Slave Labor Markets in Libya and Beyond

So, the United Nations reports this but so what? Is anyone at the United Nations taking action? Never heard anything out of the Obama White House either, did you? How about out of the Hillary Clinton or John Kerry State Department? Anything? Did WikiLeaks cables include any of this? Nah….

That whole Hillary Libya operation did not work out well at all, the country remains in a tailspin.

Migrant Smuggling – a deadly business

Currently, data is too scattered and incomplete to paint an accurate picture of numbers of people who are smuggled each year and the routes and methods used by those who smuggle them. Still, available evidence reveals the following trends and patterns:

  • Criminals are increasingly providing smuggling services to irregular migrants to evade national border controls, migration regulations and visa requirements. Most irregular migrants resort to the assistance of profit-seeking smugglers. As border controls have improved, migrants are deterred from attempting to illegally cross them themselves and are diverted into the hands of smugglers.
  • Migrant smuggling is a highly profitable business in which criminals enjoy low risk of detection and punishment. As a result, the crime is becoming increasingly attractive to criminals. Migrant smugglers are becoming more and more organized, establishing professional networks that transcend borders and regions.
  • The modus operandi of migrant smugglers is diverse. Highly sophisticated and expensive services rely on document fraud or ‘visa-smuggling’. Contrasted with these are low cost methods which often pose high risks for migrants, and have lead to a dramatic increase in loss of life in recent years.
  • Migrant smugglers constantly change routes and modus operandi in response to changed circumstances often at the expense of the safety of the smuggled migrants.
  • Thousands of people have lost their lives as a result of the indifferent or even deliberate actions of migrant smugglers.

These factors highlight the need for responses to combat the crime of migrant smuggling to be coordinated across and between regions, and adaptable to new methods. In this regard, UNODC seeks to assist countries in implementing the  Smuggling of Migrants Protocol while promoting  a comprehesensive response to the issue of migrant smuggling.

  More here. Has anyone heard from the African American community on this issue at all?

Image result for slave labor markets  PBS

Back in 2013, the UN essentially reported the same conditions in North Korea.

North Korea’s hidden labor camps exposed: A new UN panel is vowing to hold North Korea’s Kim regime to ‘full accountability’ for decades of mass crime and murder. Will Pyongyang face ICC indictment?  More here from CS Monitor.

The Global Slavery Index also provides insight into the estimated absolute numbers of people in modern slavery, in 162 countries. When the estimated number of enslaved people is considered in absolute terms as a single factor, the country ranking shifts considerably.

The countries with the highest numbers of enslaved people are India, China, Pakistan, Nigeria, Ethiopia, Russia, Thailand, Democratic Republic of Congo, Myanmar and Bangladesh. Taken together, these countries account for 76% of the total estimate of 29.8 million in modern slavery.

The country with the largest estimated number of people in modern slavery is India, which is estimated to have between 13,300,000 and 14,700,000 people enslaved. The India country study suggests that while this involves the exploitation of some foreign nationals, by far the largest proportion of this problem is the exploitation of Indians citizens within India itself, particularly through debt bondage and bonded labour.

The country with the second highest absolute numbers of enslaved is China, with an estimated 2,800,000 to 3,100,000 in modern slavery. The China country study5 suggests that this includes the forced labour of men, women and children in many parts of the economy, including domestic servitude and forced begging, the sexual exploitation of women and children, and forced marriage.

The country with the third highest absolute number in modern slavery is Pakistan, with an estimated 2,000,000 to 2,200,000 people in modern slavery. Read the 2013 report here.

 

 

Pro-Globalist College Radicals a Product of IB?

This is how CBS reported the protests over the weekend at Berkeley.

So, these protestors cover their faces, they are in fact recruited and the pool of students highly agree on issues like being anti-American. pro-globalism and anti-war. It was taught to them in public education beginning as early as Kindergarten. (by the way, ‘kindergarten’ is a German word).

