Why is China Protecting North Korea? Reasons Abound

Primer:

The United States Computer Emergency Readiness Team (US-CERT) issued a technical alert about the activity of the North Korea’s ‘Hidden Cobra’ APT group.
The joint Technical Alert (TA) report is the result of the efforts between of the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).

The US Government has tracked the hacker group as Hidden Cobra, but the APT is most popular as the Lazarus APT Group.

The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks and experts that investigated on the crew consider it highly sophisticated.

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems.  Security researchers discovered that North Korean Lazarus APT group was behind recent attacks on banks, including the Bangladesh cyber heist.

According to security experts, the group was behind, other large-scale cyber espionage campaigns against targets worldwide, including the Troy Operation, the DarkSeoul Operation, and the Sony Picture hack.

The joint alert from the FBI and the DHS further details on the group, including indicators of compromise (IoC) for its DeltaCharlie botnet involved in the “Operation Blockbuster” to power DDoS attacks. More here.

*** Most of North Korea’s cyber operations are located in China hosted on Chinese communications internet/communications platforms. It is espionage of an epic standard. But let us go deeper.

Related reading: The North Korea-Cuba Connection including arms sales

Related reading: DPRK-Cuba relations showcase mutual support and solidarity 

(Remember, Obama removed Cuba in 2015 from the terror list as a means to establish the process to normalize relations)

 

*** Image result for north korea minerals

Few think of North Korea as being a prosperous nation. But it is rich in one regard: mineral resources.

Currently North Korea is alarming neighbors with its frequent missile tests, and the US with its attempts to field long-range nuclear missiles that can hit American cities. A sixth nuclear test could be imminent. An attack on the US or its allies would be suicidal, so Pyongyang probably aims to extract “aid” from the international community in exchange for dismantling some of its weaponry—rewind about 10 years to see the last time it pulled off the old “nuclear blackmail” trick.

 AP

But however much North Korea could extract from other nations that way, the result would pale in comparison to the value of its largely untapped underground resources.

Below the nation’s mostly mountainous surface are vast mineral reserves, including iron, gold, magnesite, zinc, copper, limestone, molybdenum, graphite, and more—all told about 200 kinds of minerals. Also present are large amounts of rare earth metals, which factories in nearby countries need to make smartphones and other high-tech products.

Image result for north korea minerals NKNews

Estimates as to the value of the nation’s mineral resources have varied greatly over the years, made difficult by secrecy and lack of access. North Korea itself has made what are likely exaggerated claims about them. According to one estimate from a South Korean state-owned mining company, they’re worth over $6 trillion. Another from a South Korean research institute puts the amount closer to $10 trillion.

State of neglect

North Korea has prioritized its mining sector since the 1970s (pdf, p. 31). But while mining production increased until about 1990—iron ore production peaked in 1985—after that it started to decline. A count in 2012 put the number of mines in the country at about 700 (pdf, p. 2). Many, though, have been poorly run and are in a state of neglect. The nation lacks the equipment, expertise, and even basic infrastructure to properly tap into the jackpot that waits in the ground.

In April, Lloyd R. Vasey, a senior adviser at the Center for Strategic and International Studies, noted that:

North Korean mining production has decreased significantly since the early 1990s. It is likely that the average operational rate of existing mine facilities is below 30 per cent of capacity. There is a shortage of mining equipment and North Korea is unable to purchase new equipment due to its dire economic situation, the energy shortage and the age and generally poor condition of the power grid.

It doesn’t help that private mining is illegal in communist North Korea, as are private enterprises in general (at least technically). Or that the ruling regime, now led by third-generation dictator Kim Jong-un, has been known to, seemingly on a whim, kick out foreign mining companies it’s allowed in, or suddenly change the terms of agreements.

Despite all this, the nation is so blessed with underground resources that mining makes up roughly 14% of the economy.

A “cash cow”

China is the sector’s main customer. Last September, South Korea’s state-run Korea Development Institute said that the mineral trade between North Korea and China remains a “cash cow” for Pyongyang despite UN sanctions, and that it accounted for 54% (paywall) of the North’s total trade volume to China in the first half of 2016. In 2015 China imported $73 million in iron ore from North Korea, and $680,000 worth of zincin the first quarter of this year.

North Korea has been particularly active in coal mining in recent years. In 2015 China imported about $1 billion worth of coal from North Korea. Coal is especially appealing because it can be mined with relatively simple equipment. Large deposits of the stuff are located near major ports and the border with China, making the nation’s bad transportation infrastructure less of an issue.

For years Chinese buyers have purchased coal from North Korea at far below the market rate. As of last summer, coal shipments to China accounted for about 40% (paywall) of all North Korean exports. But global demand for coal is declining as alternatives like natural gas and renewables gain momentum, and earlier this year Beijing, in line with UN sanctions, began restricting coal imports from its neighbor.

The sanctions game

After North Korea conducted its first nuclear test in 2006, the UN began imposing ever stronger sanctions against it. Last year the nation’s underground resources became a focus. In November 2016, the UN passed a resolution capping North Korea’s coal exports and banning shipments of nickel, copper, zinc, and silver. That followed a resolution in March 2016 banning the export (pdf) of gold, vanadium, titanium, and rare earth metals.

