An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Lawsuit Advances on Trump Dossier Case, McCain Testimony

Okay, this cat Aleksej Gubarev who owns a few internet tech companies has launched the lawsuit(s). Seems too that Gubarev is a Russian venture capitalist based out of Cyprus has an operational location in Dallas. His company boasts 75,000 servers across the globe. McCain was sent the 35 Trump dossier and had official conversations about the dossier with officials and passed the dossier to the FBI.

***

Former British ambassador to Moscow admits warning John McCain about Trump dossier

Sen. John McCain faces questions in a defamation lawsuit about leaks leading to publication of the now-infamous dossier that alleged Donald Trump’s campaign had connections to Russian operatives, McClatchy has learned.

The dossier compiled by former British spy Christopher Steele and his London firm, Orbis Business Intelligence Ltd., amounted to a collection of uncorroborated reports of collusion gathered as political research for sale to Trump’s opponents. It proved explosive when published by online news site BuzzFeed on Jan. 10.

Now, two lawsuits — one in the United States and a second in the U.K. — are being brought by lawyers for Aleksej Gubarev, a Cyprus-based Internet entrepreneur whom Steele’s Russian sources accused of cyber spying against the Democratic Party leadership.

According to a new court document in the British lawsuit, counsel for defendants Steele and Orbis repeatedly point to McCain, R-Ariz., a vocal Trump critic, and a former State Department official as two in a handful of people known to have had copies of the full document before it circulated among journalists and was published by BuzzFeed.

The court document obtained by McClatchy confirms that Sir Andrew Wood, a former British ambassador to Moscow and a Russia adviser to former Prime Minister Tony Blair, discussed the 35-page dossier with McCain.

“The Defendants considered that the issues were self-evidently relevant to the national security of the US, UK and their allies,” the document says, explaining why Steele and his partner, Christopher Burrows, felt it necessary to share the dossier’s findings.

*** The lawsuit document is here. 

Wood had told Britain’s The Guardian in January that McCain had reached out to him about the dossier, and had obtained it through other means. The court document confirms that Wood, Steele and former State Department official David Kramer decided together that new information gathered after the election should be shared with authorities in Britain and the United States.

A McCain spokesperson declined to comment Monday on the new court document, pointing instead to a Jan. 11 statement from the veteran senator about the dossier. “Upon examination of the contents, and unable to make a judgment about their accuracy, I delivered the information to the director of the FBI,” McCain had said then. “That has been the extent of my contact with the FBI or any other government agency regarding this issue.”

In recent congressional testimony, ex-FBI Director James Comey, fired by Trump amid a widening probe, acknowledged receiving the dossier from McCain on Jan. 6. Kramer, a former State Department official who until recently served as a senior director at Arizona State University’s McCain Institute for International Leadership, declined comment.

The British court documents are legal responses in the British suit and do not reflect the entire docket. The British suit is related to a similar lawsuit in the United States against online news site BuzzFeed.

At least a dozen national media organizations had a copy of the Steele dossier before it became public but hadn’t published details because much of the information had not been corroborated.

McClatchy was among them and subsequently published numerous reports on people named in the dossier, including a Russian diplomat and a supposed hacker who apparently is an imprisoned pedophile.

The dossier, without substantiation, said Gubarev’s U.S.-based global web-hosting companies, XBT and Webzilla, planted digital bugs, transmitted viruses and conducted altering operations against the Democratic Party leadership.

While one key name in the dossier was blackened out by BuzzFeed, Gubarev’s was not. He alleges that he was never contacted for comment, suffering reputational harm in the process.

In the court document, Steele’s barrister, Nicola Cain, argued that the portion of the dossier dealing with Gubarev, which came in weeks after Trump’s election and after Steele was no longer paid by his client for research, amounted to raw intelligence and was advertised as such. She did not return a call or email requests for comment.

Capturing Terrorists Again and Going to Gitmo?

Notice that for years, no terrorist has been captured on the battlefield, they have simply been killed per the edict of the Obama administration. It has made intelligence collection and cultivation almost impossible and in some cases under the previous administration has led to the deaths of innocent civilians due to collateral damage or bad ground control.

The most recent capture was in 2014 of Abu Khattalah of Benghazi, the only terrorist detained and he is presently being held in the Washington DC area.

Meanwhile: The case of United States v. Ibrahim Ahmed Mahmoud al Qosi proceedings at Fort Belvoir, Va., scheduled for July 12. He was released by Obama from Gitmo to his home country Sudan and made his way to Yemen working for AQAP.

