Green Light Law v. Trump Administration

Hat tip to DHS….

The New York Department of Motor Vehicles has a rather new law called the Green Light Law where illegals can obtain state issued identification licenses and or driver’s licenses. New York is one of 13 states with such a law with slight iteration differences. It is unclear what undocumented applicants must provide to the clerk as evidence and what safeguards are in place to prevent fraud and higher risks to public safety. Law enforcement across the country use DMV databases hundreds of thousands of times a day for normal traffic stops, identification verification, outstanding warrants and in many cases criminal records across state lines.

New York is the top city as a foreign entry point and there are no real stipulations as to entry or exit factors in the law. Further, the State of New York has terminated DMV database access to Customs and Border Patrol. Remember the 9/11 commission put forth countless recommendations that all lawmakers and all state governors signed onto which mandated information sharing. Governor Cuomo appears to forget that.

Image result for global traveler program

Due to lack of DMV access for all matter regarding travel and public safety, DHS has terminated New York from the ‘Trusted Traveler Program’ and this is yet causing more outrage in the Governor’s office.

DHS: In response to New York State implementing the Driver’s License Access and Privacy Act (Green Light Law), Acting Secretary Chad F. Wolf announced New York residents will no longer be eligible to apply for or renew their enrollment in certain Trusted Traveler Programs like Global Entry. The law prohibits the Department of Motor Vehicles (DMV) from sharing information with U.S. Department of Homeland Security (DHS), preventing DHS from fully vetting New York residents. The Acting Secretary informed State officials by letter of the change. The letter may be read here.

“New York’s ‘Green Light Law’ is ill-conceived and the Department is forced to take this action to ensure the integrity of our Trusted Traveler Programs. It’s very clear: this irresponsible action has consequences,” said Acting Secretary Chad Wolf. “An aspect of the law which I’m most concerned about is that it prohibits the DMV from providing ICE and CBP with important data used in law enforcement, trade, travel, and homeland security. ICE uses the information as they investigate and build cases against terrorists, and criminals who commit child sexual exploitation, human trafficking, and financial crimes. Unfortunately, because of this law, they can no longer do that”

Wolf continued: “CBP also uses that data for national security purposes and to ensure safe and lawful trade and travel. Specifically, CBP is able to offer Trusted Traveler Programs like Global Entry because we are able to use DMV data to make an evidence-based assessment that those individuals who seek this benefit are low risk and meet the eligibility requirements. Without the DMV information we aren’t able to make that assessment. DHS notified New York DMV that New York residents can no longer enroll or re-enroll in these trusted traveler programs because we no longer have access to data to ensure that New York Residents meet those programs requirements. We must do our job.”

Customs and Border Protection (CBP) runs Trusted Traveler Programs like Global Entry, FAST, SENTRI and NEXUS which rely on access to DMV data to determine whether the person is who they say they are and if they have a criminal record. When that data is denied, the security is compromised. CBP expects the move to affect up to 150,000-200,000 New York residents who seek to renew membership in a CBP Trusted Traveler Programs this fiscal year. There are almost 30,000 commercial truck drivers enrolled in the FAST program at four New York-Canada ports of entry.

Additionally, because the law hinders DHS from validating documents used to establish vehicle ownership, the exporting of used vehicles titled and registered in New York State will be significantly delayed and could also be costlier.

AG Barr/Director Wray Warning on China Threat

Question is, who is listening? Corporation America, small business, academia, individuals? 5G needs national attention readers, what do you know? Learn it fast, it is here.

AG Barr Hints at His Dangerous Position Overseeing Deep ...

Attorney General Barr recalled, a fellow student once told him Russia wanted to conquer the world and the United States could deal with that. But China, the student said at the time, wanted to own the world and that was a bit more difficult.

“There was a certain truth in that,” Barr told the audience Thursday.

Barr made his remarks at the Center for Strategic and International Studies in Washington, reminding his audience that the Communist Party remains in control of the Chinese economy and is “authoritarian through and through.”“Their goal is the eventual demise of capitalism,” the attorney general said.

The United States has long accused China of intellectual property theft on a grand scale. “It has been estimated that the annual cost to the U.S. economy could be $600 billion,” Barr said.

U.S. officials are also worried that China is threatening to become the dominant world force in the race to transition to 5G.

Aside from serving as the attorney general once before, Barr also spent several years in the telecom industry and used that experience to sound another dire warning.

The attorney general called the impending jump to 5G “a quantum leap” which will have major economic implications. The Chinese telecom giant Huawei “is the leading supplier of 5G on every continent except North America,” Barr said, adding that the U.S. market needed to “pick a horse” to back in the race for domestic 5G influence.

