Should Voting Systems be Classified as Critical Infrastructure?

While members of all political party voters seem to diss the notion that Russia intruded on voting systems in 2016, the proof is there. If you watched former DHS Secretary Jeh Johnson during his congressional testimony, it was not so much his responses but more about what members of congress know, to pose questions to Johnson.

Image result for u.s. voting systems

J. Alex Halderman, a professor of computer science and engineering at the University of Michigan, contended U.S. election equipment is “vulnerable to sabotage” that “could change votes.”

“We’ve found ways for hackers to sabotage machines and steal votes. These capabilities are certainly within reach for America’s enemies,” Halderman told senators.

He said he and his team spent 10 years researching cyber vulnerabilities of election equipment. The professor said:

Some say that the fact that voting machines aren’t directly connected to the internet makes them secure. But, unfortunately, this is not true. Voting machines are not as distant from the internet as they may seem. Before every election, they need to be programmed with races and candidates. That programming is created on a desktop computer, then transferred to voting machines. If Russia infiltrated these election management computers, it could have spread a vote-stealing attack to a vast number of machines. I don’t know how far Russia got or whether they managed to interfere with equipment on Election Day. More here from Daily Signal.

Okay…still a non-believer? Let’s see what the States experiences.

Image result for voter registration database

Click here for additional video and interactive map of states using paper ballot backup systems.

Elections officials outgunned in Russia’s cyberwar against America

WASHINGTON/Charlotte Observer

Local officials consistently play down suspicions about the long lines at polling places on Election Day 2016 that led some discouraged voters in heavily Democratic Durham County, N.C., to leave without casting a ballot.

Minor glitches in the way new electronic poll books were put to use had simply gummed things up, according to local elections officials there. Elections Board Chairman William Brian Jr. assured Durham residents that “an extensive investigation” showed there was nothing to worry about with the county’s new registration software.

He was wrong.

What Brian and other election officials across eight states didn’t know until the leak of a classified intelligence is that Russian operatives hacked into the Florida headquarters of VR Systems, Inc., the vendor that sold them digital products to manage voter registrations.

A week before the election, the hackers sent emails using a VR Systems address to 122 state and local election officials across the country, inviting them to open an attachment wired with malicious software that spoofed “legitimate elections-related services,” the report said. The malware was designed to retrieve enough additional information to set the stage for serious mischief, said the National Security Agency report disclosed by the Intercept, an investigative web site.

That wasn’t the only type of attack.

The new revelations about the Kremlin’s broad and sophisticated cyber offensive targeting Democrat Hillary Clinton and aimed at seating Donald Trump in the Oval Office have set off a wave of worry about the security of the nation’s voting systems. State election officials, facing questions as to whether they ignored oddities or red flags, have responded by accusing intelligence agencies of failing to alert them of the risks.

The truth is a hodge-podge of electronic machinery that enables Americans to exercise their most sacred democratic right is weakly guarded by state and local agencies. Those officials are quick to assure the voting public that their systems are secure, but they lack the resources and technical know-how to defend against cyber intrusions, or even to perform forensic examinations to ensure nothing happened.

Election officials in Illinois, another state that VR Systems lists as a customer, did not find out they were hacked by Russian operatives late last June until a week or two later. By then, the Russian operatives had downloaded about 90,000 voter registration records, leading to an investigation by the FBI and the U.S. Department of Homeland Security, said Ken Menzel, general counsel of the Illinois Board of Elections. Menzel confirmed a Bloomberg report that the Russians appeared to have made unsuccessful attempts to alter or delete some records.

In Georgia, where a nationally watched congressional runoff race is scheduled for Tuesday, Politico magazine reported that a U.S. hacker from a national laboratory seeking to expose vulnerabilities in election systems was able to easily download millions of voter records from Kennesaw State University’s Center for Election Systems, which manages them. Election watchdog groups say subsequent warnings to the state about a hole in their system went unheeded for months.

David Jefferson, a computer scientist at the Lawrence Livermore National Laboratory in California who has acted in his personal capacity in trying to safeguard election integrity, said he believes it is “absolutely possible” that the Russians affected last year’s election.

“And we have done almost nothing to seriously examine that,” he said.

“The Russians really were engaged in a pattern of attacks against the machinery of the election, and not merely a pattern of propaganda or information warfare and selective leaking,” said Alex Halderman, a University of Michigan computer science professor. “The question is, how far did they get in that pattern of attacks, and were they successful?” Election officials across the country may not even know if they’ve been attacked, computer scientists say, pointing to the scenario that played out in Durham County.

EASY PREY

State and local voting systems appear to be easy prey for sophisticated hackers.