The charge sheet for Ahmed Abu Khattalah is here.

The Trump administration appears to be making its first moves toward fulfilling a campaign promise to fill the Guantanamo Bay prison camp with “bad dudes.”

Attorney General Jeff Sessions and Deputy Attorney General Rod Rosenstein visited the prison on Friday to get an update on current operations, the first concrete action the administration has taken on the facility since taking office.

Up until now, Guantanamo has been running on autopilot; the executive order from former President Obama calling for the facility to be shut down is still technically the law of the land.  More here from The Hill.

ABC

GUANTANAMO BAY NAVAL BASE, Cuba — In the highest-ranking known visit by a Trump administration official, Attorney General Jeff Sessions and the Director of National Intelligence, Dan Coats, were visiting this remote outpost Friday to get “an up-to-date understanding” of current war-on-terror operations.

Rod Rosenstein, Sessions’ deputy, was also on the tour. Its first stop was the war court compound, Camp Justice, where the Pentagon holds pretrial hearings in the death penalty case against five alleged plotters of the Sept. 11 terror attacks, and others accused of terrorism and war crimes.

They also toured the Detention Center Zone where, after an extensive Obama administration downsizing effort, the Pentagon holds 41 war prisoners, 10 charged with crimes and five cleared for release through Obama or Bush administration review boards.

“Keeping this country safe from terrorists is the highest priority of the Trump administration,” Justice Department spokesman Ian D. Prior said in a statement issued before the VIP party landed at the base and took a special boat rather than the large ferry across Guantanamo Bay.

A court hearing was postponed until afternoon to accommodate the visit. It comes as the chief war court judge, Army Col. James L. Pohl, has been openly complaining about insufficient resources to mount a robust schedule of 2018 hearings in the 9/11 and USS Cole cases.

Other attorneys general have visited the site, including Michael Mukasey for the Bush administration in 2008 and Eric Holder for the Obama administration in 2009. This visit — coming more than five months into the Trump administration, even as the White House has yet to officially rescind Barack Obama’s 2009 closure order — may be seen as a signal of support for the detention operation and the war court where six men are in pretrial, death penalty proceedings for the Sept. 11 and USS Cole attacks.

The one-day visit was announced hours before a Saudi man was due at the war court for a pre-sentencing hearing. Ahmed al-Darbi pleaded guilty to war crimes in February 2014, in exchange for a commitment to let him serve out his sentence of up to 15 years in his homeland starting next year.

“Recent attacks in Europe and elsewhere confirm that the threat to our nation is immediate and real,” Prior said in his statement, “and it remains essential that we use every lawful tool available to prevent as many attacks as possible.”

He said the goal of the visit was for the officials to meet with “the people on the ground who are leading our government-wide efforts at GTMO,” using the Navy acronym from for the 45-square-mile base in southeast Cuba. “In addition to the Department of Justice’s role in handling detainee-related litigation,” he added, “it is important for the Department of Justice to have an up-to-date understanding of current operations.”

Coats’ spokesman, Timothy L. Barrett, issued an identical statement to the Department of Justice’s on the trip’s purpose: “To gain an understanding of current operations by meeting with the people on the ground who are leading our government-wide efforts at GTMO.”

Others on the tour included Adm. Kurt Tidd, the commander of the U.S. Southern Command, which has oversight of the prison; Navy Rear Adm. Edward Cashman, the detention center commander; and Col. Steve Gabavics, the head of the guard force, said Pentagon spokesman Air Force Maj. Ben Sakrisson.

He declined to say whether they visited the prison’s clandestine Camp 7, where former CIA captives are kept in military custody, in what he called a “standard tour of the camps.” The group had lunch in the Detention Center Zone at the Seaside Galley mess hall where guards and other prison staff eat.

Sessions first visited in late January 2002 as a U.S. senator and has long been one of the most enthusiastic supporters of the prison and military commissions system, whose rules are a hybrid of U.S. military and federal legal systems.

The visit comes as the U.S. Southern Command, not so long ago run by Homeland Security Secretary John Kelly, is proposing an up to $100 million construction project to house 13,000 temporary migrants and 5,000 support staff on the base near the airstrip. The Navy, in announcing the proposal, called it a “contingency mass migration complex.”

The war court and Detention Center Zone staffed by 1,500 troops and civilians are on the opposite side of the base, requiring a ferry ride across Guantanamo Bay.

