Category Archives: DHS

With days to go before Trump’s inauguration, did Obama’s DHS federalize elections?

Elections are run by state governments, but a new Obama administration directive may change all that.

Investigative reporter Jon Rappoport calls it a coup.

Georgia Secretary of State Brian Kemp said it’s an attempt to subvert the Constitution under the guise of security.

Vermont Secretary of State Jim Condos said it’s the federal government getting “the nose under the tent”.

Alex Jones says this is Obama’s sneaky way of unconstitutionally overturning the 2016 presidential election and holding a new election — after trying and failing to undo the Nov. 8 election via recounts, “faithless” Electoral College electors, and intelligence reports claiming that Russia had intervened in the election.

What has Rappoport, Kemp, Condos and Jones concerned is an announcement by the Department of Homeland Security (DHS) just 14 days before the inauguration of Donald Trump as the 45th U.S. President, that elections are now “designated” as part of the U.S. government’s “critical infrastructure”.

DHS Secretary Jeh Johnson

DHS Secretary Jeh Johnson

On January 6, 2017, Secretary of DHS Jeh Johnson said in a press release:

I have determined that election infrastructure in this country should be designated as a subsector of the existing Government Facilities critical infrastructure sector. Given the vital role elections play in this country, it is clear that certain systems and assets of election infrastructure meet the definition of critical infrastructure, in fact and in law.

I have reached this determination so that election infrastructure will, on a more formal and enduring basis, be a priority for cybersecurity assistance and protections that the Department of Homeland Security provides to a range of private and public sector entities. By ‘election infrastructure,’ we mean storage facilities, polling places, and centralized vote tabulations locations used to support the election process, and information and communications technology to include voter registration databases, voting machines, and other systems to manage the election process and report and display results on behalf of state and local governments.

The reason for the new designation is because “Election infrastructure is vital to our national interests, and cyber attacks on this country are becoming more sophisticated, and bad cyber actors – ranging from nation states, cyber criminals and hacktivists – are becoming more sophisticated and dangerous.”

Noting that “many state and local election officials . . . are opposed to” the DHS designating the election infrastructure as part of the “critical government facilities infrastructure,” Johnson then proceeds to explain the new designation’s meaning:

  1. What it is not: Johnson says the designation of election infrastructure as critical infrastructure subsector does not mean “a federal takeover, regulation, oversight or intrusion concerning elections in this country” nor will it “change the role state and local governments have in administering and running elections.”
  2. What it is: The new designation does mean that —
    1. election infrastructure becomes a priority within the National Infrastructure Protection Plan.”
    2. DHS will “prioritize our cybersecurity assistance to state and local election officials, but only for those who request it.”
    3. “election infrastructure enjoys all the benefits and protections of critical infrastructure that the U.S. government has to offer.”
    4. “makes it easier for the federal government to have full and frank discussions with key stakeholders regarding sensitive vulnerability information.”
    5. In other words, the new designation “enables the states, should they request it, to leverage the full scope of cybersecurity services” that the DHS provides.

Other “critical infrastructure” sectors and subsectors that receive DHS “prioritized cybersecurity assistance” are chemicals; commercial facilities; critical manufacturing; dams; defense industrial base; emergency services; energy; financial services; food and agriculture; government facilities; healthcare and public health; information technology; nuclear reactors, material, and waste transportation systems; water and wastewater systems — some of which are in the jurisdiction of state and local governments.

DHS provides cybersecurity assistance to the above “critical infrastructure” sectors and subsectors by:

  • Working closely with them on cybersecurity.
  • Conducting joint cybersecurity exercises to improve DHS’ “incident response capabilities”.
  • Streamlining access to unclassified and classified information to critical infrastructure owners and operators.

What do you make of this?

Can you trust what Jeh Johnson said in his press release, given that six states, including Georgia, Kentucky and West Virginia, have said Obama administration’s DHS, not Russia, hacked into their cyber-networks during the 2016 primary and Nov. 8 elections?

Is the DHS’ designation of elections as part of America’s “critical infrastructure” a coup? A subversion of the Constitution? Obama’s way to overturn the Nov. 8 presidential election?

Or are Jon Rappoport, Brian Kemp, Jim Condos and Alex Jones being alarmist?

