From the APP Store, Notifica ICE Raids

Ah yes those pesky apps found on iTunes and Google Play, funded by George Soros. This app helps illegal immigrants avoid federal immigration authorities. The group behind this scheme is United We Dream and guess what? That organization receives taxpayer funding. Uh huh…

Notifica is a project of United We Dream

***

In Case of an ICE Raid, Undocumented Immigrants Can Use ...

Notifica, is a new app that will act as a panic button for undocumented immigrants who are detained by Immigration and Customs Enforcement (ICE), Wired reports.

To help immigrants who have been detained, the organization United We Dream, which is led by young immigrants, and digital agency Huge developed the Notifica app. When immigrants are detained by ICE their families and loved ones might not even know what happened, but Notifica aims to change that.

“You have the right to be prepared,” says the app’s site. “Be prepared with Notifica, an app that sends out secure messages to your support network when you need it most.”

How The Notifica App Works

With Notifica, users can select contacts they want to notify in case they are taken by ICE. The app allows users to set up a personalized notification to each recipient, for example, a message to your mom or sibling would be different than the one you send to your attorney. After you write the preloaded messages, others will not have access to them and will not be able to read them. There is also a pin that seals off the messages in case your device is lost or stolen.

If the user is taken by ICE, a single click will send all messages via text in less than two seconds. Huge has also launched a phone hotline for those who don’t have a phone in reach but may be able to make a call afterwards. More here.

***

A division of the Justice Department awarded at least $206,453 to the National Immigration Law Center, which advises illegal immigrants on their rights, according to records obtained by Judicial Watch.

The Office of Justice Programs awarded the grants between fiscal years 2008 and 2010, the records cited by the conservative government watchdog group show. That would overlap the administrations of both Presidents George W. Bush and Barack Obama.

One of the projects of the National Immigration Law Center is United We Dream, which describes itself as a youth program for “undocumented” immigrants.

The Laredo Morning Times quoted Adrian Reyna, director of membership and technology strategies for United We Dream, as saying that “when something actually happens, most people don’t know what to do at that moment.”

The Texas newspaper also reported that United We Dream is working on a second version of Notifica that will include the ability to use more languages besides Spanish and English.

The second version, set to be released this summer, would include Vietnamese, Korean, and Chinese. The updated app also will be able to determine where an illegal immigrant is being detained, the newspaper reported.

United We Dream pushes to give legal status to so-called Dreamers, illegal immigrants brought to the United States when they were children. The organization, which has a hotline, advises illegal immigrants against cooperating with agents from U.S. Immigration and Customs Enforcement.

In a press release, the group says: “United We Dream calls on our communities to defend their rights, not open the door to ICE, and to report ICE activities to the United We Dream MigraWatch hotline.”

The April release adds: “United We Dream has also developed the mobile app, Notifica, which immediately alerts your loved ones and legal advocates to the user’s location in cases of detention. Text ‘Notifica’ to 877-877 for a link for download.”

The Soros-backed Open Societies Foundations don’t have a direct role in the app, but doesn’t find it objectionable, said Angela Kelley, the senior strategic adviser on immigration at the Open Society Foundations.

Approval Process for Cyberwarfare Challenged

Cyber is a real battlefield and yet it gets almost zero ink in the media. The reason is due in part to exposing vulnerabilities, forced ransoms and stolen data.

NotPetya could be the beginnings of a new kind of ... photo

Just a couple of years ago: Chet Nagle, a former CIA agent and current vice president of M-CAM, penned an article in the Daily Caller, stating, “At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53% increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95% of those cases involved individuals associated with the Chinese government.”

The threats all appear to have a foreign genesis and the United States does not have a real cyber policy due in part to debates over whether cyber attacks are acts of war. Can the United States fight back with her own cyber weapons? Not really, kinda, maybe.

Tracking the theft is left to the FBI, while responding is left to the U.S. Cyber Command. Army Lt. Gen. Paul Nakasone is the head of Cyber Command facing strategic threats from Russia, China, North Korea and Iran. During his confirmation hearings, Nakasone was grilled on how he would position the agencies to confront mounting Russian aggression in cyberspace, whether through attempted interference in U.S. elections or targeting the electric grid and other critical industrial systems.