No such mass exodus is foreseen. First, the Obama administration canceled a decades-old “wet foot, dry foot” policy that let Cubans who reach U.S. shores gain legal entry. Now the Trump administration is pursuing deportations of undocumented immigrants, a program championed by Sessions.

“There are no detention facilities involved in this project,” Southcom spokesman Army Maj. Vance Trenkel said by email on Thursday. “This project is to assist with mass migration operations … caused by things such as a natural disaster.”

In the 1990s the base was used to shelter more than 50,000 Cubans and Haitians who were stopped at sea from reaching the United States.

The Dark-World with U-47700 and Bitcoin

Congress should sanction China operations due to synthetic opioid production and should also list all variants of synthetic opioids as weapons of mass destruction under the chemical and biological weapons convention. DEA now has offices in China to work with officials there and investigation trafficking patterns.

The United States consumes 85% of all the world’s natural and synthetic opiates, which in 2015 factored in 33,091 U.S. deaths, up more than 4000 from the previous year, according to the U.S. Centers for Disease Control and Prevention. Opioid overdoses have quadrupled since 1999. When average U.S. life expectancies for men and women edged downward last year, for the first time in decades, many health professionals blamed opiate abuse.

The opium poppy is no longer the starting point for many of the opiates on the street. The new compounds, often sold mixed with heroin, originate in illicit labs in China. “For the cartels, why wait for a field of poppies to grow and harvest if you can get your hands on the precursor chemicals and cook a batch of fentanyl in a lab?” says Tim Reagan, resident agent in charge of the U.S. Drug Enforcement Administration’s (DEA’s) Cincinnati office.

In late 2015, the drug agency persuaded its Chinese counterpart to add 116 synthetic drugs to its list of controlled substances; fentanyl and several analogs were included. In response, underground Chinese labs began tweaking the fentanyl molecule, which is easy to alter for anyone with basic knowledge of chemistry and lab tools. By adding chemical groups, unscrupulous chemists have created new, unregulated variants, some of them even more potent than the original.

Hoping to stem the tide of synthetic opiates, DEA has taken the fight to China, as prolific a maker of illicit drugs as it is of legitimate chemicals. According to a U.S.-China Economic and Security Review Commission report last month, “China is a global source of illicit fentanyl and other [new psychoactive substances] because the country’s vast chemical and pharmaceutical industries are weakly regulated and poorly monitored.” In response to U.S. pressure, China has scheduled fentanyl and several other derivatives. More here.

U-47700
COMMON NAMES
U-47700
EFFECTS CLASSIFICATIONS
Opioid
CHEMICAL NAME
3,4-dichloro-N-[2-(dimethylamino)cyclohexyl]-N-methylbenzamide
DESCRIPTION
U-47700 is a short-acting synthetic opioid analgesic that first became available via online vendors in late 2014. It has only a short history of human use. U-47700 has been detected in counterfeit pharmaceutical opioids and associated with deaths.BASICS EFFECTS IMAGES HEALTH DOSE CHEMISTRY
Mar-Apr 2016 – Fake oxycodone tablets containing U-47700 are seized by law enforcement in Ohio and fake Norco tablets containing U-47700 and fentanyl appear in the Sacramento, CA area.

An 18-Year-Old Girl Died From a Synthetic Opioid She Bought Online. Here’s How Portland Police Cracked the Case.

A fatal overdose in East Portland leads detectives into the Dark Web, where lab-created opioids are bought with Bitcoin.

Courtesy of Jessica Collins

Even by Portland standards, the weather was dreary on the day Aisha Zughbieh-Collins died.

It was late morning Feb. 16 when Jessica Collins drove through a 40-degree drizzle to the pink and yellow townhouse on Southeast 84th Avenue, where Aisha, her 18-year-old daughter, lived.

Collins drove gingerly down the rutted, dead-end gravel street. It’s the kind of street that’s often lined with abandoned shopping carts.

She got out of her truck, walked into Aisha’s townhouse and climbed the stairs with a sense of dread. For the past 12 hours, Collins had been unable to reach her daughter.

Just two weeks earlier, Aisha had overdosed, her life saved when a roommate called paramedics.

As Collins entered her daughter’s bedroom, Aisha was sitting lotus-style on her bed.

“Each step closer I could tell something was really wrong,” Collins recalls.

Aisha had a syringe in her right arm, and a shoelace tourniquet tied around her biceps. She wasn’t breathing. Her skin was cold.

“I know it sounds strange,” Collins says, “but a sense of peace came over me—that she’s OK now—even though she was dead in front of me.”