H/t FOTM‘s MomOfIV and Will Shanley

~Eowyn

DHS memo indicates President Trump will hit the ground running with border wall construction

According to an internal Department of Homeland Security (DHS) memo that Reuters reviewed, once he’s inaugurated on January 20, President Donald Trump will hit the ground running on constructing that US-Mexico border wall he’s promised.

obama border patrol

Julia Edwards Ainsley reports for Reuters, Jan. 3, 2017, that the DHS memo “offers a glimpse into the president-elect’s strategy for securing the U.S. borders and reversing polices put in place by the Obama administration.”

The DHS memo recounts “wide-ranging” requests for documents and analysis by Trump’s transition team in a meeting the team had with DHS officials on December 5, 2016. Trump asked for the documents in order “to assess all assets available for border wall and barrier construction.”

Trump’s transition team asked for documents and information on:

(1) Copies of every executive order and directive Obama sent to immigration agents since he took office in 2009. (Note that President Trump can undo Obama’s executive orders with a wave of his pen and without Congressional consent or approval. See “How Trump can undo what Obama did in past 8 years”)

(2) A DHS aerial surveillance program called Operation Phalanx, which authorizes 1,200 Army National Guard airmen to monitor the southern border for drug trafficking and illegal migration. The program once deployed 6,000 airmen under President George W. Bush but was considerably scaled back by Obama.

(3) Whether federal workers have altered DHS’s biographic information about migrants “out of concern” for their civil rights and civil liberties. A DHS official, speaking on condition of anonymity, said the agency interpreted this Trump transition team request to mean the transition team wanted to make sure that federal workers were not tampering with information to protect DACA (Deferred Action for Childhood Arrivals) recipients and other migrants from deportation.

Note: Deferred Action for Childhood Arrivals (DACA) is an Obama administration immigration policy that allows certain undocumented immigrants illegal aliens who entered the U.S. as minors (defined as before their 16th birthday) to receive a renewable two-year period of deferred action from deportation and eligibility for a work permit. To be eligible, they must have (illegally) entered the U.S. before June 2007; are under age 31 as of June 15, 2015; are currently in school or  a high school graduate or  honorably discharged from the military; have not been convicted of a felony, significant misdemeanor or otherwise pose a threat to national security. DACA does not provide lawful status or a path to citizenship. DACA has collected information including participants’ addresses that can theoretically be used to locate and deport them if the policy is reversed.

(4) DHS’s capacity for expanding “immigrant” detention.

(5) Resources available for building walls and barriers. DHS officials who attended the meeting with Trump’s transition team understood the request to include both the northern and southern borders. In response, U.S. Customs and Border Protection staffers identified:

  • Specific locations in more than 400 miles along the U.S.-Mexico border, and about the same distance along the U.S.-Canada border, where new fencing could be erected.
  • The costs of building a fence are estimated at $3.3 billion for 452 miles along the U.S.-Canada border, and $11.37 billion for 413 miles of fencing on America’s southwest border which would keep pedestrians as well as vehicles from crossing. Pedestrian fences require more staff and would cost $11.2 million per mile.

In fiscal year 2015, the latest year for which data is available, border patrol agents apprehended 331,333 illegal migrants on the U.S.-Mexico border, and 2,626 illegal migrants on the U.S.-Canada border.

H/t ZeroHedge

~Eowyn

4 reasons why you shouldn’t believe the Obama FBI-DHS report on Russian hacking

The “Russia intervened in 2016 election to favor Trump” conspiracy theory was the Democrats’ last-ditch effort to subvert the election.

The Washington Post led the way of the MSM’s propaganda, claiming that a “secret” CIA report named the Russian government as having:

  1. Hacked into the emails of the Democratic National Committee (DNC) and Hillary Clinton’s presidential campaign chairman John Podesta, as well as then-Secretary of State Hillary Clinton’s unsecured and unlawful private email server.
  2. Giving those hacked emails to agents, who in turn,
  3. Provided them to WikiLeaks to publish online — to damaging effects on Hillary’s campaign.

