An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Trends in Chinese Military Worrying the U.S.

China is not an enemy, but it is certainly an adversary of the United States, and the Defense Department’s 2018 report to Congress examines the trends in Chinese military developments.

 

People's Liberation Army troops demonstrate an attack during a visit by Marine Corps Gen. Joe Dunford, the chairman of the Joint Chiefs of Staff, to China.

Demonstrate Attack

People’s Liberation Army troops demonstrate an attack during a visit by Marine Corps Gen. Joe Dunford, the chairman of the Joint Chiefs of Staff, to China, Aug. 16, 2017. DoD photo by Navy Petty Officer 1st Class Dominique A. Pineiro

Congress mandates the report, titled “Military and Security Developments Involving the People’s Republic of China.” While the report highlights military developments, it also addresses China’s whole-of-government approach to competition.

China’s economic development is fueling extraordinary changes in relationships it maintains around the world, according to the report. On the face of it, China’s “One Belt, One Road” initiative sounds benign – it looks to build infrastructure for developing countries and Chinese neighbors.

Chinese leaders have funded serious projects as far away as Africa under the initiative. They have built roads in Pakistan and made major inroads in Malaysia. China has a major stake in Sri Lanka. Kazakhstan, Mongolia, Laos and Djibouti also are involved.

The Chinese government seeks to overturn the established international order that has kept the peace in the region since World War II and allowed Asian countries to develop.

But “One Belt, One Road” money and projects come with strings. The “one road” leads to China, and nations are susceptible to Chinese influence on many levels – political, military, and especially, economic.

Economic Clout

In 2017, China used its economic clout in South Korea as a bludgeon to get Seoul to not allow the United States to deploy the Terminal High-Altitude Area Defense system in the country as a counterweight to North Korea’s nuclear missile program. The Chinese government informally lowered the boom on South Korea economically to influence the THAAD decision.

South Korean cars and other exports were embargoed. About a quarter of all goods South Korea exports goes to China, so this had an immediate effect on the economy. In addition, tourism suffered, as nearly half of all entries to South Korea are from China, and South Korean retail stores in China were crippled.

The South Korean government decided to allow the THAAD to deploy, but China’s economic muscle movement had to be noted in other global capitals.

South China Sea

“In its regional territorial and maritime disputes, China continued construction of outposts in the Spratly Islands, but also continued outreach to South China Sea claimants to further its goal of effectively controlling disputed areas,” the DoD reports says in its executive summary. In other words, China is using military power and diplomatic efforts in tandem to claim the South China Sea.

 

Defense Secretary James N. Mattis meets with China's Defense Minister Gen. Wei Fenghe at the People's Liberation Army's Bayi Building in Beijing.

Mattis Meets

Defense Secretary James N. Mattis meets with China’s Defense Minister Gen. Wei Fenghe at the People’s Liberation Army’s Bayi Building in Beijing, June 28, 2018. DoD photo by Army Sgt. Amber I. Smith

The People’s Liberation Army has come a long way from the human-wave attacks of the Korean War, and Chinese leaders want to build a military worthy of a global power. “Chinese military strategy documents highlight the requirement for a People’s Liberation Army able to secure Chinese national interests overseas, including a growing emphasis on the importance of the maritime and information domains, offensive air operations, long-distance mobility operations, and space and cyber operations,” the report says.

Chinese military planners looked at what the United States accomplished in Operation Desert Shield/Desert Storm in 1990 and 1991 and charted their way forward. The PLA is fundamentally restructuring to challenge and beat any military in the world.

The PLA – still the largest force in the world – actually cut people to streamline command and control and modernize forces. The Chinese seek to win at all levels of conflict, from regional conflicts to wars with peer competitors. “Reforms seek to streamline command and control structures and improve jointness at all levels,” the report said. The PLA is using realistic training scenarios and exercising troops and equipment regularly.

