This blog discusses the strategic relationship between terrorism funding and global energy dependency, particularly focusing on how renewable energy can undermine the financial streams that support terrorist activities. It explains that much of the world’s terrorism is financed by revenues from fossil fuels, which are often controlled by regimes or groups with vested interests in maintaining energy monopolies. By shifting to renewable energy sources, countries can reduce their reliance on oil and gas imports from these regions, thereby cutting off significant funding channels for terrorism. The blog elaborates on various renewable technologies such as solar, wind, and bioenergy, which not only promise to diversify energy portfolios but also empower nations with self-sufficiency, reducing geopolitical vulnerabilities. It calls for international cooperation in energy transition policies, emphasizing the dual benefits of enhancing global security and promoting environmental sustainability. The narrative makes a compelling case for viewing renewable energy investment as a critical component of national security strategies, proposing that such a shift is not just economically sound but essential for global stability.
Introduction
Sun Tzu said “To fight and conquer in all your battles is not supreme excellence; supreme excellence consists in breaking the enemy’s resistance without fighting.”
Imagine if a country decided that the number one impediment to its ambitions for power is America. But a direct attack is not yet possible. The longer view is required, patience is a virtue.
How do you win a war with America without fighting? Will the powerful U.S. military see it coming and rage against it? What is this unbeatable strategy that might take us down? In fact, the strategy goes back to ancient times, the same method alluded to above in Sun Tzu’s original work back in the 5th century BC.
Psychology. In this sense, it means instilling fear, doubt, lack of confidence, dissent, weakness.
Psychology is a powerful tool, its methods for war include propaganda, terrorim (an attack but not a direct one, and designed for psychological impact), nefarious business methods (e.g.dumping), anonymous cyberattacks.
Energy is wealth. And like every other kind of wealth, it is fought for by nations, coveted by and denied to enemies. Americans have taken reliable energy for granted for several generations, it runs our society, provides heat, food, cars, houses, everything we own. And Americans deep in their hearts realize that a lack of energy means chaos and loss of life on a nationwide scale. Lack of energy means no gasoline, no food shipments, no water, no heating or air conditioning, no job, no paycheck, and only two days worth of food in your refrigerator. We don’t panic at an temporary accidental outage, but a direct attack strikes fear in the hearts of men (and women, too!).
See the connection?
Our goal is to study security threats to renewable energy, but without an understanding of the environmentals those threats are impossible to understand.
This article provides a narrow focus to examine a specific type of risk: international asymmetric warfare, more commonly known as terrorism, targeting renewable energy infrastructure. Keep in mind that we have seen relatively little terrorism in the U.S. since 9/11 and these considerations are not top of mind for most people. But we have serious adversaries in the world, and free societies are always the most vulnerable.
We will deliberately exclude discussions on cyberthreats and will not address issues specific to the oil and gas industry, concentrating instead on the physical threats to renewable sources. These threats represent just a piece of the complex risk puzzle endangering America’s power grid. As the grid expands and becomes more complex, the problem of security expands geometrically.
This analysis exemplifies the educational and advisory initiatives championed by the Financial Policy Council (FPC). The FPC (https://financialpolicycouncil.org/ ) is committed to delivering unfiltered insights and impartial assessments regarding the risks of terrorism and other significant threats confronting America. With a clear and determined approach, the FPC emphasizes the importance of addressing these critical issues, underscoring its dedication to promoting security and stability through informed policy recommendations.
A Game Theoretic Approach
This perspective is informed by my previous tenure at the Central Intelligence Agency, where part of my role involved working in counterterrorism. It should be noted that information and perspectives provided in this article are derived from unclassified work and my personal perspectives and contains nothing from the classified realm.
This work has a slight bent toward game theoretical analysis, defining the adversary and the rules under which the topic is to be analyzed. The resulting information becomes more clear and by “gaming” the estimates that we have made as new information comes in, we can prepare better for possible attacks.
The Adversary
To build our scenario, let’s choose an adversary, one that might exist if we knew how to look, we will call them the “XiComms” (after Chinese President “Xi” who is a “communist”). Keep in mind that we are not at war at the moment, but as military planners will tell you, we must deal in “capabilities” and leave “intentions” to the politicians.
Fact: Right now there are thousands of Chinese males of military age pouring across our borders. Pockets of Chinese males of military age have been noted, conspicuous in their manner – their awareness of security in their travels is … military. These have been observed by U.S. ex-military in our contact network in Central America, who recognize their own species.
For the sake of our discussion, let’s assume our hypothetical XiComms are experts in guerrilla tactics, skilled in the art of asymmetric warfare. We’ll refer to them as terrorists in this context, not “insurgents” which typically implies they’re an extension of an official military force acting with government backing, nor “spies” since their main goal in this scenario isn’t to gather intelligence but to target and disrupt infrastructure. This fictional scenario serves as a backdrop analyze the threats posed by unconventional warfare tactics to national security within our limited frame.
Other Possible Adversaries
It’s important to recognize that the threat landscape is not limited to just one type of group.
