Need to Know Facts on EB-5 Visa Program

In 1999, yes under President Bill Clinton and selling out sovereignty under a globalist agenda:

   

FAS: The immigrant investor visa was created in 1990 to benefit the U.S. economy through employment creation and an influx of foreign capital into the United States. The visa is also referred to as the EB-5 visa because it is the fifth employment preference immigrant visa category. The EB-5 visa provides lawful permanent residence (i.e., LPR status) to foreign nationals who invest a specified amount of capital in a new commercial enterprise in the United States and create at least 10 jobs. The foreign nationals must invest $1,000,000, or $500,000 if they invest in a rural area or an area with high unemployment (referred to as targeted employment areas or TEAs).

There are approximately 10,000 visas available annually for foreign national investors and their family members (7.1% of the worldwide employment-based visas are allotted to immigrant investors and their derivatives). In FY2015, there were 9,764 EB-5 visas used, with 93% going to investors from Asia. More specifically, 84% were granted to investors from China and 3% were granted to those from Vietnam.

In general, an individual receiving an EB-5 visa is granted conditional residence status. After approximately two years the foreign national must apply to remove the conditionality (i.e., convert to full-LPR status). If the foreign national has met the visa requirements (i.e., invested and sustained the required money and created the required jobs), the foreign national receives full LPR status. If the foreign national investor has not met the requirements or does not apply to have the conditional status removed, his or her conditional LPR status is terminated, and, generally, the foreign national is required to leave the United States, or will be placed in removal proceedings.

In 1992, Congress established the Regional Center (Pilot) Program, which created an additional pathway to LPR status through the EB-5 visa category. Regional centers are “any economic unit, public or private, which [are] involved with the promotion of economic growth, including increased export sales, improved regional productivity, job creation, and increased domestic capital investment.” The program allows foreign national investors to pool their investment in a regional center to fund a broad range of projects within a specific geographic area. The investment requirement for regional center investors is the same as for standard EB-5 investors. As the use of EB-5 visas has grown, so has the use of the Regional Center Program. In FY2014, 97% of all EB-5 visas were issued based on investments in regional centers. Unlike the standard EB-5 visa category, which does not expire, the Regional Center Program is set to expire on September 30, 2016.

Different policy issues surrounding the EB-5 visa have been debated. Proponents of the EB-5 visa contend that providing visas to foreign investors benefits the U.S. economy, in light of the potential economic growth and job creation it can create. Others argue that the EB-5 visa allows wealthy individuals to buy their way into the United States.

In addition, some EB-5 stakeholders have voiced concerns over the delays in processing EB-5 applications and possible effects on investors and time sensitive projects. Furthermore, some have questioned whether U.S. Citizen and Immigration Services (USCIS) has the expertise to administer the EB-5 program, given its embedded business components. The Department of Homeland Security’s Office of the Inspector General (DHS OIG) has recommended that USCIS work with other federal agencies that do have such expertise, while USCIS has reported that it has taken steps internally to address this issue. USCIS has also struggled to measure the efficacy of the EB-5 category (e.g., its economic impact). USCIS methodology for reporting investments and jobs created has been called into question by both the DHS OIG and the U.S. Government Accountability Office (GAO).

 

Furthermore, some have highlighted possible fraud and threats to national security that the visa category presents. In comparison to other immigrant visas, the EB-5 visa faces additional risks of fraud that stem from its investment components. Such risks are associated with the difficulty in verifying that investors’ funds are obtained lawfully and the visa’s potential for large monetary gains, which could motivate individuals to take advantage of investors and can make the visa susceptible to the appearance of favoritism. USCIS has reported improvements in its fraud detection but also feels certain statutory limitations have restricted what it can do. Additionally, GAO believes that improved data collection by USCIS could assist in detecting fraud and keeping visa holders and regional centers accountable.

Lastly, the authority of states to designate TEAs has raised concerns. Some have pointed to the inconsistency in TEA designation practices across states and how it could allow for possible gerrymandering (i.e., all development occurs in an area that by itself would not be considered a TEA). Others contend that the current regulations allow states to determine what area fits their economic needs and allow for the accommodation of commuting patterns.