More than that, relying on a shadowy, anonymous, newly-founded website PropOrNot, the Washington Post named 200 Alternative Media sites as Russia’s witting or unwitting agents of disinformation and “fake news,” including Wikipedia, Drudge Report, as well as small humble blogs like Fellowship of the Minds.

spy-vs-spy

The problem is we are simply to put our trust in the Washington Post and other media accounts of this “secret” CIA report, when the MSM violated their own journalist ethics by making no secret of their all-out partiality for Hillary. See, for example:

Adding to our skepticism is that a careful reading of the Washington Post‘s article shows that the “secret” CIA report doesn’t actually make those claims (see “Fake News: Washington Post’s CIA report that Russia intervened in elections to help Trump“). Then there are the credible voices that insist it wasn’t Russia:

Despite the concerted efforts of the Obama administration and the complicit MSM, a Morning Consult poll in late December found that by a whopping 71% majority, the American people don’t buy Obama’s “Russia as bogeyman” conspiracy theory.

Nor did the Electoral College. On November 8, Trump was elected President by a landslide Electoral College margin of 306 to Hillary Clinton’s 232. On December 19 when the Electors formally voted, ironically the faithless electors turned out to be Democrats: the final Electoral College vote was 304 Trump to 224 Clinton.

On December 29, 2016, on the basis of a vague “secret” CIA report, the Obama administration risked war with Russia by expelling 35 Russian diplomats and closing down two Russian consulates. Thankfully, not being insane, Russian President Putin prudently refused to retaliate in kind. And so, World War III is averted — for now.

DHS-FBI Report on Russian Hacking

That same day, December 29, 2016, the Obama Administration finally released a 13-page joint DHS-FBI report on Russian hacking GRIZZLY STEPPE – Russian Malicious Cyber Activity. More than half of the 13-page report isn’t even about hacking, but consists of a list of suggestions for cyber security and preventive measures.

Note: “Grizzly Steppe” is the Obama administration’s code-name for what the administration calls Russia’s “malicious cyber activity”.

Below is the summary of the Grizzly Steppe report:

“This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.
Previous JARs have not attributed malicious cyber activity to specific countries or threat actors. However, public attribution of these activities to RIS is supported by technical indicators from the U.S. Intelligence Community, DHS, FBI, the private sector, and other entities. This determination expands upon the Joint Statement released October 7, 2016, from the Department of Homeland Security and the Director of National Intelligence on Election Security.
This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure
networks.
In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.”

The report then proceeds to identify two specific Russian “actors” who hacked into the Democratic Party’s emails on two separate occasions — summer of 2015 and spring of 2016:

  1. APT29: “The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015″
  2. APT28: A second Russian hacker(s), “known as APT28, entered in spring 2016.”

In both instances, the alleged Russian hackers gained entrance into Democrat emails via spearphishing.

Note: Phishing is a hacker’s attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. We’ve all received phish emails, wherein we are given some reason (e.g., your email or bank account has been breached) and asked to click on a URL, ostensibly the URL of your account, in order to verify you’re the owner of the account. The URL, of course, is bogus — a trap to get you, if you are stupid enough, to enter your username and password. The phishing scammer then uses your username and password to hack into your account.

In the words of the Grizzly Steppe report:

In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.

In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members.

The report claims that on both occasions — summer 2015 and spring 2016 — “The U.S. Government assesses that information was leaked to the press and publicly disclosed.”

In other words, the email accounts of the DNC, Hillary Clinton and John Podesta were hacked because these Democrats were so stupid as to fall for phishing scams that only morons and those with senile dementia fall for. Let that idea sink in . . . .

John Podesta, in particular, is so careless with his email account that he made the job of hackers ridiculously easy by having “jpodesta” as his username and the word “p@sswOrd” as his password, as indicated in an email sent to him by his Special Assistant Eryn Sepp on Feb. 19, 2015, which WikiLeaks published:

john-podestas-username-and-password

Reasons why Grizzly Steppe report is not credible

(1) The report is prefaced by a curious Disclaimer, which says;

“This report is provided ‘as is’ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within.

(2) Cybersecurity expert John McAfee (yes, that John McAfee, as in the McAfee anti-virus software you use to protect your computer from viruses and malware), told Larry King in an RT America interview that the report is a ploy to “manipulate our opinions”:

“When the FBI or when any other agency says the Russians did it or the Chinese did something or the Iranians did something – that’s a fallacy. Any hacker capable of breaking into something is extraordinarily capable of hiding their tracks. If I were the Chinese and I wanted to make it look like the Russians did it I would use Russian language within the code. I would use Russian techniques of breaking into organizations so there is simply no way to assign a source for any attack – this is a fallacy. This is what the FBI and other agencies want us to believe so that they can manipulate our opinions, but I can promise you – if it looks like the Russians did it, then I can guarantee you it was not the Russians.