Fact: on March 5, 2024, a far-left activist group named Vulkangruppe, or the “Volcano Group,” carried out an arson attack on the Tesla Gigafactory near Berlin.
Similarly, one could consider hypothetical far-right factions, modeled after individuals like Timothy McVeigh, the domestic terrorist who blew up a building in Oklahoma. It’s plausible to suggest that international actors like Russia and Iran could have operatives within the U.S., potentially leading to the formation of groups we might name ‘PutinSocs’ or ‘KhameneiRads,’ which could be state supported and working in tandem with or parallel to the aforementioned ‘XiComms.’
Additionally, organizations that stir significant public debate, such as BLM, Antifa, and La Raza, might be viewed by some as ‘terrorist adjacent,’ potentially acting as (perhaps inadvertent) allies to the XiComms. There is certainly evidence these groups are susceptible to manipulation through tactics like bribery and extortion.
For our purposes here we will call them the ‘amplifier groups’ since they would be used to (perhaps unwittingly) amplify the intended dissent and dissatisfaction through protest. This perspective opens a discussion on the complexity of internal and external threats and the myriad ways in which different groups might intersect or influence each other’s actions within a larger context of national security.
What are the adversaries after?
Again, the primary aim of terrorism is to impact psychological well-being rather than cause extensive physical damage – fear, doubt, lack of confidence, dissent, weakness.
The underlying motive is strategic: instilling indecision and hesitation within the U.S. weakens its resolve to confront China’s interests in distant regions such as Taiwan, the Philippines, and Vietnam. This psychological leverage is seen as a significant advantage, justifying the efforts behind such tactics. The amplifier groups can be key in providing this leverage.
So what are the target areas with maximum psychological impact in the U.S.?
A significant strategy for the hypothetical group XiComm would be to maintain a substantial an active underground force within the U.S., always prepared to escalate their operations to create widespread distress and panic whenever necessary. For China, investing in such a capability would be considered valuable at any cost.
Analysis
The following categories of Reward and Risk for XiComm require evaluation in accordance with game theory analysis.
Psychological Impact: This considers the level of disturbance or unrest the public might experience due to an attack, and the susceptibility to the influence of amplifier groups. The less the impact, the less effective the attack is in causing widespread concern or disagreement.
Cost: This measures the financial impact of an attack relative to its execution cost and complexity. For instance, a simple act that causes significant financial damage is considered highly asymmetric and effective.
Repair Time: This assesses the duration required to restore services or repair damage, directly influencing the extent of public frustration or agitation. A longer repair time implies a more significant impact.
Difficulty of Attack: This evaluates the risks and planning involved in executing an attack. The greater the difficulty, the more resources and risk are associated with the attack, indicating a higher investment by the XiComm group.
Low/High Profile: This gauges the likelihood of an attack being directly linked to the XiComms as opposed to being attributed to an individual acting alone or an accident. Higher visibility increases the risk to the XiComms.
Our assessment of these factors is based on subjective judgment, though it’s informed by a degree of expertise. A “Reward/Risk” column is introduced to highlight tactics that seem more likely to be successful and impactful. This involves adding up the estimated impact factors and dividing by the total of the risk factors. While this is perhaps not as rigorous as it could be, it seems to show the most likely attack scenarios.
Types of attacks
These examples, while not exhaustive, represent typical physical attacks that could be executed under the scenario where the hypothetical group XiComm has access to funds and information but must keep a low profile and does not have access to military-grade equipment. They would rely on materials readily available within American society.
Explosives: Potential methods might include dynamite, licensed small quantities for agricultural or industrial purposes, blasting caps, or a diesel/fertilizer mixture for larger blasts. Crafting such devices is risky and clearly indicates terrorism, potentially generating terror but risking exposure and signaling escalation. We assume the XiComms would be trained for such specialized attacks.
Arson: A relatively simple tactic involving the purchase of gasoline or diesel, which is then spread and ignited from a distance. The main risks include proximity to the target and the challenge of transporting sufficient fuel, but are unlikely to be associated with state sponsored terrorism.
Cut Cables: This involves using cable cutters to cause damage quickly. While cables are easily severed and can lead to temporary service disruptions, they are also inexpensive and quick to repair. Effective when in direct coordination with amplifier groups to take advantage of short term hardships.
Truck/Heavy Machinery Crash: This strategy entails commandeering a large vehicle to ram into costly infrastructure. Such an approach can breach perimeters like chain-link fences to target substations or utility batteries. However, it’s unlikely to damage robust structures like wind turbine posts. In solar farms, a vehicle could potentially cause extensive damage before detection. Importantly, since the XiComms are not envisioned as suicide attackers, they would need to employ this method without endangering themselves.
Rifle Round: With a cost of around $3 per .50 BMG cartridge, this type of ammunition can penetrate steel plates up to 1.5 inches thick (depending on the alloy). This method allows for attacks from a significant distance while remaining concealed.
These methods highlight the practical and risk considerations involved in selecting attack modes, emphasizing the need for strategic planning and execution.
