Over 10,000 non-detained Illegal Aliens in America

Hat tip

ERO-LESA Statistical Tracking UnitFor Official Use Only (FOUO)

Pre-decisional 2018-ICFO-32380 Non-Detained Illegal Aliens on the National Docket, as of 06/02/2018

Country of Citizenship Final Order Pending Final Order Total

IRAN 6,331 NORTH KOREA 21 SUDAN 1,860 SYRIA 2,128

Ramin Talaie Pictures | Getty Images

The Immigration Reform Law Institute (IRLI) revealed Friday that it has received documents under the Freedom of Information Act that show that the illegals have either been ordered deported or have pending final orders of removal, but are still in the U.S.”

IRLI reported, “In response to an IRLI Freedom of Information Act request, Immigration and Customs Enforcement (ICE) provided records that showed that as of June 2018, there were over 10,000 non-detained illegal aliens on ICE’s National Docket from Iran, Syria, Sudan, and the Democratic People’s Republic of Korea (North Korea). Iran led the pack with over 6,000 or 61 percent of their citizens with removal orders followed by Syria with 20 percent, Sudan with 18 percent, and North Korea with less than a percent.”

The report quoted ICE Director Thomas Homan expressing his concern, asserting, “My biggest concern isn’t how many terrorists have been arrested entering the country illegally, but how many got through? How many did Border Patrol not catch? That’s what Americans should be thinking about.”

IRLI’s director, Dale L. Wilcox, added:

It’s simply unacceptable that we also have more than 10,000 aliens here from terrorist states that are sworn enemies of America. We saw on 9/11 the damage that only 19 sleeper cell terrorists could cause. This is just the latest example of the disaster of sanctuary laws, which force ICE agents to operate with one hand tied behind their backs while making our communities inherently more dangerous.

PJ Media noted, “State and local law enforcement agencies once coordinated with ICE to remove people on the National Crime Information Center (NCIC) list who were wanted on an administrative warrant for removal from the U.S., but sanctuary laws prevent such coordination. ICE has still removed an average of about 44 known or suspected terrorists per year in fiscal years 2017 and 2018, IRLI reported.”

The Washington Free Beacon reported in April 2018, “Iranian agents tied to the terror group Hezbollah have already been discovered in the United States plotting attacks.” The Beacon quoted various intelligence officials and former White House insiders saying Iran could use Hezbollah agents in America to mount a strike. Michael Pregent, a former intelligence officer, said, “They are as good or better at explosive devices than ISIS, they are better at assassinations and developing assassination cells. They’re better at targeting, better at looking at things … Hezbollah is smart. They’re very good at keeping their communications secure, keeping their operational security secure, and, again, from a high profile attack perspective, they’d be good at improvised explosive devices.”

Emanuele Ottolenghi, a senior fellow at the Foundation for Defense of Democracies, added, “The answer is absolutely. We do face a threat. Their networks are present in the Untied States … It doesn’t take many of them to penetrate this country and be a major threat. They can pose a major threat to our homeland.” He concluded, “Iran’s proxy terror networks in Latin America are run by Tehran’s wholly owned Lebanese franchise Hezbollah. These networks are equal part crime and terror and have the ability to provide funding and logistics to militant fighters. Their presence in Latin America must be viewed as a forward operating base against America’s interest in the region and the homeland itself.”

Anyone Fretting over the Real Russian Hacking from the Mueller Report?

Remember the timeline, it was the Comey FBI, the Brennan CIA, the Lynch Department of Justice and the Obama White House. So, Obama only expelled a pile of Russians and closed 3 dachas. Remember? When the dust settles just a little, President Trump has some work to do to clean up this hacking mess via Russia. Congress has some work to do also by defining some kind of hacking legislation.

The Mueller Report’s conclusions about Russian operations are unambiguous: the GRU’s Unit 26165 did the hacking, and the Internet Research Agency managed the influence campaign. The Report also concluded that the GRU’s Unit 74455 retailed the results of the doxing through its subsidiaries DCLeaks and Guccifer 2.0, and through a sympathetic WikiLeaks.

What is Unit 26165, Russia's elite military hacking centre?