Five states use electronic voting machines with no paper backups, precluding audits that might verify the accuracy of their vote counts. They include Georgia, scene of Tuesday’s 6th District runoff election, Delaware, Louisiana, New Jersey and South Carolina. Parts of another nine states also are paperless, including the crucial swing state of Pennsylvania.

Although Congress has discouraged use of internet voting because of the potential for hackers to tamper with ballots, some 32 states allow military and overseas voters to transmit ballots online or via insecure fax machines. Alaska, Washington state and Hawaii have been the most permissive.

“If we don’t fix our badly broken system before the next major presidential election, we’re going to be hacked into,” said Barbara Simons, author of “Broken Ballots,” a 2012 book about election security published by Stanford University. “It might not just be Russia. It might be North Korea, China, Iran or partisans.”

While the Netherlands opted to shift to paper ballots when alerted the Russians were trying to swing its election outcome to the right, U.S. election officials have stood pat.

But former FBI Director James Comey, in widely watched testimony to the Senate Intelligence Committee on June 8, said “there should be no fuzz” about Russia’s barrage of millions of social media messages spreading falsehoods about Clinton.

“The Russians interfered in our election during the 2016 cycle,” he said. “They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts … And it is very, very serious.”

America’s saving grace could be its decentralized system in which cities, counties and states have used federal grants to procure a wide variety of voting equipment, limiting the potential impact of a single attack.

But that doesn’t mean targeted attacks couldn’t tip the outcome of closely divided races, even for the presidency.

CRITICAL INFRASTRUCTURE

On Jan. 6, American intelligence agencies issued a declassified report accusing Russia of the cyber attack ultimately aimed at helping Trump, calling it the Kremlin’s “boldest” operation ever aimed at influencing the United States. In a brief notation, the report said that, while the Russians targeted state and local voting systems, they did not attempt to corrupt vote-tallying equipment.

On the same day the report was released, in one of his last acts as U.S. secretary of Homeland Security, Jeh Johnson proclaimed the nation’s election systems to be “Critical Infrastructure,” a designation that not only makes their security a higher priority, but improves the climate for federal-state cooperation. Because state and local officials exert total control over their operations, the agency only can investigate a vulnerability or possible breach if asked to do so – an obstacle the new designation didn’t change.

A senior Homeland Security official, in an interview with McClatchy, batted down as wildly exaggerated a Bloomberg report stating that Russian cyber operatives had made “hits” on voting systems in 39 states. Every web site is constantly scanned by “bad actors,” just as burglars might case homes in a neighborhood. That doesn’t equate to hacking, said the official, who spoke on condition of anonymity because of the sensitivity of the matter.

“The ability to manipulate the vote tally, that’s quite complicated,” the Homeland Security official said. “We didn’t see an ability to really accomplish that even in an individual voting machine. You have to have physical access to do that. It’s not as easy as you think.”

Some of the nation’s top experts in voting security disagree.

Lawrence Livermore’s Jefferson voiced frustration with the “defensive” refrain of denials from state and local election officials, including the National Association of Secretaries of State.

“Election officials do not talk about vulnerabilities,” Jefferson said, “because that would give the advantage to the attacker. And they don’t want to undermine public confidence in elections.”

Halderman said Homeland Security officials told him they were unaware of a single county in any state that had conducted post-election forensic examinations of their voting equipment.

The Homeland Security official who spoke with McClatchy said the main concern for agency cyber specialists is not about vote-tampering; it’s related to the ability of intruders to sow confusion and chaos. That could entail schemes to foul voter registration data by, for example, removing the names of voters from the rolls so they are turned away at polling stations.

“This scenario is what we witnessed on the ground in North Carolina on Election Day,” said Susan Greenhalgh, a spokeswoman for the election watchdog group Verified Voting.

“If attackers wanted to impact an election through an attack on a vendor like VR Systems,” she said, “they could manipulate or delete voter records impacting a voter’s ability to cast a regular ballot. Or, they could cause the E-Pollbooks (electronic databases of voters) to malfunction, hampering the check-in process and creating long lines.”

North Carolina was considered to be a swing state in the presidential race, and Durham County, with an African-American population of more than 37 percent, had voted more than 75 percent in favor of putting and keeping Barack Obama in the White House. Last year’s governor’s race was a dead heat entering Election Day.

The chaos in Durham County led to 90-minute delays. Some voters rang a Voter Protection Hotline to complain that their names had disappeared from the registration system or that they were told they already had voted.

The county hired a contractor to investigate the foul-up, but the inquiry never examined whether the system was hacked.

Twenty other North Carolina counties used the system, including Mecklenburg County, encompassing most of Charlotte. Though none reported problems on the scale of Durham County, release of the NSA report prompted the North Carolina Board of Elections to order a new investigation.

A former FBI agent is leading the inquiry. Critics say the three-member investigative team again lacks expertise in forensics.

