announcement, the bombs fall. This is not unusual. Whether the diplomacy was genuine or tactical, the bombs fell anyway.
Feb. 28, 2026
Operation Epic Fury — 900 Strikes, Khamenei Killed, Activation Signal InterceptedNearly 900 strikes in 12 hours. Khamenei killed. IRGC command gutted. Hezbollah opens a second front in Lebanon. Encrypted shortwave activation broadcast intercepted, believed to reach clandestine operatives globally. FBI elevates all Iran-linked threat assessments. The cartel most connected to this network, with affiliates in all 50 US states, had its command structure decapitated exactly six days earlier.
CJNG US State Footprint
All 50
DEA confirmed: "CJNG associates, facilitators, and affiliates operate in almost all 50 US states." No other cartel has achieved this national penetration. Franchise model embeds CJNG infrastructure into every major US metro and hundreds of rural trafficking corridors.
CJNG Estimated Personnel
18K–35K
Science magazine study. Most militarized cartel in existence. Dedicated special operations unit. Paramilitary training camps. IEDs, RPGs, armored vehicles, explosive drones used in military-grade engagements against Mexican Army forces.
Days: El Mencho Kill to Epic Fury
6
Feb 22: US intelligence enables El Mencho's death. Feb 28: US strikes Iran. The cartel with Hezbollah financial ties and all-50-states US presence had its command structure disrupted exactly six days before the war that activated every Iran-linked threat network globally.
Countries CJNG Operates In
40+
Global presence confirmed in 40+ countries. CJNG's international network creates financial and logistics corridors that directly overlap with Hezbollah's global criminal operations — particularly in narco-finance and money-laundering architecture.

The succession chaos following El Mencho's death is itself a threat variable. El Menchito is serving life plus 30 years in a US federal prison. El Pelon, El Doble R, El Jardinero, and El Sapo are now competing for control. Historically, cartel decapitation operations produce 3–5 years of elevated violence as factions fight for territorial control. But CJNG's franchise model means regional commanders can operate independently without central direction for extended periods. The death of El Mencho does not eliminate CJNG's US operational infrastructure. It throws the organization's command-and-control into transition precisely when the threat environment created by Operation Epic Fury would make that infrastructure most valuable to Iran as a potential proxy activation network.

A destabilized CJNG, with veteran commanders competing for territory and resources and its US affiliate network suddenly lacking clear central direction, is in some ways a more unpredictable domestic threat than a stable CJNG under El Mencho's control. This is the paradox of preemptive decapitation against a distributed franchise network. Whether the administration executed the CJNG strike as deliberate preemptive homeland security positioning — or arrived at the same result through parallel counternarcotics decision-making — the operational consequence is identical: the most capable Iran-adjacent domestic threat network in the United States had its command structure disrupted six days before the threat environment changed fundamentally.

▶ What CJNG's Retaliation Pattern Signals for US Domestic Risk

CJNG's response to El Mencho's death was immediate, coordinated, and national in scope. Within hours: 252 coordinated blockades, 25 National Guard deaths, curfews imposed on civilian populations, a major city paralyzed. This is not criminal activity in any conventional sense. This is insurgent operational doctrine — distributed cells, franchise-model coordination, simultaneous multi-site execution across a wide geography. The same organizational capacity exists in every US state where CJNG has affiliate presence.

Hezbollah doesn't need CJNG to commit ideological terrorism. It needs CJNG to move things — people, materials, money — through its established US infrastructure. The Hezbollah-cartel relationship is primarily logistical and financial, not ideological. And logistics relationships are precisely what an Iran-linked activation network needs in a country where it has no other established domestic logistics infrastructure. The drug routes carry more than drugs. They always have. That is the core vulnerability of the CJNG-Hezbollah nexus in the current threat environment: it is not a partnership of ideology but one of operational necessity, and necessity is a more durable motivation than ideology.


