Operation No Safe Haven V

If you see a Democrat, ask them what they know about this operation and have them explain it to you please. Let just see if they get it right, OR if they know about it at all….

BTW, have you seen this guy? Martinez-Rojas, Severiano

ATLANTA – On May 21, 2013, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Atlanta and the FBI conducted search and arrest warrants for several individuals suspected of human trafficking.

Since 2006, Severiano Martinez-Rojas, along with family members Arturo Rojas-Coyotl, Odilon Martinez-Rojas, Daniel Garcia-Tepal and others, all from Tenancingo, Tlaxcala, Mexico, conspired and brought multiple women into the United States from Mexico and Guatemala, all for the purpose of forcing them to engage in prostitution.

Eight victims from Mexico and Guatemala were rescued during the course of the investigation.

Odilon Martinez-Rojas and Rojas-Coyotl have been sentenced to 21 years and 16 years in prison, respectively. Severiano Martinez-Rojas is believed to have returned to Mexico prior to the warrant execution and remains a fugitive in this case.

***

WASHINGTON — U.S. Immigration and Customs Enforcement (ICE) arrested 39 fugitives – 30 males and nine females – sought for their roles in known or suspected human rights violations during a nationwide operation that took place from Aug. 27 to 29.

The ICE National Fugitive Operations Program in coordination with the ICE Human Rights Violators and War Crimes Center, and the ICE Office of the Principal Legal Advisor, worked with ICE’s Enforcement and Removal (ERO) Atlanta, Baltimore, Chicago, Dallas, Houston, Los Angeles, Miami, New Orleans, New York City, Newark, Salt Lake City, and San Francisco field offices to arrest these fugitives.

The foreign nationals arrested during this operation all have outstanding removal orders and are subject to repatriation to their countries of origin. Of the 39 known or suspected human rights violators arrested during Operation No Safe Haven V, 16 individuals are also criminal aliens in the U.S. with convictions for crimes including, but not limited to, domestic violence, driving under the influence of liquor, drug distribution, firearm possession, grand theft, reckless endangerment, robbery, fraud and theft. Their countries of origin include: El Salvador, Guatemala, China, Liberia, Cambodia, Chad, Chile, Colombia, the Ivory Coast, Ghana, Haiti, Honduras, Jamaica, Nicaragua, Sierra Leone, and Sudan. This operation more than doubled the number of known or suspected human rights violators arrested during the first nationwide No Safe Haven operation, which took place in September 2014.

“ICE will not allow war criminals and human rights abusers to use the U.S. as a safe haven,” said Acting Director Matthew Albence. “We will never stop looking for them and we will never cease seeking justice for the victims of their crimes.”

Those arrested across the country included:

  • Fourteen individuals from Central America implicated in numerous human rights violations against civilians, to include the capture, arrest and/or transport of civilians who were subsequently mistreated, and in some cases, beaten, electrocuted, and killed;
  • Four known or suspected human rights violators from China, complicit in collaborating with the government to assist in forced abortions and sterilizations against victims;
  • Four individuals from West Africa connected to a range of atrocities, including civilian massacres, mutilations, recruitment of child soldiers, extrajudicial killings, and other human rights violations.
  • An individual from Europe implicated in human rights abuses against political opponents through work with a security agency.

ICE is committed to identifying, investigating, prosecuting and removing known or suspected human rights violators who seek a safe haven in the United States. ICE’s Human Rights Violators and War Crimes Center (HRVWCC) investigates human rights violators who try to evade justice by seeking shelter in the United States, including those who are known or suspected to have participated in persecution, war crimes, genocide, torture, extrajudicial killings, severe violations of religious freedom, female genital mutilation/cutting and the use or recruitment of child soldiers. These individuals may use fraudulent identities or falsified documents to enter the country in an attempt to blend into communities in the United States.

Members of the public who have information about foreign nationals suspected of engaging in human rights abuses or war crimes are urged to contact ICE by calling the toll-free ICE tip line at 1-866-347-2423 or internationally at 001-1802-872-6199. They can also email HRV.ICE@ice.dhs.gov or complete ICE’s online tip form.

The HRVWCC was established in 2009 to further ICE’s efforts to identify, locate and prosecute human rights abusers in the United States. The HRVWCC leverages the expertise of a select group of agents, lawyers, intelligence and research specialists, historians and analysts who direct the agency’s broader enforcement efforts against these offenders.

