Gangs Use of Emojis in Text Messages

How gang members could be using emojis photo

In part: “I’ll see a string of pictures, and I’m like, ‘I don’t know what that means,'” she said.

Donna Price said that’s exactly what gang members want to hear.

Price was part of the Street Safe Task Force established by former North Carolina Gov. Bev Perdue and worked closely with gang prevention coordinators. Price said gangs are using what look like innocent emojis in social media posts as hidden messages to recruit, communicate with one another and threaten rivals.

“There are about 1,200 emojis out there, and those emojis can each mean four different meanings,” Price said.

Maxwell asked Foston what she thinks the gas pump emoji means.

“They need gas,” Foston answered. “They’re at an old-school gas station and they’re in the middle of nowhere.”

Not always. Some use that emoji as a symbol for gang. They may add the emoji “A” and emoji “NG” to erase any doubt.

Or they’ll use a cluster of emojis, like the one below. It means “Do you have any weed?”

The emoji combo of a man running and scissors is a threat to cut or stab someone.

“This is like taking it to the next level,” Foston said. “That’s scary.”

Detective Al Smith of the Violent Crimes and Gang Unit in Burlington said that the emoji communication code started with gangs in the western and northern parts of the country.

“They like to share everything. It’s a common trend with gangs,” Smith said.

Maxwell looked at the Twitter feed of a well-known Chicago gang member and found the gas pump emojis and others with multiple meanings, along with plenty of threats.

That gang member was killed three years ago.

“The trend is, by the time we find out about it, they have either used it or have moved on to something else,” said Smith.

That’s where things can get complicated. The alternative meanings of the emojis change often, because gangs know that investigators are on to them. Different gangs use the emojis in different ways, so it can be tough for police, and parents, to break the code, which is why Price said parents have to make the effort to know what the pictures mean.

“It’s like music and technology,” said Price. “You have to stay up on it all the time.”

“I have to tell them (my children) all the time, ‘It’s not necessarily you,’” Foston said. “’It’s the people around you. And I don’t know everybody that you communicate with or talk to.’”

*** BTW, as a warning: Parents beware: Kids are using this secret emoji language

How gang members could be using emojis | FOX13

In the secret code of New York gangs, texting two thumbs up doesn’t mean everything is OK.

It means you’re a member of the Harlem Crips, a ruthless band of hoodlums who have terrorized upper Manhattan for decades, according to police.

They say violent city street toughs have turned to cutesy emoji and other digital imagery to communicate with each other, using seemingly innocuous symbols as tools of murder, assault, rape and robbery.

“Social media is something the juveniles and youth are constantly using,” said NYPD Sgt. Leo Nugent of the Bronx Gang Squad, noting that the gas pump has become a universal symbol for “gang.”

“If I’m in a gang mode, I’ll put that up,” he said.

The Crips opt for the two thumbs-up emoji, with the knuckles facing each other, because they resemble the letter “H.”

Their longstanding rivals, the Bloods, signal their affiliation with an image of a magician’s top hat.

They even go after each other with emoji, posting other gangs’ symbols upside down as a sign of disrespect.

And they livestream video from their opponents’ turf on Snapchat, a type of taunting known as “cyberbanging.”

Gangs have learned to avoid Facebook, which police have scoured for years for evidence used to lock up suspected leaders.

“They call Facebook ‘Fedbook’ now, because if you talk on Facebook, the feds will be monitoring,” Nugent said.

Gangbangers now prefer WhatsApp, CoverMe, Kik Messenger and Yubo — a dating app marketed to teens — where their messages quickly disappear, making it harder for cops to track them, according to lawmen.

“They’re pretty smart,” said Detective Belinda Delgado, also with the Bronx Gang unit. “WhatApp — the minute you delete it from your phone, it disappears.”

Messages sent in chat apps are not visible to the public, so there’s no way for cops to monitor conversations.

Nugent said gangs are using emoji to recruit new members and to demand they commit crimes.

He said gangs might order new members to run a credit card or check scam, using digital symbols of a man running, a money bag and a credit card.

“Members we have identified will ask for anyone who is 18 and over and who has a valid ID to private message them,” Delgado said.

Gang activity is also carried out on gaming consoles, according to Nugent.

In one robbery, a Crip set up a purported cellphone sale while chatting via PlayStation. When the victim showed up, someone pulled a gun on him and robbed him, Nugent said.

“In these chats sometimes people sell items, sneakers, headphones or cellphones, etc.,” Nugent said. “The gamers can pull up pictures of each other, so they know who they are communicating with.”

Police rely heavily on confidential informants (CIs) to fill them in on gang methods, according to Delgado.