You can watch and hear McAfee for yourself by going to the RT video on Express.

McAfee also said it’s no longer possible to keep “secrets” in the online landscape and that other countries already have access to U.S. classified information:

“Our government wants to say ‘well we have secrets we must protect’ – there are no secrets anymore. If the US Government believes the Russians, the Chinese, the Iranians do not already have all of our secrets because of their hacking technologies, then our government is deluding itself.”

Furthermore, McAfee believes that the U.S. government itself is the hacker — of “influential” Americans:

“I have no privacy and neither do you, Larry. If you think that just because you’re not a political activist or not speaking out against a government agency that they may not be looking into your life – I know that they are. Why? You are an important person, you influence millions of Americans, so of course, they want to know what you’re thinking, what you’re doing, who your friends are and what you’re saying – and I’m not being paranoid – this is just that facts of life as it exists today.”

(3) Most importantly, other than naming the hackers as APT 29 and APT 28 and describing how they hacked into Democrat emails (via phishing), the report does not actually tell us how the Obama administration knows the hacks had been directed by the Russian government, or that the hackers’ motive was to influence the election in favor of Trump. This is pointed out by Bill Binney, a 36-year executive of the National Security Agency (NSA) who is widely regarded as a “legend” within the agency and its best-ever analyst and code-breaker who created the agency’s mass surveillance program for digital information. According to Binney:

“I expected to see the IP’s or other signatures of APTs 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?

Further, once we see the data being transferred to them, when and how did they transfer that data to Wikileaks? This would be evidence of trying to influence our election by getting the truth of our corrupt system out. […]

In addition, since Wikileaks is (and has been) a cast iron target for NSA/GCHQ/etc for a number of years there should be no excuse for them missing data going to any one associated with Wikileaks.”

(4) Even Rolling Stones magazine, which endorsed Hillary Clinton for President, is unconvinced. As the magazine’s contributing editor Matt Taibbi correctly points out:

“But this could also just be a cynical ass-covering campaign, by a Democratic Party that has seemed keen to deflect attention from its own electoral failures.

The outgoing Democrats could just be using an over-interpreted intelligence ‘assessment’ to delegitimize the incoming Trump administration [….]

We just don’t know, which is the problem.

[…] Not only do governments lie, they won’t hesitate to burn news agencies. In a desperate moment, they’ll use any sucker they can find to get a point across. […] Which makes it surprising we’re not trying harder to avoid getting fooled again.”

When even a left-wing magazine that had endorsed Hillary Clinton for President admits that “we just don’t know” after reading the DHS-FBI Grizzly Steppe report on Russia’s alleged hacking of Democrat emails, one would have to be really gullible to place any confidence in the report.

Dog eyeroll

Clearly the Democrats’ emails had been hacked, then given to WikiLeaks to publish. Obama wants you to believe the culprits are the Russian government. But that’s really not the point, is it?

In the end, what is important are the emails themselves and what they reveal:

  • The DNC was Hillary’s tool and actively sabotaged and undermined Bernie Sanders’ presidential campaign.
  • Hillary Clinton’s lies, corruption, venality, and contempt for the “little people” whom she would rule as president.
  • John Podesta’s satanic activities.

It is the contents of those emails, not who hacked the emails, which helped to defeat Hillary and elect Donald Trump.

Let’s say you are about to get married. A friend got hold of information that your fiancé is cheating on you, and gave that information to you, with which you called off the wedding. Would it make any sense for you to heap your fury on the friend, instead of on your faithless fiancé?

What the Obama administration is doing is exactly the same. They would have you blame the messenger who provided you with the critical information you should have for the 2016 presidential election.

We now know Democrat bigwigs — the DNC, Hillary Clinton, John Podesta — are really stupid, so stupid as to fall for phishing scams. Don’t allow them to think you are stupid too.

