Illegal Immigrants, the DOJ Protected Class

Just the facts as reported to Fox News:

‘Not only are illegal immigrant women and children continuing to cross the border in large numbers, but the majority charged with crimes aren’t even showing up for court.

“That strategy is obviously a complete failure because such a high percentage of these people who were not detained have simply melted into the larger illegal population and have no fear of immigration enforcement,” said Jessica Vaughan, director of policy studies for the Center for Immigration Studies.

Statistics released by the Department of Justice Executive Office of Immigration Review show 84 percent of those adults with children who were allowed to remain free pending trial absconded, and fewer than 4 percent deported themselves voluntarily.

Since then, ICE detained 83,385 adults and children, and immigration courts completed 24,842 cases. Of those, more than 64 percent, or 16,136, didn’t show up for court, and fewer than 4 percent, or 908, agreed to leave voluntarily.

Among adults with children not detained, 25,000 have had their initial appearance; 13,000 are still in the system, and 12,000 have had their cases completed. Of the cases completed, 10,000 failed to appear.’

Yes…there is more.

We have this 2011 memo, rather edict from the Department of Homeland Security stating the new guidance for ‘failure to appear’ is not a reason for continued detention or prosecution.

Then there is the November 2014 memo, stating that Secure Communities program has been terminated due to complaints by local legislative bodies, governors and mayors and this will take its place:

‘Accordingly, I am directing U.S. Immigration and Customs Enforcement (ICE) to discontinue Secure Communities. ICE should put in its place a program that will continue to rely on fingerprint-based biometric data submitted during bookings by state and local law enforcement agencies to the Federal Bureau of Investigation for criminal background checks. However, ICE should only seek the transfer of an alien in the custody of state or local law enforcement through the new program when the alien has been convicted of an offense listed in Priority 1 (a), (c), (d), and (e) and Priority 2 (a) and

(b) of the November 20, 2014 Policies for the Apprehension, Detention and Removal of Undocumented Immigrants Memorandum, or when, in the judgment of an ICE Field Office Director, the alien otherwise poses a danger to national security. In other words, unless the alien poses a demonstrable risk to national security, enforcement actions through the new program will only be taken against aliens who are convicted of specifically enumerated crimes.’ The full memo is here.

So, when it comes to a protected class, there are countless free programs full of advise on how to take advantage of the system and benefits.

 

U.S. Citizenship and Immigration Services (USCIS)

U.S. Citizenship and Immigration Services (USCIS) is the government agency that oversees lawful immigration to the United States. USCIS will secure America’s promise as a nation of immigrants by providing accurate and useful information to our customers, granting immigration and citizenship benefits, promoting an awareness and understanding of citizenship, and ensuring the integrity of our immigration system. www.uscis.gov

USCIS Asylum Program resources include an information guide for prospective asylum applicants available in a number of languages, “How Do I” Guides for Refugees and Asylees, and the Asylum Officer Basic Training Course Lesson Plan. For more information, visit www.uscis.gov/asylum.

E-Verify is an Internet-based system that allows an employer, using information reported on an employee’s Form I-9, to determine the eligibility of an employee to work in the United States. For most employers, the use of E-Verify is voluntary and limited to determining the employment eligibility of new hires only. There is no charge to employers to use E-Verify. Available resources include searchable web pages, demonstration videos, guides on employee rights and employer responsibilities, fact sheets, weekly webinars, an overview presentation, brochures and posters for employers and employees. USCIS also has speakers and trainers available to give live presentations at conferences and meetings across the country. See http://www.dhs.gov/everify. Contact [email protected], (888) 464-4218 with any questions or comments.

Civics and Citizenship Toolkit – A Collection of Educational Resources for Immigrants contains a variety of educational materials designed to help permanent residents learn more about the U.S. and prepare for the naturalization process. For more information, visit http://www.citizenshiptoolkit.gov.

Expanding ESL, Civics, and Citizenship Education in Your Community: A Start-Up Guide provides an overview and recommendations to help organizations design and offer ESL and civics/citizenship classes for immigrants. See http://www.uscis.gov/USCIS/Office%20of%20Citizenship/Citizenship%20Resource%20Center%20Site/Publications/PDFs/M-677.pdf.