Mindy Perkins, VR Systems’ president and chief executive officer, said in a statement that the company immediately notified all of its customers as soon as it was alerted “to an obviously fraudulent email purporting to come from VR Systems” and advised them not to click on the attachment.

“We are only aware of a handful of our customers who actually received the fraudulent email,” she said. “We have no indication that any of them clicked on the attachment or were compromised as a result.”

She said the company has “policies and procedures in effect to protect our customers and our company.”

Even so, Russia succeeded in sneaking up on U.S. agencies, voting system vendors and intelligence agencies.

Halderman, the University of Michigan expert, said he believes the best solution is for states to require paper trails for all voting equipment and post-election audits to ensure the vote counts are authentic.

“There’s no guarantee that we’ll know we’re under attack,” he said, “unless we do the quality control that we need by doing these audits to detect manipulation.”

 

 

 

 

Global Blackouts, Anywhere in the World, Courtesy Russia

Fitful sleep last night after reading a very long detailed piece on Russian hackers versus Ukraine. Why, well the same tools and language they use have been found on American infrastructure and systems. Last thoughts before sleep were those of life before the internet and how people get emails with attachments that should never be opened. The short summary is just below. The more detailed and terrifying truth follows. It is a long summary, must be read…it is something like a cyber Hitchcock Twilight Zone disaster thriller, but it happened and happened often.

Image result for cyber war russia and us

Further, during a hearing in the House with former DHS Secretary, Jeh Johnson revealed a couple of key facts. One is told that during the election cycle, when the DNC hack, officials on numerous requests refused assistance, cooperation and discussions with DHS and FBI about foreign cyber intrusions. What was the DNC hiding? The other fact is Obama had the full details in intelligence briefings daily leading into November and December and refused to tell the country about Russian interference. He waited until after the elections and into December to take action. Why?

Okay, read on….

Image result for ukraine blackout CommentaryMagazine

Russia’s New Cyber Weapon Can Cause Blackouts Anywhere in the World

Hackers working with the Russian government have developed a cyber weapon that can disrupt power grids, U.S researchers claim. The cyber weapon has the potential to be absolutely disruptive if used on electronic systems necessary for the daily functioning of American cities.

The malicious software was used to shut down one-fifth of the electric power generated in Kiev, Ukraine last December. Called ‘CrashOverride’ the malware only briefly disrupted the power system but its potential was made clear.

With development, the cyber weapon could easily be used against U.S with devastating effects on transmission and distribution systems.

Sergio Caltagirone, director of threat intelligence for Dragos, a cybersecurity firm that examined the malware said, “It’s the culmination of over a decade of theory and attack scenarios, it’s a game changer.”

Dragos has dubbed the group of hackers who created the bug and used it in Ukraine, Electrum. The group and the virus have also been under scrutiny by cyber intelligence firm, FireEye, headed by John Hultquist. Hultquist’s company has nicknamed the group Sandworm and are keeping watch for clues of another attack.

The news of the malware comes in the middle of the ongoing investigation into Russia’s influence on the recent Presidential election. The Russian government is accused of trying to influence the outcome of the election by hacking hundreds of political organizations and leveraging social media.

While there is no hard evidence yet, U.S. officials believe the disruptive power hackers are closely connected to the Russian Government. U.S. based energy sector experts agree the malware is a huge concern and concede they are seeking ways to combat potential attacks.

“U.S utilities have been enhancing their cybersecurity, but attacker tools like this one pose a very real risk to reliable operation of power systems,”said Michael Assante, who worked at Idaho National Labs and is former chief security officer of the North American Electric Reliability Corporation.

CrashOverride

CrashOverride is only the second known instance of malware specifically designed to destroy or disrupt industrial control systems. The U.S. and Israel worked together to create Stuxnet, a bug designed to disrupt Iran’s nuclear enrichment program.

Robert M. Lee, chief executive of Dragos believes CrashOverride could be manipulated to attack other types of industrial control such as gas or water, though there has been no demonstration of that yet. But the sophistication of the entire operation is undeniable. The hackers had the resources to only develop the malware but to test it too.

The malware works by scanning for critical components that operate circuit breakers, then opening these breakers, which stops the flow of electricity. It continues to keep the circuit breakers open, even if a grid operator tries to close them. CrashOverride also cleverly comes with a “wiper” component that erases the existing software on the computer system that controls the circuit breakers. This forces the grid operator to revert to manual operations, which means a longer and more sustained power outage.

Potential outages could last a few hours and probably not more than a couple of days as U.S. power systems are designed to have high manual override capabilities necessary in extreme weather.