In addition to the issues discussed above, Congress may consider whether the Regional Center Program should be allowed to expire, be reauthorized, or made permanent, given its expiration on September 30, 2016. In addition, Congress may consider whether any modifications should be made to the EB-5 visa category or the Regional Center Program. Legislation has been introduced in the 114th Congress that would, among other provisions, amend the program to try to address concerns about fraud, and change the manner in which TEAs are determined. Other bills would create an EB-5-like visa category for foreign national entrepreneurs who do not have their own capital but have received capital from qualified sources, such as venture capitalists. Read more here.

 

Cyber: New Strategic Operation v. ISIS

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command.

SecurityAffairs: The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems used by the ISIL and to track its cyber hubs.

In March, Senior Pentagon officials revealed the military’s first use of cyber warfare operations against the ISIL terrorist group.

The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul.

The US military is using cyber tools to contrast the ISIS troops in the area, interfering  members’ operation and communication.

Now the US Government wants to use all the hacking tools in its cyber arsenal against the Islamic State. The New Your Times revealed that until now the Cyber Command operations were more focused on cyber disputes against Russia, China, Iran, and North Korea.

“The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing.” states the NYT. “But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.”

The goal of the new campaign is to disrupt the propaganda activities managed by the Islamic State, but also interfere with IS daily functions, like paying its fighters.

“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama saidat the C.I.A. headquarters in Langley, Va., on countering the Islamic State.

The deputy secretary of defense, Robert O. Work, confirmed the goals of the cyber operations that were conducted by a small number of “national mission teams.”

“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”

The NYT, citing interviews withs senior and midlevel officials, confirmed that the US cyber army has begun to deploy a series of “implants” in the networks of the Islamic State to spy on its commanders.

“Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.” continues the NYT. “In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.”

The fact that the US Government is admitting the use of cyber weapons that would have unpredictable effects over vast areas of the planet raising major questions over an invasion of sovereignty.

Of course, now we are speaking to contrast the Islamic State and everything seems to be admitted to destroying the threat.

“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” said Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff,

“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”

Of course, part of the intelligence consider very dangerous the use of the implants against the Islamic State. The same implants are used to infiltrate the networks of foreign government and there is the concrete risk that these operations allow foreign intelligence agencies to detect them and neutralize their effects. Another side effect is that the Islamic State militants would stop the use of a communications channel starting one that was harder to monitor.

“N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.” states the NYT.

“It’s a delicate balance,” said Mr. Obama’s national security adviser, Susan E. Rice. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”

Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser met technology executives at IT giants calling for action against the online activities of the Islamic State.

****  

In part from the DailyBeast: The American military’s campaign of cyber attacks against ISIS is far more serious than what the president laid out in his bland description. Three U.S. officials told The Daily Beast that those operations have moved beyond mere disruption and are entering a new, more aggressive phase that is targeted at individuals and is gleaning intelligence that could help capture and kill more ISIS fighters.

As the U.S. ratchets up its online offensive against the terror group, U.S. military hackers are now breaking into the computers of individual ISIS fighters. Once inside the machines, these hackers are implanting viruses and malicious software that allow them to mine their devices for intelligence, such as names of members and their contacts, as well as insights into the group’s plans, the officials said, speaking on condition of anonymity to describe sensitive operations.

In remarks at CIA headquarters in Langley, Virginia, this week, Obama confirmed that cyber operations were underway and noted that recently the U.S. has either captured or killed several key ISIS figures, including Sulayman Dawud al-Bakkar, a leader of its chemical weapons program, and “Haji Iman,” the man purported to be ISIS’s second in command.

The military has also used cyber operations to block ISIS’s use of encrypted communications, in order to force members to use less secure channels where they can be more easily monitored, officials said. That tactic appears to be a response to ISIS’s effective use of encrypted text applications in particular, which officials had said previously made it harder for the military and intelligence community to track individual fighters.

Iran Forces Them to Fight for Assad

Fatimiyoun Brigade

A comprehensive summary is here.