The resolutions targeting the mining sector could hurt the Kim regime. Before they were issued, a 2014 report on the country’s mining sector by the United States Geological Survey noted that (pdf, p. 3), “The mining sector in North Korea is not directly subject to international economic sanctions and is, therefore, the only legal, lucrative source of investment trade available to the country.”

That is no longer the case.

Of course, Pyongyang has grown adept at evading such sanctions, especially through shipping. Glimpses of its covert activities come from occasional interceptions of vessels. Last August Egyptian authorities boarded a ship laden with 2,300 tons (2,087 metric tons) of iron ore heading from North Korea to the Suez Canal (they also found 30,000 rocket-propelled grenades below the ore).

Earlier this year a group of UN experts concluded that North Korea, despite sanctions, continues to export banned minerals. They determined, as well, that North Korea uses another mineral—gold—along with cash to “entirely circumvent the formal financial sector.”

Interested neighbors

Meanwhile China’s overall trade with North Korea actually increased 37.4% (paywall) in the first quarter compared to the same period last year. Its imports of iron ore from North Korea shot up 270% in January and February from a year ago. Coal dropped 51.6%.

North Korea’s neighbors have long had their eyes on its bonanza of mineral wealth. About five years ago China spent some $10 billion on an infrastructure project near the border with North Korea, primarily to give it easier access to the mineral resources. Conveniently North Korea’s largest iron ore deposits, in Musan County, are right by the border. An analysis of satellite images published last October by 38 North, a website affiliated with Johns Hopkins University, showed mining activity was alive and well in the area.

China particularly covets North Korea’s rare earth minerals. Pyongyang knows this. It punished Beijing in March by suspending exports of the metals to China in retaliation for the coal trade restrictions.

Meanwhile Russia, which also shares a (smaller) border with North Korea, in 2014 developed plans to overhaul North Korea’s rail network in exchange for access to the country’s mineral resources. That particular plan lost steam (pdf, p. 8), but the general sentiment is still alive.

But South Korea has its own plans for the mineral resources. It sees them as a way to help pay for reunification (should it finally come to pass), which is expected to take decades and cost hundreds of billions or even trillions of dollars. (Germany knows a few things about that.) Overhauling the North’s decrepit infrastructure, including the aging railway line, will be part of the enormous bill.

In May, South Korea’s Ministry of Land, Infrastructure and Transport invited companies to submit bids on possible infrastructure projects in North Korea, especially ones regarding the mining sector. It argued that (paywall) the underground resources could “cover the expense of repairing the North’s poor infrastructure.”

It was, of course, jumping the gun a bit. For now South Korea—and the world—is stuck with a bully in the mineral-blessed North.

***

China is undergoing a major military build up around the world and has even included collaboration with Pakistan.

The new assessment focuses instead on the buildup on Spratly Islands, noting that previous year the Mischief, Subi and Fiery Cross Reefs, three of the largest outposts, saw the construction of 24 administration buildings, barracks, fixed weapons positions, communication facilities and fighter-sized hangars by China, each of them with runways 8,800 feet long.

While the report notes that China has not undertaken any new land reclamation projects on disputed features in the South China Sea during 2016, it did accuse China of further militarizing the contested Spratly Islands via the construction of 24 hangars capable of housing fighter aircraft, fixed weapons positions, barracks and communication facilities.

Beijing has opposed the deployment of a U.S. missile shield in South Korea to defend against attacks from North Korea, in part because it says it could be used to counter China’s capabilities.

Meanwhile Pakistan itself has not made any comments about this statement.

Published Tuesday, the Pentagon report estimated that China spent US$180 billion previous year on its military – the world’s largest – a figure well over the country’s official US$140 billion defence budget.

The report made “irresponsible remarks on China’s national defense development and reasonable actions in defending our territorial sovereignty and security interests in disregard of the facts“, foreign ministry spokeswoman Hua Chunying told reporters yesterday.

China likely will seek to establish additional military bases in countries with which it has longstanding, friendly relationships“, the report predicts.

China has cited anti-piracy patrolling as one of the reasons for developing what it calls a naval logistics center in Djibouti.

“China’s expanding global economic interests are increasing demands for the [Chinese Navy] to operate in more distant maritime environments to protect Chinese citizens, investments, and critical sea lines of communication”, the report reads.

The defence ministry in a statement refuted the U.S. assessment, saying “China is not doing any military expansion and does not seek a sphere of influence”. Pakistan has also emerged as the biggest market for Chinese arms exports, a focus area in Beijing’s expansion plans, the report titled “Military and Security Developments Involving the People’s Republic of China 2017″, said. He harshly criticized China’s construction in the South China Sea and became the first member of President Donald Trump’s cabinet to lay out a comprehensive strategy on Asia. That region accounted for almost half of China’s over $20 billion in arms exports from 2011 to 2015.

Countries including Pakistan and Afghanistan welcome it as a path out of poverty. “To support this modernisation, China uses a variety of methods to acquire foreign military and dual-use technologies, including cyber theft, targeted foreign direct investment and exploitation of the access of private Chinese nationals to such technologies”, the report said.