Form I-9, Employment Eligibility Verification, is a form that U.S. employers and their new hires have been required to complete since November 6, 1986. Completion of the form shows that the employer has examined documentation from each newly hired employee to verify his or her identify and eligibility to work in the U.S. Available resources include a Form I-9 web page, the M-274, Handbook for Employers, Instructions for Completing Form I-9, and the How Do I Complete Form I-9, Employment Eligibility Verification? (M-584) brochure. See http://www.uscis.gov. Call (888) 464-4218 with any questions or comments.

USCIS Genealogy Program is a fee-for-service program providing family historians and other researchers with timely access to historical immigration and naturalization records. The USCIS Genealogy Program offers two services: Index Search using biographical information provided by the researcher and a Record Copy Request where researchers with valid record citations (USCIS file numbers), gained through a USCIS Genealogy Program index search or through independent research, may request copies of historical immigration and naturalization records. Questions about the USCIS Genealogy Program may be sent to [email protected]. For more information, see http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=d21f3711ca5ca110VgnVCM1000004718190aRCRD&vgnextchannel=d21f3711ca5ca110VgnVCM1000004718190aRCRD.

Guide to Naturalization contains information about the naturalization process, laws and regulations. See http://www.uscis.gov/files/article/M-476.pdf.

If You Have the Right to Work, Don’t Let Anyone Take it Away Poster is a poster with Department of Justice information regarding discrimination in the workplace. See http://www.uscis.gov/files/nativedocuments/e-verify-swa-right-to-work.pdf.

USCIS Citizenship Resource Center USCIS officially launched the Citizenship Resource Center – a Web-based portal that centralizes citizenship resources for immigrants, educators and organizations. This free, easy-to-use website will help users understand the naturalization process and gain the necessary skills to be successful during the naturalization interview and test. To visit the Citizenship Resource Center, see http://www.uscis.gov/citizenship.

USCIS Information for Employers and Employees on the employment authorization verification process and the immigration petition process. See http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=ff1d83453d4a3210VgnVCM100000b92ca60aRCRD&vgnextchannel=ff1d83453d4a3210VgnVCM100000b92ca60aRCRD. For more information contact [email protected].

USCIS Information for Prospective Adoptive Parents provides information about adopting a child from overseas and the process by which to do so, dependent on the country chosen to adopt from. See http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=8d5e901bf9873210VgnVCM100000082ca60aRCRD&vgnextchannel=8d5e901bf9873210VgnVCM100000082ca60aRCRD

See all 3 pages here. In summary, if foreign policy was effective, no country would have a fleeing class of people from a failed state. There are many to blame of this one.

 

Hillary’s Plan for Post Qaddafi Libya

Libya and Hillary’s team investment operation in post Qaddafi Libya

 

When Ambassador Cretz was expelled from Libya, he was later assigned to Ghana. As of this week, he is out of Ghana, allegedly retiring. I would suggest he is in the belly of the beast with the Hillary team, but I can’t prove anything other than a gut feeling.

 

The Blumenthal and Clinton emails explain that Qaddafi’s demise was imminent so the financial investment opportunities in the pipeline for Libya were about to gain traction that included Qatar, where Hillary fully collaborated with the dynasty there. 

 

Last month, I authored a piece on the little known agenda Hillary, Blumenthal and Drumheller along with the Qataris were working on, where Tripoli and Benghazi were to be the new Middle East version of New York’s 5th Avenue.

     

Before Qaddafi and just after Qaddafi, note there was a luxury project underway. The Libyan-Qatari Company declared recently the laying of the foundation stone of “The Waterfront” project, for the construction of a luxurious residential complex and resort near Tripoli, expected to be completed by the end of 2012.

Many interesting details are noted here.

 Pay to Play…literally…

This poses another question to bubble to the surface when the matter of Bill Clinton, the Foundation, Qatar and FIFA all come into the same sentence.

 

 

In 2014, more came to light when one pays attention to foreign press releases that speaks about the future of Libya at the hands of Qatar and other European investors.

