Friday, September 23, 2016

Vetting Syrian Refugees: The impossible gamble that risks Every American

There are three critical ways in which our vetting procedures make us vulnerable:


"Flying under the radar".

 As I have noted before, our vetting is heavily oriented toward electronic systems — databases with biographical information about known or suspected terrorists, sometimes with biometrics (fingerprints or photos). But what do you do if they aren't known and have no fingerprints of record in any U.S. system? Why, then you look at the documents they present to you for clues.
What happens if they don't have any documents to present? Media stories about the "migrant flood" are replete with articles about the hundreds of identity and travel documents discarded on the pathways these aliens are using in their trek toward Europe. The answer is that they will assume whatever identity and nationality they choose to provide to the refugee resettlement agencies responsible for developing, under UNHCR (United Nations High Commissioner for Refugees) supervision, the queues of applicants our officers will be asked to vet.

Using bogus documents is easy and no disqualifier.

70% of ALL Syrian Refugees are men .
 Then there is the ease with which fraudulent documents are being procured throughout the migrant pathways into the heart of Europe right now — some of them legitimate, but altered to accommodate the new bearers; others excellent counterfeits. According to BBC News, they are being used with remarkable success to pass through border and airport checkpoints and are readily available, as one of their own undercover investigations revealed.
Although there is certainly some chance that such documents would be discovered by U.S. officers who have available to them an outstanding Forensic Document Laboratory (FDL), it may surprise readers that use of phony documents doesn't make you ineligible for refugee or asylum status. This is something government officials don't like to discuss in public forums such as the Judiciary Committee hearing, where they would have us think of the screening process as an impenetrable iron wall to national security threats.
The principle behind overlooking use of fake documents is firmly embedded in both international and domestic law, for the most noble of reasons. Think of Raoul Wallenberg, who saved many Jews in Nazi-occupied Europe by providing them Swedish passports without regard to their real nationality. Even so, the stakes for the American people are extraordinarily high if the individuals using those fake documents aren't in fact refugees in distress, particularly since, according to the UNHCR, 68 percent of the nearly 600,000 who've made the journey as of October 2015 are adult males.
It's also important to understand that not every applicant's documents are examined by the FDL — the workload would be too crushing. They only examine documents upon official request by a suspicious immigration agent or officer. Nonetheless, assuming our officers were able to detect the fraudulent documents (no sure thing), how would they readily discern between a legitimate refugee using a fake passport in desperation to survive and flee vs. an anti-western Islamist hoping to insinuate himself into the United States with malintent? Given ground realities, that is a near-impossibility, and failing the ability to establish legal disqualifiers to entry, the decision will inevitably be to grant status and admit. That is what refugee officers do.

Identity theft and blank passports can be an unbeatable combination.

 Finally, and worst of all, media stories are also replete with articles reflecting the ease with which "migrants", apparently including jihadists, are able to obtain perfectly legitimate Syrian documents they will ultimately present to interviewing refugee officers from every country, including the United States. This is because many Syrian government offices have been overrun in the chaos of war, leaving their trove of blank documents — passports, national identity cards, driver's licenses, etc. — behind for extremist groups and criminal gangs to take advantage of.

FAKE Syrian Passports for sale..
It is easy enough to steal the identity of a dead man (or woman) to insert into the blanks — or even, for that matter, a foreign jihadist's own identity even though he may not be Syrian at all; he need only be unknown to the West. 








In such circumstances, there is no one that U.S. officers can turn to in order to verify the identity of the person who presents these facially legitimate documents. Not only have birth and death records been destroyed during this civil war, but even when they are still available to the Syrian government, there is no reason for authorities of the Assad regime to cooperate with officials of a government in Europe or the United States, when that government wishes to see him deposed.
That this is happening now is beyond dispute. The British Daily Mail carried a lengthy and detailed article last month outlining how one of their journalists purchased an entire package of Syrian documents created from legitimate blank stock, tailored to him, for a shockingly small $2,000.
According to the journalist, the vendor in Turkey who sold him the documents said such blanks were already being prepared on behalf of, and used by, Islamic State terrorists intent on infiltrating the West using as cover the ongoing mass migration crisis.
In sum, there are just too many variables at play for our government — for any government — to publicly make claims, as ours did at the Senate hearing, that it can properly vet the individuals coming out of this broken piece of the globe. One wonders that they would even try, given past experience: The Boston Marathon refugee bombers come promptly to mind, as do the many Somalis admitted as refugees and children of refugees who have left to become foreign fighters for al Shabaab, Islamic State, and other Islamic terrorist groups.

Monday, August 15, 2016

Massive ISIS attack planned for El Paso Texas area

ISIS Plans To Use Lax U.S. – Mexico Border Security To Carry Out Massive Attack

from American Military News

Erick Jamal Hendricks, a known home-grown ISIS sympathizer that was actively working with ISIS while living in North Carolina, has told Homeland Security officials that ISIS has several “sleeper cells” in Mexico training to carry out an attack on the South West United States. Hendricks’ claims corroborate ISIS leaders Sheik Mahmood Omar Khabir’s claims that he is training thousands of jihadi’s near the U.S. – Mexico border. Both men claim that there is an ISIS training facility near Ciudad Juares, near El Paso, TX. Khabir made the claims in an Italian newspaper Il Giornale in March of 2016. Hendricks confirmed these claims after being arrested Khabir has boasted that ISIS could carry out a massive attack that would leave thousands dead by infiltrating the United States through the Mexican border. He claims that a deadly attack could be carried out on a major city just hours after crossing the border. ISIS also claims that terrorists and foreign fighters are being smuggled to rural Texas towns, according to Christiantoday.com. The alleged attack would be one of the most deadly attacks ever carried out on American soil, according to Khabir. He states that an ISIS attack would:
in August, 2016.
” kill thousands of people in Texas or Arizona within hours.”
Hendricks corroborated the story after being arrested by the FBI for attempting to recruit Americans to ISIS. He and another unidentified individual were arrested after trying to by an AK-47 to carry out an attack in June 2015. Hendricks has reportedly been investigated and monitored by Homeland Security since that time. Recent statements made to government officials have confirmed the existence of the base.

