Under Obama, the Russians Breached FBI Communications

So, at the time we had Comey, Mueller, Brennan, Clapper, Holder, Lynch, Rice, Power, Monaco, Donilon, McDonough, Rhodes and more.

Anyone remember when there was a pile of Russian spies that Obama expelled and traded? Remember at the very end of the Obama presidency when he expelled another pile of Russians from 3 locations and closed Russian dachas?

A big question remains that has yet to be answered and that is why did the Obama administration wait so long to impose a consequence?

Okay, well sit back this is a long read but it for sure explains the way too casual approach by Obama to Russia.

Simply put, the entire Obama administration and those democrats in congress had to be really embarrassed. With all the later Russian collusion stuff, that operation had to be a huge head-fake cover-up thing.

Whew what a mess. The Russians punked the FBI and that hurt America’s national security and policy badly…so we dispatched Hillary to do that Russian reset with that pesky red button.

Okay, here we go….

Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil

YahooNews: On Dec. 29, 2016, the Obama administration announced that it was giving nearly three dozen Russian diplomats just 72 hours to leave the United States and was seizing two rural East Coast estates owned by the Russian government. As the Russians burned papers and scrambled to pack their bags, the Kremlin protested the treatment of its diplomats, and denied that those compounds — sometimes known as the “dachas” — were anything more than vacation spots for their personnel.

The Obama administration’s public rationale for the expulsions and closures — the harshest U.S. diplomatic reprisals taken against Russia in several decades — was to retaliate for Russian meddling in the 2016 presidential election. But there was another critical, and secret, reason why those locations and diplomats were targeted.

Both compounds, and at least some of the expelled diplomats, played key roles in a brazen Russian counterintelligence operation that stretched from the Bay Area to the heart of the nation’s capital, according to former U.S. officials. The operation, which targeted FBI communications, hampered the bureau’s ability to track Russian spies on U.S. soil at a time of increasing tension with Moscow, forced the FBI and CIA to cease contact with some of their Russian assets, and prompted tighter security procedures at key U.S. national security facilities in the Washington area and elsewhere, according to former U.S. officials. It even raised concerns among some U.S. officials about a Russian mole within the U.S. intelligence community.

“It was a very broad effort to try and penetrate our most sensitive operations,” said a former senior CIA official.

American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams. Officials also feared that the Russians may have devised other ways to monitor U.S. intelligence communications, including hacking into computers not connected to the internet. Senior FBI and CIA officials briefed congressional leaders on these issues as part of a wide-ranging examination on Capitol Hill of U.S. counterintelligence vulnerabilities.

These compromises, the full gravity of which became clear to U.S. officials in 2012, gave Russian spies in American cities including Washington, New York and San Francisco key insights into the location of undercover FBI surveillance teams, and likely the actual substance of FBI communications, according to former officials. They provided the Russians opportunities to potentially shake off FBI surveillance and communicate with sensitive human sources, check on remote recording devices and even gather intelligence on their FBI pursuers, the former officials said.

“When we found out about this, the light bulb went on — that this could be why we haven’t seen [certain types of] activity” from known Russian spies in the United States, said a former senior intelligence official.

The compromise of FBI systems occurred not long after the White House’s 2010 decision to arrest and expose a group of “illegals” – Russian operatives embedded in American society under deep non-official cover – and reflected a resurgence of Russian espionage. Just a few months after the illegals pleaded guilty in July 2010, the FBI opened a new investigation into a group of New York-based undercover Russian intelligence officers. These Russian spies, the FBI discovered, were attempting to recruit a ring of U.S. assets — including Carter Page, an American businessman who would later act as an unpaid foreign policy adviser to Donald Trump’s 2016 presidential campaign.

The breaches also spoke to larger challenges faced by U.S. intelligence agencies in guarding the nation’s secrets, an issue highlighted by recent revelations, first published by CNN, that the CIA was forced to extract a key Russian asset and bring him to the U.S. in 2017. The asset was reportedly critical to the U.S. intelligence community’s conclusion that Russian President Vladimir Putin had personally directed the interference in the 2016 presidential election in support of Donald Trump.

Yahoo spoke about these previously unreported technical breaches and the larger government debates surrounding U.S. policies toward Russia with more than 50 current and former intelligence and national security officials, most of whom requested anonymity to discuss sensitive operations and internal discussions. While the officials expressed a variety of views on what went wrong with U.S.-Russian relations, some said the United States at times neglected to appreciate the espionage challenge from Moscow, and paid a significant price for a failure to prioritize technical threats.

“When I was in office, the counterintelligence business was … focused entirely on its core concern, which is insider threats, and in particular mole hunting,” said Joel Brenner, the head of U.S. counterintelligence and strategy from 2006 to 2009. “This is, in fact, the core risk and it’s right that it should be the focus. But we were neither organized nor resourced to deal with counterintelligence in networks, technical networks, electronic networks.”