Image result for international baccalaureate  IBO

So, what is the point here?  Read this summary as a primer.

Students enrolled in the International Baccalaureate program are taught they are elitists and exceptional over other student programs such at Advanced Placement.

High schoolers who have embraced IB’s global educational philosophy can elect to earn an IB diploma, which is recognized by colleges around the world.

IB is primarily an international program – there are nearly 4,000 IB schools in close to 150 countries, according to the program’s website.  

Notable alumni (per Wikipedia)

***

Related reading: International Baccalaureate Undermines U.S. Founding Principles

It’s time to re-affirm our founding and end the use of taxpayer funds for the IB program.

In the United States, criticism of the IBDP has centered on the vague claim that it is anti-American, according to parents anonymously quoted in The New York Times, who objected to the program’s funding from UNESCO in its early years. The base cost is considered to be higher than other programs.[81] In 2012, the school board in Coeur d’Alene, Idaho, voted to eliminate all IB programmes in the district because of low participation and high costs.[83]

UNESCO, a United Nations division is in charge of your child’s education and is that okay with you?

Its declared purpose is to contribute to peace and security by promoting international collaboration through educational, scientific, and cultural reforms in order to increase universal respect for justice, the rule of law, and human rights along with fundamental freedom proclaimed in the United Nations Charter.

Although controversial, UNESCO’s aim is “to contribute to the building of peace, the eradication of poverty, sustainable development and intercultural dialogue through education, the sciences, culture, communication and information”. Other priorities of the organization include attaining quality Education For All and lifelong learning, addressing emerging social and ethical challenges, fostering cultural diversity, a culture of peace and building inclusive knowledge societies through information and communication.

So, read deeper on this as a summary white paper gives you great help on the topic and further explains just what is happening in education and the genesis of the willing demonstrators we see across college campuses today. Thanks to the ‘Truth about IB’ for all the years of hard work, research and truth.

Answer to Those Missile Failures of N. Korea

The author of this site has mentioned for several months the reason for the recent failed missile launches of North Korea. There are two distinct causes and both point to the United States. They are cyber operations and electronic warfare.

Over the past decade of conflict, the U.S. Army has deployed the most capable communications systems in its history. U.S. forces dominated cyberspace and the electromagnetic spectrum (EMS) in Afghanistan and Iraq against enemies and adversaries lacking the technical capabilities to challenge our superiority in cyberspace. However, regional peers have since demonstrated impressive capabilities in a hybrid operational environment that threaten the Army’s dominance in cyberspace and the EMS.

The Department of Defense information network-Army (DODIN-A) is an essential warfighting platform foundational to the success of all unified land operations. Effectively operating, securing, and defending this network and associated data is essential to the success of commanders at all echelons. We must anticipate that future enemies and adversaries will persistently attempt to infiltrate, exploit, and degrade access to our networks and data. A commander who loses the ability to access mission command systems, or whose operational data is compromised, risks the loss of lives and critical resources, or mission failure. In the future, as adversary and enemy capabilities grow, our ability to dominate cyberspace and the EMS will become more complex and critical to mission success.

Incorporating cyberspace electromagnetic activities (CEMA) throughout all phases of an operation is key to obtaining and maintaining freedom of maneuver in cyberspace and the EMS while denying the same to enemies and adversaries. CEMA synchronizes capabilities across domains and warfighting functions and maximizes complementary effects in and through cyberspace and the EMS. Intelligence, signal, information operations (IO), cyberspace, space, and fires operations are critical to planning, synchronizing, and executing cyberspace and electronic warfare (EW) operations. CEMA optimizes cyberspace and EW effects when integrated throughout Army operations. More here.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

You can be assured there is acute cooperation between the military and other Federal agencies including the CIA and NSA when it comes to North Korea. What do we know that media is not sharing?

