It is a little known fact that Mark Zaid, the Ukraine call whistleblower’s maverick attorney, has a number of superpowers. These talents go far beyond his uncanny ability to squeeze money and fame from the dead, instantly teleport to the CNN studio, and provide a never ending pseudo-legal narrative that supports President Trump’s impeachment and the justification for general Flynn’s persecution. Zaid himself, as well as his sizable fan base have compared him to hybrid of Clark Kent and James Bond.
Image 1: Mark Steven Zaid and his alter egos of Clark Kent and James Bond
Image 2: Squeezing money and fame from the dead: Mark Zaid, the attorney of Mohamed Al-Fayed, promoting the conspiracy theory that Princess Diane was murdered because she was pregnant
But Zaid has an additional superpower that hasn’t been made public until now. It turns out that he is psychic as well. In March 13, 2017 using what can only be explained as a divination, Zaid’s partner, John N. Tye, reinstated a 4 year defunct company called Values United DBA Whistleblower Aid.
Image 3: Mark Zaid, the founding legal partner and John Tye, the CEO of Whistleblower Aid
The Whistleblower Aid organization, which claims to be non-profit advertises these services:
Whistleblower Aid seeks to lower the barriers for courageous patriots to step forward. As a human and civil rights organization headquartered in the District of Columbia, in some cases we hope to provide clients with additional support including:
Media & public relations coaching
Dedicated, Secure Devices for clients’ use in communicating with us about their case
Employment claims under the Whistleblower Protection Act
Temporary rent or mortgage support and networking to help find new jobs, in case of loss of employment
Psycho-social counseling and treatment
The 5 star treatment they offer their clients (i.e. PR coaching, psycho-social consulting and treatment, temporary rent and mortgage support, and job placement), looks more like a luxury spa/resort service than legal aid. Even more noteworthy is their mysterious business/revenue model. For example, it’s a puzzle how a little altruistic boutique firm can provides all of these expensive services pro-bono and uses sources like GoFoundMe to finance their legal fees. How is it that they are not violating the gift prohibition to federal employee or The American Bar Association’s rules for avoiding conflicts of interest which states the following:
“lawyers may not subsidize lawsuits or administrative proceedings brought on behalf of their clients, including making or guaranteeing loans to their clients for living expenses, because to do so would encourage clients to pursue lawsuits that might not otherwise be brought and because such assistance gives lawyers too great a financial stake in the litigation.”
Image 4: Whistleblower Aid 2017 taxes
Since early 2017, Whistleblower Aid has already represented a number of individuals, several with a history of leaks and affinity to the Obama administration. This taken together with Evelyn Farkas’s call in late 2016 to federal agency employees to “get as much intelligence as you can” and then publish/leak it as fast as possible, and John Brennan’s recent call for all available whistleblowers to carpe diem and step forward, suggests that we are witnessing some sort of a mystical political crystal alignment with all of the dark litigative energy emanating from Mr. Zaid and Co.
Video 1: Evelyn Farkas confirming her call to collect intelligence on the Trump team and publish/leak it
Image 5: John Brennan calling all whistleblower
It’s possible that all of these events and people are unrelated and that they just somehow converged. But, Occam’s Razor suggests that it’s more likely that the formation of this organization was a coordinated effort to stand-up a factory style assembly-line in order to deliver a steady supply of political hits. The timeframe for their re-activation (52 days after President Trump’s inauguration) and Zaid’s January 2017 fortune teller style proclamation that the “#coup” against president Trump has started also supports the argument that Whistleblower Aid is in fact part of the “#rebellion” and that the only real service they provide is fuel for the “#impeachment” furnace.
Image 6: Mark Zaid’s proclamation that the coup against president Trump has begun
Image 7: Examples of various linkages between Mark Zaid, his anti-Trump targeted media appearances, ‘the resistance’, his on-line profile, and social network (POI-ED is a person of interest that is related to him).
Zoltar (another well known fortune teller) once said, “Lucky at cards, unlucky in love”. From analyzing Zaid’s social and professional profile (Image 7), it certainly looks like Zoltar was right on the money. But what still remains a puzzle is how does John N. Tye’s (the CEO) salary of >$200K per year balances against Whistleblower Aid’s income of about $22K? And in this vein, who has been covering their losses since their inception (over $619K USD in 2017 alone), …and why?
Some Final Words from Zoltar Dear Mr. Zaid, Tye, and Bakaj, Whistleblower Aid’s practice of using obscurity for security like aliases to create on-line accounts, private burner phones, and email communications to store and transmit classified government secrets only works in the movies. In the real-word, every piece of classified information your clients transmit to you via your super-duper ‘dedicated secure devices’, can be easily intercepted by every hostile foreign state actor that is monitoring your traffic.
In fact, Zoltar would be positively shocked if your little aid society isn’t one of the biggest targets of foreign intelligence gathering. But, considering Mr. Zaid’s awesome psychic powers and his proclaimed cyber security expertise, I expect you to already know that.
Image 8: Mark Zaid delivering keynote on cyber security
Image 9: An example of using the Sentinel AI to discover a hidden linkage between Mark Zaid and POI-ED (a person of interest related to him). Both have independent images of shared objects such as photos, paintings, a cat, articles of clothing, and household items that the ML classifier was able to identify independently, match, and link
A number of internet researchers and reporters have asked me to evaluate some of the imagery and files that are being distributed by one George M. Nasif through his Twitter, Facebook, and website. Nasif claims to possess vast amounts of proprietary DOJ, diplomatic, intelligence community, and law enforcement records, in addition to donor credit card payments and a variety of classified emails. Nasif, who promotes himself as a network security specialist has significant presence and engagement on SM. His Twitter network alone has over 17K followers and its growing.
Image 1: George Nasif’s Twitter Profile
George Nasif, AKA George Michael Nasif, makes a lot of bold claims about the esoteric sources of his data and his deep knowledge and insight into current events. These claims seem to resonate well with his followers and influence network. A typical posting that promotes his content includes statements like:
“My Server files on the gangsters of the Obama admin. over 2 million documents. 3 Terabytes of information. Has now more than doubled to over 6 TB of files”
Image 2: George Nasif’s cave of data wanders
Running the sentinel AI on Nasif’s depositories (some of which are housed in a public DropBox archive) reveals that almost all of his data and images were scraped from various forums, websites, and social media outlets. None of the examined data is proprietary in any way nor was it obtained recently. Also, contrary to his claims, his data set doesn’t even come close to 6 TB or millions of files.
The following image illustrates the data sources found on Nasif’s site. This screenshot is a Nasif snippet from a flight log on Jeffery Epstein’s Boing 727-31 TN N908JE showing Bill Clinton on the passenger list. This document was originally disclosed as part of the Epstein v. Edwards lawsuit in 2009, it was collected by Nick Bryant and published through John Cook via Gawker.com.
Image 3: Nasif’s snippet of the flight logs to Epstein’s private island
Nasif however, doesn’t provide a direct link to the source document nor does he credit John Cook and Nick Bryant. Instead, as can be gleaned from his tweet below, he implies that his depository may just be the only remaining source for this information, which is clearly not the case.
Image 4: “This might be the only archive left in existence.” Nasif, obfuscating the real sources of the data in his ‘proprietary’ archive or claiming that he (Team George) is the source.
Image 5: One example of the source of George Nasif’s “proprietary” data depository (this is the source of of Nasif’s snippet seen in Image 2)
Beside the misattribution and hiding the real sources of his data, many of the images in his depository show evidence of touch-ups and post editing (it’s unclear by whom). The images have the wrong authorship attribution and their labels have misleading descriptions of the content. Many of the screenshots of the documents also exhibit font type and resolution mismatches, suggesting that the text on some of the images was retyped after they were produced.
Image 6: Some of the ‘proprietary’ content advertised by George Nasif
The logistics behind Nasif’s > 6TB cloud based archive raise questions about his ability to float such an enterprise as a non-revenue service. IBM CDN cloud storage goes for $0.02-$0.085 per GB. Doing a quick math, shows that at these rates, Nasif could be spending an upwards of $100-$700 USD a month on storage alone and that doesn’t include the bandwidth cost for streaming all of the conspiratorial video files.