Members of the White House’s National Security Council are pushing to rescind Presidential Policy Directive 20, an important policy memorandum that currently guides the approval process for government-backed cyberattacks, three current U.S. officials familiar with the matter tell CyberScoop.

The effort is driven in part by a desire from some NSC staff to create a more streamlined channel for military leaders to get their offensive cyber operations greenlit, insiders familiar with the matter said. The sources spoke under the condition of anonymity to freely discuss sensitive national security matters.

The move comes as lawmakers openly question whether U.S. Cyber Command, the nation’s premier cyber warfare unit, is hamstrung from responding to Russian meddling due to bureaucratic red tape. CyberScoop previously reported that multiple congressional committees are considering policies that could empower the military’s cyber mission.

But the push for change faces resistance from the intelligence community and several other federal agencies involved in cybersecurity.

Senior U.S. intelligence officials have expressed concerns over what rescinding the directive will mean for their own active computer spying missions. These covert operations, which are typically pursued by intelligence agencies like the CIA or NSA, could be exposed by the launch of “louder” disruptive-style attacks from the military. The presence of multiple hacking teams simultaneously targeting a single network often makes it easier for them all to be discovered by the victim.

Prior reporting by CyberScoop has shown that a long-running turf war exists between different federal agencies regarding the proper use of hacking tools in order to protect the homeland.

Even before Trump came to office though, the framework in question was considered a source of frustration inside the Pentagon.

Signed by President Barack Obama in 2012, the directive’s critics say that it was written in a confusing manner that leaves open-ended questions. In addition, critics tell CyberScoop that too many federal agencies are allowed to weigh in on proposed cyber operations, causing “even reasonable” plans to be delayed or outright rejected.

Insiders who are resistant to eliminating the directive admit that PPD-20 is flawed, but fear change because they’ve not seen a replacement plan.

“Better the devil you know, or something like that,” a former U.S. official said. “This is such a crucial decision because whatever comes next will dictate how arguments are settled inside government … you have the military on one side and the IC on the other.”

The NSC, CIA and Office of the Director of National Intelligence declined to comment. The NSA referred CyberScoop to U.S. Cyber Command, who in turn did not respond to a request for comment.

Currently, PPD-20 requires U.S. government agencies to run approvals for offensive operations through a chain of command that stretches across the federal government. The process is largely focused on controlling those operations that go beyond the confines of everyday digital espionage, or computer exploitation, to simply collect information.

According to PPD-20, if an operation is considered “of significant consequence,” it requires the direct blessing of the president in addition to the interagency group. Hacking operations that, for example, shut down a power grid or cause equipment to explode would fit into such a description. But experts say it also includes less flashy tactics like deleting data or corrupting software in a destructive manner.

“This directive pertains to cyber operations, including those that support or enable kinetic, information, or other types of operations,” PPD-20 reads. “The United States has an abiding interest in developing and maintaining use of cyberspace as an integral part of U.S. national capabilities to collect intelligence and to deter, deny, or defeat any adversary.”

After coming under scrutiny last month, outgoing NSA Director Adm. Michael Rogers told lawmakers that there’s an “ongoing policy discussion” about redrawing the regulations looming over military cyber operations. Unlike conventional military activities, the internet makes it difficult for policymakers to draw clear cut boundaries. This challenges also runs up against longstanding laws that underpin, and therefore divide, the work of soldiers and spies.

Historically, intelligence agencies — empowered by Title 50 of the U.S. Code — have led the way on U.S.-backed hacking that occur in countries like Iran or China; where armed conflict is absent. Military operations fall under the purview of Title 10 of the U.S. Code.

It’s not clear whether giving military leaders more leeway to conduct hacking operations will ultimately make those units more effective at their missions. The details surrounding these activities are always classified, which inhibits the public from having a substantive policy debate.