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Russians leave country retreats in the U.S., ordered out ...

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The Spy Next Door: What Went On in Russia's Shuttered U.S ...

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russia to U.S.: Return Seized Diplomatic Compounds, or Else

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.

U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.

Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”

Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.

While the Russians may have developed this capability by themselves, senior counterintelligence officials also feared that someone from within the U.S. government — a Russian mole — may have helped them, said former officials. “You’re wondering, ‘If this is true, and they can do this, is this because someone on the inside has given them that information?’’ said another former senior intelligence official.

Russia has a clear interest in concealing how it gets its information, further muddying the waters. According to a former senior CIA officer who served in Moscow, the Russians would often try to disguise a human source as a technical penetration. Ultimately, officials were unable to pinpoint exactly how the Russians pulled off the compromise of the FBI’s systems.

Mark Kelton, who served as the chief of counterintelligence at the CIA until he retired in 2015, declined to discuss specific Russian operations, but he told Yahoo News that “the Russians are a professionally proficient adversary who have historically penetrated every American institution worth penetrating.”

This remains a core worry for U.S. spy hunters. The number of ongoing espionage investigations into U.S. government personnel — at the CIA, the FBI and elsewhere — including those potentially recruited by Russia, “is not a little, it’s a lot,” said another former senior counterintelligence official.

Once the compromises of FBI communications devices were confirmed, U.S. officials scrambled to minimize the exposure of mobile surveillance team operations, quickly putting countermeasures in place, according to former senior officials. There was a “huge concern” about protecting the identities of the individuals on the teams — an elite, secret group — said the former senior counterintelligence official. U.S. officials also conducted a damage assessment and repeatedly briefed select White House officials and members of Congress about the compromise.

After the FBI discovered that its surveillance teams’ cellphones had been compromised, they were forced to switch back to encrypted radios, purchasing different models, according to two former officials. “It was an expensive venture,” said one former counterintelligence official.

But the spying successes went both ways. The U.S. intelligence community collected its own inside information to conclude that the damage from the compromises had been limited, partly due to the Russians’ efforts to keep their intelligence coup secret, according to a former senior intelligence official. “The Russians were reticent to take steps [that might reveal] that they’d figured it out,” the former senior official said.

Even so, the costs to U.S. intelligence were significant. Spooked by the discovery that its surveillance teams’ communications had been compromised, the FBI worried that some of its assets had been blown, said two former senior intelligence officials. The bureau consequently cut off contact with some of its Russian sources, according to one of those officials.

At the time of the compromise, some of the FBI’s other Russian assets stopped cooperating with their American handlers. “There were a couple instances where a recruited person had said, ‘I can’t meet you anymore,’” said a former senior intelligence official. In a damage assessment conducted around 2012, U.S. intelligence officials concluded the events may have been linked.

The impact was not limited to the FBI. Alerted by the bureau to concerns surrounding Russia’s enhanced interception capabilities, the CIA also ceased certain types of communications with sources abroad, according to a former senior CIA official. The agency “had to resort to a whole series of steps” to ensure the Russians weren’t able to eavesdrop on CIA communications, the former senior official said. There was a “strong hint” that these newly discovered code-breaking capabilities by Russia were also being used abroad, said another former senior intelligence official.

The CIA has long been wary of Russian spies’ eavesdropping efforts outside of the United States, especially near U.S. diplomatic facilities. U.S. officials have observed Russian technical officers repeatedly walking close to those compounds with packages in their hands, or wearing backpacks, or pushing strollers, or driving by in vehicles — all attempts, U.S. officials believe, to collect information on the different signals emanating from the facilities. While the tools used by the Russians for these activities were “a bit antiquated,” said a former senior CIA official, they were still a “constant concern.”

It’s not unusual for intelligence officers operating from diplomatic facilities, including the United States’s own operatives, to try and intercept the communications of the host nation. “You had to find ways to attack their surveillance,” said Rolf Mowatt-Larssen, former head of counterintelligence at the Department of Energy and a former CIA officer who first served in Moscow in the 1980s. “The Russians do everything in the U.S. that we did in Moscow.”

Indeed, the focus on cracking radio communications was no different.

“We put extraordinary effort into intercepting and monitoring the FSB surveillance radio networks for the purpose of understanding whether our officers were under surveillance or not,” said another former senior CIA officer who also served in Moscow.

The discovery of the Russians’ new code-breaking capabilities came at a time when gathering intelligence on Russia and its leaders’ intentions was of particular importance to the U.S. government. U.S. national security officials working on Russia at the time received rigorous security training on how to keep their digital devices secure, according to two former senior officials. One former U.S. official recalled how during the negotiations surrounding the reset, NSC officials, partially tongue in cheek, “would sometimes say things on the phone hoping [they] were communicating things to the Russians.”

