An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

More International Classified Material on Hillary’s Server

Ruh Roh…hope the statute of limitations does not apply here.

As a reminder:

When Clinton was running for president in 2008, she had a private server installed at her home in Chappaqua, New York. The domains clintonemail.com, wjcoffice.com, and presidentclinton.com, which were registered to a man named Eric Hoteham, all pointed to that server. In 2013, a Denver-based IT company called Platte River Networks was hired to manage the server, but wasn’t cleared to work with classified information. The company executives received death threats for taking on the contract. It was later discovered that multiple private servers were used for Clinton’s email.

Clinton used a BlackBerry phone to communicate during her tenure as secretary of state, including sending and receiving emails through her private server in New York. The State Department expressed concern about the security of the device. Clinton had requested the NSA provide a strengthened BlackBerry, similar to the one used by President Obama. But, her request was denied. Instead, the NSA requested that Clinton use a secure Windows Phone known as the Sectera Edge, but she opted to continue using her personal BlackBerry.

Hillary Clinton 'used Blackberry to send emails as she's ...

***

The classified material Hillary Clinton sent and received using an unsecure, private email server included correspondence with foreign leaders, according to documents obtained from the State Department by a government watchdog group.

Judicial Watch, which has called on Attorney General Jeff Sessions to order “an honest criminal investigation” of Clinton’s email practices while she was secretary of state, now awaits a federal judge’s Sept. 28 deadline for the State Department to finish sorting through the emails.

Judicial Watch President Tom Fitton last month said the classified information in Clinton emails uncovered by his team shows that then-FBI Director James Comey and other top FBI officials conducted a “sham investigation” into Clinton’s misuse of email as secretary of state.

“These classified Hillary Clinton emails that she tried to hide or destroy show why it is urgent that the DOJ [Department of Justice] finally undertake an honest criminal investigation,” Fitton said in a press release Aug. 16. “It is past time for Attorney General Jeff Sessions to order a new investigation of the Hillary Clinton email scandal.”

Comey, apparently without consulting then-Attorney General Loretta Lynch, told reporters in July 2016 that Clinton was careless in using her private email account for official business and transmitted classified information, but did not commit prosecutable offenses. President Donald Trump, who defeated Clinton in the November 2016 election, fired Comey in May 2017.

The FBI had uncovered 72,000 documents as part of its 2016 investigation into Clinton’s use of the private email server while serving as secretary of state under President Barack Obama from Jan. 21, 2009, to Jan. 31, 2013.

Judicial Watch, a Washington-based nonprofit that describes itself as promoting “integrity, transparency, and accountability in government,” last month released two new batches of Clinton emails (here and here) that it pried loose from the State Department.

Besides five instances of classified materials, the group said, the newly released Clinton emails contain messages about a meeting with billionaire financier George Soros and a memo to Clinton about a foreign government from a former top aide to her husband when he was president.

U.S. District Court Judge James E. Boasberg ordered the State Department to complete processing the Clinton emails by Sept. 28 in response to a Freedom of Information Act lawsuit brough by Judicial Watch.

It is not clear whether State will meet that deadline.

In its FOIA request filed initially in March 2015, Judicial Watch sought all emails sent or received by Clinton in her official capacity as secretary of state, “as well as all emails by other State Department employees to Secretary Clinton regarding her non-‘state.gov’ email address.”

The tens of thousands of Clinton emails include messages sent to her by a longtime aide, Huma Abedin. The FBI found emails from Abedin on the laptop of her estranged husband, former Rep. Anthony Weiner, D-N.Y., prompting Comey to briefly reopen the FBI probe days before the election on Nov. 8, 2016.

One chain of emails from Abedin, with the subject “Invites for the week,” refers to a two-hour meeting in Southampton, New York, with Soros, founder and chairman of Open Society Foundations, a New York-based international institution known for financing progressive political causes.

The emails referring to Soros do not include dates, but Judicial Watch investigators deduced they were written before November 2011, and perhaps as long ago as early 2009, based on individuals involved in the exchange and the timing of certain events. It is not clear whether the meeting took place.

Five messages in the just-released batch of Clinton emails include classified material, according to Judicial Watch.

