An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
USAToday: A new accounting of guns that were allowed to be trafficked to Mexico as part of a botched U.S. firearms investigation shows that one of the weapons was used last year in a deadly shootout that left three Mexican police officers dead.
A Justice Department summary provided to two Republican congressional committee chairmen Tuesday found that a WASR-10 rifle, purchased six years before in the U.S., was one of three rifles fired in the July 27 assault in the town of Valle de Zaragoza. It was not immediately known which weapon caused the officers’ fatal wounds.
Nevertheless, Bureau of Alcohol Tobacco Firearms and Explosives officials traced the WASR rifle to a Nov. 12, 2009, transaction that was part of the flawed federal gun trafficking operation, known as “Operation Fast and Furious.”
“ATF and the (Justice) Department deeply regret that firearms associated with Operation Fast and Furious have been used by criminals in the commission of violent crimes, particularly crimes resulting the death of civilians and law enforcement officers,’’ Assistant Attorney General Peter Kadzik said in a Tuesday letter to Senate Judiciary Committee Chairman Charles Grassley of Iowa and House Oversight and Government Reform Chairman Jason Chaffetz of Utah.
“ATF accepts full responsibility for the flawed execution of Fast and Furious, and will continue to support Mexican law enforcement in efforts to recover and identify associated firearms.’’
As of January, according to the Justice Department letter, 885 firearms purchased by targets of the ATF operation have been recovered. Of that number, 415 were found in the U.S. and 470 “appear to have been recovered in Mexico.’’
The same letter confirmed prior reports that one of 19 weapons —a .50-caliber rifle —recovered in the January raid in Mexico that resulted in the re-capture of drug lord Joaquin “El Chapo” Guzman also was traced to the ATF operation.
**** Is there an end it sight? Not so much For years, the United States has pushed countries battling powerful drug cartels, like Mexico, to decapitate the groups by killing or arresting their leaders. The pinnacle of that strategy was the capture of Mexico’s most powerful trafficker, Joaquín Guzmán Loera, better known as El Chapo, who escaped in spectacular fashion last month from a maximum-security prison.
And while the arrests of kingpins make for splashy headlines, the result has been a fragmenting of the cartels and spikes in violence in places like Chilapa, a city of about 31,000, as smaller groups fight for control. Like a hydra, it seems that each time the government cuts down a cartel, multiple other groups, sometimes even more vicious, spring up to take its place.
“In Mexico, this has been a copy of the American anti-terrorism strategy of high-value targets,” said Raúl Benítez Manaut, a professor at the National Autonomous University of Mexico who specializes in security issues. “What we have seen with the strategy of high-value targets is that al-Qaida has been diminished, but a monster appeared called the Islamic State. With the cartels, it has been similar.”
While the large cartels are like monopolies involved in the production, transportation, distribution and sale of drugs, experts say, the smaller groups often lack international reach and only control a portion of the drug supply chain.
They also frequently resort to other criminal activities to boost their income, like kidnapping, car theft, protection rackets and human trafficking. And while the big cartels have the resources to buy off government officials at the national level, the smaller gangs generally focus on the local and state levels, often with disastrous consequences for communities.
That was abundantly clear in a case that stunned the nation last year, when 43 students disappeared in Iguala, a city a short distance from Chilapa.
FNC: Less than a month after becoming secretary of state, and registering the personal email domain that she would use exclusively for government business, Hillary Clinton’s team aggressively pursued changes to existing State Department security protocols so she could use her BlackBerry in secure facilities for classified information, according to new documents released under the Freedom of Information Act.
“Anyone who has any appreciation at all of security, you don’t ask a question like that,”cybersecurity analyst Morgan Wright told Fox News. “It is contempt for the system, contempt for the rules that are designed to protect the exact kind of information that was exposed through this email set up. “
Current and former intelligence officials grimaced when asked by Fox News about the use of wireless communications devices, such as a BlackBerry, in a SCIF (Sensitive Compartmented Information Facility) emphasizing its use would defeat the purpose of the secure facility, and it is standard practice to leave all electronics outside.