As mentioned above, you need to read the full detailed version here and just how the FBI, global cyber experts at the request of Ukraine worked diligently for accurate attribution to a Russian cyber force intruding on power systems. Hat tip to these experts and the story needs to go mainstream, as we are in a cyber war, the depths impossible to fully comprehend. Ukraine is the target and cyber incubation center for Russian cyber terrorists where they test, review, adapts and keep going without consequence.

Image result for ukraine blackout

Okay, read it all here. Hat tip for the detailed summary and the people doing quiet investigative cyber work.

 

The Slow Death of Britain and Europe

There have been a number of terror attacks in recent weeks in Britain and across Europe. No one is willing to discuss the causes for fear of retribution by migrant groups, religious organizations and government leaders.

The most recent attack occurred when Darren Osbourne, originally from Whales rented a van and ran into several people outside the Finsbury Park mosque killing one and injuring several others. He is being charged with terror activities. Islamists have been waiting for this reckoning and the powder keg continues to smolder.

The Finsbury Park mosque has a nasty history.

*** Moving on to yet another secret in Britain…

Why Did British Police Ignore Pakistani Gangs Abusing 1,400 Rotherham Children? Political Correctness

A story of rampant child abuse—ignored and abetted by the police—is emerging out of the British town of Rotherham. Until now, its scale and scope would have been inconceivable in a civilized country.  Its origins, however, lie in something quite ordinary: what one Labour MP called “not wanting to rock the multicultural community boat.”

Imagine the following case. A fourteen-year old girl is taken into care by the social services unit of the town where she lives, because her parents are drug-addicted, and she has been neglected and is not turning up in school. She is one of many, for that is the way in Britain today. And local government entities—Councils—can be ordered by the courts to stand in for parents of neglected children. The Council places the girl in a home, where she is kept with others under supervision from the social services department. The home is regularly visited by young men who try to entice the girls into their cars, so as to give them drugs and alcohol, and then coerce them into sex.

***

The girl, who is lonely and uncared for, meets a man outside the home, who promises a trip to the cinema and a party with children of her age. She falls into the trap. After she has been raped by a group of five men she is told that, if she says a word to anyone, she will be taken from the home and beaten. When, after the episode is repeated, she threatens to go to the police, she is taken into the countryside, doused in petrol, and told that she is going to be set alight, unless she promises to tell no one of the ordeal.

Social workers tell girls they cannot help them

Meanwhile she must accept weekly abuse, in return for drugs and alcohol. Soon she finds herself being taken to other towns in the area, and hired out for sexual purposes to other men. She is distraught and depressed, and at the point when she can stand it no longer, she goes to the police. She can only stutter a few words, and cannot bring herself to accuse anyone in particular. Her complaint is dismissed on the grounds that any sex involved must have been consensual. The social worker in charge of her case listens to her complaint, but tells her that she cannot act unless the girl identifies her abusers. But when the girl describes them the social worker switches off with a shrug and says that she can do nothing. Her father, his drug habit notwithstanding, has tried to keep contact with his daughter and suspects what is happening. But when he goes to the police, he is arrested for obstruction and charged with wasting police time.

Over the two years of her ordeal the girl makes several attempts on her own life, and eventually ends up abandoned and homeless, without an education and with no prospect of a normal life.

Impossible, you will say, that such a thing could happen in Britain. In fact it is only one of over 1,400 cases, all arising during the course of the last fifteen years in the South Yorkshire town of Rotherham, all involving vulnerable girls either in Council care or inadequately protected by their families from gangs of sexual predators. Almost no arrests have been made, no social workers or police officers have been reprimanded, and until recently the matter was dismissed by all those responsible as a matter of no real significance. Increasing public awareness of the problem, however, led to complaints, triggering a series of official reports. The latest report, from Professor Alexis Jay, former chief inspector of social work in Scotland, gives the truth for the first time, in 153 disturbing pages. One fact stands out above all the horrors detailed in the document, which is that the girl victims were white, and their abusers Pakistani.

 ***
Sociologists convinced government that the police are racist

Fifteen years ago, when these crimes were just beginning, the Stephen Lawrence Inquiry into the conduct of the British police was made by Sir William Macpherson a High Court judge. The immediate occasion had been a murder in which the victim was black, the perpetrators white, and the behaviour of the investigating police lax and possibly prejudiced. The report accused the police – not just those involved in the case, but the entire police force of the country – of ‘institutionalised racism’. This piece of sociological newspeak was, at the time, very popular with leftist sociologists. For it made an accusation which could not be refuted by anyone who had the misfortune to be accused of it.

However well you behaved, however scrupulously you treated people of different races and without regard to their ethnic identity or the colour of their skin, you would be guilty of ‘institutionalised racism’, simply on account of the institution to which you belonged and on behalf of which you were acting. Not surprisingly, sociologists and social workers, the vast majority of whom are professionally disposed to believe that middle class society is incurably racist, latched on to the expression. MacPherson too climbed onto the bandwagon since, at the time, it was the easiest and safest way to wash your hands in public, to say that I, at least, am not guilty of the only crime that is universally recognised and everywhere in evidence.