The Islamic Republic of Iran now controls part–though not all–of Yemen, Iraq, Syria, and Lebanon, while Turkey is another contender.

***

The creation of an Afghan Shia division in the Iranian Revolutionary Guards structure is not new, and dates back to the Iran-Iraq war during the 1980s when an Afghan Shia force, the Abouzar Brigade, was formed to help fight Iraq.

So….while the White House, the National Security Council and the State Department want Assad removed from power and while the Obama regime is pro-Iran, how do they square this conundrum exactly? It should also be mentioned that those ‘Syrian’ refugees flooding into Europe are hardly all Syrian, in fact few are.

In part from BBC: Fatemioun Brigade, an all-Afghan unit commanded by Revolutionary Guards officers.

“The Iranian Revolutionary Guards Corps decided that the Syrian military could not succeed on their own,” he told the BBC. “The frontlines were too depleted and men were trying to avoid conscription.”

The Iranians decided to set up a 50,000-strong National Defence Force to fight alongside the Syrian army.

Photo obtained by opposition Syria Media Organization purportedly showing Afghan fighters in Syria

With a shortage of willing fighters inside Syria, they began looking elsewhere – signing up Iranian Afghans, Lebanese, Iraqi and Pakistani Shia recruits.

As the five-year conflict in Syria grinds on, BBC Persian has found evidence that Iran is sending thousands of Afghan men to fight alongside Syrian government forces.

The men, who are mainly ethnic Hazaras, are recruited from impoverished and vulnerable migrant communities in Iran, and sent to join a multi-national Shia Muslim militia – in effect a “Foreign Legion” – that Iran has mobilised to support Syrian President Bashar al-Assad.

Many have since fled the battlefield and joined the refugee trail to Europe.

In a small town in Germany, we meet “Amir”, an Afghan man in his early twenties.

He was born to refugee parents in Isfahan, Iran, and is now himself an asylum seeker in Europe.

Like most of the almost three million Afghans in Iran, he lived as a second-class citizen.

Without legal residency or identity documents, he found it hard to get an education or a job. Fear of arrest and deportation was a daily reality.

Human Rights Watch recently estimated as many as 10,000 Afghans may have been recruited by the Revolutionary Guards.

Iran’s foreign ministry has denied any Afghans are being sent in an official capacity. The official narrative from Tehran is that they are all volunteers, off to defend holy sites of their own volition.

But every week in Iran there are more military-style funerals for fallen Fatemioun fighters.

And with a major government spring offensive around Aleppo in the offing, it seems Iran’s Foreign Legion will be fighting – and dying – for President Assad for some time to come. Full article here.

****

AJ: “Iran is recruiting fighters from Shia communities across the world to fight in Syria,” continued al-Abdah, who is based in Turkey.

“Iran considers itself the one and only reference point for all Shia people in the whole world. It organises them into political, social, and military organisations, both in their local communities and abroad.

“This is part of the main mission of the Iranian regime in terms of exporting the revolution. Iran recruits, motivates, organises, finances, and trains Shias from all over the world to help support Bashar al-Assad’s regime from collapsing.” More here.

As for Iran and the Iranian Revolutionary Guard Corps, go here for the plotted objectives and study titled:

The Rise of the Pasdaran

Assessing the Domestic Roles of Iran’s

Islamic Revolutionary Guards Corps

 

Electronic Warfare, the Emerging War Platform

Russia Begins Test Of New Electronic Warfare System

DefenseWorld: Russia has begun testing a ground-based electronic warfare system that is capable of protecting the troops and civilian facilities from an air and space attack, TASS reported Monday.

A source from Concern Radio-Electronic Technologies (KRET), a subsidiary of State Corporation Rostec, told TASS that it has launched factory testing of components of a ground-based electronic warfare system, capable of protecting the troops and civilian facilities from air and space attack weapons. The tests will be completed during the year.

Integrated with antiaircraft defense systems, the electronic warfare system is capable of conducting real-time automated exchange of data on the actions of the aerospace grouping for purposes of centralized target assignment, according to the report.

