Obama’s Climate Change Treaty or Accord, Skirts Senate

Obama’s Violating the Constitution by Not Submitting Climate Treaty to Senate

DailySignal/Senator Mike Lee and Congressman Mike Kelly:

Today at United Nations Headquarters in New York City, Secretary of State John Kerry and representatives of over 130 nations will sign the Framework Convention on Climate Change agreement that was negotiated in Paris last December.

According to President Obama, this “historic agreement” will “hold every country accountable” if they fail to meet its carbon emission targets.

The White House has also acknowledged that the agreement contains “legally binding” provisions designed to create a “long-term framework” that will force the United States and signatory countries to reduce carbon emissions for decades to come.

Despite these facts, President Obama has already announced he will not submit the Paris Climate Agreement to the Senate for advice and consent. Instead, the White House claims the signature environmental achievement of the president’s tenure is just an “international agreement” not meriting Senate attention.

If the stakes weren’t so high, this claim would be laughable on its face.

Not only was this agreement’s predecessor, the United Nations Framework Convention on Climate Change, submitted to the Senate and approved as a treaty, but when the Senate ratified that treaty, the Foreign Relations Committee specifically reported that any future emissions targets agreed to through the Convention “would have to be submitted to the Senate for its advice and consent.”

President Obama has chosen to ignore this directive.

He has also chosen to ignore the State Department’s eight-factor test that is used to determine “whether any international agreement should be brought into force as a treaty or as an international agreement other than a treaty.”

Those eight factors are:

1) The extent to which the agreement involves commitments or risks affecting the nation as a whole (the agreement’s carbon reductions will inflict costs on every American who consumes energy)

2) Whether the agreement is intended to affect state laws (the agreement will force states to meet emission targets)

3) Whether the agreement can be given effect without the enactment of subsequent legislation by the Congress (Congress will have to appropriate money for the agreement’s Green Climate Fund)

4) Past U.S. practice as to similar agreements (the agreement’s predecessor was submitted as a treaty)

5) The preference of the Congress as to a particular type of agreement (Congress wants to vote on this agreement)

6) The degree of formality desired for an agreement (the agreement is a highly detailed 31-page document)

7) The proposed duration of the agreement, the need for prompt conclusion of an agreement, and the desirability of concluding a routine or short-term agreement (the agreement sets emissions targets decades in advance)

8) The general international practice as to similar agreements (there are many, but the 1985 Vienna Convention for the Protection of the Ozone Layer is just one example)

The only reason President Obama is not sending the Paris Climate Agreement to the Senate as a treaty is that he knows the Senate would handily reject it.

This is an unacceptable breach of Article II Section 2 of the Constitution, and Congress must do something about it.

That is why we have introduced a concurrent resolution in the House and Senate expressing the sense of Congress that the Paris Climate Agreement must be submitted to the Senate as a treaty for its advice and consent.

If President Obama fails to do so, then Congress must prevent its implementation by forbidding any payments to the agreement’s “Green Climate Fund,” an international slush fund included in the Paris agreement to induce developing nations to sign the agreement.

If Congress fails to specifically prohibit taxpayer money from being spent implementing the Paris Climate Agreement, then they will be complicit in President Obama’s subversion of the Constitution.


*****

More reading on the facts of the Accord, or whatever it is called that will not receive a Senate vote:

FAS: On April 22, 2016, as many as 155 countries intend to sign the new international Paris Agreement to address greenhouse-gas-induced climate change. No international agreement to date has attracted as many signatures on the opening day of the year-long signature period. Eight nations—all perceiving themselves as particularly vulnerable to the impacts of climate change—plan to deposit their instruments of ratification as well.

Delegations of 195 nations adopted the Paris Agreement on December 12, 2015. It creates a structure for nations to pledge every five years to abate their greenhouse gas (GHG) emissions, to adapt to climate change, and to cooperate to these ends, including financial and other support. A single framework to promote transparency and track progress of Parties’ efforts applies, for the first time, to all Parties—whether rich or poor. The Parties also adopted a Decision to

give effect to the Paris Agreement. Both the Decision and the Agreement (hereinafter capitalized) are intended to be legally binding on Parties to the United Nations Framework Convention on Climate Change (UNFCCC) and the new Agreement, respectively, though not all provisions within them are mandatory. Both are subsidiary to the UNFCCC, which the United States ratified with the advice and consent of the Senate (Treaty Document 102-38, October 7, 1992).