Ultimately, the decision to eliminate PPD-20 falls solely to the executive branch. Sources tell CyberScoop no final decision has been made.

What makes PPD-20 difficult to analyze is the fact that it remains a classified document, despite it being leaked by NSA whistleblower Edward Snowden. The classification means current officials are barred from publicly commenting on it.

Thomas Rid, a professor of strategic studies at Johns Hopkins University, said that Snowden’s PPD-20 leak was notable because it revealed the U.S. government’s thought process behind “the rise of unwanted norms caused by escalatory cyberattacks.”

“Reading between the lines, the framework acknowledges the negative effect on global cyber norms that events like Stuxnet can cause because of escalation,” said Rid.

Rid also believes the directive was “naïvely constructed,” relying too much on the idea that cyberattacks only impact other machines, and not people.

“When you look at what’s happened in 2016, and really since then, it makes the people who wrote PPD-20 seem like they don’t understand the current threat environment where Russia, and to some degree Iran, are combining active measures with cyber to change public perception,” he told CyberScoop. “Russia is basically kicking the U.S.’ ass.”

Meet Kevin Thurm and Here Comes the Clinton Foundation, Again

The last we heard from Hillary, she was whining that no one liked her. Before that, she was still finding excuses for her loss in the quest for the White House. All through that we continued to hear about corruption and fraud in all things Clinton including the foundation(s).

Sidebar: Read about the Foundation ah weirdness in Columbia.

The Clinton Foundation left a toxic legacy in Colombia ... photo

Well….she is back…and Kevin is leading the charge. But bring money for cocktails and photos.

So, who is Kevin?

Kevin Thurm, A83, A17P, is dedicated to finding solutions that last to transform lives and communities. As the CEO of the Clinton Foundation, he leads its efforts to build partnerships of great purpose between businesses, governments, NGOs, and individuals.

Prior to working at the Clinton Foundation, Thurm held various leadership positions in government and the corporate sector. As a senior counselor at the U.S. Department of Health and Human Services (HHS), he partnered with Secretary Sylvia Burwell and HHS senior leadership on cross-cutting strategic initiatives, including continuing implementation of the Affordable Care Act. At Citigroup, he held senior positions including chief compliance officer and deputy general counsel. Before joining Citigroup, Thurm served as the deputy secretary and chief of staff for the Department of Health and Human Services under Secretary Donna E. Shalala.

Thurm received a bachelor’s from Tufts University in 1983; a bachelor’s/master’s from Oxford University in 1986, where he was a Rhodes Scholar; and a J.D. from Harvard Law School in 1989.

***

The Clinton Foundation, after seeing a drop in donations amid increased scrutiny and “pay-to-play” allegations, is revving back up with a glitzy fundraising gala that coincides with a broader push by the Clinton machine to stay in the political spotlight.

Axios reported Monday that longtime Clinton supporters received an invitation offering access — a word that dogged Hillary Clinton throughout her failed 2016 presidential campaign — to the family at a May 24 benefit for the Clinton Foundation.

Hillary Announcement Is Great News for Trump and Republicans

The cheapest tickets for the event will be $2,500 for cocktails and dinner. Deep-pocketed donors can lay out $100,000 for a package including “leadership reception for two, a premium table of 10, program recognition as Gala Chair and invitations to the Clinton Foundation Annual Briefing.”

The invite features photos of Bill, Hillary and Chelsea Clinton, implying they’ll all be attending.

The foundation scaled back its activities in 2016, downsizing the Clinton Global Initiative and placing restrictions on fundraising amid claims of “pay-to-play” by donors seeking access when Clinton was secretary of state. The Clintons denied any such arrangements.

The biggest such controversy related to the sale of Uranium One — a Canadian-based energy firm and holder of 20 percent of U.S. uranium stocks — to Russian energy company Rosatom during Clinton’s time as secretary of state. The connections between the sale of Uranium One and donations to the foundation were first reported by author Peter Schweizer in his 2015 book “Clinton Cash.”