New Capabilities

China is investing billions in new capabilities including artificial intelligence, hypersonic technology, offensive cyber capabilities and more. China also has launched an aircraft carrier and added many new ships to the PLA Navy. The Chinese Navy is more active and making more port calls than in years past. Further, the PLA Marine Corps is expanding from 10,000 personnel to 30,000.

The PLA Air Force has been reassigned a nuclear mission, giving China a nuclear triad — along with missile and subs — for the first time.

 

Marine Corps Gen. Joe Dunford, chairman of the Joint Chiefs of Staff, meets with Chinese President Xi Jinping in the Great Hall of the People in Beijing.

Leaders Meet

Marine Corps Gen. Joe Dunford, chairman of the Joint Chiefs of Staff, meets with Chinese President Xi Jinping in the Great Hall of the People in Beijing, Aug. 17, 2017. DoD photo by Navy Petty Officer 1st Class Dominique A. Pineiro

Cyber operations play a significant role in the Chinese military. The PLA has a large corps of trained and ready personnel. Cyber espionage is common, and there are those who believe China was able to get plans of the F-35 Thunderbolt II joint strike fighter, which they incorporated into its J-20 stealth fighter.

The U.S. National Security Strategy and National Defense Strategy recognize that China and Russia are strategic competitors of the United States. Still, the United States must engage with China, and maintenance of cordial military-to-military relations is in both nations’ best interests.

“While the Department of Defense engages substantively with the People’s Liberation Army, DoD will also continue to monitor and adapt to China’s evolving military strategy, doctrine and force development, and encourage China to be more transparent about its military modernization,” the report says.

The United States military will adapt to counter and get ahead of moves by any competitor, DoD officials said.

Securing the Elections, FBI Investigating Hacks

Securing the vote.

The states, which under the US system are responsible for conducting elections, remain concerned about the integrity of the ballot. Thirty-six  states have now deployed Albert sensors on their voting infrastructure to allow the Department of Homeland Security to observe state systems that manage either voter information or voting devices (Reuters).

The states also want the Feds to share more threat intelligence. Forty-four states and the District of Columbia took part in a Department of Homeland Security exercise this week  (US Department of Homeland Security). The states appear to have gained enough insight into the value of threat intelligence to decide that they want more of it (Reuters). Some advocate Federal standards for the conduct of elections, perhaps even mandatory standards (Atlantic Council). More here.

Meanwhile:

Then there is the matter the FBI is investigating in California.

The FBI launched investigations after two Southern California Democratic U.S. House candidates were targeted by computer hackers, though it’s unclear whether politics had anything to do with the attacks.

A law enforcement official told The Associated Press the FBI looked into hacks involving David Min in the 45th Congressional District and Hans Keirstead in the adjacent 48th District. Both districts are in Orange County and are seen as potential pickups as the Democratic Party seeks to win control of the Congress in November.

A person with knowledge of the Min investigation told the AP on Monday that two laptops used by senior staffers for the candidate were found infected with malware in March. It’s not clear what, if any, data was stolen, and there is no evidence the breach influenced the contest.

The CEO of a biomedical research company, Keirstead last summer was the victim of a broad “spear-phishing” attack, in which emails that appear to come from a friend or familiar source are designed to help hackers snatch sensitive or confidential information, the law enforcement official said. There is no evidence Keirstead lost valuable information.

The investigations so far have not turned up evidence the two candidates in Orange County were political targets.

The official and the knowledgeable person were not authorized to discuss the cases publicly and spoke only on condition of anonymity.

Keirstead was narrowly defeated in the June primary for the seat held by Republican Rep. Dana Rohrabacher. Min came in third in the contest to unseat Republican Rep. Mimi Walters.

Min’s staff was alerted to a potential cyberattack by a facility manager in the software incubator where his campaign rented space. It was later found the computers were infected with software that records and sends keystrokes, with additional software that concealed it from conventional anti-virus tools used by the campaign.