His claims about having pedophilia related images and records (the AI flagged several) are problematic to say the least. Beside the moral issues with possessing, posting, trading, and directing others to access this content, there is also the small problem of breaking federal and sate laws. His references to having personal and company financial data such as passport numbers, credit card numbers, bank accounts, and other PII data, could result in multiple felony charges for him and for anyone who has a copy of these records. Also, publishing this information (as he claims to have done) could be prosecuted under state doxing laws. If his public records do indeed contain names, addresses and phone numbers of federal employees, he and whomever downloads this data could also be potentially prosecuted under 18 USC § 119.
In terms of Nasif being a subject matter expert and uber-communicator, his writing style exhibits habitual poor grammar, punctuation errors, spelling, and capitalization issues—the hallmarks of an author not accustomed to technical writing. His claim of being an “IT Internet Network Security Specialist Certified White Hat NSS” is also dubious as his professional career mostly revolved around house painting. He has a zero industry security footprint, he has very limited technical vocabulary, and he exhibits a poor grasp of even basic computer security concepts. His professional network and background also fail to show any traces of InfoSec or IT experience to back up many of the cybersecurity interpretive claims and ‘big’ statements.
Image 7: George Nasif’s linkage
Based on Nasif’s lack of technical proficiency and a reasonable explanation of how he has gotten access to the ‘proprietary’ materials, it seems that he is just an opportunistic shadowy data broker who scrapes dubious content from 3rd parties, tags with provocative titles, and makes sensational headline style claims about its meaning. It may also be relevant that him becoming a purveyor of ‘secret’ intelligence suspiciously coincides with the 2017-2018 GoFundMe launch of his web hosting service (re-selling IBM hosting) which, interestingly, also uses similar bombastic claims such as:
“The Most Secure Cloud Storage Server in the World. Secure Hosting- Secure High Speed 1Gig Internet- Secure Chat- Secure Photo and Video Storage”
“…Please do not publish any of my evidence documents in public or private forums without my written permission. Please do not try to “share” a link to my evidence file folders from this drop box folder to social media pages, groups, or news publications. If you publish anything labeled “Secret” in public, I cannot protect you from legal or criminal prosecution that may follow.
If you want to invite someone to view “George Global” please make that request by email to email@example.com and make sure that person has followed protocol by first making a donation to the new server so I can give them access. Posting many of these documents is what got me banned 15 times from Social Media, Twitter and FB. Remember this when RT or sharing on FB. Think before you act. Be responsible. All Documents have been vetted as factual and true evidence from the source.”
So, there you have it. You shouldn’t publish any of Nasif’s documents without his permission because he scraped them from other sites and now claims them as his IP. But if you do re-publish anything labeled “Secret” from his publicly accessible DropBox archive, he won’t be able to protect you from “legal or criminal prosecution”. Also, don’t forget to ‘donate’ to his business venture in order to get access to the ‘full’ content of this magical archive (which previously was in the public domain). And finally, Nasif himself assures you that he “vetted as factual and true evidence” over 6 TB of data and millions of records.
If you are still struggling with the classification of the content in Nasif’s depository/postings as real or fake, the highly technical illustration below may be of some help.
Image 8: How Nature Says “Don’t Touch” Credit: Gary Larson’s Far Side Cartoons
User account records, email addresses, usernames, and passwords
Driver’s license numbers, credit and debit card numbers, names, and addresses
One of the biggest thefts of consumer data in the United States, affecting the parent company of several major retail brands, including Marshalls, T.J. Max and Home Goods
National Archive & Records Administration
Names, contact information, and Social Security numbers of U.S. military veterans
Heartland Payment Systems
User account and credit and debit cards details
Lincoln National Financial Securities
User account database including user names and passwords
Sony online entertainment services
US user login credentials, names, addresses, phone numbers, and email addresses
The credit-card data of approximately 23,400 SOE European users
Email addresses of customers ofmajor retailers, banks, hotels and other companies including Best Buy, JPMorgan Chase, Capital One Bank and Verizon
Passwords, user names, account details
User IDs and passwords
Names, dates of birth, email addresses, security questions, and answers and passwords.
Contact information, full names, physical addresses, email addresses, telephone numbers, credit and debit card numbers
User ID, passwords, and email addresses
Email addresses, usernames and passwords
LivingSocial (an Amazon Company)
Names, email addresses, birth dates, and passwords.
Sony Pictures Entertainment
Social Security numbers and scanned passports belonging to actors and executives, internal passwords, unpublished scripts, marketing plans, financial and legal information and 4 unreleased Sony movies affecting the company’s 6,800 employees plus an estimated 40,000 other individuals the company had paid over previous years.
Rival Hollywood studios got a detailed blueprint of Sony Pictures’ accounts, future plans and internal workings
Customer credit and debit cards
Email addresses, user details, and passwords which had all been stored in plaintext
Anthem (formerly WellPoint)
Entire customer database including names, addresses, dates of birth, Social Security numbers, and employment histories
The FriendFinder network, comprising Adult FriendFinder, Penthouse.com, Cams.com, iCams.com and Stripshow.com
Entire user database, including names, addresses, email addresses, and phone numbers.
This was a similar breach to that which affected the “Have an Affair” Ashley Madison dating service in 2015
The 2012 breach only discovered in 2016. Names, emails, passwords, complete user professional profiles
Names, Social Security numbers, birth dates, street addresses and, in some instances, driver’s license numbers
Names, mailing addresses, email addresses, credit-card information, dates of birth, passport numbers, and Starwood Preferred Guest accounts
Credit card applications from consumers and small businesses, credit score, SS numbers, names, addresses, ZIP codes, phone numbers, email addresses, birthdates and self-reported income
Names, email addresses, passwords, and IP addresses
American Medical Collection Agency
Social Security numbers, dates of birth, payment card data, and credit card information
Hacking and exploit techniques evolve every minute, this is frequently demonstrated through the formulaic news headline of ‘X got hacked resulting in the disclosure of Y accounts’. As its evident from the Table 1 and charts 1-2 below, getting hacked can effect all market verticals, both small and large companies, the military, law enforcement, and the government, no one is immune.
Table 1: Sampling of successful cyber attacks and the resulting data breaches from 2006-2019
The paradoxical end result of these data breaches is that every year organizations increase their cyber security budget without any assurances that the expenditure will yield a return on the investment. To an outsider, this ritual must appear similar to the practice of throwing a virgin into a volcano in the hopes of quieting its rumbling. It seems that information security, as opposed to other types of technology spending, is just a budgetary black hole.
So why is it so difficult to prevent or even slow down cyber attacks? I think that it boils down to these two reasons:
Lack of executive and BOD accountability and legal consequences for a data breach
Use of outdated cyber defense models like concentric fortress security
Point 1 is a regulatory issue that should be addressed through legislative channels, so I’m not going to elaborate on it here. My take on this problem is that if legal enforcement worked properly, then it is likely that the first CISO that gets handed a hefty prison sentence for negligence, would also be the last CISO to allow his company to get hacked (the same also applies to the rest of the C officers and the BOD).
As far as point 2, the problem is a little more complex, but also easier to remedy. The issue with using an outdated static fortress models is that they overly abstract military practices that were developed/honed over thousands of years for a specific set of war scenarios and contort them to fit our virtual information security needs. This includes embracing defensive concept that utilizes multiple concentric-overlapping-sequential layers of protection akin to a moat, a drawbridge, a portcullis, a guardhouse, bastion walls, guard towers, ramparts, a keep, a treasury, and a well trained, armed, loyal garrison.
Image 1: Information security R&R and the traditional fortress and sentry analogy
A fortress is an intuitive analogy for the enterprise but it is an overly hyped and misleading one. Beyond a few shared objectives such as parameter security, surveillance, and physical access to a facility, cyber defense has little in common with traditional military fortifications. This is because information security deals with virtual threats and its attack vectors have a few equivalents in the physical world (see Table 2).