According to a former CIA official and a former national security official, the CIA’s analysts often disagreed about how committed Russia was to negotiations during the attempted reset and how far Putin would go to achieve his strategic aims, divergences that confused the White House and senior policy makers.

“It caused a really big rift within the [National Security Council] on how seriously they took analysis from the agency,” said the former CIA official. Senior administration leaders “went along with” some of the more optimistic analysis on the future of U.S.-Russia relations “in the hopes that this would work out,” the official continued.

Those disagreements were part of a “reset hangover” that persisted, at least for some inside the administration, until the 2016 election meddling, according to a former senior national security official. Those officials clung to the hope that Washington and Moscow could cooperate on key issues, despite aggressive Russian actions ranging from the invasion of Ukraine to its spying efforts.

“We didn’t understand that they were at political war with us already in the second term once Putin was reelected and Obama himself was reelected,” said Evelyn Farkas, the former deputy assistant secretary of defense for Russia, Ukraine, and Eurasia during the Obama administration.

As high-level hopes for the U.S.-Russia “reset” withered, concerns about the threat of Russian spying made their way to Capitol Hill. Top officials at the FBI and CIA briefed key members of Congress on counterintelligence issues related to Russia, according to current and former U.S. officials. These included briefings on the radio compromises, said two former senior officials.

Mike Rogers, a former Republican lawmaker from Michigan who chaired the House Permanent Select Committee on Intelligence from 2011 to 2015, alluded to counterintelligence concerns at a conference earlier this year in Washington, D.C.

One of those concerns was a massive intelligence failure related to the secret internet-based communications system the CIA used to communicate with agents. The extent of that failure, first reported publicly by Yahoo News in 2018, got the attention of Congress earlier.

But the problems were broader than that issue, according to Rogers.

“Our counterintelligence operations needed some adjustments,” said Rogers, adding that he and his Democratic counterpart from Maryland, Dutch Ruppersberger, requested regular briefings on the subject from agency representatives. “We started out monthly until we just wore them out, then we did it quarterly to try to make sure that we had the right resources and the right focus for the entire community on counter[intelligence].”

Rogers later told Yahoo News that his request for the briefings had been prompted by “suspected penetrations, both physical and technical, which is the role of those [Russian and Chinese] intelligence services,” but declined to be more specific.

The former committee chairman said he wanted the intelligence community to make counterintelligence a higher priority. “Counterintelligence was always looked at as the crazy uncle at the party,” he said. “I wanted to raise it up and give it a robust importance.”

The briefings, which primarily involved counterintelligence officials from the FBI and CIA and were limited to the committee leadership and staff directors, led to “some useful inquiries to help focus the intelligence community,” Rogers said. The leaders of the Senate Select Committee on Intelligence were also included in some of the inquiries, according to Rogers and a current U.S. government official.

Spokespeople for the current House and Senate intelligence committees did not respond to a request for comment. The FBI and CIA declined to comment. The Russian Embassy in Washington, D.C. did not respond to a request for comment.

The briefings were designed to “get the counterintelligence house in order,” said Jamil Jaffer, senior counsel at the House intelligence committee from 2011 to 2013, and to ensure that Congress and the intelligence agencies were “on the same page” when it came to such matters. “There were some concerns about what the agencies were doing, there were some concerns about what Congress knew, and all of these issues, of course, had China-Russia implications.”

Rogers and Jaffer declined to provide further details about what specific counterintelligence issues the committee was addressing, but other former officials indicated that worries weren’t limited to the compromise of FBI radio systems. Senior U.S. officials were contemplating an even more disturbing possibility: that the Russians had found a way to penetrate the communications of the U.S. intelligence community’s most sensitive buildings in and around Washington, D.C.

Suspected Russian intelligence officers were seen conspicuously loitering along the road that runs alongside the CIA’s headquarters, according to former senior intelligence officials. “Russian diplomats would be sitting on Route 123, sometimes in cars with diplomatic plates, other times not,” a former senior intelligence executive said. “We thought, they’re out doing something. It’s not just taking down license plates; those guys are interrogating the system.”

Though this behavior dated back at least to the mid-2000s, former officials said those activities persisted simultaneously with the compromise of the FBI’s communication system. And these were not the only instances of Russian intelligence operatives staking out locations with a line of sight to CIA headquarters. They were “fixated on being in neighborhoods” that gave them exposure to Langley, said a former senior official.

Over time, U.S. intelligence officials became increasingly concerned that Russian spies might be attempting to intercept communications from key U.S. intelligence facilities, including the CIA and FBI headquarters. No one knew if the Russians had actually succeeded.

“The question was whether they had capabilities to penetrate our comms at Langley,” said a former senior CIA official. In the absence of any proof that that was the case, the working theory was that the Russian activities were provocations designed to sow uncertainty within the CIA. “We came to the conclusion that they were trying to get into our heads,” the former senior official said.