Sunday, July 17, 2016

The Obama BLM plan for the end of America?



From our original article in 2012




Canada Free Press: Obama's Planned End-Game, Source Says

8/16/12
Doug Hagmann at the Canada Free Press says he has a "source" that has inside information on Obama's planned end-game.
“Remember the shots fired at the White House not too long ago?” asked my source. It should have been an opportunity to use our force against the Tea Parties, the gun clingers, the Constitutionalists, and everyone who has complained about Obama. DHS should have stepped in right then, and used that event to start the clampdown,” this source stated about White House comments.
Does Obama look worried about the upcoming elections? Look at his lavish vacations, his limited work schedule, and those with whom he is working.  This is a very dangerous man who has, as his closest advisors, people who have orchestrated the revolutions of the 1960s. They know the “trigger points” in America.
Watch for a false flag event against Obama or his family, something that will outrage ‘black America.’ It will be carefully choreographed, but executed in a manner that will evoke the ugliest of reactions and create racial chaos in this country that will make the Watts riots, 1968 and the Rodney King riots pale in comparison. That’s the third leg in this.”
This isn't the first time a source has come clean about this kind of thing. In May, a DHS informant said preparations were being made to deal with a Civil War.
Keep in mind that Liberals said the same thing about Bush before his two terms were over but nothing of the sort happened. Everybody is Constitutionally able to serve two terms so if Obama lost his re-election, he's still eligible to run again at another time.



unless otherwise indicated this content is copyright protected 2012 by SEA CHANGE, llc.

Monday, July 11, 2016

Pokemon GO accesses your Google account and everything else

You Should Probably Check Your Pokémon Go Privacy Settings

The company behind the game is collecting players’ data. And it’s most definitely catching them all.


Joseph Bernstein
In the five frenzied days since its American release, Pokémon Go has become an economic and cultural sensation. Downloaded by millions, the game has boosted Nintendo’s market value by $9 billion (and counting), made a major case for augmented reality as the gaming format of the future, and led to a plethora ofstrange, scary, and serendipitous real-life encounters.
And as millions of users wander the country collecting Pikachus and Jigglypuffs, the Alphabet spin-off Niantic, Inc. that developed the game is collecting information about the collectors. And it’s most definitely catching them all.
Like most apps that work with the GPS in your smartphone, Pokémon Go can tell a lot of things about you based on your movement as you play: where you go, when you went there, how you got there, how long you stayed, and who else was there. And, like many developers who build those apps, Niantic keeps that information.
_________________________________________________________
According to the Pokémon Go privacy policy, Niantic may collect — among other things — your email address, IP address, the web page you were using before logging into Pokémon Go, your username, and your location. And if you use your Google account for sign-in and use an iOS device, unless you specifically revoke it, Niantic has access to your entire Google account. That means Niantic has read and write access to your email, Google Drive docs, and more. (It also means that if the Niantic servers are hacked, whoever hacked the servers would potentially have access to your entire Google account. And you can bet the game’s extreme popularity has made it a target for hackers. Given the number of children playing the game, that’s a scary thought.) You can check what kind of access Niantic has to your Google account here.
___________________________________________________________

It also may share this information with other parties, including the Pokémon Company that co-developed the game, “third-party service providers,” and “third parties” to conduct “research and analysis, demographic profiling, and other similar purposes.” It also, per the policy, may share any information it collects with law enforcement in response to a legal claim, to protect its own interests, or stop “illegal, unethical, or legally actionable activity.”
Now, none of these privacy provisions are of themselves unique. Location-based apps from Foursquare to Tinder can and do similar things. But Pokémon Go’s incredibly granular, block-by-block map data, combined with its surging popularity, may soon make it one of, if not the most, detailed location-based social graphs ever compiled.
And it’s all, or mostly, in the hands of Niantic, a small augmented reality development company with serious Silicon Valley roots. The company’s origins trace back to the geospatial data visualization startup Keyhole, Inc., which Google acquired in 2004; it played a crucial role in the development of Google Earth and Google Maps. And though Niantic spun off from Alphabet late last year, Google’s parent company is still one of its a major investors, as is Nintendo, which owns a majority stake in The Pokémon Company. Indeed, Google still owned Niantic when the developer released its first game, Ingress, which is what Niantic used to pick the locations for Pokémon Go’s ubiquitous Pokéstops and gyms.
Citing CEO John Hanke’s travel plans, a representative from Niantic was not able to clarify to BuzzFeed News if the company will share location data with Alphabet or Nintendo. A Google representative forwarded BuzzFeed News’ request for comment to Niantic.
Given the fact that Pokémon Go already has millions of users and that it has already attracted the attention of law enforcement, it seems likely that at some point police will try to get Niantic to hand over user information. And if Google’s track record is any indication — a report earlier this year showed that the company complied with 78% of law enforcement requests for user data — they are probably prepared to cooperate.
Joe Bernstein is a senior technology reporter for BuzzFeed News and is based in New York.

Bill Clinton's Pedo Buddy's Little Black Book