Hackers also used a broad spear-phishing attack in an attempt to gain access, and FBI investigators are still piecing together additional details, the official said.

The two laptops were replaced, and Min’s computer was not infected. The attack on the computers was first reported by Reuters.

Keirstead campaign officials detected repeated attempts to access the campaign’s website.

Rolling Stone magazine, which first reported that cyberattack, said hackers or bots tried different username-password combinations in a rapid-fire sequence over a two-and-a-half-month period to get inside the campaign’s WordPress-hosted website.

According to the campaign, there were also more than 130,000 so-called brute force attempts over a monthlong period to gain access to the campaign’s server through the cloud-server company that hosted the Keirstead campaign’s website, Rolling Stone said.

Computer security experts say that many attempts to gain access to a site hosted with the popular and free WordPress software is not unusual.

“Every WordPress hosted website sees 130,000 brute force attempts over a monthlong period, regardless whether it’s Bohemian basket weaving, a blog about furry costume construction, or a politician website,” said Robert Graham, a cybersecurity expert who created the BlackICE personal firewall.

“Hackers don’t know or care who you are: they only care that you use WordPress,” Graham said in a text message.

Min finished third behind fellow Democrat Katie Porter, who faces Walters in November. In the 48th District, Rohrabacher will face Democrat Harley Rouda, who snagged the second runoff spot by defeating Keirstead by 125 votes.

Is that Russian Submarine Threat Still out There?

It is not just the U.S. Navy that is on alert. Europe’s top Navy Commander:

NAPLES, Italy — Russia is deploying more submarines to the Mediterranean, the Black Sea and North Atlantic than at any time since the Cold War as part of a growing power game driving the U.S. to revive a decommissioned fleet and NATO to strengthen its naval defenses, the Navy’s top commander in the theater said.

Russia is upgrading its submarine forces and improving their missile capabilities, all while relations between Moscow and NATO remain tense over Russia’s annexation of Ukraine’s Crimean Peninsula in 2014, Adm. James Foggo, commander of U.S. Naval Forces Europe and Africa, said in an interview earlier this month.

“The illegal annexation of Crimea … that certainly has put a strain on our relationship,” Foggo told Stars and Stripes. “It’s their bad behavior, not ours. It’s the things they are doing.”

The Navy is reviving 2nd Fleet, though on a smaller scale than the one deactivated in 2011, to supply more ships in what Foggo described as growing competition between Russia and NATO in the Atlantic Ocean.

The renewed 2nd Fleet will be a Norfolk, Va.-based joint forces command, with many details yet to be worked out, Foggo said, adding that Navy leaders will know more after NATO’s July summit in Brussels. More here.

***

This is not really a new condition, it has been going on for a few years without any real U.S. response that is until the Omnibus was passed where monies were allocated for air-dropped sonobuoys that can detect submarines and transmit data back to motherships. The warnings began with Russia, operating in the Mediterranean where missiles were fired into Syria on several occasions.

The United States and Britain have been playing cat and mouse with Russia in several locations. Under Exercise Dynamic Mongoose, 10 NATO countries have been practicing hunting tactics of stealth submarines off Norway’s coast.

This past April, Lockheed Martin was awarded a $1 billion contract for a hypersonic cruise missile.

The Hypersonic Conventional Strike Weapon program is one of two hypersonic weapon prototyping efforts being pursued by the Air Force, and comes in addition to the Tactical Boost Glide program, which the Air Force is working on with DARPA and Raytheon. The service plans to have a prototype ready by 2023.

The Tactical Boost Glide is designed to operate at 5 times the speed of sound to enhance current military systems.

The United States has 70 nuclear powered submarines and 52 attack submarines along with 4 cruise missile armed submarines and 14 ballistic missile submarines. They all patrol bodies of water across the globe.

Russian Subs Are Reheating a Cold War Chokepoint - Defense One  photo

Adm. John Richardson, Chief of Naval Operations has confirmed increased foreign submarine operations.