A former State Department employee familiar with the Clinton request emphasized security personnel at the time thought the BlackBerry was only for unclassified material, adding their concerns would have been magnified if they had known Clinton’s email account also held classified material.
“When you allow devices like this into a SCIF, you can allow the bad guys to listen in,” Wright added.
A February 17, 2009 email marked SECRET and cleared through the NSA says, “Ms. Mills described the requirement as chiefly driven by Secretary Clinton, who does not use standard computer equipment but relies exclusively on her Blackberry for emailing and remaining in contact on her schedule etc. Ideally all members of her suite would be allowed to use Blackberries for communication in the SCIF (Sensitive Compartmented Information Facility)”
Cheryl Mills was Clinton’s chief of staff from 2009-13.
The emails, obtained by Judicial Watch as part of a Freedom of Information Act lawsuit also show that a specialized NSA team was brought in to assess the vulnerabilities and feasibility of using wireless communications, including within a secure facility.
The NSA State Department liaison, whose name was withheld, told Mills in a now highly redacted email: “Sometimes the distinction between what can be done and what is, or is not, recommended to be done differ; this is one of those instances. (State Department Diplomatic Security) DS’s response illustrates their level of concern based on their extensive professional expertise. “
Clinton never used a State Department issued BlackBerry. It is not clear from the documents whether Clinton and her team went ahead and used their BlackBerrys in SCIFs despite the concerns, including those of the NSA.
A February 18 2009 email from the State Department’s Senior Coordinator for Security Infrastructure, Donald R. Reid, states “…once she (Clinton) got the hang of it, she was hooked, now every day, she feels hamstrung because she has to lock up her BB up. She does go out several times a day to an office they have crafted for her outside the SCIF and plays email catch-up. Cheryl Mills and others who are dedicated BB addicts are frustrated because they too are not near their desktop very often during the working day…”
The reference to a secondary office for Clinton appears to conflict with a February statement from the State Department that no stand-alone computer was set up outside Clinton’s main office on the executive floor, known as Mahogany Row, to check her personal account.
On February 25, Fox News pressed the State Department spokesman about a January 2009 email, also obtained by Judicial Watch, between Under Secretary for Management Patrick Kennedy and then Clinton chief of staff Mills where Kennedy said it was a “great idea” to setup a stand-alone PC for Clinton to check her email.
Asked by Fox News, State Department spokesman John Kirby said, “There was no stand-alone computer ever set up.”Fox News has asked Kirby to further clarify his statement.
In January 2009, Clinton signed at least two non-disclosure agreements in which she promised to protect classified information. Since then, more than 2,100 emails containing classified information have been identified, as well as 22 Top Secret that are too damaging to national security to release.
Earlier this week, Judicial Watch presented the federal court in Washington with a list of 7 Clinton aides it wants to question under oath about Clinton’s use of a private email sever when she was secretary of state.
Meanwhile, Judicial Watch is aggressively working on additional subpoenas for interrogatories of those within Hillary’s circle. One issue, in my humble opinion, they omitted Jake Sullivan.
(Washington, DC) – Judicial Watch today filed a plan for “narrowly tailored discovery” into former Secretary of State Hillary Clinton’s email matter with a federal court. Judicial Watch’s discovery plan seeks the testimony of eight current and former State Department officials, including top State Department official Patrick Kennedy, former State IT employee Bryan Pagliano, and Clinton’s two top aides at the State Department: Cheryl Mills and Huma Abedin. Judicial Watch’s plan says that “based on information learned during discovery, the deposition of Mrs. Clinton may be necessary” but would only occur with permission by the Court.
During a court hearing on February 23, U.S. District Court Judge Emmet G. Sullivan granted Judicial Watch’s motion for discovery into whether the State Department and Clinton deliberately thwarted the Freedom of Information Act (FOIA) for six years. The discovery arises in a Judicial Watch FOIA lawsuit that seeks records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton. The lawsuit was reopened because of revelations about the clintonemail.com system. (Judicial Watch v. U.S. Department of State (No. 1:13-cv-01363)).