The New York Times reported that the Clinton Foundation received millions of dollars from donors connected to Uranium One as the deal was in the process of being approved by representatives of government agencies, including Clinton’s State Department.

Since the election, questions about that deal have not gone away. In October, The Hill reported that the FBI received an account that Russian nuclear officials had routed millions of dollars to the U.S. designed to benefit the Clinton Foundation amid a broader pattern of bribery and kickbacks designed to extend Russia’s footprint to the U.S.

Amid the controversies in 2015 and 2016, the foundation saw a plunge in donations. While data from 2017 are not available, 2016 numbers showed that donations fell by 42 percent, from $108 million in 2015 to $63 million in 2016. Then-acting CEO Kevin Thurm told The New York Post, which first reported on the numbers, that that was due in part to restrictions on fundraising the foundation placed on itself as Clinton ran for president.

But while numbers for 2017 aren’t available, IB Times reported last year that a number of big companies have distanced themselves from the foundation and were choosing not to give. Companies that told the outlet in November they have not donated since the 2016 election included Boeing, Chevron, Dell, General Electric, and Lockheed Martin.

“Last year was a tough year,” Donna Shalala, then-president of the foundation, told The Times in 2017, “because people were beating on us with nonsense.”

Clinton Foundation dealings have continued to stay in the headlines. Former FBI Deputy Director Andrew McCabe was fired by Attorney General Jeff Sessions in March after an inspector general report said he leaked the existence of a probe into the foundation during the presidential campaign and later lied about it.

Meanwhile, conservative watchdog Judicial Watch has continued to publish emails sent by Clinton when she served as secretary of state — emails that touch on foundation activity.

The May fundraiser is the latest sign from the Clintons that they do not intend to retreat from the spotlight. After losing in 2016, Hillary Clinton has set up the political action organization Onward Together and released a lengthy campaign post-mortem titled, “What Happened.” She went on a speaking tour coinciding with the book’s release and has made numerous additional appearances discussing her 2016 loss.

Axios reported Monday that Hillary Clinton was to lead the first meeting of Onward Together on New York’s Upper East Side for a session on “harnessing the energy and activism post-election.” Bill, meanwhile, will publish his novel “The President is Missing,” co-authored with James Patterson on June 4.

An April Wall Street Journal/NBC News poll found that only 27 percent of those polled had a very or somewhat positive view of the former secretary of state. That makes her less popular than President Trump, whose popularity registered at 35 percent. It marked a new low for her in the poll, which clocked her popularity at 30 percent in August 2017.

 

Take Honduras as an Example

The caravan, the caravan…

There is a crisis going on at the California border check point where an estimated 200 migrants are attempting to gain entry into the United States by using all tactics stressing our resources and laws.

Today: The Caravan at California’s Door photo

(Note the sign provided by ANSWER Coalition)

So, the big question is if these people are desperate to leave their home countries out of fear, crime and corruption, then why have they not visited our embassies in their home countries? They just fled. People fleeing to the United States must and do travel through Mexico. So, where is the humanitarian policy of Mexico to accept these desperate people?

A large number of people attempting to enter the United States come from a handful of countries in Central America such as Guatemala, El Salvador, Honduras and Nicaragua. So, let us examine Honduras as an example. for a summary of the crime and threat assessment in Honduras, go here.

How Instability in Central America Affects US-Mexico ... photo

In 2009, Obama cut $200 million in non-humanitarian aid to Honduras. The United States must address stabilizing these countries, rather than allowing their failures and exporting the problem(s) to the United States.

But:

Honduras, one of Latin America’s poorest nations, strives to improve its economic and democratic development with U.S. assistance. The United States has historically been the largest bilateral donor to Honduras. U.S. Agency for International Development (USAID) programs target a variety of sectors including education, health, economic policy, microenterprise, environmental conservation, food security, municipal development, and justice sector reform. USAID has provided more than $3 billion in economic and social development assistance to the Honduran people since it began working in the country in 1961. Currently, programs focus on addressing the main push factors of migration by improving citizen security, reducing extreme poverty, and improving public administration through transparency and accountability reforms. To achieve these objectives, USAID’s efforts address citizen security through community-based crime prevention activities, with a focus on the highest crime neighborhoods and those youth who are most at-risk. Additionally, USAID strengthens local and national governance, as well as civil society monitoring and watchdog organizations; helps the poorest sectors of society increase food security and incomes; supports the sustainable management of natural resources; expands quality basic education and workplace and life-skills training; and improves the quality and participation of local citizens and civil society in decentralized basic services.