North Korea’s proliferation of missile technology and expertise is another serious concern for the United States. Pyongyang has sold missile parts and/or technology to several countries, including Egypt, Iran, Libya, Burma, Pakistan, Syria, United Arab Emirates, and Yemen.53 Sales of missiles and telemetric information from missile tests have been a key source of hard currency for the Kim regime.

North Korea and Iran have cooperated on the technical aspects of missile development since the 1980s, exchanging information and components.54 Reportedly, scientific advisors from Iran’s ballistic missile research centers were seen in North Korea leading up to the December 2012 launch and may have been a factor in its success.55 There are also signs that China may be assisting the North Korean missile program, whether directly or through tacit approval of trade in sensitive materials. Heavy transport vehicles from Chinese entities were apparently sold to North Korea and used to showcase missiles in a military parade in April 2012, prompting a U.N. investigation of sanctions violations.56  More here.

Security experts and U.S. officials have voiced increasing concern about North Korea’s improving cyberattack capabilities. In March 2013, an attack on the computer systems of several South Korean media and financial institutions disrupted their functioning for days, in one of the most significant cyberattacks in the country’s history; cybersecurity analysts identified North Korean hackers as the culprit.68 The FBI determined that North Korean hackers were responsible for the November 2014 cyberattack on Sony Pictures Entertainment, an intrusion that disrupted the company’s communication systems, released employees’ personal information, and leaked yet-to-be released films. (Some reports speculate that the cyberattack on Sony Pictures could have been an attempt to punish the company for its production of a comedy in which American journalists assassinate Kim Jong-un at the instigation of the Central Intelligence Agency.) Perhaps in response to doubts about the attribution of the cyberattack to North Korea, U.S. officials revealed that the National Security Agency had penetrated North Korean computer networks years in advance of the Sony hacking.69

*** Much has been printed in recent months, the WikiLeaks release of the CIA/NSA toolkit that demonstrates abilities of both agencies ability to intrude and intercept adversaries and allies in the cyber realm. Due to private citizens fear of unauthorized and possible access to personal data and internet activities, many Americans are angry. That anger is not misplaced, however, consider, do we want our agencies to have cyber skills to penetrate such rogue regimes as North Korea, Syria, Iran or militant factions such as al Qaeda and Islamic State? The answer is likely yes.

The UK Sunday Times reports: ”

A missile test by North Korea that failed seconds after launch may have been sabotaged by a US cyber-attack, a former foreign secretary has said.

The US said a ballistic missile “blew up immediately” after firing near the port of Sinpo on the east coast early today.

“It could have failed because the system is not competent enough to make it work, but there is a very strong belief that the US through cyber methods has been successful on several occasions in interrupting these sorts of tests and making them fail,” Sir Malcolm Rifkind, the former foreign and defence secretary, told the BBC.”.

*** The UK Telegraph tells us in part: U.S. Pacific Command detected and tracked what it assessed to be a North Korean ballistic missile launch at 11:21 a.m. Hawaii time (2121 GMT) on Saturday, said U.S. Navy Commander Dave Benham, a spokesman for  Pacific Command.

“The missile blew up almost immediately. The type of missile is still being assessed,” he said.

It was launched  from a base at Sinpo, a port city on the North Korean east coast. The North’s previous attempted missile launch, on April 5, also suffered an in-flight failure before the weapon crashed into the Sea of Japan. Experts have suggested that the United States may be carrying out “left-of-launch” attacks on the missiles using electromagnetic propagation or cyber attacks, including through infected electronics aboard the weapon that confuse its command and control or targeting systems. More here.

*** So, while we tend to panic and push back on the cyber toolkit of Federal agencies which WikiLeaks tells us to do, perhaps we should look wider and deeper to the positive affects of those operations as Japan and S. Korea are most at risk if North Korea is remotely successful. Can and do Federal agencies exploit cyber tools and electronic warfare against American citizens and is there evidence of abuse? Not so much yet, but this site does invite readers to offer evidence.