Boris Zilberman on Twitter: "DOJ indictment against the ...

At one point, the Russians used servers located in the U.S. to carry out the massive data exfiltration effort, the report confirms.

Much of the information was previously learned from the indictment of Viktor Borisovich Netyksho, the Russian officer in charge of Unit 26165. Netyksho is believed to be still at large in Russia.

The operatives working for the Russian intelligence directorate, the GRU, sent dozens of targeted spearphishing emails in just five days to the work and personal accounts of Clinton Campaign employees and volunteers, as a way to break into the campaign’s computer systems.

The GRU hackers also gained access to the email account of John Podesta, Clinton’s campaign chairman, of which its contents were later published.

Using credentials they stole along the way, the hackers broke into the networks of the Democratic Congressional Campaign Committee days later. By stealing the login details of a system administrator who had “unrestricted access” to the network, the hackers broke into 29 computers in the ensuing weeks, and more than 30 computers on the DNC.

The operatives, known collectively as “Fancy Bear,” comprised several units tasked with specific operations. Mueller formally blamed Unit 26165, a division of the GRU specializing in targeting government and political organizations, for taking on the “primary responsibility for hacking the DCCC and DNC, as well as email accounts of individuals affiliated with the Clinton Campaign,” said the Mueller report.

The hackers used Mimikatz, a hacking tool used once an intruder is already in a target network, to collect credentials, and two other kinds of malware: X-Agent for taking screenshots and logging keystrokes, and X-Tunnel used to exfiltrate massive amounts of data from the network to servers controlled by the GRU. Mueller’s report found that Unit 26165 used several “middle servers” to act as a buffer between the hacked networks and the GRU’s main operations. Those servers, Mueller said, were hosted in Arizona — likely as a way to obfuscate where the attackers were located but also to avoid suspicion or detection.

In all, some 70 gigabytes of data were exfiltrated from Clinton’s campaign servers and some 300 gigabytes of data were obtained from the DNC’s network.

Meanwhile, another GRU hacking unit, Unit 74455, which helped disseminate and publish hacked and stolen documents, pushed the stolen data out through two fictitious personas. DCLeaks was a website that hosted the hacked material, while Guccifer 2.0 was a hacker-like figure who had a social presence and would engage with reporters.

Under pressure from the U.S. government, the two GRU-backed personas were shut down by the social media companies. Later, tens of thousands of hacked files were funneled to and distributed by WikiLeaks .

Mueller’s report also found a cause-and-effect between Trump’s remarks in July 2016 and subsequent cyberattacks.

“I hope you’re able to find the 30,000 emails that are missing,” said then-candidate Trump at a press conference, referring to emails Clinton stored on a personal email server while she headed the State Department. Mueller’s report said “within approximately five hours” of those remarks, GRU officers began targeting for the first time Clinton’s personal office.

More than a dozen staffers were targeted by Unit 26165, including a senior aide. “It is unclear how the GRU was able to identify these email accounts, which were not public,” said Mueller.

Mueller said the Trump campaign made efforts to “find the deleted Clinton emails.” Trump is said to have privately asked would-be national security advisor Michael Flynn, since convicted following inquiries by the Special Counsel’s office, to reach out to associates to obtain the emails. One of those associates was Peter Smith, who died by suicide in May 2017, who claimed to be in contact with Russian hackers — claims which Mueller said were not true.

Does that implicate the Trump campaign in an illegal act? Likely not.

“Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy,” according to Elie Honig, a CNN legal analyst. “The special counsel’s report did not find that any person associated with the Trump campaign illegally participated in the dissemination of the materials.”

Hackers Breach FBI Websites

Hacked material included names, addresses, job descriptions, email addresses of at least 3 FBI owned websites. Apparently the hackers have been working this mission since 2014.

FBI data leakedSee complete details here.

A hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal information of thousands of federal agents and law enforcement officers, TechCrunch has learned.

The hackers breached three sites associated with the FBI National Academy Association, a coalition of different chapters across the U.S. promoting federal and law enforcement leadership and training located at the FBI training academy in Quantico, VA. The hackers exploited flaws on at least three of the organization’s chapter websites — which we’re not naming — and downloaded the contents of each web server.