Contemporary Assets & Threats
Traditional Assets & Threats
Contraband (weapons, alcohol, drugs, etc.)
Contraband (mostly weapons)
Infrastructure (power, water, Telco, etc.)
Water and food storage
Malware and Ransomware
Intellectual property and trade secrets
Computing, network, and storage resources
Insider and trade information
Strategic plans such as M&A
Customer and partner data
PII (i.e. SS, BOD, driver license, address)
Medical and genetic data
Opposition and political research
Business operations data
Credentials and authentication data
Credit card, PIN, and chip data
Banking and financial data
Classified military, defense, and intelligence data
Insurance and claims information
HR, compensation, and, employee data
Financial donor information
public health and safety information
Table 2: Threats and targets in the counterparty enterprise vs. the legacy fortress
Traditionally, fortresses were besieged and breached via one or a combination of these 7 methods:
Scaling the walls (with assault ladder or a movable tower)
Punching through the walls (with a battering ram, trebuchet, or cannon)
This same doctrine that made massive layered fortifications synonymous with impregnability was used by France in the Maginot Line and proved to be a huge tactical and strategic disaster. Between 1929 and 1936 the French built a massive line of concrete and steel forts and tunnels along the German border with France between Switzerland and Luxembourg. It was constructed to defend France from any future WWI style attacks from Germany. So instead of attacking the heavy fortifications, the Germans simply went around them and invaded France through Belgium, exactly as they had done in 1914.
All the motorized artillery turrets, tank traps, bunkers, periscopes, and other gimmicks designed to impede the advance of the German army turned out to be useless when a million soldiers and 1,500 tanks led by Guderin and Rommel flanked this supposed impenetrable chain of forts and blitzkrieged their way to some renowned Parisian fine dinning and cabaret entertainment.
Image 2: The Maginot Line fortresses system and some Parisian cabaret entertainment
Today, many of the leading cyber security vendors continue to sell the same fortification concept using flowery language such as “impregnable defense” or “defense in-depth” or “multitier lines of defense”. The promise of all of these protective marvels is that increasing the number of your defensive lines is guaranteed to shield your enterprise from threats and the latest cyber attack.
A Dynamic Threat Theater The cyber threat landscape evolves daily, but the enterprise defensive architecture continues to rely on countering ancient seige techniques. The hacker skill set and the resources needed to penetrate a high valued target no longer require highly specialized expertise, lengthy planning, or expensive zero day exploits. A simple phishing technique can now do the job just as effectively.
The prevalence of social media platforms in our daily lives and their use as line-of-business applications (i.e. LinkedIn for HR and recruiting), enables attackers to quickly conduct reconnaissance and exploit their targets directly and in real-time. The use of personal devices in the workplace provides payload delivery vectors and allows the attacker to use them to bypass external facing security measures like firewalls and pivot to the internal network. The use of Bluetooth to connect mobile devices allows an attacker to collect the contents of address books and capture phone conversations. Free Public Wi-Fi offers ample opportunities for attackers to collect credentials from corporate users while they are commuting to work or are off-site, and a glut of mobile apps provides an endless source for spyware and malware distribution channels.
Yes, democratization has finally reached Hackerdom. These days, you don’t even need to write your own malware; you can just download a free fully functional phishing kit from various depositories, customize it, and launch your campaign in minutes. All this gives an attacker the ability to cruise into the enterprise with relative ease, completely bypassing all of the layered security controls en route.
Behold! The Adaptive Secure Architecture For the Enterprise (SAFE) The majority of the current cybersecurity models are still based on the erroneous game-theory arms race assumption that continuously bulking up your defensive elements (like upgrading to an ASA device or endpoint security client) will stop an intruder. The concept is not dissimilar to using the club to secure a Lamborghini. However, these models incorrectly rely on idealized assumptions about the decision making process of the attacker and their ability to find and exploit the endless number of vulnerabilities in your enterprise.
The traditional approach of adding additional security strata to the already tangled web of unmanageable layers is unruly and unsustainable. If you are still not convinced, the root cause analysis of the breaches in table 2 shows that all of the platforms breached had up-to-date antimalware, segmented networks, rule bases access control, multi-factor authentication, firewall, IDPS, etc. The hacking statistics clearly demonstrate just how ineffective these defensive strategies are against an Advanced Persistent Threats.
Thunderbolt and Lightning Very, Very Frightening So, instead of succumbing to more security by fear and continuing to throw more good money after bad into the security furnace, I propose an alternative to the static fortress defense doctrine. This concept is based on adaptive security. It relies on continuous monitoring, active threat quantification and assessment, traffic anomaly detection, response prioritization, and real-time remediation. I call this design reference the Secure Architecture For the Enterprise (SAFE) framework.
At the heart of the SAFE framework is the assumption that the security of the enterprise can never be up to par and that most organizations can’t afford the latest and greatest in cyber security services. The model also accounts for all of the typical IT and InfoSec vices, sins, and transgressions found in your day to day workplace such as weak and reused passwords, usage of personal devices at work, unpatched systems, buggy software, etc.
The SAFE framework doesn’t focus on traditional defensive elements like malware protection, but rather, it leverages real-time AI based monitoring, a decision support system, and autonomous identification o risky areas requiring immediate attention. At a high level the SAFE framework is comprised of a real-time BI dashboard that analyzes and reports patterns of inbound and outbound traffic in your systems and users. This dashboard, in turn, is powered by real-time RBE, CEP, and a BigData engine that detects and flags anomalies on your network (such as uncharacteristic use of encrypted traffic). The decision support system (DSS) integrates feeds from various internal IT system such as patching, upgrades, VPN logs, firewall logs, event logs, etc to give you a current situational awareness of your security posture. The DSS then uses an expert system to flag and prioritize remediation actions as they apply to the various vulnerabilities or exploits in progress.
When building a security solution using the SAFE framework, you don’t have to fix/upgrade/sunset all of your systems at once. You can instead rationalize your security priorities and concentrate on the areas with the highest risk of attack. The good news about using the SAFE framework is that you don’t have to spend a fortune on over-hyped preparatory protection services and commit to one vendor or another. You can easily build your security architecture with a relatively small in-house team using mostly COTS and open source components.
Due to the modular and loosely coupled nature of the SAFE framework, you don’t even have to own all of the inventory of the building blocks. You can start small and expand over time. This approach also allows you to customize your solution to your industry vertical and business needs. Finally, because the SAFE model uses concepts from the software development life cycle (SDLC) such as iterative development, feature prioritization, bug tracking, etc., it allows you to prioritize and gradually adapt and move iteratively between the 10 elements that comprise the framework.
Image 5: The SAFE life cycle security model focuses on the evolving threat matrix
Cyber attacks don’t just mysteriously materialize out of thin air; they follow a specific life cycle of reconnaissance, planning, vulnerability assessment, exploit, and post exploit steps. Far from being helpless, we can intercept and circumvent most of these attacks during any of those steps. Integrating the concept of a cybersecurity kill chain into the SAFE model could even further enhance your ability to prevent, disrupt, or stop any attack on your enterprise in near real-time.
I’ve been asked by a number of people if the images seen in the video of the October 11 Minnesota riots that took place during President Trump’s rally show Ilhan Omar, Tim Mynett, and Isra Hirsi. Running the video footage through face recognition (FR) came back inconclusive with the following match rates:
Face recognition for Ilhan Omar = 52% Face recognition for Tim Mynett = 71% Face recognition for Isra Hirsi (Ilhan Omar’s daughter) = 56%
The reason for these low scores is that the Persons Of Interest (POI) that resemble the three individuals have key facial features such as the nose, mouth, lips, chin, either obscured or distorted. That said, several other video analytics did find multiple partial matches on general personal characteristics such as ethnicity, body size, face build, hand size, and scarf wrapping style. Tim Mynett’s glasses for example, matched at 94%.