A major concern was that Russian spies with physical proximity to sensitive U.S. buildings might be exfiltrating pilfered data that had “jumped the air gap,” i.e., that the Russians were collecting information from a breach of computers not connected to the Internet, said former officials.

One factor behind U.S. intelligence officials’ fears was simple: The CIA had already figured out how to perform similar operations themselves, according to a former senior CIA officer directly familiar with the matter. “We felt it was pretty revolutionary stuff at the time,” the former CIA officer said. “It allowed us to do some extraordinary things.”

While no one definitively concluded that the Russians had actually succeeded in penetrating Langley’s communications, those fears, combined in part with the breach of the bureau’s encrypted radio system, drove an effort by U.S. intelligence officials around 2012 to fortify sensitive Washington-area government buildings against potential Russian snooping, according to four former officials.

At key government facilities in the Washington area, entire floors were converted to sensitive compartmented information facilities, or SCIFs. These are specially protected areas designed to be impenetrable to hostile signals intelligence gathering.

The normal assumption was that work done in a SCIF would be secure, but doubts arose about the safety of even those rooms. “The security guys would say, your windows are ‘tempested’”—that is, protected against the interception of emissions radiating from electronic equipment in the building —“you’re in a SCIF, it’s fine,” a former senior counterintelligence executive recalled. “The question was, ‘Is it true?’”

Increasingly, U.S. officials began to fear it was not.

New security practices were instituted in sensitive government facilities like the FBI and CIA headquarters, according to former officials. “It required many procedural changes on our part to make sure we were not susceptible to penetrations,” said a former senior CIA official. These included basic steps such as moving communication away from windows and changing encryption codes more frequently, as well as more expensive adjustments, said four former officials.

Revelations about the Russian compromise of the radio systems, recalled a former senior intelligence official, “kick-started the money flowing” to upgrade security.

While the breaches of the FBI communications systems appeared to finally spur Congress and the intelligence agencies to adopt steps to counter increasingly sophisticated Russian eavesdropping, it took the Putin-directed interference in the 2016 election to get the White House to expel at least some of those officials deemed responsible for the breaches, and to shut down the facilities that enabled them.

Even then, the decision was controversial. Some in Washington worried about retribution by the Russians and exposure of American intelligence operations, according to a former senior U.S. national security official directly involved in the discussions. The FBI consistently supported expulsions, said another former national security official.

More than two years later, the Russian diplomatic compounds used in the FBI communications compromises remain shuttered. The U.S. government has prevented many of the Russian spies expelled by the United States from returning, according to national security experts and senior foreign intelligence officials. “They are slowly creeping back in, but [the] FBI makes it hard,” said a senior foreign intelligence official. “The old guard is basically screwed. They need to bring in a whole new generation.”

In the meantime, those familiar with Russian operations warn that the threat from Moscow is far from over. “Make no mistake, we’re in an intelligence war with the Russians, every bit as dangerous as the Cold War,” said a former senior intelligence officer. “They’re trying all the time … and we caught them from time to time,” he said. Of course, he added, “you don’t know what you don’t know.”

That’s the same message that special counsel Robert Mueller tried to convey during the highly contentious hearings to discuss his report on Russian interference in the 2016 election. “They are doing it as we sit here, and they expect to do it during the next campaign,” Mueller told lawmakers on the House Intelligence Committee about covert Russian involvement in U.S. politics.

But a number of observers believe Mueller’s message about the threat from Russia was largely lost amid a partisan battle on Capitol Hill over President Trump.

During his Washington conference appearance earlier this year, Rogers, the former chair of the House Intelligence Committee, also lamented that the current politicized state of the intelligence committees would make spy agencies more hesitant to admit their failures.

“They’re not going to call you to say, ‘I screwed up.’ They’re going to say, ‘God, I hope they don’t find that,’” he said. “That’s what’s going to happen. I’ll guarantee it’s happening today.”

What Can Be Purchased at Canadian RX Pharmacies?
The best thing about Canadian drugstores is the abundance of medications they offer to their clients. As a rule, at such websites, you may find effective remedies or medical solutions to any kind of disorders, which refers to not just RX medications available on prescription, but also personal care products, vitamins and nutritional supplements. Canadian pharmacy Canadapharmrxon.com even offer a broad assortment of generic medications which are just as good as prescription drugs but are available at a more affordable price. So, what can be found at Canadian drugstores? Here is a list of the most popular options:
Anti-inflammatory medicines;
Medicines to fight infectious diseases such as antibiotics;
Antipsychotic drugs and other mental health solutions;
Men’s health goods;
Women’s skin care products;
High blood pressure solutions;
Weight control medicines;
Personal care products;
Drugs to treat stomach disorders;
Over-the-counter medicines such as herbal drugs or supplements.