According to GlobalFirePower.com, North Korea has the world’s largest submarine fleet by raw numbers with 76, though most of Pyongyang’s fleet consists of shorter-range, electric-diesel coastal patrol craft. China and Russia, both with modern nuclear-powered fleets that rival the U.S. fleet, have 68 subs and 63 subs, respectively.

NATO Secretary-General Jens Stoltenberg, in an interview with the Frankfurt Allgemeine and other news outlets in December, said the Kremlin is investing heavily in its submarine fleet, with 13 delivered since 2013. NATO countries, he said, have let their underwater firepower lag. “We have practiced less and lost skills,” the NATO chief said.

A particular point of concern, said one former high-level U.S. Navy official, is that Moscow may be attempting to tap into or sever some of the 550,000 miles of underwater fiber-optic cables that span the Atlantic and Arctic sea lanes.

“Russians have had a capability … to do things with these cables for the last 20 to 30 years,” said Tom Callender, who once served as head of capabilities for the Navy’s deputy undersecretary office and is now a senior defense fellow at The Heritage Foundation.

“Russians have had a capability … to do things with these cables for the last 20 to 30 years,” said Tom Callender, who once served as head of capabilities for the Navy’s deputy undersecretary office and is now a senior defense fellow at The Heritage Foundation.More than 95 percent of the global internet traffic — military and civilian, classified and unclassified — is transmitted across the network of submerged cables along the ocean floor, according to Washington-based tech firm TeleGeography. The quantity is massive compared with just a decade ago, when just 1 percent of all online traffic went through the cables.

Seabed vulnerability

The majority of the 285 underwater cables in place crisscross beneath heavily trafficked sea lanes of the Atlantic and Arctic regions. According to TeleGeography, the longest single cable stretches 24,000 miles and relays internet traffic and other electronic communications from Europe, Asia and Africa.

The scale and scope of global communications moving through the network of cables — some of which are only 2 inches thick — present a lucrative target that is vulnerable to attack by U.S. adversaries. It also poses a significant challenge to U.S. forces defending the lines. Read more detail here.

 

Iran Sleeper Cells Parked Around the U.S.

Primer: Two Individuals Charged for Acting as Illegal Agents of the Government of Iran

Could it be that law enforcement officials are working the cases diligently? This adds a deeper dimension to the work of the FBI, ICE and Border Patrol as well as all diplomatic posts in Central America and Latin America. Iran’s economy is in a free-fall, so money/revenue is most important and illicit activities, including attacks are the easiest method to raise operational funds.

Israel and Stuff » Report: Obama WH obstructed Hezbollah ...

Related reading: DoJ’s Bruce Ohr Demoted Again, Project Cassandra?

Iranian-backed militants are operating across the United States mostly unfettered, raising concerns in Congress and among regional experts that these “sleeper cell” agents are poised to launch a large-scale attack on the American homeland, according to testimony before lawmakers.

Iranian agents tied to the terror group Hezbollah have already been discovered in the United States plotting attacks, giving rise to fears that Tehran could order a strike inside America should tensions between the Trump administration and Islamic Republic reach a boiling point.

Intelligence officials and former White House officials confirmed to Congress on Tuesday that such an attack is not only plausible, but relatively easy for Iran to carry out at a time when the Trump administration is considering abandoning the landmark nuclear deal and reapplying sanctions on Tehran.

There is mounting evidence that Iran poses “a direct threat to the homeland,” according to Rep. Peter King (R., N.Y.), a member of the House Homeland Security Committee and chair of its subcommittee on counterterrorism and intelligence.

A chief concern is “Iranian support for Hezbollah, which is active in the Middle East, Latin America, and here in the U.S., where Hezbollah operatives have been arrested for activities conducted in our own country,” King said, referring the recent arrest of two individuals plotting terror attacks in New York City and Michigan.