Judicial Watch seeks testimony from:
Stephen D. Mull (Executive Secretary of the State Department from June 2009 to October 2012 and suggested that Mrs. Clinton be issued a State Department BlackBerry, which would protect her identity and would also be subject to FOIA requests);
Lewis A. Lukens (Executive Director of the Executive Secretariat from 2008 to 2011 and emailed with Patrick Kennedy and Cheryl Smith about setting up a computer for Mrs. Clinton to check her clintonemail.com email account);
Patrick F. Kennedy (Under Secretary for Management since 2007 and the Secretary’s principal advisor on management issues, including technology and information services);
Donald R. Reid (Senior Coordinator for Security Infrastructure, Bureau of Diplomatic Security since 2003 and was involved in early discussions about Mrs. Clinton using her BlackBerry and other devices to conduct official State Department business);
30(b)(6) deposition(s) of Defendant [designated witness(es) for the State Department] regarding the processing of FOIA requests, including Plaintiff’s FOIA request, for emails of Mrs. Clinton and Ms. Abedin both during Mrs. Clinton’s tenure as Secretary of State and after;
Cheryl D. Mills (Mrs. Clinton’s Chief of Staff throughout her four years as Secretary of State);
Huma Abedin (Mrs. Clinton’s Deputy Chief of Staff and a senior advisor to Mrs. Clinton throughout her four years as Secretary of State and also had an email account on clintonemail.com); and
Bryan Pagliano (State Department Schedule C employee who has been reported to have serviced and maintained the server that hosted the “clintonemail.com” system during Mrs. Clinton’s tenure as Secretary of State four years as secretary).
With respect to testimony of Clinton, the Judicial Watch court filing states:
Based on information learned during discovery, the deposition of Mrs. Clinton may be necessary. If [Judicial Watch] believes Mrs. Clinton’s testimony is required, it will request permission from the Court at the appropriate time.
Judicial Watch also seeks court approval of written questions requiring answers under oath by the State Department:
Who was responsible for processing and/or responding to record requests, including FOIA requests, concerning emails of Mrs. Clinton and other employees of the Office of the Secretary;
Who was responsible for the inventorying or other accounting of Mrs. Clinton’s and Ms. Abedin’s emails, records, and information;
Who was responsible for responding to Plaintiff’s FOIA request from the date of submission to the present; and
Which State Department officials and employees had and/or used an account on the clintonemail.com system to conduct official government business.
Judicial Watch also seeks testimony from a 30 (b)(6) witness or witnesses who can provide testimony on behalf of the State Department on the following issues:
the creation or establishment of the clintonemail.com system as well as any maintenance, service, or support provided by the State Department of that system;
the knowledge or awareness of State Department officials and employees about the existence and use of the clintonemail.com system;
any instructions or directions given to State Department officials and employees about communicating with Mrs. Clinton and Ms. Abedin via email;
any inquiries into Mrs. Clinton’s use of the clintonemail.com system as well as any discussions about responding to such inquiries or publicly revealing the existence and use of the clintonemail.com system to the public; and
the inventorying or other accounting of Mrs. Clinton’s and Ms. Abedin’s email upon their departure from the State Department.
The Judicial Watch plan requests only eight weeks to conduct the requested depositions. Judge Sullivan will rule on Judicial Watch’s proposed discovery plan after April 15.
“This discovery will help Judicial Watch get all of the facts behind Hillary Clinton’s and the Obama State Department’s thwarting of FOIA so that the public can be sure that all of the emails from her illicit email system are reviewed and released to the public as the law requires,” stated Judicial Watch president Tom Fitton.
Stripes: WASHINGTON — If the Marines were called today to respond to an unexpected crisis, they might not be ready, a top Marine general told the Senate Armed Services Committee on Tuesday.
Gen. John Paxton, assistant commandant of the U.S. Marine Corps, testified to lawmakers that the Marines could face more casualties in a war and might not be able to deter a potential enemy.
“I worry about the capability and the capacity to win in a major fight somewhere else right now,” he said, citing a lack of training and equipment.
Paxton, along with the vice chiefs of the Army, Navy and Air Force, spoke to the Senate committee on the readiness challenges facing each service after 15 years of war and recent budget cuts.
For the Marines, he said units at home face the most risk because of fewer training opportunities with the best equipment deployed with forces overseas. And it would be these undertrained home units that would be called to respond to an unexpected crisis.