Drug overdoses now kill more people than firearms or automobile crashes in Oregon, according to state figures, and are the largest cause of accidental death in the U.S. As the country’s overdose death total continues to soar, Oregon officials have responded far more effectively than officials in most states (see chart below).

Source: Centers for Disease Control
While opioid overdose deaths nationally rose 57 percent from 2010 to 2015, they actually dropped slightly in Oregon over the same period. Source: Oregon Health Authority
While opioid overdose deaths nationally rose 57 percent from 2010 to 2015, they actually dropped slightly in Oregon over the same period. Source: Oregon Health Authority

But even in Portland, which has slowed overdose deaths resulting from heroin and prescription opioids such as oxycodone, Aisha’s death is part of a new and dangerous development.

The drug that killed her was a potent “synthetic” opioid manufactured in China—a drug so new that narcotics investigators and Portland’s public health officials had never encountered it before.

“What we don’t have a lot of here yet is the synthetics,” says Dr. Paul Lewis, the Multnomah County health officer. “That could change.”

When Portland Police Bureau detectives arrived at Aisha’s townhouse, they were initially stymied. Their investigation would eventually lead them across the country and into the deepest recesses of the internet: places where the common currency is Bitcoin, and where buyers and sellers are anonymous and far removed from each other. Bitcoin is used for a lot of other purposes though, as people find it a lot easier to buy bitcoin. It just depends on the circumstances though obviously.

The trail would take them to a condo in South Carolina, and to one of the Dark Web’s most prolific synthetic opioid sellers.

“We’d never done a case like this,” says the Police Bureau detective who led the investigation. “We weren’t familiar with the substance. And we had no idea where it came from.”

Aisha Zughbieh-Collins traveled a long way in a short life that started on the Gulf Coast of Florida.

She was petite—barely 5 feet 4 inches tall, with a quick smile. She loved animals: She used to have a cat named Bebe and a Burmese python named Applejack. She liked sushi and Thai food, root beer and cream soda. She listened to Bright Eyes and Nirvana.

In November 2015, Aisha ran away from a foster-care facility in Baltimore, where her mother says she’d been assaulted. Aisha reconnected with her mother, who was also living in Maryland but who had lost custody of Aisha three years earlier.

Rather than return Aisha to foster care, the pair decided to head west to begin new lives. They left shortly before Thanksgiving. “We didn’t know where to go, but we wanted warm weather,” Collins says.

They drove west in a sunflower-colored Nissan Xterra, using throwaway phones and paying cash at cheap motels. They feared authorities might be looking for Aisha, who was 17 years old and still a ward of the state.

They arrived in Oregon in February 2016, and Collins found work as a host in a remote campground in Mount Hood National Forest.

They liked the woods, but for Aisha, there was little in the way of entertainment—nobody her age, nowhere to eat, and no WiFi. “It was hard for Aisha to be without the internet,” Collins says.

In May of that year, Aisha found a place to live on Craigslist and moved to the Brentwood-Darlington neighborhood just east of 82nd Avenue, sharing with several housemates the townhouse where she would eventually die.

Collins says her daughter had been using hard drugs in Maryland, and had started using again when Collins moved to Portland, living near Aisha.
She told her mother she was using a drug called U-47700.

U-47700, known sometimes as U4 or “pink,” was developed by the pharmaceutical company Upjohn in 1976 as an alternative to morphine but never received U.S. Food and Drug Administration approval. As a result, it was never placed on the FDA’s schedule of illicit drugs, so for decades there was no prohibition on its manufacture or distribution. It existed in a gray zone—neither approved for use nor specifically illegal.

And while Upjohn never manufactured the drug, laboratories in China—where law enforcement officials say many synthetic opioids are made—figured out how to do so.

U-47700 is also lethal—nearly eight times more potent than heroin. Records show the feds first became aware that people were using U4 to get high in October 2015, although they weren’t sure where the drug was coming from.

In the next year, they recorded 46 overdose deaths, most on the Eastern Seaboard. In November 2016, the U.S. Drug Enforcement Administration, “responding to the imminent threat to public health and safety,” made U-47700 a schedule I substance, classifying it among the most dangerous street drugs.

“I told Aisha U4 was suicide,” Collins recalls. “You can’t choose whether you live or die. It’s like Russian roulette.”

Rising Synthetic Tide: Overdose deaths from synthetic opioids rose much faster last year than overdose deaths from heroin or prescription pain pills.

Source: Centers for Disease Control
Source: Centers for Disease Control

The day Aisha died, Portland narcotics detectives arrived at her townhouse. The lead detective is a stocky cop, with salt-and-pepper hair and, considering his job, a cheery demeanor.