For example, on June 7, 2011, Clinton received classified information on her unsecure email account from former British Prime Minister Tony Blair with regard to Blair’s Middle East negotiations with Israel, the Palestinians, and the French. Blair also forwarded the information to Jack Sullivan, who was Clinton’s deputy chief of staff.

On Jan. 26, 2010, Sullivan sent classified information through his own unsecure BlackBerry to Abedin’s State Department email address, information that he previously sent to Clinton’s and Abedin’s unsecure @clintonemail.com accounts.

The email, classified as confidential, concerned negotiations between the United Kingdom and Northern Ireland and included a “call sheet” Clinton received before making a call to political leaders in Northern Ireland.

Redacted portions appear to have contained the names of members of the left-wing Irish political party Sinn Fein, according to Judicial Watch. The Sinn Fein members had been invited to a meeting, but its purpose is not clear.

Northern Ireland was also the subject of a June 13, 2009, email from Sullivan to Clinton that was classified as confidential and almost entirely redacted by the State Department.

As previously reported, Clinton also received emails from Sid Blumenthal, a confidant and former senior adviser to President Bill Clinton, her husband. The Obama administration had barred Blumenthal from serving in the State Department under Clinton.

Yet the email messages obtained by Judicial Watch show that Blumenthal advised Hillary Clinton on government policy. In an April 8, 2010, memo that included information classified as confidential, for example, Blumenthal encouraged her to develop relations with the new government in Kyrgyzstan.

N Korean, Park Jin hyok Charged with Global Cyber Attacks

U.S. CHARGES NORTH KOREAN HACKER

Federal prosecutors charged a North Korean man, Park Jin-hyok, with crimes in connection with a series of costly cyberattacks around the globe, including the WannaCry ransomware attack in 2018, the heist of Bangladesh’s central bank in 2017, and the hack of Sony Pictures in 2014. It is the first time the Justice Department has explicitly charged a North Korean hacker backed by the government. Park was allegedly working as a programmer for a North Korean front company in China called Chosun Expo, which had ties to North Korea’s military intelligence.

Legal analysts say the complaint is the most detailed public accounting yet of North Korea’s cyberattacks against foreign adversaries. The Justice Department has now brought hacking-related charges against North Korea, China, Iran, and Russia. (WSJ, NYT, Reuters, DOJ)

Park Jin Hyok, named by officials as a member of the so-called Lazarus Group hacking team behind last year’s WannaCry global ransomware attack and the 2014 digital attack on Sony, apparently used not only advanced technology, but elaborate reconnaissance work to digitally steal money and sensitive information.

First, Park would obtain a number of email addresses of people affiliated with target businesses from traders dealing in large amounts of personal information. Then he would use the emails to gain an understanding of company employees’ fields of interest and personal relationships.

That would let him craft emails that could pass as genuine messages from major companies in content and style, a tactic known as spear phishing. After spending some time building trust, he would send the malicious links to websites that would infect a target’s computer.

In one case, Park apparently masqueraded as a human resources official at a U.S. defense-linked company to exchange messages with workers at one of the company’s competitors.

Last week’s charges were said to be the first in years against a North Korean hacker related to high-profile attacks linked to the state. The attack on Sony came as the company was preparing to release a movie called “The Interview,” which depicted the assassination of a character resembling North Korean leader Kim Jong Un. The group also allegedly stole $81 million from the central bank of Bangladesh in 2016.

A North Korean suspect is wanted by U.S. authorities on suspicion of hacking. (Courtesy of the U.S. Federal Bureau of Investigation)

“We stand with our partners to name the North Korean government as the force behind this destructive global cyber campaign,” Christopher Wray, director of the Federal Bureau of Investigation, said in a statement on Sept. 6.

The U.S. Treasury also imposed sanctions on Park and a Chinese business he was affiliated with. “We will not allow North Korea to undermine global cybersecurity to advance its interests and generate illicit revenues in violation of our sanctions,” Treasury Secretary Steven Mnuchin said in his own statement.

Under Kim, the North has consolidated its cyber forces under its Reconnaissance General Bureau, which handles overseas spying. The state has a team of 6,800, according to the South Korean government, and is counted as one of the five cyber powers along with the U.S., Russia, China and Israel.

The core of cyber operations is a team known as “Bureau 121,” established in 1998 by Kim’s father, then-leader Kim Jong Il. Bureau 121 is known for its willingness to commit crimes for the sake of bringing in cash.