“In the event of a crisis, these degraded units could either be called upon to deploy immediately at increased risk to the force and the mission, or require additional time to prepare thus incurring increased risk to mission by surrendering the initiative to our adversaries,” Paxton said. “This does not mean we will not be able to respond to the call … It does mean that executing our defense strategy or responding to an emergent crisis may require more time, more risk, and incur greater costs and casualties.”
Communication, intelligence and aviation units are the hardest hit, Paxton said. More here.
In part FP: As Kabul’s fragile army struggles to hold the line, will Washington’s warplanes come to the rescue?
Times have changed. The United States withdrew most of its troops in 2014 and dramatically reduced the number of airstrikes against Taliban targets throughout the country. The footage from Kunduz illustrated how the Taliban has been taking advantage of their new freedom: by conquering the city. The insurgents held Kunduz for two weeks before being pushed out by Afghan and U.S. personnel in October. Still, many officials believe it’s only a matter of time before the Taliban targets the city again.
The Taliban’s growing military might is posing a thorny strategic question for President Barack Obama, who took office promising to end what is now America’s longest war. The U.S. has spent tens of billions of dollars training Afghan security personnel, who have suffered enormous casualties while trying — and failing — to repel the Taliban’s advances in the country’s south, east, and north. That leaves the White House with an unpalatable choice: Keep the stringent rules limiting the numbers of strikes in place and risk seeing the militants continue to gain ground, or allow American pilots to bomb a broader array of targets at the risk of deepening Washington’s combat role in Afghanistan. More details here.
FC: China and Russia are preparing to attack and disrupt critical U.S. military and intelligence satellites in a future conflict with crippling space missile, maneuvering satellite, and laser attacks, senior Pentagon and intelligence officials told Congress on Tuesday.
Air Force Gen. John Hyten, commander of the Air Force Space Command, said the threat to U.S. space systems has reached a new tipping point, and after years of post-Cold War stagnation foreign states are focused on curbing U.S. space systems.
“Adversaries are developing kinetic, directed-energy, and cyber tools to deny, degrade, and destroy our space capabilities,” Hyten said in a prepared statement for a hearing of the House Armed Service strategic forces subcommittee.
“They understand our reliance on space, and they understand the competitive advantage we derive from space. The need for vigilance has never been greater,” the four-star general said.
Hyten said U.S. Global Positioning System satellites remain vulnerable to attack or jamming. The satellites’ extremely accurate time-keeping feature is even more critical to U.S. guided weapons than their ability to provide navigation guidance, he said.
Disrupting the satellites time capabilities would degrade the military’s ability to conduct precision strike operations used in most weapons systems today.
Hyten said a new joint military-intelligence command center is helping to monitor space threats, such as anti-satellite missile launches, covert killer robot satellites, and ground-fired lasers that can blind or disrupt satellites. The unit is called the Joint Interagency Combined Space Operations Center, located at Schriever Air Force Base, Colorado.
The Space Command also is creating 39 cyber mission teams that will be used for defensive and offensive cyber operations involving space systems.
Lt. Gen. David Buck, commander of Joint Functional Component for Space, a U.S. Strategic Command unit, testified along with Hyten that China and Russia pose the most serious threats to space systems.
“Simply stated, there isn’t a single aspect of our space architecture, to include the ground architecture, that isn’t at risk,” Buck said.
“Russia views U.S. dependency on space as an exploitable vulnerability and they are taking deliberate actions to strengthen their counter-space capabilities,” he said.
China in December created its first dedicated space warfare and cyber warfare unit, called the Strategic Support Forces, for concentrating their “space, electronic, and network warfare capabilities,” Buck said.
“China is developing, and has demonstrated, a wide range of counter-space technologies to include direct-ascent, kinetic-kill vehicles, co-orbital technologies that can disable or destroy a satellite, terrestrially-based communications jammers, and lasers that can blind or disable satellites,” Buck said.
“Moreover, they continue to modernize their space programs to support near-real-time tracking of objects, command and control of deployed forces, and long-range precision strikes capabilities,” the three-star general said.