Since 2003, ICE has arrested more than 415 individuals for human rights-related violations of the law under various criminal and/or immigration statutes. During that same period, ICE obtained deportation orders against and physically removed more than 990 known or suspected human rights violators from the United States. Additionally, ICE has facilitated the departure of an additional 152 such individuals from the United States.

Currently, ICE has more than 170 active investigations into suspected human rights violators and is pursuing more than 1,600 leads and removals cases involving suspected human rights violators from 95 different countries. Since 2003, the HRVWCC has issued more than 75,000 lookouts for individuals from more than 110 countries and stopped over 300 human rights violators and war crimes suspects from entering the U.S.

ICE credits the success of this operation to the efforts of the U.S. National Central Bureau-Interpol Washington.

Apply More Shame to Facebook

Okay, so without much media attention, YouTube was just fined $170 million for children’s privacy violations. Hello Google? WTH? This was a settlement by the way between Google and the Federal Trade Commission.

But what about Facebook and protecting our data? We have heard and read items about how casual Facebook is with out data. But hold on, there is more.

Primer: Cambridge Analytica was a cyber spy network with political operations and twisted tactics.

In part:

The company at the centre of the Facebook data breach boasted of using honey traps, fake news campaigns and operations with ex-spies to swing election campaigns around the world, a new investigation reveals.

Executives from Cambridge Analytica spoke to undercover reporters from Channel 4 News about the dark arts used by the company to help clients, which included entrapping rival candidates in fake bribery stings and hiring prostitutes to seduce them.

In one exchange, the company chief executive, Alexander Nix, is recorded telling reporters: “It sounds a dreadful thing to say, but these are things that don’t necessarily need to be true as long as they’re believed.” More here.

Meanwhile:

Techcrunch: Hundreds of millions of phone numbers linked to Facebook accounts have been found online.

The exposed server contained more than 419 million records over several databases on users across geographies, including 133 million records on U.S.-based Facebook users, 18 million records of users in the U.K., and another with more than 50 million records on users in Vietnam.

But because the server wasn’t protected with a password, anyone could find and access the database.

Each record contained a user’s unique Facebook ID and the phone number listed on the account. A user’s Facebook ID is typically a long, unique and public number associated with their account, which can be easily used to discern an account’s username.

But phone numbers have not been public in more than a year since Facebook restricted access to users’ phone numbers.

TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebook’s own password reset feature, which can be used to partially reveal a user’s phone number linked to their account.

Some of the records also had the user’s name, gender and location by country.

fb 3 2

This is the latest security lapse involving Facebook data after a string of incidents since the Cambridge Analytica scandal, which saw more than 80 million profiles scraped to help identify swing voters in the 2016 U.S. presidential election.

Since then the company has seen several high-profile scraping incidents, including at Instagram, which recently admitted to having profile data scraped in bulk.

This latest incident exposed millions of users’ phone numbers just from their Facebook IDs, putting them at risk of spam calls and SIM-swapping attacks, which relies on tricking cell carriers into giving a person’s phone number to an attacker. With someone else’s phone number, an attacker can force-reset the password on any internet account associated with that number.

Sanyam Jain, a security researcher and member of the GDI Foundation, found the database and contacted TechCrunch after he was unable to find the owner. After a review of the data, neither could we. But after we contacted the web host, the database was pulled offline.

Jain said he found profiles with phone numbers associated with several celebrities.

Facebook spokesperson Jay Nancarrow said the data had been scraped before Facebook cut off access to user phone numbers.

“This data set is old and appears to have information obtained before we made changes last year to remove people’s ability to find others using their phone numbers,” the spokesperson said. “The data set has been taken down and we have seen no evidence that Facebook accounts were compromised.”

But questions remain as to exactly who scraped the data, when it was scraped from Facebook and why.

Facebook has long restricted developers‘ access to user phone numbers. The company also made it more difficult to search for friends’ phone numbers. But the data appeared to be loaded into the exposed database at the end of last month — though that doesn’t necessarily mean the data is new.

This latest data exposure is the most recent example of data stored online and publicly without a password. Although often tied to human error rather than a malicious breach, data exposures nevertheless represent an emerging security problem.

In recent months, financial giant First American left data exposed, as did MoviePass and the Senate Democrats.