Face Cover and Proximity Evaluating the appearance of the various POIs in the footage shows that they didn’t cover their faces at all times. In several instances, POI-1, who resembles Ilhan Omar took the scarf of her face. POI-4, an accomplice of POI-1 (of the same ethnicity), didn’t cover her face at all and was wearing her head scarf in a casual non-traditional Somali wrap. POI-2, who partially matched Tim Myentt also periodically removed his face cover. This suggests that at least some of the participants didn’t have extreme privacy concerns or believed that alternately appearing without a face cover wouldn’t be detrimental. From the spatial awareness point of view, POI-1-4 repeatedly moved in and out of the Field Of View (FOV) and operated at a very close proximity to the photographer. In at least 2 occasions reaching as close as 18-36 inches from the camera.
Image 1: POI-1 and her accomplice POI-4 frolicking with uncoverd faces in front of the camera
Motion Dynamics Following the FR, I also performed motion analysis of the four POIs identified. Motion pattern analysis examines the movements of individual objects in a field of view and classifies them according to their trajectory, velocity, and movement pattern. In a typical public gatherings such as demonstrations, airport/subway passenger traffic, sport events, street traffic, etc. individuals and crowds tend to exhibit certain patterns of motion like loitering, flowing at the speed of traffic, coordination, queuing, pacing, etc.). The results of this analysis flagged the following anomalies:
POI-1 who resembles Ilhan Omar didn’t move organically within the FOV as did the other demonstrators. She loitered around the camera with another female accomplice (POI-4 of the same ethnicity) and seemed to be more interested in being observed by the camera and less in joining the demonstration at the police bicycle barricades where the action was taking place.
At one point in the footage, POI-1 that resembles Ilhan Omar turned to walk away towards the camera, she noticed the camera, and quickly turned around and used both hands to adjust the scarf on her face. She then did a 180 degree pirouette and walked right back in the same direction towards the camera. Typically, this would not be the pattern of motion for a person who is trying to avoid being seen. Rather, one would expect her to turn her back to the camera and walk to either side or straight ahead into the crowd to avoid being identified (see Video 1).
POI-1 who resembles Ilhan Omar exhibited coordinated motion with POI-2 (they frequently shared the FOV). Both moved fluidly, slowly, and deliberately as if to provide image capture opportunities.
POI-2 who matched Tim Mynett also interacted with the camera on multiple occasions in the same way as POI-1 did. On at least one occasion, he walked right across the FOV with a clear profile shot and at one point deliberately pulled down his scarf exposing his face and faced the camera. He was aware of his action because he made direct eye contact with the center off the lens (Video 1).
Video 1: POI-1 and POI-2 coyly promenading in front of the camera
Image 2: The Minnesota riot video POI match analysis details
Linkage and Geospatial Analysis Running a linkage analysis on several entities involved in this video shows a direct relationships between the actors and Ilhan Omar. For example, Andy Mannix, who recorded the video of the riot is a MinPost reporter that knows Ilhan Omar and Tim Mynett.
Mannix, also knows Cory Zurowski from his days in the Minnesota City Pages newspaper. In 2016, Zurowski published a fictitious biographical piece about Ilhan Omar (he didn’t verify any of Ilhan’s bio claims) and in that article had a little Freudian slip and fall and identified Ilhan Omar’s real family name as Elmi, but then promptly changed it back to Omar. Andy Mannix also happens to be married to Briana Bierschbach, a former AP reporter who currently works for Minnesota Public Radio as a political correspondent. Bierschbach interviewed Ilhan Omar on multiple occasions and wrote several supportive articles about her. The Bierschbach Omar stories are political puff pieces that are light on investigative facts and heavy on personal aggrandization and read like a press release written by Tim Mynett (who is Ilhan Omar’s PR manager/latest romantic interest). The common theme in all of these writings is to highlight Omar’s heroic qualities and whitewash the dubious details about her and her family’s history.
From the geospatial point of view, having Mannix, Mynett, Hirsi, and a crypto Omar within a radius of 10 feet of each other, without either one of them being aware of the others is suspicious to say the least. This act reminds me of the plot line in the P. G. Wodehouse’s novel “Jeeves Takes Charge”. In it, Jeeves’s makes the following observation to Bertie Wooster:
“Any undertaking that requires the presence of four people all in one place, all at the same time, while two of them are unaware of the fact, is fraught with the possibility of mishap sir.”
Image 3: Andy Mannix, Briana Bierschbach, Cory Zurowski, and their Ilahn Omar linkage
Prophetic Visions of Fake News Mannix’s social media activity prior to the rally may also be relevant to this discussion. On October 10 at 11:40 AM, almost a day before the riots started, using what seems to be a prophetic vision, he twitted the following prediction for the upcoming event:
“There will also inevitably be a lot of fake [news] or unsubstantiated claims…”
Suspiciously, the only viral fake news story that came out of this event is associated with the footage that he recorded.
Image 4: Andy Mannix’s prophetic tweet about future fake news relating to the Minnesota Trump rally
It certainly seems that the whereabouts of Ilhan Omar, her daughter Isra Hirsi, and Tim Mynett during the riots fit into the debate about ‘unsubstantiated news claims’. What is not clear though, is what role did Mannix and his progressive reporter network played in engineering this event.
Conclusion My take on this is that based on the positive match for Tim Maynett and Isra Hirsi and the multiple partial matches for Ilhan Omar there is a strong possibility that this was a publicity stunt with a look-alike done for the purpose of crowd sourcing a false identification. One possible reason for doing this might be to use this incident to discredit the ‘conspiracy theorists’ by showing that Omar was at a different location at the time this video was shoot. This would then allow her PR team to leverage the false match and use it to repudiate other successful searches that positively confirmed her second husband as her brother.
This also suggests that someone on the Omar team seems to be concerned about the previous usage of video analytics to identify her dubious family linkage and is trying to develop some counter narrative to address it.
Running for Congress? Short on cash or donations? No need to worry. Now, you too can finance your entire campaign through Ukrainian arms dealers. Igor, for example, will host the fundraising events in his $2+ million Washington DC brownstone (just one of several such houses he owns in the US). He will even throw in the Ukrainian Hors d’Oeuvres, Vodka, and Cigars.
Image 1: Igor Pasternak’s luxury home in DC where in 2013 Adam Schiff used Igor Pasternak to host a fundraiser for his congressional election
And the best part is that you never have to worry about paying him back for any of these favors, because it’s all absolutely free, no strings attached. After all, everyone knows that Ukrainian arms dealers float the election campaign of congressional candidates like Adam Schiff, and Loretta Sanchez and socially and politically hub nob with Nancy Pelosi because they are just so cuddly and lovable.
If you don’t buy any of this, then the following Adam Schiff, Nancy Pelosi, and Alexandra Chalupa linkage agrees with you.
Image 2: Where is Igor? Using the Sentinel AI based face recognition to locate a POI in a crowed of 500K people
Image 3: How a Ukrainian arms dealer Igor Pasternak floated Adam Schiff’s 2013 election to Congress and Pasternak’s linkage to Nancy Pelosi and the Ukrainian influence network in the US
Image 4: NADATS a division of Igor Pasternak’s AEROS corporation offering armed blips and surveillance towers with ITAR controlled FLIR thermal cameras and personnel tracking radar packages
Image 5: Notes from the desk of Yaroslav Brisiuck’s the Ukrainain Chargé d’affaires in Washington DC suggest that Alexandra Chalupa could be a long term Ukrainian intelligence asset
Image 6: Alexandra Chalupa, Melanne Verveer, and Congresswoman Marcy Kaptur’s Ukraine linkages. Chalupa held multiple intelligence briefing and debriefing sessions regarding president Trump with her handler Okana Shulyar and other Ukrainian embassy diplomats like Andriy Telizhenko
Image 7: Alexandra Chalupe with a small sampling of friends like Michael Avantti, Linda Sarsour, Andrew McCabe, and their on-going activity to impeach president Trump
“UkrOboronProm’s (One of Ukraine’s largest arms producers)…signing a memorandum of cooperation with the Aeroscraft (Pasternak’s company), a major aviation and weapons producer founded and directed by Ukrainian immigrant Igor Pasternak.”
