$2900.00 per Acre or Condemned, Border Wall Order

 Image result for southern border wall

Primer: This notice did not come from the new Trump administration, it was generated by the Loretta Lynch Department of Justice on behalf of the Department of Homeland Security. This is known as a ‘Declaration of Taking Notice.

The nearly 2,000-mile southern border is composed of federal, state, tribal and private lands. There are 632 miles of federal or tribal land — 33 percent — and the other 67 percent, most of which is in Texas, is private or state-owned, according to the Government Accountability Office (GAO). The Washington Post points out that the president would need Congress to pass a bill to acquire the tribal lands for his wall. More here.

Texans Receive First Notices of Land Condemnation for Trump’s Border Wall

The government offered $2,900 for 1.2 acres near the Rio Grande. If Flores chooses not to accept the offer, the land could be seized through eminent domain.

Observer: The week before Donald Trump’s inauguration, Yvette Salinas received a letter she had been dreading for years: legal notice that the U.S. Department of Homeland Security (DHS) wants to build a border wall on her family’s land in Los Ebanos. The 21-page document, entitled a “Declaration of Taking,” is addressed to her ailing mother, Maria Flores, who owns the property with her siblings. The letter offers Flores $2,900 for 1.2 acres near the Rio Grande. If she chooses not to accept the offer, the land could be seized through eminent domain. “It’s scary when you read it,” Salinas says. “You feel like you have to sign.”

Jen Reel  The ribbon left by the DHS in 2008 to note where the border wall would enter on Aleida Flores’ land still remains.

The 16-acre property has been in the family for so long that none of them can remember the year it was acquired. Salinas only knows they’ve had it for five generations. Her uncle runs a few head of cattle on the property, which lies not far from Los Ebanos’ most famous attraction, a hand-drawn ferry that shuttles cars and their passengers across the river to Mexico.

This is not the first time the federal government has wanted to seize the land for a border wall. In the wake of the Secure Fence Act of 2006, the Bush administration put up 110 miles of border fencing, much of it on private land in Texas. In 2008, Salinas’ family received a condemnation notice offering them the same low, low price of $2,900. Others in Los Ebanos were mailed similar notices.

***  

But nature and time were on their side. Los Ebanos is squeezed into a bend in the Rio Grande, and lies entirely in the river’s floodplain. A treaty between the United States and Mexico forbids building any structures in the floodplain that could push floodwaters into surrounding communities.

***

Jen Reel  The map given to Flores in 2008 by the DHS showing their proposed fence acquisition tract on Flores’ land.

Salinas’ family held off on signing the condemnation letter. As time passed, building a wall in Los Ebanos seemed less likely, because of the treaty and because the Obama administration made wall-building less of a priority. In the meantime, Aleida Garcia, Salinas’ cousin, said the government has increased security in the area by adding more surveillance, which she prefers to Trump’s proposed 30-foot wall. “Even if they build a wall, people will still come,” said Garcia. “What’s helped us tremendously and is less expensive is the technology — the aerostat balloons, the ground sensors and even boots on the ground.”

But Los Ebanos appears to be a prime target for the Trump administration. The surveying and planning work has already been done, and the Secure Fence Act authorizes more border fencing to be built. And in 2012, the United States half of the International Boundary and Water Commission, a binational organization tasked with managing the U.S.-Mexico water treaty, capitulated to lobbying by DHS and agreed to a wall in the floodplain.

Salinas says her family doesn’t want to give up their land, and they are consulting with lawyers to decide what to do next. But fighting the federal government could mean spending years in court. If they lose, DHS could take their land. Salinas, who is 29, says it makes her sad that the family’s legacy could be divided by an ugly wall that will cause problems for Los Ebanos. “We don’t want this wall — the town is pretty much united on that,” says Salinas. “But we don’t want to get sued by the U.S. government either.”

C’mon Trump, Americans are Still Angry

Hey President Donald, how about assigning a leader to a whistleblower task force that coughs up the goods on the Obama administration.

In the past eight years we have almost forgotten all the fraud, collusion, deception and nefarious work of the previous administration and how far reaching those operations were. We still want consequences….why? If left unchallenged, rather unexposed, those operatives will dig in deeper and with wild abandon. The media cannot be left out of this whistleblowing mission either. Complicity and political behavior modeling by the left will only gain traction if not forced into the sunlight.

Trump pledged to restore law and order, voters should know how far afield the law was fractured under the Obama administration.

Much in the news is the Russian intrusion into our election infrastructure, which did happen without dispute. Altering the vote count or influencing voters to cast votes to a preferred candidate did NOT happen, such there is no evidence. The Russians have a history of such intrusions beyond the United States including Ukraine, Germany and Europe. The U.S. intelligence agencies warned of forced log-ins long before the November election. Now British intelligence is making the same warnings.

A particular item that requires a whistleblower headline is how the Obama White House interfered in the election process in Israel paying operatives to remove Netanyahu from power. Hello Trump team, can you expose more details on this please? We already know about Jeremy Bird, but we want the full story and in the end, we want punishment.

Some items that need attention and exposure are noted below but this list is hardly complete. In fact you are invited to add to the list in the comments section.