The detective later spoke to WW but insisted on anonymity because he works undercover. He sees a lot of dead bodies: There are about two fatal overdoses a week in Portland, most opioid-related.

But this one stood out, the detective says, not only because he’d never heard of the drug that killed Aisha, but also because she was a woman, and so young—the average overdose victim in Oregon is a man over 35.

The house where Aisha Zughbieh-Collins died. (Hilary Sanders)
The house where Aisha Zughbieh-Collins died. (Hilary Sanders)

Portland’s approach to overdose deaths changed in 2007, when Kraig Crow, a Lincoln High School graduate, fatally overdosed.

“Our policy here is different from other jurisdictions’,” the detective says. “Before, we just walked away and let the medical examiner handle it.

“After the Lincoln case,” he continues, “we started asking, ‘What can we find at the scene that can allow us to investigate further?'”

When Portland detectives respond to an overdose death now, they are looking for witnesses, phones and the packaging in which drugs are delivered.

In the Crow case, prosecutors won convictions of six defendants, including what’s called a “Len Bias conviction” for the top dealer.

That law, named after University of Maryland basketball star Len Bias, who died of a cocaine overdose in 1986 after being picked second overall in the NBA draft, became a potent tool for prosecutors because it replaced lighter sentences with a 20-year prison term for those who deal drugs leading to a death.

Federal prosecutors in Oregon are recognized as national leaders in bringing Len Bias cases.

Investigators try to determine how the fatal dose moved from the original source to the consumer, establishing a chain of custody. “Every person in the chain is potentially liable for the overdose death,” says Steve Mygrant, an assistant U.S. attorney who has prosecuted several dealers in fatal overdose cases. (Local and federal officials often cooperate on Len Bias cases.)

Aisha’s mother told detectives she thought her daughter bought U4 online, and she provided them with Aisha’s email address.

The detectives also found unusual materials in Aisha’s bedroom—distinctive packaging suggested someone had carefully disguised the U-47700 to send it through the mail.

The drug Aisha bought had been hidden in a VeriQuick brand pregnancy test kit—sold only at Dollar Tree stores—and appeared to have arrived from an unknown seller in a U.S. Postal Service shipping envelope from South Carolina.
Those were clues. But the detectives couldn’t work their way up the usual chain of delivery as they do in heroin cases.

“Our calls usually come from people complaining about a neighborhood drug house,” the detective says. “This online stuff is at a completely different level.”

The next day, the detectives asked for help from federal experts who knew how to navigate the deepest recesses of the internet.

In 2013, federal agents busted Silk Road, a vast online bazaar for drugs, child pornography, illegal weapons, stolen credit cards, valuable personal information, hacking services and even contract killers.

Silk Road operated on what’s called the Dark Web. That’s the term used to describe the vast array of websites that operate out of reach of the average web surfer.

The internet is like an iceberg: Experts say less than 5 percent of websites are visible using typical browsers such as Safari, Firefox or Chrome.

Some of what’s under the surface is benign material that is simply password-protected: legitimate financial and medical records, for instance, that are shielded for privacy reasons. But it is also used by dissidents in countries where free speech isn’t allowed—and by criminals of all kinds.

Dark Web users need a couple of things to access such sites: a specialized (and easily downloadable) browser called Tor and, if they want to remain anonymous, a tool that encrypts their communications and preserves their anonymity. Aisha used what’s called a PGP (“pretty good privacy”) key to hide her activity.

And for people who wish to buy or sell goods or services on the Dark Web, using Bitcoin or another virtual currency adds another layer of anonymity. Bitcoin, which Aisha used, allowed her to purchase drugs without creating the kind of easily traceable trail that credit or debit cards leave behind.

“But once you clear the smoke,” says George Chamberlin, chief of the FBI’s Oregon Cyber Task Force, “it’s not that different from the visible internet.”
When Silk Road disappeared because of the indictment and conviction of its creator, other Dark Web marketplaces took its place. One, called AlphaBay, offers a staggering array of illicit drugs.

Sellers hawk their wares aggressively and encourage buyers to rate their experiences just as customers do on conventional sites such as Amazon, Yelp or Trip Advisor. But instead of rating tacos or hotel rooms, buyers are rating heroin, meth or the newest kind of illicit narcotic, synthetic opioids.

“The game is changing,” the FBI’s Chamberlin says, “especially because of synthetics. They are different because of their potency and because they are trafficked on the Dark Web.”