Analysis of Possible Attacks on Renewable Energy
Solar Farms: Solar energy installations, especially on a large scale, present a unique challenge for potential sabotage due to their sprawling nature. The effectiveness of an attack can vary significantly depending on the installation’s design and wiring. For example, a rifle shot might only damage a single panel, and a heavy and powerful vehicle driven through the installation could potentially destroy panels across 2 or 3 acres out of hundreds or thousands, making such efforts largely superficial. Similarly, cutting cables might not lead to significant disruptions given the extensive layout.
Despite the relative ease of executing these attacks due to security challenges over such a vast area, their impact would likely be minimal. Arson could become a greater threat if the surrounding vegetation is dry. While the use of explosives might cause public alarm, they are generally not considered effective in causing substantial damage to solar farms.
Wind Farms: When discussing large-scale wind farms, we’re looking at a significantly smaller number of units compared to solar farms, with a wind farm typically housing between a dozen and a hundred turbines. Our analysis suggests that .50 caliber ammunition, readily available and effective to those who know where to aim, could potentially breach the protective casing of a wind turbine, damaging or disabling the generator inside. This assumes that the attackers, in this scenario the hypothetical XiComms, have access to detailed schematics of the turbines (well within their capability). It is important to note that we have not consulted with wind turbine manufacturers, who are presumably cognizant of these vulnerabilities and may already be taking steps to mitigate such asymmetric risks.
Arson appears to be impractical for attacking wind turbines. Similarly, it’s believed that a truck, even one carrying explosives, would likely fail to topple a large scale turbine. A successful explosive attack would require a considerable amount of explosives, presenting logistical challenges in both transport and deployment.
A series of such attacks could raise the financial risk of wind generation to unacceptable levels, which could seriously disrupt the deployment of renewable energy in the U.S. While this action may not provoke the dissent and dissatisfaction previously discussed, it could serve as an effective measure in industrial espionage, a tactic that is not beyond consideration by China.
Geothermal Energy: For our purposes, we will address large-scale geothermal plants, which, unlike residential units, might seem like potential targets for terrorism. However, for a group like the fictional XiComms, large-scale geothermal facilities offer limited strategic value as targets. These plants are located over natural geothermal reserves and typically do not serve populations that terrorists aim to impact. Amplifier groups would be difficult to rouse, and even a note in the local paper might be hard to come by. Attacks using rifles or vehicles would likely result in only superficial damage to the plant’s external infrastructure, without affecting its core operations.
A significant explosive attack, akin to the scale used by Timothy McVeigh, could potentially cause considerable damage. However, the extensive planning, high risk, and increased visibility such an operation would entail make it an unlikely choice for the XiComms. Moreover, as mentioned above, the psychological impact of attacking a geothermal plant is deemed minimal, given their typically remote locations, further diminishing their attractiveness as targets.
Hydroelectric Dams: The United States is home to over 2,500 hydroelectric plants, with capacities ranging from quite small to several gigawatts. In discussing potential threats, we’ll focus exclusively on physical attacks, setting aside biological/chemical threats—though notably alarming, they fall outside the renewable energy domain—and cyberattacks, which are beyond the scope of this analysis.
According to a 2019 source, the U.S. has not experienced a significant attack on its water resources or dams. Yet, it’s concerning that more than 1,600 dams are reported to be in a state of disrepair. This analysis does not include a detailed chart for hydroelectric power because large dams, which would cause extreme psychological impact if compromised, are generally too massive for low-profile terrorist activities. Nonetheless, it’s worth noting that among the 1,600 dams deemed vulnerable, there could potentially be accessible targets for those willing to conduct thorough research.
Batteries: As solar and wind energy sites increasingly incorporate utility-scale batteries from various manufacturers, the potential impacts of an attack can vary significantly based on the battery chemistry. A rifle shot, for example, might result in a minor leak of harmless liquid in batteries using iron chemistry. In contrast, those with molten sodium chemistry could necessitate extensive cleanup efforts due to hazardous waste creation. Attacks on batteries made from materials like lithium and vanadium pose varying degrees of risk to human health.
To date, there appears to be a lack of research on the effects of significant terrorist attacks on utility-scale batteries. For the purposes of our discussion, we’re assuming the worst-case scenario: a battery is completely destroyed, leading to considerable cleanup costs. We also speculate that such destruction would disrupt the consistent power supply from renewable sources, causing sustained daily blackouts. It’s important to note that part of the psychological impact of an attack involving explosives might stem from the misconception that the battery itself was the source of the explosion.
A series of such attacks would likely cause extreme cases of “not in my backyard” (NIMBY) syndrome, which could seriously disrupt the deployment of renewable energy in the U.S. While this may not cause the dissent and dissatisfaction we spoke of earlier, it could be effective as an act of industrial espionage, an act that China is not above.