“Both individuals received significant weapons training from Hezbollah,” King said. “It is clear Hezbollah has the will and capability.”

After more than a decade of receiving intelligence briefs, King said he has concluded that “Hezbollah is probably the most experienced and professional terrorist organization in the world,” even more so than ISIS and Al Qaeda.

Asked if Iran could use Hezbollah to conduct strikes on the United States, a panel of experts including intelligence officials and former White House insiders responded in the affirmative.

“They are as good or better at explosive devices than ISIS, they are better at assassinations and developing assassination cells,” said Michael Pregent, a former intelligence officer who worked to counter Iranian influence in the region. “They’re better at targeting, better at looking at things,” and they can outsource attacks to Hezbollah.

“Hezbollah is smart,” Pregent said. “They’re very good at keeping their communications secure, keeping their operational security secure, and, again, from a high profile attack perspective, they’d be good at improvised explosive devices.”

Others testifying before Congress agreed with this assessment.

“The answer is absolutely. We do face a threat,” said Emanuele Ottolenghi, a senior fellow at the Foundation for Defense of Democracies who has long tracked Iran’s militant efforts. “Their networks are present in the Untied States.”

Iran is believed to have an auxiliary fighting force or around 200,000 militants spread across the Middle East, according to Nader Uskowi, a onetime policy adviser to U.S. Central Command and current visiting fellow at the Washington Institute for Near East Policy.

At least 50 to 60 thousand of these militants are “battle tested” in Syria and elsewhere.

“It doesn’t take many of them to penetrate this country and be a major threat,” Uskowi said. “They can pose a major threat to our homeland.”

While Iran is currently more motivated to use its proxies such as Hezbollah regionally for attacks against Israel or U.S. forces, “those sleeper cells” positioned in the United States could be used to orchestrate an attack, according to Brian Katulis, a former member of the White House National Security Council under President Bill Clinton.

“The potential is there, but the movement’s center of focus is in the region,” said Katulis, a senior fellow at the Center for American Progress.

Among the most pressing threats to the U.S. homeland is Hezbollah’s deep penetration throughout Latin America, where it finances its terror activities by teaming up with drug cartels and crime syndicates.

“Iran’s proxy terror networks in Latin America are run by Tehran’s wholly owned Lebanese franchise Hezbollah,” according to Ottolenghi. “These networks are equal part crime and terror” and have the ability to provide funding and logistics to militant fighters.

“Their presence in Latin America must be viewed as a forward operating base against America’s interest in the region and the homeland itself,” he said.

These Hezbollah operatives exploit loopholes in the U.S. immigration system to enter America under the guise of legitimate business.

Operatives working for Hezbollah and Iran use the United States “as a staging ground for trade-based and real estate-based money laundering.” They “come in through the front door with a legitimate passport and a credible business cover story,” Ottolenghi said.

The matter is further complicated by Iran’s presence in Syria, where it has established not only operating bases, but also weapons factories that have fueled Hezbollah’s and Hamas’s war on Israel.

Iran’s development of advanced ballistic missile and rocket technology—which has continued virtually unimpeded since the nuclear deal was enacted—has benefitted terror groups such as Hezbollah.

“Iran is increasing Hezbollah’s capability to target Israel with more advanced and precision guided rockets and missiles,” according to Pregent. “These missiles are being developed in Syria under the protection of Syrian and Russian air defense networks.”

In Iraq, Iranian forces “have access to U.S. funds and equipment in the Iraqi Ministry of Defense and Iraq’s Ministry of Interior,” Pregent said.

The Trump administration has offered tough talk on Iran, but failed to take adequate action to dismantle its terror networks across the Middle East, as well as in Latin American and the United States itself, according to CAP’s Katulis.

“The Trump administration has talked a good game and has had strong rhetoric, but I would categorize its approach vis-à-vis Iran as one of passive appeasement,” said Katulis. “We simply have not shown up in a meaningful way.”