Police more concerned with political correctness than crime

The result of this has been that police forces lean over backwards to avoid the accusation of racism, while social workers will hesitate to intervene in any case in which they could be accused of discriminating against ethnic minorities. Matters are made worse by the rise of militant Islam, which has added to the old crime of racism the new crime of ‘Islamophobia’. No social worker today will risk being accused of this crime. In Rotherham a social worker would be mad, and a police officer barely less so, to set out to investigate cases of suspected sexual abuse, when the perpetrators are Asian Muslims and the victims ethnically English. Best to sweep it under the carpet, find ways of accusing the victims or their parents or the surrounding culture of institutionalised racism, and attending to more urgent matters such as the housing needs of recent immigrants, or the traffic offences committed by those racist middle classes.

Americans too are familiar with this syndrome. Political correctness among sociologists comes from socialist convictions and the tired old theories that produce them. But among ordinary people it comes from fear. The people of Rotherham know that it is unsafe for a girl to take a taxi-ride from someone with Asian features; they know that Pakistani Muslims often do not treat white girls with the respect that they treat girls from their own community. They know, and have known over fifteen years, that there are gangs of predators on the look-out for vulnerable girls, and that the gangs are for the most part Asian young men who see English society not as the community to which they belong, but as a sexual hunting ground. But they dare not express this knowledge, in either words or deed. Still less do they dare to do so if their job is that of social worker or police officer. Let slip the mere hint that Pakistani Muslims are more likely than indigenous Englishmen to commit sexual crimes and you will be branded as a racist and an Islamophobe, to be ostracised in the workplace and put henceforth under observation.

Rotherham Town Hall. (Wikipedia) Rotherham Town Hall, Wikipedia

No One Will Be Fired

This would matter less if fear had no consequences. Unfortunately political correctness causes people not merely to disguise their beliefs but to refuse to act on them, to accuse others who confess to them, and in general to go along with policies that have been forced on the British people by minority groups of activists. The intention of the activists is to disrupt and dismantle the old forms of social order. They believe that our society is not just racist, but far too comfortable, far too unequal, far too bound up with fuddy-duddy old ways that are experienced by people at the bottom of society – the working classes, the immigrants, the homeless, the illegals – as oppressive and demeaning. They enthusiastically propagate the doctrines of political correctness as a way of taking revenge on a social order from which they feel alienated.

Ordinary people are so intimidated by this that they repeat the doctrines, like religious mantras which they hope will keep them safe in hostile territory. Hence people in Britain have accepted without resistance the huge transformations that have been inflicted on them over the last thirty years, largely by activists working through the Labour Party. They have accepted immigration policies that have filled our cities with disaffected Muslims, many of whom have now gone to fight against us in Syria and Iraq. They have accepted the growth of Islamic schools in which children are taught to prepare themselves for jihad against the surrounding social order. They have accepted the constant denigration of their country, its institutions and its inherited religion, for the simple reason that these things are theirs and therefore tainted with forbidden loyalties.

And when the truth is expressed at last, nobody is fired, no arrests are made, and the elected Police and Communities Commissioner for Rotherham, although forced to resign from the Labour Party, refuses to resign from his job. After a few weeks all will have been swept under the carpet, and the work of destruction can resume.

 

 

 

Media of The Strange Death of Europe

The Strange Death of Europe is a highly personal account of a continent and culture caught in the act of suicide. Declining birth-rates, mass immigration and cultivated self-distrust and self-hatred have come together to make Europeans unable to argue for themselves and incapable of resisting their own comprehensive change as a society. This book is not only an analysis of demographic and political realities, but also an eyewitness account of a continent in self-destruct mode. It includes reporting from across the entire continent, from the places where migrants land to the places they end up, from the people who appear to welcome them in to the places which cannot accept them. Told from this first-hand perspective, and backed with impressive research and evidence, the book addresses the disappointing failure of multiculturalism, Angela Merkel’s U-turn on migration, the lack of repatriation and the Western fixation on guilt. Murray travels to Berlin, Paris, Scandinavia, Lampedusa and Greece to uncover the malaise at the very heart of the European culture, and to hear the stories of those who have arrived in Europe from far away. In each chapter he also takes a step back to look at the bigger issues which lie behind a continent’s death-wish, answering the question of why anyone, let alone an entire civilisation, would do this to themselves? He ends with two visions of Europe – one hopeful, one pessimistic – which paint a picture of Europe in crisis and offer a choice as to what, if anything, we can do next. – See more at: http://www.bloomsbury.com/uk/the-strange-death-of-europe-9781472942241/#sthash.LFXH2Clt.dpuf