The hackers then put the data up for download on their own website, which we’re also not naming nor linking to given the sensitivity of the data.

The spreadsheets contained about 4,000 unique records after duplicates were removed, including member names, a mix of personal and government email addresses, job titles, phone numbers and their postal addresses. The FBINAA could not be reached for comment outside of business hours. If we hear back, we’ll update.

TechCrunch spoke to one of the hackers, who didn’t identify his or her name, through an encrypted chat late Friday.

“We hacked more than 1,000 sites,” said the hacker. “Now we are structuring all the data, and soon they will be sold. I think something else will publish from the list of hacked government sites.” We asked if the hacker was worried that the files they put up for download would put federal agents and law enforcement at risk. “Probably, yes,” the hacker said.

The hacker claimed to have “over a million data” [sic] on employees across several U.S. federal agencies and public service organizations.

It’s not uncommon for data to be stolen and sold in hacker forums and in marketplaces on the dark web, but the hackers said they would offer the data for free to show that they had something “interesting.”

Unprompted, the hacker sent a link to another FBINAA chapter website they claimed to have hacked. When we opened the page in a Tor browser session, the website had been defaced — prominently displaying a screenshot of the encrypted chat moments earlier.

The hacker — one of more than ten, they said — used public exploits, indicating that many of the websites they hit weren’t up-to-date and had outdated plugins.

In the encrypted chat, the hacker also provided evidence of other breached websites, including a subdomain belonging to manufacturing giant Foxconn. One of the links provided did not need a username or a password but revealed the back-end to a Lotus-based webmail system containing thousands of employee records, including email addresses and phone numbers.

Their end goal: “Experience and money,” the hacker said.

Former Head of Venezuela’s Military Intelligence Arrested in Spain

Spain seems to always be a ‘go-to’ destination for criminals. Anyone remember the Clinton’s ol buddy Marc Rich, he fled to Marbella, Spain. International gangsters love Spain too, including Russian mafia. As a sidebar, ever really wonder about that unique friendship of the Obama’s with King Juan Carlos Varela or the many Obama vacations there including just last year? Anyway….conflating perhaps…

***

The US Justice Department, which originally unsealed the charges in 2014, has requested Hugo Carvajal’s extradition.

Noticiero Digital

Mr Carvajal was a close ally of the country’s late socialist leader Hugo Chavez, but in February denounced his successor President Nicolás Maduro.

Known as El Pollo (The Chicken), Mr Carvajal was a leading figure in Venezuelan politics for decades.

He has been under US sanctions since 2008, over allegations he helped Colombia’s Farc rebel group and protected US-bound drug shipments.

Federal charges, which accuse him of co-ordinating a 5,600kg (12,345lb) shipment of cocaine from Venezuela to Mexico in 2006, became public in 2014.

That year he was arrested on the charges on the Dutch Caribbean island of Aruba, where he was serving as a consul, but he was freed after the extradition request was denied.

Mr Carvajal returned to Venezuela to a hero’s welcome, but publicly broke with the country’s leadership earlier this year.

In a video posted on social media in February, he publicly threw his support behind Mr Guaido and urged other military figures to do the same.

An unnamed US administration official has told Reuters news agency that it is hoped Mr Carvajal could co-operate and offer valuable information on the Venezuelan leader.

It is reported that the former spy chief will appear before Spain’s High Court on Saturday, where the extradition request will be reviewed. More here.

Gentiuno » Gente del Siglo XXI » Carlos Alberto Montaner ...

Washington accused Carvajal of assisting the paramilitary group known as the Revolutionary Armed Forces of Colombia (FARC) transport drugs from Latin America to Mexico and from there to the US. Washington also charged Carvajal with supplying FARC drug traffickers with Venezuelan passports bearing fake names, which they used to travel internationally to avoid detection. In 2014, Carvajal was arrested by authorities in Aruba, a Dutch overseas territory in Latin America, where he was serving as Venezuela’s consul general. But, to Washington’s dismay, he was released after the Dutch government ruled that his diplomatic immunity gave him immunity from prosecution.