The system consists of separate jamming modules that are capable of influencing the enemy’s command and control system at long distances emitting a powerful and complex digital signal. “Multichannel stations that ensure simultaneous inhibition of various avionics systems have been created”, the company representative said.

The consortium’s First Deputy Director General Igor Nasenkov is quoted by the company’s press service as saying that the jamming modules are elements of a hierarchically-structured multilevel system.

“Their energy, frequency and intellectual resources are distributed in an optimal way. In addition, all the modules are equipped with individual defense sets because they are the prime targets for enemy’s attack”, he said.

Previously, the company’s deputy head Yuri Mayevsky told TASS that the system will be installed on ground platforms, aircraft and offshore platforms.

*****

WASHINGTON: With the rise of high-tech threats from Russia and China, the Marine Corps plans a major increase in its forces devoted to jamming, hacking, and deceiving enemies. That includes:

  • putting new sensors and jammers in everything from ground units to drones to V-22 Osprey tiltrotors and KC-130 transports, despite a tight budget;
  • adding 1,000 to 3,000 more personnel, carved out of other parts of a Marine Corps legally limited to 182,000 active-duty troops. (That’s on top of a 1,300-plus increase in these specialties over the last several years);
  • retraining skilled electronic warriors from disbanded EA-6B Prowler squadrons to work with ground units and drones;
  • consolidating disparate disciplines — from offensive cyber warfare and electronic warfare to psychological operations and military deception — into a new “information warfare” force.

 Electronic Warfare (EW) represents the ability to use the electromagnetic spectrum—signals such as radio, infrared or radar—to sense, protect, and communicate. At the same time, it can be used to deny adversaries the ability to either disrupt or use these signals.

EW is divided into three (3) major areas:

Electronic Attack

Electronic Attack
Disrupting a signal, for example
electronic jammers
Electronic Protection
Preventing a receiver from being jammed
Electronic Support
Electronic Support
In the air, on land, and at sea, Lockheed Martin pioneers advanced technologies to control the electromagnetic spectrum, and develops disruptive technologies to outpace adversary threats. The key to success lies not only in the capability of the systems we provide, but integration of those systems across platforms to offer a complete picture of the battle space and unimpeded use of the electromagnetic spectrum for the warfighter.

Comrade Ayatollah, it Always Points Back to Russia/USSR

 

“Is Iran’s Supreme Leader Ayatollah Ali Khamenei a graduate of the Patrice Lumumba People’s Friendship University in Moscow? Did the KGB recruit Khamenei as a spy in the 1960’s? Is Soviet indoctrination and ideological training to blame for Khamenei’s hatred of the United States? The Persian blogosphere is boiling over with speculations about Khamenei’s alleged Soviet connections. The affair started Wednesday, as Iranian bloggers discovered Russia Today’s February 5, 2010 report on the 50th anniversary of the People’s Friendship University in Moscow, in which Khamenei is mentioned among the university’s “most notable graduates.” A claim also appears on Russia Today’s website, although the reference is made to “Iran’s Supreme Leader Ali Khomeini,” an obvious mistake. Subsequently, Iranian bloggers identified other Russian sources making the very same claim: The November 25, 2003 issue of Kommersant presents Khamenei as a People’s Friendship University graduate…………….”

Patrice Lumumba University was named after the murdered first Congolese prime minister after independence from Belgium. Lumumba was allegedly killed by Congolese rivals and Western intelligence services. I believe that to be true: Lumumba was perceived as a ‘communist’ by the West during the peak of the Cold War. The Soviet university attracted many third world students, and it is possible that a young Khamenei was among them, but it is highly unlikely. I doubt it very much: he must have started as a student of Islamic faith at a young age. Or maybe he was groomed as a communist mole inside Qom, a potential Manchurian Ayatollah. If true this would mean that Khamenei also speaks Russian in addition to Persian, Arabic, and Turkish. He is as much a communist as the Saudi Mufti is a secret Shi’a, as much as Bashar al-Assad is a Salafi.

