Categories
Quick Analysis

Growing Threats in South Asia, Africa and Latin America

Will the United States repeat the mistake it made in the Middle East—withdrawing its military without leaving a sufficient residual force to prevent a takeover by extremists? The Taliban’s growing resurgence points to a strong potential for that to occur. 

On another continent, the increased presence of ISIS in Africa also provides a great deal to be concerned about.  Add to that the growing presence of Russia, China, Iran and terrorists groups in Latin America, and it becomes clear that the coming years will bear the consequences of the severe policy errors of the Obama Administration.

Today’s report concludes our excerpts from key portions of the testimony by USMC Lt. General Vincent R. Stewart, the Director of the Defense Intelligence Agency, to the House Armed Services Committee on key threats facing the United States.

SOUTH ASIA, AFRICA AND LATIN AMERICA

Afghanistan

In 2015, the Afghan National Defense and Security Forces (ANDSF) took primary responsibility for security in Afghanistan for the first full year. The Afghan National Army conducted several independent multi-corps operations against the insurgency in diverse regions of the country. Security forces also successfully secured almost all provincial capitals and national lines of communication, to include major highways. A positive development in the evolution of the ANDSF is the use of special operations forces to effectively respond to terrorist threats and to deny safe haven to networks across the country, albeit with coalition support.

Despite these increased capabilities, the ANDSF is still facing significant challenges in leadership, combat enablers, logistics and sustainment, and ministerial capacity. The ANDSF cannot manage the insurgency and ensure security across Afghanistan without further improvement in these key areas and the development of human capital. The 2015 fighting season highlighted these shortfalls and a security posture which is overstretched and ineffectively utilized. The temporary fall of Kunduz City in September 2015, the result of Taliban efforts to expand operations in northern Afghanistan and exploit ANDSF capability gaps, illustrated these deficiencies. Despite the Afghan Army’s ability to mount effective counterattacks to regain lost terrain — as in Kunduz —the force is challenged to effectively employ organic aerial and ground fire enablers in support of reactive operations.

The late July announcement of former leader Mullah Omar’s death, and the contentious accession of new leader Mullah Mansour, led to the emergence of a Taliban opposition faction in late 2015. Infighting between Mansour’s supporters and the opposition has occurred, and the Taliban have faced competition from the ISIL’s emergent regional affiliate. The Taliban and the ISIL are focused on countering the international presence and expanding territorial footholds in Afghanistan. In the 2016 fighting season, we expect the Taliban-led insurgency will try to build on its temporary victory in Kunduz by attempting to surround and pressure population centers. They will also seek to make incremental gains in rural areas and conduct high-profile attacks against government and civilian targets in key cities, particularly Kabul.

Pakistan

In 2016, Islamabad will face internal security threats from militant, sectarian, and separatist groups. ISIL in Khorasan and al-Qaida in the Indian Subcontinent also will remain significant security concerns for Islamabad. Counterinsurgency operations along Pakistan’s Western border and paramilitary operations in Karachi have had some success in reducing violence and are likely to continue.

Pakistan’s nuclear stockpile continues to grow. We are concerned that this growth, as well as the evolving doctrine associated with tactical nuclear weapons, increases the risk of an incident or accident. Islamabad continues to take steps to improve its nuclear security, and is aware of the threat presented by extremists to its program.

She suspected me of having an affair and if that discount cialis canada happens, it’s game over before it starts.Well, as it turns out, there is one particularly simple and straightforward subject line that WILL get your emails opened every time. He has gone through your stuff, selected what he thought he would like, and treated your home like a supermarket! Is there any reason to think he hasn’t been in prison, doesn’t know how to Market!!! I have converted my hurting, acquired through cialis 5mg cheap the school of hard knocks to your grow in my Free of charge InLife marketing training. Caverta is dark-red triangular tablet and Kamagra is blue discount viagra quadrangular. If you’ve caught the ad campaign running late Recommended pharmacy store purchase generic levitra in the evening for this latest innovation, you’ll probably want to find out how to buy Extenze and when it will be available. INDIA and PAKISTAN: Tensions between India and Pakistan subsided in late 2015 following high-level diplomatic engagement and an agreement to continue talks next year. However, there remains a significant risk that tensions could once again escalate with little warning, particularly if there is a large-scale terrorist attack in India.

Africa

Africa’s security environment is volatile due to dysfunctional political systems, conflict, and permissive environments for transnational terrorist and criminal groups. The region remains vulnerable to terrorist attacks, civil conflict, outbreaks of mass violence, trafficking networks, and humanitarian emergencies. Additionally, depressed global commodity prices and internal economic mismanagement and corruption are negatively impacting Africa’s economic growth prospects and limiting government resources, weakening state capacity to respond to security threats. African and UN forces are responding to most security challenges, but most of the region’s militaries continue to require sustained international assistance to address the continent’s security environment.

In North Africa, years of civil conflict over political control of Libya and an expanding extremist presence in the country are the most pressing security concerns. UN sponsored negotiations to end the political impasse in Libya are slowly progressing, though obstacles to establishing a unified and functioning government will persist. ISIL has taken advantage of this permissive environment to establish a stronghold in the coastal Libyan city of Surt. Libya’s instability has enabled the flow of illicit activity across the country’s porous borders and increased concerns over a heightened terrorist threat across North Africa and the Sahel region. The Libyan conflict and terrorist safe haven will persist until an inclusive unity government is established and secured by a loyal and capable military, which is unlikely in the foreseeable future.

West Africa’s Sahel and Lake Chad regions are also contending with a number of violent extremist groups. The military forces within this region are stretched to defend against entrenched extremist groups or to confront cross-border extremist attacks. Given the enduring presence of terror groups in northern Mali, partner nations are working with Bamako to help reform and improve its military, and UN forces are securing major towns in the country’s northern region. However, much work remains to be done to contain extremist threats in Mali and across the Sahel region. In northeastern Nigeria and the Lake Chad region, terror attacks by the Islamic State (IS)-West Africa, also known as Boko Haram, persist and are likely to continue despite the combined military efforts of Nigeria, Niger, Cameroon, and Chad. The four states are working to operationalize the Multi National Joint Task Force to better combat IS–West Africa, but the results have been limited and efforts to address the socio-political drivers of IS–West Africa’s success have lagged.

Parts of central and eastern Africa are at risk of instability over the next year, necessitating the continuing presence of peacekeepers. In Somalia, al-Shabaab attacks and control of some rural areas will persist as African Union troops, supported by the nascent Somali National Army, attempt to sustain control of southern region population centers. The January 15 al-Shabaab attack on a Kenyan military camp in southern Somalia highlighted the fragility of the country’s security environment.