The UNFCCC entered into force in 1994.

Whether the new Paris Agreement or Decision would require Senate advice and consent depends on the content of the agreements. If either were to contain new legal obligations on the United States, it would favor requiring Senate consent to ratification. However, the United States and other Parties to the UNFCCC accepted many legally binding obligations when they ratified the Convention, including control of greenhouse gas (GHG) emissions, preparation to adapt to climate change, international cooperation and support, and regular reporting of emissions and actions with international review. Some have argued that the Paris Agreement does not require more of the United States than it is already obligated to do under the UNFCCC, while others have argued that it does.

Purpose and Post-2050 Balance of Emissions and Removals

The agreement states that it aims to hold the increase in the global average temperature to well below 2 °C above pre-industrial levels and to pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels, recognizing that this would significantly reduce the risks and impacts of climate change.

This purpose is stated as enhancing the implementation of the UNFCCC, including its objective to stabilize GHG concentrations in the atmosphere at a level to avoid dangerous anthropogenic interference in the climate system. In order to achieve this “long-term temperature goal,” Parties aim to make their GHG emissions peak as soon as possible and then to reduce them rapidly “so as to achieve a balance between anthropogenic emissions by sources and removals by sinks of greenhouse gases in the second half of this century.” In other words, the Agreement envisions achieving net zero anthropogenic emissions. While this is arguably synonymous with the UNFCCC’s objective of stabilizing GHG atmospheric concentrations, the Agreement puts a timeframe on the objective for the first time. However, as a collective objective, the Agreement provides no means to hold an individual Party accountable if the objective were not met.

Mitigation and Adaptation

The Agreement and Decision establish a single framework under which all Parties would:

communicate every five years and undertake “ambitious” Nationally Determined Contributions (NDCs) to mitigating GHG emissions, participate in a single “transparency framework” that includes communicating their GHG inventories and implementation of their obligations, including financial support provided or received, not less than biennially (with exceptions to a few, least developed states), and be subject to international review of their implementation.

All Parties will eventually be subject to common procedures and guidelines. However, while developed country Parties (not defined) must provide NDCs stated as economy-wide, absolute GHG reduction targets, developing country Parties are exhorted to enhance their NDCs and move toward similar targets over time, in light of their national circumstances.

Further, flexibility in the transparency framework is allowed to developing countries, depending on their capacities, regarding the scope, frequency, and detail of their reporting. The administrative Secretariat of the Convention will record the NDCs and other key reports in a public registry.

The Agreement also requires “as appropriate” that Parties prepare and communicate their plans to adapt to climate change. Adaptation communications, too, will be recorded in a public registry.

A committee will, in a facilitative and non-punitive manner, address compliance issues under the Paris Agreement. The Paris Agreement contains provisions for voluntary withdrawal of Parties.

The Agreement permits Parties voluntarily to participate in cooperative approaches (implicitly, emissions markets) that “involve the use of internationally transferred mitigation outcomes.”

Finance

The Agreement reiterates the obligation in the UNFCCC to provide financial support to developing country Parties to implement their mitigation efforts, calling for it to be continuous and enhanced. It uses exhortatory language to restate the collective pledge in the 2009 Copenhagen Accord, of $100 billion annually by 2020, and calls for a “progression beyond previous efforts.” For the first time under the UNFCCC, the Agreement encourages all Parties to provide financial support. In addition, in the Decision, the Parties agreed to set, prior to their 2025 meeting, a new, collective, quantified goal for mobilizing financial resources of not less than $100 billion annually to assist developing country Parties. The Decision strongly urges developed country Parties to scale up their current financial support—in particular to significantly increase their support for adaptation. The Agreement recognizes that “enhanced support” will allow for “higher ambition” in the actions of developing country Parties.

Five-Year Assessments

In 2023 and every five years thereafter, the Parties are to perform a “global stocktake” to review implementation of the Paris Agreement and progress toward the purpose of the Agreement and the long-term net zero anthropogenic emissions goal.

 

IRS: Tracking Cell Phones, Billions in Fraud Refunds

IRS Can Track Your Cell Phone, but Leaves Billions in Taxes Uncollected

DailySignal: While the Internal Revenue Service continues to leave uncollected tax money on the table, the agency beefed up its surveillance capabilities in a move that alarms both conservative and liberal privacy advocates.