*** Some other items of interest with regard to North Korea:

  1. Chinese troops are always stationed in the northeast near North Korea, and Yun Sun, a senior associate with the East Asia Program at the Stimson Center, told Business Insider that “Chinese troop movements happen often along that border” when North Korean nuclear and missile provocations seem imminent.

    “When North Korea acts up with some sort of provocation, the Chinese in the past have moved their troops to reinforce their deployments in the northeast for military preparedness,” Yun said.

    “On the other hand,” Yun said, “I think it does signal that the Chinese are concerned about a potential escalation, or even potential conflict” between the US and North Korea, as North Korea plans a nuclear test and the USS Carl Vinson aircraft carrier pulls up to Korea’s coast.

  2. North Korea forces citizens to work outside the country in often slave labor conditions and the regime keeps 85% of the revenue. “150,000 N.Koreans Sent to Slave Labor Abroad,” Chosun Ilbo, November 13, 2014.  This often amounts to $1 billion a year in revenue.
  3. North Korea selling arms to Hamas and advises on tunnel systems.
  4. North Korea has a sizeable inventory and robust program in both chemical and biological weapons. While the DPRK possesses considerable capabilities to deliver CW agents, it is unclear whether comparable munitions are available to deliver BW agents. Although the DPRK has advanced missile technology, the fragile nature of biological agents complicates the task of using missiles as a means of delivery and dispersal. While the ROK government has estimated that half of the DPRK’s long-range missiles and 30 percent of its artillery pieces are capable of delivering chemical or biological warheads, it is not known whether biological payloads would survive and be effectively dispersed by these missiles. More here.

 

 

 

Just Released Afghanistan MOAB Strike Video

KABUL, Afghanistan (April 13, 2017) – A GBU-43/B Massive Ordnance Air Blast bomb strikes ISIS-K cave and tunnel systems in the Achin district of the Nangarhar Province in eastern Afghanistan at 7:32 p.m. local time Thursday. The strike was designed to minimize risk to Afghan and U.S. Forces conducting clearing operations in the area while maximizing the destruction of ISIS-K fighters and facilities and eliminate any perceived safe haven for ISIS-K in Afghanistan

***

So what do those caves and tunnels look like that have been used by al Qaeda, bin Ladin and Islamic State?

Meanwhile, Russia and Iran are in meetings regarding Afghanistan. Russia is bragging too about their weapons that is bigger than the U.S. MOAB.

The 21,600-pound MOAB was developed in 2003 as a weapon to attack against elite Republican Guard units during the invasion of Iraq. But the bomb, which replaced the Vietnam-era 15,000-pound BLU-82 Daisy Cutter, was not used in that conflict because of the rapidity of Saddam Hussein’s army.

Soon after the Pentagon announced the new weapon, Russia began working on a counterpart. In 2007, it successfully tested the massive thermobaric weapon.

The bomber-dropped bomb is designed to explode midair by ignition of a fuel-air mixture that produces massive blast effects comparable to small tactical nuclear weapons.

“All that is alive merely evaporates,” Gen. Alexander Rukshin, deputy chief of the Russian general staff, was quoted as saying at the time.

Thermobaric devices detonate in two stages, with an initial blast dispersing explosive materials in a cloud that is then ignited by a secondary charge. The explosion generates a much bigger pressure wave than conventional explosives, followed by a vacuum effect that compounds damage and injuries caused by the blast.

Russian sources have claimed their weapon has a power equivalent to 44 tons of TNT – or four times that of the MOAB – despite being somewhat lighter than the U.S. munition at 16,650 pounds. Because of its yield and the extremely high temperatures it generates, it is slated to replace smaller battlefield nukes currently in the Russian arsenal.

When the Russian air force began bombing rebel positions in Syria in September 2015, smaller thermobaric bombs were used against Islamic State positions, but the FOAB was never deployed. More here.