New York: Nazi Ordered Deported in 2004

palij

Former Nazi Labor Camp Guard Jakiw Palij Removed to Germany

Palij is 68th Nazi Removed from the United States

WASHINGTON, D.C. – Jakiw Palij, a former Nazi labor camp guard in German-occupied Poland and a postwar resident of Queens, New York, has been removed by U.S. Immigration and Customs Enforcement (ICE) to Germany, Attorney General Jeff Sessions of the U.S. Department of Justice, Secretary Kirstjen M. Nielsen of the U.S. Department of Homeland Security, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and ICE Deputy Director and Acting Director Ronald D. Vitiello announced today.  ICE removed Palij based on an order of removal obtained by the Department of Justice in 2004.

“The United States will never be a safe haven for those who have participated in atrocities, war crimes, and human rights abuses,” said Attorney General Sessions.  “Jakiw Palij lied about his Nazi past to immigrate to this country and then fraudulently become an American citizen.  He had no right to citizenship or to even be in this country.  Today, the Justice Department—led by Eli Rosenbaum and our fabulous team in the Human Rights and Special Prosecutions Section, formerly the Office of Special Investigations—successfully helped remove him from the United States, as we have done with 67 other Nazis in the past.  I want to thank our partners at the State Department and the Department of Homeland Security for all of their hard work in removing this Nazi criminal from our country.”

“Nazi war criminals and human rights violators have no safe haven on our shores,” said Secretary Kirstjen M. Nielsen of the U.S. Department of Homeland Security.  “We will relentlessly pursue them, wherever they may be found, and bring them to justice.  The arrest and removal of Jakiw Palij to Germany is a testament to the dedication and commitment of the men and women of ICE, who faithfully enforce our immigration laws to protect the American people.”

Palij, 95, was born in a part of Poland that is situated in present-day Ukraine, immigrated to the United States in 1949 and became a U.S. citizen in 1957. He concealed his Nazi service by telling U.S. immigration officials that he had spent the war years working until 1944 on his father’s farm in his hometown, which was previously a part of Poland and is now in Ukraine, and then in a German factory.

As Palij admitted to Justice Department officials in 2001, he was trained at the SS Training Camp in Trawniki, in Nazi-occupied Poland, in the spring of 1943. Documents subsequently filed in court by the Justice Department showed that men who trained at Trawniki participated in implementing the Third Reich’s plan to murder Jews in Poland, code-named “Operation Reinhard.” On Nov. 3, 1943, some 6,000 Jewish men, women and children incarcerated at Trawniki were shot to death in one of the largest single massacres of the Holocaust. By helping to prevent the escape of these prisoners during his service at Trawniki, Palij played an indispensable role in ensuring that they later met their tragic fate at the hands of the Nazis.

On May 9, 2002, the Criminal Division’s then-Office of Special Investigations (OSI) and the U.S. Attorney’s Office of the Eastern District of New York filed a four-count complaint in the U.S. District Court for the Eastern District of New York, to revoke Palij’s citizenship.  The complaint was based primarily upon his wartime activities as an armed guard of Jewish prisoners at Trawniki, who were confined there under inhumane conditions.   Palij’s U.S. citizenship was revoked in August 2003 by a federal judge in the Eastern District of New York based on his wartime activities and postwar immigration fraud.  In November 2003, the government placed Palij in immigration removal proceedings.

In decisions issued on June 10 and Aug. 23, 2004, U.S. Immigration Judge Robert Owens ordered Palij’s deportation to Ukraine, Poland or Germany, or any other country that would admit him, on the basis of his participation in Nazi-sponsored acts of persecution while serving during World War II as an armed guard at the Trawniki forced-labor camp in Nazi-occupied Poland under the direction of the government of Germany and his subsequent concealment of that service when he immigrated to the United States. As Judge Owens wrote in his decision ordering Palij’s deportation, the Jews massacred at Trawniki “had spent at least half a year in camps guarded by Trawniki-trained men, including Jakiw Palij.”  In December 2005, the Board of Immigration Appeals denied Palij’s appeal.