“The technology behind North Korea’s cybercrimes is some of the most advanced in the world,” said a source with the U.S. State Department.

Governments and businesses around the world are hurrying to guard themselves from the North’s attacks even as its methods grow more sophisticated. Further cooperation between countries’ cyberdefense authorities may be key to finding effective solutions.

British Airways: The airline said a “very sophisticated” hacker stole credit card details of hundreds of thousands of its customers in recent days. Anyone who lost out financially as a result of the breach would be compensated, BA officials said. (Reuters)

JPMorgan Hacker: A Russian man, Andrei Tyurin, has been extradited by Georgia to the United States on charges that he participated in the 2014 hack of JPMorgan Chase and other U.S. companies. (Reuters)

CIA Files on al Qaeda/bin Ladin leading up to 9/11

The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counterterrorism reports that are usually withheld from the public because of their sensitivity. Today’s posting covers a variety of topics of major public interest, including background to al-Qaeda’s planning for the attacks; the origins of the Predator program now in heavy use over Afghanistan, Pakistan and Iran; al-Qaeda’s relationship with Pakistan; CIA attempts to warn about the impending threat; and the impact of budget constraints on the U.S. government’s hunt for bin Laden.

The documents released by CIA detail the meticulousness of al-Qaeda’s plot against the United States and CIA attempts to counter the rising terrorist threat. A previously undisclosed raw intelligence report that became the basis for the December 4, 1998, President’s Daily Brief notes that five years before the actual attack, al-Qaeda operatives had successfully evaded security at a New York airport in a test-run for bin Laden’s plan to hijack a U.S. airplane. [1998-12-03]. CIA analytical reports also provide interesting insights into al-Qaeda’s evolving political strategies. “In our view, the hijackers were carefully selected with an eye to their operational and political value. For instance, the large number of Saudi nationals was most likely chosen not only because of the ease with which Saudi nationals could get US visas but also because Bin Ladin could send a message to the Saudi Royal family.” [2003-06-01]

Reports on early attempts to apprehend bin Laden detail the beginning of the U.S. Predator drone program in Afghanistan and Pakistan. “First Predator mission over Afghanistan [excised] September 7, 2000.” [1] “Twice in the fall of 2000, the Predator observed an individual most likely to be Bin Ladin; however we had no way at the time to react to this information.” [2004-03-19] American UAVs did not have sufficient weapons capabilities at the time the CIA likely spotted bin Laden in 2000 to fire on the suspect using the UAV.

Al-Qaeda’s ties to Pakistan before September 11 are also noted in several documents. “Usama ((Bin Ladin))’s Islamic Army considered the Pakistan/Afghanistan area one region. Both Pakistan and Afghanistan serve as a regional base and training center for Islamic Army activities supporting Islamic insurgencies in Tajikistan, the Kashmir region and Chechnya. [Excised] The Islamic Army had a camp in Pakistan [Excised] purpose of the camp was to train and recruit new members, mostly from Pakistan.” [1997-07-14] While, “UBL elements in Pakistan reportedly plan to attack POTUS [U.S. President Clinton’s] plane with [excised] missiles if he visits Pakistan.” [2000-02-18]

Similar to the 9/11 Commission Report, the document collection details repeated CIA warnings of the bin Laden terrorist threat prior to September 11. According to a January 2000 Top Secret briefing to the Director of Central Intelligence, disruption operations against the Millennium plot “bought time… weeks… months… but no more than one year” before al-Qaeda would strike. [2000-01-07] “A UBL attack against U.S. interests could occur at any time or any place. It is unlikely that the CIA will have prior warning about the time or place.” [1999-08-03] By September 2001, CIA counterterrorism officials knew a plot was developing but couldn’t provide policymakers with details. “As of Late August 2001, there were indications that an individual associated with al-Qa’ida was considering mounting terrorist operations in the United States, [Excised]. No further information is currently available in the timing of possible attacks or on the alleged targets in the United States.” [2001-08-24]

Despite mounting warnings about al-Qaeda, the documents released today illustrate how prior to September 11, CIA counterterrorism units were lacking the funds to aggressively pursue bin Laden. “Budget concerns… CT [counterterrorism] supplemental still at NSC-OMB [National Security Council – Office of Management and Budget] level. Need forward movement on supplemental soonest due to expected early recess due to conventions, campaigning and elections. Due to budgetary constraints… CTC/UBL [Counterterrorism Center/Osama bin Laden Unit] will move from offensive to defensive posture.” [2000-04-05]