“A CI who says, ‘Hey, our set uses Snapchat, and we communicate there when we have meetings’ . . . when we have a problem he gets us the screenshots.

“Without a court order, we can not monitor in real-time.”

The NYPD has enlisted parents to monitor potential gang activity on social media, and teaches them what to look for at gang-awareness seminars.

“I can’t go to every kid and look through his phone, but the parent can,” Nugent said.

Police said teens with big social-media followings should be a red flag for parents.

“If your kid has 3,000-5,000 friends — that could be a problem if you live in a certain neighborhood,” Nugent said.

 

1st Amendment or Selective Enforcement, Kentucky and Texas

So, just a few days ago, a disruptive crowd gathered in the street and front lawn of Senator Mitch McConnell’s home. This happened to nights in a row at his home and office. At his home they chanted in what was reported as a peaceful assembly and exercising free speech. This is all due to the recent mass shootings. Senator McConnell is recovering at home due to a major injury to his shoulder suffered as a result of a fall.

  Local police did not intervene stating that the assembly was within the law. But, hey that is hardly accurate. Let’s take a look at the law in Kentucky shall we?

Code Section Kentucky Revised Statute section 525.055: First-Degree Disorderly Conduct
What’s Prohibited? First-degree disorderly conduct is committed in Kentucky when the following four element are all present:

  1. Engaging in any of the following acts in a public place with the intent to cause public inconvenience, annoyance, or alarm:
  • Fighting, or acting in a violent, tumultuous, or threatening way
  • Making unreasonable noise

OR

Code Section Kentucky Revised Statute section 525.060: Second-Degree Disorderly Conduct
What’s Prohibited? Intentionally causing public inconvenience, annoyance, alarm, or wantonly creating a risk thereof in public while:

  • Engaging in fighting, or violent, tumultuous, or threatening behavior,
  • Making unreasonable noise

Misdemeanor Penalties in Kentucky

  • Class A misdemeanor: Punishable by imprisonment for up to 12 months and/or a fine of up to $500.
  • Class B misdemeanor: Punishable by imprisonment for up to 90 days and/or a fine of up to $250.

Okay, now we travel over to San Antonio….and Joaquin Castro, the twin brother of Congressman Julian Castro, currently a presidential candidate. By the way, Joaquin Castro is the campaign chair for his twin brother. We have a nasty doxxing operation that was launched at the hands of really both Castro twins.

The congressman claims he was targeting voters that are fueling a campaign of hate that labels Hispanic immigrants as invaders. Meanwhile, Congresswoman, Rashida Tlaib of Michigan defends the Castros.

So, what are the details?

 

It is notable that Castro did not list ANY Latinos in his doxxing.

Image It does not seem to matter that campaign contributions are free speech and fully protected by the 1st Amendment. Will media even go there in reporting this? Nah. Will the House Ethics Committee get involved? Nah. The mayor? Law enforcement? Nah.

What if someone gets hurt? Who is responsible?

Congressman Steve Scalise knows this quite well.

 Steve Scalise
@SteveScalise
People should not be personally targeted for their political views. Period. This isn’t a game. It’s dangerous, and lives are at stake. I know this firsthand.
Would there be Democrat outrage if any republican or President Trump had done this? Of for sure and you can bet the SPLC or ACLU would already be filing law suits.
And the polarized divided media, political class and laws continue to swirl.

North Korea Stole $2 billion for its WMD programs

Primer: North Korea has launched 4 rounds of missiles in less than 2 weeks. Talks between the United States and North Korea have stalled. The missiles tested during the recent launches are short range, however can reach South Korea and can travel as far as an estimated 400 miles. These test missiles allegedly are very advanced such they are being advertised as having the abilities to evade missile defense systems. Additionally, each launch took place from a different ground location.

Image result for kim jong un missile launches

UNITED NATIONS (Reuters) – North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using “widespread and increasingly sophisticated” cyber attacks to steal from banks and cryptocurrency exchanges, according to a confidential U.N. report seen by Reuters on Monday.

Pyongyang also “continued to enhance its nuclear and missile programmes although it did not conduct a nuclear test or ICBM (Intercontinental Ballistic Missile) launch,” said the report to the U.N. Security Council North Korea sanctions committee by independent experts monitoring compliance over six months.

The North Korean mission to the United Nations did not respond to a request for comment on the report, which was submitted to the Security Council committee last week.

The experts said North Korea “used cyberspace to launch increasingly sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to generate income.” They also used cyberspace to launder the stolen money, the report said.

“Democratic People’s Republic of Korea cyber actors, many operating under the direction of the Reconnaissance General Bureau, raise money for its WMD (weapons of mass destruction) programmes, with total proceeds to date estimated at up to two billion US dollars,” the report said.