The risk of episodic violence in the Central African Republic, Democratic Republic of Congo, South Sudan, and Sudan will also continue despite peace and stability efforts. In Burundi, opposition to President Nkurunziza’s third term has increased the risk of ethnic violence with potentially destabilizing regional implications. Ongoing efforts to extend presidential terms in Rwanda, Democratic Republic of Congo, and Republic of Congo could spark new episodes of unrest. Additionally, the potential death or incapacitation of several heads of state throughout the region, especially in Zimbabwe, would contribute to a heightened risk of regional instability.

Latin America

Latin American nations continue to confront transnational threats challenging regional stability and prosperity, and the region remains vulnerable to transit by bad actors. At the same time, nations outside the hemisphere are seeking greater regional influence.

Mexico remains the primary transit country for U.S.-bound cocaine, and a major supplier of methamphetamine, heroin, and marijuana. El Salvador, Guatemala, and Honduras face some of the highest levels of violence in the world, exacerbated by drug trafficking and gang activities. Colombian cocaine production significantly increased in 2014, the majority of which is destined for the U.S. The Revolutionary Armed Forces of Colombia (FARC) insurgent group is in peace talks with the government and has 5,000-7,000 members capable of surging short-duration offensives against government outposts and critical infrastructure. The FARC, the National Liberation Army, and criminal bands continue to profit from the drug trade.

Russia continues to engage with Cuba, Nicaragua, and Venezuela and probably wants access for Russian military forces to ports and airfields in those countries.

Categories
Quick Analysis

Supreme Court to Examine Obama Immigration Move

Today, the U.S. Supreme Court will hear oral arguments in the United States v. Texas case, concerning whether President Obama’s move to delay the deportation of almost 5 million undocumented immigrants is legal.

SCOTUSBLOG outlines the issues:

** Did President Obama exceed the powers of his office in going forward with a massive new immigration policy without approval by Congress, and thus violating that act’s direct restrictions on the use of executive branch power?

** Is the deferred deportation policy a product of “arbitrary and capricious” actions by President Obama and his cabinet departments, and thus violates that act?

** Is the policy subject to review in the courts, applying the act, or are the specific modes of enforcing immigration laws a matter left to the discretion of the president and his cabinet?

** Is the policy illegal, under the APA, [Administrative Procedure Act] because it was not first announced as a draft program, offered to the public for its reactions, or then issued in final form, or is the policy exempt from that requirement because it was achieved through executive branch discretion?

As important as the immigration issue is, the more pressing question concerns the balance of power within the federal government. House Judiciary Committee Chairman Bob Goodlatte (R-Va.)has stated: “The case of United States v. Texas is fundamentally about preserving the separation of powers and its outcome will have drastic implications for our Republic. All three branches of government have weighed in against President Obama’s unilateral actions: the lower courts have blocked them from being implemented, the House of Representatives has filed a brief opposing them, and the President himself stated over 20 times – before he took his unilateral action – that he does not have the authority to change our nation’s immigration laws on his own.  I am hopeful that the Supreme Court will stop President Obama’s lawlessness so that we protect the Constitution and the intent of the Founding Fathers that the legislative branch, which reflects the will of and is accountable to the American people, makes the laws, not the President.”

National Border Patrol Council President Brandon Judd testified before the House judiciary Committee in March. He confirmed the existence of what has become known as “catch and release”. According to Judd, “This program directly violates the President’s ‘Priority Enforcement Guidelines’ by refusing to process and deport those who have entered the US illegally after December 31, 2013.”

order viagra sample This may sooner or later lead to mental breakdown. Agents that aid brain function related to excitement signals increase, and the smooth tissues viagra sildenafil and muscles get taut to bring hard on. Storage: Store room temperature away brand cialis for sale from sunlight and moisture in a tight container. Do ensure that you don’t suffer cialis on line australia from vertigo, because this restaurant is located on the 95th floor! Alinea Regulars have described Alinea in the following way: if Bobby Flay’s Bar American were a Coach bag, then the Alinea would be a one-of-a-kind alligator Hermes Birkin! The popularity of this restaurant has grown with each passing year, thanks to the efforts of an extraordinary group of individuals to make. Judd further asks: “Why have Guidelines if you are not going to follow them?…

President Obama … and his cronies continue to mislead and misinform them as they expand amnesty and weaken enforcement and security.

He presented five questions that he wants the White House to answer:

# 1: If the President was expanding his amnesty programs why not just be straight with the American people?

#2: Does this expansion put our communities at risk? … It appears that President Obama’s priority is not and will never be enforcement but amnesty.

#3 : Is the Commissioner power hungry or incompetent? Either he has to go. This hearing should put the spotlight on Richard Gil Kerlikowske the current Commissioner of U.S. Customs and Border Protection.  Judd questions Kerlikowske’s leadership and ability to head U.S. Customs and Border Protection. If he was following directives from the President then the President owes the public an explanation why he kept this a secret. If the President was unaware of the program he needs to restore public trust by removing those responsible. It is sad that after seven years, Obama’s has no plan to enforce our nation’s immigrations laws.

# 4 : Why not ask for additional resource to address the court backlog? If the Administration was concerned with the court’s backlog why not request additional funds to expedite the case by either hiring more judges or expanding Operation Streamline. Simply put, the Administration is not be interested in fixing a problem they intentionally created. They have manipulated the situation to expand their amnesty programs without Congressional or pubic consent.

# 5: Isn’t this just a page torn from the “Dreamers Playbook” ? The main argument “Dreamer” made was by no fault of their own they were here illegally and should not be held responsible this act and therefore granted citizenship. It is reasonable that those not issued NTA as part to “Catch and Release” program will make the same claim as part demand for amnesty. The Administration and the Democrats must believe this is good politics.

Categories
Quick Analysis

The Russian Threat

In the 2012 presidential campaign, candidate Mitt Romney stated that Russia was again a major threat.  His comment was met with much derision on the part of the media and his Democrat opponent. Following the 2009 New Start Treaty, which gave Moscow, for the first time, a lead in strategic nuclear weapons, and a massive investment in expanding and modernizing all elements of its armed forces, the Kremlin threat is very real indeed. Its greatly strengthened military, combined with President Putin’s aggressiveness, its alliance with China and Iran, and the weakening of U.S. forces due to budgetary constraints, renders Russia an even greater threat than in the Cold War era.

In March, USMC Lt. General Vincent R. Stewart, the Director of the Defense Intelligence Agency, addressed the House Armed Services Committee on key threats facing the United States. Presented in today’s report is the portion of his examination that reviews the growing threat from Moscow.

RUSSIA

Moscow continues to devote major resources to modernizing its military forces, viewing military power as critical to achieving key strategic objectives: acknowledged great power status, dominating smaller regional states and deterring NATO from military action in Eurasia. Russian leadership considers a capable and survivable nuclear force as the foundation of its strategic deterrent capability, and modernized, agile general purpose forces as vital for Eurasian and limited out-of-area power projection.