Now some complain the IRS is acting too much like Big Brother and not enough like a traditional taxman.

Since 2006, the IRS has overseen an annual tax gap—the shortfall between taxes owed and collected—of about $385 billion, government analysts say. And according to an April report, the agency has not implemented 70 of 112 actions identified by the Government Accountability Office to close that loop.

In 2009, though, the IRS purchased a “cell-site simulator,” more commonly known as Stingray technology. And since November, the agency has been trying to buy another of the devices.

Like something from a spy movie, a Stingray device mimics a cellphone tower, tricking all mobile phones in an area into revealing their location and numbers. Authorities can deploy the powerful technology to tag and track an individual’s location in real time.

More advanced versions of the devices can be used to copy information stored on a cellphone and to download malware remotely.

The devices are as controversial as they are prevalent. According to the American Civil Liberties Union, 61 agencies in 23 states and the District of Columbia own the devices.

IRS Commissioner John Koskinen says the IRS uses its Stingray to hunt down fraudsters and stop money laundering. The agency’s use of the devices remained a secret until an October report in the Guardian.

In a November letter to House Oversight Chairman Jason Chaffetz, R-Utah, Koskinen wrote that the agency’s technology “cannot be used to intercept the content of real-time communications” such as voicemails, text messages, and emails. Instead, the IRS chief said, the device has been used “to track 37 phone numbers.”

And the IRS commissioner insists his agency deploys the tech only in accordance with state and federal laws.

But during an April 13 hearing of the Oversight and Government Reform Committee, the deputy IRS commissioner for service and enforcement, John Dalrymple, couldn’t say whether the IRS obtained a warrant before activating the device.

Rep. Jim Jordan, R-Ohio, says he finds that concerning.

With a federal budget deficit projected at $544 billion in 2016, Jordan told The Daily Signal he’d rather have the IRS focus on “their fundamental job, which is to collect revenue due to the federal Treasury.” He added:

The GAO has 112 things they suggest, recommendations for the IRS to actually deal with the $385 billion dollar tax gap. Not one of those recommendations was to purchase a second Stingray unit.

More than a misappropriation of resources, the chairman of the House Freedom Caucus said, he fears the IRS could abuse the technology to monitor political groups like it did in 2013, when the agency began targeting conservative nonprofits.

“Now you have this same agency, who again for a long period of time went after people for exercising their First Amendment free speech rights, are using this technology and without a Fourth Amendment probable cause warrant,” Jordan said.

Nathan Wessler, an attorney with the American Civil Liberties Union, said the technology poses a significant threat even when gathering basic information like names and numbers. In an interview with The Daily Signal, Wessler said Stingray devices could be “quite chilling on people’s right to protest.”

And there’s already a precedent for misconduct, albeit at a more local level.

Wessler points to a 2003 incident when the Miami-Dade Police Department purchased a Stingray device to monitor a protest of a conference on the Free Trade Area of the Americas. According to an expense report obtained by the ACLU, police wanted the device because they “anticipated criminal activities.”

“It’s a pretty short step from those words to being concerned about the police intentionally downloading a list of every protester who shows up at some demonstration,” Wessler said. “It’s a powerful way to know who’s there.”

The IRS Criminal Investigations Division is already one of the more elite investigative agencies. Koskinen boasts that in 2015 the division achieved a 93.2 percent conviction rate, “the highest in all of federal law enforcement.”

It’s an open question whether the agency needs Stingray technology to complete its mission.

The IRS did not respond to The Daily Signal’s requests for comment made by emails and phone calls.

Paul Larkin argues that the nature of IRS investigations makes real-time intelligence irrelevant. Larkin, senior legal research fellow at The Heritage Foundation, told The Daily Signal that IRS agents are following a paper trail to investigate previous crimes:

There is no good reason the IRS would ever need real-time data information. The crimes that the IRS investigates all occurred in the past. They’re investigating fraud against the government that’s already happened. They don’t have crimes in progress like a burglary.

But if the IRS ever needed to track a suspect in the moment, Larkin said, there’s a practical solution—teamwork. He explains that there’s “no legal hurdle” that prohibits the IRS from teaming up, for instance, with the Department of Justice and borrowing its Stingray technology.