“Pasternak found himself walking on Kyiv’s central square, Maidan Nezalezhnosti, where the central protest camp was based. “(At that moment) I understood that I am a Ukrainian,” Pasternak said during an interview on Ukrainian television’s Espreso TV shown on April 2015. Before seeing the EuroMaidan protests, he identified as an American. Pasternak then started to visit Ukraine every month or two. In January, he signed a contract for Aeros to supply Ukraine’s State Border Service with a surveillance system to monitor the Sea of Azov.”
Image 8: A sampling of Igor Pasternak’s US real estate
Image 9: The Chalupa family ‘political consulting business’
Image 10: The Pelosi Voronovych (Woronowycz) linkage part-1
Image 11: The Pelosi Voronovych (Woronowycz) linkage part-2
Image 12: The Atlantic Council Ukraine linkage showing that Schiff is engaging in intelligence collection and political patronage in Ukraine and his collaborator Geysha Gonzalez (who paid for Schiff’s aid trip), an expert on disinformation, misinformation, and false information, and the Deputy Director of the Eurasia Center at the Atlantic Council
Geysha Gonzalez the Deputy Director of the Eurasia Center at the Atlantic Council discussing issues related to Russian information warfare during the 2016 elections
Image 13: The Pelosi Jihadi linkage. A profile of one Ukrainian jihadi NGO which is a front for the Turkish intelligence services
Image 14: The Gigapixel mosaic was one of the image sources used in the Pasternak face match searches. Source: CNN Trump Inauguration
Image 15: Multi-classifier verification for Nancy Pelosi’s identity using face recognition, hair parting style, body features such as hand geometry and age spots (on right hand), and the ‘tight lips’ facial expression
*** Update October 17 ***
Quis Custodiet Ipsos Custodes – Who will Fact Check the Fact Checkers? Shortly after uploading this post, I was contact by Saranac Spencer Hale, an an investigative reporter with Factcheck.org. Saranac asked me via email to verify that the images in the post were authentic. She also inquired about the face recognition and AI based analytics and wanted to know how the technology worked. I provided her with the details and even demonstrated the Sentinel AI capabilities by running it against one node of her social network (using her email address as the entry point).
After providing her this information, she never responded to my emails or gave me an opportunity to comment about what she was going to publish. Several days ago, she posted a misleading report that falsely claims that I’ve misidentified Randy Credico as Igor Pasternak (the man Nancy Pelosi is shanking hands with in the middle of Image 15).
The fact is that Credico wasn’t event tagged or identified because he was irrelevant to the linkage. The main reason why this image was used is because it contained several of Pelosi’s characteristics that the AI classifier used to verify her identity. These included her face recognition, hair parting style, body features such as hand geometry and some age spots (on her right hand), and the ‘tight lips’ facial expression.
It is clear from the content of Saranac Spencer Hale’s misleading post and its deliberate mischaracterization of the facts that it was a designed to attack the Ukrainian linkage between Igor Pasternak, Adam Schiff, and Nancy Pelosi, and down play Pasternak role as an ‘arms dealer’. This MO fits well into the genre of internet facts checkers who in reality are little more than progressive political damage control tools and information warfare units that whitewash inconvenient facts.
For the sake of transparency and to allow others who may want to get a first hand view into how the Internet fact checking industry works, I am posting the email thread with Saranac Spencer Hale below:
I have read your fact check and would like to reference this comment:
“Apelbaum told us through email that his company used facial recognition technology to identify Pasternak — although incorrectly in Credico’s case.”
Your false statement of me misidentifying Credico as Pasternack is both dishonest and deceitful. I have never claimed to identify Randy Credico as Igor Pasternack or labeled him as an arms dealer. None of my images show Credico with Pasternack’s name.
The image that you are referencing as being a misidentification was used to confirm the identity of Nancy Pelosi. The relevance of the image with Credico is that it contained the following Pelosi reference objects:
Pelosi’s age spots visible on her right hand (shaking hands with Randy Credico)
Pelosi’s hand geometry
Pelosi’s hair parting style
Pelosi’s facial expression, specifically, her ‘tight lips’
These and other features were then used to confirm Pelosi’s identity in the image with Mr. Pasternak.
I was transparent with you about how our technology works and even went the extra mile to demonstrate the process on a person in your network. I expected that you would have had the decency to give me the courtesy to respond to your false claim before you published your article.
But I guess, that is not how professional fact checkers with an agenda operate.
From: firstname.lastname@example.org Sent: Thursday, October 03, 2019 4:51 AM To: ‘Spencer, Saranac Hale’ <email@example.com> Subject: RE: Reporter from FactCheck.org
I wanted to follow-up on my last email. Will you be publishing the confirmation of the FR search you inquired about?
Also, find attached a sample run of the Sentinel AI against one person you know. The search used FR, object classifier, and GIS engine, and text analytics. We constrained the parameters to a 60 seconds search, a single relationship node, and the detection of deepfake content. We also striped the search linkage and removed adult content, drugs, and firearm related matches found.
Let me know if you have any questions.
From: firstname.lastname@example.org Sent: Monday, September 30, 2019 3:55 PM To: ‘Spencer, Saranac Hale’ <email@example.com> Subject: RE: Reporter from FactCheck.org
The high level overview of the FR process is:
Ingest any image source (real-time streaming video, video in files, newspapers, images, microfiche, illustrations, CCTV, mobile phone, etc.)
Optimize the image (poor exposure, illumination, stability, rain, or fog, etc.)
Reconstruct the image (remove occlusion, compensate for counter detection methods like sunglasses, fake beard or mustache, hats, and scarf)
Create a 3D facial object so that it can be manipulated in space
Perform a wide range of analytics on the object including face recognition, age, race, gender, emotional state. We can also plug-in custom analytic such psychiatric and medical indicators
Fuse and enrich the detection with other sources
I hope this help,
From: Spencer, Saranac Hale <firstname.lastname@example.org> Sent: Monday, September 30, 2019 2:29 PM To: email@example.com Subject: RE: Reporter from FactCheck.org
Great – could you tell me how this technology works? Do you use standard news video footage? Also, were you able to confirm the identity of Igor Pasternak in the photo where he is shaking Nancy Pelosi’s hand?
From: firstname.lastname@example.org Sent: Monday, September 30, 2019 2:24 PM To: Spencer, Saranac Hale <email@example.com> Subject: RE: Reporter from FactCheck.org
Thanks for reaching out. Yes, we did utilize our Sentinel AI face recognition and video analytics platform on the Gigapixel mosaic and confirmed the identify of Igor Pasternak.
From: Spencer, Saranac Hale <firstname.lastname@example.org> Sent: Monday, September 30, 2019 2:14 PM To: Information@XRVision.com Subject: Reporter from FactCheck.org
I’m wondering if your company did, in fact, use facial recognition technology to identify the people indicated in the graphics. I’m particularly interested in whether or not you contributed to the image that’s attached.
“You shall do no unrighteousness in judgment; you shall not respect the person of the poor, nor favor the person of the mighty; but in righteousness you will judge your neighbor.” – Leviticus 19:15
The Triple Scales of Justice Balanced scales and unsheathed sword You shall judge fairly regardless of might, Unbiasedly apply the law before the Lord Justice must be blind to privilege or right.
Courts now buckle under heavy caseload, The mills of justice grind exceedingly slow, Activist judges role from a heavenly abode Elevating the privileged to a higher plateau.
Young lady justice used to wear a blindfold Her impartiality was more precious than gold, But the virtues maiden has been getting old Now to the highest bidder her integrity is sold.
A democratic donor like little Nero of Rome Has a predilection for poor young black men, Claimed Ignorance about them dying at his home The DA passed the buck because he’s a big fan.
The Hollywood producer who directs politicians Who Meryl Strip believes is like god in the flesh, Can force women to have sex before auditions No worry, Woody Allan will whitewash his trash.
The Kennedy aristocracy will never know fear In a bind invoke Camelot, JFK & Jackie dear, It’s only rape and murder, why shed a tear? At most a rebuke and they are in the clear.
To the dignified Clintons the law never applies Crimes like emails and sex are all vicious lies, ”What difference does it make?”, everyone dies ”I didn’t have XXX relations” are hallmark replies.