Section VII
SARAH ADAMS — THE ANALYST WHO WOULDN'T STAY QUIET
On "Former" Intelligence Officers

There is no such thing as a truly former intelligence officer. The tradecraft, the source networks, the analytical frameworks, the clearance-adjacent relationships — these don't disappear when someone leaves. Sarah Adams left the CIA, then led DoD R&D programs, then served as Senior Advisor to the House Select Committee on Benghazi (with direct access to classified briefings for years), then ran an ongoing open-source Al-Qaeda investigation that got her reprimanded by the Pentagon for sharing intelligence outside proper channels. Her CIA call sign was "Superbad." She was in Benghazi the day of the 2012 attack — she flew to London for a meeting that morning. What she describes is not analysis. It is targeting.

Adams (former CIA targeting officer and national security analyst, former Senior Advisor to the House Select Committee on Benghazi) has been running a continuous intelligence briefing since at least 2023 — most prominently through the Shawn Ryan Show and then, in 2024 and 2025, through broader platforms including Homeland Security Today. Her claims have been controversial and unverified in parts. They have also been repeatedly validated by subsequent events, corroborated in substance by government testimony, and proven to anticipate attack patterns before they occurred.

Since at least 2023, Adams has been delivering what amounts to a running intelligence briefing on the specific attack plans, methodologies, and target profiles of Islamic jihadist sleeper networks inside the United States. Most prominently through the Shawn Ryan Show (which reaches a large national security audience), and then in 2024 and 2025 through broader platforms including Homeland Security Today and major podcast networks. Her claims have been controversial, unverified in parts, and dismissed by some in national security circles. They have also been repeatedly validated by subsequent events, corroborated in substance by government testimony, and proven to anticipate attack patterns before they occurred. The honest assessment is not "believe everything Adams says" or "dismiss her as alarmist." It is that she has been more specific and more accurate about domestic jihadist threat architecture than most official government communications — and the evidence supporting her core framework has accumulated consistently since 2024.

Her central intelligence product describes a coordinated multi-organization plot she contends has been in active development since December 2021, led by Hamza bin Laden — whom the US government claims was killed in 2019, but whom Adams asserts is still alive and serving as Al-Qaeda's current Emir — with support from his brothers and Saif al-Adel. The plot involves coordinating attackers from multiple jihadist organizations — ISIS, Al-Qaeda, AQAP, Al-Shabaab, Taliban elements — into multinational mixed cells of five to ten people each. These cells entered primarily through the Darien Gap, the overland route through Central America that has become the primary irregular pathway for migrants from the Middle East, Africa, and South Asia into the Western Hemisphere. The goal: position all attackers inside the United States for a coordinated, simultaneous, multi-city attack that she characterized in September 2025 as potentially "three times 9/11."

What makes Adams' warnings specifically significant is not any claim to active CIA role. It is that she has been describing a specific, detailed operational picture that has found subsequent corroboration at every significant juncture. Her December 2024 warning about vehicle-based attacks and lone-actor activations preceded the New Orleans Bourbon Street attack (15 killed, January 1, 2025) by less than a month. Her framework about the number of Al-Qaeda-trained fighters on US soil — 1,000-plus in her 2024 estimate — was followed by NCTC Director Kent's December 2025 congressional testimony confirming 18,000 known and suspected terrorists in the country. The NCTC itself issued an operational warning about heightened Al-Qaeda and ISIS domestic attack risk at nearly the same time Adams was describing the threat publicly. The pattern is not coincidence. It is a signal.

The Invisible Bomb

Adams describes an explosive device Al-Qaeda has developed that defeats both standard magnetometers and K9 detection units trained on conventional explosive signatures. "We have not had a man walk up to a building with a suicide vest on the United States. Americans don't understand this. Al-Qaeda knows this. So this is new and innovative — you don't have to walk up to the side of the building. You can walk into the building because of the advancement of the vest." The structural significance: virtually every US soft-target security protocol is built around magnetometer screening as its final defensive layer. An undetectable device eliminates that layer at every airport, stadium, courthouse, transit hub, and mass venue simultaneously.