  

Introduction:

For close to a century, destiny has played a bitter game with our ancient homeland. The winds of bizarre events have left us Iranians in a historical abeyance. Addicted to our shared agony and engrossed in our daily demise, we have even lost the ability to ponder the starting point of this common grief. Perhaps if our fathers sought out the root of this shared agony, a feasible solution would have emerged. What you are about to read is the result of two decades of chasing after questions that have perplexed me for half of my life. Finally when I started writing this book four years ago, I anticipated many possible outcomes. I expected this book to evolve into the biography of a ruthless dictator or the discovery of an old Soviet espionage network. But in my wildest dreams I could not have imagined that Comrade Ayatollah would turn into perhaps one of the largest research collections that sheds light on the darkest political and criminal dossiers in Iranian history. Today I declare with certainty that I have identified the root of the historical agony of our people and I have no doubt that all those who follow me on this journey to the conclusion of the book will acquire a new viewpoint on what has come to pass in our nation during the past century. The key to identifying the root cause of this shared agony lies not in our country but far away in the heart of Iran’s Northern neighbor — in the vast nation of Russia. The same place where in 1905 sparks of revolution were ignited in Tsarist Russia. Twelve years later, the flames of the Bolshevik Revolution at first engulfed the people of this expansive country and then spread to ancient Iran and other parts of the world to reduce their history, culture and identity to ashes.

Comrade Ayatollah investigates in ten chapters documents related to the pivotal role of the Soviet Union’s security agency in the planning and execution of the Islamic Revolution of 1979 and this terrifying organization’s subsequent covert facilitation of the ascent of Seyed Ali Khamenei to the position of Absolute Supreme Leader in Iran. In each of these ten chapters you will encounter one of the hidden secrets and terrifying mysteries in the history of the Islamic Revolution. While deciphering these enigmas, I also provide material for independent research and a suggested topic for case studies.

The first chapter is a review of the history of the Cold War the origins of which can be traced back to the rivalry between two victors of World War I — the Russians and the British — for the control of the partitioned Ottoman territory. The Ottomans were the big losers of the war and the most prized spoils of war left behind by their defeated army were the historic lands of the Middle East and North Africa. The Bolshevik Revolution that coincided with the end of World War I kept the Russians from controlling a part of this valuable territory and thus Great Britain and France remained the two powers that won control over the lion’s share of the Middle East. After the 1917 revolution and the establishment of the Soviet Union, the Russians once again began eyeing territories outside the boundaries of this newly established empire.

Their creeping influence accelerated in the former Ottoman territories, from Mesopotamia to Palestine and from Morocco to Egypt. With the advent of World War II, the Russian and the British armies entered Iran from the north and south, respectively, and occupied the entire country with the excuse that Iran was a supporter of Nazi Germany. The clandestine influx of the Soviet intelligence service’s spies and agents under the guise of the Red Army provided the opportunity for the Russians to penetrate all strata of society in the broad geographical expanse of Iran. At the end of World War II, the British army immediately began to withdraw. The Soviet Red Army months later under international pressure especially from the United States withdrew, but its intelligence service’s spies never left Iran. The result of their three-decade long operations in Iran to  recruit and train elements loyal to the Soviet Union was the December 1979 Islamic Revolution. What transpired during this bitter era in Iran, the Middle East and North Africa has been depicted in this chapter.

The second chapter details the names of some of the powerful political figures who were trained in Moscow by the Soviet intelligence service for the roles they would play during the days leading up to the revolution and the years that followed, along with their respective biographies highlighting the services they rendered to the Russians. All this information is based on secret documents that are published for the first time in this book. We will see that all three influential factions in the Islamic Republic’s closed political circle in the past three decades have been in the service of Soviet intelligence. Seyed Ali Khamenei who leads the conservative or hardliners’ faction, Seyed Mohammad Moussavi Khoeiniha who is the spiritual father of the Reformist faction, and some of Mahmoud Amadinejad’s closest advisors including Kamran Daneshjoo, Mahmoud Mollabashi and Arsalan Ghorbani who comprise the neo-conservative faction are all graduates of the Patrice Lumumba University in Moscow, the official international spy training center for the Russians since 1960.

Read more here if you have the courage for history.