Douglas Loverro, deputy assistant defense secretary for space policy, also warned about growing threats to satellites and outlined U.S. plans to deter future attacks.
Loverro said the United States does not want a war in space. “But let me be clear about our intent—we will be ready,” he said.
None of the five Pentagon and intelligence officials who took part in the budget hearing for military space efforts mentioned any U.S. plans or programs to develop anti-satellite missiles and other space weapons for use against Chinese or Russian space systems. The subcommittee, however, held a closed-door session after the public hearing.
A modified U.S. missile defense interceptor, the SM-3, was used in 2008 to shoot down a falling U.S. satellites in a demonstration of the country’s undeclared anti-satellite warfare capability.
Loverro suggested U.S. defense and deterrence of space attacks could involve counter attacks, possibly on the ground or in cyber space. But he provided no specifics.
“Today our adversaries perceive that space is a weak-link in our deterrence calculus,” Loverro said. “Our strategy is to strengthen that link, to assure it never breaks, and to disabuse our adversaries of the idea that our space capabilities make tempting targets.”
Many of the most important navigation, communications, and intelligence satellites were designed during the Cold War for use in nuclear war and thus incorporate hardening against electronic attacks, Loverro said.
For conventional military conflict, however, adversaries today view attacks on U.S. satellites as a way to blunt a conventional military response what Loverro called the “chink in the conventional armor of the United States.”
“In this topsy-turvy state, attacks on space forces may even become the opening gambit of an anti-access/area-denial strategy in a regional conflict wherein an adversary seeks to forestall or preclude a U.S. military response,” he said. “Chinese military strategists began writing about the targeting of space assets as a ‘tempting and most irresistible choice’ in the late 1990s, and the People’s Liberation Army has been pursuing the necessary capabilities ever since,” he said.
Rather than threatening foreign states’ satellites, Loverro said deterrence against foreign nations’ space attacks is based on defending against missile strikes or other attacks and making sure satellite operations will not be disrupted in war.
That would be carried out through partnering with the growing commercial space sector that is expected to deploy hundreds of new satellites in the coming years that could be used as back up systems for the Pentagon in a conflict.
Deterrence also will be based on increasing foreign partnerships with allied nations in gathering intelligence on space threats and other cooperation.
A space defense “offset” strategy will seek to reduce the advantage of using relatively low cost of missiles, small satellites, or cyber forces to attack U.S. satellites, Loverro said.
“An advanced U.S. satellite might cost upwards of $1 billion; missiles that could destroy such a satellite cost a few percent of that sum; co-orbital microsatellites cost even less; and lasers that might blind or damage satellites have an unlimited magazine with almost zero cost per shot,” Loverro said.
Deploying large numbers of low-cost satellites will not offset those advantages, he said.
Instead, Loverro offered vague plans for countering the threat. “A space offset strategy must employ a diverse set of resilience measures that complicate the technical, political, and force structure calculus of our adversaries, by arraying a complex set of responses, with few overlapping vulnerabilities and a combination of known and ambiguous elements,” he said.
Frank Calvelli, deputy director of the National Reconnaissance Office, the spy agency that builds and operates strategic intelligence and reconnaissance satellites, said a resurgent Russia and aggressive China are among several current national security threats.
Calvelli revealed that the agency in October launched a new satellite that carried 13 smaller “CubeSats.”
“The NRO sponsored nine of the CubeSats while the National Aeronautics and Space Administration sponsored the remaining four,” Calvelli said.
Among the missions of the CubeSats are software-defined radios “to provide beyond-line-of-sight communication for disadvantaged users in remote locations, and technology pathfinders to demonstrate tracking technologies, optical communications, and laser communication,” he said.
Four advanced intelligence-gathering satellites will be launched this year to support military operations and intelligence analysis and decision-making.
Calvelli also said space threats are prompting the Reconnaissance Office to develop “better and faster” systems in space and on the ground, along with better overall “resiliency”—a term used by the military to signify an ability to operate during high-intensity warfare.
The agency is investing substantial sums in bolstering defenses for space and ground systems to make them more survivable during space war.
