Global Human Trafficking, Here at Home

Pigs Fly, the UN Finally Admitted Global Sex Violence/Trafficking

Even CNBC is Sounding Alarm on Smuggling at Southern Border

 

Reps. Cohen, Kinzinger, Cárdenas and Wagner Introduce Bipartisan Human Trafficking Bill

June 9, 2016
Press Release

[WASHINGTON, DC] – Congressman Steve Cohen (D-TN), Congressman Adam Kinzinger (R-IL), Congressman Tony Cárdenas (D-CA) and Congresswoman Ann Wagner (R-MO) yesterday introduced H.R. 5405, the Stop, Observe, Ask and Respond (SOAR) to Health and Wellness Act. This bipartisan legislation would provide health care professionals at all levels training on how to identify and appropriately treat human trafficking victims. It is a companion bill to S. 1446, which was introduced by Senators Heidi Heitkamp (D-ND) and Susan Collins (R-ME).

“Human trafficking is a hidden crime that impacts hundreds of thousands of people across the U.S., and many of these victims end up in a health care setting while being exploited,” said Congressman Cohen. “Our bill aims to ensure health care professionals are trained to identify victims of human trafficking and provide them with critical, victim-centered health care.  Our bill also enables health care providers to implement protocols and procedures to work with victims, service organizations, and law enforcement so that victims can get proper support and perpetrators of human trafficking are brought to justice. I would like to thank Reps. Kinzinger, Cárdenas and Wagner for joining me in introducing this bill.”  

“It is critical that our health care providers are trained to recognize cases of human trafficking and have the proper procedures to best help those most vulnerable,” said Rep. Kinzinger. “I’m proud to be an original cosponsor of the SOAR Act and I believe this pilot program will have a significant impact towards identifying cases of human trafficking and helping more victims across the country from this disgusting crime.”  

“Human trafficking has grown into a large scale industry that is disproportionately geared towards women,” said Rep. Cárdenas. “This is just one of the many reasons why I did not hesitate to become an original cosponsor of the SOAR bill. Victims of trafficking suffer long-term effects, and with the introduction of new research, it is evident that the people who seek help can be identified and properly cared for by trained professionals. It is time to use this information in order to help stop the growth of the trafficking industry and facilitate the well-being of both survivors and victims.”   

“Education and awareness are critical in the fight to end human trafficking. This legislation will provide health care providers on all levels with the appropriate training and tools necessary to identify and report potential cases of human trafficking,” said Congresswoman Wagner. “With tens of thousands of victims being trafficked in the United States each year, I am happy to work with my colleagues across the aisle to introduce and quickly pass this legislation.”   

“Victims of human trafficking are hidden in plain sight – making those in captivity unrecognizable even to our most trusted professionals like doctors and nurses,” said Senator Heitkamp. “By implementing across the country the successes of health worker pilot training programs in North Dakota, my bipartisan bill with Sen. Collins would help provide the critical tools medical professionals need to recognize and protect victims of human trafficking. Today’s introduction of our bill in the U.S. House of Representatives is a critical step toward putting an end to human trafficking by identifying victims and getting them the support they need.” 

“Sex trafficking is a heinous crime that tragically affects every corner of America.  Human traffickers prey upon the most vulnerable, often homeless or runaway children,” said Senator Collins.  “Identification is a crucial, and frequently missed, step in helping victims and stopping these atrocities.  This bipartisan legislation would expand a successful pilot program at the U.S. Department of Health and Human Services to ensure that more health care providers have the training to identify, report, and treat these cases, which will help us shine a light on some of the darkest stories imaginable and protect victims of these detestable crimes.” 

The Stop, Observe, Ask and Respond (SOAR) to Health and Wellness Act supports efforts underway at the Department of Health and Human Services (HHS) to combat human trafficking by directing the Secretary to establish a pilot program to be known as ‘Stop, Observe, Ask and Respond to Health and Wellness Training.’ While human trafficking victims are often difficult to identify, a reported 68 percent of trafficking victims end up in a health care setting at some point while being exploited, including in clinics, emergency rooms and doctor’s offices.  Despite this, out of more than 5,680 hospitals in the country, only 60 have been identified as having a plan for treating patients who are victims of trafficking and 95 percent of emergency room personnel are not trained to treat trafficking victims. The SOAR Act will help close the gap in health care settings without plans for treating human trafficking victims.