~Eowyn

Mexican man charged with rape had 19 deportations, removals

maldonado-geary-county-detention-center-photo

Repeat illegal alien offender Tomas Martinez-Maldonado/Photo from Geary County Detention Center

From The Wichita Eagle: A Mexican man accused of raping a 13-year-old girl on a Greyhound bus that traveled through Kansas had been deported 10 times and voluntarily removed from the U.S. another nine times since 2003, records obtained by The Associated Press show.

Three U.S. Republican senators — including Kansas’ Jerry Moran and Pat Roberts — demanded this month that the Department of Homeland Security provide immigration records for 38-year-old Tomas Martinez-Maldonado, who is charged with a felony in the alleged Sept. 27 attack aboard a bus in Geary County. He is being held in the Geary County jail in Junction City, which is about 120 miles west of Kansas City.

U.S. Sen. Charles Grassley, from Iowa and chairman of the judiciary committee, co-signed a Dec. 9 letter with Moran and Roberts to Homeland Security Secretary Jeh Johnson, calling it “an extremely disturbing case” and questioning how Martinez-Maldonado was able to re-enter and remain in the country.

U.S. Immigration and Customs Enforcement said it has placed a detainer — a request to turn Martinez-Maldonado over to ICE custody before he is released — with Geary County. ICE declined to discuss his specific case beyond its October statement regarding the 10 deportations.

Court filings show Martinez-Maldonado has two misdemeanor convictions for entering without legal permission in cases prosecuted in 2013 and 2015 in U.S. District Court of Arizona, where he was sentenced to serve 60 days and 165 days respectively.

A status hearing in the rape case is scheduled for Jan. 10. Defense attorney Lisa Hamer declined to comment on the charge, but said, “criminal law and immigration definitely intersect and nowadays it should be the responsibility of every criminal defense attorney to know the possible ramifications in the immigration courts.”

Nationwide, 52 percent of all federal prosecutions in the fiscal year that ended Sept. 30 were for entry or re-entry without legal permission and similar immigration violations, according to Transactional Records Access Clearinghouse at Syracuse University.

It’s not unusual to see immigrants with multiple entries without legal permission, said David Trevino, a Topeka immigration attorney also representing Martinez-Maldonado. Most of Martinez-Maldonado’s family lives in Mexico, but he also has family in the United States, and the family is “devastated,” Trevino said.

“(President-elect Donald Trump) can build a wall 100 feet high and 50 feet deep, but it is not going to keep family members separated. So if someone is deported and they have family members here … they will find a way back — whether it is through the air, under a wall, through the coast of the United States,” Trevino said.

He declined to comment on his client’s criminal history and pending charge.

Records obtained by AP show Martinez-Maldonado had eight voluntary removals before his first deportation in 2010, which was followed by another voluntary removal that same year. He was deported five more times between 2011 and 2013.

In 2013, Martinez-Maldonado was charged with entering without legal permission, a misdemeanor, and subsequently deported in early 2014 after serving his sentence. He was deported again a few months later, as well as twice in 2015 — including the last one in October 2015 after he had served his second sentence, the records show.

ICE said in an emailed statement when it encounters a person who’s been deported multiple times or has a significant criminal history and was removed, it routinely presents those cases to the U.S. attorney’s office for possible criminal charges.

Cosme Lopez, spokesman for the U.S. attorney’s office for the District of Arizona, declined comment on why prosecutors twice dismissed felony re-entry after deportation charges against Martinez-Maldonado in 2013 and 2015 in exchange for guilty pleas on misdemeanor entry charges.

Arizona ranks third in the nation — behind only the Southern District of Texas and the Western District of Texas — for the number of immigration prosecutions among the nation’s 94 federal judicial districts for the fiscal year that ended Sept. 30, TRAC records show.

Moran told the AP in an emailed statement that the immigration system is “broken.”

“There must be serious legislative efforts to address U.S. immigration policy, and we must have the ability to identify, prosecute and deport illegal aliens who display violent tendencies before they have an opportunity to perpetrate these crimes in the United States,” he said.

DCG

Burien, Washington declared sanctuary city by narrow council vote

illegal

From Seattle Times: Burien is about to become a so-called sanctuary city — joining Seattle and King County — after the City Council voted narrowly late Monday to bar city employees from asking for documentation of a person’s immigration status.