Detectives found that Aisha had written an alphanumeric code on a pad in her bedroom. That code identified her PGP key.

They determined that Aisha’s PGP key had been used to buy drugs on AlphaBay.
The detective learned that, using her PGP, Aisha had purchased U-47700 on Feb. 11, five days before her death, from a vendor who called himself “Peter the Great”—like the Russian emperor.

A U.S. postal inspector determined the envelope found in Aisha’s bedroom had a fictitious return address but was purchased at a post office in Greenville, S.C.

In April, the Portland detective bought U4 over the Dark Web from Peter the Great. The drugs arrived, wrapped in material from Dollar Tree.

The person who purchased the shipping labels—presumably Peter the Great—used secure email addresses. The investigators then filed a subpoena for all records related to those addresses.

They turned up a name: Ted Khleborod, a resident of Greenville.

Peter the Great—who detectives now believed was Khleborod—was a prolific salesman: Figures on AlphaBay showed he’d done 9,553 transactions.

The Portland detective contacted federal officials in South Carolina. “We scared the crap out the assistant U.S. attorney back there when we told him about the substance and volume of sales,” the detective says. “This guy was sending out the equivalent of bombs.”

Ted Khleborod (Spartanburg County Sheriff’s Office)
Ted Khleborod (Spartanburg County Sheriff’s Office)

Khleborod, now 28, was born in Moldova, part of the former Soviet Union. When he was in high school, records show he spent time on bodybuilder chat boards, discussing the benefits of steroid use and posting as “Arnoldismyhero,” a tribute to former California governor and champion body builder Arnold Schwarzenegger.

He later studied at the University of South Carolina, where, according to his Facebook page, he was pre-med. He graduated in 2016.

Khleborod lived well for a college student, records show, driving a BMW—with a vanity plate that read “TEDALICUS”—and a Ducati motorcycle.

In late April, Portland detectives flew to Greenville to coordinate with local police.

For three days, they staked out Khleborod at his condo. They saw his girlfriend, Ana Barrero, leave his place twice to mail dozens of parcels, with labels matching those they’d found earlier in Aisha’s room and identical to those matching labels from the drugs that investigators bought over the Dark Web from Peter the Great.

They also obtained video of Barrero buying 71 VeriQuick pregnancy test kits at a Dollar Tree in Greenville.

On April 26, officers arrested Khleborod as he left work at an urgent care clinic. “He was a quiet guy, contemplative,” says the Portland detective. “I don’t think he used his own product, and based on his numbers, he could have made a million bucks in the past couple years.”

Khleborod, who is now in custody, faces federal charges in South Carolina. (His attorney did not respond to a request for comment.)

When officers served a search warrant on Khleborod’s condo, they wore hazmat suits to guard against the toxicity of U-47700. They hauled away 9 kilos of the drug, worth $270,000.

They also found a book, written for prospective doctors, called Kill as Few Patients as Possible.

The Portland detective says Aisha’s case revealed to him a new world of synthetic opioids and the Dark Web. He says he also realized that despite all the technically sophisticated tools dealers like Peter the Great employ, they are subject to human mistakes.

“Internet privacy—even with encryption—is not as great as you think,” the detective says. “People on the Dark Web still leave breadcrumbs we can follow.”
Jessica Collins says she’s happy police arrested Khleborod. But she remains heartbroken over her daughter’s death.

“I feel like she’s with me every day,” Collins says, “and I worry about how many other families this might happen to.”

Cam Strahm, the DEA chief for Oregon, applauds the police work that led to Khleborod’s capture. But he says after 26 years of chasing drug dealers, he’s come to understand the limits of that work.

“Addiction is a treatable disease,” he says, “and we’re facing an epidemic. We can’t arrest our way out of it.”

Aisha Collins (Courtesy of Jessica Collins)
Aisha Collins (Courtesy of Jessica Collins)

The Wages of Synthetics

The new challenge from synthetic opioids marketed over the Dark Web comes at a time when the trend in overdose deaths in Oregon is relatively positive.

Opioid deaths here have declined in recent years, while the trend in the rest of the country is still sharply upward. (The New York Times recently reported deaths jumped nearly 20 percent nationally in 2016.)

“When you look at the rest of the country, flat is good,”says Multnomah County Health Officer Dr. Paul Lewis.

There are two reasons for the good news. The first is naloxone, marketed under the brand name Narcan, a nasal spray that reverses overdoses. Under the leadership of former Multnomah County Health Officer Dr. Gary Oxman, the Portland area was a national pioneer in making naloxone widely available (“Who Wants to Save a Junkie?WW, March 13, 2013).