Jordan says he isn’t ready to accept that the IRS ever needs access to the device.

“Really, should the IRS have this and be using this at all?” the Ohio Republican said. “I tend to think you’d be better off with this technology not being in their hands.”

******

The 23-page report is actually quite readable, and worth looking at if you’ve been a victim of identity theft or refund fraud, you’re a tax preparer, or you’re interested in the future of how Americans file our taxes.

  1. The IRS paid out $3.1 billion in refunds to scammers last year. We’ve discussed in the past how this scam works: someone with basic information about a U.S. taxpayer files a return with fake information, depositing their refund in the scammer’s own account. It’s a sophisticated operation and very lucrative. Additional 5 items are here, a must read from the Consumerist.

Cyber: New Strategic Operation v. ISIS

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command.

SecurityAffairs: The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems used by the ISIL and to track its cyber hubs.

In March, Senior Pentagon officials revealed the military’s first use of cyber warfare operations against the ISIL terrorist group.

The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul.

The US military is using cyber tools to contrast the ISIS troops in the area, interfering  members’ operation and communication.

Now the US Government wants to use all the hacking tools in its cyber arsenal against the Islamic State. The New Your Times revealed that until now the Cyber Command operations were more focused on cyber disputes against Russia, China, Iran, and North Korea.

“The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing.” states the NYT. “But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.”

The goal of the new campaign is to disrupt the propaganda activities managed by the Islamic State, but also interfere with IS daily functions, like paying its fighters.

“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama saidat the C.I.A. headquarters in Langley, Va., on countering the Islamic State.

The deputy secretary of defense, Robert O. Work, confirmed the goals of the cyber operations that were conducted by a small number of “national mission teams.”

“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”

The NYT, citing interviews withs senior and midlevel officials, confirmed that the US cyber army has begun to deploy a series of “implants” in the networks of the Islamic State to spy on its commanders.

“Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.” continues the NYT. “In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.”

The fact that the US Government is admitting the use of cyber weapons that would have unpredictable effects over vast areas of the planet raising major questions over an invasion of sovereignty.

Of course, now we are speaking to contrast the Islamic State and everything seems to be admitted to destroying the threat.

“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” said Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff,

“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”

Of course, part of the intelligence consider very dangerous the use of the implants against the Islamic State. The same implants are used to infiltrate the networks of foreign government and there is the concrete risk that these operations allow foreign intelligence agencies to detect them and neutralize their effects. Another side effect is that the Islamic State militants would stop the use of a communications channel starting one that was harder to monitor.

“N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.” states the NYT.

“It’s a delicate balance,” said Mr. Obama’s national security adviser, Susan E. Rice. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”

Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser met technology executives at IT giants calling for action against the online activities of the Islamic State.

****  

In part from the DailyBeast: The American military’s campaign of cyber attacks against ISIS is far more serious than what the president laid out in his bland description. Three U.S. officials told The Daily Beast that those operations have moved beyond mere disruption and are entering a new, more aggressive phase that is targeted at individuals and is gleaning intelligence that could help capture and kill more ISIS fighters.

As the U.S. ratchets up its online offensive against the terror group, U.S. military hackers are now breaking into the computers of individual ISIS fighters. Once inside the machines, these hackers are implanting viruses and malicious software that allow them to mine their devices for intelligence, such as names of members and their contacts, as well as insights into the group’s plans, the officials said, speaking on condition of anonymity to describe sensitive operations.

In remarks at CIA headquarters in Langley, Virginia, this week, Obama confirmed that cyber operations were underway and noted that recently the U.S. has either captured or killed several key ISIS figures, including Sulayman Dawud al-Bakkar, a leader of its chemical weapons program, and “Haji Iman,” the man purported to be ISIS’s second in command.

The military has also used cyber operations to block ISIS’s use of encrypted communications, in order to force members to use less secure channels where they can be more easily monitored, officials said. That tactic appears to be a response to ISIS’s effective use of encrypted text applications in particular, which officials had said previously made it harder for the military and intelligence community to track individual fighters.

Terrifying Facts on ISIS Operatives in America

  

WashingtonPost: The Justice Department on Thursday revealed that a well-known Islamic State operative instructed a Boston-area man to kill Pamela Geller, the organizer of a controversial Muhammad cartoon contest in Texas last year.