**** How bad is it?

BBC: Dubbed “the General”, Mered Medhanie is alleged to have led a multi-billion dollar empire which specialised in people-smuggling.

Undated handout photo, issued by the Kk'S National Crime Agency, of Mered Medhanie, dubbed "The General", one of the world's most wanted people smugglers, who has been arrested Mered Medhanie styled himself on the late Libyan leader Col Muammar Gaddafi 

A 35-year-old Eritrean, he came to public attention after being linked to the worst migrant disaster at sea – the deaths of 359 migrants in October 2013 after their boat sank near the Italian island of Lampedusa.

Canada-based barrister Christine Duhaime, who specialises in money-laundering legislation, said Mr Mered was suspected to be a ringleader of the people-smuggling network which stretched across Africa and Europe.

“He is notorious just for the fact that he controlled a lot of money and a lot of people,” she told the BBC’s Newsday programme.

“As kingpin, the amount of money that went through him is apparently in the billions.” More to the story here.

Tech, One Extreme to Another

Does anyone remember the floppy disk? How about Windows Me or COBOL?

Sheesh….

Gov’t report: Feds spend billions to run ancient technology

In a report to be released Wednesday, nonpartisan congressional investigators say the increasing cost of maintaining museum-ready equipment devours money better spent on modernization.

Despite a White House push to replace aging workhorse systems, the budget for modernization has fallen, and will be $7 billion less in 2017 than in 2010, said the Government Accountability Office. The report was provided to The Associated Press ahead of a House oversight committee hearing.

GAO said it found problems across the government, not just in a few agencies. Among those highlighted in the report:

The Defense Department’s Strategic Automated Command and Control System, which is used to send and receive emergency action messages to U.S. nuclear forces. The system is running on a 1970s IBM computing platform, and still uses 8-inch floppy disks to store data. “Replacement parts for the system are difficult to find because they are now obsolete,” GAO said. The Pentagon is initiating a full replacement and says the floppy disks should be gone by the end of next year. The entire upgrade will take longer.

Treasury’s individual and business master files, the authoritative data sources for taxpayer information. The systems are about 56 years old, and use an outdated computer language that is difficult to write and maintain. Treasury plans to replace the systems, but has no firm dates.

Social Security systems that are used to determine eligibility and estimate benefits, about 31 years old. Some use a programming language called COBOL, dating to the late 1950s and early 1960s. “Most of the employees who developed these systems are ready to retire and the agency will lose their collective knowledge,” the report said. “Training new employees to maintain the older systems takes a lot of time.” Social Security has no plans to replace the entire system, but is eliminating and upgrading older and costlier components. It is also rehiring retirees who know the technology.

Medicare’s Appeals System, which is only 11 years old, but facing challenges keeping up with a growing number of appeals, as well as questions from congressional offices following up on constituent concerns. The report says the agency has general plans to keep updating the system, depending on the availability of funds.

The Transportation Department’s Hazardous Materials Information System, used to track incidents and keep information relied on by regulators. The system is about 41 years old, and some of its software is no longer supported by vendors, which can create security risks. The department plans to complete its modernization program in 2018.

GAO estimates that the government spent at least $80 billion on information technology, or IT, in 2015. However, the total could be significantly higher. Not counted in the report are certain Pentagon systems, as well as those run by independent agencies, among them the CIA. Major systems are known as “IT investments” in government jargon. More here from WashingtonPost.

*****

Smarter than Google?

This new search engine could be way smarter than Google

Search engines that aren’t Google rarely have much that’s interesting to offer to the average consumer. But Omnity, a new search engine aimed at researchers — or even just students doing their homework — offers some glimmers of something new that make it worth taking notice.

Search, as we know it, is ripe for some sort of change, after all. Google is certainly working to bake search more fully into our cars, phones and other devices. Specialized search engines — for flights, places to stay, even .gifs — are going strong.  And then there are those AI bots being promised by Google, Facebook, Microsoft and others. What are they but high-powered, repackaged search engines?

Omnity stands out by offering results that best match for any given search term and also how those results relate to each other. So if you’re about to start a research project on a topic you know little about, you can quickly see who is getting cited the most, whose research is the most influential or which university is leading the pack on that subject. It draws from a number of data sets, including SEC filings, public news organization reports, scientific journals, financial reports and legal histories.