Feds Prepare States for Foreign Voting Interference

The Democrats have really lost their argument against voter ID if they are being fully candid about foreign interference. It is without question that several cities and states are victims of ransomware and Florida is especially concerned. Remember that a foreign actor, where clues point to Russia were able to gain access to voter registration databases and it stands to reason China will attempt the same.

Continually, the Democrats say that the Trump administration is virtually doing nothing to protect the election system. Read on as the Democrats know the mission and actions of the Cyber division of the Department of Homeland Security.

Image result for foreign hackers us voting systems photo
As Reuters reports:

The U.S. government plans to launch a program in roughly one month that narrowly focuses on protecting voter registration databases and systems ahead of the 2020 presidential election.

These systems, which are widely used to validate the eligibility of voters before they cast ballots, were compromised in 2016 by Russian hackers seeking to collect information. Intelligence officials are concerned that foreign hackers in 2020 not only will target the databases but attempt to manipulate, disrupt or destroy the data, according to current and former U.S. officials.

“We assess these systems as high risk,” said a senior U.S. official, because they are one of the few pieces of election technology regularly connected to the Internet.

The Cybersecurity Infrastructure Security Agency, or CISA, a division of the Homeland Security Department, fears the databases could be targeted by ransomware, a type of virus that has crippled city computer networks across the United States, including recently in Texas, Baltimore and Atlanta.

“Recent history has shown that state and county governments and those who support them are targets for ransomware attacks,” said Christopher Krebs, CISA’s director. “That is why we are working alongside election officials and their private sector partners to help protect their databases and respond to possible ransomware attacks.”

A ransomware attack typically locks an infected computer system until payment, usually in the form of cryptocurrency, is sent to the hacker.

The effort to counter ransomware-style cyberattacks aimed at the election runs parallel to a larger intelligence community directive to determine the most likely vectors of digital attack in the November 2020 election, according to current and former U.S. officials.

“It is imperative that states and municipalities limit the availability of information about electoral systems or administrative processes and secure their websites and databases that could be exploited,” the FBI said in a statement, supporting the Homeland Security initiative.

CISA’s program will reach out to state election officials to prepare for such a ransomware scenario. It will provide educational material, remote computer penetration testing, and vulnerability scans as well as a list of recommendations on how to prevent and recover from ransomware.

These guidelines, however, will not offer advice on whether a state should ultimately pay or refuse to pay ransom to a hacker if one of its systems is already infected.

“Our thought is we don’t want the states to have to be in that situation,” said a Homeland Security official. “We’re focused on preventing it from happening.”

Over the last two years, cyber criminals and nation state hacking groups have used ransomware to extort victims and create chaos. In one incident in 2017, which has since been attributed to Russian hackers, a ransomware virus was used to mask a data deletion technique, rendering victim computers totally unusable.

That attack, dubbed “NotPetya,” went on to damage global corporations, including FedEx and Maersk, which had offices in Ukraine where the malware first spread.

The threat is concerning because of its potential impact on voting results, experts say.

“A pre-election undetected attack could tamper with voter lists, creating huge confusion and delays, disenfranchisement, and at large enough scale could compromise the validity of the election,” said John Sebes, chief technology officer of the ESET Institute, an election technology policy think tank.

The databases are also “particularly susceptible to this kind of attack because local jurisdictions and states actively add, remove, and change the data year-round,” said Maurice Turner, a senior technologist with the Center for Democracy and Technology. “If the malicious actor doesn’t provide the key, the data is lost forever unless the victim has a recent backup.”

Nationwide, the local governments that store and update voter registration data are typically ill-equipped to defend themselves against elite hackers.

State election officials told Reuters they have improved their cyber defenses since 2016, including in some cases preparing backups for voter registration databases in case of an attack. But there is no common standard for how often local governments should create backups, said a senior Homeland Security official.

“We have to remember that this threat to our democracy will not go away, and concern about ransomware attacks on voter registration databases is one clear example,” said Vermont Secretary of State Jim Condos. “We’re sure the threat is far from over.”

 

President Trump, As Long as You are Declassifying…

Providing declassification authority to AG William Barr on all things Russia investigation is a great thing. Patriotic Americans need to understand all the abuses of power that were applied by Democrat operatives since your nomination.

Then as long as there is the matter of Israel and Iran that continues to fester and maintain a political as well as militant component, there are at least two suggestions noted below that will for sure be favorable to your foreign policy and will likely have some positive outcomes for domestic policy.