Transformers/Substations – Every renewable energy source must be connected to the grid through a substation containing large transformers to handle all of the power. This equipment is expensive and difficult to replace, especially at the scale needed to connect to a wind or solar farm. This risk is the subject of the documentary Grid Down Power Up, narrated by Dennis Quaid (linked in the source section)
In the event that our fictional XiComms are asked to elevate their activities and move from low profile terrorists to military insurgents, transformers and substations will like be primary targets. Given the hypothetical size of the XiComm organization, they can be taken out by the tens of thousands, plunging DC, New York and other major cities into a terrified darkness. As to this the amplifier groups, that will be active immediately, this could be months of chaos, disruption, riots, food shortages and more in America.
Results
The charts illustrate that wind turbines, batteries, and substations emerge as the prime targets due to their vulnerability to maximum damage with relatively low risk for attackers, especially given the extended range and destructive force of a rifle, allowing the attacker to destroy at a safer distance.
Substations represent an attractive target and a substantial vulnerability because of their ubiquity in the grid. The key impact of attacking a substation lies not in the physical destruction itself but in the immediate power outages it causes, plunging entire areas into darkness. They can be compromised through various means such as rifle shots, improvised explosives, wire cutting, and arson, each causing disproportionate damage. However, it’s important to note that this vulnerability is not exclusive to renewable energy sources but affects the entire power grid. And at present, these attacks are easy.
Another apparent vulnerability is the potential targeting of large wind turbines with a high-powered rifle which could result in prolonged power outages, entail millions in repair costs, and potentially threaten the viability of the wind energy sector. While the financial implications are significant, the psychological impact of such attacks might be less apparent compared to the immediate fear caused by sudden power losses. Renewable energy proponents would likely be the most affected psychologically by such incidents, and whose dissatisfaction would be most vocal.
Utility-scale batteries also present potential weak points that could be exploited. An attack that leads to a hazardous situation could trigger public opposition, leading to a “not in my backyard” response. This could severely damage the reputation and operational sustainability of the affected company.
Recommendations
The glaring vulnerability for renewable and every other form of electricity generation is the transformer/substation. There’s a growing consensus on the need to stockpile substation equipment and enhance security measures to prevent attacks. Implementing these strategies even to the extent of $10s of billions, is seen as cost-effective when compared to the potential fallout from widespread attacks, particularly as our hypothetical terrorists, the XiComms, shift from covert operations to overt actions aimed at disrupting American society.
Wind turbines, given their visibility and lack of surrounding concealment, are susceptible to long range attacks. A simple, readily available rifle could potentially disable a multimillion-dollar turbine from a safe distance, posing little risk to the assailant. This vulnerability may already be recognized within the industry, with possible mitigations underway. Nevertheless, protective measures against such threats must be considered essential to the wind generation industry.
It is recommended that the Department of Homeland Security evaluate the resilience of various utility-scale batteries and share its findings with the industry. Rational Energy’s batteries have a layout that maximizes the protection of critical battery components, ensuring they are safeguarded against significant damage, service interruptions, or risk to human health. Other batteries need such an analysis and more.
Deregulation
In the long term, the grid is still hierarchical, it needs to be decentralized and deregulated. There’s a push for decentralization and deregulation to allow small-scale providers to connect and profit without navigating the cumbersome and costly bureaucracy of today’s grid system. Envisioning a grid composed of independent “cells,” where each segment serves a smaller customer base, could enhance overall resilience and robustness. In such a system, attacks on substations or major generators would be less catastrophic, affecting fewer people, and would be less likely to cascade into major outages. Even a major military attack on infrastructure would leave most areas with independent power.
The challenge lies in convincing our political leadership and those who manage the existing grid to embrace the addition of independent segments and to foster a competitive market environment. This concept parallels the transformation experienced by the Bell Telephone Company and AT&T, which paved the way for the internet and the vastly improved telecommunications infrastructure we rely on today.
The Financial Policy Council (FPC) recognizes the paramount importance of safeguarding America’s renewable energy infrastructure from the perils of terrorism. As a steadfast advocate for our nation’s energy security, the FPC leverages the unparalleled expertise of its members, many of whom have dedicated their careers to fortifying the resilience of our critical infrastructure. By bringing together luminaries from the realms of national security, energy, and finance, the FPC fosters a collaborative environment where innovative solutions can be forged to address the complex challenges posed by asymmetric threats. Through meticulous fact-finding and a commitment to intellectual rigor, the FPC aims to develop policy recommendations that not only enhance the physical security of our renewable energy assets but also bolster the economic viability of this vital sector. In doing so, the FPC seeks to contribute to a more secure, prosperous, and energy-independent future for all Americans, exemplifying the highest ideals of patriotism and service to our great nation.
Conclusion
This analysis exemplifies the educational and advisory initiatives championed by the Financial Policy Council (FPC). As a non-partisan organization dedicated to promoting financial stability and economic security, the FPC harnesses the collective expertise of its members to deliver unfiltered insights and impartial assessments regarding the risks of terrorism and other significant threats confronting America. Through rigorous fact-finding and a commitment to truth, the FPC seeks to inform policymakers and the public alike, empowering them to make decisions that safeguard our nation’s interests. With a clear and determined approach, the FPC emphasizes the importance of addressing these critical issues head-on, drawing upon the diverse knowledge and experience of its members across various silos, from national security to energy infrastructure. This multidisciplinary perspective underscores the FPC’s dedication to promoting security and stability through informed policy recommendations, reinforcing its role as a bulwark of economic patriotism.