Regarding the Senkaku Islands, a group of East China Sea islets controlled by Japan but claimed by the mainland and Taiwan, the Pentagon said that previous year Beijing continued to use law-enforcement ships and aircraft to “patrol” near the islands in an attempt to undermine Japan’s administration of them.

China has also always been a strong military, economic, and diplomatic supporter of Pakistan and is considered Islamabad’s largest trade and defense partner.

Senate Hearing to Protect Election Systems from Russia

At least there is a hearing to begin the discussion to harden the software systems related to election processes from further intrusions as 2018 and 2020 approaches.

Russia. Russia is a full-scope cyber actor that will remain a major threat to US Government, military, diplomatic, commercial, and critical infrastructure. Moscow has a highly advanced offensive cyber program, and in recent years, the Kremlin has assumed a more aggressive cyber posture. This aggressiveness was evident in Russia’s efforts to influence the 2016 US election, and we assess that only Russia’s senior-most officials could have authorized the 2016 US election-focused data thefts and disclosures, based on the scope and sensitivity of the targets. Outside the United States, Russian actors have conducted damaging and disruptive cyber attacks, including on critical infrastructure networks. In some cases, Russian intelligence actors have masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. Russia has also leveraged cyberspace to seek to influence public opinion across Europe and Eurasia. We assess that Russian cyber operations will continue to target the United States and its allies to gather intelligence, support Russian decisionmaking, conduct influence operations to support Russian military and political objectives, and prepare the cyber environment for future contingencies.

Furthermore:

Military and Intelligence. Russia aims to improve intelligence collection, missile warning, and military communications systems to better support situational awareness and tactical weapons targeting. Russian plans to expand its imagery constellation and double or possibly triple the number of satellites by 2025. China intends to continue increasing its space-based military and intelligence capabilities to improve global situational awareness and support complex military operations. Many countries in the Middle East, Southeast Asia, and South America are purchasing dual-use imaging satellites to support strategic military activities, some as joint development projects.

Space Warfare. We assess that Russia and China perceive a need to offset any US military advantage derived from military, civil, or commercial space systems and are increasingly considering attacks against satellite systems as part of their future warfare doctrine. Both will continue to pursue a full range of anti-satellite (ASAT) weapons as a means to reduce US military effectiveness. In late 2015, China established a new service—the PLA Strategic Support Force—probably to improve oversight and command of Beijing’s growing military interests in space and cyberspace. Russia and China remain committed to developing capabilities to challenge perceived adversaries in space, especially the United States, while publicly and diplomatically promoting nonweaponization of space and “no first placement” of weapons in space. Such commitment continues despite ongoing US and allied diplomatic efforts to dissuade expansion of threats to the peaceful use of space, including international engagements through the UN.

Counterspace Weapons. The global threat of electronic warfare (EW) attacks against space systems will expand in the coming years in both number and types of weapons. Development will very likely focus on jamming capabilities against dedicated military satellite communications (SATCOM), Synthetic Aperture Radar (SAR) imaging satellites, and enhanced capabilities against Global Navigation Satellite Systems (GNSS), such as the US Global Positioning System (GPS). Blending of EW and cyber-attack capabilities will likely expand in pursuit of sophisticated means to deny and degrade information networks. Chinese researchers have discussed methods to enhance robust jamming capabilities with new systems to jam commonly used frequencies. Russia intends to modernize its EW forces and field a new generation of EW weapons by 2020. Iran and North Korea are also enhancing their abilities to disrupt military communications and navigation.

Some new Russian and Chinese ASAT weapons, including destructive systems, will probably complete development in the next several years. Russian military strategists likely view counterspace weapons as an integral part of broader aerospace defense rearmament and are very likely pursuing a diverse suite of capabilities to affect satellites in all orbital regimes. Russian lawmakers have promoted military pursuit of ASAT missiles to strike low-Earth orbiting satellites, and Russia is testing such a weapon for eventual deployment. A Russian official also acknowledged development of an aircraft-launched missile capable of destroying satellites in low-Earth orbit. Ten years after China intercepted one of its own satellites in low-Earth orbit, its ground-launched ASAT missiles might be nearing operational service within the PLA. Both countries are advancing directed energy weapons technologies for the purpose of fielding ASAT systems that could blind or damage sensitive space-based optical sensors. Russia is developing an airborne laser weapon for use against US satellites. Russia and China continue to conduct sophisticated on-orbit satellite activities, such as rendezvous and proximity operations, at least some of which are likely intended to test dual-use technologies with inherent counterspace functionality. For instance, space robotic technology research for satellite servicing and debris-removal might be used to damage satellites. Such missions will pose a particular challenge in the future, complicating the US ability to characterize the space environment, decipher intent of space activity, and provide advance threat warning.

In 2017, Russia is likely to be more assertive in global affairs, more unpredictable in its approach to the United States, and more authoritarian in its approach to domestic politics. Emboldened by Moscow’s ability to affect battlefield dynamics in Syria and by the emergence of populist and more pro-Russian governments in Europe, President Vladimir Putin is likely to take proactive actions that advance Russia’s great power status.