Per Obama: ‘You Cant Have the Documents for 5 Years’

Sheesh, was there a grand opening in Chicago of the Obama Presidential Library that went unreported or something? Is there some extraordinary authority that select government documents became Obama’s exclusive property by some weird executive order perhaps? Was there some tractor-trailer that pulled up to the White House in the last days of the Obama administration that boxes of government property were stolen and smuggled to parts unknown?
As of a month ago, ground was not yet broken:

Judicial Watch: Obama NSC Advisor Susan Rice’s Unmasking Material is at Obama Library

Records Sought by Judicial Watch May Remain Closed to the Public for Five Years

(Washington, DC) – Judicial Watch today announced that the National Security Council (NSC) on May 23, 2017, informed it by letter that the materials regarding the unmasking by Obama National Security Advisor Susan Rice of “the identities of any U.S. citizens associated with the Trump presidential campaign or transition team” have been removed to the Obama Library.

The NSC will not fulfill an April 4 Judicial Watch request for records regarding information relating to people “who were identified pursuant to intelligence collection activities.”

The agency also informed Judicial Watch that it would not turn over communications with any Intelligence Community member or agency concerning the alleged Russian involvement in the 2016 presidential election; the hacking of DNC computers; or the suspected communications between Russia and Trump campaign/transition officials. Specifically, the NSC told Judicial Watch:

Documents from the Obama administration have been transferred to the Barack Obama Presidential Library.  You may send your request to the Obama Library.  However, you should be aware that under the Presidential Records Act, Presidential records remain closed to the public for five years after an administration has left office.

Judicial Watch’s Freedom of Information Act (FOIA) April 4 request sought:

1.) Any and all requests for information, analyses, summaries, assessments, transcripts, or similar records submitted to any Intelligence Community member agency or any official, employee, or representative thereof by former National Security Advisor Susan Rice regarding, concerning, or related to the following:

  • Any actual or suspected effort by the Russian government or any individual acting on behalf of the Russian government to influence or otherwise interfere with the 2016 presidential election.
  • The alleged hacking of computer systems utilized by the Democratic National Committee and/or the Clinton presidential campaign.
  • Any actual or suspected communication between any member of the Trump presidential campaign or transition team and any official or employee of the Russian government or any individual acting on behalf of the Russian government.
  • The identities of U.S. citizens associated with the Trump presidential campaign or transition team who were identified pursuant to intelligence collection activities.

2.) Any and all records or responses received by former National Security Advisor Susan Rice and/or any member, employee, staff member, or representative of the National Security Council in response to any request described in part 1 of this request.

3.) Any and all records of communication between any official, employee, or representative of the Department of any Intelligence Community member agency and former National Security Advisor Susan Rice and/or any member, employee, staff member, or representative of the National Security Council regarding, concerning, or related to any request described in Part 1 of this request.

The time frame for this request was January 1, 2016, to the April 4, 2017.

While acknowledging  in its FOIA request that “we are cognizant of the finding by the Court of Appeals … that [the NSC] “does not exercise sufficiently independent authority to be an ‘agency’ for purposes of the Freedom of Information Act,” Judicial Watch argued:

The records sought in this request pertain to actions by the former National Security Advisor that demonstrate a much higher degree of independent authority than was contemplated by the court; specifically, the issuance of directives to the Intelligence Community related to the handling of classified national security information…

The recent revelations of the role of Susan Rice in the unmasking the names of U.S. citizens identified in the course of intelligence collection activities and the potential that her actions contributed to the unauthorized disclosure of classified national security information are matters of great public interest.

Judicial Watch has filed six FOIA lawsuits related to the surveillance, unmasking, and illegal leaking targeting President Trump and his associates (see hereherehereherehere and here).

“Prosecutors, Congress, and the public will want to know when the National Security Council shipped off the records about potential intelligence abuses by the Susan Rice and others in the Obama White House to the memory hole of the Obama Presidential Library,” said Judicial Watch President Tom Fitton.  “We are considering our legal options but we hope that the Special Counsel and Congress also consider their options and get these records.”

 

At Least 34 Years of Immigration Debate, Loopholes and Dollars

Image result for executive office of immigration review

The proposed Department of Justice budget request for 2018 for the Executive Office of Immigration is $421.5 million and includes 2600 employees with 831 lawyers. Judges assigned to immigration courts are being hired, shuffled around the country and have in some areas have a five year base backlog.