You can also drag and drop documents into the search engine to get an analysis of the “rare words” in it — Omnity obviously strips out the little words like “he,” “she,” “it” and “but,” yet also looks for words that are more unique to any given document to get a better idea of what it’s about. For example, I dragged in a legal filing from a case I’m researching for another article. Omnity turned up links to other cases that were relevant but not directly cited in the filing, as well as the names of some experts that I may now end up calling. More from WashingtonPost.

 

Did you Know the EPA has a SuperFund?

     

EPA’s Superfund program is responsible for cleaning up some of the nation’s most contaminated land and responding to environmental emergencies, oil spills and natural disasters. To protect public health and the environment, the Superfund program focuses on making a visible and lasting difference in communities, ensuring that people can live and work in healthy, vibrant places.

There are well regulations. Since when are they followed?

Superfund Regulations

The National Oil and Hazardous Substances Pollution Contingency Plan (NCP) defines the organizational structure and procedures for preparing for and responding to discharges of oil and releases of hazardous substances, pollutants, and contaminants in the United States. The NCP was developed by the Environmental Protection Agency (EPA) in response to the congressional enactment of The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) of December 11, 1980, as amended by the Superfund Amendments and Reauthorization Act of 1986 (SARA), and by section 311(d) of the Clean Water Act (CWA). This page contains links to other EPA Web pages with simplified explanations of the Superfund regulatory process. Other links access Code of Federal Regulations that document the technical considerations and requirements of CERCLA and the NCP.

Enforcement activities related to the Superfund Division at EPA Headquarters is overseen by the Office of Site Remediation Enforcement (OSRE), a division of the EPA Office of Enforcement and Compliance Assurance.

The history of the Superfund: Since 1980, EPA’s Superfund program has helped protect human health and the environment by managing the cleanup of the nation’s worst hazardous waste sites and responding to local and nationally significant environmental emergencies. Below you will find a timeline highlighting some of the most notable milestones in the history of the Superfund and other cleanup programs.

So are they going to pay for the spill that contaminated the river or for the water crisis in Flint, Michigan?

There are secret meetings too!

STAR CHAMBER: EPA Holding Secret Meetings to Decide How to Dole out Billions in Illegal Slush Funds

Two internal Environmental Protection Agency (EPA) committees secretly control how billions of dollars are spent, a Daily Caller News Foundation investigation has found.

Congress appropriates about $1 billion annually for EPA’s Superfund program, and the agency has accumulated nearly $6.8 billion in more than 1,300 slush fund-like accounts since 1990.

No mention of that on their website but check this out:

Supplemental Environmental Projects at Ammonia Facilities in Arizona and California

ammonia sign

Ammonia Sign

Two ammonia refrigeration facilities have volunteered to complete Supplementary Environmental Projects (SEPs), that will benefit their surrounding communities, as part of enforcement settlements with EPA. The SEPs will enhance the emergency response capabilities of local fire and hazardous materials response teams in the immediate areas of the facilities and will also include compliance outreach in California’s San Joaquin Valley.

Dole Packaged Foods in Atwater, California (map) and Rousseau Farming Company in Tolleson, Arizona (map) both had releases of ammonia in 2006 and failed to immediately notify the proper authorities, violations of the Emergency Planning and Community Right-To-Know Act (EPCRA), and the Comprehensive Environmental Response, Compensation and Liability Act (CERCLA). In addition to the release reporting violations, Dole failed to develop standard operating procedures for the ammonia system where the release occurred, constituting a violation of the Clean Air Act (CAA).

“We are pleased that both Dole and Rousseau have acknowledged their violations and recognized their responsibility to improve safety practices in their communities. Supplemental environmental projects are an excellent mechanism for companies to demonstrate good corporate citizenship and to fulfill their responsibilities under the law” -Daniel A. Meer, EPA Region 9’s Response, Planning and Assessment Branch Chief

As part of the SEP, Rousseau will spend $15,000 on 14 suits for the Tolleson Fire Department to use when responding to chemical fires. This is in addition to a $65,045 penalty. Dole will spend a total of $86,930 for the penalty and $12,000 on a compliance training and $53,000 on emergency response equipment for Merced County.

IG Report on Hillary Not Following Guidelines

Only today the report was given to members of Congress for review. So maybe that ‘security review’ thing Hillary continued to mention was the IG’s report. Well hee hee, if so, Hillary flunked that review.