But the Reuters news agency cited an unnamed US government official who said that Carvajal was in possession of a “treasure trove” of intelligence about Maduro’s administration. The US official hinted that Carvajal may have willingly given himself up to Spanish police to express his desire to cooperate with the US. He is scheduled to appear before Spain’s High Court on Saturday. The court has 24 hours following Carvajal’s arrest to rule whether he will be extradited or freed from detention.

 

Is China an Adversary of the United States?

Yes, and frankly, we should completely reconsider an trade agreements in total with China. The whole launch of a harmonious relationship between the United States and China established by President Nixon in 1972 is not today’s condition. China is hostile to not only the United States but to any country frankly for the sake of money, China needs it by any and all means possible.

Exclusive: Secret NSA Map Shows China Cyber Attacks on U.S ...

China is using ‘debt traps’ effectively to financially punk foreign governments to gain power, influence and assets.

  • China is working to influence media outlets beyond its borders in an effort to impose its ideology and deter criticism of its actions, a press freedom group said.

    In a report released Monday, Reporters Without Borders detailed what it said was China’s impact on a global decline in press freedom and analyzed President Xi Jinping’s strategy to control information outside his own country. The group found that Beijing was using advertising buys, paid-trips for journalists and an expanding global propaganda network to impose its “ideologically correct” terminology and to obscure darker chapters of the country’s history.

  • Huawei has been a theft and spy operation for decades. A major concern and consequence is a renewed U.S. campaign to pressure and persuade America’s allies to keep Huawei technology and equipment out of the next generation of wireless networks, known as 5G. The stakes in this campaign are much bigger than U.S. market share or the effectiveness of Iran sanctions. If Huawei’s chips and routers find their way into this new network, everything from digital privacy to intellectual property could be at risk.
  • Chinese employees stole corporate secrets from Dutch semiconductor equipment maker ASML, resulting in hundreds of millions of dollars in losses, Dutch financial newspaper Financieele Dagblad (FD) reported on Thursday.

    The paper said, citing its own investigation, technology had been stolen by high-level Chinese employees in the research and development department of ASML’s U.S. subsidiary and ultimately leaked to a company linked to the Chinese government.

  • That Chinese worker employed by that farm in Iowa is likely a spy, performing agricultural/intellectual property theft.
  • China has and continues to infect the American education system. It is called the Confucius Institute. It ranges from Kindergarten to graduate school. China has already spent $200 million USD on this effort. So, the Senate held a hearing. Legislation? Still waiting.
  • U.S. government contractors hired by China to be a hacker/ perform espionage or to steal technology. Examples are here, here and here.

Just this past December, the Assistant Director of the FBI for the Counterintelligence Division gave an extended statement and testimony before the Senate Judiciary Committee that spoke to the non-traditional espionage methods employed by China against the United States. Simply put, he described it as a Cold War and honestly it is.

In part:

The Chinese government is attempting to acquire or steal, not only the plans and intentions of the United States government, but also the ideas and innovations of the very people that make our economy so incredibly successful. The Chinese government understands a core lesson of the Cold War between the United States and the Soviet Union: economic strength is the foundation of national power. The competition between the United States and China will be greatly influenced, if not ultimately decided, on the strength of our economies.

The Chinese government means to compete with us in every way possible, playing by the rules at times, bending them at others, and breaking them when necessary to ensure their success. They also aim to rewrite the rules to shape the world in their image, and they have already made progress on this front. The rules they write seek to guarantee the dominance of their businesses and root Chinese national power in the very fabric of an international system.

From my vantage point, it appears we are at the early stages of a hyper-competitive world. This is not simply a competition between businesses and industries but also between governments and the ways in which they govern their societies. Make no mistake: the Chinese government is proposing itself as an alternative model for the world, one without a democratic system of government, and it is seeking to undermine the free and open rules-based order we helped establish following World War II. Our businesses and our government must adapt in order to compete and thrive in this world.

Perhaps AOC, Omar, Nadler, Pelosi, Tlaib and Schiff should be concentrating on the real work to protect American….eh? Better still, perhaps CNN should report on the real stuff….uh huh