We need to know the culprits, the money, the facts and the rest of the stories on many scandals. This is the moment now leading into the building mid-term elections, but mostly due to the DNC being led by two terrifying people Tom Perez and Keith Ellison. The DNC, DNCC, Center for American Policy and others are houses of UnAmerican activities, if we even remember what America is and should be anymore.

There is no better source or investigator than Trevor Louden. He helped us with his movie, ‘Enemies Within’ as he laid the foundation for the viewers to take the baton and run to expose more.

Congress has an ‘oversight committee’ that does investigate and expose countless cases yet it is time consuming and burdensome given scheduling, subpoenas, testimony and document requests. Then we have Judicial Watch that is doing great work using the legal machinery, but all reliance cannot be placed there.

The Trump White House has this lifetime opportunity to own the headlines, the stories of connected events and provide the full account of scandals and people that today are left still with unanswered question.

Here are some samples Mr. President we need to know more about, begin here with the whistleblowing now that your administration is in power with access.

  1. The matter of Fast and Furious, the gun-running operation to Mexico was never fully told. Did Kevin O’Reilly ever cooperate and provide testimony, when in the middle of the scandal he was suddenly deployed to Iraq?
  2. Judicial Watch just obtained almost 7000 documents relating to the IRS targeting scandal. Exactly why is John Koskinen still the commissioner and has anyone moved to sue Lois Lerner in civil suits? Is there evidence of White House collusion including some members of Congress?
  3. What is the rest of the story when it comes to new solar/energy businesses launched with government loan guarantees that have gone belly up? Who is responsible, what did it really cost the taxpayer and are any monies recoverable? How about the DoJ investigations where some financial reports were altered?
  4. Benghazi stands on its own..
  5. Who at the Department of Energy is responsible for the lead in the water in Flint, Michigan and polluting the Colorado river?
  6. With the ransom money given to Iran and the side deals all but forgotten of the Iranian nuclear deal, how much is still out there to be uncovered and reported? What more do we need to know about Ploughshares, NIAC, Ben Rhodes and John Kerry?
  7. We have new leadership at the Veterans Administration. Great now how about exposing the hidden case files, the corruption of the unions, jailing those that falsified status reports and got big bonuses? The VA Inspector General has done some great work so far, but who in leadership is going down for the never-ending issues at the VA?
  8. Can we have a team that reveals the ‘slush funds’ from the ‘stimulus money’ and who is guilty in both parties that scammed the taxpayers?
  9. Clearly there is more to know about Obama’s amnesty and his DACA program. Who was behind it, how much money was involved? Are judges being paid off? Who gets grants to sponsor children and illegals and how much money was spent in transportation of people all over the country hiding the from the legal system?
  10. Obamacare is a major topic, what more do we need to know such that it is being used to blame democrats and repeal the law? How about HHS contracts, sharing patient databases with outside agencies and foreign governments? What about cyber security, what about paying off big pharma and insurance companies?
  11. Where are we with the Clinton Foundation and the emails to Hillary’s private server that included Obama emails and the computer belonging to Huma Abedin? Is anyone still at the State Department still providing the Clinton operation cover? Can Patrick Kennedy or John Kerry be prosecuted?
  12. What is the rest of the story of Eric Holder and Loretta Lynch on corporate fines for violations and company officials not going to prison?
  13. The Department of Justice maintained a victims fund which selectively paid surviving family members in cases of attacks and murder victims. Why was Obama personally involved and how was it decided who got money and how much?
  14. The DoJ funded leftist organizations. Two examples were National Council of La Raza, the National Community Reinvestment Coalition and the National Urban League.
  15. Obama and his team negotiated with the Taliban. What is the real truth, how much money did we give the terror organization and where are the Taliban 5 released from Gitmo today?
  16. Several on the Democrat side of the House of Representatives hired a rogue team of IT professionals that were not vetted and had access to computer systems and passwords causing more national security threats. Why? Who was fired, who is responsible? Are there more we don’t know about?

Once again, this is hardly a comprehensive list, we must know more. We want consequences. build the case, tell us what we need to know going forward.

 

 

 

Terrorists in U.S. Several Years Before Being Radicalized, then Canada

The Homeland Security report is based on unclassified information from Justice Department press releases on terrorism-related convictions and attackers killed in the act, State Department visa statistics, the 2016 Worldwide Threat Assessment from the U.S. intelligence community and the State Department Country Reports on Terrorism 2015.

The three-page report challenges Trump’s core claims. It said that of 82 people the government determined were inspired by a foreign terrorist group to carry out or try to carry out an attack in the United States, just over half were U.S. citizens born in the United States. The others were from 26 countries, led by Pakistan, Somalia, Bangladesh, Cuba, Ethiopia, Iraq and Uzbekistan. Of these, only Somalia and Iraq were among the seven nations included in the ban.

Of the other five nations, one person each from Iran, Sudan and Yemen was also involved in those terrorism cases, but none from Syria. It did not say if any were Libyan.

The report also found that terrorist organizations in Iran, Libya, Somalia and Sudan are regionally focused, while groups in Iraq, Syria and Yemen do pose a threat to the U.S.