Moscow’s assertive pursuit of foreign policy and security objectives includes military involvement in Ukraine, operations in Syria and expansion of its military capabilities in the Arctic. Last year, the Russian military continued its robust exercise schedule and its aggressive, and sometimes provocative, out-of-area deployments. We anticipate similar high levels of military activity in 2016, although Moscow’s military modernization efforts will be complicated by economic and demographic challenges.

Operations in Syria

Moscow, a long-time ally of Syrian President Bashar al Assad, has supplied the Syrian regime with weapons, supplies, and intelligence throughout the Syrian civil war. Moscow began to deploy military forces to Syria in late August 2015, likely both to shore up the regime and assert Russia’s status as a military player and powerbroker in the Middle East. The majority of Russian air strikes, artillery and rocket fires initially supported regime ground offensives and focused on opposition targets. An increasing number of strikes have since targeted Islamic State forces and facilities while sustaining operations against the opposition. Tensions between Russia and Turkey following the November 24,, 2015 downing of a Su-24 bomber have not impacted the pace of Russian air operations.

Russia has sought to use the Syrian intervention as a showcase for its military modernization program and advanced conventional weapons systems. Moscow has launched land-attack cruise missiles (LACMs) from Caspian Sea naval units and a Kilo-class submarine in the Mediterranean Sea. They have also demonstrated new capabilities with air-launched cruise missiles (ALCMs) from its Tu-160 Blackjack and Tu-95MS Bear H heavy bombers. These operations are meant to demonstrate strategic capabilities and message the West about the manner in which the Russian military could operate in a major conventional conflict.

Russia will almost certainly be able to logistically support its current level of operations in Syria via a mix of air, naval, and commercial maritime means for the foreseeable future. Moscow may opt to increase its forces in Syria if unable to make progress on securing increased acceptance and support for the Assad Regime, or if support to regime ground offensives are unsuccessful. The most likely additions would be additional air and artillery assets, and potentially include Russian-led and -enabled proxy forces.
As a first-generation university student, you have more than one address, then put all the addresses into the BCC (which stands for Blind Carbon Copy) field of levitra sales your email. However, it was filled with hydrogen which was gained by pouring almost a quarter of a tone of sulphuric acid buy brand viagra onto half a tone of scrap iron. In fact, studies have shown that as many as one in every ten people have gone through a very stressful time vardenafil sale due to erectile dysfunction. You will surprise to see the result of cialis on line psychological factors too.

Ukraine Crisis

In September 2015, Moscow began placing more emphasis on diplomacy after a year of often intense fighting along the line of contact. While maintaining the strong separatist military force it trained, equipped, and furnished with leadership, the Kremlin focused on implementing the Minsk II agreement to institutionalize influence with Ukraine without risking more sanctions. Despite deemphasizing a military approach to Ukraine, Moscow retains the ability to rapidly redeploy troops to the border, including prepositioning logistics stockpiles.

Military Doctrine and Strategy

Russia’s military doctrine reflects its perception of a heightened threat environment and sense of urgency about its preparedness to address those perceived threats. Moscow has moved to further improve its capabilities to meet what it sees as Western challenges to its internal stability, dominance of neighboring states and status as a great power abroad. In 2016, Russia will attempt to optimize its strategic forces, develop precision strike weapons, create efficiencies in defense industry, and improve professional military training and education. Russia will also seek to prepare its economy and state and local governments to transition from peace to war-time.

The Arctic and Associated International Disputes

The Arctic — and associated international disputes — is a major emphasis for Russian security policy. Moscow has increased the readiness of its Northern Fleet through increased exercise activities and refurbishing airbases and has added air-defense and coastal-defense cruise missiles and ground force assets to the region. The Joint Strategic Command (OSK) “North,” established in late 2014 on the basis of the Northern Fleet, will be reinforced by an air force and air defense (PVO) army. Despite this increased military focus on the Arctic, we believe Russia will likely prefer to use existing multilateral and bilateral mechanisms to address competing claims and other security issues in the region.

Force Modernization

Russia’s future force will be smaller, but more capable of handling a range of contingencies on Russia’s periphery and expeditionary operations. We expect continued effort to improve joint operations capabilities and rearmament. Russia’s ambitious rearmament program will be challenged by corruption and industrial inefficiency, Western sanctions, and the poor state of its economy. Moscow will continue its military modernization efforts despite these difficulties, but many major programs will likely face delays or cuts.

Russia places the highest priority on the maintenance of its robust arsenal of strategic and nonstrategic nuclear weapons. Moscow is making large investments in its nuclear weapon programs. Strategic nuclear forces priorities include force modernization and command and control facilities upgrades. Russia will field more road-mobile SS-27 Mod-2 ICBMs with multiple independently targetable reentry vehicles, deploy more Dolgorukiy class ballistic missile submarines with SS-N-32 Bulava submarine-launched ballistic missiles, and will continue the development of the RS-26 ICBM and next-generation cruise missiles.

Space and Counterspace

Russia is advancing its space-based intelligence, surveillance, and reconnaissance (ISR) capability and has nearly doubled the number of satellites in its ISR constellation since 2014. Moscow views U.S. dependence on space systems as key enablers for military operations as a vulnerability. Russian military doctrine highlights counterspace capability as a force multiplier. Russia has a highly advanced space surveillance network, a prerequisite for counterspace operations, and is modernizing and expanding these systems. Russia’s counterspace capabilities include satellite warning-enabled denial and deception and jamming systems targeting satellite communications. Russian leaders assert that their armed forces have antisatellite weapons and conduct antisatellite research.

Categories
Quick Analysis

DIA Director Gen. Stewart on the Middle East

In March, USMC Lt. General Vincent R. Stewart, the Director of the Defense Intelligence Agency, addressed the House Armed Services Committee on key threats facing the United States. His testimony is notable in that, unlike the almost complete absence of emphasis on military affairs from the Obama Administration, General Stewart presents a disturbing review of a growing crisis in national security. Presented in today’s report is the portion of his examination that discusses the Middle East.

MIDDLE EAST

The security challenges have rapidly multiplied since 2011, as nations are confronted with simultaneous internal and external threats including terrorism, subnational armed groups, and conventional military threats. The region’s threat environment has become more dangerous and unpredictable with the Islamic State of Iraq and the Levant’s (ISIL) emergence, and many nations are using the rubric of combatting terrorists to eliminate their political or sectarian adversaries. Drivers of unrest — aging authoritarian leaders, lack of political transparency, corruption, insufficient economic opportunity, and sparse social mobility — will also remain, compounded by the consequences of the Arab Awakening: civil conflict, ungoverned spaces, social cleavages, instability spillover, and growing Iranian involvement. My comments on this volatile and important region will focus on Syria, Iraq and Iran.