 

Birthright Citizenship is NOT in the Constitution

This topic has long been debated with no resolution including at the Supreme Court level. Much has been written about what ‘birthright’ is including in the New York Times as recently as in 2015.
The simply requirement is subject to the jurisdiction of the United States, not subject to a foreign power. A birth must be to parents who were legally domiciled to the United States as citizens themselves. There is no such thing legally as an anchor baby. There must be a provable bind to the United States.
President Trump has ordered a team to investigate the definition of the 14th Amendment leading to his possible signature of an Executive Order which would lead government agencies to act in accordance with the clarification and regulations around the Citizenship Clause.

During the years of Ellis Islands, immigrants had to have money, the proven ability to earn a salary and not be an economic burden to the United States. 12 million people passed through Ellis Island and had for the time, a rigorous process to comply for entry. They included medical exams, have existing family members in the United States for connections and a safety net and prove existing financial means. There was quite a list of questions for the immigrants including those regarding a criminal record, being institutionalized for insanity and having some prior knowledge of the United States including facts of the Constitution, naming the 13 colonies and if they were an anarchist. There were in many cases immediate deportations for failures of passing fundamental stipulations.

High praise should be given to the Trump administration for tackling the issue of birthright citizenship for clarification because the abuse of the system has been out of control, exploiting the anchor baby model.

Take notice that even ABC news as recently as March of this year, 2019 addressed the issue of pregnant Russian women flocking to Miami to given birth just to gain citizenship under the anchor baby policy which is not nor has even been policy or legal. There are brokers around the world that facilitate these American births where the cost can range from $20,000 to $50,000. This includes travel, accommodations and the hospital expenses. This is otherwise known as ‘birth tourists’. But hey, Russia is not the only country. Nigeria, Mexico and China are included. We cant know the full number of those participating in  birth tourism but each year it is estimated to range in the 30-50,000 of women that make the trip. Not to be overlooked is the healthcare in itself, clearly better here than in their home country. Consider that a particular area of Miami, known as Sunny Isles Beach is teeming with Russians and has the nickname of little Moscow.

So, next how about California?

So as recently as 2018, the FBI had to perform a set of raids on maternity hotels and apartment complexes in an estimated 20 locations in and around Los Angeles. Ah, it seems these pregnant Chinese women had more expensive brokers as they paid in the range of $40-$80,000 for their travel, accommodations and hospital stay. Operations in Los Angeles obviously had quite the operation stateside as some of these locations witnessed trucks and fork lifts delivering pallets of diapers and other infant needs like formula.

California Apartments Raided in Federal Investigation of ...

This all amounts to abuse of U.S. citizenship.

Further:

The Trump administration on Monday issued a long-awaited rule strengthening the ability of federal officials to deny green cards to immigrants deemed likely to rely on government aid.

Officials described the so-called “public charge” rule as a way to ensure those granted permanent residency are self-sufficient — and protect taxpayers in the process.

“It will also have the long-term benefit of protecting taxpayers by ensuring people who are immigrating to this country don’t become public burdens, that they can stand on their own two feet, as immigrants in years past have done,” he said. “It’s not only a recipe for their success, but for America’s success growing out of our immigration system.”

The updated rule will better define, and expand, the factors that can be considered to deny an applicant on these grounds.

While the “public charge” inadmissibility standard has long been part of U.S. immigration law, the term has not been formally defined in statute. The new rule, which will go into effect on October 15, will define “public charge” as an immigrant who receives one or more designated public benefits for more than 12 months within a 36-month period.

USDA Hires 'Integrity Officer' to Fight Fraud in Food ...

Those benefits include Supplemental Security Income (SSI), Temporary Assistance for Needy Families (TANF), as well as most forms of Medicaid and the Supplemental Nutrition Assistance Program (SNAP) — commonly known as food stamps. The rule expands the number of benefits that can be considered from interim guidance issued in 1999.

Those factors will be considered along with standard considerations such as age, health, financial assets and education. While Cuccinelli’s USCIS is the lead agency, similar filters will be used at the State Department (for those applying for visas from abroad) and Border Patrol.

Maybe true clarity for the sake of law and order is becoming a reality with regard to immigration and the Constitution.

 

Waivers? China Pharmaceuticals Killing Americans

Primer:

Image result for chinese pharmaceuticals
In part from Reuters: “My friend President Xi said that he would stop the sale of fentanyl to the United States – this never happened and many Americans continue to die,” Trump said in a tweet.

“We’re losing thousands of people to fentanyl,” he later told reporters.

The Chinese embassy did not immediately respond to a request for comment.

Fentanyl is an opioid painkiller 50 times more potent than heroin, and has a central role in the devastating U.S. opioid crisis. In the United States, fentanyl and all of its analogues are controlled substances subject to strict regulation.