And Oxman’s successor, Lewis, pushed large metro-area medical systems to decrease the number of opioid pain pills prescribed to patients. That number has decreased each of the past five quarters.

Together, those two developments have caused the number of overdose deaths in Oregon to decline, a result most states would envy.

But deaths such as Aisha Zughbieh-Collins’ highlight a new danger: synthetic opioids such as fentanyl, carfentanil and U-47700 that are not prescribed by physicians but instead manufactured and sold illegally.

Lewis says there have been just two confirmed deaths in the metro area in the past 18 months in which U-47700 was the primary cause. But synthetic opioids are now the nation’s fastest-growing cause of overdose deaths. The death toll in some states is extraordinary: Last year, for instance, there were 34 deaths from synthetics in Oregon in 2015—and 949 in Massachusetts.

“The synthetic thing is new to everybody,” Lewis says. “We thought heroin was the foe, but now these synthetics come along. It’s a new chapter, and we don’t know how it ends.”

Cam Strahm of the U.S. Drug Enforcement Administration notes that synthetics such as fentanyl and carfentanil are dozens or even hundreds of times stronger than heroin.

Strahm says synthetics are also less predictable than heroin, which is now fairly standard in quality and potency. The dealers who sell synthetics often mix them in nonstandard “cocktails” and also frequently misrepresent what they are selling.

“When you are making illicit purchases from anonymous sources, you can’t depend on purity or that what you think you are buying is what you actually get,” Strahm says. “You really don’t know what you are purchasing. It’s like going on a vacation without knowing your destination.”

UNESCO declares Hebron shrine Palestinian

  Israeli soldier guards at the Tomb of the Patriarchs in Hebron

You would think by virtue of a UN heritage committee known as United Nations Educational, Scientific and Cultural Organization, they would get history right. Israel has provided proof and historical evidence, where is that from the Palestinians?

The Tomb and the city of Hebron is the second holiest site in Judaism, after the Temple Mount and its Western Wall, he noted. The Bible clearly records its purchase by Abraham. The committee of T21  members are: Angola, Azerbaijan, Burkina Faso, Croatia, Cuba, Finland, Indonesia, Jamaica, Kazakhstan, Kuwait, Lebanon, Peru, Philippines, Poland, Portugal, Republic of Korea, Tunisia, Turkey, United Republic of Tnzania, Vietnam and Zimbabwe. Anymore questions on the countries that refuse history and remain Anti-Semitic?

Now is the time for the United States to defund UNESCO and the UNRWA.

Following the resolution passed by the UNESCO World Heritage Committee regarding the Tomb of the Patriarchs, Prime Minister Benjamin Netanyahu, today (Friday, 7 July 2017), decided to cut an additional $1 million from the membership funds that Israel pays to the UN and to transfer it to the establishment of “The Museum of the Heritage of the Jewish People in Kiryat Arba and Hebron” and to additional heritage projects related to Hebron.

Against UNESCO’s denial of the past, Prime Minister Netanyahu is determined to present to the entire world the historic truth and the Jewish People’s deep connection – of thousands of years – to Hebron.

***

Tomb of Sarah, wife a Patriarch Abraham

JERUSALEM (Reuters) – The U.N. cultural organisation declared an ancient shrine in the occupied West Bank a Palestinian heritage site on Friday, prompting Israel to further cut its funding to the United Nations.

UNESCO designated Hebron and the two adjoined shrines at its heart – the Jewish Tomb of the Patriarchs and the Muslim Ibrahimi Mosque – a “Palestinian World Heritage Site in Danger”.

Israeli Prime Minister Benjamin Netanyahu called that “another delusional UNESCO decision” and ordered that $1 million be diverted from Israel’s U.N. funding to establish a museum and other projects covering Jewish heritage in Hebron.

The funding cut is Israel’s fourth in the past year, taking its U.N. contribution from $11 million to just $1.7 million, an Israeli official said. Each cut has come after various U.N. bodies voted to adopt decisions which Israel said discriminated against it.

Palestinian Foreign Minister, Reyad Al-Maliki, said the UNESCO vote, at a meeting in Krakow, Poland, was proof of the “successful diplomatic battle Palestine has launched on all fronts in the face of Israeli and American pressure on (UNESCO) member countries.”

Hebron is the largest Palestinian city in the occupied West Bank with a population of some 200,000. About 1,000 Israeli settlers live in the heart of the city and for years it has been a place of religious friction between Muslims and Jews.