 

Qatar in Libya, 2011-present

 

Qatar’s bold support for the 2011 Libyan revolution was a striking example of the small state’s assertiveness in the external realm. One of the most symbolic moments of this support came when rebels in Libya overran Qadhafi’s Tripoli headquarters in August 2011 and briefly raised the maroon and white Qatari flag over the compound. That day, Mahmoud Jibril, the head of Libya’s provisional governing authority, the National Transitional Council (NTC), publically thanked Qatar for its support of the Libyan revolution.

 

While Qatar’s role in Libya was critical in backing the revolution, the emirate had also dealt with the Qadhafi regime prior to 2011. Indeed, Qatari investments in Libya amounted to USD 10 billion before the start of the civil war. During that time, Qatari companies won construction contracts for the development of residential and entertainment complexes in and around Tripoli based on a joint venture between the Libyan Economic and Social Development Fund and the Qatari Diar Real Estate Investment Company, a branch of the state-run Qatar Investment Authority.

 

Apparently seeing the inevitable demise of Qadhafi, in March 2011, Qatar nevertheless helped to rally support within the Arab League for the UN Security Council resolutions authorizing NATO intervention in Libya. It was the first Arab state to recognize the National Transition Council (NTC).viii Qatar went so far as to participate in the air war with its own military aircraft (six Mirage fighter jets), and elite Qatari troops participated in the liberation of Tripoli. By the end of the conflict, Qatar had contributed USD 400 million to the rebels (including an estimated twenty thousand tons of Qatari weapons and equipment), trained fighters, set up a TV station in Doha, helped Libya keep its oil exports flowing, and provided political and organizational support, especially to militias aligned with its vision and interests.

 Doing Business with Middle East Operations Blocked by Treasury

What is very interesting is in November of 2011, several of the investment groups were removed from the Treasury Department’s special designation list of Foreign Assets Control and one in particular was the Libyan Economic and Social Development Fund.

 

Then enter more on Qatar. Now there is a Tourism company in Libya The Qatar Diar a worldwide real estate developer has grand real estate operations.

 

What is planned now for Libya after the Arab Spring  Back to the European investors and the collusion with Qatar. Then Rachel Ehrenfeld wrote a very good time line using names attached to the Foundation.

 

So how did or does this all work out? Not so well when ISIS has a growing footprint in Libya. Summary from The Fuse:

 ISIS in Libya map

 

 

 

 

Cyber Conflict, Chaos and Calamity

There have been several Congressional hearings on cyber-terrorism, yet with such an emergency and threat, no solution is forthcoming.

From AEI: “America’s intelligence leaders have made clear the biggest threat today is cyber and counterintelligence. Who are the largest perpetrators of these types of attacks? The intelligence report singles out Russia and China as first examples. These nations have “highly sophisticated cyber programs” and are regularly conducting “politically motivated” attacks. What are they up to exactly? Countries such as China are “reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile.” Back in 2013, Verizon released a report detailing Chinese hackers lurking around inside American industrial control systems—the cyber equivalent to casing a robbery target. In 2014 alone, the FBI investigated a likely Russian hacking campaign against American banking backbone JP Morgan, while two cybersecurity firms blamed Iran for a major campaign against US critical infrastructure like major airliners, medical universities, and energy companies. As the year ended, the US government publicly accused North Korea of a devastating cyberattack against Sony.”

When of Office of National Intelligence produced a report, the first chapter is on cyber threats.

“Risk. Despite ever-improving network defenses, the diverse possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come. In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed. Moreover, the risk calculus employed by some private sector entities does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.

Costs. During 2014, we saw an increase in the scale and scope of reporting on malevolent cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information (PII) compromised, or remediation costs incurred by US victims. “

The stakes are higher than anyone will admit, most of all the White House. The Office of Personnel Management hack of personnel files now appears to exceed 18 million individuals. “FBI Director James Comey gave the 18 million estimate in a closed-door briefing to Senators in recent weeks, using the OPM’s own internal data, according to U.S. officials briefed on the matter. Those affected could include people who applied for government jobs, but never actually ended up working for the government.”