The seven countries were included in a law President Barack Obama signed in 2015 that updated visa requirements for foreigners who had traveled to those countries. More here from Associated Press.

Then we have the gullible Prime Minister of Canada, Justin Trudeau who has invited Middle Eastern migrants, asylees and refugees in a welcome to Canada. Yet the intelligence and security authorities in Canada have a different position.

The principal terrorist threat to Canada remains that posed by violent extremists who could be inspired to carry out an attack in Canada. Violent extremist ideologies espoused by terrorist groups like Daesh and Al Qaeda (AQ) continue to appeal to certain individuals in Canada.

Infographic: A terrorism timeline of incidents involving Canadians between October 20, 2014 and September 30, 2016. Long description below.

Long description of infographic: Terrorism timeline

2016 Public Report on the Terrorist Threat to CanadaThe principal terrorist threat to Canada remains that posed by violent extremists who could be inspired to carry out an attack in Canada. Violent extremist ideologies espoused by terrorist groups like Daesh and Al Qaeda (AQ) continue to appeal to certain individuals in Canada.

As in recent years, the Government of Canada has continued to monitor and respond to the threat of extremist travellers, that is, individuals who are suspected of travelling abroad to engage in terrorism-related activity. The phenomenon of extremist travellers—including those abroad, those who return, and even those prevented from travelling—poses a range of security concerns for Canada. As of the end of 2016, the Government was aware of approximately 180 individuals with a nexus to Canada who were abroad and who were suspected of engaging in terrorism-related activities. The Government was also aware of a further 60 extremist travellers who had returned to Canada.

The threat environment has also evolved beyond Canada’s borders. Daesh has continued to dominate the landscape in the Middle East, where other terrorist groups such as Jabhat al-Nusra and Hizballah also operate. Elsewhere in the Middle East, Al Qaeda in the Arabian Peninsula (AQAP) has taken advantage of the civil conflict in Yemen to capture territory there and strengthen itself. In addition, 2016 saw Daesh’s expansion in Africa, and Boko Haram (now rebranded as a Daesh affiliate in West Africa) continues to pose a major threat to regional stability. In South and Southeast Asia, Daesh expansionism and entrenched regional groups shaped the threat environment.

Canadians and Canadian interests are also affected. Canadian Armed Forces (CAF) personnel, government officials and private citizens are under constant threat in certain regions. In September 2015, two Canadians were kidnapped in the Philippines. Both were killed by their captors in the spring of 2016. In January 2016, an AQ-affiliated group based in Mali attacked a hotel in Burkina Faso, killing six Canadians. That same month, attackers linked to Daesh targeted a coffee shop in Jakarta, Indonesia, killing one Canadian. In June 2016, a Somali government minister with Canadian citizenship was killed in an Al-Shabaab terrorist attack on a hotel in Mogadishu, Somalia. Also in June, 15 Nepalese security guards who protected the Embassy of Canada to Afghanistan in Kabul were killed when terrorists targeted the bus that was transporting them to work.

International Cooperation

The international security environment continues to result in increased threats to Canada and its interests, both domestically and abroad. Ongoing conflicts in several regions of Africa, the Middle East, Asia, Eastern Europe and elsewhere show no signs of abating and continue to have serious national and international security implications. Worldwide incidents of terrorism, espionage, weapons proliferation, illegal migration, cyber-attacks and other acts targeting Canadians—directly or indirectly—remain ever present. Since the bulk of such threats originate from (or have a nexus to) regions beyond Canada’s borders, CSIS needs to be prepared and equipped to investigate the threat anywhere.

Additionally, certain security threats continue to evolve. Over the past several years, the globalization of terrorism, fueled by elaborate online propaganda videos by extremist groups, has expanded the breadth of radicalization. In some instances, individuals influenced by extremist ideology and driven by a need to feed their sense of belonging have travelled (or attempted to travel) abroad to participate in terrorist activity. Others may continue to support their extremist ideology through training, fundraising, recruitment and attack planning within Canada. As the threat posed by ‘foreign fighters’ is international in scope, a global reach is an absolute necessity in efforts to track and thwart threats to Canada and its allies posed by such individuals.

Furthermore, while the international focus has been on countering terrorism, espionage threats remain ever present and have become far more complex due to continuing advancements in technology and the globalization of communications. On the cyber front, foreign governments and hackers continue to exploit the Internet and other means to target critical infrastructure and information systems of other countries.

Such threats cannot be countered in isolation, and CSIS must remain adaptable in order to keep abreast of developments in both the domestic and international spheres. Despite differences in mandate, structure or vision, security intelligence agencies around the globe are all faced with very similar priorities and challenges. To meet the Government of Canada’s priority intelligence requirements, CSIS maintains a well-established network of relationships with foreign agencies. In accordance with s.17(1)(b) of the CSIS Act, all such arrangements are authorized by the Minister of Public Safety and supported by the Minister of Foreign Affairs. These arrangements provide CSIS access to timely information linked to a number of threats and allow the Service (and, in turn, the Government of Canada) to obtain information which might otherwise not be available.