“We are more focused on survivability and resiliency from an enterprise perspective than we have ever been and we have made significant investments to that end,” he said.
The agency also is “improving the persistence of our space-based systems, providing greater ‘time on target’ to observe and characterize activities, and the potential relationship between activities, and to hold even small, mobile targets at risk,” Calvelli said.
It also is upgrading its ground stations, which are used to control and communicate with orbiting satellites, including an artificial intelligence system called “Sentient.”
“Sentient—a ‘thinking’ system that allows automated, multi-intelligence tipping and cueing at machine speeds—is just one of those capabilities,” Calvelli said.
New ground stations also are being deployed that will empower “users of all types with the capabilities to receive, process, and generate tailored, timely, highly-assured, and actionable intelligence,” he said.
The comments were a rare public discussion of the activities of one of the most secret U.S. intelligence agencies.
Dyke D. Weatherington, director of unmanned warfare and intelligence, surveillance, and reconnaissance at the Pentagon, said eight national security satellites were launched in 2015, including tactical and strategic communications, and navigation, position, and timing satellites.
Weatherington said the United States maintains a strategy advantage in space system but warned that is changing. “The rapid evolution and expansion of threats to our space capabilities in every orbit regime has highlighted the converse: an asymmetric disadvantage due to the inherent susceptibilities and increasing vulnerabilities of these systems,” he said.
While space threats are increasing, “our abilities have lagged to protect our own use of space and operate through the effects of adversary threats,” Weatherington said.
The Pentagon currently has 19 military-capable GPS satellites on orbit and a new generation of GPS satellites is being developed that will be produce signals three times stronger than current system to be able to overcome electronic jamming, he said.
The officials at the hearing also discussed plans to transition from the sole reliance on the use of Russian-made RD-180 rocket engines to launch national security satellites.
A new U.S. made engine, however, will not be fully developed until 2022 or 2023.
FNC: A dozen employees at three U.S. airports were identified as having potential ties to terrorists, according to Freedom of Information Act requests filed by FOX 25’s Washington Bureau.
But those 12 workers are just a fraction of 73 private employees at nearly 40 airports across the nation flagged for ties to terror in a June 2015 report from the Homeland Security Inspector General’s Office.
The 2015 report did not reveal where the 73 workers were employed.
The Transportation Security Administration did not have access to the terrorism-related database during the vetting process for those employees, according to the report.
The TSA pushed back on the report as a whole, however, in a statement to FOX25.
“There is no evidence to support the suggestion by some that 73 DHS employees are on the U.S. government’s consolidated terrorist watch list,” national spokesman Michael England wrote in a statement.
*****
Meanwhile, perhaps ‘some’ of the items in the Senate Gang of 8 Immigration Reform Bill should have been passed…..
WASHINGTON (Reuters) – U.S. immigration authorities’ lack of progress in automating their systems is compromising border security, making it more difficult to process people seeking to get into the country, a report said on Tuesday.
“We may be admitting individuals who wish to do us harm, or who do not meet the requirements for a visa,” John Roth, the Inspector General for the Department of Homeland Security, told a Senate Homeland Security Committee hearing.
The report from Roth’s office, released on Tuesday, said immigration officials expect it will take $1 billion and another three years, 11 years into the effort, to move from a paper-based system to automated benefit processing.
U.S. lawmakers have been calling for a tighter visa system since the November Paris attacks and December San Bernardino shootings. In Paris, some of the militants were Europeans radicalized after visiting Syria, and a California attacker had been admitted on a fiance visa.
They want to ensure that potential militants cannot enter the United States under programs, such as the “visa waiver” granted citizens of most western countries.
Roth told the Senate Homeland Security Committee that workers processing millions of applications for immigrant benefits work with a system “more suited to an office environment from 1950 rather than 2016.”
He said some green cards and other immigration documents had been mailed to wrong addresses, or printed with incorrect names, which meant they could have fallen into the wrong hands.
The poor quality of electronic data that is kept makes it more difficult to engage in data matching, to root out fraud and identify security risks, Roth said.
Shipping, storing and handling over 20 million immigrant files costs more than $300 million a year, he added.