Just announced as a possible additional agency falling victim to hacking is the National Archives and Records Administration (NARA). What is chilling about this probability is all government reports, records and communications are by law to be maintained by NARA., even classified material.

EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed.

The National Archives’ own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security’s U.S. Computer Emergency Readiness Team published signs of the wider attack — which targeted the Office of Personnel Management — to look for at agencies, according to NARA.

It is unclear when NARA computers were breached. Suspected Chinese-sponsored cyberspies reportedly had been inside OPM’s networks for a year before the agency discovered what happened in April. Subsequently, the government uncovered a related attack against OPM that mined biographical information on individuals who have filed background investigation forms to access classified secrets.

The National Archives has found no evidence intruders obtained “administrative access,” or took control, of systems, but files were found in places they did not belong, the investigator said.

NARA “systems” and “applications” were not compromised, National Archives spokeswoman Laura Diachenko emphasized to Nextgov,  “but we detected IOCs,” indicators of compromise, “on three workstations, which were cleaned and re-imaged,” or reinstalled.

“Other files found seemed to be legitimate,” such as those from a Microsoft website, she said. “We have requested further guidance from US-CERT on how to deal with these” and are still awaiting guidance on how to proceed.

It will take additional forensics assessments to determine whether attackers ever “owned” the National Archives computers, the investigator said.

Diachenko said, “Continued analysis with our monitoring and forensic tools has not detected any activity associated with a hack,” including alerts from the latest version of a governmentwide network-monitoring tool called EINSTEIN 3A.

EINSTEIN, like NARA’s own intrusion-prevention tool, is now configured to detect the tell-tale signs of the OPM attack.

“OPM isn’t the only agency getting probed by this group,” said John Prisco, president of security provider Triumphant, the company that developed the National Archives’ tool. “It could be happening in lots of other agencies.”

Prisco said he learned of the incident at a security industry conference June 9, from an agency official the company has worked with for years.

“They told us that they were really happy because we stopped the OPM attack in their agency,” Prisco said.

The malicious operation tries to open up ports to the Internet, so it can excise information, Prisco said.

“It’s doing exploration work laterally throughout the network and then it’s looking for a way to communicate what it finds back to its server,” he added.

Homeland Security officials on Monday would not confirm or deny the situation at the National Archives. DHS spokesman S.Y. Lee referred to the department’s earlier statement about the OPM hack: “DHS has shared information regarding the potential incident with all federal chief information officers to ensure that all agencies have the knowledge they need to defend against this cybersecurity incident.”

The assault on OPM represents the seventh raid on national security-sensitive or federal personnel information over the past year.

Well-funded hackers penetrated systems at the State Department, the White House, U.S. Postal Service and, previously in March 2014, OPM. Intruders also broke into networks twice at KeyPoint Government Solutions, an OPM background check provider, and once at USIS, which conducted most of OPM’s employee investigations until last summer.

On Wednesday, the House Oversight and Government Reform Committee is scheduled to hold a hearing on the OPM incident that, among other things, will examine the possibility that hackers got into the agency’s systems by using details taken from the contractors.

Is Putin Afraid of $50 Billion or Russia’s Future?

Vladimir Putin is obviously corrupt and aggressive and countless world leaders maintain the evidence, include the International Criminal Court at the Hague. In 2014, an international court has awarded the shareholders of the now-defunct Yukos oil company more than $50 billion, ruling that the Russian government wrongly seized the company from one of the country’s most powerful oligarchs.

The award by a tribunal in The Hague — the largest ever in international arbitration — is the latest chapter in a dispute that began in 2003 when Russian authorities arrested Yukos’s chairman, Mikhail B. Khodorkovsky, and sold off his company over the next several years.

There are also negative implications for Russia was the European Court of Human Rights finding that Armenia had occupied Nagorno-Karabakh and was thus liable for the destruction there. Regardless of the merits of each side in that war, there is no reason why Ukraine cannot now appear before that court to find Russia guilty of occupying Ukraine and therefore liable for the destruction and loss of life there. Moreover, upon invading Crimea, Moscow immediately seized all the assets of Ukraine’s energy explorations there and took them over (that may have been a motive for the invasion of Crimea). 