In 2017, the U.S. Department of Commerce will be dedicating $1.5 million for a customs and border management program focused on improving trade into Honduras and others parts of Central America. The U.S. Department of Agriculture provided $47 million in 2015-2016 for its two programs that deliver school meals to 53,000 students and increase agricultural productivity and trade.

The United States Armed Forces maintain a small presence at a Honduran military base. U.S. forces conduct and provide logistical support for a variety of bilateral and multilateral exercises–medical, engineering, counternarcotics, and disaster relief–for the benefit of the Honduran people and their Central American neighbors. Through the Central America Regional Security Initiative, the United States supports the Government of Honduras by assisting law enforcement entities in disrupting criminal networks; building investigative, prosecutorial, and judicial capacity; and implementing violence prevention programs for vulnerable communities.

In June 2005, Honduras became the first country in the hemisphere to sign a Millennium Challenge Corporation (MCC) Compact with the U.S. Government. Under the Compact, the U.S. Millennium Challenge Corporation invested $205 million over 5 years to help Honduras improve its road infrastructure, diversify its agriculture, and transport its products to market. In 2013, Honduras received a $15.6 million MCC Threshold Agreement to support Honduran efforts to improve public financial management and create more effective and transparent public-private partnerships.

The State Department website for the embassy in Honduras explains that in order to obtain a visa, the applicant must establish they meet all requirements to receive a visa. The website even includes a ‘visa wizard’ that aids in the application process to determine the specific visa that best fits the case.

There is a fraud unit at all embassies and if fraud is committed during in the visa process, benefits are lost, fines are applied and a jail sentence can be applied.

There is yet another requirement for travel and approval to enter the United States, vaccines.

They include: mumps, measles, rubella, polio, tetanus and diphtheria, pertussis, Haemophilus influenzae/type B, hepatitis A and B, rotavirus, meningococcal disease, varicella, pneumococcal disease, and seasonal influenza.

So, given just the vaccine requirements, detention in either Mexico or the United States for those attempting to enter the United States is warranted. The cost however of medical examinations and detention is significant and government agencies cannot estimate those costs to the taxpayer.

Now, here is something quite curious:

Who is a refugee?

According to the 1951 United Nations Refugee Convention, a refugee is defined as someone who “owing to a well-founded fear of being persecuted for reasons of race, religion, nationality, membership of a particular social group, or political opinion, is outside the country of his nationality, and is unable to or, owing to such fear, is unwilling to avail himself of the protection of that country…”

  • Asylum seekers have submitted a claim for refugee status and are waiting for this claim to be accepted or rejected.
  • Refugees and asylees comprise the majority of displaced persons resettled to the United States.

What are the top countries of origin and asylum*?

The top ten countries of refugee origin are Afghanistan, Iraq, Somali, DR Congo, Myanmar, Colombia, Sudan, Vietnam, Eritrea, and China.

The top ten countries of refugee asylum are Pakistan, Iran, Syria, Germany, Jordan, Kenya, Chad, China, United States, and United Kingdom.

* Countries are listed in order from greatest to least number of refugees as of Dec 2010.

Source: UNHCR Global Trends (2010)

Statistics on International Refugees and US Domestic Refugee Admissions:

Source: UNHCR, 2009 Global Trends: Refugee, Asylum-Seekers, Returnees, Internally Displaced and Stateless People

  • As of 2009, an estimated 15.2 million refugees were located around the world. Of these refugees, 251,500 were voluntarily repatriated to their home nations.
  • In 2011, the United States accepted 56,424 refugees for resettlement.