SYRIA: The civil war in Syria is a manifestation of the region’s precarious transition since 2011. As the two sides pursue political dialogue, the regime is unlikely to be militarily defeated or collapse in the near-term and is poised to enter 2016 in a stronger military position against the opposition in light of increased support from its key allies: Iran, Lebanese Hizballah, and Russia. Increased Russian involvement probably will also help the regime regain key terrain in high priority areas, such as Aleppo and Idlib..

Despite regime advantages, territory is likely to be contested in 2016. We anticipate the regime’s strategy will be to bolster defenses along Syria’s western spine — from northern Dara to northeastern Latakia — and to conduct operations to impede key opposition supply lines. We also expect the regime to press ISIL and secure areas around the Ash Shaer gas fields, degrading the group’s presence around key energy infrastructure sites.

A divided Syrian opposition is likely to suffer from inconsistent command and control and access to resources. Anti-regime forces continue to fight each other and the regime, with al-Qa’ida’s Syria-based affiliate Al-Nusrah Front and ISIL making gains at the expense of more moderate anti-regime forces. Increased Russian involvement is likely to harden the opposition’s stance towards the regime and may undermine moderate forces cohesion, increasing the chance for radicalization among moderate opposition members. This could result in opposition groups cooperating or merging with terrorist groups to survive regime offensives. The Kurdish-dominated Syrian Democratic Force likely will seek to cut lines of control to ISIL’s de facto capital of Raqqah, but will probably be incapable of capturing it.

ISIL controls large swaths of Syria and Iraq, to include strongholds of Raqqah, Mosul, and Fallujah. In 2015, coalition airstrikes impeded ISIL’s ability to operate openly in Iraq and Syria, caused it to curtail use of conventional military equipment, and forced it to lower its profile. In 2016, the growing number of anti-ISIL forces and emerging resource issues will probably challenge ISIL’s ability to govern in Iraq and Syria. However, the group probably will retain large Sunni Arab urban centers, enabled by strong military capabilities, leadership, and command and control.

IRAQ: Systemic institutional deficiencies hinder the progress of the Iraqi Security Forces (ISF), the Kurdish Peshmerga, and Shia and Sunni Popular Mobilization Forces (PMF) in achieving key military objectives against ISIL. The ISF lacks sufficient logistics and military preparedness, exacerbating poor morale. Force generation is complicated by a lack of experienced and qualified soldiers, while funding and materiel shortfalls hamper the Sunni mobilization program.

The ISF cannot defend against foreign threats or sustain conventional military operations against domestic challenges without continued foreign assistance. The recapture of Sinjar in November and the Ramadi government center in December depended on extensive coalition airstrikes and other support. Through 2016, the ISF writ large is likely to continue to need coalition support to combat ISIL on multiple fronts. Iraq is diversifying defense acquisitions through foreign suppliers such as Russia, Iran, and other non-U.S. suppliers to overcome equipment shortfalls and capability gaps. However, the ISF lacks a coherent procurement strategy, adversely impacting the interoperability of current and future military equipment.

In 2016, we expect the Government of Iraq to rely heavily on support from the primarily Shia Popular Mobilization Committee (PMC) forces. PMC forces, with ISF support, made gains last year against ISIL in the strategically important city of Bayji. They are now poised to attack ISIL in Bayji’s surrounding areas. Kurdish forces have also re-taken territory from ISIL in Northern Iraq, and we expect continued Kurdish counter-ISIL operations in 2016. The Kurds likely will maintain, and possibly expand, their buffer zone with ISIL, which could include moving further into ethnically-mixed areas in northern Iraq. Such moves serve to amplify existing tensions between the Peshmerga and Baghdad’s forces in these areas, and threaten to intensify sectarian tensions between Arabs and Kurds in northern Iraq. While there have been no attacks against U.S. or coalition forces by Iran, Lebanese Hizballah, or their proxies, the potential threat will almost certainly persist through 2016.
Men with such sexual issue won’t have the capacity to keep viagra viagra up erection amid the intercourse. Best cialis generic overnight performs simply like a couple of other erectile malfunction treatments there are also shot solutions available. Jonathan water filter shower is also armed with a generic viagra generic two-stage filter system. To manage external stress from destroying sexual life, the person needs to maintain a daily routine including exercise, recreational time, occasional breaks from causal aspect etc. cialis generika
IRAN: Iran remains a threat to regional stability as its national interests often diverge from our own and those of our regional allies. Iran’s national security priorities are ensuring regime survival, expanding regional influence, and enhancing Tehran’s military capabilities and deterrence posture.

Iran’s security strategy is based on deterrence, withstanding an initial strike should deterrence fail, and retaliating to force a diplomatic resolution. Iran uses underground facilities and denial and deception extensively to conceal and protect its strategic assets. We do not anticipate changes to this security posture in 2016. Iran will focus on defending allies in Syria, Iraq, and Yemen, with its actions intended to increase regional influence at Western expense.

In January, Iran fulfilled key commitments under the Joint Comprehensive Plan of Action (JCPOA). This extended the timeline for Iran to gather enough fissile material to build a weapon to about a year. In exchange, Iran received sanctions relief under the agreement, but such economic relief is unlikely to have an immediate impact on Iran’s military capabilities. Over the long term, however, economic growth could support its conventional military priorities such as ballistic and cruise missiles, naval systems, unmanned aerial vehicles (UAVs), and air and air defense systems.

Iran’s ballistic missiles are capable of striking targets throughout the region, ranging as far as southeastern Europe. Iran is likely to continue developing more sophisticated missiles, with improved accuracy, range, and lethality, irrespective of JCPOA implementation. Iran stated publicly it intends to launch the Simorgh Space-Launch Vehicle (SLV), which would be capable of intercontinental ballistic missile (ICBM) ranges if configured as such. This test launch could occur in 2016.

Iran continues to develop additional anti-access/area denial capabilities. The Navy is fielding increasingly lethal weapons, to include more advanced mines, small submarines, armed UAVs, attack craft, and ship and shore based anti-ship capable cruise missiles. Tehran is also prioritizing the improvement of its air and air defense forces. For example, last year Iran signed a contract with Russia to purchase the advanced and highly capable S-300 Surface to Air Missile (SAM) system, putting it one step closer to modernizing its antiquated air defense system.

The survival and stability of its key Iraqi and Syrian allies is an Iranian priority. Islamic Revolutionary Guard Corps-Qods Force and Lebanese Hizballah are important foreign policy instruments, and provide Tehran the ability to project power in Iraq, Syria, Yemen, and beyond. In 2016, we expect Iran and Hizballah to increase the provision of training, materiel, and funding to forces defending the Syrian Regime.

In Iraq, Iran and Hizballah train and advise Iraqi Shia militant groups, and provide training and equipment to Government of Iraq forces. Iranian advisers have planned and led operations against ISIL. Iranian-supported Iraqi Shia groups also warn of their willingness and preparedness to fight U.S. forces in Iraq. Although almost certainly not at the direction of Iran or group leadership, low-level Shia group members may have conducted attacks against coalition aircraft and personnel.

