It is a Day that Ends in ‘Y’ and Another Hillary Email Revelation

While a big 9000 email dump is expected tonight at 9PM, August 31 by the State Department of more court ordered emails to be released, seems yet another 150 contained classified information.

EXCLUSIVE: Hillary Shared An Email Network With The Clinton Foundation

Hillary Clinton’s private email server was housed at the same physical location and on the same network as an email server used and operated by the Clinton Foundation, Breitbart News has exclusively learned.

Breitbart: Records reveal that Hillary Clinton’s private clintonemail.com server shared an IP address with her husband Bill Clinton’s email server, presidentclinton.com, and both servers were housed in New York City, not in the basement of the Clintons’ Chappaqua, New York home.

Web archives show that the Presidentclinton.com Web address was being operated by the Clinton Foundation as of 2009, when Hillary Clinton registered her own clintonemail.com server.

Numerous Clinton Foundation employees used the presidentclinton.com server for their own email addresses, which means that they were using email accounts that, if hacked, would have given any hacker complete access to Hillary Clinton’s State Department emails, as well.

The bombshell revelation raises new concerns about the possible illegality of Hillary Clinton’s private email use. The former Secretary of State is under federal investigation for potentially violating the Espionage Act by allowing people without a security clearance to access classified information. The fact that Hillary was sharing an email network with a private foundation means that people without a security clearance almost certainly had physical access to her server while she was working at the State Department.

Here’s what we know:

The Servers Have The SAME IP Address

Hillary’s clintonemail.com server and the Foundation-run presidentclinton.com email server have exactly the same IP address, and the same SSL certificate (which an organization purchases for an email server to verify its trustworthiness).

mail.clintonemail.com and mail.presidentclinton.com both have an IP address of 64.94.172.146, according to an SSL Certificate Checker.

The two servers both have that same IP address, 64.94.172.146, according to DNS records. (Here are records for Hillary’s server, and here are records for Bill’s server).

Both servers have the same IP address, according to another independent Internet records database, robtex.net.

The fact that both of these email servers have the same IP address means that they were operating on the same network, and sharing physical space. A computer expert tells Breitbart News that the servers were probably operating on the same machine. It is also possible that they were operating on different machines on the same network, which still means that the machines would have to be close enough to exist in the same physical location.

President Clinton’s server was created in 2002, while Hillary’s was created in 2009, which means that Hillary’s server was simply added to Bill’s Foundation-run server network.

They Had The SAME IP Address When She Was Secretary of State

Hillary’s server and Bill’s Foundation-run server also shared a different IP address during her tenure as Secretary of State.

From September 8, 2009 until June 24, 2011, Bill Clinton’s Foundation-run mail.presidentclinton.com server had an IP address of 24.187.234.187, according to DNS records.

Hillary’s mail.clintonemail.com server had the same exact IP address, 24.187.234.187, from the dates May 21, 2010 until October 21, 2010, according to DNS records.

Their Shared IP Address Can Be Traced to Midtown Manhattan

A geographical search for the IP address that both servers shared at registration traces to Midtown Manhattan, according to three different databases: infosniper.net, which locates a Midtown latitude/longitude point, ip-tracker.org, which also gives a Midtown latitude/longitude point, and whatsmyip.org.

Clinton Foundation headquarters are currently located at 1271 6th Avenue in Midtown. Bill Clinton’s office is at 55 West 125th Street

The Denver-based firm Platte River Networks told Breitbart News that it physically moved Hillary Clinton’s private email server out of the basement of her Chappaqua home in 2013. But the Clintons could have moved the server from Manhattan to Chappaqua before Platte River got there.

Clinton Founation Employees Had presidentclinton.com email addresses

The employees who have used presidentclinton.com email addresses included former Bill Clinton right-hand man Doug Band, as well as Justin Cooper, a Hillary aide who has worked with the Foundation, Terry Krinvic, Laura Graham, and John Zimmerebner.

Was Chelsea Clinton On The Server?

The email server for mail.chelseaoffice.com, which is no longer active, resolves to clintonemail.comaccording to DNS records. Wikileaks confirms that the chelseaoffice.com server was used by Chelsea Clinton employees.