“The Chinese are using every lever of power to expand their 5G market share around the globe,” he said.

U.S. officials say Chinese leaders are working toward being the geopolitical, economic and military world leader by the year 2049, the 100th anniversary of the Peoples Republic of China.

“China wants the fruits of America’s brainpower to harvest the seeds of its planned economic dominance,” said John Demers, the assistant attorney general for the National Security Division.

***  Christopher Wray vows independence: No 'pulling punches ...

FBI Director Wray described the threat from China as “diverse” and “multi-layered.” He noted that the Chinese government exploits the openness of the American economy and society.

“They’ve pioneered an expansive approach to stealing innovation through a wide range of actors,” Wray said during opening remarks at the half-day Department of Justice China Initiative Conference in Washington, D.C.

Wray told the audience that China is targeting everything from agricultural techniques to medical devices in its efforts to get ahead economically. While this is sometimes done legally, such as through company acquisitions, China often takes illegal approaches, including cyber intrusions and corporate espionage.

“They’ve shown that they’re willing to steal their way up the economic ladder at our expense,” he said.

The FBI is using traditional law enforcement techniques as well as its intelligence capabilities to combat these threats. He said the FBI currently has about 1,000 investigations into Chinese technology theft.

“They’ve shown that they’re willing to steal their way up the economic ladder at our expense.”

Just last month, a Harvard University professor was charged with lying about his contractual arrangement with China.

Wray also called for a whole-of-society response to these threats. He urged U.S. companies to carefully consider their supply lines and whether and how they do business with Chinese companies. While a partnership with a Chinese company may seem profitable today, a U.S. company may find themselves losing their intellectual property in the long run.

Additionally, U.S. universities should work to protect their foreign students from coercion from foreign governments, Wray said. When China violates our criminal laws and well-established international norms, we are not going to tolerate it, much less enable it,” he said. “The Department of Justice and the FBI are going to hold people accountable for that and protect our nation’s innovation and ideas.”

 

Brace for More Political Plotting Impact

The question now is will Speaker Pelosi approve yet another impeachment inquiry operation against President Trump now that the president has been acquitted in the Senate trial on both articles of impeachment.

Listening to Congressmen Schiff and Nadler, they tell us that investigations will continue placing emphasis on future testimonies of former White House Counsel Don McGhan, former White House National Security Council advisor John Bolton and the court decision on the matter of full release of Trump’s tax returns. Further, BuzzFeed, CNN and the House have issued subpoenas for documents held sequestered by the Mueller investigation team.

In short, there is more going on with regard to the resistance movement against President Trump.

Are there counter-measures to possibly stop this constant political adventure? The short answer is yes.

There are many ramps that can be taken if not all. Senator Lindsey Graham pledged continued investigation into all things Biden. Trump’s personal attorney, Rudy Giuliani is at work on all things Biden, Ukraine and operatives in Washington DC. There are also a few key Senators, namely Grassley and Johnson that are requesting documents from the National Archives, travel documents, electronic communications and other evidence as they relate to the meeting(s) in the Obama White House that hatched the operation on protecting several within his administration relating to Ukraine, Biden and other DNC personnel and diplomats.

Rand Paul Puts Up Billboard On Floor Of Senate With Eric ...

Indeed there are other real key items underway including Senator Rand Paul pursuing Eric Ciaramella. It appears he is not going to let up and rightly so.

There is the case involving former FBI officials, Andrew McCabe, Peter Strzok and Lisa Page. Then we cannot overlook the most awaited case that U.S. Attorney John Durham has in his sphere, investigating all things related to Crossfire Hurricane, the dossier, the DNC, Hillary Clinton, Perkin Coie, Marc Elias and foreign interference.

We may soon know more as to the roles Victoria Nuland, John Kerry, Susan Rice, Ben Rhodes, James Comey, Loretta Lynch had during this almost forgotten nightmare.

Prosecutor Who Unraveled Corruption in Boston Turns to C.I ... source

Without any real media notice due to impeachment operations is that John Durham brought on a new well respected criminal attorney, Sarah Karwan. Her specialty is financial fraud, money laundering, public corruption and national security/cyber crime. The status is unclear at this point in the investigation relating to Kevin Clinesmith, the former FBI lawyer that altered a document used in the FISA warrant applications on Carter Page. A great deal of evidence was brought forth in the Horowitz Inspector General report and it is noted that IG Horowitz is collaborating with the Durham team and the Senate team led by Lindsey Graham. We cannot forget several others under scrutiny including Stephan Halper, John Brennan and James Clapper. Where is Joseph Mifsud? Only John Durham knows as there is testimony from Mifsud or about him acquired by Durham during Durham’s travels to Italy.