Although the collection is part of a laudable effort by the CIA to provide documents on events related to September 11, many of these materials are heavily redacted, and still only represent one-quarter of the CIA materials cited in the 9/11 Commission Report. Hundreds of cited reports and cables remain classified, including all interrogation materials such as the 47 reports from CIA interrogations of Khalid Sheikh Mohammed from March 24, 2003 – June 15, 2004, which are referenced in detail in the 9/11 Report.

Highlights of the CIA September 11 Document Collection Include:

  • The 1998 Raw Intelligence Report on UBL’s Plans to Hijack an Airplane that Became an Item in the December 4, 1998 President’s Daily Brief [1998-12-03].
    • The report details how bin Laden was planning “new operations against the United States (U.S.) targets in the near future. Plans to hijack a U.S. aircraft were proceeding well. Two individuals from the relevant operational team in the U.S. had successfully evaded security checks during a trial run at “New York airport [excised].”
  • Internal CIA E-mails on Osama bin Laden
    • 1998-05-05 – “[Title Excised]” “Planning for the UBL Rendition is Going Very Well,” To: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Capture Op,” “[Gary] Schroen to Mike.” [Chapter 4, Endnote 22 9/11 Commission Report]
    • 1998-12-20 – “Re: urgent re ubl,” Note For: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “[Gary] Schroen to Mike” [Chapter 4, Endnotes 117, 119 9/11 Commission Report]
    • 1998-12-21 – “your note,” Note For: [Excised], From: Michael F. Scheuer, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen,” [Chapter 4, Endnote 119 9/11 Commission Report]
    • 1999-05-17 – “your note,” From Michael F. Scheuer, To [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen” [Chapter 4, Endnote 174 9/11 Commission Report]
    • 2001-05-15 – “[Excised] Query [Excised].” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 72 9/11 Commission Report]
    • 2001-05-24 – [Title Excised] “Agee (sic) we need to compare notes,” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 64 9/11 Commission Report]
    • 2001-07-13 – “[Excised] Khalad [Excised],” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Richard to Alan” [Chapter 8, Endnote 64 9/11 Commission Report]
    • 2001-08-21 – “Re: Khalid Al-Mihdhar,” Memorandum, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mary to John.” [Chapter 8, Endnote 106 9/11 Commission Report]
  • Two Definitive CIA Reports on the September 11, 2001 Attacks
    • 2003-06-01 – “11 September: The Plot and the Plotters,” CTC 2003-40044HC, Central Intelligence Agency Intelligence Report.
      [Chapter 5, Endnotes 42, 60, 61, 64, 70, 105, Chapter 7, Endnotes 45, 52, 60, 83, 86, 92, 94, 95, 96, 97, 105 9/11 Commission Report]

      This document is a comprehensive CIA history of the 9/11 attack. Analysis includes notes on al-Qaeda, the evolution of the plot, terrorist techniques, timelines and detailed hijacker profiles.

    • 2004-03-19 – “DCI Report: The Rise of UBL and Al-Qa’ida and the Intelligence Community Response,” Draft, Central Intelligence Agency Analytic Report. [Chapter 2, Endnote 67]

      This document is a detailed summary of CIA efforts to apprehend Osama bin Laden from 1989-2004. Highlights include:

        • Agency notes on bin Laden’s evolution from “terrorist financier” in the early 1990s to a significant threat to U.S. interests by mid-1990.
        • Discussions and debates regarding the use of Predator drones as early as 2000. [2]
        • Critiques of FBI information systems as impediments to counterterrorism efforts – “A major, ongoing concern is FBI’s own internal dissemination system. CIA officers still often find it necessary to hand-deliver messages to the intended recipient within the FBI. In additional FBI has not perfected its FI reporting system and headquarters-field communications so dissemination of intelligence outside of FBI is still spotty.” And the report confirms suggestions by the 9/11 Commission Report that “the different organizational culture and goals of the FBI and CIA sometimes get in the way of desired results.” (p. 22)
        • A group of Afghan trial leaders worked with the CIA on the UBL issue, but “[Excised] judged to be unlikely to successfully attack a heavily guarded Bin Ladin.” “Masood has to be engaged to help in the attempt to capture Bin Ladin, but with the understanding that he would be his own man, never an agent of surrogate of the US government… Even if he agreed to do so, his chances of success against the Taliban were judged to be less than five percent.” (p. 58)Note “DIF” written on multiple pages stands for “Denied in Full”
  • A Series of CIA Senior Executive Intelligence Briefs (SEIBS) from June-September 2001 Warning of “Imminent” Al-Qaeda Attacks:
    • 2001-06-23 – “International: Bin Ladin Attacks May Be Imminent [Excised]” Senior Executive Intelligence Brief. [Chapter 8, Endnote 14, See also p. 257 9/11 Commission Report]
    • 2001-06-25 – “Terrorism: Bin Ladin and Associates Making Near-Term Threats,” Senior Executive Intelligence Brief. [Chapter 8, Endnotes 12, 14]
    • 2001-06-30 – “Terrorism: Bin Laden Planning High Profile Attacks [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 12]
    • 2001-07-02 – “Terrorism: Planning for Bin Ladin Attacks Continues, Despite Delay [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 18]
    • 2001-07-13 – “Terrorism: Bin Ladin Plans Delayed but Not Abandoned [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    • 2001-07-25 – “Terrorism: One Bin Ladin Operation Delayed, Others Ongoing [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    • 2001-08-07 – “Terrorism: Bin Ladin Determined to Strike in the US,” Senior Executive Intelligence Brief. [Chapter 8, Endnote 38. Chapter 11, Endnote 5. Page 342]
  • Detailed Reports on Al-Qaeda Organization
    • “The spike in the network’s activity stems in part from changes in Bin Ladin’s practices. To avoid implicating himself and his Taliban hosts, Bin Ladin over the past two years has allowed cells in his network, al-Qa’ida, to plan attacks more independently of the central leadership and has tried to gain support for his agenda outside the group. – The network also has benefited from a sharp increase in mujahidin recruitment since the resumption of the conflict in Chechnya in 1999, which exposed a new generation of militants to terrorist techniques and extremist ideology through training at al-Qai’da-run camps in Afghanistan. – Violence between Israelis and the Palestinians, moreover is making Sunni extremists more willing to participate in attacks against US or Israeli interests.” 2001-02-06 – “Sunni Terrorist Threat Growing,” Senior Executive Intelligence Brief, The Central Intelligence Agency. [Chapter 8, Endnote 4 9/11 Commission Report]
  • Bin Laden’s Attempts to Acquire Weapons of Mass Destruction
  • A Positive CIA Assessment of CIA Counterterrorism Capabilities in August 2001
    • In contrast to the findings of the 9/11 Commission Report and a 2004 CIA Office of Inspector General’s review of its pre-9/11 counterterrorism practices, a report completed in August 2001 by the CIA Inspector General gives very positively reviews to CIA counterterrorism practices, the management of information and interagency cooperation. “CTC fulfills inter-agency responsibilities for the DCI by coordinating national intelligence, providing warning, and promoting the effective use of Intelligence Community resources on terrorism issues. The Center has made progress on problems identified at the time of the last inspection in 1994 – specifically its professional relationship with the Federal Bureau of Investigation.

For the document list including why Iraq, go here.

Middleweight Boxing Champion Led a Crime Syndicate

The Shulaya Enterprise was an organized criminal group operating under the direction and protection of Razhden Shulaya, a/k/a “Brother,” a/k/a “Roma,” a “vor v zakone” or “vor,” which are Russian phrases translated roughly as “Thief-in-Law” or “Thief,” and which refer to an order of elite criminals from the former Soviet Union who receive tribute from other criminals, offer protection, and use their recognized status as vor to adjudicate disputes among lower-level criminals.  As a vor, Shulaya had substantial influence in the criminal underworld and offered assistance to and protection of the members and associates of the Shulaya Enterprise.  Those members and associates, and Shulaya himself, engaged in widespread criminal activities, including acts of violence, extortion, the operation of illegal gambling businesses, fraud on various casinos, identity theft, credit card frauds, trafficking in large quantities of stolen goods, money laundering through a fraudulently established vodka import-export company, payment of bribes to local law enforcement officers, and the operation of a Brooklyn-based brothel.