Source: U.S. Department of State, Bureau of Population, Refugees, and Migration (PRM), Worldwide Refugee Admissions Processing System (WRAPS)

The U.S. has projected a refugee resettlement ceiling of 76,000 individuals for FY 2012.
Source: Presidential Determination No. 2011-17: FY 2012 Refugee Admissions Numbers

Immigrant, Refugee and Migrant Health Branch (IRMH)

The goal of the IRMH Branch within the Division of Global Migration and Quarantine is to promote and improve the health of immigrants, refugees, and migrants and prevent the importation of infectious diseases and other conditions of public health significance into the U.S. by these groups. To accomplish this goal the IRMH branch plays a significant role in refugee health, both overseas and domestically.

Older female refugee

Overseas

  • IRMH develops and implements the Technical Instructions used by overseas panel physicians who are responsible for conducting the medical examinations for U.S.-bound refugees. The Technical Instructions consist of medical screening guidelines, which outline in detail the scope of the medical examination. The purpose of the medical examination is to identify, for the Department of State and the US Citizenship and Immigration service, applicants with medical conditions of public health concern.
  • IRMH also maintains an anonymous collection of surplus blood samples from overseas screenings called the Migrant Serum Bank (MSB). Scientists from around the world can request to use the samples for research projects.

Domestic

  • The Domestic Refugee Health Program facilitates collaboration with state and local health department partners to improve the health care and monitor medical conditions of refugees after their arrival into the United States.
  • IRMH also maintains the Electronic Disease Notification System (EDN), which notifies states and local health departments of the arrival of refugees to their jurisdictions. EDN provides states with overseas medical screening results and treatment follow-up information for each refugee.

IRMH Partners

To accomplish its goals in refugee health, IRMH works with many external partners:

 

Trump Approves Release of 2nd Set of JFK Files, Still not All

So, who was Valeriy Kostikov? It is said he was Lee Harvey Oswald’s KGB handler. The 'Kostin' letter

In part from McClatchy: In 1975, just three years after the nearly 50-year reign of FBI Director J. Edgar Hoover came to an end, the bureau looked into rumors that Oswald had penned a threatening note to the FBI office in Dallas shortly before the assassination. No records were found, but Dallas agents said that Oswald had indeed left a threatening handwritten message.

Congressional investigators established that Hosty’s boss, Gordon Shanklin, demanded that he rip up the letter and flush it down the toilet — reportedly under orders from Hoover, who was incensed that the Dallas office had embarrassed the agency by not seeing Oswald as a threat. The former Marine had defected to the Soviet Union, but returned a few years later.

The report by Hosty to headquarters, with little held from public view on Thursday, makes clear that Hosty did tell FBI bosses that Oswald was violent and had been living and working as a maintenance man in New Orleans before moving to Dallas in the spring of 1963. And it confirms Oswald was under surveillance at the time of the assassination.

Another Hosty document, which also had been partially released earlier, has Hoover gushing praise for Hosty in 1971 for work he did as a field agent in Kansas City.

“Your performance relative to a matter of considerable importance to the Bureau in the security field is worthy of praise and warrants commendation,” Hoover wrote.

Thursday’s new documents offer nothing more on Earle Cabell, the mayor of Dallas at the time of assassination. A single document among the roughly 35,000 released last year showed that he’d been listed in CIA files as an asset, an explosive revelation. Cabell’s brother Charles had been a top CIA leader until a year before the killing.

The documents do, however, fill in some blanks about a Soviet Embassy official in Mexico City who met with Oswald weeks before the assassination. Over the decades Oswald’s meetings in Mexico City with the Cuban and Soviet embassies, purportedly to get a visa to Cuba in hopes of returning to the Soviet Union, have gradually been revealed.

One of the Soviets he had contact with was Valeriy Vladimirovich Kostikov. Little was known about his role, but the CIA confirmed to the original assassination investigators that Kostikov was likely part of the feared Department 13 assassination unit of the Soviet spy agency, the KGB.