Putin will seek to prevent any challenges to his rule in the runup to presidential elections scheduled for 2018. Putin remains popular at home, but low turnout in the Duma elections in 2016 and sustained economic hardship will probably enhance Putin’s concerns about his ability to maintain control. Putin is likely to continue to rely on repression, state control over media outlets, and harsh tactics to control the political elite and stifle public dissent.

Russia is likely to emerge from its two-year recession in 2017, but the prospects for a strong recovery are slim. Russia is likely to achieve 1.3 percent GDP growth in 2017 and 1.7 percent in 2018, according to commercial forecasts. Putin has long sought to avoid structural reforms that would weaken his control of the country and is unlikely to implement substantial reforms before the presidential elections.

Russia is likely to emerge from its two-year recession in 2017, but the prospects for a strong recovery are slim. Russia is likely to achieve 1.3 percent GDP growth in 2017 and 1.7 percent in 2018, according to commercial forecasts. Putin has long sought to avoid structural reforms that would weaken his control of the country and is unlikely to implement substantial reforms before the presidential elections.

We assess that Russia will continue to look to leverage its military support to the Asad regime to drive a political settlement process in Syria on its terms. Moscow has demonstrated that it can sustain a modest force at a high-operations tempo in a permissive, expeditionary setting while minimizing Russian casualties and economic costs. Moscow is also likely to use Russia’s military intervention in Syria, in conjunction with efforts to capitalize on fears of a growing ISIS and extremist threat, to expand its role in the Middle East.

We assess that Moscow’s strategic objectives in Ukraine—maintaining long-term influence over Kyiv and frustrating Ukraine’s attempts to integrate into Western institutions—will remain unchanged in 2017. Putin is likely to maintain pressure on Kyiv through multiple channels, including through Russia’s actions in eastern Ukraine, where Russia arms so-called “separatists. Moscow also seeks to undermine Ukraine’s fragile economic system and divided political situation to create opportunities to rebuild and consolidate Russian influence in Ukrainian decisionmaking.

Moscow will also seek to exploit Europe’s fissures and growing populist sentiment in an effort to thwart EU sanctions renewal, justify or at least obfuscate Russian actions in Ukraine and Syria, and weaken the attraction of Western integration for countries on Russia’s periphery. In particular, Russia is likely to sustain or increase its propaganda campaigns. Russia is likely to continue to financially and politically support populist and extremist parties to sow discord within European states and reduce popular support for the European Union. More here from ODNI.

 

 

Emoluments Clause v. Donald Trump, Expanded Investigation

Update: June 16, 2017, 1:07 pm, est. One of President Trump’s own lawyers, Michael Cohen has now hired a lawyer, Stephen M. Ryan. Cohen apparently has agreed to testify before the House Intelligence Committee on September 5. Additionally, Michael Caputo, the White House advisor hired by Paul Manafort has been contacted by the FBI and too has hired a lawyer, Dennis Vacco. Vacco is a former New York state attorney general. Vice President Pence has hired a Virginia attorney, Richard Cullen.

Don’t shoot the messenger, this is merely an attempt to further explain the expanded Special Counsel Robert Mueller investigation into President Trump and others on his team. There is a multi-track investigation that has been launched by the Mueller team in addition to a multi-track investigation being performed by the Senate Judiciary Committee, which does include Loretta Lynch.

This post is an attempt to offer information on the other moving parts for some additional clarity.

***

Emoluments Clause

No Title of Nobility shall be granted by the United States: And no Person holding any Office of Profit or Trust under them, shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.

Article I, Section 9, Clause 8

***

almost 200 Democratic members of Congress to be filed against President Trump for violations of the “Foreign Emoluments Clause” of the Constitution. This is on top of another Emoluments Clause lawsuit brought by Maryland and D.C. earlier this week. The general theory is that under the Constitution, the President has an obligation to insulate himself from any foreign influence that would come in the shape of gifts or profits, and that the kinds of profits President Donald Trump receives through his international corporation are precisely the kind that violate such an obligation. In other words, presidents can’t take bribes, and doing business with foreign governments and large foreign companies is something of a bribe per se. Another similar case, CREW v. Donald J. Trump, was filed three days after the inauguration and is currently awaiting a response to Trump’s motion to dismiss in the Southern District of New York (that case is proceeding before Judge Ronnie Abrams, sister of LawNewz founder Dan Abrams).

***   Image result for robert mueller

The Hill reports in part that Mueller is investigating the finances and business dealings of Kushner as well as other Trump associates.Those being looked into include former national security adviser Michael Flynn, former campaign chairman Paul Manafort and Carter Page, another campaign adviser to Trump.

“We do not know what this report refers to,” Jamie Gorelick, Kushner’s lawyer, told the newspaper.

“It would be standard practice for the Special Counsel to examine financial records to look for anything related to Russia. Mr. Kushner previously volunteered to share with Congress what he knows about Russia-related matters. He will do the same if he is contacted in connection with any other inquiry.”

***

There is have significant pushback by the Trump White House and several outside advisors to Trump including Laura Ingraham, Sean Hannity, Newt Gingrich and recently hired by Trump, Jay Sekulow. All of these people are correct to earnestly object to continuing investigations with regard to the Russian election intrusion and Trump, at least it appears to be the case and former FBI Director James Comey noted several times.