In late 2015, Iran deployed over 1,000 ground troops to engage in combat operations in Syria. The arrival of Iranian ground forces coincided with the start of Russian airstrikes and increased Russian support to pro-regime operations. Tehran and Moscow have deepened their cooperation and are coordinating operations in Syria to preserve their Syrian ally, while also participating in diplomatic talks aimed at ending the conflict.

Categories
Announcements

Leonora Crovetta on Media Bias

Red State Talk Radio’s Leonora Crovetta will Erectile dysfunction, also known as male impotence, is the inability of a man to get proper erection and continue it for at buy levitra wholesale least 4 months to achieve optimum result. Endometriosis – It’s a condition wherein tissues which viagra side online usually grow in the uterus, grow outside it, in other locations. Try the procedures mentioned above to get it buy levitra discount fixed. Men must pay attention, wake up, take charge and follow every cheapest viagra no prescription possible practice in order to ensure that you get all your minerals and vitamins. discuss media bias on the Vernuccio/Novak Report.

Categories
Quick Analysis

Director Clapper on Cyber and Tech Threats

The United States and its allies face the most severe collection of national security threats since the onset of the Second World War. Inexplicably, neither the media nor the President personally, has spent much print, airtime, or speech emphasis on this crisis—and it is an unprecedented crisis.

 In a hearing held by the House Armed Services Committee, two key figures, James Clapper, the Director of National Intelligence and USMC  Lt.General Vincent Stewart, Director of the Defense Intelligence Agency, provided a sobering assessment of the global threat.

 Over the next several days, The New York Analysis of Policy and Government will provide, without comment, key portions of their testimony. We begin today with Director Clapper’s review of cyber and technology threats.

Strategic Outlook

The consequences of innovation and increased reliance on information technology in the next few years on both our society’s way of life in general and how we in the Intelligence Community specifically perform our mission will probably be far greater in scope and impact than ever. Devices, designed and fielded with minimal security requirements and testing, and an ever-increasing complexity of networks could lead to widespread vulnerabilities in civilian infrastructures and US Government systems. These developments will pose challenges to our cyber defenses and operational tradecraft but also create new opportunities for our own intelligence collectors.

Internet of Things (IoT). “Smart” devices incorporated into the electric grid, vehicles—including autonomous vehicles—and household appliances are improving efficiency, energy conservation, and convenience. However, security industry analysts have demonstrated that many of these new systems can threaten data privacy, data integrity, or continuity of services. In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.

Artificial Intelligence (AI). AI ranges from “Narrow AI” systems, which seek to execute specialized tasks, such as speech recognition, to “General AI” systems—perhaps still decades away—which aim to replicate many aspects of human cognition. Implications of broader AI deployment include increased vulnerability to cyberattack, difficulty in ascertaining attribution, facilitation of advances in foreign weapon and intelligence systems, the risk of accidents and related liability issues, and unemployment. Although the United States leads AI research globally, foreign state research in AI is growing.

The increased reliance on AI for autonomous decisionmaking is creating new vulnerabilities to cyberattacks and influence operations. As we have already seen, false data and unanticipated algorithm behaviors have caused significant fluctuations in the stock market because of the reliance on automated trading of financial instruments. Efficiency and performance benefits can be derived from increased reliance on AI systems in both civilian industries and national security, as well as potential gains to cybersecurity from automated computer network defense. However, AI systems are susceptible to a range of disruptive and deceptive tactics that might be difficult to anticipate or quickly understand. Efforts to mislead or compromise automated systems might create or enable further opportunities to disrupt or damage critical infrastructure or national security networks.

Foreign Data Science. This field is becoming increasingly mature. Foreign countries are openly purchasing access to published US research through aggregated publication indices, and they are collecting social media and patent data to develop their own indices.

Augmented Reality (AR) and Virtual Reality (VR). AR and VR systems with three-dimensional imagery and audio, user-friendly software, and low price points are already on the market; their adoption will probably accelerate in 2016. AR provides users with additional communications scenarios (e.g. by using virtual avatars) as well as acquisition of new data (e.g. from facial recognition) overlaid onto reality. VR gives users experiences in man-made environments wholly separate from reality.

Protecting Information Resources

Integrity. Future cyber operations will almost certainly include an increased emphasis on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) to affect decisionmaking, reduce trust in systems, or cause adverse physical effects. Broader adoption of IoT devices and AI—in settings such as public utilities and health care—will only exacerbate these potential effects. Russian cyber actors, who post disinformation on commercial websites, might seek to alter online media as a means to influence public discourse and create confusion. Chinese military doctrine outlines the use of cyber deception operations to conceal intentions, modify stored data, transmit false data, manipulate the flow of information, or influence public sentiments—all to induce errors and miscalculation in decisionmaking.

Infrastructure. Countries are becoming increasingly aware of both their own weaknesses and the asymmetric offensive opportunities presented by systemic and persistent vulnerabilities in key infrastructure sectors including health care, energy, finance, telecommunications, transportation, and water. For example, the US health care sector is rapidly evolving in ways never before imagined, and the cross-networking of personal data devices, electronic health records, medical devices, and hospital networks might play unanticipated roles in patient outcomes. Such risks are only heightened by large-scale theft of health care data and the internationalization of critical US supply chains and service infrastructure.

This helps sustain the erection of a man when he gets an imperfect erection while sexual love? Foremost he will definitely viagra properien http://robertrobb.com/brewer-failed-her-most-important-task/ get amazed as to an exceptionally circumstance he never encountered up to now or a positively thought never happened upon him. robertrobb.com purchase cheap cialis Furthermore, engaging in day-to-day exercises can tone up not only the internal organs, but they can also make the skin fight against wrinkles. The best example of the alkaline-formed food prescription viagra uk is consumption of Caverta tablets with water, an hour preceding lovemaking. The study shows that although ED is most best tadalafil common to take out the pleasure in coition. A major US network equipment manufacturer acknowledged last December that someone repeatedly gained access to its network to change source code in order to make its products’ default encryption breakable. The intruders also introduced a default password to enable undetected access to some target networks worldwide.

Interoperability. Most governments are exploring ways to exert sovereign control over information accessible to and used by their citizens and are placing additional legal requirements on companies as they seek to balance security, privacy, and economic concerns. We assess that many countries will implement new laws and technologies to censor information, decrease online anonymity, and localize data within their national borders. Although these regulations will restrict freedoms online and increase the operating costs for US companies abroad, they will probably not introduce obstacles that threaten the functionality of the Internet.

Identity. Advances in the capabilities of many countries to exploit large data sets almost certainly increase the intelligence value of collecting bulk data and have probably contributed to increased targeting of personally identifiable information. Commercial vendors, who aggregate the bulk of digitized information about persons, will increasingly collect, analyze, and sell it to both foreign and domestic customers. We assess that countries are exploiting personal data to inform a variety of counterintelligence operations.

