Neo-Nazis are using the Army as a training camp

Hasan Sarbakhshian/AP file photo

White supremacists aren't the type of people you want to train to be unstoppable fighting machines, but that doesn't mean they're not signing up for the call of duty. In a disturbing Reuters investigation, Daniel Trotta uncovers the campaign by neo-Nazis and certain skinhead groups to encourage enlistment in the Army and Marine Corps so members can learn the skills to overthrow the government, or in neo-Nazi speak, the Zionist Occupation Government. "They call it 'rahowa' - short for racial holy war - and they are preparing for it by joining the ranks of ... the U.S. military," writes Trotta. "Get in, get trained and get out to brace for the coming race war." 

The recruiting practice is gaining scrutiny in light of the Wisconsin Sikh temple shooting by gunman Wade Michael Page, a former U.S. Army soldier and neo-Nazi musician. As CNN reported  last week, Page's base, Fort Bragg, "was home to a small number of white supremacists including three soldiers later convicted in the murder of an African-American couple." Reuters caught up with Marine T.J. Leydon, who served from 1988 to 1991 while openly promoting neo-Nazi causes:

"I went into the Marine Corps for one specific reason: I would learn how shoot," Leyden told Reuters. "I also learned how to use C-4 (explosives), blow things up. I took all my military skills and said I could use these to train other people," said Leyden, 46, who has since renounced the white power movement and is a consultant for the anti-Nazi Simon Wiesenthal Center.

Read more at The Atlantic Wire.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.