Another matter is the legal and political action against Moscow, not only by international courts but by the European Commission for there is no doubt that Russia’s projected Turk Stream pipeline will contain some of that gas as do Russian oil shipments to Europe, If the Commission could block South Stream on the grounds of its failure to conform to EU guidelines, it can certainly block a pipeline that utilizes the fruits of unmitigated aggression. And courts can easily declare those as stolen assets and impose penalties on Russia and anyone benefiting from them.

Then there is the case of the Malaysian flight 17 that was shot down which continues to be investigated.

The case against the Russian aggression continues to build and it is questionable whether Putin has any concerns on how this will play out for the future of the country or whether he takes it all in stride for a larger mission.

The matter of Crimea has not subsided nor has it been settled. From the Daily Beast in part:

‘Under occupation Crimea has become a cesspool of human rights violations, but a new report offers some hope. An international team of lawyers, working with Razom, the Ukrainian-American human rights nonprofit, compiled investigations by Human Rights Watch, the U.N., and other leading organizations as well as accounts from journalists and Crimean residents, into a single reportHuman Rights on Occupied Territory: Case of Crimea. The 68-page report is conveniently structured to provide a clear legal framework for Crimeans and policymakers to bring Russian aggression to justice. It also provides a section called “Human Rights Protection Guide,” which includes peaceful resistance tactics including some used during the Soviet Union.’

Defense Secretary Ash Carter is on a Eastern Europe tour as positioning of military equipment is occurring in Bulgaria, Estonia, Latvia, Lithuania, Poland and Romania.

From the WSJ:

‘The equipment, which includes a total of 250 tanks, Bradley fighting vehicles and self-propelled howitzers, is headed to temporary sites in Bulgaria, Estonia, Latvia, Lithuania, Poland and Romania, Mr. Carter said here, flanked by his counterparts from three of the most anxious Baltic nations; Estonia, Lithuania and Latvia.

The full complement of equipment, which includes noncombat related cars and trucks and other equipment for an armored brigade combat team for as many as 5,000 troops, includes roughly 1,200 vehicles, according to a senior military official.

“American rotational forces need to more quickly and easily participate in training and exercises in Europe,” Mr. Carter told reporters in Tallinn.

The long-awaited move won’t place American troops in those temporary bases, even though Estonia, Latvia and Lithuania had specifically requested that the North Atlantic Treaty Organization do so. Instead, American rotational forces, which have been used for months for a series of exercises called Operation Atlantic Resolve, would fall in on the equipment housed at the different sites across the six nations. The idea is to save shipping costs for the Pentagon, which has had to move equipment to and fro for each exercise. But basing the equipment at the sites also helps demonstrate American resolve in the region since Russia annexed Crimea last year.’

POTUS Approves U.S. Troops Sharing Base with Iran

Cant make this up…Iran has been an enemy of the United States for decades and now our uniformed personnel in Iraq are forced to share an air base, Taqqadum, in Anbar. This is not sitting well with one senator and frankly, we should be screaming about it. What is worse, is the Joint Chiefs are apparently cool with it unless there are chairs and tables being thrown about in the halls of the Pentagon?

Washington, D.C.— Senator Tom Cotton (R-Arkansas) today released the following statement in response to reports that the United States is sharing a military base with Iranian forces in Iraq:
“When I was a soldier fighting in Iraq, Iran supplied the most advanced, most lethal roadside bombs used against coalition forces. Many American soldiers lost their lives to Iran’s proxies and Iranian-supplied bombs.  Further, Iran is the leading state sponsor of terrorism and has been attacking the United States for decades. It’s deeply troubling that the President now finds it acceptable to share a military base with this enemy, even while we are attempting to negotiate a deal to keep Iran from obtaining nuclear weapons.
“This report is a stark and nearly absurd demonstration of the Obama administration’s tacit accommodation of Iran’s strategic aim of extending its influence in Iraq.  It echoes the president’s tacit accommodation of Iran’s wish to maintain Bashar al-Assad in Syria and his explicit accommodation of Iran’s nuclear ambitions.”
For background in MILCOM in Iraq and this base, see page 33.

Iran’s Forces and U.S. Share a Base in Iraq