However, the expanded track of the Mueller investigation team also goes to the financial realm which does include financial corruption, money laundering, public corruption, organized crime and violations of the False Claims Act.

Sounds creepy for sure. There is evidence in this area and the Mueller investigation is not exclusive to finding guilt, but also to eliminate guilt and intent. All investigations include those two conditions and it requires repeating. We cannot know in full what President Trump or those on his team fully revealed financially on paper which is required as a government employee and for security clearance purposes.

Those items are remain undisclosed at this time in open source, however in a classified or undisclosed condition, all financial traces are being requested, gathered and examined by experts.

It should be noted here that additional names could be added to the list under the expanded investigation.

Mueller was named to be special counsel by Deputy Attorney General Rod Rosenstein and Mueller has mobilized and interesting team so far. The backgrounds of the lawyers listed below provide an indication upon which Mueller is taking the investigation.

For your reference, they include:

Aaron Zebley, Former FBI assigned to global terrorism and cyber security

Steve Gaudin, Former FBI interrorgator and al Qaeda expert

James Quarles, Lawyer specializing in corporate and taxation law (Whitewater case)

Jeannine Rhee, Lawyer specializing in public corruption, criminal, securities enforcement

Andrew Weissmann, Former FBI and DOJ, criminal fraud division (Enron case)

Michael Dreeban, Former Solicitor General, criminal law

Lisa Page, FBI lawyer with organized crime, money laundering specialty, Russian/Soviet crime

*** Witness interviews have not begun and the time this article was published and Mueller’s office is located on D Street and has not been fully established. In full disclosure, three people on the Mueller team have previously donated to Democrats while one of the three also made donations to Republicans.

Lisa Page is of particular interest on this team due to her trial record which included on Semion Mogilevich. Several of Mogilevich’s associates own condos in Trump Tower in New York and the former felon and friend of Trump, Felix Sater was a Moglievich lieutenant. Additionally, Andrew Weissmann prosecuted several cases in US District Court in New York of mafia families and their infiltration of Wall Street.

For more details on those of the Mueller team, click here. Of note, this website has published more than one article regarding Felix Sater, Russian oligarch money laundering in the United States and Cyprus connections including documentation from the Panama Papers. The search feature is a useful tool to locate those articles.

At Least 34 Years of Immigration Debate, Loopholes and Dollars

Image result for executive office of immigration review

The proposed Department of Justice budget request for 2018 for the Executive Office of Immigration is $421.5 million and includes 2600 employees with 831 lawyers. Judges assigned to immigration courts are being hired, shuffled around the country and have in some areas have a five year base backlog.

Image result for immigration court FoxLatino

The Executive Office for Immigration Review (EOIR) was created on January 9, 1983, through an internal Department of Justice (DOJ) reorganization which combined the Board of Immigration Appeals (BIA or Board) with the Immigration Judge function previously performed by the former Immigration and Naturalization Service (INS) (now part of the Department of Homeland Security). Besides establishing EOIR as a separate agency within DOJ, this reorganization made the Immigration Courts independent of INS, the agency charged with enforcement of Federal immigration laws. The Office of the Chief Administrative Hearing Officer (OCAHO) was added in 1987. In 2013, EOIR observed its 30th anniversary.

EOIR is also separate from the Office of Special Counsel for Immigration-Related Unfair Employment Practices in the DOJ Civil Rights Division and the Office of Immigration Litigation in the DOJ Civil Division.

As an office within the Department of Justice, EOIR is headed by a Director who reports directly to the Deputy Attorney General. Its headquarters are located in Falls Church, Virginia, about 10 miles from downtown Washington, DC.

New York City Law Creates Loophole To Avoid Deporting Criminal Illegal Immigrants

A New York City law that reclassifies several low-level offenses as non-criminal went into effect Tuesday, allowing citizen offenders to keep clean records and illegal immigrant offenders to potentially avoid deportation.

The law, passed by the city council and signed by Mayor Bill de Blasio in 2016, allows police to classify trial summonses for petty crimes as civil summonses, rather than criminal summonses. The change would affect crimes including public urination and drinking and staying in the park after dark, DNA Info reports. The change critically affects the impact of an executive order from President Donald Trump this spring ordering the deportation of illegal immigrants convicted of crimes.

Under the new law, illegal immigrants convicted of these crimes would receive a civil rather than criminal summons, which frees local law enforcement from the obligation of reporting the offender’s immigration status to Immigration and Customs Enforcement (ICE).

The law would affect cases such as Alejandro Luna, a former gang member and an illegal immigrant caught in central park after dark June 5 who now faces deportation. This would be Luna’s second deportation, the first came in 2006 after he was convicted of home-invasion and robbery. He then illegally entered the country again only to be detained on the June 5 park offense. More here.

Image result for sanctuary cities

***

Illegals presently have access to government funded healthcare. However:

The ‘Verify First Act’ by Rep. Lou Barletta (R-PA) would subsequently end American taxpayer-funded money going to illegal aliens in the form of healthcare insurance credits. The plan is being supported by NumbersUSA, a group which has staunchly advocated for Trump’s America First agenda.