In court documents, prosecutors said that Junaid Hussain, a British militant, had been communicating with Usaamah Abdullah Rahim, 26, who along with two friends discussed beheading Geller.

Rahim, however, changed his mind and instead decided to target a police officer. He was shot and killed in June 2015 in Roslindale, Mass., after he attacked members of an FBI-led surveillance team while wielding a large knife, officials said.

Hussain, 21, was killed in Raqqa, Syria, in August 2015 in a drone strike. He was a well-known militant involved in not only spreading Islamic State propaganda but also recruiting and planning attacks, officials said.

FBI Director James B. Comey has said previously that a Phoenix man who tried to attack the Muhammad cartoon contest in Texas was trading encrypted messages with an Islamic State operative. A senior U.S law enforcement official, speaking on the condition of anonymity to discuss the case, declined to identify that operative but said it was not Hussain. Another official described the person as a member of the group’s unit that runs external operations.

Prosecutors said Rahim, along with two associates, Nicholas Alexander Rovinski, 25, of Warwick, R.I., and his nephew, David Wright, 26, of Everett, Mass., began plotting a terror operation in the United States in early 2015.

According to the Justice Department, Wright in March 2015 drafted organizational documents for a “Martyrdom Operations Cell” and conducted Internet searches about firearms, tranquilizers and the establishment of secret militias in the United States. Rovinski conducted research on weapons that could be used to behead people, the authorities said.

Prosecutors said Hussain communicated directly with Rahim, who then communicated instructions to the other conspirators to kill Geller in New York, where she lives. They planned to kill her around the July 4 holiday, court documents show.

The FBI was closely monitoring the men, officials said, and would have arrested them had they tried to travel to New York.

After Rahim’s death, prosecutors charged Rovinski and Wright with conspiracy to provide material support to a terrorist organization. Prosecutors also revealed that Rovinski has written letters to Wright from prison “discussing ways to take down the U.S. government and decapitate non-believers.” Rovinski also pledged his allegiance to the leader of the Islamic State, according to court documents.

On Thursday, Rovinski and Wright were also charged in a superseding indictment with conspiracy to commit acts of terrorism transcending national boundaries.

*****

There is more…. As published on this website on April 21, the deeper details on Gules Ali Omar and his cell, note below. Further, months ago, an investigation revealed ISIS operatives all the way to Chicago.

  

ISIS suspect reveals plans to open up route from Syria to U.S. through Mexico

FoxLatino: One of the American men accused in Minnesota of trying to join the Islamic State group wanted to open up routes from Syria to the U.S. through Mexico, prosecutors said.

Gules Ali Omar told the ISIS members about the route so that it could be used to send members to America to carry out terrorist attacks, prosecutors alleged in a document filed this week.

The document, filed Wednesday, is one of many filed in recent weeks as prosecutors and defense attorneys argue about which evidence should be allowed at the men’s trial, which starts May 9.

The men — Omar, 21; Hamza Naj Ahmed, 21; Mohamed Abdihamid Farah, 22; and Abdirahman Yasin Daud, 22 — have pleaded not guilty to multiple charges, including conspiracy to commit murder outside the U.S. Prosecutors have said they were part of a group of friends in Minnesota’s Somali community who held secret meetings and plotted to join the Islamic State group.

Five other men have pleaded guilty to one count each of conspiracy to support a foreign terrorist organization. A tenth man charged in the case is at-large, believed to be in Syria.

The government’s document was filed in response to a defense request that prosecutors be barred from introducing evidence about possible attacks in the U.S.

Last week, Daud’s attorney wrote that, absent any specific evidence that his client threatened the United States, any references to discussions about attacks would be prejudicial. To permit such references, as well as references to the Sept. 11 attacks or exhibits that show violent images of war crimes, “would cause the jurors to decide out of fear and contempt alone,” defense attorney Bruce Nestor wrote.

But prosecutors said audio recordings obtained during the investigation show the defendants spoke multiple times about the possibility of attacks in the U.S. Among them, Omar spoke of establishing a route for fighters, Farah spoke of killing an FBI agent and another man who pleaded guilty talked about shooting a homemade rocket at an airplane.