The report also said the EB-5 visa program, which admits investors who spend $500,000 or $1 million in the United States, depending on the area, may not be subject to close enough scrutiny to ensure Americans’ safety.
The current system also allows “known human traffickers” to use work and fiance visas to bring victims into the country, the report said.
Republican Senator Ron Johnson, the committee’s chairman, said the modernization was too slow and expensive. “It should not take years and years and billions and billions of dollars,” he said.
A man was arrested and charged with one count of murder after officers said he shot and killed his former supervisor at a landscaping business near The Avenues Mall on Wednesday.
Ezequiel Lopez, 24, who is not a U.S. citizen, told police he planned to shoot 55-year-old Andrew Little at B&L Landscaping because he felt disrespected by him.
Little was a supervisor and 20-year employee at the landscaping business. Officers said Lopez shot Little once in the back.
A bullet also grazed Little’s cheek. There was a struggle, then Lopez’s gun malfunctioned.
Little died at the scene.
Lopez heard sirens and tried to run.
Joshua Curry worked with Lopez and said he grabbed his gun from his car after he heard his co-workers yell “active shooter!” He said he held Lopez at gunpoint until police arrived.
Officers said Lopez shot Little because he thought Little treated him differently than other employees.
Lopez worked at the business for six years. He’d recently been moved to a different work group from Little’s.
Officers said Lopez is not a U.S. citizen and it will be up to Immigrations to investigate.
Curry said Lopez had problems with everyone with whom he worked and recently had been picking random fights with his co-workers.
NASHVILLE, TENNESSEE — Months of work by narcotics detectives assigned to the Specialized Investigations Division led to today’s takedown of a Nashville heroin distribution group with ties to Honduras.
The alleged leader of the Nashville group, Victor Cardoza-Martinez, 24, admits to being a felon who had previously been deported from the United States.
This investigation began in mid-2015 after the police department received information that this group was distributing heroin and methamphetamine in the South Nashville area. Extensive surveillance was conducted and multiple undercover buys were made from the group.
This morning, contemporaneous search warrants were executed at a number of locations, including 5319 Nolensville Pike, apartment D-107 (where Cardoza-Martinez was arrested), 298 Cedarcreek Drive, 331 Wallace Road, 535 Raymond Street, 885 Irma Drive, 268 Coral Court, and 365 Paragon Mills Road. Seizures included $10,717 cash, 7 vehicles, 7.5 ounces of methamphetamine, 6 ounces of heroin and 15 grams of cocaine.
At the 365 Paragon Mills apartment location, Carlos Ochoa, 26, was pulling out in a 2009 Infiniti sedan as officers arrived. Ochoa quickly accelerated, crossed the street and crashed the Infiniti into a tree line. Ochoa kicked his way out of the vehicle and fled on foot. Officers arrested him minutes later on Tampa Drive. Cocaine packaged for resale was recovered from the vehicle wreckage.
The 7 persons charged in this case are:
-Victor Cardoza-Martinez, who is charged with engaging in a heroin distribution conspiracy and 3 counts of selling methamphetamine. His bond is set at $300,000.
-Walter Chinchilla, 21, of 885 Irma Drive, who is charged with engaging in a heroin distribution conspiracy. His bond is set at $150,000.
-Juan Bonilla, 30, of 331 Wallace Road, who is charged with engaging in a heroin distribution conspiracy. His bond is set at $150,000.
-Ruby Perez, 23, of 885 Irma Drive, who is charged with engaging in a heroin distribution conspiracy. Her bond is set at $150,000.
-Josselyn Caceres-Barahona, 22, of 365 Paragon Mills Road, who is charged with possessing cocaine for resale.
-Carlos Ochoa, 26, of 4404 Tennessee Avenue, who is charged with possessing cocaine for resale, evading arrest, leaving the scene of a crash, and driving without a license.
-Fredy Reyes, 20, of Bridgeway Circle (not yet in custody), named in an outstanding warrant charging that engaged in a cocaine conspiracy.
The Specialized Investigations Division continues to make heroin interdiction a priority, fully realizing that heroin abuse is both a law enforcement issue and a public health threat. Heroin overdoses and deaths are significant concerns in cities across America, large and small, Nashville included.