“We applaud Rep. Lou Barletta for introducing the Verify First Act to ensure that illegal aliens cannot qualify for taxpayer-funded health insurance credits,” NumbersUSA Peter Robbio said in a statement. “We are grateful that the Ways and Means Committee and House Republican Leadership agreed to move this important bill forward.”

Since Obamacare’s enactment, illegal immigrants received more than $700 million in healthcare insurance credits by 2015, according to the Senate Committee on Homeland Security and Governmental Affairs.

In Barletta’s plan, healthcare insurance recipients through the American Health Care Act (AHCA) would have their citizenship and immigration statuses verified by the Social Security Administration (SSA) and the Department of Homeland Security (DHS). More here.

***

In part: Traditional sanctuary policies are often described as falling under one of three categories. First, so-called “don’t enforce” policies generally bar the state or local police from assisting federal immigration authorities. Second, “don’t ask” policies generally bar certain state or local officials from inquiring into a person’s immigration status. Third, “don’t tell” policies typically restrict information sharing between state or local law enforcement and federal immigration authorities. This report provides examples of various state and local laws and policies that fall into one of these sanctuary categories. The report also discusses federal measures designed to counteract sanctuary policies. For instance, Section 434 of the Personal Responsibility and Work Opportunity Reconciliation Act (PRWORA) and Section 642 of the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) were enacted to curb state and local restrictions on information sharing with federal immigration authorities.

State or local measures limiting police participation in immigration enforcement are not a recent phenomenon. Indeed, many of the recent “sanctuary”-type initiatives can be traced back to

activities carried out by churches that provided refuge—or “sanctuary”—to unauthorized Central American aliens fleeing civil unrest in the 1980s.13 A number of states and municipalities issued declarations in support of these churches’ actions.14 Others went further and enacted more substantive measures intended to limit police involvement in federal immigration enforcement activities.15 These measures have included, among other things, restricting state and local police from arresting persons for immigration violations, limiting the sharing of immigration-related information with federal authorities, and barring police from questioning a person about his or her immigration status.16

Still, there is no official definition of a “sanctuary” jurisdiction in federal statute or regulation.17 Broadly speaking, sanctuary jurisdictions are commonly understood to be those that have laws or policies designed to substantially limit involvement in federal immigration enforcement activities,18 though there is not necessarily a consensus as to the meaning of this term.19 Some jurisdictions have self-identified as sanctuary cities.

The federal government’s power to regulate immigration is both substantial and exclusive.23 This authority is derived from multiple sources, including Congress’s Article I powers to “establish a uniform Rule of Naturalization” and “regulate commerce with foreign nations, and among the several states,”24 as well as the federal government’s “inherent power as a sovereign to conduct relations with foreign nations.”

The Supreme Court’s 2012 ruling in Arizona v. United States—which invalidated several Arizona laws designed “to discourage and deter the unlawful entry and presence of aliens and economic activity by persons unlawfully present in the United States”28 as preempted by federal law—reinforced the federal government’s pervasive role in creating and enforcing the nation’s immigration laws.29 “The Government of the United States,” the Court said, “has broad, undoubted power over the subject of immigration and the status of aliens.”30

Yet despite the federal government’s sweeping authority over immigration, the Supreme Court has cautioned that not “every state enactment which in any way deals with aliens is a regulation of immigration and thus per se preempted” by the federal government’s exclusive power over immigration.39 Accordingly, in Arizona the Supreme Court reiterated that, “[i]n preemption analysis, courts should assume that the historic police powers of the States are not superseded unless that was the clear and manifest purpose of Congress.”40 For example, in Chamber of Commerce of the U.S. v. Whiting, the Supreme Court upheld an Arizona law—related to the states’ “broad authority under their police powers to regulate the employment relationship to protect workers within the State”41—that authorized the revocation of licenses held by state employers that knowingly or intentionally employ unauthorized aliens.42 Even though the Immigration Reform and Control Act of 1986 (IRCA) expressly preempted “any State or local law imposing civil or criminal sanctions … upon those who employ, or recruit or refer for a fee for employment, unauthorized aliens,” the Supreme Court concluded that Arizona’s law fit within IRCA’s savings clause for state licensing regimes and thus was not preempted.43

Accordingly, based on current jurisprudence, federal measures that impose direct requirements on state or municipal authorities appear most likely to withstand an anti-commandeering challenge if they (1) are not directed at a state’s regulation of the activities of private parties; and (2) apply to the activities of private parties as well as government actors.