Hillary Even Admitted That She Used Her Husband’s “System”

“Well the system we used was set up for President Clintons office and it had numerous safeguards it was on property guarded by the Secret Service and there were no security breaches, so I think that the use of that server which started with my husband proved to be effective and secure,” Hillary Clinton said in a March 2015 press conference.

Clinton has not returned to that talking point since.

The Clinton Foundation and Hillary Clinton’s campaign did not return requests for comment by press time.

The Words you Use can Be a Cause for Investigation

On the knife’s edge, Americans are threatened by some entity every day. It is the work of government to keep the homeland safe and the methods or tactics used can infringe on our protected rights.

Wonder what words are used in Hillary’s emails….

When it comes to words, the Department of Homeland Security has a list and they have systems to cultivate interactions on the internet where social media platforms such as Facebook and Twitter and YouTube are the top three locations where you are being watched. Have you ever posted something to Facebook and it was removed?

This is not a new circumstance, but often we need to be reminded.

Dept. of Homeland Security Forced to Release List of Keywords Used to Monitor Social Networking Sites

Forbes: If you are thinking about tweeting about clouds, pork, exercise or even Mexico, think again. Doing so may result in a closer look by the U.S. Department of Homeland Security.

In a story appearing earlier today on the U.K’s Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as “signs of terrorist or other threats against the U.S.”

The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.

The information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats. The Daily Mail’s article noted the Electronic Privacy Information Center wrote a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, describing it’s choice of words as ‘broad, vague and ambiguous’.

What wasn’t disclosed is how the agency actually gains access to the various search engines and social networks to monitor the specified keywords. My guess is the DHS has a “special arrangement” with companies like Google GOOG -1.94%, Facebook FB -1.12%, Microsoft MSFT +0.00%, Yahoo and Twitter to gain secure direct API access. This type of access would allow it to use distributed cloud technologies to monitor the daily flow of social media and search activity in something close to real time.

I would love to learn more about the technologies used to accomplish this type of social / web monitoring. The applications for monitoring trends and social statics are fascinating when applied to other industry sectors. Given the extent of the monitoring, I’m sure this post itself is now coming up on the DHS radar, so please feel free to leave a comment with any insights.

2014:

(Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 – Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)

(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack. Not a good practice for the security conscious. Thanks to @obraon twitter for the tip.)

 List1

List

list3

For the full DHS document, click here.

Destruction by Foreign Hackers Cannot be Measured

The job of the future appears to be cyber soldiers, warriors trained to protect America from cyber-terrorism.

US Army Looks Inward for Next Batch of Cyber Specialists

The Army has turned to its own ranks in hopes of satisfying its growing need for talented cybersecurity professionals.

In June, the agency announced that all E-1- through E-8-ranked soldiers, regardless of their technical background, could apply to participate in a yearlong cyber training program, according to a recent Army press release.

Those successful candidates who complete the program would then be reclassified into the 17C military occupational specialty – also known as cyber operations specialist.

As cyber operations specialists, these soldiers will be tasked with supporting the military through offensive and defensive cyber operations.

China and Russia are using hacked data to target U.S. spies, officials say

LATimes:

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.

At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials.

The Obama administration has scrambled to boost cyberdefenses for federal agencies and crucial infrastructure as foreign-based attacks have penetrated government websites and email systems, social media accounts and, most important, vast data troves containing Social Security numbers, financial information, medical records and other personal data on millions of Americans.

 

Counterintelligence officials say their adversaries combine those immense data files and then employ sophisticated software to try to isolate disparate clues that can be used to identify and track — or worse, blackmail and recruit — U.S. intelligence operatives.

Digital analysis can reveal “who is an intelligence officer, who travels where, when, who’s got financial difficulties, who’s got medical issues, [to] put together a common picture,” William Evanina, the top counterintelligence official for the U.S. intelligence community, said in an interview.

Asked whether adversaries had used this information against U.S. operatives, Evanina said, “Absolutely.”

Evanina declined to say which nations are involved. Other U.S. officials, speaking on condition of anonymity to discuss internal assessments, say China and Russia are collecting and scrutinizing sensitive U.S. computer files for counterintelligence purposes.