Image result for immigration court FoxLatino

The Executive Office for Immigration Review (EOIR) was created on January 9, 1983, through an internal Department of Justice (DOJ) reorganization which combined the Board of Immigration Appeals (BIA or Board) with the Immigration Judge function previously performed by the former Immigration and Naturalization Service (INS) (now part of the Department of Homeland Security). Besides establishing EOIR as a separate agency within DOJ, this reorganization made the Immigration Courts independent of INS, the agency charged with enforcement of Federal immigration laws. The Office of the Chief Administrative Hearing Officer (OCAHO) was added in 1987. In 2013, EOIR observed its 30th anniversary.

EOIR is also separate from the Office of Special Counsel for Immigration-Related Unfair Employment Practices in the DOJ Civil Rights Division and the Office of Immigration Litigation in the DOJ Civil Division.

As an office within the Department of Justice, EOIR is headed by a Director who reports directly to the Deputy Attorney General. Its headquarters are located in Falls Church, Virginia, about 10 miles from downtown Washington, DC.

New York City Law Creates Loophole To Avoid Deporting Criminal Illegal Immigrants

A New York City law that reclassifies several low-level offenses as non-criminal went into effect Tuesday, allowing citizen offenders to keep clean records and illegal immigrant offenders to potentially avoid deportation.

The law, passed by the city council and signed by Mayor Bill de Blasio in 2016, allows police to classify trial summonses for petty crimes as civil summonses, rather than criminal summonses. The change would affect crimes including public urination and drinking and staying in the park after dark, DNA Info reports. The change critically affects the impact of an executive order from President Donald Trump this spring ordering the deportation of illegal immigrants convicted of crimes.

Under the new law, illegal immigrants convicted of these crimes would receive a civil rather than criminal summons, which frees local law enforcement from the obligation of reporting the offender’s immigration status to Immigration and Customs Enforcement (ICE).

The law would affect cases such as Alejandro Luna, a former gang member and an illegal immigrant caught in central park after dark June 5 who now faces deportation. This would be Luna’s second deportation, the first came in 2006 after he was convicted of home-invasion and robbery. He then illegally entered the country again only to be detained on the June 5 park offense. More here.

Image result for sanctuary cities

***

Illegals presently have access to government funded healthcare. However:

The ‘Verify First Act’ by Rep. Lou Barletta (R-PA) would subsequently end American taxpayer-funded money going to illegal aliens in the form of healthcare insurance credits. The plan is being supported by NumbersUSA, a group which has staunchly advocated for Trump’s America First agenda.

“We applaud Rep. Lou Barletta for introducing the Verify First Act to ensure that illegal aliens cannot qualify for taxpayer-funded health insurance credits,” NumbersUSA Peter Robbio said in a statement. “We are grateful that the Ways and Means Committee and House Republican Leadership agreed to move this important bill forward.”

Since Obamacare’s enactment, illegal immigrants received more than $700 million in healthcare insurance credits by 2015, according to the Senate Committee on Homeland Security and Governmental Affairs.

In Barletta’s plan, healthcare insurance recipients through the American Health Care Act (AHCA) would have their citizenship and immigration statuses verified by the Social Security Administration (SSA) and the Department of Homeland Security (DHS). More here.

***

In part: Traditional sanctuary policies are often described as falling under one of three categories. First, so-called “don’t enforce” policies generally bar the state or local police from assisting federal immigration authorities. Second, “don’t ask” policies generally bar certain state or local officials from inquiring into a person’s immigration status. Third, “don’t tell” policies typically restrict information sharing between state or local law enforcement and federal immigration authorities. This report provides examples of various state and local laws and policies that fall into one of these sanctuary categories. The report also discusses federal measures designed to counteract sanctuary policies. For instance, Section 434 of the Personal Responsibility and Work Opportunity Reconciliation Act (PRWORA) and Section 642 of the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) were enacted to curb state and local restrictions on information sharing with federal immigration authorities.

State or local measures limiting police participation in immigration enforcement are not a recent phenomenon. Indeed, many of the recent “sanctuary”-type initiatives can be traced back to

activities carried out by churches that provided refuge—or “sanctuary”—to unauthorized Central American aliens fleeing civil unrest in the 1980s.13 A number of states and municipalities issued declarations in support of these churches’ actions.14 Others went further and enacted more substantive measures intended to limit police involvement in federal immigration enforcement activities.15 These measures have included, among other things, restricting state and local police from arresting persons for immigration violations, limiting the sharing of immigration-related information with federal authorities, and barring police from questioning a person about his or her immigration status.16

Still, there is no official definition of a “sanctuary” jurisdiction in federal statute or regulation.17 Broadly speaking, sanctuary jurisdictions are commonly understood to be those that have laws or policies designed to substantially limit involvement in federal immigration enforcement activities,18 though there is not necessarily a consensus as to the meaning of this term.19 Some jurisdictions have self-identified as sanctuary cities.