Let’s go back to 2016 and 2017 shall we? Congressman Louis Gohmert of Texas was part of a hearing where then Eric Holder was the witness. At one point, Gohmert demanded that Holder declassify and release the Holyland Foundation trial documents. ALL OF THEM. tic toc…

Since then, Gohmert is still ringing the bell. He continues to plea for more attention to the Muslim Brotherhood and CAIR so that a legitimate status can be attached to black list those organizations.

So as long as Congresswomen Ilhan Omar and Rashida Tlaib continue the path to attack Israel, consider Gohmert’s presentations.

In both House floor presentations, Congressman Gohmert lays out a cogent argument and rightly so. You can bet that ‘The Squad’ and Speaker Pelosi would certainly feel the political pain. The media? Yes, popcorn ready.

Now, on the Iran component. To remind the reader, there was once a DEA mission called Operation Cassandra. This was a multiple agency investigation with major opportunities to indict so many both at home and abroad. This mission to continue to completion was killed by President Obama because it would have complicated the Obama/Kerry quest to see the JCPOA through to the end. Frankly, Operation Cassandra had many piece parts including Bowe Bergdahl and the Afghanistan thing. Then should also take a long look at Bruce Ohr at the DoJ and his work assignments at the time.

January 7th, 2018 Operation Cassandra Is Awan Contra - YouTube (in full disclosure, I have done several interviews with former DEA Special Agent, Derek Maltz on Operation Cassandra)

For some basic details on Operation Cassandra, note below in part:

In its determination to secure a nuclear deal with Iran, the Obama administration derailed an ambitious law enforcement campaign targeting drug trafficking by the Iranian-backed terrorist group Hezbollah, even as it was funneling cocaine into the United States, according to a POLITICO investigation.

The campaign, dubbed Project Cassandra, was launched in 2008 after the Drug Enforcement Administration amassed evidence that Hezbollah had transformed itself from a Middle East-focused military and political organization into an international crime syndicate that some investigators believed was collecting $1 billion a year from drug and weapons trafficking, money laundering and other criminal activities.

Over the next eight years, agents working out of a top-secret DEA facility in Chantilly, Virginia, used wiretaps, undercover operations and informants to map Hezbollah’s illicit networks, with the help of 30 U.S. and foreign security agencies.

They followed cocaine shipments, some from Latin America to West Africa and on to Europe and the Middle East, and others through Venezuela and Mexico to the United States. They tracked the river of dirty cash as it was laundered by, among other tactics, buying American used cars and shipping them to Africa. And with the help of some key cooperating witnesses, the agents traced the conspiracy, they believed, to the innermost circle of Hezbollah and its state sponsors in Iran.

They followed cocaine shipments, tracked a river of dirty cash, and traced what they believed to be the innermost circle of Hezbollah and its state sponsors in Iran.

But as Project Cassandra reached higher into the hierarchy of the conspiracy, Obama administration officials threw an increasingly insurmountable series of roadblocks in its way, according to interviews with dozens of participants who in many cases spoke for the first time about events shrouded in secrecy, and a review of government documents and court records. When Project Cassandra leaders sought approval for some significant investigations, prosecutions, arrests and financial sanctions, officials at the Justice and Treasury departments delayed, hindered or rejected their requests.

Pros of Buying Drugs at https://canadianbestpills.com/buy-tadapox-online-cheap/ Brick-and-Mortar Pharmacies
When it comes to buying drugs at physical drugstores, you may enjoy a number of privileges such as the ones listed below:
You can always be sure that you are dealing with a certified service provider whose products are licensed and effective posing no risks to your health;
You have a chance to consult a certified pharmacist to get exactly what you need without any risk of getting a wrong product;

The Justice Department declined requests by Project Cassandra and other authorities to file criminal charges against major players such as Hezbollah’s high-profile envoy to Iran, a Lebanese bank that allegedly laundered billions in alleged drug profits, and a central player in a U.S.-based cell of the Iranian paramilitary Quds force. And the State Department rejected requests to lure high-value targets to countries where they could be arrested.

Of course there is more Mr. President. However, if you order release of just these two files in full on a well timed schedule it will play well in your favor and be an excellent counter-measure against the Pelosi lead House, the media, restoring some law and order and give a huge lift to John Bolton and Mike Pompeo’s good work.

 

Historical Look at Afghanistan, US in or Out?