U.S. cyberspying is also extensive, but authorities in Moscow and Beijing frequently work in tandem with criminal hackers and private companies to find and extract sensitive data from U.S. systems, rather than steal it themselves. That limits clear targets for U.S. retaliation.

The Obama administration marked a notable exception last week when a U.S. military drone strike near Raqqah, Syria, killed the British-born leader of the CyberCaliphate, an Islamic State hacking group that has aggressively sought to persuade sympathizers to launch “lone wolf” attacks in the United States and elsewhere.

Junaid Hussain had posted names, addresses and photos of about 1,300 U.S. military and other officials on Twitter and the Internet, and urged his followers to find and kill them, according to U.S. officials. They said he also had been in contact with one of the two heavily armed attackers killed in May outside a prophet Muhammad cartoon contest in Garland, Texas. Hussain is the first known hacker targeted by a U.S. drone.

The Pentagon also is scouring the leaked list of clients and their sexual preferences from the Ashley Madison cheating website to identify service members who may have violated military rules against infidelity and be vulnerable to extortion by foreign intelligence agencies.

Far more worrisome was last year’s cyberlooting — allegedly by China — of U.S. Office of Personnel Management databases holding detailed personnel records and security clearance application files for about 22 million people, including not only current and former federal employees and contractors but also their families and friends.

“A foreign spy agency now has the ability to cross-check who has a security clearance, via the OPM breach, with who was cheating on their wife via the Ashley Madison breach, and thus identify someone to target for blackmail,” said Peter W. Singer, a fellow at the nonprofit New America Foundation in Washington and coauthor of the book “Cybersecurity and Cyberwar.”

The immense data troves can reveal marital problems, health issues and financial distress that foreign intelligence services can use to try to pry secrets from U.S. officials, according to Rep. Adam B. Schiff of Burbank, the top Democrat on the House Intelligence Committee.

“It’s very much a 21st century challenge,” Schiff said. “The whole cyberlandscape has changed.”

U.S. intelligence officials have seen evidence that China’s Ministry of State Security has combined medical data snatched in January from health insurance giant Anthem, passenger records stripped from United Airlines servers in May and the OPM security clearance files.

The Anthem breach, which involved personal data on 80 million current and former customers and employees, used malicious software that U.S. officials say is linked to the Chinese government. The information has not appeared for sale on black market websites, indicating that a foreign government controls it.

U.S. officials have not publicly blamed Beijing for the theft of the OPM and the Anthem files, but privately say both hacks were traced to the Chinese government.

The officials say China’s state security officials tapped criminal hackers to steal the files, and then gave them to private Chinese software companies to help analyze and link the information together. That kept the government’s direct fingerprints off the heist and the data aggregation that followed.

In a similar fashion, officials say, Russia’s powerful Federal Security Service, or FSB, has close connections to programmers and criminal hacking rings in Russia and has used them in a relentless series of cyberattacks.

According to U.S. officials, Russian hackers linked to the Kremlin infiltrated the State Department’s unclassified email system for several months last fall. Russian hackers also stole gigabytes of customer data from several U.S. banks and financial companies, including JPMorgan Chase & Co., last year.

A Chinese Embassy spokesman, Zhu Haiquan, said Friday that his government “firmly opposes and combats all forms of cyberattacks in accordance with the law.” The Russian Embassy did not respond to multiple requests for comment. U.S. intelligence officials want President Obama to press their concerns about Chinese hacking when Chinese President Xi Jinping visits the White House on Sept. 25.

After the recent breaches, U.S. cybersecurity officials saw a dramatic increase in the number of targeted emails sent to U.S. government employees that contain links to malicious software.

In late July, for example, an unclassified email system used by the Joint Chiefs and their staff — 4,000 people in all — was taken down for 12 days after they received sophisticated “spear-phishing” emails that U.S. officials suspect was a Russian hack.

The emails appeared to be from USAA, a bank that serves military members, and each sought to persuade the recipient to click a link that would implant spyware into the system.

Defense Secretary Ashton Carter said the hack shows the military needs to boost its cyberdefenses.