Would you like to read the report? Here is the 83 page Inspector General summary for your convenience. The Inspector General is a neutral position and the report does make recommendations. The report does become part of the FBI two track investigation. Consider the timing of all of this, the hearings in Congress, the interrogatories by Judicial Watch, the extradition of the hacker Guccifer who appeared in court today and pled guilty, the leak of the Terry McAuliffe donations and now this. Hummmm….

 

 

OIG makes eight recommendations. They include issuing enhanced and more frequent guidance on the permissible use of personal email accounts to conduct official business, amending Departmental policies to provide for administrative penalties for failure to comply with records preservation and cybersecurity requirements, and developing a quality assurance plan to address vulnerabilities in records management and preservation. The Department concurred with all of OIG’s recommendations.

The title:

Office of the Secretary: Evaluation of Email Records Management and Cybersecurity Requirements

State Dept. watchdog: Clinton violated email rules

The inspector general report is the latest headache for Clinton in the scandal over her exclusive use of private email for State business.

Politico: A State Department watchdog concluded that Hillary Clinton failed to comply with the agency’s policies on records while using a personal email server that was not approved by agency officials even though it should have been, according to a report released to lawmakers on Wednesday.

The long-awaited findings from the agency’s inspector general, which also revealed Clinton expressing reluctance about using an official email account and apparent hacking attempts on her private server, were shared with Capitol Hill Wednesday, a copy of which was obtained by POLITICO. It’s the latest turn in the headache-inducing saga that has dogged Clinton’s campaign.

While the report concludes that the agency suffers from “longstanding, systemic weaknesses” with records that “go well beyond the tenure of any one Secretary of State,” it specifically dings Clinton for her exclusive use of private email during her four years at the agency.

“Secretary Clinton should have preserved any Federal records she created and received on her personal account by printing and filing those records with the related files in the Office of the Secretary,” the report states. “At a minimum, Secretary Clinton should have surrendered all emails dealing with Department business before leaving government service and, because she did not do so, she did not comply with the Department’s policies that were implemented in accordance with the Federal Records Act.”

The report also notes that she had an “obligation to discuss using her personal email account” but did not get permission from the people who would have needed to approve the technology.

“According to the current [chief information officer] and assistant secretary for diplomatic security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs,” the report reads. “However, according to these officials, [the relevant people] did not — and would not — approve her exclusive reliance on a personal email.”

The watchdog also “found no evidence that the Secretary requested or obtained guidance or approval to conduct official business via a personal email account on her private server.”

The report also included a revealing November 2011 exchange in which Clinton’s right-hand staffer Huma Abedin discussed with her the possibility of putting her on a State Department email because her messages were not being received by State staff.

Clinton responded with concerns of privacy issues.

“We should talk about putting you on [S]tate email or releasing your email address to the department so you are not going to spam,” she wrote.

Clinton responded: “Let’s get separate address or device but I don’t want any risk of the personal being accessible.”

The watchdog’s findings could exact further damage to Clinton’s campaign, and they provide fresh fodder for Trump, who has already said he will go after Clinton for the email scandal “bigly.” The Democratic frontrunner’s bid for the White House has already been hindered by high unfavorability ratings, with people saying they don’t trust her.

The report represents the latest pushback — in this case by a nonpartisan government entity — against her campaign’s claim that she did not break any rules and that her use of a private server was completely allowed.

The report also details how some technology staff said they were instructed to not talk of Clinton’s email set-up after they raised concerns about the unusual arrangement. It also includes conflicting information about whether the private email server had been approved by the State Department’s legal staff.

“In one meeting, one staff member raised concerns that information sent and received on Secretary Clinton’s account could contain Federal records that needed to be preserved in order to satisfy Federal recordkeeping requirements,” the document states. “According to the staff member, the Director stated that the Secretary’s personal system had been reviewed and approved by Department legal staff and that the matter was not to be discussed any further. As previously noted, OIG found no evidence that staff in the Office of the Legal Adviser reviewed or approved Secretary Clinton’s personal system.”

The watchdog report goes on to say that a staff member from the office that handles information technology for the Office of the Secretary recounted the hush nature of the email arrangement.

“According to the other S/ES-IRM staff member who raised concerns about the server, the Director stated that the mission of S/ES-IRM is to support the Secretary and instructed the staff never to speak of the Secretary’s personal email system again,” the report states.

The report further gets into security concerns about the private email server, including some fears that the server was vulnerable to hackers.