The removal of Palij to Germany was effectuated through close cooperation between the Departments of Justice, Homeland Security and State. For nearly four decades, the Justice Department has vigorously pursued its mission to expel Nazi persecutors from the United States.  The Palij case was the product of the Department’s longtime efforts to identify, investigate and take legal action against participants in Nazi crimes of persecution who reside in the United States. Since OSI began operations in 1979, that office and its successor, the Human Rights and Special Prosecutions Section (HRSP) of the Justice Department’s Criminal Division, have won cases against 108 individuals who participated in Nazi crimes of persecution. In addition, attempts to enter the United States by more than 180 individuals implicated in wartime Axis crimes have been prevented as a result of the “Watch List” program initiated by OSI and enforced in cooperation with the Departments of State and Homeland Security.

This removal was supported by ICE’s Enforcement and Removal Operations and Office of the Principal Legal Advisor as well as the Human Rights Violators and War Crimes Center (HRVWCC).  The HRVWCC is comprised of ICE HSI’s Human Rights Violators and War Crimes Unit, ICE’s Human Rights Law Section, FBI’s International Human Rights Unit and HRSP.  Established in 2009, the HRVWCC furthers the government’s efforts to identify, locate and prosecute human rights abusers in the United States, including those who are known or suspected to have participated in persecution, war crimes, genocide, torture, extrajudicial killings, female genital mutilation and the use or recruitment of child soldiers. The HRVWCC leverages the expertise of a select group of agents, lawyers, intelligence and research specialists, historians and analysts who direct the government’s broader enforcement efforts against these offenders.

The case was investigated, litigated and supervised over the years by a host of attorneys and historians in OSI, the U.S. Attorney’s Office in the Eastern District of New York, and HRSP, including Director Eli M. Rosenbaum, Senior Trial Attorney Susan L. Siegal and Chief Historian Dr. Jeffrey Richter, all of whom have served with HRSP since its 2010 creation.

Learn more about the Human Rights Violators & War Crimes Center

Established in 2009, ICE’s Human Rights Violators and War Crimes Center (HRVWCC) furthers the government’s efforts to identify, locate and prosecute human rights abusers in the United States, including those who are known or suspected to have participated in persecution, war crimes, genocide, torture, extrajudicial killings, female genital mutilation and the use or recruitment of child soldiers. The HRVWCC leverages the expertise of a select group of agents, lawyers, intelligence and research specialists, historians and analysts

Human Rights Violators Investigations

Human rights violators, including those who have participated in war crimes and acts of genocide, torture, extrajudicial killing, violations of religious freedom, and other acts of persecution, frequently seek to evade justice by seeking shelter in the US. These individuals will frequently assume fraudulent identities to enter the country, seeking to blend into American society and communities. ICE places a high priority on targeting these serious offenders through its Human Rights Violators and War Crimes Center. Read examples of recent success stories in targeting human rights violators.

May 2009: Former Nazi Death Camp guard John Demjanjuk deported to Germany

John Demjanjuk, a former Nazi death camp guard and a resident of Seven Hills, Ohio, was removed by ICE to Germany. Demjanjuk was removed through a court order of removal obtained by the Department of Justice. On March 10, 2009, a German judge issued an order directing that Demjanjuk, 89, be arrested on suspicion of assisting in the murder of at least 29,000 Jews at the Sobibor extermination center in Nazi-occupied Poland during World War II. In addition to serving at Sobibor, Demjanjuk served the SS as an armed guard of civilian prisoners in Germany at the Nazi-operated Flossenbürg Concentration Camp in Germany and at Majdanek concentration camp and the Trawniki training and forced labor camp in Nazi-occupied Poland. Read the full story