The Fedayeen Model

"The concept is the terrorist fights to the death. He is not a suicide bomber, but he will fight until either all of us are dead or all of his people are dead." US law enforcement active-shooter protocols assume most attackers can be stopped, wounded, or will eventually surrender or flee. Fedayeen attackers — as demonstrated in the 2008 Mumbai attacks, where 10 men held a city of 18 million hostage for 60 hours and killed 166 people — continue fighting through wounds, police containment, and tactical reverses until they are killed. American first responders have no large-scale fedayeen response doctrine. This is not a doctrinal gap that can be filled quickly.

Multi-City Simultaneous Swarming

The attack template Adams describes is simultaneous swarming across multiple cities, modeled on Mumbai 2008 and October 7, 2023. The operational significance: US mutual-aid response doctrine relies on neighboring jurisdictions providing backup to overwhelmed cities. A simultaneous attack in multiple cities eliminates mutual aid — every city is overwhelmed at the same time. Federal emergency response (FEMA, National Guard) requires a declaration and mobilization window that takes hours. The attack window exploits exactly that gap in response capacity.

12 Simultaneous Airliner Attacks

Adams has specifically described a simultaneous aviation threat involving 12 commercial aircraft targeted in a single coordinated wave. This is not a hypothetical; it echoes Al-Qaeda's 1995 Bojinka plot, which envisioned simultaneous detonation on 11 transatlantic flights. The psychological and economic consequences of even 3–4 simultaneous aircraft incidents would exceed 9/11 in aviation industry disruption and public behavior change. The US aviation security apparatus is optimized for one or two incidents, not a coordinated multi-aircraft simultaneous attack.

Cell Formation via Family Marriage

Adams describes a cell formation methodology that is nearly impossible to detect: operatives build deep cover by marrying into local diaspora communities over years or decades before activation. These individuals generate no suspicious communications, no suspicious financing, no suspicious behavioral patterns. The cover is established at a fundamental social level — family ties, property ownership, employment, children in school — that makes standard counterintelligence profiling essentially blind. The only way to detect these individuals is through human intelligence inside the communities themselves, or through the rare operational communications that precede activation.

The Darien Gap Pipeline

Adams specifically flagged the Darien Gap — the lawless jungle passage between Colombia and Panama — as the primary entry route for jihadist fighters entering the Western Hemisphere. During 2021–2024, approximately 700,000 migrants per year crossed the Darien Gap, including a significant and documented number of "special interest aliens" from Middle Eastern, South Asian, and African countries flagged by counterterrorism analysts. The FBI has confirmed that the New Orleans attacker's ISIS connections were established through networks that operate partially through this corridor. The Darien Gap is not a border security problem. It is a counterterrorism problem disguised as one.

"I know for sure Al-Qaeda has a massive terror attack planned. It's going to be multi-city, it's going to be a swarming attack — like we saw with the Mumbai bombings and the Hamas attacks. The thousand fighters is all of them, so we're calling it an Al-Qaeda-designed attack. But within those thousand terrorists, some of them are ISIS."

Sarah Adams, former CIA Targeting Officer — The Shawn Ryan Show, December 2024

Adams' September 2025 appearance on the Clay Travis and Buck Sexton Show, titled "Three Times 9/11," updated her intelligence product with new specifics: the attack had evolved to target 12 airliners simultaneously, had expanded its cell structure through family marriage networks in ways that make traditional HUMINT more difficult, and had exploited what Adams described as America's own evacuation pipelines — the operational channels, including the chaotic Afghanistan withdrawal, that inadvertently provided cover for the movement of operatives who presented as allies, refugees, or translators. The "three times 9/11" characterization was not about body count prediction — it was about the scale of simultaneous coordination that Adams assessed the plot had achieved.