“We’re not doing as well as we need to do in job one in cyber, which is defending our own networks,” Carter said Wednesday. “Our military is dependent upon and empowered by networks for its effective operations…. We have to be better at network defense than we are now.”

Carter spent Friday in Silicon Valley in an effort to expand a partnership between the Pentagon, academia and the private sector that aims to improve the nation’s digital defenses. Carter opened an outreach office in Mountain View this year to try to draw on local expertise.

U.S. intelligence officers are supposed to cover their digital tracks and are trained to look for surveillance. Counterintelligence officials say they worry more about the scientists, engineers and other technical experts who travel abroad to support the career spies, who mostly work in U.S. embassies.

The contractors are more vulnerable to having their covers blown now, and two U.S. officials said some already have been compromised. They refused to say whether any were subject to blackmail or other overtures from foreign intelligence services.

But Evanina’s office, the National Counterintelligence and Security Center, based in Bethesda, Md., has recently updated pamphlets, training videos and desk calendars for government workers to warn them of the increased risk from foreign spy services.

“Travel vulnerabilities are greater than usual,” reads one handout. Take “extra precaution” if people “approach you in a friendly manner and seem to have a lot in common with you.”

Asylum Seekers Die Across the Globe

The United Nations Refugee Agency’s solution to global unrest appears to be the same as that of world leaders, report the crisis and force other countries to accept refugees and asylum seekers. Meanwhile, death tolls mount.

Between the fact that the Obama White House never had a strategic plan for the Middle East, nor one for Central and Latin America, while as Secretary of State Hillary Clinton and John Kerry do not have one either. Meanwhile people suffer and the whole consequence threatens national security, healthcare, education, taxpayers, crimes and more.

Germany

Poland

United Kingdom

Italy

United States

There is more for sure….

Bodies found dead in a truck near border, while asylum seekers flow into Hungary

GENEVA, Aug 28 (UNHCR) The UN refugee agency said it was “deeply shocked and saddened” at the grim discovery yesterday of the bodies of 71 people inside a truck abandoned near the Austrian border with Hungary.

“This tragedy underscores the ruthlessness of people smugglers who have expanded their business from the Mediterranean sea to the highways of Europe. It shows they have no regard for human life and are only after profit,” UNHCR spokesperson Melissa Fleming told a press briefing in Geneva.

Austrian police said that they believed the truck came from Hungary and entered Austria on Wednesday night or early on Thursday morning, and that the victims might have been dead for one or two days. Their identity is still unknown but it is presumed that they were being transported by smugglers.

After establishing that there were no survivors, the truck was closed again by the police and moved to another location for further investigations. Police said that they counted at least 20 bodies but the actual number is likely to be much higher.

“This tragedy also highlights the desperation of people seeking protection or a new life in Europe. UNHCR hopes this incident will result in strong cooperation among European police forces, intelligence agencies and international organisations to crack down on the smuggling trade while putting in place measures to protect and care for victims,” Fleming said.

UNHCR has reiterated its call to European countries to approach the refugee crisis in a spirit of solidarity and cooperation and to provide those seeking safety in Europe with safe legal alternatives to dangerous irregular voyages. These legal avenues include resettlement or humanitarian admission programs, flexible visa policies and family reunification.

“This week, the Hungarian border police have been intercepting more than 2,000 people crossing the border from Serbia every day. On Wednesday, police reported 3,241 new arrivals, including 700 children. This is the highest number in a single day so far this year,” Fleming detailed.

She added that these people, a majority of whom are refugees from Syria, including many women and children, are coming in large groups of over 200 people, walking along the rail tracks or crawling under barbed wire, as work continues on a 175 kilometres long wall at the border between Hungary and Serbia.

“Fear of police detection makes many of them rush through the razor wires, sustaining cuts and injuries in the process. UNHCR staff at the border report that many people are arriving on wheelchairs pushed by relatives, while others are in need of urgent medical assistance,” Fleming explained.

Police take the new arrivals to a pre-registration centre in Röszke in southern Hungary, near the Serbian border and some 184 kilometres away from the capital, Budapest. The centre in Röszke does not offer adequate conditions for the exhausted, hungry and thirsty asylum-seekers who have spent many days on the road.