As we hear the talks with the Taliban have concluded with the United States, we have no idea just yet whether the United States will keep troops in country in an unknown quantity. Could it be that the Taliban have truly defeated coalition nations in Afghanistan that victory for the Taliban is real?

What could happen next if the Taliban shares rule of the nation? More Taliban, more al Qaeda, more ISIS? Or could there be another Russian invasion? How about other major conflicts in the future that include the Tajiks, the Uzbecks or maybe the Hazaras? Or China?

In particular, the analysis cites a local media report claiming that local militias of former Tajik Mujahedeen have started to remobilizing alongside the Afghan National Defense and Security Forces in Afghanistan’s Panjshir province because of an uptick in threats against the province from the Taliban. The media report, published by TOLO News, claims the area has “changed to a hub for insurgents’ activities over the past few weeks.”

Afghanistan - Comintern (SH) - for a communist Afhjanistan ... photo

Going back in time:

Genghis Khan took over the territory in the 13th century, but it wasn’t until the 1700s that the area was united as a single country. By 1870, after the area had been invaded by various Arab conquerors, Islam had taken root.

During the 19th century, Britain, looking to protect its Indian empire from Russia, attempted to annex Afghanistan, resulting in a series of British-Afghan Wars (1838-42, 1878-80, 1919-21).

1921

The British, beleaguered in the wake of World War I, are defeated in the Third British-Afghan War (1919-21), and Afghanistan becomes an independent nation. Concerned that Afghanistan has fallen behind the rest of the world, Amir Amanullah Khan begins a rigorous campaign of socioeconomic reform.1926

Amanullah declares Afghanistan a monarchy, rather than an emirate, and proclaims himself king. He launches a series of modernization plans and attempts to limit the power of the Loya Jirga, the National Council. Critics, frustrated by Amanullah’s policies, take up arms in 1928 and by 1929, the king abdicates and leaves the country.

1933

Zahir Shah becomes king. The new king brings a semblance of stability to the country and he rules for the next 40 years.

1934

The United States formally recognizes Afghanistan.

1947

Britain withdraws from India, creating the predominantly Hindu but secular state of India and the Islamic state of Pakistan. The nation of Pakistan includes a long, largely uncontrollable, border with Afghanistan.

1953

The pro-Soviet Gen. Mohammed Daoud Khan, cousin of the king, becomes prime minister and looks to the communist nation for economic and military assistance. He also introduces a number of social reforms including allowing women a more public presence.

1956

Soviet Premier Nikita Khrushchev agrees to help Afghanistan, and the two countries become close allies. More here.

***

Afghanistan “Is On The Path Towards Completing Another Monumental Struggle Of Freedom From American Imperialism In The 21st Century”

“The centennial of Afghanistan gaining independence from the British colonialists will be celebrated on 28th of Assad of the Hijri solar calendar [corresponding with August 19, 2019]. Exactly a century earlier our righteous mujahid predecessors gained freedom from the British occupiers after long drawn-out battles, and as a result Afghanistan became a shining beacon on how to attain freedom from Western imperialists for oppressed people worldwide.

“Sovereignty or political freedom is the God-given right of every nation. A people can only become a peer of others when they are independent in their political actions. Even though some people in the current world order only care about worldly interests and do not give much thought to spiritual values such as independence, freedom and sovereignty… The reality is that the most valued treasure possessed by humanity remains their spiritual values. It is this spirituality that distinguishes humans from other living beings because they seemingly have no other superiority over other beings in worldly matters.

“Even as our Muslim nation remains one of the most underdeveloped in worldly matters due to constant foreign invasions… its spiritual chest is overflowing with riches and pride. Our nation is not only the first to gain independence from the British colonialists but also holds the honor of shattering the Soviet Union and freeing itself from the shackles of communism in the 20th century, and is on the path towards completing another monumental struggle of freedom from American imperialism in the 21st century.”

“All Segments Of The Mujahid Afghan Nation Must Rise To Fulfill Their Religious And Moral Obligation; They Must Back The Mujahideen”

“Now as we are approaching a centennial of independence from British colonialism, this opportunity must be used by our younger generation to diligently study the history of their mujahid forefathers so that they may comprehend that freedom is such an immeasurable blessing that our forefathers fought great prolonged battles over it against British imperialism. And as today the valiant grandchildren [i.e., the Taliban fighters] of this believing nation have presented their heads as offering, they understand full well that a Muslim nation can only live a life of honor when they are independent and free from influence of infidel occupiers. More here.