More than 28,000 synthetic opioid-related overdose deaths, mostly from fentanyl related substances, were recorded in 2017, according to the U.S. Centers for Disease Control and Prevention.

Image result for chinese pharmaceuticals

Added from Bloomberg:

China has become the world’s largest supplier of active pharmaceutical ingredients, or API, providing key components to drugmakers worldwide. But a yearlong recall of tainted heart drugs taken by millions of Americans is prompting U.S. national security officials to ask whether China’s growing role in the pharmaceutical supply chain could pose a threat to the health of military personnel.

“The national security risks of increased Chinese dominance of the global API market cannot be overstated,” Christopher Priest, the acting deputy assistant director for health care operations and Tricare for the Defense Health Agency, told a U.S.-China advisory panel last week in Washington.

The Defense Health Agency manages much of the health care of military members, including prescription drugs.

Concerns about the safety and efficacy of Chinese-made drugs are rising at a time of heightened trade tensions between Washington and Beijing. Last week, Trump unveiled plans for new tariffs on Chinese goods; China plans to halt imports of U.S. crops in response. The yuan sank on Monday against the dollar.

The National Security Council is looking into Chinese drug manufacturing and trying to identify the most at-risk medications, Priest told the U.S.-China Economic and Security Review Commission in Washington, without elaborating. The National Security Council declined to comment.

The Defense Health Agency is supposed to use drugs that comply with the Trade Agreements Act, a 1979 law that requires many federal purchases to be made in the U.S. or another compliant country. China isn’t on the approved list, but the agency has waivers for almost 150 drugs they otherwise wouldn’t be able to procure, Priest said. The TAA covers only finished products, not their components.

Many drugs taken by military members and civilians have active ingredients made in China. While drugmakers typically don’t disclose where every molecule in a pill comes from, the recall of contaminated blood-pressure drugs has shown that many of their active components originated in Chinese factories.

Rocket Fuel

Larry Wortzel, a member of the U.S.-China commission and a military retiree, said four of his blood-pressure medications were recalled in three months. Wortzel’s pills, versions of a drug called valsartan, were manufactured in India but had active ingredients from China.

“They were contaminated with rocket fuel,” Wortzel said. “I imagine active people have the same problem. This affects the readiness of our troops.”

The recalled valsartan contained a probable carcinogen known as NDMA, a manufacturing byproduct once used to make rocket fuel and also found in grilled and cured meats.

Priest called the recalls “a never-ending saga” and a “wake-up call.”

The recalls began in July 2018 with valsartan made by China’s Zhejiang Huahai Pharmaceutical Co. The U.S. Food and Drug Administration has largely blamed the company’s manufacturing process for creating the NDMA, which went undetected for as long as four years. Drugmakers in other countries who used similar processes have also had to recall blood-pressure pills.

Some valsartan purchased by the Defense Logistics Agency and later recalled was TAA-compliant, said Patrick Mackin, a spokesman for the DLA. The agency manages the supply chain for the U.S. military, including ensuring pharmaceuticals make their way to military treatment facilities. With valsartan in shortage, according to the FDA, the agency sought a TAA waiver for valsartan on July 15, Mackin said.

A Bloomberg investigation this year detailed doubts among U.S. health officials about the data generic-drug companies, including Zhejiang Huahai and others involved in the valsartan recalls, use to prove their products are safe and effective.

“We wouldn’t have our aircraft carriers and nuclear submarines built in China, and for very important medications, we really should look at what it takes to purchase based on value not just price,” Rosemary Gibson, the author of the book “China Rx,” told the commission. “We want cheap, we can buy cheap. But what’s missing from the whole equation is quality.”

Shortage Fears

Quality isn’t the only concern. Shortages could also arise from attempts by the Chinese to cut off supply, particularly amid the U.S.-China trade standoff.

“If China shut the door on exports, our hospitals would cease to function, so this has tremendous urgency,” Gibson said.

Priest said pharmaceutical companies should be compelled, using the buying power of the entire federal government, to maintain the infrastructure to make drugs without relying on countries like China.

The House Energy and Commerce Committee is investigating the FDA’s ability to police foreign manufacturing. The committee’s leaders asked the agency for more information on the valsartan recall in June, including about a dispute between senior officials and an agency inspector who raised red flags at Zhejiang Huahai more than a year before the NDMA was detected. The panel also asked the Government Accountability Office to look at the FDA’s oversight of foreign drug manufacturing.

“Shame on us for not paying attention to something so critical and assuming, which has been the orthodoxy for a long time, that the industry would regulate itself,” Benjamin Shobert, senior associate for international health at The National Bureau of Asian Research, told the commission.