The federal government’s power to regulate immigration is both substantial and exclusive.23 This authority is derived from multiple sources, including Congress’s Article I powers to “establish a uniform Rule of Naturalization” and “regulate commerce with foreign nations, and among the several states,”24 as well as the federal government’s “inherent power as a sovereign to conduct relations with foreign nations.”

The Supreme Court’s 2012 ruling in Arizona v. United States—which invalidated several Arizona laws designed “to discourage and deter the unlawful entry and presence of aliens and economic activity by persons unlawfully present in the United States”28 as preempted by federal law—reinforced the federal government’s pervasive role in creating and enforcing the nation’s immigration laws.29 “The Government of the United States,” the Court said, “has broad, undoubted power over the subject of immigration and the status of aliens.”30

Yet despite the federal government’s sweeping authority over immigration, the Supreme Court has cautioned that not “every state enactment which in any way deals with aliens is a regulation of immigration and thus per se preempted” by the federal government’s exclusive power over immigration.39 Accordingly, in Arizona the Supreme Court reiterated that, “[i]n preemption analysis, courts should assume that the historic police powers of the States are not superseded unless that was the clear and manifest purpose of Congress.”40 For example, in Chamber of Commerce of the U.S. v. Whiting, the Supreme Court upheld an Arizona law—related to the states’ “broad authority under their police powers to regulate the employment relationship to protect workers within the State”41—that authorized the revocation of licenses held by state employers that knowingly or intentionally employ unauthorized aliens.42 Even though the Immigration Reform and Control Act of 1986 (IRCA) expressly preempted “any State or local law imposing civil or criminal sanctions … upon those who employ, or recruit or refer for a fee for employment, unauthorized aliens,” the Supreme Court concluded that Arizona’s law fit within IRCA’s savings clause for state licensing regimes and thus was not preempted.43

Accordingly, based on current jurisprudence, federal measures that impose direct requirements on state or municipal authorities appear most likely to withstand an anti-commandeering challenge if they (1) are not directed at a state’s regulation of the activities of private parties; and (2) apply to the activities of private parties as well as government actors.

Finally, Congress does not violate the Tenth Amendment when it uses its broad authority to enact legislation for the “general welfare” through its spending power,62 including by placing

conditions on funds distributed to the states that require those accepting the funds to take certain actions that Congress otherwise could not directly compel the states to perform.63 However, Congress cannot impose a financial condition that is “so coercive as to pass the point at which ‘pressure turns into compulsion.’”64 For example, in National Federation of Independent Business v. Sebelius, the Supreme Court struck down a provision of the Patient Protection and Affordable Care Act of 2010 (ACA) that purported to withhold Medicaid funding to states that did not expand their Medicaid programs.65 The Court found that the financial conditions placed on the states in the ACA (withholding all federal Medicaid funding, which, according to the Court, typically totals about 20% of a state’s entire budget) were akin to “a gun to the head” and thus unlawfully coercive.66

violations of federal immigration law may be criminal or civil in nature, with alien removal understood to be a civil proceeding.71 Some immigration-related conduct potentially constitutes a removable offense and also may be subject to criminal sanction. For example, an alien who knowingly enters the United States without authorization is not only potentially subject to removal,72 but could also be charged with the criminal offense of unlawful entry.73 Other violations of the INA are exclusively criminal or civil in nature. Notably, an alien’s unauthorized immigration status makes him or her removable, but absent additional factors (e.g., having reentered the United States after being formally removed),74 unlawful presence on its own is not a criminal offense.

Some jurisdictions have adopted measures that restrict or bar police officers from making arrests for violations of federal immigration law. In some jurisdictions restrictions prohibit police from detaining or arresting aliens for civil violations of federal immigration law, like unlawful presence.75 Other jurisdictions prohibit police from making arrests for some criminal violations of federal immigration law, like unlawful entry.76 Still others prohibit assisting federal immigration authorities with investigating or arresting persons for civil or criminal violations of U.S. immigration laws.77 And some other jurisdictions have prohibitions that are broader in scope, such as a general statement that immigration enforcement is the province of federal immigration authorities, rather than that of local law enforcement.

Some states and localities have restricted government agencies or employees from sharing information with federal immigration authorities, primarily to prevent federal authorities from using the information to identify and apprehend unlawfully present aliens for removal.88 For instance, some jurisdictions prohibit law enforcement from notifying federal immigration authorities about the release status of incarcerated aliens, unless the alien has been convicted of certain felonies.89 Similarly, other jurisdictions prohibit their employees from disclosing information about an individual’s immigration status unless the alien is suspected of engaging in illegal activity that is separate from unlawful immigration status.90 Some jurisdictions restrict disclosing information except as required by federal law91—sometimes referred to as a “savings clause”—although it appears that the Department of Justice has interpreted those provisions as conflicting with federal information-sharing provisions. For the full summary and context with access to footnotes, go here.