Comey, Brannon, McCabe, Strzok, and Page An ensemble of goodness-wholeness sublime, So what if the deleted texts show treasonous rage Since when is lying to FISA and leaking a crime?
Congressman “Carlos-Danger” of New York Abedin and the Hillary made him so woke, His pedophile messages vanished like smoke Twenty months in a halfway house wasn’t a joke.
Jesse Jackson is a powerful shaman king His Rainbow non-profit is a civil rights thing, Jr. embezzled $750K on Rolex, fur, and bling He/wife did half-time in the recreational wing,
The “Sheriff of Wall Street” Mr. Spritzer divine He fought against vice, corruption, and crime, Charges for $80K sex trafficking were declined Skipping jail straight to Al Gore’s TV primetime.
Philanthropist Epstein, money guide to the stars Was enhancing our DNA with baby-making farms, Kept a sex harem island with free stays and cigars skirted the law with a black book, tapes, and dinars.
Chicago’s Smollet leads the anti-bigotry fight Savagely lynched by two white racists at night, The Police with 16 felony charges wanted to indict Michelle told Foxx uh-uh, he’s my homie, that’s right.
A good school separates the average from best But to get in you have to pass a pesky SAT test, Bribe everyone so your kid’s admission is blessed Your sentence is a fine and a jail time suppressed.
The moral of these verses my dear friend Is that the judiciary its corruption must end, If the DOJ can’t clean up house and justice defend Let UCMJ and martial law their civil rights suspend.
Notes:  The Jussie Smollett case provides a good illustration of how the multi-tiered justice system works. On January 29, 2019, the actor told Chicago police that he was attacked in the early hours of the night by two men wearing ski masks and a MAGA hat. He claimed that they beat him up, used racial and homophobic slurs against him, placed a rope noose around his neck, and poured bleach on him. A week into the investigation, the police determined that Smollett had paid two Nigerian brothers to stage the fake hate crime and assault him. The police charged him with 16 felony counts including filing false police reports, but the Chicago DA under influence from Michelle Obama (who knew Smollett) dropped all charges.
Smollett held a number of conversations with congressman Cory Booker and congresswoman Kamala Harris about supporting their sponsored Justice for Victims of Lynching Act and providing the needed public momentum for the bill to pass the senate and house votes. The timeline of these conversations (December 21-January 18, 2019) suggests that the death threat letter with the white powder he had sent himself (January 22-23) and his staged attack (January 29) were timed to create an opinion groundswell to support the bill and prop the political and professional careers of the three masterminds. It is noteworthy that both Harris and Booker released separate statements condemning Smollet’s attack using identical language:
“an attempted modern-day lynching”
Image 1: The synchronized Cory Booker and Kamala Harris Twitter messages regarding the Jussie Smollett ‘lynching’
When Booker released his statement at 12:09 PM and Harris released hers at 1:30 PM, they could not have possibly known what the motive for the attack was because the police was only a few hours into the investigation.
The first tip that the Chicago police received regarding the true nature of the case came from within Smollett’s inner circle. One of his friends realized that he was now being investigated as a suspect and decided that he didn’t want to be an accessary to a crime. He then contacted the police and told them that “the entire event was orchestrated by Smollett.” This is another indicator that multiple participants knew about the staged attack.
Smollett spoke with the Osundairo brothers an hour before the attack on January 29 and conducted a final dress reversal with them. He then contacted them again after the attack and encouraged them to get to the airport “on time”. On the evening of January 29, 2019 (about 18 hours after the attack), the brothers arrived to terminal 5 at O’Hare airport and boarded Turkish Airlines flight to Istanbul. The following day, on January 30, 2019, Smollett called them while they were in Istanbul waiting for their connecting flight to Nigeria and talked to them about the need to “follow the plan”. He contacted them again after their arrival to Nigeria to discuss some complications (he became a suspect) and the need to switch to “plan B”. This further indicates that the whole event was worked out in advance including elements like deniability and alibis. ‘Plan B’ incidentally, covered the scenarios of the brothers getting questioned by the police and included contingencies such as:
Using a complex password on the phone to prevent the police from accessing their devices
Switching the SIM card between the ‘hot’ phone and a clean phone (they had 4 phones)
A briefing about the intricacies of Miranda rights and search warrants
Importance of not answering any questions or cooperating with the police without an attorney being present
When the Chicago police finally executed a search warrant on the Osundairo brother’s apartment they found a GunVault safe that contained the following items:
1 14375970 Hipoint model C9, 9mm caliber semi auto pistol 1 14375970 9mm caliber magazine with live rounds 2 14375979 45acp caliber magazines, Glock brand with live rounds (pistol is missing) 2 14375996 Boxes labeled Remington 22 rounds (rifle is missing) 1 14375996 One box labeled Hornady 00 buck shotgun shells (shotgun is missing) 1 14375996 Box labeled blazer .45 auto ammo 1 14375996 Box labeled federal .45 auto ammo 1 14376021 Fabric fanny pack green in color 1 14376029 Paper packet cont. two small plastic bags cont. white powder 1 14376038 Unknown make, unknown model, black laser sight 1 14376044 One twenty dollar bill USC 1 14376045 Miscellaneous paperwork (receipts for red hat, bleach and noose)
Image 2: The content of the Osundairo brother’s safe and Jussie Smollett’s anti-gun song titled “Need Freedom”
Smollett’s and his high society circle of friends’ affinity for crime and their ability to get away with something as outrageous as this affair raises questions about the size and reach of their ‘fixer network’. Smollett, who is one of the great progressive moral champions of the anti-gun lobby, hired, befriended, professionally supported, and according to his attorney had sex with one of the Osundairo brothers, all while knowing full well who they were–without any fear of prosecutions.
Possession of a hand gun in Chicago without a license is illegal and could result in a felony or a class A misdemeanor punishable by 1-3 years in prison. Considering that the two Nigerian brothers engaged in various criminal and scam activities like distributing body building steroids, mailing death threats, lynching for hire, lying to the police, and keeping an illegal cache of weapons at home, how is it that the Chicago PD/DA just let them go? What kind of an incantation did they possibly invoke to deploy this kind of protective magic?
Beyond the obvious question of how Smollett managed to shake-off 16 felony charges without breaking a sweat is also the issue of Cory Booker’s and Kamala Harris’s involvement in the planning and orchestration of Smollett’s publicity stunt. All material evidence suggests that parts of the event were influenced by Booker and Harris.
Some other puzzling questions about this case are who—beside Tina Tchen, Kim Foxx, Michelle Obama, and Jesse Jackson Sr/Jr. (another big-time felon)—was in on the decision that Smollett’s punishment should be limited to forfeiting his $10K bail and volunteering with Jackson’s Rainbow PUSH Coalition for 16 hours? And who worked out, coordinated, and blessed the details of this settlement?
Image 3: The dispenser of justice Jesse Jackson Jr., a convicted felon absolving the would-be felon Jussie Smollett through 16 hours of volunteer services at his ‘civil rights’ Chicago based Rainbow PUSH Coalition
Image 4: Who’s Who of the ‘Justice League’ – Jussie Smollet’s political network and how he got off without being charged with 16 felony counts for his self-inflicted lynching and false police report
Image 5: Jussie Smollet in a get down and boogie with Michelle Obama
Need Freedom Too many guns on the streets In my heart, I can’t take it no, oh … Tell me how this happened Where did we go wrong? Say we stay together if we choose to walk alone Blood covers our streets Hatred fills our home Gotta get this message out before we’re dead and gone … Need freedom Our world is cryin’, no more silence, with guns and violence Need freedom I can’t…
Image 6: Classification of the hand guns used in the Smollett “Need Freedom” video
Uh, quick point of personal privilege…Apelbaum, US, he/him.
Comrades Rashida, Ilhan, AOC, and Sarsour, I would like to correct the record here. The murder of Israa Ghrayeb and other honor killings in the Palestinian society and world-wide have nothing to do with toxic masculinity–however, there is a cultural toxicity that you haven’t mentioned and that one is 100% responsible for that great Palestinian contribution to mankind: the ‘suicide bomber’. Which interestingly, you and your clan members, as well as granny Muftia have been endorsing and benefiting from financially for years.