Prosecutors wrote that they should be allowed to “play for the jury the defendants’ own words, in which they discuss the possibility of returning to attack the United States.” They also said the defendants watched videos and gruesome images, which they also want to play for the jury, and that a blanket ban on mentioning the 2001 attacks is inappropriate, noting that Omar had pictures of the burning World Trade Center towers and Osama bin Laden on his cellphone.

A phone message left with Omar’s attorney wasn’t immediately returned.

The FBI has said about a dozen people have left Minnesota to join militant groups fighting in Syria in recent years. In addition, since 2007 more than 22 men have joined al-Shabab in Somalia.

A Chilling Fact About Uncontrolled Immigration

The government at the Federal and local level knows the consequences and the threat. Sadly, objectives by the Democrats and the Obama White House dismiss factual conditions that threaten lives and safety. There was a paramount reason Ellis Island operated the way it did, even with flaws.

CDC Official Warned Staff of Health, Safety Risks During Influx of Illegal Alien Minors: “Plan on Many of the Kids Having TB,” “Be Wary of Personal Safety.”

JW: A government official warned employees deploying for the influx of illegal immigrant minors about health and safety risks because the new arrivals would have tuberculosis and some were young adults—not children—like the Obama administration proclaimed, according to records obtained by Judicial Watch. “We might as well plan on many of the kids having TB,” states a June 26, 2014 guidance e-mail from a Centers for Disease Control (CDC) environmental health scientist, Alaric C. Denton, as the agency prepared to handle the crisis. “Most of these kids are not immunized, so we need to make sure all our staff are immunized.” Denton, who is stationed at the CDC headquarters in Atlanta, Georgia, predicts in the directive that the agency will be overwhelmed pretty quickly and that screening requirements will be hard to keep up with.

  

Judicial Watch had to sue the CDC’s umbrella agency, the Department of Health and Human Services, (HHS) for the records. Though chunks have been redacted, the documents contradict the Obama administration’s public statements dismissing possible health and safety risks created by the tens of thousands of Unaccompanied Alien Children (UAC) fleeing violence in Central America. The CDC official reveals in the documents obtained by JW as a result of the lawsuit that “some of these kids are not really kids they are young adults, and we should be wary of personal safety.” JW reported this early on, when the first group of UACs arrived through the Mexican border in the summer of 2014. Homeland Security sources directly involved with the mess told JW that holding centers were jam-packed, rampant with diseases and sexually active teenagers. A veteran Border Patrol officer who heads the agency’s Tucson sector quickly established that many of the UACs were not little kids but rather 17-year-olds with possible ties to gang members in the U.S.

Weeks later JW reported that the nation’s most violent street gangs—including Mara Salvatrucha or MS-13—were actively recruiting new members at U.S. shelters housing illegal immigrant minors. A high-level Homeland Security source told JW the gangs used Red Cross phones at the shelters to communicate with the new recruits. Last fall the Texas Department of Public Safety confirmed that the MS-13 has been fortified and able to remain a top tier gang thanks to the influx of illegal alien gang members that recently crossed into the state. The MS-13 is a feared street gang of mostly Central American illegal immigrants that’s spread throughout the U.S. and is renowned for drug distribution, murder, rape, robbery, home invasions, kidnappings, vandalism and other violent crimes. The Justice Department’s National Gang Intelligence Center (NGIC) says criminal street gangs like the MS-13 are responsible for the majority of violent crimes in the U.S. and are the primary distributors of most illicit drugs.

This new batch of government records, part of an ongoing JW investigation into the UAC disaster, indicate the administration was well aware of the danger in allowing hordes of illegal immigrant youths to enter and stay in the U.S. At the very least it flies in the face of the administration’s false narrative involving the key issues of health and safety surrounding the new arrivals which have been relocated throughout the nation. Denton, the CDC environmental health scientist who warned colleagues prior to deployment, works at the agency’s Environmental, Safety and Health Compliance Office (ESHCO). Officials from other federal agencies, including the Food and Drug Administration (FDA) and the Environmental Protection Agency (EPA), were also involved in the exchanges. JW will continue receiving records from the government involving this issue as part of an agreement, supervised by a federal judge, stemming from our lawsuit.

*****

Wait there is more.