In Röszke, new arrivals are searched by the police and their details recorded, before being sent to registration centres, further inland. Asylum-seekers are kept in mandatory detention between 12 and 36 hours, and then handed over to the Office of Immigration and Nationality to process their asylum claims. Hungary’s four reception centres have a maximum capacity of 5,000 people.

“Overcrowding and long waits result in frustration for the asylum-seekers. The Hungarian police do not have social workers or enough interpreters in Arabic, Dari, Pashto and Urdu, which makes it hard to communicate with asylum-seekers,” Fleming continued.

Over 140,000 people have sought asylum in Hungary so far this year, according to the latest official statistics, compared to 42,000 people last year. Most of those lodging asylum applications this year are nationals from Syria, Afghanistan, Iraq and Pakistan and they include around 7,000 unaccompanied children or separated from their parents.

Many refugees and migrants choose to leave Hungary for other countries in Europe. Every day up to 500 people sleep at the two main train stations in Budapest where volunteers look after their basic needs, including food, clothing and urgent medical attention, and where the city authorities give them access to sanitation facilities. In order to provide more adequate accommodation, the city authorities are planning to open a transit facility, with UNHCR’s technical advice.

Islamist Incursion Continues in Sheriff’s Dept.

It is not just one Sheriffs Office either, there is Los Angeles County and then add in the fact that even County Commissioners are in lock step with Islamists and CAIR. Question is how does their oath square with Sharia law? Anyone?

Islamist Deputy Sheriff Received Go-Ahead to Keep Job at CAIR

The Sheriff’s Office signs off on employment with a terrorist organization.

Front Page: Nezar Hamze has two paying jobs. In one, he is a Deputy Sheriff at the Broward Sheriff’s Office (BSO), under oath to watch over, protect and promote the best interests of the community. In the other, he is the Regional Operations Director and Chief Executive Officer (CEO) for the Florida chapter of CAIR, an Islamist group with numerous ties to international terrorism. It is disturbing and dangerous that someone from CAIR is involved with law enforcement. It is more disturbing that Hamze has his job at CAIR with the blessings of the Sheriff’s office.

In June 2014, Hamze applied for the position of Certified Reserve Deputy with the BSO. He had applied for the same position in March 2012 but was rejected. At the time of his 2012 application, Hamze was serving as the Executive Director of CAIR-Florida. His 2014 application states (in type) that he, at the time, had the title of Regional Operations Director of CAIR-Florida and has the word “current” penciled next to it.

The 2014 application states that the Broward Sheriff, Scott Israel, recommended Hamze for the job. The application was approved, and soon after, Hamze was sworn in.

In order to keep his position with CAIR, at the same time as serve the BSO, Hamze had to fill out a form asking the BSO if he could do so. On his ‘Broward Sheriff’s Office Off-Duty Employment Form,’ dated February 2015, it states, “I, Nezar Hamze… request that I be granted permission to accept off-duty employment for the year 2015.”

Hamze stated for his job description, “As Coordinator for CAIR Florida I will be responsible for assisting in community events and educational lectures. My job duties include: public speaking, fundraising, media relations, lectures, employment training, diversity and culture training. The nature of this job does not require any regular office hours and I am able to work on my days off and at my leisure.”

Along with Hamze, both the Unit Supervisor and the Division Commander signed the form.

It doesn’t take a genius to understand the conflict of interest with respect to Hamze’s two jobs. There is not even an issue of ‘dual loyalty’ in this case, since it is obvious that Hamze is exploiting his position in law enforcement solely to further his Islamist agenda as a CAIR official. Hamze’s hiring is no doubt a coup for CAIR, but it is a ‘coup de grace’ for counter terrorism efforts within the BSO and beyond, as it could result in grave harm done to criminal and/or terrorist investigations.

CAIR or the Council on American-Islamic Relations was established, in June 1994, as one of four groups under the leadership of then-global head of Hamas, Mousa Abu Marzook, who had been residing in the US for decades. Following the White House’s January 1995 designation of Hamas as a terrorist organization, Marzook was arrested and placed in prison. Two years later, in May 1997, he was deported to Jordan. Marzook is currently residing in Egypt, as the number two leader in Hamas.