The Shulaya Enterprise operated through groups of individuals, often with overlapping members or associates, dedicated to particular criminal tasks.  While many of these crews were based in New York City, the Shulaya Enterprise had operations in various locations throughout the United States (including in New Jersey, Pennsylvania, Florida, and Nevada) and abroad.  Most members and associates of the Shulaya Enterprise were born in the former Soviet Union and many maintained substantial ties to Georgia, Ukraine, and the Russian Federation, including regular travel to those countries, communication with associates in those countries, and the transfer of criminal proceeds to individuals in those countries.

Avtandil Khurtsidze VS Tommy Langford - ITS OFFICIAL - YouTube Not too sure he was not a spy either frankly.

Georgian former boxing champion Avtandil Khurtsidze has been sentenced to 10 years in prison for working as the “chief enforcer” for an “elite” criminal enterprise.

He was convicted in June in New York of racketeering and wire fraud conspiracy.

Prosecutors said the 38-year-old boxer had “substantial influence” in the criminal underworld as part of a Soviet Union crime gang.

They said Khurtsidze used violence in service of the group’s activities.

He and his associates, known as the Shulaya Enterprise, were blamed for crimes across the US including extortion, wire fraud, illegal gambling and operating a brothel in Brooklyn.

Many of the crew’s activities were based in New York but they also operated in other major cities as well as abroad, a justice department statement said.

Officials say most of its members were born in the former Soviet Union, with strong ties to Georgia, where the boxer was born.

Khurtsidze was caught on film twice carrying out assaults, with prosecutors describing him as a “heavyweight enforcer” for the group’s members and leadership.

He was also accused of participating in a complex fraud scheme to predict casino slot machines algorithms, which involved kidnapping a software engineer in Las Vegas in 2014.

Khurtsidze on shoulders with a belt above head
Getty Image
Image caption Khurtsidze was arrested in 2017, scuppering his chances at the WBO middleweight title

On top of his decade federal jail sentence, the Georgian boxer was given two further years supervision on release.

“Thanks to our dedicated law enforcement partners around the globe, Khurtsidze’s reign of extortion and violence has been halted,” US attorney Geoffrey Berman said in a statement.

‘Just a waste’

Khurtsidze held the interim WBO middleweight title in 2017.

His last professional fight was against British boxer Tommy Langford in April 2017, which he won.

A later bout against Billy Joe Sanders was cancelled after Khurtsidze was arrested along with more than 30 others in a swoop against the organised crime syndicate.

Following his conviction, his former promoter Lou DiBella criticised the boxer for squandering his career.

“He let many people down who believed in him, but no one more than himself. Just a waste, and it’s all on him for choosing the dark side,” Mr DiBella told ESPN.

Kamala Harris Led the Disdain for ‘That Book’

Listening carefully to each of the Democrats during the Brett Kavanaugh confirmation hearing was quite revealing. Many prefaced their questions with statements challenging Judge Kavanaugh on his fealty to the Constitution. Senator(s) Coons, Booker, Harris, Whitehouse and others proved their hypocrisy and disdain for The Founders, The Federalists, The Heritage Foundation and the Federalist Society calling those organizations highly partisan.  The moral standards and beliefs of the Democrats were applied conveniently as a weapon in countless exchanges during the past several days of the hearings.

In fact, The Heritage Foundation and the Federalist Society was branded often as contentious organizations, right-winged and in some cases radical. Hummm

About ‘that book’ though: Personally, I was struck how Brett Kavanaugh held his pocket edition of the Constitution almost as a his lifeline and how worn out it was. His loyalty and allegiance to the Constitution was quite refreshing and mostly reassuring.

When it comes to the Federalists, they were a group of supporters to the Constitution that were diligent to the assurance of a decentralized system of government. Many of Judge Kavanaugh’s 300 plus decisions were based on that very concept and applying the law as passed by Congress.

What about those demands for documents?

Oh, what about this?

Or this?

Ahem…

If Senator Coons has know Brett Kavanugh for thirty years….why all the challenge then? Watch this video and tally the statements made by the Senator that turned out to be untrue in 11 minutes.

Outside the mainstream? Exactly what does that mean? Anyone? Uphold or undermind the founding principles? Really?