 

Defamation Laws v. President Trump

The El Paso shooter left a 4 page manifesto laying out his political and society position(s) on several topics including the Hispanic invasion. He also addressed fake news and that Trump did not have anything to do with his evil decisions to go on a killing rampage. So, Cloudflare fired one of it’s customers, 8Chan. The shooter’s manifesto was posted on 8Chan. A cyber site known as ZDNet among others reporting the termination of 8Chan had it the subtitle the following: “8Chan has harbored a community of hate” (in part). No argument there.

Okay, yet consider the words ‘harbored a community of hate’. In a review of media and politicians, it is beyond dispute that they too have harbored a community of hate.

Image result for victims of mass shootings

Senator and presidential candidate Kamala Harris often has called President Trump a ‘predator‘.

Senator Cory Booker declared on Meet the Press that Trump is responsible for El Paso shooting.

Mayor Pete Buttigeig along with Elizabeth Warren and Julian Castro and others have said the same thing.  These politicians created the phrase ‘white nationalism’ to describe Trump and Trump supporters.

Bernie Sanders too? Yes.

While being one of the moderators of the Democrat debate, Don Lemon of CNN twice called Trump a racist. Not to be left out is the New York Times and for sure the Washington Post.

So we have yet another ‘community of hate’ and is anyone challenging these politicians or media to look inward and ask if they are complicit is all this?

So, what about defamation laws? Glad you asked. Consider the following:

What is Defamation?

Defamation is a common law tort, governed by state law, in which an individual makes a “publication” of a defamatory statement of and concerning the plaintiff that damages the reputation of the plaintiff. Defamation comes in two forms: slander and libel. Slander involves the oral “publication” of a defamatory remark that is heard by another, which injures the subject’s reputation or character. Libel is the written “publication” of a defamatory remark that has the tendency to injure another’s reputation or character.

What are the elements of a cause of action for defamation?

The elements of a defamation suit; whether slander or libel, are:

1. A defamatory statement;

2. Published to a third party;

3. Which the speaker knew or should have known was false;

4. That causes injury to the subject of the communication

So, just how many are really creating more hate and division and the manifestation of this into the full landscape of domestic tranquility or the that matter even when it comes to global relations between the United States and countries across the world?

Active shooters and deadly ambushes on soft targets where very innocent people die is the result of all this high octane rhetoric by some many. Evil pulled the trigger(s). Evil is a form of mental defect. See something say something? Okay, that does often work when it comes to public safety and nabbing criminals. Great. Yet here is another suggestion for a layered approach. How about the cyber wing of our government, suggesting the NSA create a search algorithm that searches online sites including dark parts of the web like that of 8Chan to flush out evil as spelled out in the El Paso shooter’s manifesto? Google, Facebook and Twitter all created and apply these kinds of software tactics. Suggesting the NRA is to blame is without basis, suggesting Trump is to blame is without basis, suggesting that white nationalism is to blame is without basis.

There is no single cure to this community of hate. There must be a layered approach, so having a cogent summit and plan is suggested. After the Parkland shooting, the Trump White House did host a summit and several approaches were suggested including a state by state Red Flag law system to keep schools safe.

How do you legislate away hate that may turn deadly? You don’t but politicians and media must become introspective in this community of hate.

For more consideration is the recent item published by the LA Times. In part:

For two years, we’ve been studying the life histories of mass shooters in the United States for a project funded by the National Institute of Justice, the research arm of the U.S. Department of Justice. We’ve built a database dating back to 1966 of every mass shooter who shot and killed four or more people in a public place, and every shooting incident at schools, workplaces, and places of worship since 1999. We’ve interviewed incarcerated perpetrators and their families, shooting survivors and first responders. We’ve read media and social media, manifestos, suicide notes, trial transcripts and medical records.

Our goal has been to find new, data-driven pathways for preventing such shootings. Although we haven’t found that mass shooters are all alike, our data do reveal four commonalities among the perpetrators of nearly all the mass shootings we studied.

First, the vast majority of mass shooters in our study experienced early childhood trauma and exposure to violence at a young age. The nature of their exposure included parental suicide, physical or sexual abuse, neglect, domestic violence, and/or severe bullying. The trauma was often a precursor to mental health concerns, including depression, anxiety, thought disorders or suicidality.

Second, practically every mass shooter we studied had reached an identifiable crisis point in the weeks or months leading up to the shooting. They often had become angry and despondent because of a specific grievance. For workplace shooters, a change in job status was frequently the trigger. For shooters in other contexts, relationship rejection or loss often played a role. Such crises were, in many cases, communicated to others through a marked change in behavior, an expression of suicidal thoughts or plans, or specific threats of violence.

Third, most of the shooters had studied the actions of other shooters and sought validation for their motives. People in crisis have always existed. But in the age of 24-hour rolling news and social media, there are scripts to follow that promise notoriety in death. Societal fear and fascination with mass shootings partly drives the motivation to commit them. Hence, as we have seen in the last week, mass shootings tend to come in clusters. They are socially contagious. Perpetrators study other perpetrators and model their acts after previous shootings. Many are radicalized online in their search for validation from others that their will to murder is justified.