The critical operational question is whether Adams is describing a plot that is real and imminent, a plot that is real but chronologically uncertain, or a framework that is accurate in structure but potentially inflated in specificity. The honest answer is: the government's own behavior is consistent with the first two interpretations. The NCTC Director is testifying about 18,000 terrorists in the country. The NCTC issued an explicit Al-Qaeda/ISIS attack warning. The FBI is running its counterterrorism assets at 24/7 capacity. The DHS threat bulletin after February 28 explicitly cited the possibility of coordinated multi-site attacks. The official threat posture is consistent with Adams' operational picture, even if official communications are more circumspect about specifics. The government knows what it knows. What it says publicly is a different calculation.

⚠ The Adams Pattern — What Preceded New Orleans

On December 28, 2024, Sarah Adams appeared on the Shawn Ryan Show and warned specifically about: IRGC homeland attack in retaliation for Soleimani; 1,000+ terrorists already positioned in the US; vehicle-borne IED attacks (VBIEDs) as a likely attack vector; "invisible bombs" undetectable by magnetometers; and sleeper cell activation. Four days later, on January 1, 2025, Shamsud-Din Jabbar drove an F-150 truck into a crowd on Bourbon Street in New Orleans, killing 15 people. The attack matched the vehicle-borne attack vector Adams described almost exactly. The ISIS flag in his vehicle, the pre-recorded videos pledging allegiance, and the apparent coordination with a Tesla Cybertruck IED at Trump's Las Vegas hotel all fit the operational template Adams had been describing. Whether her specific prediction caused the attack to be in that form is unknowable. What is knowable is that she described the attack methodology before it happened, and it happened.


Section VIII
18,000 — THE NUMBER CONGRESS HEARD
Plain Language

On December 11, 2025, NCTC Director Joe Kent testified before the House Homeland Security Committee. The number he put on the record: approximately 18,000 "known and suspected terrorists" entered the United States under the previous administration — individuals with documented ties to ISIS and Al-Qaeda who "under normal circumstances would never be allowed to enter our country." Then he said this: "The number one threat that we have right now is the fact that we don't know who came into our country in the last four years." The 18,000 is only the ones they can positively identify. It does not include the unknown number who crossed illegally.

Kent's December 11 testimony before the House Homeland Security Committee was the most consequential public terrorism briefing since the post-9/11 threat assessments. It was delivered alongside DHS Secretary Kristi Noem and FBI National Security Branch Operations Director Michael Glasheen. The three officials presented a threat picture that, taken together, amounts to a comprehensive indictment of the domestic security architecture that was constructed — or more accurately, dismantled — during the previous administration's four years. But the NCTC director's specific number is the one that carries operational weight: 18,000 known and suspected terrorists, in the country, right now, who entered under the Biden administration.

Kent was precise about what 18,000 means and does not mean. These are individuals NCTC positively identified through its database of known and suspected terrorists — people who appeared in intelligence reporting, watchlists, foreign partner databases, or other derogatory holdings before or shortly after arriving in the US. They include approximately 2,000 Afghans brought to the US under Operation Allies Welcome, the Biden-era program that resettled more than 88,000 Afghans following the disastrous withdrawal. Of those 88,000, Kent testified that 2,000 have been identified as having ties to terrorist organizations. He noted the vetting process was functionally impossible: proper vetting required 18 months to two years. Biden's program compressed that timeline to days or weeks. "Biden threw all of that out the window," Kent testified.

The remaining approximately 16,000 known and suspected terrorists in the country entered through various legal pathways — refugee programs, visa applications, asylum requests, parole programs — during a period when immigration screening systems were under maximum stress and when the administration had removed multiple layers of vetting requirements that prior administrations maintained. Kent's 18,000 figure explicitly excludes a separate and significant category: the unknown number who crossed the southern border illegally. During 2021–2024, an estimated 2–2.7 million individuals from countries lacking reliable documentation entered the United States — a figure Kent cited in his testimony. The subset of that number who may have terrorism ties but cannot be positively identified is, by definition, unknown. Kent was explicit: "The number one threat that we have right now, in my view, is the fact that we don't know who came into our country in the last four years of Biden's open borders."