CIA Director Spoke Truths and then got Trolled

CIA’s Pompeo rips WikiLeaks as ‘hostile intelligence service’ abetted by Russia

CIA Director Mike Pompeo, in his first speech since taking over the agency, lambasted WikiLeaks and its founder Julian Assange — calling the group a “non-state hostile intelligence service” that is often abetted by “state actors like Russia.”

Image result for cia pompeo YahooFinance

Speaking Thursday at the Center for Strategic and International Studies, Pompeo called Assange a “fraud,” someone with no “moral compass” and a “narcissist who has created nothing of value.”

He asserted that Assange and former National Security Agency staffer and famed leaker Edward Snowden “seek to use that information to make a name for themselves” and they “care nothing about the lives they put at risk or the damage they cause to national security.”

Asked why he would focus on WikiLeaks rather than other issues, Pompeo said he felt it was vital to inform the American people about the threat they pose.

In the case of Snowden, Pompeo said the detrimental impact of his leaks was expansive and that more than 1,000 foreign targets attempted to change their means of communication as a result of the Snowden disclosures.

“The bottom line is that it became harder for us in the intelligence community to keep Americans safe. It became harder to monitor the communications of terrorist organizations that are bent on bringing bloodshed to our shores.  Snowden’s disclosures helped these groups find ways to hide themselves in the crowded digital forest,” he said.

Last week, WikiLeaks released the latest chapter in its ongoing “Vault 7” series of cyber and hacking tools that it claims were stolen from the CIA.

According to its release, the new leaked information contains 27 documents from the CIA’s Grasshopper Framework, which is allegedly the software tools used by the CIA to infiltrate Microsoft’s Windows platform.  More here.

Image result for cia twitter wikileaks Baaghi

Enter the trolls:

The Hill reports:

WikiLeaks hit back at CIA Director Mike Pompeo on Thursday after he criticized the website.

Pompeo called WikiLeaks a “non-state hostile intelligence service” that had done “great harm to our nation’s national security.”

The site hit back by posting one of Pompeo’s now-deleted tweets from 2016 citing the group’s work publishing leaked documents from the Democratic National Committee.

“Need further proof that the fix was in from Pres. Obama on down? BUSTED: 19,252 Emails from DNC Leaked by Wikileaks,” Pompeo had tweeted.

WikiLeaks shared an image of that tweet, adding:”Tweet sent by CIA Director Mike Pompeo on 24 July 2016.” More here.

***

Okay, it is popular now to dislike James Comey, the Director of the FBI. Okay, but the rank and file agents at the FBI are the ones doing the hard work on investigations.

Associated Press reports:

WASHINGTON (AP) — FBI Director James Comey said Americans should be aware of foreign efforts to undermine confidence in U.S. elections and mindful of the possibility that what they’re reading might be part of an organized disinformation campaign.

U.S. adversaries, including Russia last year, have “used all kinds of vectors to try and influence and undermine our own faith in our democratic processes” and have relied on increasingly sophisticated tactics, the FBI director warned.

Speaking at a Newseum event Wednesday night, he said the FBI would be transparent in publicly calling out efforts to meddle in American politics and that the public also should take steps to guard against foreign influence.

“The most important thing to be done is people need to be aware of the possibility that what they’re reading has been shaped by troll farms looking to push a message on Twitter to undermine our confidence” about the electoral process, Comey said. More here.

*** Just in case you are still not a believer, this site published a summary of a two panel hearing before the Senate regarding ‘Active Measures’ and constant KGB tactic(s) used during the Cold War and especially now with the use of the internet and social media.

When is it Enough for Putin and Russia? This describes the Russian ‘botnet’ operation with testimony from 6 experts not employed by any Federal government agency. And in case you missed it, also from this site is FBI Global Hackers Sweeping Sting Arrests where most of those arrested were…yup Russian.

A believer yet? Maybe there just was and is a reason for several government investigations into the American infrastructure……right?