The ordinance passed on a 3-2 vote, after Burien Mayor Lucy Krakowiak and Deputy Mayor Bob Edgar left the meeting at 10 p.m., without voting. Councilmember Nancy Tosta, who supported the sanctuary city ordinance, said that Krakowiak frequently leaves meetings at 10 p.m., after they’ve gone on for three hours. Krakowiak and Edgar did not immediately respond to requests for comment.

Councilmember Nancy Tosta supports illegal aliens

Councilmember Nancy Tosta supports illegal aliens

The scope of the change is limited because Burien does not have its own police department. The city relies on the King County Sheriff’s Office for law enforcement, and that agency has long had policies restricting deputies from holding people strictly based on their immigration status. King County has also, since 2009, barred employees from asking about a person’s immigration status.

Olympia passed a similar resolution, declaring itself a sanctuary city, last week.

There is no set definition of what it means to be a sanctuary city, but Burien’s ordinance is broadly similar to the county’s, and is meant to limit local officials from enforcing federal immigration laws.

“We recognized the concern and fear that many people in our community are feeling within the current political climate, and we had letters come in expressing a desire for the council to take an action,” Tosta said. “Several of us believed it was important to make a statement to our community showing our values as a council.”

Burien’s ordinance says that civil immigration enforcement has traditionally been a federal responsibility and that shifting the onus to local agencies drains their limited resources. Part of the city’s goal, it says, is to foster trust between immigrant communities and law enforcement.

Debates over sanctuary cities have intensified since the election of Donald Trump in November. Trump has vowed to take federal funding from cities that shield residents from federal immigration authorities. But many urban centers, Seattle included, have doubled down, reaffirming that local law enforcement will not ask about someone’s immigration status, except in rare scenarios.

That’s been the law in Seattle since 2003. Seattle Mayor Ed Murray held a news conference the day after the election, promising that it would remain the law.

“We have a new administration coming in who has directly targeted numerous groups of people,” Burien Councilmember Lauren Berkowitz said, of the president-elect. Berkowitz had proposed a more expansive resolution, modeled on the law in San Francisco, but that was defeated 4-1.

Councilmember Lauren Berkowitz supports illegal aliens

Councilmember Lauren Berkowitz supports illegal aliens

Katie Hiedeman, a Burien resident who pushed for the sanctuary city ordinance, said that about 30 people spoke at the meeting in favor of it, with only a few opposed, before the vote, which happened after 10:30 p.m.

She wanted the ordinance passed for practical reasons — so that people, perhaps concerned about their immigration status, won’t be afraid to talk to police if they’re a victim or witness to a crime — and as a show of support. “These people have been in our community for maybe decades,” Hiedeman said. “Their children go to our schools, they go to the stores we shop in, they’re at the parks, they’re on our kids’ soccer teams, they are ingrained in our communities.”

maga

DCG

ISIS sympathizer, suspected in 3 King County killings, won’t face death penalty

A precedent against the death penalty was set in Washington state when they let Gary Ridgway off the hook. Now an ISIS pig will be on the taxpayer dime for life as well.

King County Prosecuting Attorney Dan Satterberg

King County Prosecuting Attorney Dan Satterberg

From Seattle Times: A man suspected of killing three men in Seattle and Skyway in 2014 will not face the death penalty, King County Prosecuting Attorney Dan Satterberg announced Friday.

Ali Muhammad Brown, 32, is accused of killing Leroy Henderson in Skyway, and Ahmed Said and Dwone Anderson-Young in Seattle. Brown is believed to have fled to New Jersey days after the latter two shootings.

Satterberg said in a news release he decided against seeking the death penalty after reviewing the case and speaking with the victims’ families.

ISIS pig Ali Muhammad Brown

ISIS pig Ali Muhammad Brown

Brown, 32, is charged with three counts of aggravated first-degree murder in King County. Brown is being held in New Jersey, where he recently was sentenced to more than 30 years in prison after being convicted of first-degree robbery and several other crimes. He also is awaiting trial for one count of first-degree murder in Essex County, N.J., as well as another robbery charge in Ocean County, N.J.

It could take more than a year for those cases to be resolved, the prosecutor’s office said in a news release. When that happens, Brown will be returned to King County to face charges.