The energy grid in the U.S. is a marvel of engineering that has evolved into a sprawling but highly effective continuous source of power for America. The addition of renewable energy provides the opportunity for robustness and resilience but also extends the range of difficulty in defending it.
The industry was never intended to have to defend itself against determined attackers and these new requirements have made it difficult. From a terrorist’s point of view, we conclude that attacks are easy, safe, scalable and highly effective in both cost damage and psychological damage to America. To mitigate the latter, it should be considered that a more cellularized structure be considered for the grid.
It is also apparent that in addition to the psychological goals of terror, attacks can be wielded as tools of industrial espionage to harm entire industries by exposing and publicizing weaknesses. It is a simple fact, that competitive countries such as China, have no compunction about such campaigns that may enhance the marketability of their own equipment. It is concluded that the low profile terrorist scenario contained herein could do so successfully.
#RenewableEnergySecurityhreats #EnergyInfrastructureResilience #AsymmetricWarfare #TerroristGameTheory #CybersecurityForTheGrid #SafeguardingAmericasGrid
References
Grid Down Power Up
https://www.youtube.com/watch?v=1kErOyJ0u-8
50 Caliber Penetration Tests
https://www.youtube.com/watch?v=_3ygggjzf-c
https://www.youtube.com/watch?v=x_TZkLaTVq4
https://www.youtube.com/watch?v=bwmwxo3iMAs
https://www.youtube.com/watch?v=kWnMw3SsxKs
https://damfailures.org/wp-content/uploads/2019/04/SHANNON-ALEXANDER-USSD-2017-Conference-Paper.pdf
https://www.opb.org/news/article/police-violence-portland-protest-federal-officers
https://en.wikipedia.org/wiki/Sutherland_Springs_church_shooting
https://en.wikipedia.org/wiki/Pulse_nightclub_shooting
Disclaimer: This article discusses certain companies and their products or services as potential solutions. These mentions are for illustrative purposes only and should not be interpreted as endorsements or investment recommendations. All investment strategies carry inherent risks, and it is imperative that readers conduct their own independent research and seek advice from qualified investment professionals tailored to their specific financial circumstances before making any investment decisions.
The content provided here does not constitute personalized investment advice. Decisions to invest or engage with any securities or financial products mentioned in this article should only be made after consulting with a qualified financial advisor, considering your investment objectives and risk tolerance. The author assumes no responsibility for any financial losses or other consequences resulting directly or indirectly from the use of the content of this article.
As with any financial decision, thorough investigation and caution are advised before making investment decisions.
Disclaimer: This article discusses certain companies and their products or services as potential solutions. These mentions are for illustrative purposes only and should not be interpreted as endorsements or investment recommendations. All investment strategies carry inherent risks, and it is imperative that readers conduct their own independent research and seek advice from qualified investment professionals tailored to their specific financial circumstances before making any investment decisions.
The content provided here does not constitute personalized investment advice. Decisions to invest or engage with any securities or financial products mentioned in this article should only be made after consulting with a qualified financial advisor, considering your investment objectives and risk tolerance. The author assumes no responsibility for any financial losses or other consequences resulting directly or indirectly from the use of the content of this article.
As with any financial decision, thorough investigation and caution are advised before making investment decisions.
CHECKMATE COMMUNISM: The Most Critical Chess Game of Our Lives August 29, 2024
The Trojan Horse of Artificial Intelligence: A Corrupt Bargain, A Nation’s Betrayal August 15, 2024
Power, Conquest, Glory: Unlock the Master Code to Riches August 12, 2024
The Financial Policy Council-Cultivating Liberty, Championing Prosperity, and Shaping America’s Future August 5, 2024
The Great Equalizer- Harnessing the Power of Economic Education to Create a More Equitable and Prosperous Nation June 19, 2024
Virtual Staging AI: Revolutionizing Real Estate Investing in Miami June 18, 2024
The Venture Debt Delusion: A Faustian Bargain for Modern Entrepreneurs May 29, 2024
Unveiling The Secret Weapon in Personal Branding Harnessing Vulnerability to Build Trust May 13, 2024
Biden’s Administration Proposal To Eliminate The 1031 Tax Exchange: Potential Impacts On Real Estate Investors And The Economy May 9, 2024