The Majority of Honor Killings Victims are Innocent In an overwhelming majority of documented cases, there was no proof that the murder victims had violated any moral code of Arab society–only that their families thought that their behavior was incompatible with accepted custom. Sometimes a mere rumor that a woman spoke with a man was enough to seal her fate. In a large number of cases the honor killings were perpetrated to hide that the victim was raped by the father, brother of uncle who murdered her in order to save face and prevent the victim from potentially disclosing the crime after she gets married. In other cases, honor killing served as a pretext for murder for other reasons, such as a family dispute, rivalry, or vendettas.
The Real Reasons Behind Honor Killings Samia Habib, a psychologist at the Palestinian Center for Democracy and Conflict Resolution, stated in an interview: “Sometimes it is a matter of inheritance… sometimes the father has committed deviant acts against his daughter and then murders her in a so-called ‘honor killing’ to cover up his crime… The woman is the weakest link. She is always guilty, even when she is a rape victim… The issue of honor is a very sensitive one. The families do not call for help; you can’t reach them.”
As can be seen from the following four excerpts from Palestinian press, honor has very little to do with this practice.
1. A father murdered his daughter Ahlam because she allegedly slept over at the house of a friend that had some boys in it. “The social worker who was monitoring Ahlam’s situation, said that Ahlam had complained to her about her family’s strictness and about her fear of her father, because he sexually abused her.” After the murder, the father said: “I told her that we were going out for shawarma. I drove her in the car, we had shawarma, and I played for her songs that she loved. She didn’t suspect me [of anything]. After we drove a while, I asked her to get out, and she hesitated. When she saw the knife in my hand, she asked, ‘Papa, why do you want to murder me?’ The father took advantage of the law that mitigates punishment in such a case, and was released from prison so he could enjoy the pleasures of life and forget the question asked by his daughter: ‘Why do you want to murder me?”
2. A mother strangled her teenage daughter, who she discoveredhad been raped by her uncle when she was little, in order to purge the shame. The uncle remained at liberty.
3. “Najla, a 24-year-old divorcee, was strangled by her brother, who was known for his religious fanaticism, when she was staying at his home. Najla worked as a clerk at a Gaza business, and [due to her work] was absent from the home for many hours; this gave rise to many stories about her. Her brother, whose nickname was ‘The Sheikh,’ could not bear it. Once the murder was discovered,the police arrested him for questioning. Family talks were then held, during which it was whispered in the ear of a senior police official that the matter concerned the family only, and that the woman had needed to be taught a lesson.Later, that police official received a gift–one of [Najla’s] brothers, a construction worker, laid 13 meters of flooring for him. The result was that [the killer]was released from prison without anyone batting an eyelid, and without any reaction from those who knew how badly Najla needed the work so that she could buy medicines for her sick mother.”
4. A young man murdered his unmarried sister when he observed that her abdomen had swelled and suspected that she was having sexual relations. Afterwards it turned out that she was a virgin and that her abdomen was swollen due to illness. Hamada, who is serving a prison sentence for murdering his sister, expressed no regret over his deed, and wasn’t interested in the pathologist’s report, which determined that his sister had been a virgin. He said: “I turned myself in to the police and I don’t care if I’m sentenced even to life in prison, because I believe in what I did.” Hamada’s brother backed him up: “I didn’t know he would murder her, but after he did I wasn’t angry at him. None of us were. This is the natural outcome of her actions, which were known to everyone in the neighborhood.”
“She deserved to die” It is noteworthy that honor killings are accepted as a norm by many women in Palestinian society. In one of a series of workshops dedicated to media coverage of honor killings held in Khan Yunis, all 60 women participants believed that a sinning woman should be punished with death.
One participant, who wore a burka, said of one of the victims: “She deserved to die. She should be a lesson to other women.” When asked whether a man guilty of similar offense should be punished, she replied, after a brief pause, “It doesn’t matter, he’s a man.”
Image 1: Honor killings are a wide scale cultural disease that result in the murder of hundreds of women every year
According to a UN Women rights report, a staggering 60%-70% of all married Palestinian women regularly experience domestic physical and physiological violence. And if this is not bad enough, about 15%-30% of all girls also experience sexual violence from their own family members. Allowing for some variance, this means that 8 out of 10 women in Palestinian society are abused. These figures are just mind-boggling!
Image 2: UN Women statistics of violence within Palestinian society
Video 1: An interview with a would be Honor Killer
The Murder On August 9, 2019, Israa Ghrayeb, a 21-year-old Palestinian woman from Bethlehem, went to a coffee shop with her fiancé and their chaperones (with her mother’s permission). There was nothing unusual about the outing, they were just sitting drinking coffee. While at the coffee shop, Israa snapped a few pictures and uploaded them to Instagram. Shortly after the upload, her cousin saw her update, contacted Israa’s father and brothers, and advised them that taking pictures with her fiancé before the wedding dishonored the family.
Image 3: The selfie that started it all. Israa at the coffee house and at the hospital
When Israa arrived back home, her three brothers proceeded to beat her up to the point that she either jumped/or was pushed out of a three-story balcony. As a result of the fall, she suffered a spinal injury and was taken to the hospital. While there, she posted a picture of her bruised face and an IV. She also messaged her network that she wouldn’t be able to work for a couple of months but that they shouldn’t worry about her:
“I’m strong, and I have the will to live — if I didn’t have this willpower, I would have died yesterday,” “Don’t send me messages telling me to be strong, I am strong…”
Image 4: The balcony that Israa was pushed out of
Shortly after this second posting, her father and brothers showed up in the hospital locked the door to her room and with no interference from hospital security, police, or the hospital staff, they beat her up again. The following day on August 10th, she was checked out of the hospital by the family and taken home. Two days later, on Augustus 12th she died at home from her injuries.
After Israa’s death, the Ghrayeb family published several statements on-line claiming that Israa suffered from a psychological disorder and that this was the reason why she ‘threw herself’ out of the window on August 9. Their message (translated from Arabic) read:
“Due to the turbulent behavior by Israa, it was necessary to get her out of the hospital on family responsibility and complete her treatment at home, but it didn’t take her much time until she died from a stroke. Her body has been transferred to the Institute of Forensic Medicine in Abu Dis for autopsy, and we’re waiting for the medical report to be issued by the official authorities,”
On August 30, almost two weeks after her murder, Israa’s brother-in-law, via his Facebook account denied all of the accusations against him and the family and claimed that Israa died from a heart attack (not stroke). He stated that she wasn’t beaten up by her family, and her screaming in the hospital was due to hallucinations caused by being possessed by a Jinn (evil spirit) and that all of her problems were related to her poor mental health. He also claimed the videos taken at the hospital, in which she is heard screaming, were not because she was being beaten by her family, but because “she was fighting with the nurses who wouldn’t give her her phone so she could call her mother.”
Image 5: The faces of honor killings – a small sampling of 130 murders resulting from the widespread and commonly practiced honor killing in Rashida’s noble savage society
So there you have it, it’s elementary, my dear Watson. Israa was possessed by an evil spirit which made her jump out of a 3 story window and afterwards attack her 3 body-building brothers who, naturally, just defended themselves.
Jinn and evil spirits notwithstanding, there isn’t enough lipstick in the world to paint virtue on this ugly pig or put a positive spin on this story. If the squad really wanted to help, they could have worked with their Qatari masters and the rest of the progressives to organize an international movement dedicated to stopping honor killings and all other forms of cruelty to women in their native Somali and Palestinian societies. But they didn’t, and they won’t.
Image 6: Rashida wearing out her own family’s honor with Hassan Sheikh
A Culture of Abuse and Exploitation I don’t expect Rashida, Ilhan, or Sarsour to seriously follow-up on any of these issues so I’ll cut to the chase and address the elephant in the room, chiefly, the problem of their inherent cultural dishonesty and the natural propensity towards violence and abuse. The problem with Rashida and Ilhan and their squad is not that they are opportunistic or manipulative—most politicians are—but that they themselves follow and benefit from the same vile practices that they preach against.