North Korea is formally known as the Democratic People’s Republic of Korea (DPRK). The Reconnaissance General Bureau is a top North Korean military intelligence agency.

The U.N. experts said North Korea’s attacks against cryptocurrency exchanges allowed it “to generate income in ways that are harder to trace and subject to less government oversight and regulation than the traditional banking sector.”

The Security Council has unanimously imposed sanctions on North Korea since 2006 in a bid to choke off funding for Pyongyang’s nuclear and ballistic missile programs. The Council has banned exports including coal, iron, lead, textiles and seafood, and capped imports of crude oil and refined petroleum products.

U.S. President Donald Trump has met with North Korea leader Kim Jong Un three times, most recently in June when he became the first sitting U.S. president to set foot in North Korea at the Demilitarized Zone (DMZ) between the two Koreas.

They agreed to resume stalled talks aimed at getting Pyongyang to give up its nuclear weapons program. The talks have yet to resume and in July and early August, North Korea carried out three short-range missiles tests in eight days.

The U.N. report was completed before last week’s missile launches by North Korea, but noted that “missile launches in May and July enhanced its overall ballistic missile capabilities.”

The U.N. experts said that despite the diplomatic efforts, their “investigations show continued violations” of U.N. sanctions.

“For example, the DPRK continued to violate sanctions through ongoing illicit ship-to-ship transfers and procurement of WMD-related items and luxury goods,” the U.N. report said.

Fancy Bear, APT28, IoT, Hacking via Printers

Image result for jon huntsman moscow photo

Primer: U.S Ambassador to Russia, Jon Huntsman just issued his letter of resignation to President Trump. He states that he wants to return home to Utah due to a growing family. Gotta wonder if Amb. Huntsman ever really challenged Moscow on hacking and security intrusions of the United States.

Image result for fancy bear russia

MIT: A group of hackers linked to Russian spy agencies are using “internet of things” devices like internet-connected phones and printers to break into corporate networks, Microsoft announced on Monday.

Fancy Bear never hibernates: The Russian hackers, who go by names like Strontium, Fancy Bear, and APT28, are linked to the military intelligence agency GRU.

The group has been active since at least 2007. They are credited with a long list of infamous work including breaking into the Democratic National Committee in 2016, the crippling NotPetya attacks against Ukraine in 2017, and targeting political groups in Europe and North America throughout 2018.

Insecurity of Things: The new campaign from GRU compromised popular internet of things devices including a VOIP (voice over internet protocol) phone, a connected office printer, and a video decoder in order to gain access to corporate networks. Microsoft has some of the best visibility into corporate networks on earth because so many organizations are using Windows machines. Microsoft’s Threat Intelligence Center spotted Fancy Bear’s new work starting in April 2019.

The password is password: Although things like smartphones and desktop computers are often top of mind when it comes to security, it’s often the printer, camera, or decoder that leaves a door open for a hacker to exploit.

In multiple cases, Microsoft saw Fancy Bear get access to targeted networks because the IoT devices were deployed with default passwords. In another case, the latest security update was not applied. Using those devices as a starting point, the hackers established a beachhead and looked for further access.

“Once the actor had successfully established access to the network, a simple network scan to look for other insecure devices allowed them to discover and move across the network in search of higher-privileged accounts that would grant access to higher-value data,” Microsoft warned in a blog post published on Monday.

The hackers moved from one device to another, establishing persistence and mapping the network as they went, communicating with command and control servers all the while.

Global targets: Microsoft has been closely watching this group over the last year.

Of the 1,400 notifications the company delivered to those targeted or compromised by Fancy Bear, 20% have been to global non-governmental organizations, think tanks, or politically affiliated organizations. The remaining 80% have been to various sectors including government, technology, military, medicine, education, and engineering.

“We have also observed and notified STRONTIUM attacks against Olympic organizing committees, anti-doping agencies, and the hospitality industry,” Microsoft’s blog warned.

Last year, the FBI took disruptive action against a Fancy Bear campaign known as “VPNFilter” which targeted routers and network storage devices with malware with destructive capabilities of “bricking” a device by deleting firmware and rendering the device unusable. That campaign especially targeted Ukraine, a favorite target of Fancy Bear.

Waivers? China Pharmaceuticals Killing Americans

Primer:

Image result for chinese pharmaceuticals
In part from Reuters: “My friend President Xi said that he would stop the sale of fentanyl to the United States – this never happened and many Americans continue to die,” Trump said in a tweet.

“We’re losing thousands of people to fentanyl,” he later told reporters.

The Chinese embassy did not immediately respond to a request for comment.

Fentanyl is an opioid painkiller 50 times more potent than heroin, and has a central role in the devastating U.S. opioid crisis. In the United States, fentanyl and all of its analogues are controlled substances subject to strict regulation.