As of March 31, 2016, CSIS had established over 300 foreign arrangements in some 150 countries. Of those, 69 remain defined as ‘Dormant’ (due to a lack of need for engagement or exchanges for a period of one year or more), while nine remained defined as ‘Restricted’ due to concerns over the affected agencies’ respect for human rights or its reliability. The human rights reputations of foreign agencies with which CSIS engages is not something which the Service takes lightly. In order to mitigate potential risks of sharing information, CSIS regularly assesses its foreign relationships and reviews various government and non-government human rights reports for all countries with which the Service has implemented ministerially approved arrangements, always cognizant of the fact that our first responsibility is to the Canadian people and their safety. CSIS opposes in the strongest possible terms the mistreatment of any individual by a foreign agency. The Service must and does comply with Canada’s laws and legal obligations in sharing information with foreign entities, and expects the same from its foreign counterparts.

Terrorist Group Profiles

Cyber threats from hostile actors continue to evolve. State-sponsored entities and terrorists alike are using Computer Network Operations (CNO) directed against Canadian interests, both domestically and abroad. Canada remains both a target for malicious cyber activities, and a platform from which these hostile actors conduct CNO against entities in other countries.

Infographic: Graphic depicting Canadian sectors vulnerable to cyber threats. Long description below.

Long description of infographic: Canadian sectors at risk

These state-sponsored and terrorist CNO actors are increasing in number, capability and aggression, and have access to a growing range of tools and techniques that they can employ to accomplish their mission. As these tools and techniques evolve and become more complex, so too do the challenges of detecting and attributing CNO.

Moreover, despite the fact that they originate in the virtual realm, the consequences of CNO can be very real. For example, in December 2015, a cyber-attack conducted against three Ukrainian power companies resulted in a power outage that left hundreds of thousands of people in the dark. The type of systems the actors exploited in this attack is used by energy companies worldwide. Should such destructive cyber-operations be targeted against similar systems in Canada, they could potentially affect any and all areas of its critical infrastructure.

Unfortunately, CNOs are not uncommon and agencies at all levels of government in Canada have faced this threat. The Government of Canada witnesses serious attempts to penetrate its networks on a daily basis.

CSIS is also aware of state-sponsored cyber-espionage and influence activities targeting the private sector in Canada and abroad. The targets of these attacks often fall within Canada’s advanced technology sector and throughout the critical infrastructure spectrum. Universities engaged in advanced research and development have also been subjected to CNO. In addition to stealing intellectual property, one of the objectives of state-sponsored CNO is to obtain information which will give their own companies a competitive edge over Canadian firms. This could impact investment or acquisition negotiations involving Canadian companies and the Government of Canada, and, in turn, lead to lost jobs, revenue, and market share. Ultimately, cyber-espionage negatively impacts Canada’s economy as a whole.

In responding to these threats, CSIS relies on specialized collection techniques to report on state-sponsored cyber-espionage or cyber-terrorism activity. For instance, by analyzing networks or malware behind CNOs, the Service can uncover clues that help identify the origins of the cyber-attacks (known as “attribution”).

The Service also maintains relationships with domestic and foreign agencies to provide the Government of Canada with the most up-to-date intelligence regarding the cyber threats facing Canada and who is behind them.

The CSIS Security Screening program represents one of the most visible of the Service’s operational sectors. It helps defend Canada and Canadians from threats to national security emanating from terrorism and extremism, espionage, and the proliferation of weapons of mass destruction. Security screening prevents persons who pose these threats from entering or obtaining status in Canada, or from obtaining access to sensitive sites, government assets or information. In addition, through its government screening program, CSIS assists the RCMP with the accreditation process for Canadians and foreign nationals seeking access to or participating in major events in Canada.

2014-2015 2015-2016

Note: Figures have been rounded
**Individuals claiming refugee status in Canada or at ports of entry

Infographic: Statistics on the security screening program at CSIS for the 2014-2015 and 2015-2016 fiscal years. Long description below.

Long description of infographic: Statistics from the security screening program

Long description of infographic: Statistics for the 2015 Pan Am Games

Read more about the CSIS Security Screening program

The CSIS Security Screening program also played a key role in achieving the Government of Canada’s goal to resettle 25,000 refugees from Syria by February 29, 2016. Between November 2015 and February 2016, CSIS conducted screening investigations on the applicants selected for resettlement in Canada. CSIS continues to work closely with the Canada Border Services Agency (CBSA) and Immigration, Refugees, and Citizenship Canada (IRCC) to provide timely security advice regarding permanent resident applicants who could represent a threat to Canada’s national security, while ensuring legitimate refugees are screened and resettled in a timely manner.

The people of CSIS are committed to ensuring a Service that is nimble, flexible and innovative, and takes responsible risks in the delivery of its mandate and in the pursuit of its strategic outcome.

As of March 31, 2016
Infographic: the make-up of CSIS workforce and awards received. Long description below.

Long description of infographic: Statistics related to CSIS’ workforce and awards received

Recruiting the right talent to deliver on our mandate remains a key priority for the Service and the CSIS recruiting website, csiscareers.ca represents the cornerstone of our efforts. During 2014-2016, there were over 2 million hits to the site resulting in close to 90,000 applications being submitted.