Known & Suspected Terrorists Entered Under Biden
18,000
NCTC Director Kent testimony, December 11, 2025, House Homeland Security Committee. These individuals would "under normal circumstances never be allowed to enter" due to ISIS/Al-Qaeda ties. None were properly vetted. This figure excludes those who crossed the border illegally.
Afghan Arrivals with Terrorism Ties
2,000
Of 88,000 Afghans admitted via Operation Allies Welcome, 2,000 confirmed ties to terrorist organizations. Vetting was described by Kent as a "ruse." The Thanksgiving 2025 attack on National Guard members near the White House was carried out by one of these Operation Allies Welcome arrivals.
Narco-Terrorists Added to Terror Screening Dataset
35,000
NCTC added approximately 35,000 narco-terrorists to the federal Terrorist Screening Dataset (TSDS) after the Trump administration's FTO designations of CJNG, Sinaloa, MS-13, Tren de Aragua, and other cartels in February 2025. These are on top of the 18,000 jihadists.
KSTs Apprehended — FY2025 Record
4,011
Record high known and suspected terrorist (KST) apprehensions in FY2025. The previous record was 1,903 under the Biden administration. The dramatic increase reflects both the new FTO designations (cartels now classified as terrorists) and increased screening capacity under the Trump administration.

The operational consequence of 18,000 known terrorists in the country is not 18,000 active plots. Most of these individuals have no active operational tasking, no handler contact, and no current plot to execute. Radicalization is not the same as operational activation. Presence is not the same as mobilization. The distinction between a person who has ties to a jihadist group and a person who is planning an attack tomorrow is the core challenge of domestic counterterrorism — and it requires continuous, well-resourced intelligence and law enforcement work to maintain. The problem Kent was articulating is not that 18,000 attacks are imminent. It is that the intelligence and law enforcement community cannot adequately monitor, assess, and disrupt potential operational activity from 18,000 individuals with terrorism ties — not with the degraded institutional capacity described in Section IV, not with the FBI CI-12 unit gutted, not with the DOJ National Security Division at half-strength, and not with DHS operating under a partial shutdown.

The Thanksgiving 2025 attack is the operational proof of concept. Rahmanullah Lakanwal, 29, arrived in 2021 through Operation Allies Welcome. He was vetted to serve as a soldier in Afghanistan — a tactical-level vetting that, as Kent testified, the Biden administration treated as sufficient justification for permanent US residency. On November 26, 2025, Lakanwal allegedly opened fire on two National Guard members near the White House. Army Specialist Sarah Beckstrom, 20, died from her injuries the following day. Staff Sergeant Andrew Wolfe, 24, remains in critical condition. Lakanwal faces first-degree murder charges. He was one person, from a pool of 2,000 Afghans with identified terrorism ties — and a pool of 18,000 total known and suspected terrorists whose whereabouts, current radicalization status, and operational intentions the NCTC, FBI, and DHS are now working to assess simultaneously.

The mathematics of the problem are unforgiving. If 1% of 18,000 known and suspected terrorists are actively operational at any given moment, that is 180 active threat subjects. If 0.1% are at advanced planning stages for an attack, that is 18 potential active plots. The FBI's counterterrorism capacity, even at full strength, can maintain intensive surveillance and active case management on perhaps several dozen subjects simultaneously. The gap between the threat population and the investigative capacity to assess it is the operational environment the United States is operating in as Operation Epic Fury continues, Hezbollah activation signals are intercepted, and CJNG successor factions compete for control of the cartel's all-50-states US infrastructure. This is not a theoretical threat landscape. It is the actual one. As of March 13, 2026.