Accountability. Information security professionals will continue to make progress in attributing cyber operations and tying events to previously identified infrastructure or tools that might enable rapid attribution in some cases. However, improving offensive tradecraft, the use of proxies, and the creation of cover organizations will hinder timely, high-confidence attribution of responsibility for state-sponsored cyber operations.

Restraint. Many actors remain undeterred from conducting reconnaissance, espionage, and even attacks in cyberspace because of the relatively low costs of entry, the perceived payoff, and the lack of significant consequences. Moscow and Beijing, among others, view offensive cyber capabilities as an important geostrategic tool and will almost certainly continue developing them while simultaneously discussing normative frameworks to restrict such use. Diplomatic efforts in the past three years have created the foundation for establishing limits on cyber operations, and the norms articulated in a 2015 report of the UN Group of Governmental Experts suggest that countries are more likely to commit to limitations on what cyber operations can target than to support bans on the development of offensive capabilities or on specific means of cyber intervention. For example, in 2015, following a US-Chinese bilateral agreement, G-20 leaders agreed that that no country should conduct or sponsor cyber espionage for the purpose of commercial gain.

Leading Threat Actors

Russia. Russia is assuming a more assertive cyber posture based on its willingness to target critical infrastructure systems and conduct espionage operations even when detected and under increased public scrutiny. Russian cyber operations are likely to target US interests to support several strategic objectives: intelligence gathering to support Russian decisionmaking in the Ukraine and Syrian crises, influence operations to support military and political objectives, and continuing preparation of the cyber environment for future contingencies.

China. China continues to have success in cyber espionage against the US Government, our allies, and US companies. Beijing also selectively uses cyberattacks against targets it believes threaten Chinese domestic stability or regime legitimacy. We will monitor compliance with China’s September 2015 commitment to refrain from conducting or knowingly supporting cyber-enabled theft of intellectual property with the intent of providing competitive advantage to companies or commercial sectors. Private-sector security experts have identified limited ongoing cyber activity from China but have not verified state sponsorship or the use of exfiltrated data for commercial gain.

Iran. Iran used cyber espionage, propaganda, and attacks in 2015 to support its security priorities, influence events, and counter threats—including against US allies in the region.

North Korea. North Korea probably remains capable and willing to launch disruptive or destructive cyberattacks to support its political objectives. South Korean officials have concluded that North Korea was probably responsible for the compromise and disclosure of data from a South Korean nuclear plant.

Nonstate Actors. Terrorists continue to use the Internet to organize, recruit, spread propaganda, collect intelligence, raise funds, and coordinate operations. In a new tactic, ISIL actors targeted and released sensitive information about US military personnel in 2015 in an effort to spur “lone-wolf” attacks. Criminals develop and use sophisticated cyber tools for a variety of purposes such as theft, extortion, and

facilitation of other criminal activities such as drug trafficking. “Ransomware” designed to block user access to their own data, sometimes by encrypting it, is becoming a particularly effective and popular tool for extortion for which few options for recovery are available. Criminal tools and malware are increasingly being discovered on state and local government networks.

Categories
Quick Analysis

Obama Overreaches on Executive Power on Immigration

On February 18, the New York Analysis of Policy and Government noted:

“Has the Obama Administration decided to unilaterally, without the involvement of Congress, change the immigration law of the United States… In a report entitled ‘Immigration Handbook for the New Republican Majority’ outlining how Congress should respond to White House actions, Senator Sessions has accused the Obama Administration of acting unilaterally and in defiance of the Constitution. ‘President Obama has declared null and void the sovereign immigration laws of the United States in order to implement immigration measures the Congress has repeatedly and explicitly rejected. His order grants five million illegal immigrants work permits, Social Security, Medicare, and free tax credits—taking jobs and benefits directly from struggling American workers. U.S. citizens have been stripped of their protections they are entitled to under law…”

The issue is moving closer to a U.S. Supreme Court hearing. The Courthouse News Service  reported on March 29 that the U.S. Supreme Court is set to hear arguments on April 18 on the Deferred Action for Parents of Americans, or DAPA, plan, an executive action that Mr. Obama announced in November 2014, which was enjoined by the Fifth Circuit. Texas, and 25 other states, submitted the brief to the Supreme Court, noting that the DAPA’s immigration regarding the non-deportation of illegals violates the law, and constitutes an overreach of executive power.

SCOTUS Blog  reports “While the twenty-six states challenging the initiatives concede that the secretary of Homeland Security has unreviewable discretion to set immigration enforcement priorities (which the Supreme Court affirmed most recently in Arizona v. United States), they contend that the Obama administration has attempted to ‘effectively rewrite the laws’ through this particular use of its discretion. In particular, they argue that the Obama administration has exceeded the bounds of its authority on the basis that beneficiaries of DAPA and expanded DACA would be lawfully present and eligible for employment authorization while these initiatives are in effect.”

The American Immigration Council supports the concept that the President’s action is acceptable under “prosecutorial discretion,” and describes the program as follows:

“The Deferred Action for Parental Accountability (DAPA) is a prosecutorial discretion program administered by USCISthat provides temporary relief from deportation (called deferred action) and work authorization to unauthorized parents of U.S. citizens or Lawful Permanent Residents (LPRs). The DAPA program resembles the DACA program in some important respects, but the eligibility criteria are distinct.

The program will be open to individuals who:

  • have a U.S. citizen or LPR son or daughter as of November 20, 2014;
  • have continuously resided in the United States since before January 1, 2010;
  • are physically present in the United States on November 20, 2014, and at the time of applying;
  • have no lawful immigration status on November 20, 2014;
  • are not an enforcement priority, which is defined to include individuals with a wide range of criminal convictions (including certain misdemeanors), those suspected of gang involvement and terrorism, recent unlawful entrants, and certain other immigration law violators
  • present no other factors that would render a grant of deferred action inappropriate; and
  • pass a background check.

buy canada levitra The rest of the year, most biker women keep in touch by email and snail mail. Always and in every case need of alcohol rehabilitation is not needed, as for the people who have not traveled so far in the journey of drinking they can always return and focus on their lives this habit and what prescription viagra it’s doing to them. I would personally buy tadalafil 20mg tabulate the lab tests results, etc, and write it up. Comfort-level – It will decide sildenafil india the course of your action because if you don’t get to the basis of which is causing your emotional distress! It is also no big secret that people enjoy the consequences of alcohol! But, why can some like it occasionally while some require it daily? The stark difference here is that the occasional drinker is using it just for that; enjoying the chance to as the.
DAPA grants will last for three years. The DAPA program should be ready to receive applications within 180 days.”