Fourth, the shooters all had the means to carry out their plans. Once someone decides life is no longer worth living and that murdering others would be a proper revenge, only means and opportunity stand in the way of another mass shooting. Is an appropriate shooting site accessible? Can the would-be shooter obtain firearms? In 80% of school shootings, perpetrators got their weapons from family members, according to our data. Workplace shooters tended to use handguns they legally owned. Other public shooters were more likely to acquire them illegally. Go here for the full article.

How About Consulting FBI and SOCOM on Immigration

Homeland Security and Homeland Defense cannot be divided, one relies on the other.

For starters, the FBI has had a long term operation in Central America. The FBI declares the gang operations for instance in El Salvador does affect public safety in America.

“Many of the gang members committing these homicides are 13-, 14-, and 15-year-olds,” he explained, “and every day there are new members coming in.”

“We aren’t facing a group of youths who are rebelling, but a very structured organization conducting criminal activities,” said Luis Martinez, El Salvador’s attorney general and the country’s highest ranking law enforcement officer. “They are using military-grade weapons, and they are using them against the police, military, and prosecutors.”

MS-13 and 18th Street gang members have gained a foothold in numerous U.S. cities, including Los Angeles, Boston, Houston, Charlotte, Newark, and the Northern Virginia suburbs of Washington, D.C. They commit a variety of crimes—mainly trafficking drugs and extorting individuals and business owners—and they maintain strong ties to Central America.

The program is called Central American Law Enforcement Exchange (CALEE).

The success of the Central American Law Enforcement Exchange (CALEE) program hinges on bringing together U.S. and Central American law enforcement officers who share a common cause in the fight against violent transnational gangs. During the most recent CALEE, an important new partner was added to the group—prosecutors.

“We have seen that when prosecutors and investigators work together from the outset, cases tend to have more successful outcomes,” said Special Agent Grant Mann, who helped plan and administer CALEE 2015, the sixth session since the program began in 2009.

In the U.S, it is typical for FBI agents and prosecutors to sit down at the beginning of an investigation to discuss possible charges and investigative strategies. Historically, that collaborative process is less common in Central America—but thanks to programs such as CALEE, it is gaining acceptance.

***

At Joint Task Force-Bravo which is located at Soto Cano Air Base, Hondura, the task force supports training engagements, counterdrug missions and humanitarian and disaster relief efforts in Central America.

Southern Command continues support for Guatemala’s counter trafficking efforts, human rights efforts and future U.S. military engagement activities. Guatemalan police unit and an interagency task force – both focused on countering illicit traffickers in the nation in cooperation with the U.S. military.

Additionally, in El Salvador we have partnerships that provides key support to regional counter illicit trafficking efforts. The U.S. military has a Cooperative Security Location hosted at Comalapa International Airport where U.S. aircraft fly missions to detect, monitor and track aircraft or vessels engaged in illicit drug trafficking in the region.

File photo of the Curacao/Aruba Cooperative Security Location. (U.S. Air Force photo)

The CSLs are not bases.  They are tenant activities on existing airfields whose purpose is to support CTOC missions (see more on SOUTHCOM’s role in Countering Transnational Criminal Organizations).

U.S. Southern Command oversees the operations from the CSLs.  The Key West, Fla.-based Joint Interagency Task Force South coordinates U.S. aircraft usage and operations.

From these locations, U.S. detection and monitoring aircraft fly missions to detect, monitor and track aircraft or vessels engaged in illicit drug trafficking. The unarmed aircraft offer unique surveillance capabilities that support and compliment the counter-drug efforts of partner nation law enforcement agencies. (Note: Host nation officials are responsible for decisions to interdict suspected traffickers within their borders/airspace, and U.S. law enforcement agencies lead interdiction efforts in international waters.)

U.S. military, Drug Enforcement Agency, U.S. Coast Guard and U.S Customs personnel operate from the CSLs to support the U.S. aircraft and to coordinate communications and information.   More here.

The House Armed Services Committee is chaired by Democrat Adam Smith. Back in May of 2019, Chairman Smith admitted several crisis conditions in Central America, the Southern border and Latin America. This included the flow of migrants and the flaws of the asylum laws. However, Congressman Adam Smith still blames the Trump White House for the cause of the crisis.

There continues to be particular focus and resource attention on Venezuela which does affect other neighboring countries. Southern Command leader Adm. Faller declares that Iran, China and Russia exacerbate the problems not only in Venezuela but also in Central America. This rogue foreign actor declaration was also validated by other national security experts in the hearing, noting Kathryn Wheelbarger, acting assistant defense secretary for international security affairs and Kenneth Rapuano, assistant secretary for homeland defense and global security.