Who really needs to brace for impact? Nancy, Adam, Gerry, Barack, Joe……

al Qaeda Leader to be Extradited From Arizona to Iraq

He ran an Arizona driving school and was described by friends and acquaintances in Phoenix as an outgoing, friendly member of the city’s Iraqi community and had been in the U.S. for more than a decade and had recently married and had a child. He arrived in the U.S. in January 2008 as a refugee from Iraq.

Ahmed and other members of al Qaeda shot and killed a lieutenant and an officer with the Fallujah Police Directorate in 2006, according to the Department of Justice. A warrant was issued for his arrest on Wednesday.

Jabir Algarawi, a board member of the Phoenix refugee assistance organization Refugees and Immigrants Community for Empowerment, said he met Ahmed in 2010 and knew him well.

Al-Qaeda Leader Wanted by Iraq for Murder Arrested in Arizona - C-VINE Network Ali Ahmed's arrest as suspected al-Qaida terrorist stuns Phoenix friends

PHOENIX – On January 31, 2020, a Phoenix-area resident, who is alleged to have been the leader of a group of Al-Qaeda terrorists in Al-Fallujah, Iraq, appeared today before a federal magistrate judge in Phoenix, Arizona in connection with proceedings to extradite him to the Republic of Iraq. He is wanted to stand trial in Iraq for two charges of premeditated murder committed in 2006 in Al-Fallujah.

The arrest was announced by Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney Michael Bailey for the District of Arizona.

An Iraqi judge issued a warrant for the arrest of Ali Yousif Ahmed Al-Nouri, 42, on murder charges. The Government of Iraq subsequently requested Ahmed’s extradition from the United States. In accordance with its treaty obligations to Iraq, the United States filed a complaint in Phoenix seeking a warrant for Ahmed’s arrest based on the extradition request. U.S. Magistrate Judge John Z. Boyle issued the warrant on January 29, 2020, and Ahmed was arrested the following day.

According to the information provided by the Government of Iraq in support of its extradition request, Ahmed served as the leader of a group of Al-Qaeda terrorists in Al-Fallujah, Iraq, which planned operations targeting Iraqi police. Ahmed and other members of the Al-Qaeda group allegedly shot and killed a first lieutenant in the Fallujah Police Directorate and a police officer in the Fallujah Police Directorate, on or about June 1, 2006, and October 3, 2006, respectively.

The details contained in the complaint are allegations and have not yet been proven in court. If Ahmed’s extradition is certified by the court, the decision of whether to surrender him to Iraq will be made by the U.S. Secretary of State.

Ahmed’s arrest was executed by the FBI Phoenix Field Office, HSI Phoenix Field Office and the U.S. Marshals Service. The extradition case will be handled by the U.S. Attorney’s Office for the District of Arizona and the Criminal Division’s Office of International Affairs.

The Hack of the UN was a Secret

A secret espionage hack actually. 40 servers; 400GB of data; administrator accounts; out of date cyber protections systems

Building A and Flags, The United Nations Office at Geneva ...  UN/Geneva

Leaked report shows United Nations suffered hack UN/Vienna

GENEVA (AP) — Sophisticated hackers infiltrated U.N. networks in Geneva and Vienna last year in an apparent espionage operation that top officials at the world body kept largely quiet. The hackers’ identity and the extent of the data they obtained are not known.

An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says dozens of servers were compromised including at the U.N. human rights office, which collects sensitive data and has often been a lightning rod of criticism from autocratic governments for exposing rights abuses.

Everything indicates knowledge of the breach was closely held, a strategy that information security experts consider misguided because it only multiplies the risks of further data hemorrhaging.

“Staff at large, including me, were not informed,” said Geneva-based Ian Richards, president of the Staff Council at the United Nations. “All we received was an email (on Sept. 26) informing us about infrastructure maintenance work.” The council advocates for the welfare of employees of the world body.

Asked about the intrusion, one U.N. official told the AP it appeared “sophisticated” with the extent of damage unclear, especially in terms of personal, secret or compromising information that may have been stolen. The official, who spoke only on condition of anonymity to speak freely about the episode, said systems have since been reinforced.

Given the high skill level, it is possible a state-backed actor was behind it, the official said. “It’s as if someone were walking in the sand, and swept up their tracks with a broom afterward,” the official added. “There’s not even a trace of a clean-up.”

The leaked Sept. 20 report says logs that would have betrayed the hackers’ activities inside the U.N. networks — what was accessed and what may have been siphoned out — were “cleared.” It also shows that among accounts known to have been accessed were those of domain administrators — who by default have master access to all user accounts in their purview.