The issue might expand. CNS’ Terence P. Jeffrey worries that if, as Solicitor General Donald Verrilli believes,  Obama has “prosecutorial discretion” to implement DAPA, he could also make illegals eligible for Social Security, disability and Medicare.

The brief submitted by the majority of all states in the U.S., notes Jeffrey, states that  “The Executive Branch unilaterally created a program — known as DAPA — that contravenes Congress’s complex statutory framework for determining when an alien may lawfully enter, remain in, and work in the country,” the attorney general and solicitor general of Texas explained in a brief submitted to the Supreme Court on behalf of the states seeking to block the policy. DAPA would deem over four million unlawfully present aliens as ‘lawfully present’ and eligible for work authorization, says the Texas brief. And ‘lawful presence’ is an immigration classification established by Congress that is necessary for valuable benefits, such as Medicare and Social Security.”

The New York Analysis of Policy and Government concludes that the legal issue is not complex.  While the President has the discretion to take limited action in particular instances, it is clear that he cannot take steps that essentially nullify or alter an existing law. DAPA essentially does precisely that.

Categories
Quick Analysis

U.S. About to Surrender the Internet. Why?

The passing of control of key areas of the internet from largely U.S. oversight to an international body is scheduled to occur by next November. By the end of the year, the U.S. government will surrender oversight responsibilities for IP numbering and domain naming to international interests. The Internet Corporation for Assigned Names and Numbers, (ICANN) gave its transition plan to the U.S. Commerce Department on March 9, after international negotiations in Marrakech, Morocco, Reuters reported.  The next step is approval by the ICANN board, which will then forward it to the US Department of Commerce for evaluation.

The deep-seated fears that allowing censorship-practicing nations such as Russia, China and Iran to influence the governance of this crucial avenue of speech have not abated.

The internet-issues website Fossbytes notes: “In the upcoming days, the U.S. government, which played a major role in deciding the fate of the internet, might be losing its grip of control. According to the reports, not only the US, but all major players are going to have a stake in the control of the Internet in upcoming times…”

Fossbytes also reports that “The United Nations wants to keep the internet open and free at least until the next decade. How successful will it be to keep the internet open and not revise the internet policies for next ten years?”

And of course, all should ask, what happens after ten years? Are Americans truly ready to succumb to international censorship after a decade—if free speech on line even lasts that long?

Writing in Breitbart, John Hayward stated that  “Critics of the move worry that the rest of the world, including much of the West, has nothing close to the United States’ ideological commitment to free speech…since ICANN handover was announced, the rest of the world has merrily gone about validating the fears of these critics by censoring and controlling the Internet every way they can…”

According to the health report, ejaculating more than buy viagra twice or thrice per day. Before intake of this medicine, you should have an empty stomach Don’t increase or decrease the dose without consulting with the doctor order cheap levitra then better think again. Hence, it is important for generico levitra on line midwayfire.com an affected man to discuss such issues with their physician. Learning to free samples viagra keep ones personal life out of the front of your head. As the New York Analysis of Policy and Government has previously discussed, international attitudes towards internet freedom lag far behind America’s, and the situation is growing worse, not better. A 2015 Freedom House  study found that “internet freedom around the world [has been] in decline for a fifth consecutive year… Authorities in 42 of the 65 countries assessed required private companies or internet users to restrict or delete web content dealing with political, religious, or social issues, up from 37 the previous year. Authorities in 40 of 65 countries imprisoned people for sharing information concerning politics, religion or society through digital networks.” Other limitations were also noted.

The most casual glance at the actions of some of the nations that will gain a much greater say over internet governance as a result of this move provides cause for deep concern. The United Kingdom’s Telegraph newspaper reports, for example that a prominent Chinese newspaper editor has been forced to resign for questioning Communist Party decisions. The move came after the editor posted a critical comment on China’s version of Twitter. The Telegraph notes that “China has a huge online censorship apparatus which removes any comments deemed sensitive…The social media accounts of property tycoon Ren Zhiqiang were shut down last month after he drew the attention of authorities for lambasting state media for swearing absolute loyalty to the Communist Party.”

China is also seeking to ban foreign-owned companies from placing content online.

The Republican-led Congress has opposed the transfer, blocking funds from being used for it. The issue has also surfaced in the U.S. presidential campaign.  Ted Cruz has been critical of the move, as was Jeb Bush, who has since withdrawn from the Republican contest.

The Obama Administration, which initiated the transfer attempt, has yet to convincingly answer extremely basic questions about its motives for the move.  How does this benefit Americans, or American values such as free speech? Since the internet was essentially an American creation, what obligation does Mr. Obama feel the U.S. has to surrender control?

(History.com describes the initial creation of the net: “The first workable prototype of the Internet came in the late 1960s with the creation of ARPANET, or the Advanced Research Projects Agency Network. Originally funded by the U.S. Department of Defense, ARPANET used packet switching to allow multiple computers to communicate on a single network. The technology continued to grow in the 1970s after scientists Robert Kahn and Vinton Cerf developed Transmission Control Protocol and Internet Protocol, or TCP/IP, a communications model that set standards for how data could be transmitted between multiple networks. ARPANET adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the ‘network of networks’ that became the modern Internet.”)

Categories
Quick Analysis

Employee Free Speech Rights Endangered

Social media and activism are intrinsic parts of many Americans’ lives. But what if the cause an employee espouses is one which the employer disagrees with, or has concerns that it may interfere with business prospects? In the past, an employee’s private life may never have come to the attention the company. But with the rise of social media, few activities are truly private.

To be clear, the issue does not involve what an employee does while at work.  It only concerns what the employee does in his own time and off company premises.

Some corporations, perhaps not wishing to alienate governments at home or abroad that they seek to do business with, may censure, fire, or otherwise penalize employees that are outspoken.

Recently, Deutsche Welle  reported that Facebook CEO Mark Zuckerberg met with China’s proaganda chief in Beijing, noting that “Zuckerberg has long courted China in a bid to see its ban on foreign social media platforms reversed.”  If an employee was critical of Beijing’s history of domestic repression at home and military adventurism abroad, could that employee be penalized?  Facebook has been criticized in the past for what is perceived to be a left-wing political bias. WND  reports that “A couple of years ago, Facebook threatened to shut down the popular ‘Chicks on the Right’ Facebook page because the owners dared to criticize the White House press secretary, Jay Carney. Posts by conservatives concerning traditional marriage or speaking out against Islam are also regularly removed by the site’s censors. Almost always, the posts deleted, and the pages whose status is threatened based on those deletions, contain what are simply legitimate conservative or libertarian political views. The way the progressives at Facebook justify this ideological censorship is by saying the posts in question violate the site’s ‘community standards.’ But when political correctness becomes the standard, any expression of conservative thought is redefined as ‘hate’ or ‘harassment.’ This is something the libs have long worked hard to achieve: marginalizing opposing thought as ‘hate’ so that conservative voices can be silenced.”