AP Exclusive: Color index for US border security is rejected

SAN DIEGO (AP) — Five years ago, the U.S. Department of Homeland Security dropped its color-coded terror threat index developed after the 9/11 attacks amid widespread confusion and ridicule. So what did it do when tasked by Secretary Jeh Johnson in 2014 with measuring security along the country’s borders?

Agency staff proposed another system of reds, yellows and greens.

The Institute for Defense Analyses, a consulting firm, was hired by DHS to review the idea and found the index simplistic and misleading, noting that colors were a “disaster” for communicating terror threats.

“DHS should learn from its own history and avoid repeating this error,” the consultants said in its 53-page report.

The DHS proposal was never made public, nor was the consulting firm’s $90,000 review. A copy of the report was obtained by The Associated Press and when AP this week asked the agency whether it would move ahead with the index, spokeswoman Gillian Christensen said: “Currently, there are no color-coded border security indexes or metrics being considered by the Department of Homeland Security.”

It was one of the latest attempts by the government to come up with a way to measure border security and help the public understand whether the billions of dollars devoted to it each year are being spent wisely.

In 2010, Homeland Security ended a five-year experiment measuring miles under “operational control,” where the Border Patrol was likely to capture illegal crossers. It reported only about 40 percent controlled in 2010, providing ammunition to those who argue the border is porous.

Then in 2013, Johnson’s predecessor, Janet Napolitano, abandoned plans for what was called the Border Conditions Index, which would have relied on various economic, crime and enforcement data.

John Sandweg, who was senior counselor to Napolitano, said there was internal consensus about what made up the index but not about how much weight to give each factor.

Sandweg, who advised the secretary when the color terror alert system was dropped, said he doesn’t see the value of a similar color-coded approach to the border.

“It seems to me like an oversimplification of a very complex problem,” he said.

The consultants hired by Johnson agreed.

“The red/yellow/green formulation, while intuitively attractive and easy to understand, will open the Department to charges that it is manipulating a complex problem in an effort to be seen as responding to public concerns,” the report said.

When the report was completed in June, California and New Mexico/West Texas were green (low risk) during the previous quarter, Arizona was yellow (medium risk), and South Texas was red (high risk). The consultants said that reality was more nuanced.

“A new set of metrics should work against this simplistic perception rather than reinforcing it. Instead, the new index does the opposite, by reporting the level of border security in just three large baskets, two of which (red and yellow) are likely to be seen by the public as evidence of a border ‘not controlled,'” the report said.

The consultants identified other problems. A color index might lead reporters with an appetite for eye-catching headlines to produce misleading stories of an out-of-control border. And DHS relations with Congress could be further strained, with administration officials constantly having to defend their color choices.

For example, a West Texas congressman would demand to know why his district is rated low risk when voters tell him the opposite. A South Texas congressman would want lots more money if the administration acknowledges his district is high risk, the report said.

Now, the most closely-watched public indicator is Border Patrol apprehensions, released annually. The number fell to a 44-year low last year, a figure cited by those who argue the border is relatively secure. But there is broad agreement that the apprehension tally gives an incomplete picture, just as a police department’s arrest count doesn’t fully reflect how safe a city is.

The color-coded index would have relied on 12 indicators for land borders and seven for maritime borders, each one weighted under a formula that produces reds, yellows and greens. Those indicators ranged from the number of border crossers with known or suspected terrorist ties to marijuana seizures.

The consultants’ report speaks favorably about developing a “dashboard” of key numbers, as many police departments do. Homeland Security recently began publishing the percent of illegal border crossers it says are caught or turned back — 80 percent in the 2015 fiscal year — and has developed other measures, including the percent caught who are repeat offenders.

FILE – In this Jan. 4, 2016 file photo, a U.S. Border Patrol agent drives near the U.S.-Mexico border fence in Sunland Park, N.M. U.S. Department of Homeland Security Secretary Jeh Johnson has rejected a new proposal of color-coded alerts to measure border security after a consultant called the system simplistic and misleading. (AP Photo/Russell Contreras, File)

FILE – In this Jan. 4, 2016 file photo, a U.S. Border Patrol agent drives near the U.S.-Mexico border fence in Sunland Park, N.M. U.S. Department of Homeland Security Secretary Jeh Johnson has rejected a new proposal of color-coded alerts to measure border security after a consultant called the system simplistic and misleading. (AP Photo/Russell Contreras, File)