“Sadly … still counting our casualties,” the report says.

Jake Williams, CEO of the cybersecurity firm Rendition Infosec and a former U.S. government hacker, said the fact that the hackers cleared the network logs indicates they were not top flight. The most skilled hackers — including U.S., Russian and Chinese agents — can cover their tracks by editing those logs instead of clearing them.

“The intrusion definitely looks like espionage,” said Williams, noting that the active directory component — where all users’ permissions are managed — from three different domains were compromised: those of United Nations offices in Geneva and Vienna and of the Office of the High Commissioner for Human Rights.

“This, coupled with the relatively small number of infected machines, is highly suggestive of espionage,” he said after viewing the report. “The attackers have a goal in mind and are deploying malware to machines that they believe serve some purpose for them.”

The U.N. is known to have been trying to patch its myriad IT systems for years, and Williams said any number of intelligence agencies from around the globe are likely interested in infiltrating it.

The hack was not severe at the U.N. human rights office, said its spokesman, Rupert Colville. “We face daily attempts to get into our computer systems,” he said. “This time, they managed, but it did not get very far. Nothing confidential was compromised.”

Clearly concerned that word of the hack could have a chilling effect on people reporting human rights violations to it, the office said in a statement issued later that it wanted to “assure all concerned parties” no sensitive information was compromised.

U.N. spokesman Stephane Dujarric said earlier Wednesday that attack was “serious,” compromised “core infrastructure components” and was contained. T he earliest activity appeared to have come in July and was detected in August, he said in response to emailed questions. He said the world body does not have enough information to determine the author but added that “the methods and tools used in the attack indicate a high level of resource, capability and determination.”

Dujarric noted that the U.N. “detects and responds to multiple attacks of various level of sophistication on a daily basis.”

Peter Micek, general counsel of the digital civil liberties nonprofit AccessNow, said U.N. leadership made a “terrible decision” from an information-security standpoint by denying staff information about the breach.

“It’s best practice to alert people, let them know what they should look out for (including phishing attacks and social engineering) and inform them of what steps are being taken on their behalf,” he said.

Otherwise, you are compounding the threat, and a missed opportunity for a teaching moment becomes an example of “intransigence and obfuscation, which is unfortunate,” said Micek, who works with U.N. human rights workers to shore up their cyber-defenses.

The internal document from the U.N. Office of Information and Technology said 42 servers were “compromised” and another 25 were deemed “suspicious,” nearly all at the sprawling Geneva and Vienna offices. Three of the “compromised” servers belonged to Human Rights agency, which is located across town from the main U.N. office in Geneva, and two were used by the U.N. Economic Commission for Europe.

The report says a flaw in Microsoft’s SharePoint software was exploited by the hackers to infiltrate the networks but that the type of malware used was not known, nor had technicians identified the command and control servers on the internet used to exfiltrate information. Nor was it known what mechanism was used by the hackers to maintain their presence on the infiltrated networks.

Security researcher Matt Suiche, the Dubai-based founder of the cybersecurity firm Comae Technologies, reviewed the report and said it appeared entry was gained through an anti-corruption tracker at the U.N. Office of Drugs and Crime.

The report mentions a range of IP addresses in Romania that may have been used to stage the infiltration, and Williams said one is reported to have some neighbors with a history of hosting malware.

Technicians at the United Nations office in Geneva, the world body’s European hub, on at least two occasions worked through weekends in recent months to isolate the local U.N. data center from the i nternet, re-write passwords and ensure the systems were clean. Twenty machines had to be rebuilt, the report says.

The hack comes amid rising concerns about cyber espionage.

Last week, U.N. human rights experts asked the U.S. government to investigate a suspected Saudi hack that may have siphoned data from the personal smartphone of Jeff Bezos, the Amazon founder and owner of The Washington Post, in 2018. On Tuesday, the online civil rights sleuths at Citizen Lab published a report on the attempted hack of the T he New York Times’s bureau chief in Beirut, Ben Hubbard, about the same time by a Saudi-linked group.

The U.N. human rights office is particularly sensitive, and could be a tempting target. High Commissioner for Human Rights Michelle Bachelet and her predecessors have denounced alleged war crimes, crimes against humanity and in places as d iverse as Syria, Venezuela, Myanmar and Saudi Arabia.

Richards, of the U.N. Staff Council, complained of uncertainty over the safety of U.N. networks. “There’s a lot of our data that could have been hacked, and we don’t know what that data could be,” he said.

“How much should U.N. staff trust the information infrastructure the U.N. is providing them?” Richards asked. “Or should they start putting their information elsewhere?”