Finally, Congress does not violate the Tenth Amendment when it uses its broad authority to enact legislation for the “general welfare” through its spending power,62 including by placing

conditions on funds distributed to the states that require those accepting the funds to take certain actions that Congress otherwise could not directly compel the states to perform.63 However, Congress cannot impose a financial condition that is “so coercive as to pass the point at which ‘pressure turns into compulsion.’”64 For example, in National Federation of Independent Business v. Sebelius, the Supreme Court struck down a provision of the Patient Protection and Affordable Care Act of 2010 (ACA) that purported to withhold Medicaid funding to states that did not expand their Medicaid programs.65 The Court found that the financial conditions placed on the states in the ACA (withholding all federal Medicaid funding, which, according to the Court, typically totals about 20% of a state’s entire budget) were akin to “a gun to the head” and thus unlawfully coercive.66

violations of federal immigration law may be criminal or civil in nature, with alien removal understood to be a civil proceeding.71 Some immigration-related conduct potentially constitutes a removable offense and also may be subject to criminal sanction. For example, an alien who knowingly enters the United States without authorization is not only potentially subject to removal,72 but could also be charged with the criminal offense of unlawful entry.73 Other violations of the INA are exclusively criminal or civil in nature. Notably, an alien’s unauthorized immigration status makes him or her removable, but absent additional factors (e.g., having reentered the United States after being formally removed),74 unlawful presence on its own is not a criminal offense.

Some jurisdictions have adopted measures that restrict or bar police officers from making arrests for violations of federal immigration law. In some jurisdictions restrictions prohibit police from detaining or arresting aliens for civil violations of federal immigration law, like unlawful presence.75 Other jurisdictions prohibit police from making arrests for some criminal violations of federal immigration law, like unlawful entry.76 Still others prohibit assisting federal immigration authorities with investigating or arresting persons for civil or criminal violations of U.S. immigration laws.77 And some other jurisdictions have prohibitions that are broader in scope, such as a general statement that immigration enforcement is the province of federal immigration authorities, rather than that of local law enforcement.

Some states and localities have restricted government agencies or employees from sharing information with federal immigration authorities, primarily to prevent federal authorities from using the information to identify and apprehend unlawfully present aliens for removal.88 For instance, some jurisdictions prohibit law enforcement from notifying federal immigration authorities about the release status of incarcerated aliens, unless the alien has been convicted of certain felonies.89 Similarly, other jurisdictions prohibit their employees from disclosing information about an individual’s immigration status unless the alien is suspected of engaging in illegal activity that is separate from unlawful immigration status.90 Some jurisdictions restrict disclosing information except as required by federal law91—sometimes referred to as a “savings clause”—although it appears that the Department of Justice has interpreted those provisions as conflicting with federal information-sharing provisions. For the full summary and context with access to footnotes, go here.

Kislyak’s Party, Sanctions and 39 U.S. States

Yup, it IS Russia, Russia, Russia. Why because Putin’s playbook is working and so many in America are useful dupes and unwitting accomplices. Does that include you?

Well it does include U.S. diplomats attending a party hosted by Russian Ambassador Sergei Kislyak for the sake of photos and social media. Were you there Monday night? It was a propaganda operation that included Russian intelligence officials as well.

Image result for russian embassy washington dc

Embattled Russian diplomat Sergey Kislyak played host to Washington insiders and diplomats at the Russian Embassy Monday night, greeting guests one-by-one in a long receiving line at the embassy in honor of Russia Day. Attendees were encouraged to pose for photos with signs that said “I love Russia” and post them on Facebook, Instagram and other social networks.

The frayed U.S.-Russia relationship was clearly on the embassy’s mind as they handed out a pamphlet highlighting the two countries’ close relationship. On the cover: “As an American, I love Russia – friend of Washington and Lincoln.” At the top of the second page, there was this: “As an American, I love Russia because if not for Russia, there may not have been a United States of America.”

Meanwhile, many Senators came together in a bipartisan fashion for a major piece of legislation on sanctions against Russia.

The Senate has clinched a wide-ranging bipartisan agreement to slap new financial penalties on Russia and limit President Trump’s ability to lift sanctions without giving Congress a chance to weigh in.

“It’s as comprehensive as we could make it, and it’s going to be a very good piece of legislation,”

The agreement imposes new sanctions including “malicious cyber activity” on behalf of Moscow, individuals supplying weapons to Syrian President Bashar Assad’s government or individuals tied to Russia’s intelligence and defense sectors. More here.

So, how bad was this hacking/phishing scheme launched by Russia? Much wider than previously know. Some explain all this to Tucker Carlson.

Russian Cyber Hacks on U.S. Electoral System Far Wider Than Previously Known

Bloomberg: Russia’s cyberattack on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported.

In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states, one of them said.

The scope and sophistication so concerned Obama administration officials that they took an unprecedented step — complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict.

The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept, show the scope of alleged hacking that federal investigators are scrutinizing as they look into whether Trump campaign officials may have colluded in the efforts. But they also paint a worrisome picture for future elections: The newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies comes less than a week after former FBI Director James Comey warned Congress that Moscow isn’t done meddling.

“They’re coming after America,” Comey told the Senate Intelligence Committee investigating Russian interference in the election. “They will be back.”

A spokeswoman for the Federal Bureau of Investigation in Washington declined to comment on the agency’s probe.

Kremlin Denials

Russian officials have publicly denied any role in cyber attacks connected to the U.S. elections, including a massive “spear phishing” effort that compromised Hillary Clinton’s campaign and the Democratic National Committee, among hundreds of other groups. President Vladimir Putin said in recent comments to reporters that criminals inside the country could have been involved without having been sanctioned by the Russian government.