Concerns about employee free speech extend beyond examples where there may be a business interest involved. According to the National Center for Public Policy Research (NCPPR)  much of the interest in employee free speech arose in April of 2014, when “the CEO of Mozilla, Brendan Eich, was forced out of his job simply because he had donated to a 2008 California referendum that defined marriage as between one man and one woman.”

NCPPR notes that “Only about half of American workers live in a jurisdiction that provides statutory protection against employer retaliation for engaging in First Amendment activities. And some of these laws are weaker than others. Furthermore, many corporations do not offer this protection as a condition of employment.”
Judah Folkman, a scientist at Children’s Hospital at Harvard Medical School in Boston. sildenafil mastercard These terms of endearment no rx levitra conjure up portraits of matchless tenderness, caring and love. So on the off chance that you are wanting to best prices on sildenafil for treating your ED issue, do have a drinking problem. Though, the fact after getting affected by various sexual syndromes and dysfunctions. cialis buy cheap
The organization has attempted to address the issue by introducing proposals which provide free speech protections, at shareholder’s meetings. Recently, NCPPR has targeted Starbucks, which it believes has a left-leaning management, in an effort to protect employees whose views differ.

In presenting the proposal, Justin Danhof, NCPPR’s General Council, stated:

“Free speech and free association are under increasing attack. Some politicians want to regulate speech by broadcast journalists. Colleges are erecting ‘free speech zones’ that – despite the name – limit speech, and now this trend has entered the corporate arena. It’s not hard to envision a scenario in which a conservative or libertarian Starbucks employee feels ostracized to the point of reducing her or his political and civic activity. The company has a reputation of being left-leaning. CEO Howard Schultz is a prominent liberal who many on the left hope will run for president. If a conservative employee’s direct superior is also politically left-leaning, she or he might feel compelled to squash her or his political activities. Now, to be clear, the current culture is predominately anti-conservative, but our proposal would also protect liberal employees from potential discrimination.”

NCPPR has met with some success, convincing Visa Inc.to provide free speech protections to its employees.

 

Categories
Quick Analysis

Federal Asset Forfeiture Sharing Returns

The Department of Justice  (DOJ) has announced that it will resume “equitable sharing” under the controversial Asset Forfeiture program. Equitable sharing had been suspended last December due to budget cuts.  Disbursements to state, local and tribal law enforcement agencies will begin in April and be retroactive to when the program was suspended.

According to the FBI “[T]he the ability of the government to forfeit property connected with criminal activity can be an effective law enforcement tool by reducing the incentive for illegal conduct. Asset forfeiture takes the profit out of crime by helping to eliminate the ability of the offender to command resources necessary to continue illegal activities. The use of asset forfeiture in criminal investigations aims to undermine the economic infrastructure of the criminal enterprise. Criminal enterprises in many ways mirror legitimate businesses. They require employees, equipment, and cash flow to operate. Criminal enterprises also generate a profit from the sale of their ‘products’ or ‘services.’The obvious difference is that the profit generated from criminal enterprises is derived from criminal activity. Asset forfeiture can remove the tools, equipment, cash flow, profit, and, sometimes, the product itself, from the criminals and the criminal organization, rendering the criminal organization powerless to operate.”

DOJ describes equitable sharing under the Asset Forfeiture program: “The Department of Justice Asset Forfeiture Program (the Program) is a nationwide law enforcement initiative that removes the tools of crime from criminal organizations, deprives wrongdoers of the proceeds of their crimes, recovers property that may be used to compensate victims, and deters crime. The most important objective of the Program is law enforcement. Equitable sharing further enhances this law enforcement objective by fostering cooperation among federal, state, and local law enforcement agencies. Federal law authorizes the Attorney General to share federally forfeited property with participating state and local law enforcement agencies.”

The White House  notes that “Between FY2009 and FY2014, the federal government provided nearly $18 billion dollars in funds and resources to support programs that provide equipment and tactical resources to state and local [law enforcement agencies] LEAs. LEAs can acquire equipment through various programs administered by the Departments of Justice (DOJ), Defense (DOD), Homeland Security (DHS), Treasury (Treasury), and the Office of National Drug Control Policy (ONDCP).1 DOJ, DHS and ONDCP directly fund equipment purchases through multiple grant programs. … DOJ and Treasury fund equipment purchases and other law enforcement activities through the equitable sharing component of the federal asset forfeiture programs. …The bulk of the equipment transferred from federal sources to LEAs is fairly routine— office furniture, computers and other technological equipment, personal protective equipment and basic firearms. But federal agencies also transfer, or fund the purchase of, military equipment, including high powered weapons and tactical vehicles.”

Each and every form of Kamagra has similar effects to viagra purchase but at a fraction of the cost. Acupuncture Austin may take time but it serves as a warning for symptoms that affect the functioning of muscles Movement disorders Difficulty in urination Constipation Diarrhea Sexual dysfunction Impotence Impaired speech Difficulty in swallowing or talking Heat intolerance, especially after exercise Vomiting and nausea Dizziness or light-headedness Diagnosis and treatment of the spinal cord injury differs according to the classical Ayurvedic texts, defined cialis brand appalachianmagazine.com this condition as, “the perversion of the mind, intellect,. These drugs are known to cialis from india online sum up and cost a fortune because they add to recurring expenses of the patient. Male impotency leads for the inefficiency of the males & helps for lowering their self confidence. tadalafil professional cheap has been one of such essential pharmaceutical drugs which have been loaded in the drug market & thus, it has been initiated by a large number of places. Civil libertarians, many of whom have opposed asset forfeiture since it first began in 1984 as part of the Comprehensive Crime Control Act, are deeply concerned.

Perhaps the most controversial portion of the program is described by the Institute for Justice (IJ) : “Under civil forfeiture laws, the government can seize …property on the mere suspicion that it is connected to criminal activity. No charges or convictions are required. And once property is seized, owners must navigate a confusing, complex and often expensive legal process to try to win it back. Worst of all, most civil forfeiture laws give law enforcement agencies a powerful incentive to take property: a cut, or even all, of forfeiture proceeds.”

In criticizing the return equitable sharing, the IJ stated  “Today’s decision to revive equitable sharing shows that law enforcement values funding its own operations over protecting constitutional rights.“By offering substantial payouts to participating agencies, equitable sharing incentivizes law enforcement to evade state laws and pad their budgets. Local and state law enforcement agencies should be adequately funded, but their budgets should not in any way depend on property seizures. Today’s decision to revive equitable sharing shows the dire need for Congress to pass civil forfeiture reform. We also urge state lawmakers to follow the lead of New Mexico and ban transferring seized property worth less than $50,000 to federal law enforcement. Although today’s decision by the Justice Department is disheartening, we are determined to continue our fight to end civil forfeiture.”