Jews believe that the Cave of the Patriarchs is where Abraham, Isaac and Jacob and their wives, are buried. Muslims, who, like Christians, also revere Abraham, built the Ibrahimi mosque, also known as the Sanctuary of Abraham, in the 14th century.

The religious significance of the city has made it a focal point for settlers, who are determined to expand the Jewish presence there. Living in the heart of the city, they require intense security, with some 800 Israeli troops protecting them.

Even before Netanyahu’s budget announcement, Internal Security Minister Gilad Erdan signalled Israel would seek to further make its mark at the Hebron shrine, tweeting: “UNESCO will continue to adopt delusional decisions but history cannot be erased … we must continue to manifest our right by building immediately in the Cave of the Patriarchs.”

(Additional reporting by Ali Sawafta in Ramallah and Nidal al-Mughrabi in Gaza; Editing by Robin Pomeroy)

DHS, FBI Declare Hackers Target Nuclear Facilities

Bloomberg: Specialized teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the U.S. National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyberattack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the U.S. power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specializes in securing industrial control systems.

Starsalliance

Hackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say

Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.

The joint report was obtained by The New York Times and confirmed by security specialists who have been responding to the attacks. It carried an urgent amber warning, the second-highest rating for the sensitivity of the threat.

The report did not indicate whether the cyberattacks were an attempt at espionage — such as stealing industrial secrets — or part of a plan to cause destruction. There is no indication that hackers were able to jump from their victims’ computers into the control systems of the facilities, nor is it clear how many facilities were breached.

Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant.

In a joint statement with the F.B.I., a spokesman for the Department of Homeland Security said, “There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks.”

The hackers appeared determined to map out computer networks for future attacks, the report concluded. But investigators have not been able to analyze the malicious “payload” of the hackers’ code, which would offer more detail into what they were after.

John Keeley, a spokesman for the Nuclear Energy Institute, which works with all 99 electric utilities that operate nuclear plants in the United States, said nuclear facilities are required to report cyberattacks that relate to their “safety, security and operations.” None have reported that the security of their operations was affected by the latest attacks, Mr. Keeley said.

In most cases, the attacks targeted people — industrial control engineers who have direct access to systems that, if damaged, could lead to an explosion, fire or a spill of dangerous material, according to two people familiar with the attacks who could not be named because of confidentiality agreements.

The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.

The two people familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organization known to cybersecurity specialists as “Energetic Bear,” the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.

Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said.

The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

In some cases, the hackers also compromised legitimate websites that they knew their victims frequented — something security specialists call a watering hole attack. And in others, they deployed what are known as man-in-the-middle attacks in which they redirected their victims’ internet traffic through their own machines.

Energy, nuclear and critical manufacturing organizations have frequently been targets for sophisticated cyberattacks. The Department of Homeland Security has called cyberattacks on critical infrastructure “one of the most serious national security challenges we must confront.”

On May 11, during the attacks, President Trump signed an executive order to strengthen the cybersecurity defenses of federal networks and critical infrastructure. The order required government agencies to work with public companies to mitigate risks and help defend critical infrastructure organizations “at greatest risk of attacks that could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

The order specifically addressed the threats from “electricity disruptions and prolonged power outages resulting from cybersecurity incidents.”

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, said in an interview last week that while the security of United States’ critical infrastructure systems had improved in recent years, they were still vulnerable to advanced hacking attacks, particularly those that use tools stolen from the National Security Agency.

“We never anticipated that our critical infrastructure control systems would be facing advanced levels of malware,” Mr. Wellinghoff said.

In 2008, an attack called Stuxnet that was designed by the United States and Israel to hit Iran’s main nuclear enrichment facility, demonstrated how computer attacks could disrupt and destroy physical infrastructure.

The government hackers infiltrated the systems that controlled Iran’s nuclear centrifuges and spun them wildly out of control, or stopped them from spinning entirely, destroying a fifth of Iran’s centrifuges.

In retrospect, Mr. Wellinghoff said that attack should have foreshadowed the threats the United States would face on its own infrastructure.

Critical infrastructure is increasingly controlled by Scada, or supervisory control and data acquisition systems. They are used by manufacturers, nuclear plant operators and pipeline operators to monitor variables like pressure and flow rates through pipelines. The software also allows operators to monitor and diagnose unexpected problems.

But like any software, Scada systems are susceptible to hacking and computer viruses. And for years, security specialists have warned that hackers could use remote access to these systems to cause physical destruction.