Infographic: Statistics from csiscareers.ca and the total applications received during 2014-2015 and 2015-2016. Long description below.

Visit the CSIS recruiting site(External link)

Long description of infographic: Statistics from the CSIS recruiting site

The Service prioritizes a diverse workforce which allows us to better understand the demographics of the Canadian communities we protect, therefore better equipping us to collect relevant and accurate intelligence. Our recruiting team includes a diversity recruiter who liaises with a variety of community leaders across the country, and attends diversity job fairs and networking events in an effort to attract applicants from designated groups such as visible minorities, Aboriginal peoples and persons with disabilities.

In addition, a partnership has been established with Public Safety, the Royal Canadian Mounted Police (RCMP), Canada Border Services Agency (CBSA), Correctional Service Canada (CSC), Communication Security Establishment (CSE) and Department of National Defence to share best recruiting practices and hold joint initiatives.

The Academic Outreach (AO) program at CSIS seeks to promote conversations with experts from a variety of disciplines and cultural backgrounds working in universities, think tanks and other research institutions in Canada and abroad.

Infographic: Statistics related to the Academic Outreach program for 2014-2015 and 2015-2016. Long description below.

Long description of infographic: Academic Outreach statistics

Infographic: Academic Outreach publications from 2014-2016. Long description below.

Political Stability in West and North Africa - Highlights from the Conference Pitfalls and Promises: Security Implications of a Post-revolutionary Middle East - Highlights from the Conference Russia and the West: The Consequences of Renewed Rivalry - Highlights from the Workshop Brittle Might? Testing China's    Success - Highlights from the Conference Foreign Fighters Phenomenon and Related Security  Trends in the Middle East - Highlights from the Workshop

Long description of infographic: Publications from Academic Outreach

In 2014-2015, AO hosted a conference that brought together multi-disciplinary experts from several countries. The conference was entitled “A Brave New World: Exploring the Evolving Nature of Cyber-conflict” and examined cyber threats facing Canada and its Western allies, our adversaries and their intent, as well as countermeasures that could help mitigate the proliferation of cyber conflict. In 2015-2016, we hosted another conference, “Brittle Might? Testing China’s Success”, which explored the challenges facing modern China, assessed the strengths and weaknesses of the country’s leadership, examined Beijing’s involvement in global affairs and debated China’s trajectory in the coming years.

The international conferences, however, represent only one component of the AO program. We also hosted a number of in-depth briefings on other topics of interest. For instance, one reviewed the global banking sector’s experience at identifying money laundering and terrorist financing activity. Another expert explored the phenomenon of radicalization in Western countries, while another guest specialist assessed the capabilities of Shia militias operating in Iraq and Syria.

During the period of review,  outside experts engaged CSIS staff on discussions covering a range of security and strategic issues, including Russia’s strategy towards the Arctic; the uses and limitations of ‘big data’ for intelligence analysis; Boko Haram’s campaign of violence in Nigeria; and the regional consequences of the conflict in Iraq and Syria on Lebanon.

The Security Intelligence Review Committee (SIRC) is an external independent review body that reports to Parliament on CSIS’ operations. It does so through its three core functions: certifying the CSIS Director’s annual report to the Minister of Public Safety, carrying out in-depth reviews of CSIS activities and conducting investigations into public complaints about CSIS. CSIS’ External Review and Liaison Unit (ER&L) manages the Service’s relationship with SIRC, ensuring that it receives all of the necessary information required to fulfil its mandate.

Infographic: Statistics related to SIRC reviews and complaints made to SIRC. Long description below.

Long description of infographic: SIRC reviews and complaints 2014-2015 and 2015-2016

Each year, SIRC provides a research plan identifying the reviews it plans to undertake. For each review, ER&L works closely with SIRC to ensure it has the documents it needs and to arrange briefings by CSIS employees. ER&L manages the correspondence between SIRC and the Service during a review as well as the Service’s response to the resulting report. These reviews, reflected in SIRC’s Annual Public Report, provide comprehensive assurance to Parliament and the Canadian public about the Service’s exercise of its authorities.

ER&L is also the primary point of contact for all stakeholders on public complaints made to SIRC and ensures that SIRC’s legal counsel has the information required for complaint investigations. When an investigation involves a hearing, ER&L assists Department of Justice legal counsel in preparing the CSIS case, including preparation of submissions, exhibits and arranging witnesses to testify at hearings.

ER&L coordinates CSIS responses to SIRC on questions, requests, recommendations, and correspondence. While CSIS is not required to accept all SIRC recommendations, they are reviewed carefully and CSIS responds in writing and these responses are reflected in SIRC’s Annual Report. In ensuring continuity and transparency, ER&L tracks progress and reports to SIRC on CSIS’ implementation of actions recommended by SIRC.

CSIS Internal Audit Branch / Disclosure of Wrongdoing and Reprisal Protection

The Internal Audit (IA) Branch is led by the Chief Audit Executive (CAE), who reports to the CSIS Director and to the CSIS External Audit Committee (AC). The IA Branch is subject to the Treasury Board Policy on Internal Audit, the Internal Auditing Standards for the Government of Canada as well as the International Standards for the Professional Practice of Internal Auditing.