One of the mysteries about the 2016 presidential  election is why Russian intelligence, after gaining access to state and local systems, didn’t try to disrupt the vote. One possibility is that the American warning was effective. Another former senior U.S. official, who asked for anonymity to discuss the classified U.S. probe into pre-election hacking, said a more likely explanation is that several months of hacking failed to give the attackers the access they needed to master America’s disparate voting systems spread across more than 7,000 local jurisdictions.

***

Such operations need not change votes to be effective. In fact, the Obama administration believed that the Russians were possibly preparing to delete voter registration information or slow vote tallying in order to undermine confidence in the election. That effort went far beyond the carefully timed release of private communications by individuals and parties.

One former senior U.S. official expressed concern that the Russians now have three years to build on their knowledge of U.S. voting systems before the next presidential election, and there is every reason to believe they will use what they have learned in future attacks.

Secure Channel

As the first test of a communication system designed to de-escalate cyber conflict between the two countries, the cyber “red phone” — not a phone, in fact, but a secure messaging channel for sending urgent messages and documents — didn’t quite work as the White House had hoped. NBC News first reported that use of the red phone by the White House last December.

The White House provided evidence gathered on Russia’s hacking efforts and reasons why the U.S. considered it dangerously aggressive. Russia responded by asking for more information and providing assurances that it would look into the matter even as the hacking continued, according to the two people familiar with the response.

“Last year, as we detected intrusions into websites managed by election officials around the country, the administration worked relentlessly to protect our election infrastructure,” said Eric Schultz, a spokesman for former President Barack Obama. “Given that our election systems are so decentralized, that effort meant working with Democratic and Republican election administrators from all across the country to bolster their cyber defenses.”

Illinois Database

Illinois, which was among the states that gave the FBI and the Department of Homeland Security almost full access to investigate its systems, provides a window into the hackers’ successes and failures.

In early July 2016, a contractor who works two or three days a week at the state board of elections detected unauthorized data leaving the network, according to Ken Menzel, general counsel for the Illinois board of elections. The hackers had gained access to the state’s voter database, which contained information such as names, dates of birth, genders, driver’s licenses and partial Social Security numbers on 15 million people, half of whom were active voters. As many as 90,000 records were ultimately compromised.

But even if the entire database had been deleted, it might not have affected the election, according to Menzel. Counties upload records to the state, not the other way around, and no data moves from the database back to the counties, which run the elections. The hackers had no way of knowing that when they attacked the state database, Menzel said.

The state does, however, process online voter registration applications that are sent to the counties for approval, Menzel said. When voters are added to the county rolls, that information is then sent back to the state and added to the central database. This process, which is common across states, does present an opportunity for attackers to manipulate records at their inception.

Patient Zero

Illinois became Patient Zero in the government’s probe, eventually leading investigators to a hacking pandemic that touched four out of every five U.S. states.

Using evidence from the Illinois computer banks, federal agents were able to develop digital “signatures” — among them, Internet Protocol addresses used by the attackers — to spot the hackers at work.

The signatures were then sent through Homeland Security alerts and other means to every state. Thirty-seven states reported finding traces of the hackers in various systems, according to one of the people familiar with the probe. In two others — Florida and California — those traces were found in systems run by a private contractor managing critical election systems.

(An NSA document reportedly leaked by  Reality Winner, the 25-year-old government contract worker arrested last week, identifies the Florida contractor as VR Systems, which makes an electronic voter identification system used by poll workers.)

In Illinois, investigators also found evidence that the hackers tried but failed to alter or delete some information in the database, an attempt that wasn’t previously reported. That suggested more than a mere spying mission and potentially a test run for a disruptive attack, according to the people familiar with the continuing U.S. counterintelligence inquiry.

States’ Response

That idea would obsess the Obama White House throughout the summer and fall of 2016, outweighing worries over the DNC hack and private Democratic campaign emails given to

Wikileaks and other outlets, according to one of the people familiar with those conversations. The Homeland Security Department dispatched special teams to help states strengthen their cyber defenses, and some states hired private security companies to augment those efforts.

In many states, the extent of the Russian infiltration remains unclear. The federal government had no direct authority over state election systems, and some states offered limited cooperation. When then-DHS Secretary Jeh Johnson said last August that the department wanted to declare the systems as national critical infrastructure — a designation that gives the federal government broader powers to intervene — Republicans balked. Only after the election did the two sides eventually reach a deal to make the designation.

Relations with Russia remain strained. The cyber red phone was announced in 2011 as a provision in the countries’ Nuclear Risk Reduction Centers to allow urgent communication to defuse a possible cyber conflict. In 2008, what started during the Cold War as a teletype messaging system became a secure system for transferring messages and documents over fiber-optic lines.

After the Obama administration transmitted its documents and Russia asked for more information, the hackers’ work continued. According to the leaked NSA document, hackers working for Russian military intelligence were trying to take over the computers of 122 local election officials just days before the Nov. 8 election.

While some inside the Obama administration pressed at the time to make the full scope of the Russian activity public, the White House was ultimately unwilling to risk public confidence in the election’s integrity, people familiar with those discussions said.