Terrorism vs. Renewable Energy – A Game Theory Analysis April 29, 2024
Beyond Division: The Financial Policy Council’s Role in Fostering Unity and Dialogue in the Age of Cancel Culture April 22, 2024
Safeguarding your Brand’s future with AI Guardrails April 15, 2024
Technology Innovations to Unlock Abundant Domestic Fossil Fuel Supplies April 10, 2024
The Grand Illusion. Cancer, Elites, and the Eternal Quest for Power. March 26, 2024
Fortunes Forged in the Fires of Finance: Navigating Wall Street’s Tumultuous Waters January 29, 2024
Quantum Computing: America’s Key to Remaining Globally Competitive January 22, 2024
Navigating the Social Media Renaissance: Cutting-Edge Marketing Strategies for Business Growth January 19, 2024
Revolutionizing Your Image: Unique Strategies for Impactful Personal Branding January 15, 2024
The Ultimate Guide to BRRRR Method: Building Wealth through Real Estate Investment January 5, 2024
From Pig Valves to Stem Cells – The Exciting Evolution of Regenerative Medicine January 3, 2024
The Silent Saver-How High-Net Worth Individuals are Leveraging MSOs for Tax Savings December 14, 2023
NYC’s Holidays of Our Present-Future December 13, 2023
Uniting America: A Journey Back to Foundational Ideals and Forward to Prosperity December 5, 2023
The Impending Collapse of American Healthcare November 28, 2023
Taxation and Economic Impact: A Comparative Analysis New York vs. Florida November 17, 2023
The Ultimate Guide to Launching and Scaling Your Startup Dream November 16, 2023
Unlocking the Hidden Tax Shelter Inside Your Life Insurance Policy November 1, 2023
Three Ways to Create Wealth Based on the Financial Policy Council Mission October 30, 2023
Revitalizing Real Estate – The Case for Mortgage Rate Profitability and a Stronger U.S. Economy October 17, 2023
For the Prosperity of the People… October 2, 2023
Bridging the Financial Literacy Gap to Improve the State of Our Nation September 27, 2023
1,000,000 Shares for Your Employees and Advisors – Employee Stock Ownership Plans (ESOPs) September 25, 2023
Decentralized Private Market Advantages in Turbulent Times September 19, 2023
The Secret Arms Race in Finance September 12, 2023
Leading with Impact – Transformative Strategies for Financial CEOs to Build Trust and Unleash Influence September 11, 2023
America and the Future of Globalism Challenges, Opportunities September 8, 2023
The Overhyped Tax ‘Loophole’ That Could Leave You Owing Big September 7, 2023
The Bitcoin and CryptoRegulatory Landscape: Navigating a Path Forward to Prosperity September 5, 2023
How to Prepare Your Kids for Wealth August 31, 2023
Paving the Way for Progress: Bitcoin Mining’s Role in Energy and Economic Development August 28, 2023
The Forgotten Man Sings: An Uneasy Nation Listens August 22, 2023
Safeguarding Your Life’s Work: Tax Reduction Strategies for Physicians and Their Heirs July 31, 2023
Capitalizing on Tokenization: Harnessing Digital Assets for Unprecedented Profit Growth July 24, 2023
The True Threat of Debt Default for America July 18, 2023
The $8 Trillion Dilemma for CEO’s: Upskill Trust or Pay Costly Workforce Replacements? July 17, 2023
We Need to Add Ownership to the Concept of NIL July 10, 2023
How to Turn the Economy Around Given the Absolute Mess We Are In? July 4, 2023
Decoupling Climate Change and Renewable Energy: A Business Perspective June 28, 2023
Transforming Healthcare Economics: Enhancing Revenue Integrity Amidst Economic Uncertainty. 6 Strategies for Investors and Operators. June 27, 2023
Banking Overlords: The Armageddon for Commercial Real Estate Investors June 26, 2023
Electric Aviation: The Next Chapter in Freedom June 21, 2023
Standing Tall with Mark Levin: A Convention of States as the Beacon of Fiscal Responsibility June 6, 2023
Issues and Remedies for Our Efficiently Broken Supply Chain May 30, 2023
Current State of U.S. Oil Industry: Future Difficulties and Solutions May 24, 2023
Thriving Amidst Chaos: Unraveling Opportunities in the Volatile Commercial Real Estate Landscape May 19, 2023
A Strategic Imperative for the USA: Funding Entrepreneurs May 18, 2023
Wildcatting in the Oil Industry vs. Shielding Wealth Out-of-the-Box Tax Strategies for Young Entrepreneurs May 17, 2023
The Future of Insurance: How Blockchain is Disrupting, Driving Innovation and Reshaping the Industry May 1, 2023
The Ripple Effect: Exploring the Consequences of the Recent Bank Failures on Venture Capital and Banking Operations April 6, 2023
U.S. Shale Oil Revolution & Future April 5, 2023
Leveraging Tax Strategies to Maximize ROI and Profitability in Commercial Real Estate April 4, 2023
Profiting from the NFT Revolution: A Comprehensive Guide to Investors March 30, 2023
Cyber Protection of US Critical Infrastructure March 23, 2023
What’s the Next Game Changer Ahead? March 15, 2023
From Crisis to Opportunity: Transforming America’s Economy for the 21st Century March 13, 2023
Step Up Your Game, Increase Your Profit and Knock it Out of the Ball Park March 2, 2023