Prosecutors allege that Brown, a Muslim man, killed the four men in a fit of rage over the U.S. government’s role in the Middle East. He was on a federal terrorism watch list and wrote in his journal that he planned to follow the Islamic State group and “learn the ways of jihadis.”

serious

Brown is accused of fatally shooting Henderson shortly after 11:45 p.m. April 27, 2014, as Henderson was walking home from a Skyway store. Deputies linked Brown to the slaying through the 9 mm bullets and casings found in and around Henderson’s body.

Said was driving Anderson-Young home from R Place, a gay club on Capitol Hill, on June 1, 2014, when they were shot. Brown had reportedly met up with Said over a gay social-networking app, then connected with the two men outside the club that night and got into Said’s car, according to charges.

“The murders took place less than 17 minutes after two witnesses saw Ali Brown leave with the victims in Said’s car. There is no evidence to suggest that Said and/or Anderson-Young were armed, and these murders do not appear to be motivated by robbery, drugs or any other crime,” Seattle police Detective Cloyd Steiger wrote in investigative documents.

In a January 2015 interview with The Seattle Times, Falana Young-Wyatt, mother of Anderson-Young, said she didn’t feel strongly about whether Brown should be condemned to death row. She said she only cared about his swift return to King County to face trial.

“I want him to look me in the face,” she said. “I want him to know my son’s life matters. I just want justice for my son.”

DCG

Obama administration’s DHS, not Russia, hacked cyber-networks of Georgia, Kentucky and West Virginia

I awoke in pre-dawn early morning to the overnight TV news of a last-ditch effort to subvert the 2016 presidential election.

The Obama administration, Republican reprobates like Sens. Lindsey Graham (long rumored to be a closeted homosexual) and John McCain, as well as the usual Hollyweirdo suspects (see this video) are all clamoring that Putin and the Russian government hacked the 2016 presidential election to favor Donald Trump, and that next Monday, the Electoral College must cast their votes for Hillary Clinton instead of President-elect Donald Trump.

All this despite the fact that:

(1) The American people have been given only hearsay that the CIA and “other intelligence agencies” found Russia to have intervened in the election — not the actual CIA report that, we are told, is “secret”.

If the Electoral College is going to subvert the will of the people, let’s see that CIA report!!!

(2) Lead media attack dog Washington Post‘s own article on the alleged CIA secret report does not actually say that the Russian government “intervened” in the election, nor that Moscow actually directed its witting or unwitting “agents” (the List of 200) to provide the hacked Democrat emails to WikiLeaks. See “Fake News: Washington Post’s CIA report that Russia intervened in elections to help Trump”.

(3) CIA personnel say there is no such “secret” CIA report. See “CIA: Washington Post lied about a secret CIA report that Russia intervened in 2016 election”.

Instead of Russian hackers, it is the Obama administration’s Department of Homeland Security that are the cyber hackers — according to Georgia’s Secretary of State Brian Kemp.

Aaron Diamant reports for WSB-TV2 Atlanta, Dec. 15, 2016:

The Georgia Secretary of State’s Office now confirms 10 separate cyberattacks on its network were all traced back to U.S. Department of Homeland Security addresses.

In an exclusive interview, a visibly frustrated Secretary of State Brian Kemp confirmed the attacks of different levels on his agency’s network over the last 10 months. He says they all traced back to DHS internet provider addresses.

[…] The Secretary of State’s Office manages Georgia’s elections, and most concerning for Kemp about the newly discovered scans is the timing.

The first one happened on Feb. 2, the day after Georgia’s voter registration deadline. The next one took place just days before the SEC primary. Another occurred in May, the day before the general primary, and then two more took place in November, the day before and the day of the presidential election.

“It makes you wonder if somebody was trying to prove a point,” Kemp said. […]

Kemp says several of those scans came around the same time he testified before Congress about his opposition to a federal plan to classify election systems as “critical infrastructure,” like power plants and financial systems.Kemp believes Georgia’s state-run election systems are already secure and doesn’t think the feds should be involved.

The DHS did not return Diamant’s emails seeking comment Tuesday.

In a tweet, Diamant reports that WSB-TV has received “documents” showing that two other states’ elections agencies — those of Kentucky and West Virginia — had also been hacked by the Department of Homeland Security:

aaron-diamant-tweet-about-dhs-cyber-attacks

Why isn’t this news reported by Washington Post and the national alphabet TV networks?

H/t IWB, The Sean Hannity Show, and FOTM‘s JCscuba

~Eowyn