"So far, NCTC has identified around 18,000 known and suspected terrorists that the Biden administration let come into our country. These are individuals who, under normal circumstances, would never be allowed to enter our country because of their ties to jihadist groups like ISIS and al-Qaeda. Yet the Biden administration not only let them into the country — in many cases, facilitated their entry."

NCTC Director Joe Kent — House Committee on Homeland Security, December 11, 2025
The Vetting Collapse

Standard vetting for high-risk immigration applicants required 18 months to 2 years: background checks against intelligence community databases, foreign partner queries, biometric enrollment, interview, financial records review. Operation Allies Welcome compressed this to days. Kent's testimony: "Biden threw all of that out the window." The tactical-level vetting used for Afghan soldiers — sufficient to carry an AK-47 alongside US forces in Helmand Province — is categorically insufficient for permanent US resettlement of someone from a country with dense terrorist organizational presence.

The "Known" Qualifier

The 18,000 figure represents individuals NCTC positively matched to existing derogatory intelligence — people who already appeared in watchlists, intelligence reports, or foreign partner databases. Kent explicitly stated the figure excludes the unknown number who crossed the southern border illegally. During 2021–2024, an estimated 2–2.7 million individuals from countries without reliable documentation entered the US. The subset with terrorism ties who cannot be positively identified is, by definition, uncountable. "The number one threat is the fact that we don't know who came into our country in the last four years," Kent said.

The Thanksgiving Attack as Proof of Concept

Rahmanullah Lakanwal arrived through Operation Allies Welcome in 2021. He was "vetted" to carry a weapon alongside US forces. On November 26, 2025, he allegedly shot two National Guard members near the White House. Army Specialist Sarah Beckstrom, 20, died. This was one person from a pool of 2,000 Afghan arrivals with identified terrorism ties. It is the proof of concept for what 18,000 represents: not 18,000 simultaneous attacks, but 18,000 potential vectors that require investigative attention the degraded counterterrorism apparatus is struggling to provide.

The 35,000 Narco-Terrorist Add

The 18,000 jihadist figure is separate from the 35,000 narco-terrorists Kent said NCTC added to the federal Terrorist Screening Dataset after the Trump administration's February 2025 FTO designations of cartels including CJNG, Sinaloa, MS-13, and Tren de Aragua. These 35,000 represent individuals affiliated with organizations now legally classified as terrorist groups operating inside the United States. The combined number — 18,000 jihadist-linked + 35,000 narco-terrorist-linked — represents the formal known threat population that US counterterrorism and law enforcement is now tasked to monitor, investigate, and disrupt. With a degraded institutional apparatus. During an active war with Iran. While CJNG succession chaos unfolds.

⚠ The Convergence Point of Section 24

Three separate threat streams are converging in real time as of March 13, 2026. First: 18,000 known jihadist-tied individuals inside the country, positioned over four years through a collapsed vetting process, now operating in an activated threat environment following Operation Epic Fury and the intercepted Hezbollah activation signal. Second: CJNG — the most militarized, most domestically penetrated, most Hezbollah-adjacent cartel in existence — in succession chaos after losing its leader six days before the war started, with its franchise affiliates present in all 50 states and its logistics infrastructure overlapping with Hezbollah's people-and-money movement network. Third: a CIA targeting officer has been publicly and specifically describing the attack methodology, target profile, and operational architecture of the jihadist network for years — describing tools (the invisible bomb, the fedayeen model, the swarming attack) that US law enforcement has no scale response doctrine for. These three streams do not require coordination to converge. The threat environment created by the war activates all of them simultaneously. The institutional apparatus that would normally manage this threat — CI-12, the DOJ NSD, fully-funded DHS — has been deliberately degraded at the moment of maximum need. This is the convergence point this section has been documenting from the beginning. It is happening now.