More than 28,000 synthetic opioid-related overdose deaths, mostly from fentanyl related substances, were recorded in 2017, according to the U.S. Centers for Disease Control and Prevention.

Image result for chinese pharmaceuticals

Added from Bloomberg:

China has become the world’s largest supplier of active pharmaceutical ingredients, or API, providing key components to drugmakers worldwide. But a yearlong recall of tainted heart drugs taken by millions of Americans is prompting U.S. national security officials to ask whether China’s growing role in the pharmaceutical supply chain could pose a threat to the health of military personnel.

“The national security risks of increased Chinese dominance of the global API market cannot be overstated,” Christopher Priest, the acting deputy assistant director for health care operations and Tricare for the Defense Health Agency, told a U.S.-China advisory panel last week in Washington.

The Defense Health Agency manages much of the health care of military members, including prescription drugs.

Concerns about the safety and efficacy of Chinese-made drugs are rising at a time of heightened trade tensions between Washington and Beijing. Last week, Trump unveiled plans for new tariffs on Chinese goods; China plans to halt imports of U.S. crops in response. The yuan sank on Monday against the dollar.

The National Security Council is looking into Chinese drug manufacturing and trying to identify the most at-risk medications, Priest told the U.S.-China Economic and Security Review Commission in Washington, without elaborating. The National Security Council declined to comment.

The Defense Health Agency is supposed to use drugs that comply with the Trade Agreements Act, a 1979 law that requires many federal purchases to be made in the U.S. or another compliant country. China isn’t on the approved list, but the agency has waivers for almost 150 drugs they otherwise wouldn’t be able to procure, Priest said. The TAA covers only finished products, not their components.

Many drugs taken by military members and civilians have active ingredients made in China. While drugmakers typically don’t disclose where every molecule in a pill comes from, the recall of contaminated blood-pressure drugs has shown that many of their active components originated in Chinese factories.

Rocket Fuel

Larry Wortzel, a member of the U.S.-China commission and a military retiree, said four of his blood-pressure medications were recalled in three months. Wortzel’s pills, versions of a drug called valsartan, were manufactured in India but had active ingredients from China.

“They were contaminated with rocket fuel,” Wortzel said. “I imagine active people have the same problem. This affects the readiness of our troops.”

The recalled valsartan contained a probable carcinogen known as NDMA, a manufacturing byproduct once used to make rocket fuel and also found in grilled and cured meats.

Priest called the recalls “a never-ending saga” and a “wake-up call.”

The recalls began in July 2018 with valsartan made by China’s Zhejiang Huahai Pharmaceutical Co. The U.S. Food and Drug Administration has largely blamed the company’s manufacturing process for creating the NDMA, which went undetected for as long as four years. Drugmakers in other countries who used similar processes have also had to recall blood-pressure pills.

Some valsartan purchased by the Defense Logistics Agency and later recalled was TAA-compliant, said Patrick Mackin, a spokesman for the DLA. The agency manages the supply chain for the U.S. military, including ensuring pharmaceuticals make their way to military treatment facilities. With valsartan in shortage, according to the FDA, the agency sought a TAA waiver for valsartan on July 15, Mackin said.

A Bloomberg investigation this year detailed doubts among U.S. health officials about the data generic-drug companies, including Zhejiang Huahai and others involved in the valsartan recalls, use to prove their products are safe and effective.

“We wouldn’t have our aircraft carriers and nuclear submarines built in China, and for very important medications, we really should look at what it takes to purchase based on value not just price,” Rosemary Gibson, the author of the book “China Rx,” told the commission. “We want cheap, we can buy cheap. But what’s missing from the whole equation is quality.”

Shortage Fears

Quality isn’t the only concern. Shortages could also arise from attempts by the Chinese to cut off supply, particularly amid the U.S.-China trade standoff.

“If China shut the door on exports, our hospitals would cease to function, so this has tremendous urgency,” Gibson said.

Priest said pharmaceutical companies should be compelled, using the buying power of the entire federal government, to maintain the infrastructure to make drugs without relying on countries like China.

The House Energy and Commerce Committee is investigating the FDA’s ability to police foreign manufacturing. The committee’s leaders asked the agency for more information on the valsartan recall in June, including about a dispute between senior officials and an agency inspector who raised red flags at Zhejiang Huahai more than a year before the NDMA was detected. The panel also asked the Government Accountability Office to look at the FDA’s oversight of foreign drug manufacturing.

“Shame on us for not paying attention to something so critical and assuming, which has been the orthodoxy for a long time, that the industry would regulate itself,” Benjamin Shobert, senior associate for international health at The National Bureau of Asian Research, told the commission.