The headlines are predictable. They scream about "foiled assassinations," "Iranian proxies," and "sophisticated plots" to take out high-profile American targets like Donald Trump. The sentencing of Asif Merchant—a Pakistani national with ties to Iran—is being treated by the media as a victory for the intelligence community. They want you to believe the system worked perfectly to stop a tactical genius.
They are lying to you.
If you look at the mechanics of the Merchant case, you don't find a Bond villain. You find a glaring example of how modern "terrorist plots" are often amateurish, disorganized, and increasingly reliant on the most incompetent layers of the criminal underworld. The real story isn't that we caught a mastermind; it’s that the state-sponsored assassination model is currently so broken that it relies on people who can't even vet a hitman on Craigslist.
The Competency Gap Nobody Wants to Talk About
The standard narrative suggests that Iran’s Quds Force is an omnipresent shadow, capable of reaching across oceans to strike at the heart of the U.S. government. But look at the actual tradecraft used by Merchant. He flew into the country, checked into a hotel, and immediately began looking for "muscle" by asking around in his personal circles and eventually connecting with undercover FBI informants.
That isn't high-level espionage. That is a desperate, low-budget attempt at a contract killing.
I have spent years analyzing security protocols and threat vectors. In the world of real intelligence, "sophistication" means encrypted dead drops, non-attributable funding, and operatives with deep cover who have lived in the target country for a decade. Merchant’s "plot" had none of that. It was a loud, messy, and fundamentally flawed operation that was destined to fail the moment he stepped off the plane.
The media loves the "state-sponsored" label because it justifies massive defense budgets and aggressive foreign policy. But if this is the best a state actor can do, the threat isn't a tactical one. It’s a psychological one.
The FBI Sting Machine
Most of the "threats" we see disrupted today follow a very specific, almost scripted pattern.
- An individual expresses intent (often fueled by ideology or a desire for revenge).
- They lack the resources to carry out a complex task.
- They "find" a collaborator who happens to be an FBI asset.
- The asset provides the tools, the plan, and the "explosives" (which are always inert).
- Law enforcement makes a high-profile arrest.
This creates an "Illusion of Safety." We feel better because a "plot" was stopped, but we ignore the fact that the plot likely never would have moved beyond the "angry thought" stage without the government’s direct participation in its logistics.
In Merchant’s case, the "hitmen" he thought he was hiring were undercover agents. While this is effective for getting a conviction, it creates a massive blind spot. We are spending billions of dollars to catch the people who are loud and desperate enough to talk to strangers about murder. Meanwhile, we are failing to address the quiet, decentralized threats that don't need to hire "muscle" because they use technology.
Why the Human Element is a Distraction
The obsession with Asif Merchant’s sentencing distracts from the actual evolution of political violence: the democratization of lethality.
While the DOJ celebrates catching a guy trying to hire a fake hitman, they are missing the forest for the trees. The real danger isn't a Pakistani man with a bag of cash. It’s the $500 FPV (First-Person View) drone equipped with a 3D-printed payload.
In conflict zones across the globe, we see high-value targets being neutralized not by "masterminds," but by teenagers with VR goggles and off-the-shelf tech. If an adversary actually wanted to strike a U.S. official, they wouldn't send a guy like Merchant to negotiate in a New York diner. They would use a mesh network of autonomous hobbyist drones.
We are fighting a 20th-century war of "spies and informants" while the rest of the world has moved on to automated, low-cost attrition.
The Math of Modern Security
Consider the cost-to-risk ratio:
- The Merchant Model: High cost, high risk of detection, low probability of success. It requires international travel, physical meetings, and the movement of traceable currency.
- The Technical Model: Low cost (under $2,000), near-zero risk of capture for the operator, and high precision.
$Total Risk = (Exposure \times Traceability) / Redundancy$
Merchant had maximum exposure and maximum traceability with zero redundancy. He was a sacrificial pawn in a game he didn't understand. If we continue to focus our headlines on these "low-hanging fruit" cases, we remain blissfully unprepared for the day an adversary stops trying to hire "muscle" and starts hiring coders.
Dismantling the Iranian Proxy Narrative
The "lazy consensus" is that Merchant was a direct extension of Tehran's will. While the links to Iran are factual, the assumption that this represents the pinnacle of their capability is a dangerous misunderstanding of how proxy warfare works.
States often use "bumbling" operatives as a form of "gray zone" harassment. They don't necessarily expect the plot to succeed; they expect it to cause friction, drain resources, and keep the target in a state of perpetual anxiety. By treating Merchant like a high-level threat, the U.S. media is actually doing Iran's job for them. We are amplifying the terror of an operation that was, by all technical standards, a failure before it began.
The People Also Ask: Correcting the Record
Is the U.S. really at risk of foreign-backed assassinations?
Yes, but not from people like Asif Merchant. The real risk comes from cyber-physical attacks—hacking the car you’re sitting in or the medical device in your chest. Physical "hitmen" are for movies. Digital signatures are for reality.
Did the FBI save Donald Trump's life?
They stopped a man who had the intent to harm him, but Merchant was nowhere near the execution phase. He was still in the "looking for help" phase. Claiming a life was saved implies the threat was imminent and capable. It wasn't.
Why did Merchant choose such an obvious path?
Because most people recruited for these tasks are chosen for their deniability, not their competence. If they get caught, the state can shrug and call them a "lone wolf" or a "disturbed individual."
Stop Celebrating the Easy Wins
The sentencing of Asif Merchant shouldn't be a moment of national pride. It should be a wake-up call about the inefficiency of our current intelligence focus.
We are playing a game of "Whac-A-Mole" with amateur operatives while the technical landscape is shifting beneath our feet. We are patting ourselves on the back for catching a man who was practically begging to be caught by talking to everyone he met about his "secret mission."
If you want to actually secure a VIP, you don't look for the man with the Pakistani passport and a grudge. You look for the signals in the noise—the encrypted traffic, the bulk purchase of specialized components, and the vulnerabilities in the "smart" infrastructure surrounding the target.
The Merchant case is a relic. It belongs in a museum of 1990s counter-terrorism. The next real threat won't check into a hotel. It won't hire a hitman. It won't even be in the country.
Stop reading the headlines and start looking at the hardware.