The CAE provides assurance services to the Director, Senior Management and the AC, as well as independent, objective advice and guidance on the Service’s risk management practices, control framework, and governance processes. The CAE is also the Senior Officer for Disclosure of Wrongdoing.

The AC examines CSIS’ performance in the areas of risk management, control and governance processes relating to both operational activities and administrative services. By maintaining high standards in relation to its review function in particular following-up on the implementation of management action plans derived from audit recommendations, the AC supports and enhances the independence of the audit function.

In the capacity of Senior Officer for Disclosure of Wrongdoing, the CAE is responsible for administering the Internal Disclosure of Wrongdoing and Reprisal Protection Policy. The Policy provides a confidential mechanism for employees to come forward if they believe that serious wrongdoing has taken place. It also provides protection against reprisal when employees come forward, and ensures a fair and objective process for those against whom allegations are made.

The mandate of the Access to Information and Privacy (ATIP) Unit is to fulfill the Service’s obligations under the Access to Information Act and the Privacy Act. The Service’s Chief, ATIP is entrusted with the delegated authority from the Minister of Public Safety Canada to exercise and perform the duties of the Minister as head of the institution.

Infographic: ATIP statistics for the 2014-2015 and 2015-2016 fiscal years. Long description below.

Long description of infographic: ATIP statistics

As the custodian of expertise related to the Service’s obligations under the Access to Information Act and the Privacy Act, the ATIP Unit processes all requests made under the relevant legislation and responds to informal requests for information. In doing so, the unit must balance the need for transparency and accountability in government institutions while ensuring the protection of the Service’s most sensitive information and assets.

The Financial Resources table below provides a snapshot of CSIS expenditures over the last 6 years (from 2010-2011 to 2015-2016).

Infographic: Bar graph of CSIS expenditures over the last six years. Long description below.

Long description of infographic: CSIS expenditures from 2010-2016

 

Trump’s Aggressive Immigration Plan Released

When it comes to asylum seekers, a person under the Obama administration only needed to say they were seeking asylum. Trump’s plan raises the bar where conditions for being granted asylum must be proven.

Image result for trump immigration plan Image result for trump immigration detention centers

In part from Reuters:

WHAT IS “CREDIBLE FEAR”?

Under the Immigration and Nationality Act, an applicant must generally demonstrate “a well-founded fear of persecution on account of race, religion, nationality, membership in a particular social group, or political opinion.”

Immigration lawyers say any applicants who appear to meet that criteria in their initial interviews should be allowed to make their cases in court. They oppose encouraging asylum officers to take a stricter stance on questioning claims and rejecting applications.

Interviews to assess credible fear are conducted almost immediately after an asylum request is made, often at the border or in detention facilities by immigration agents or asylum officers, and most applicants easily clear that hurdle. Between July and September of 2016, U.S. asylum officers accepted nearly 88 percent of the claims of credible fear, according to U.S. Citizenship and Immigration Services data.

Asylum seekers who fail the credible fear test can be quickly deported unless they file an appeal. Currently, those who pass the test are eventually released and allowed to remain in the United States awaiting hearings, which are often scheduled years into the future because of a backlog of more than 500,000 cases in immigration courts.

Between October 2015 and April 2016, nearly 50,000 migrants claimed credible fear, 78 percent of whom were from Honduras, El Salvador, Guatemala or Mexico, according to statistics from USCIS.

The number of migrants from those three countries who passed credible fear and went to court to make their case for asylum rose sharply between 2011 and 2015, from 13,970 claims to 34,125, according to data from the Justice Department. More here from Reuters.

 

Implementing the President’s Border Security and Immigration Enforcement Improvements Policies by USA TODAY on Scribd

FNC: Homeland Security Secretary John Kelly moved Tuesday to implement a host of immigration enforcement changes ordered by President Trump, directing agency heads to hire thousands more officers, end so-called “catch-and-release” policies and begin work on the president’s promised U.S.-Mexico border wall.

“It is in the national interest of the United States to prevent criminals and criminal organizations from destabilizing border security,” Kelly wrote in one of two memos released Tuesday by the department.

The memos follow up on Trump’s related executive actions from January and, at their heart, aim to toughen immigration enforcement.

The changes would spare so-called “dreamers.” On a conference call with reporters, a DHS official stressed that the directives would not affect Obama-era protections for illegal immigrants who came to the U.S. as children and others given a reprieve in 2014. But outside those exemptions, Kelly wrote that DHS “no longer will exempt classes or categories of removable aliens from potential enforcement.”

A DHS official said the agencies are “going back to our traditional roots” on enforcement.

The memos cover a sprawling set of initiatives including:

  • Prioritizing criminal illegal immigrants and others for deportation, updating guidance from previous administration
  • Expanding the 287(g) program, which allows participating local officers to act as immigration agents – and had been rolled back under the Obama administration
  • Starting the planning, design and construction of a U.S.-Mexico border wall
  • Hiring 10,000 Immigration and Customs Enforcement agents and officers
  • Hiring 5,000 Border Patrol agents
  • Ending “catch-and-release” policies under which illegal immigrants subject to deportation potentially are allowed to “abscond” and fail to appear at removal hearings

It’s unclear what timelines the secretary is setting for some of these objectives, and what budgetary and other constraints the department and its myriad agencies will face. In pursuing an end to “catch-and-release,” one memo called for a plan with the Justice Department to “surge” immigration judges and asylum officers to handle additional cases.