Social Marxism, Entrepreneurialism and the Gen Z generation-The Clash of Perspectives February 22, 2023
Financial Independence and Wealth Generation Starts with Due Diligence February 16, 2023
What $1.8 Billion Aid Package to Ukraine Means for American Consumers January 30, 2023
The spread of Socialism and How to Counter It January 24, 2023
US Critical National Infrastructure: pitfalls and solutions in the utility and energy sectors January 17, 2023
What is REAL MONEY? January 13, 2023
When Are We Going to Ever Stop Falling for the Con Out There? January 3, 2023
Women and the Green August 10, 2022
Bucking the Status Quo August 9, 2022
Does the United States Still Have an Economy? July 30, 2022
Transformational Healthcare: Reversing the Effects of a Broken System and Ill Health May 4, 2022
Compliance – Not Technology – Crowns FinTech Champions March 25, 2022
Inflation and Government Financial Threats Will Fuel the Rise of Bitcoin March 18, 2022
Our Chaotic, Biased, Dishonest News Media — Threats, Mistakes and What to Do About It February 17, 2022
2022: Why Capitalism is the Only answer to freedom, prosperity and well-being. January 20, 2022
How to Form Good Money Habits in the New Normal October 10, 2021
Useful Tips on How to Increase Your Profits from Crypto Investment September 22, 2021
Is America Becoming the New Leader in Crypto Currency? July 22, 2021
A Time to Buy & A Time to Sell: Fearless Investing in Crypto June 24, 2021
Real Wealth Creation: Wealth for Generations to Come April 27, 2021
The Most Common Reason More People Aren’t Buying Crypto April 14, 2021
Reducing the Risk: Angel Investing March 30, 2021
Where Did We Go Wrong: Polarization of US Politics March 15, 2021
Lessons Learned from the 1929 Stock Market Crash March 1, 2021
It’s 2021…Why Are You Not a Capitalist? February 19, 2021
Why Do People Lose Money on Stocks? February 11, 2021
Facts About Hedge Funds That Will Blow Your Mind January 27, 2021
The Big 5 Breakdown January 19, 2021
2021: Where to Invest December 15, 2020
4 Tips To Become a Wealth Creation Warrior November 20, 2020
You Get What You Negotiate November 13, 2020
Capitalism: The Empowerment of the People November 9, 2020
Economic Agenda: Trump v/s Biden…. The choice is clear October 28, 2020
Capitalism: Misunderstood October 20, 2020
America the Beautiful October 5, 2020
Business is War October 1, 2020
Redrawing the American Economic Map September 28, 2020
Have the socialists set out to destroy your family? September 24, 2020
3 Financial Rules That You Can Never Break September 16, 2020
Will President Trump Reign Supreme in This Election? September 8, 2020
The Games Have Begun September 5, 2020
The Power of Capitalism – My Testimony August 28, 2020
Why would anyone in his right mind vote for a Socialist Democrat? August 24, 2020
Capitalism: Your Ticket to Freedom August 15, 2020
Check These 4 Things To Skyrocket Towards Your Goal August 6, 2020
Beware: This One Thing Can Cost You Your Freedom July 23, 2020
Colleges Tax-Exempt Status Needs to Be Re-Evaluated July 20, 2020
The Bigger Picture July 17, 2020
We are under spiritual attack. Are you prepared for war? July 10, 2020
Ripping Off the Band-Aid: Why Payment Protection Programs are Not Good in The Long Term July 1, 2020
Negative Conflict June 15, 2020
The Road to Tyranny February 12, 2020
Banks must find their Crypto courage November 6, 2019
Congress Must Pass the SAFE Banking Act October 28, 2019
Private Equity and Venture Finance in MENA: Back to the Future August 22, 2019
Venture Finance in the MENA Region: Challenges and Opportunities Ahead July 15, 2019
The U.S Must Win the 5G Race by Any Means Necessary July 5, 2019
The Unprecedented Wealth Creation Opportunity of the Cannabis Industry is just getting started June 3, 2019
How to Take Out the Trash: Weeding Out Bad Data & Keeping It Out May 13, 2019
Garbage In, Garbage Out: Why Bad Data is Worse Than No Data May 10, 2019
The US Desperately Needs of a Department of Cyber Security April 29, 2019
US Health Care and Health Tech Innovation April 1, 2019
Credit Reporting Reform: Individual Consumers Must Take Responsibility of Their Own Data March 5, 2019
American Exceptionalism vs. Socialism February 16, 2019
Blockchain: U.S Regulation and Governance. January 21, 2019
Nonbank Lenders: The New Risk in the U.S. Mortgage Industry December 10, 2018
Regulating Social Media – Yeah or Nay September 18, 2018
The Systemic FinTech Revolution September 5, 2018
What Does It Take to Be a BIG Disruptor? August 4, 2018
Crude Oil Price Cycle – The Stealthy Economy Killer June 12, 2018
Make Cannabis Great Again May 7, 2018
Emerging Markets Infrastructure Project Investment: Issues and Opportunities April 26, 2018
The Case for a Free World: Central Banks vs Cryptocurrencies March 5, 2018
Family office growth and governance January 31, 2018
Future of the VC Industry January 16, 2018
The Blueprint for Community Banks in a Digital World January 11, 2018
Bitcoin: Drawing the Line Between Investors and Gamblers December 12, 2017