It states that a non-State adviser to Bill Clinton, who was the original user of the server later taken over by Hillary Clinton, shut down the server in early 2011 because of hacking concerns.

“On January 9, 2011, the non-Departmental advisor to President Clinton who provided technical support to the Clinton email system notified the Secretary’s Deputy Chief of Staff for Operations that he had to shut down the server because he believed ‘someone was trying to hack us and while they did not get in i didnt [sic] want to let them have the chance to,’” the report says. “Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, ‘We were attacked again so I shut [the server] down for a few min.’”

The report goes on to detail another incident in May and says that Clinton and her staff did not appropriate report the matters.

“Notification is required when a user suspects compromise of, among other things, a personally owned device containing personally identifiable information,” it says. “However, OIG found no evidence that the Secretary or her staff reported these incidents to computer security personnel or anyone else within the Department.”

State has since deemed more than 2,000 of her messages as classified, including several that were upgraded to the most sensitive national security classification, “top secret.” And the FBI is still probing whether any laws were broken laws by putting classified information at risk — or whether her staff improperly sent sensitive information knowing it wasn’t on a classified system.

At the very least, State’s inspector general says she didn’t do what she was supposed to, though it also notes widespread email issues across the tenures of five secretaries of state, not just Clinton.

“OIG recognizes that technology and Department policy have evolved considerably since Secretary Albright’s tenure began in 1997. Nevertheless, the Department generally and the Office of the Secretary in particular have been slow to recognize and to manage effectively the legal requirements and cybersecurity risks associated with electronic data communications, particularly as those risks pertain to its most senior leadership,” the report concluded. “OIG expects that its recommendations will move the Department steps closer to meaningfully addressing these risks.”

The report states that its findings are based on interviews with current Secretary of State John Kerry and his predecessors Madeleine Albright, Colin Powell and Condoleezza Rice.

Clinton and her deputies, however, declined the IG’s requests for interviews. Clinton’s former chief of staff Cheryl Mills and top deputies Jake Sullivan and Huma Abedin are among those who did not cooperate with the probe.

Clinton and her allies have contended she did nothing illegal by choosing to set up a private email server and account at her Chappaqua, New York, home, and that she was not trying to evade public records requests. Instead, Clinton has said she was motivated by the desire for convenience, though she has conceded it was not the best choice.

The State Department has released roughly 30,000 emails Clinton turned over to her former agency at its request in December 2014. While there were no apparent bombshells in the content of the messages, the number of emails later deemed classified has raised questions about the security and wisdom of the set-up.

Clinton has also faced scrutiny for instructing her staff to delete about 32,000 messages deemed personal by her team. It’s unclear how many of those emails the FBI may have been able to recover from her server — which was turned over to authorities last August — or whether those messages will eventually be made public.

The report gives more details of the under-the-radar work of Clinton’s top technology staffer, Bryan Pagliano, who she paid to maintain her private email server. State’s chief information officer and deputy chief information officers, Pagliano’s direct bosses, told investigators that he never informed them of his side duties. They “believed that Pagliano’s job functions were limited to supporting mobile computing issues across the entire Department.”

“They told OIG that while they were aware that the Senior Advisor had provided IT support to the Clinton Presidential campaign, they did not know he was providing ongoing support to the Secretary’s email system during working hours,” the report reads.

The top technology officers also told investigators they “questioned whether he could support a private client during work hours, given his capacity as a full-time government employee.”

Pagliano took the Fifth and refused to answer questions on the matter before Congress but received immunity from the FBI to talk about the email arrangement. Lawmakers on Capitol Hill have been eager to question him on whether Clinton intentionally used private email because she didn’t want anyone getting access to her messages.

 

 

 

DOJ: Lawyers Behind the N. Carolina Bathroom Lawsuit

Radicals….throughout the whole Justice Department but here are the backgrounds of those who Loretta Lynch has assigned to sue North Carolina on the bathroom (genderless) lawsuit. Terrifying….

The Justice Department sent out the guidance letter to public schools in several languages and that document is here.

This is a matter placed under Title IX, Sex Discrimination.

By the way, make sure you use proper words as you could be sued in this regard as well.

A sign marks the entrance to a gender-neutral restroom at the University of Vermont in Burlington, Vt.

These Are the Radical DOJ Lawyers Suing North Carolina Over Transgender Bathroom Use