While congressional Republicans have vowed to work with Trump to fund the front-end costs associated with his promised border wall, the same memo also hints at future efforts to potentially use money otherwise meant for Mexico – following on Trump’s repeated campaign vow to make Mexico pay for the wall. The secretary called for “identifying and quantifying” sources of aid to Mexico, without saying in the memo how that information might be used.

Mexican officials repeatedly have said they will not pay for a border barrier. DHS said it has identified initial locations to build a wall where current fencing is not effective, near El Paso, Texas; Tucson, Ariz.; and El Centro, Calif.

The DHS directives come as the Trump White House continues to work on rewriting its controversial executive order suspending the U.S. refugee program as well as travel from seven mostly Muslim countries. The order was put on hold by a federal court, and Trump’s team is said to be working on a new measure.

The directives also come as the Trump administration faces criticism from Democratic lawmakers and immigration advocacy groups for recent ICE raids of illegal immigrants.

DHS officials on Tuesday’s conference call stressed that they are operating under existing law and once again shot down an apparently erroneous news report from last week claiming National Guard troops could be utilized to round up illegal immigrants. That will not happen, an official said.

“We’re going to treat everyone humanely and with dignity, but we are going to execute the laws of the United States,” a DHS official said on the conference call.

Trump Admin vs. Shadow Operations

Trump and his team were and still are ill-prepared for the opposition hostilities aimed at his people and administration. One must question whether Trump’s operation was ready to take on the legal warfare for his temporary travel suspension. One must question whether Trump is ready for the Russian aggressions. And what about the fights for tax reform and the full repeal of Obamacare?

Obama’s advice to Trump: ‘Reality has a way of biting back’

Okay, but there can be only one president at a time and sadly it seems that Obama has a quasi-shadow presidency in full operation and gaining traction to destroy the Trump presidency where Obama can run policy from points all across the country. How so you ask?

Image result for obama trump Vanity Fair

Well we have former CIA Director John Brennan who re-tooled the agency during his last two years as director. Re-tooled it how? Perhaps to carry on policy favoring the Obama doctrine and Iran leaving a few well placed loyal operatives to do the work. But most of all, restructured his spies for the world of cyber. Humm, right?

Then we have Ben Rhodes, the former deputy of the Obama National Security Council. He is working the media channels with wild abandon giving talking points and missions for media to ensure sand stays in the gears of the Trump administration. After all, Rhodes worked those very same channels and the lobby operations during the Iranian nuclear agreement talks. Remember, Ben Rhodes’ brother, David is the president of CBS News.

Then we have Van Jones, the shamed former Obama ‘green czar’ that contributes to CNN. He launched a non-profit called Megaphone Strategies. What is that? It is an operation that promotes demonstrations and rallies all in the name of ‘social justice’. Humm right?

 

 

 

 

 

 

 

 

Okay, so back to Obama….

***

Obama’s Shadow Presidency

Well-funded Organizing for Action promises to crack conservative skulls to halt the Trump agenda.

Vadum: Former President Obama is waging war against the Trump administration through his generously funded agitation outfit, Organizing for Action, to defend his monumentally destructive record of failure and violent polarization.

It is a chilling reminder that the increasingly aggressive, in-your-face Left in this country is on the march.

Acclaimed author Paul Sperry writes in the New York Post:

Obama has an army of agitators — numbering more than 30,000 — who will fight his Republican successor at every turn of his historic presidency. And Obama will command them from a bunker less than two miles from the White House.

In what’s shaping up to be a highly unusual post-presidency, Obama isn’t just staying behind in Washington. He’s working behind the scenes to set up what will effectively be a shadow government to not only protect his threatened legacy, but to sabotage the incoming administration and its popular “America First” agenda.

What is Organizing for Action? It is a less violent version of Mussolini’s black shirts and Hitler’s brown shirts, or of the government-supported goon squads that Venezuela’s Hugo Chavez and Cuba’s Castro brothers used to harass and intimidate their domestic opponents.

OfA isn’t, strictly speaking, a new group. After the 2008 election, the group, then known as Organizing for America, was a phony grassroots campaign run by the Democratic National Committee that sought to replicate the community organizing techniques Obama learned from the teachings of his fellow Chicagoan, Saul Alinsky. OfA was created in large part because the White House could not legally use the 13 million e-mail addresses that the Obama campaign compiled in 2008.

Former U.S. Rep. Bob Edgar (D-Penn.), sounded the alarm about OfA in 2013, suggesting the group was dangerous to democracy. “If President Obama is serious about his often-expressed desire to rein in big money in politics, he should shut down Organizing for Action and disavow any plan to schedule regular meetings with its major donors,” he said as president of the left-wing group Common Cause. “Access to the President should never be for sale.”