It is now known that, at minimum, Oswald had phone conversations while in Mexico with Kostikov. Among the further-released documents Thursday were references to Kostikov being “Oswald’s KGB handler.”

That’s found in a May 1982 memo from what appears to be an unidentified foreign intelligence agency or U.S. asset in the Middle East asking longtime CIA Soviet Division leader David Blee about Kostikov. The questioner notes that the Soviets were behind increased harassment of foreign embassies in Beirut — less than a year before a truck bomb leveled the U.S. embassy there, killing 241 U.S. marines and military personnel.

“The reason for our interest in KOSTIKOV will be obvious,” writes the official to Blee. That document was one of more than 15,000 that Thursday were left with some form of partial redaction.

A number of documents relating to the Miami-based anti-Castro group Alpha 66 were included in Thursday’s release, as well. One curious one, dated February 1971, documents how the group outsmarted the FBI a year earlier. The FBI had raided its Miami offices and taken files.

“Apparently Alpha 66 had duplicates hidden because today duplicates of the files which the FBI removed are in their filing cabinets,” the memo from the CIA noted.

Alpha 66 had been headed by Antonio Veciana, who still resides in Miami and is elderly and in frail health. In an interview with McClatchy last year he reasserted that a top CIA Latin America official, David Atlee Phillips, had been working with Oswald to overthrow Cuban leader Fidel Castro. His implication was that Oswald was trained to take out Castro but turned on Kennedy.

Another Miami-related document quotes an American journalist who had been imprisoned in Cuba in 1963 as hearing from a fellow prisoner that Jack Ruby, who killed Oswald just days after the Kennedy assassination, had frequented Cuba and had mafia ties on the island.

*** As an aside, Jack Ruby was a close friend of Santo Trafficante, a mafia mob boss based in Tampa with substantial investments in Cuba. The mob was called upon by Joe Kennedy to help deliver votes for JFK and that request was granted and successful. When President Kennedy named his brother, Robert as the Attorney General, Bobby took up the mission to destroy the mob and this infuriated Trafficante and other mob bosses. Prior to this, the mafia was brought in by the CIA to plot the overthrow or assassination of Fidel Castro. West Tampa Center For The Arts Blog  photo

***

New Group of JFK Assassination Documents Available to the Public
Press Release · Thursday, April 26, 2018

WASHINGTON —

In accordance with President Trump’s direction on October 26, 2017, the National Archives today posted 19,045 documents subject to the President John F. Kennedy Assassination Records Collection Act of 1992 (JFK Act).   Released documents are available for download.  The versions released today were processed by agencies in accordance with the President’s direction that agency heads be extremely circumspect in recommending any further postponement.

The John F. Kennedy Assassination Records Collection, established by the National Archives in November 1992, consists of approximately five million pages.  The vast majority of the collection has been publicly available without any restrictions since the late 1990s.  As permitted by the JFK Act, agencies appealed to the President to continue postponement of certain information beyond October 26, 2017.  The President provided agencies with a temporary certification until April 26, 2018 to allow for a re-review of all documents withheld in full or in part under section 5 of the JFK Act and directed agencies to “identify as much as possible that may be publicly disclosed” and to be “extremely circumspect in recommending any further postponement.”

Based on reviews conducted by agencies in accordance with the President’s direction, the National Archives released 3,539 documents on Dec. 15, 10,744 documents on Nov. 17, 13,213 documents on Nov. 9, and 676 documents on Nov. 3 of last year.  The 19,045 documents released today represent the final release of documents in accordance with the President’s direction on October 26, 2017.

All documents subject to section 5 of the JFK Act have been released in full or in part.  No documents subject to section 5 of the JFK Act remain withheld in full.  The President has determined that all information that remains withheld under section 5 must be reviewed again before October 26, 2021 to determine whether continued withholding from disclosure is necessary.

 

Online Resources:
The President John F. Kennedy Assassination Records Collection
Documenting the Death of a President
JFK Assassination Records Review Board
The work of the Kennedy Assassination Records Collection
JFK Assassination Records FAQs
Warren Commission Report