Why Keep the Mortgage Interest Deduction Intact for Now November 24, 2017
The Looming Public Pension Fund Crisis October 23, 2017
U.S. Healthcare: The Most UnAmerican Industry October 10, 2017
Understanding and dealing with bubbles – a review of the state of the art September 27, 2017
RENEWABLE ENERGY: A COMPLEX SYMPHONY TO BE CONDUCTED, NOT REGULATED August 22, 2017
The FATCA Debacle Requires Repeal July 15, 2017
The Financial Power of Impact Investing June 2, 2017
Chinese Investments in U.S. Real Estate – Challenges, Opportunities and Policy Recommendations April 18, 2017
A Case For US Infrastructure April 4, 2017
Turning around the US Economy:- My Top Recommendations for President elect Trump December 12, 2016
To all those wide-eyed millennials looking for a break November 29, 2016
BREAKSIT June 24, 2016
The Symbiosis of Institutional Investors and Activist Hedge Funds May 16, 2016
Emerging Economies – Black Holes or Treasure Troves? April 24, 2016
Financial Impacts of Foreign Events March 31, 2016
Hedge Fund Performance and Regulation March 21, 2016
The World In a (Cracked) Nutshell: Things Happen February 24, 2016
Making a Difference in Our Short Lives February 16, 2016
Investors Can Boost Their Cybersecurity: Back to the Basics February 5, 2016
Key Financial Regulations To Monitor January 14, 2016
Success and Ego – Two sides of the same coin? November 22, 2015
When Will We Stop Blindly Pissing Away Money Down the R&D Rat Hole? November 11, 2015
The Activist Investor: A True Ally of Corporate Governance November 3, 2015
Is the Intellectual Elite Out of Touch with Reality? November 2, 2015
Harvard Business Review: Candid Arrogance or Just Plain Stupidity? October 23, 2015
Smart v/s Wealthy August 10, 2015
US Infrastructure Development: A Case for Public Private Partnerships June 13, 2015
Will Wall Street ever be fixed? May 26, 2015
Entrepreneurship: The Way To the Future? April 27, 2015
Financial Policy Best Practice Framework March 24, 2015
Why Financial Education? March 9, 2015
Central Banks: A Question of Governance February 5, 2015
My Personal Reflections on Davos 2015 February 2, 2015
Salvaging the US shale boom January 3, 2015
What Would Our Founding Fathers Think if They were Alive Today? November 23, 2014
Is Greed Good for the Goal of Improving Society? September 29, 2014
Monetizing your Knowledge – Convert Knowledge into Money September 8, 2014
Making the Capital Markets Smarter Some Food for Thought May 5, 2014
Coming out with “Out of the Box” Ideas for your Non-Profit January 29, 2014
Whatever happened to Integrity January 13, 2014
Building a Crisis Resilient Financial System December 16, 2013
Raising Money For Non-Profit Organization – Ziad K Abdelnour November 12, 2013
The Power to turn the US Economy – Financial Policy Council October 5, 2013
About the Power Brokers Shaping Our Global Capital Markets September 16, 2013
Are You Really The Entrepreneur You Claim To Be? September 2, 2013
My Thoughts Regarding Wealth Redistribution August 27, 2013
Winning Financial Support For Your Non Profit August 19, 2013
Will the Venture Capital Industry ever go back to its glory days? August 12, 2013
Discerning Fact from Fiction August 5, 2013
Living your Life as a True Activist? July 28, 2013
Wealth Takers v/s Wealth Creators Some food for thought July 9, 2013
Stop Procrastinating and Find a Reason to be Rich July 1, 2013
It is all about Money and the Media Stupid Wake up June 29, 2013
Why do we still listen Economists when Vast Majority Forecasting Wrong? June 24, 2013
Is this Capitalism? June 13, 2013
America Tear down the wall before it’s too late June 11, 2013
Investing Post Crisis June 5, 2013
Is this a Housing Scam or What Exactly? June 1, 2013
Why Wealth Bashing? – Financial Policy Council May 16, 2013
Wealth Creation Tips and Strategies April 9, 2012
Why don’t we let Banks Fail? November 13, 2011
On Tax Cuts for the Middle Class and the Wealthy August 20, 2011
7 Rock Solid Reasons Why Giant Banks Need to be broken up NOW August 15, 2011
What part did Hedge funds play in the crash of 2008? July 15, 2011
Have we learned anything from the Financial Crisis of 2007? June 3, 2011
How stupid does Wall Street think we all are? – Financial Policy Council June 3, 2011
The Seeds of our Destruction – An academic outlook May 2, 2011
Wreckonomics: America’s Fiscal Policy in Action April 15, 2011
The greatest threat facing the US today is…. April 2, 2011
Note: The Financial Policy Council (FPC) is a registered 501(c)(3) non-profit organization. This means that your generous donations to support our mission and initiatives are tax-deductible to the fullest extent permitted by law. To claim your tax deduction, please keep a record of your donation, including the date, amount, and any correspondence you receive from the FPC acknowledging your contribution. You should consult with your tax advisor to determine the specific tax benefits available to you based on your individual circumstances.