“With its reported promise of quarterly presidential meetings for donors and ‘bundlers’ who raise $500,000, Organizing For Action apparently intends to extend and deepen the pay-to-play Washington culture that Barack Obama came to prominence pledging to end,” Edgar said. “The White House’s suggestion this week that this group will somehow be independent is laughable.”

But Edgar’s admonitions were ignored and since then Organizing for Action has thrived and grown rich, just like the Obamas.

As FrontPage previously reported, Obama has rented a $5.3 million, 8,200-square-foot, walled mansion in Washington’s Embassy Row that he is using to command his community organizing cadres. Michelle Obama will join the former president there as will the Obama Foundation. To stay on track, Obama wants his former labor secretary, Tom Perez, to win the chairmanship of the DNC in a party election later this month. “It’s time to organize and fight, said Perez who appears to be gaining on frontrunner and jihadist Rep. Keith Ellison (D-Minn.). “We must stand up to protect President Obama’s accomplishments,” adding, “We’re going to build the strongest grassroots organizing force this country has ever seen.”

No ex-president has ever done this before, sticking around the nation’s capital to vex and undermine his successor. Of course, Obama is unlike any president the United States has ever had. Even failed, self-righteous presidents like Jimmy Carter, who has occasionally taken shots at his successors, didn’t stay behind in Washington to obstruct and disrupt the new administration.

Organizing for Action, a 501(c)(4) nonprofit that doesn’t have to disclose its donors, is at the head of Obama’s network of left-wing nonprofit groups. OfA, Sperry warns, has “a growing war chest and more than 250 offices across the country.”

On its website, the group claims that there are “5 million Americans who’ve taken action” with OfA, and that those individuals “are part of a long line of people who stand up and take on the big fights for social justice, basic fairness, equal rights, and expanding opportunity.” Among its key issues are “turning up the heat on climate change deniers,” comprehensive immigration reform (which includes mass amnesty), “telling the stories of the millions who are seeing the life-saving benefits of Obamacare,” fighting for “a woman’s health care” which is “a basic right,” and redistributing wealth from those who earned it to those who didn’t.

OfA communications director Jesse Lehrich told Memphis-based WREG that the “grassroots energy that’s out there right now is palpable.” The group is “constantly hearing from volunteers who are excited to report about events they’re organizing around and all of the new people that want to get involved.”

Organizing for Action is drowning in money, by nonprofit standards.

By the end of 2014, OfA, which was formally incorporated only the year before, had taken in $40.4 million, $26 million of which was raised in 2014, according to the organization’s IRS filings. OfA’s big donors are members of the George Soros-founded Democracy Alliance, a donors’ consortium for left-wing billionaires devoted to radical political change. Among the DA members donating to OfA are: Ryan Smith ($476,260); Marcy Carsey ($250,000); Jon Stryker ($200,000); Paul Boskind ($105,000); Paul Egerman ($100,000); and Nick Hanauer ($50,000).

OfA also runs a project called the Community Organizing Institute (COI) which it says partners “with progressive groups and organizations to educate, engage, and collaborate.”

Organizing for Action describes COI in almost lyrical terms:

Building upon the rich history of community organizing in Chicago, the COI is a place to share stories, best practices, and innovations in order to build our community and empower individuals in the fight for change. It is a shared space for organizers, policy makers, advocates, and change-agents to come together for workshops, panel discussions, presentations, trainings, film screenings, and social gatherings—building a strong foundation for partnerships.

Translation: at COI you can learn how to spark riots, get arrested to make a political statement, organize lynch mobs and voter fraud on a massive scale, intimidate and shake down corporations, blackmail lenders, race-bait public officials and businesses into submission, smear and terrorize your opponents, shield illegal aliens from law enforcement, lead squatters to invade foreclosed homes, encourage welfare fraud, and use tax dollars to promote cockamamie social-engineering schemes.

Obama is “intimately involved” in OfA’s operations and issues tweets from the group’s account, Sperry writes. “In fact, he gave marching orders to OFA foot soldiers following Trump’s upset victory.”

“It is fine for everybody to feel stressed, sad, discouraged,” Obama said in a post-election conference call from the White House. “But get over it.” Progressives have to “move forward to protect what we’ve accomplished.”

“Now is the time for some organizing,” he said. “So don’t mope.”

Organizing for Action has been doing anything but moping.

In recent weeks its activists organized marches across the country. Some became riots. After President Trump issued Executive Order 13769 temporarily banning visitors from seven terrorism-plagued Muslim countries, OfA organized “spontaneous” demonstrations at airports.

Obama praised the airport rabble-rousers, saying through a spokesman he was “heartened by the level of engagement taking place in communities around the country.”

“Citizens exercising their Constitutional right to assemble, organize and have their voices heard by the elected officials is exactly what we expect to see when American values are at stake.”

Reinforcements are coming to beef up Organizing for Action’s position, Sperry adds.

OfA will be soon aided by “the National Democratic Redistricting Committee, launched last month by Obama pal Eric Holder to end what he and Obama call GOP ‘gerrymandering’ of congressional districts.”

And more unruly protests, rioting, and violent attacks on Trump supporters will follow.