Since CAIR’s founding, a number of representatives for the group have been imprisoned in and/or deported from the U.S. for various reasons related to terrorist activity. CAIR itself was named a co-conspirator by the US government for two federal trials dealing with the financing of Hamas. And the hierarchy of CAIR is still intact, as the national office’s founding Executive Director, Nihad Awad, and founding Communications Director, Ibrahim Hooper, still hold the same positions.

In November 2014, the United Arab Emirates (UAE) government officially named CAIR a terrorist organization.

When Hamze applied for the BSO in 2014, he e-mailed the Backgrounds division of the Sheriff’s Office, giving permission for them to contact CAIR-Florida. He stated, “I report to the Board of Directors and you can contact them for any information you need,” and he proceeded to give the numbers for two individuals who sit on CAIR-Florida’s Board, Board Member Rashid Abbara (a.k.a. Muhammad Abbara) and the Chairman of the Board Zaid Abdur-Rahman.

Abdur-Rahman, who is a black belt in karate, has called the arrest and conviction of terrorist Syed Fahad Hashmi an “atrocity” that future Presidents and politicians should “apologize” for. In June 2010, Hashmi, a former student at Brooklyn College in New York, was sentenced to 15 years in prison, after pleading guilty to providing material support to al-Qaeda.

In July 2014, Abdur-Rahman posted a video to his Facebook page denouncing Israel for conducting air strikes against Hamas targets in Gaza. The individual posing as a reporter on the video, states, “[W]hen the IDF talks about hitting quote Hamas targets, remember that Hamas is the democratically elected leadership of Gaza, which could mean any government building or social services.”

In July 2014, a BSO ‘Employment Verification’ form for Hamze was filled out by CAIR-Florida’s Community and Government Relations Director Ghazala Salam.

This past July, Salam was featured on a video interview for al-Hikmat, the media arm of the radical Darul Uloom mosque located in Pembroke Pines, Florida.

Darul Uloom has been associated with a number of al-Qaeda terrorists, including now-deceased al-Qaeda Global Operations Chief Adnan el-Shukrijumah, “Dirty Bomber” Jose Padilla, and possibly one of the 9/11 hijackers. Interviewing Salam for the video was the imam of the mosque, Maulana Shafayat Mohamed. Shafayat Mohamed was thrown off a number of boards in Broward County for his outspokenness against homosexuals. In February 2005, Darul Uloom published an article by him claiming that homosexual sex caused the 2004 Indonesian tsunami.

In viewing Nezar Hamze’s applications for employment with the Broward Sheriff’s Office – both his 2012 and 2014 applications – CAIR’s fingerprints are all over them. And for someone like Hamze that makes sense, because CAIR is Hamze’s real life and loyalty.

On Hamze’s BSO ‘Off-Duty Employment Form’ asking to keep his job at CAIR, the form reads, “I further understand that the Sheriff reserves the right to approve, deny, suspend, and or revoke this request at any time for any reason.”

Given Hamze’s role in CAIR, Hamze should have never been hired for any position within the Broward Sheriff’s Office, let alone a position where he gets to walk around with a badge and a gun. No matter how one looks at it, Hamze’s hire is a risk to national security.

Yet what is entirely unfathomable is the fact that the BSO signed off on allowing Hamze to keep his job with CAIR, while serving in his capacity as Deputy Sheriff. If Hamze’s hire reflects the BSO’s approach to combatting terrorism and engaging the Muslim community, they have effectively sabotaged themselves.

All of this took place under the watch of Broward Sheriff Scott Israel, and for that Israel should resign his office immediately. Hamze should be fired, and Israel should go with him.

If you wish to contact Sheriff Israel to discuss this matter, you can do so by sending an e-mail to: [email protected] , or you can call the Broward Sheriff’s Office, at 954-764-4357. Please be respectful in any and all communications with this office.

Beila Rabinowitz, Director of Militant Islam Monitor, contributed to this report.