For example, Rashida, AOC, and Ilhan have been convicted of campaign finance law violations, filing false tax returns, and major ethics violations. And then, there is the issue of them regularly hanging out (both professionally and socially) with the most vile and voilent characters. This includes convicted international terrorists with blood on their hands like Rasmea Odeh and Leila Khaled and Muslim Brotherhood aristocracy like CAIR’s Nihad Awad and Hassan Shibly. Shibly, the paragon of enlightenment and virtue, is a foaming at the mouth, homicidal anti-semite who is on the US Terrorism Watchlist but yet somehow manages to carry multiple firearms in public including a 9mm Glock and an AK47 assault rifle with a high capacity magazine.
Image 7: Rashida Tlaib and her friend Hassan Shibly, the CAIR-Florida Chief Executive Director. Shibly is the one of the promoters of Ilhan’s speech at the CAIR fundraiser in LA where she stated: “some people did something”. Shilby is on the US Terrorism Watchlist, CAIR and its members are also designated a terrorist organization by the UAE government.
Image 8: Rashida Tlaib and her links to the Muslim Brotherhood, terrorist propaganda, and her circle of convicted Islamic terrorist friends
Yes! My Name is Not Fayez Fayez In addition the squad’s financial and ethical dishonesty, there is also the issue of real vs. assumed or made-up identities. It’s a real puzzle why both Ilhan and Rashida and their prospective spouses managed over the years to collect so many identities. For members of Congress who are leading the charge for transparency and honesty, it is difficult to explain why Ihan and her two husbands and Rashida and her ex Fayez Tlaib, use the following multiple aliases and name/address variations:
Image 9: The multiple personalities of Rashida Tlaib’s ex, Fayez Tlaib
Image 10: Looking for love in all of the right places. The dating profile (while married) of Ilhan Omar’s husband Ahamd H AKA Ahmed Hassan Hirsi
There is No Place Like Home There are probably multiple explanation for Rashida and Ilhan’s name/address shell game. Both families were on government welfare and a food stamp for several years so this could have been related to gaming the system. In Ilhan’s case, she married her brother in a sham marriage in order to get him US citizenship (he is a British national living in the UK). In Rashida’s case, there is at last one corroborated explanation that is related to a 2008 Election and Tax Fraud. In an affidavit that she submitted prior to running for office she claimed to have lived at the 9123 Rathbone, Detroit address. But it turns out that this address is the house owned by her father, Harbi Elabed. When Harbi was asked about Rashida’s claims of residence there, he outright denied it. In a March 13, 2010 interview with Charlie Leduff, Harbi made the following statement:
“She [Rashida] lied big-time to get elected. I never teach [sic] her that way. I teach [sic] her the right way.”
Image 11: Rashida Tlaib’s father’s home in Detroit, his interview confirmation that she never lived at this address, and her actual home in Tireman Dearborn
Residency is difficult to get but relatively easy to prove once you have it. To be an allegeable candidate for office in Michigan, Rashida had to be a “registered and qualified elector” of her district. That means that her primary residence and the address on her driver’s license had to be in the 12th House district.
But according to the official property and tax records, Rashida lived in a house on Tireman in Dearborn. The records show that her husband Fayez Tlaib (a part time autoworker) purchased the house in 2008. Both of them also filed jointly and paid taxes for that property in 2009, and claimed that it was their primary residence. However, in 2009, Rashida explained this discrepancy by claiming that in late 2008 she separated from her husband and moved to her father’s house—something that her father vehemently denied.
Rashida’s signature response to her father’s essentially calling her a liar/fraudster was:
“It’s not surprising that he did this to me. It’s not. He was abusive to me as a girl and he’s angry at me about my grandmother…he’s also vindictive. It’s all very embarrassing. What do they say, you can’t choose your family?”
This claim of ‘abuse’ is reoccurring theme in Rashida’s conversational repertoire and she uses it frequently. She invoked the abuse incantation on her father, former husband, political opponents, former boss, business leaders, Loews, President Trump, police, a number of federal agencies, members of Congress, Israel, and the list goes on. For Rashida, the claim of abuse seems to be the gift that keeps on giving and the ultimate winning card.
In regards to her property tax fraud case, here too she exhibited dishonesty when she threw her husband under the bus and blamed him for the fraudulent filings. Her claim of ignorance is also doubtful because prior to her political career, she worked for a Detroit based non-profit as an attorney offering tax and financial advice to the immigrant community. You would think that a professional who is paid to offer tax and financial advice to others would be able to properly handle their own personal taxes.
In a February 17, 2014 interview with the Detroit Free Press, she said that her husband mistakenly signed the affidavit claiming the homestead exemption in Dearborn and that:
“It actually was very much a wake-up call for many people,… It’s a very easy mistake to make.”
Political charlatans thrive on complacent media and as soon as the apologetic story about her tax fraud went public, Rashida switched to full attack mode and seized the opportunity to lead a legislative crusade to make it ‘more difficult’ for people to claim a primary residence exemption for more than one property.
Another noteworthy observation regarding Rashida’s lack of public transparency is the magical on-line scrubbing of non-complimentary articles about her. One example is a 2014 piece that was featured in The Detroit News METRO section titled: “Tlaib Blames Broken System Failure Pay Dearborn School Taxes”; another is: “Lawmaker to pay back taxes after error”. The removal of these articles is interesting because it confirms the practice of major news outlets purging already published content for narrative management purpose. It may also be relevant that the articles disappearance coincided with Rashida’s election to office.
Nurturing and Enabling Sexual Harassment? Rashida is now positioning herself as leading the charge for women’s rights, but what about her real track record on sexual harassment? Textual and keywords analysis, and video analytics on media and articles related to her that go back to 1998 shows a number of dubious incidents and her questionable ethics. In at least one case she actively shielded a sexual predator for political gain. This story involves her 2013 sexual harassment charges against her former boss, Imad Hamad, the Michigan regional director of the American-Arab Anti-Discrimination Committee (ADC).
From her own statements, it appears that she had personal knowledge that multiple women were being molested and assaulted by Hamad as early as 1999, but she opted to sit on this information for 15 whole years. She only spoke about it after 5-15 other women blew the whistle on how Hamad sexually harassed/assaulted them over the years while serving as head of the Michigan ADC. Hamad was accused of attacking female employees and women who came to him seeking help and advice—ironically enough—about sexual harassment and discrimination. Once that case went public, Rashida quickly cashed-in on the political opportunity to ‘lead’ the campaign to oust Hamad from the ADC.
According the Tlaib testimony, the ADC, just like Hamad is a debauched moral pigsty. Internal documents show that in 2007, eight other women who had worked or volunteered with ADC filed written complaints with the national office against Hamad. But the national office failed to dismiss him, they only told him to take a sexual harassment training course.
Image 13: October 3, 2013 news conference with a few of the 15 victims of Imad Hamad’s sexual harassment and abuse
In a May 31, 2013 letter to the ADC’s national president, Warren David; its national board chairman, Safa Rifka; Barbara McQuade, U.S. attorney for the Eastern District of Michigan; and Gail Cober, field director of the U.S. Equal Employment Opportunity Commission’s Detroit office, Rashida wrote:
“I was a victim of Imad Hamad’s 15 years ago and regret that I did not have the courage to report it to the appropriate authorities…Imad’s sexual advances were aggressive. He made references to my breasts, played with my hair when I was on the phone, and made sexual comments throughout the day…”
Image 14: Rashida Tlaib’s Open Sex Letter regarding Imad Hamad, the ADC, and her decision to sit on the sexual abuse evidence for 15 years
What is shocking but not surprising about this whole case, is that Imad Hamad was eventually cleared of all charges. Evaluating the material evidence shows that the allegations by some of the victims was overwhelming. It consisted of multiple sworn affidavits; the testimonies were detailed, consistent, had no internal or external contradictions, and provided specific time and place details and corroborating events. So, it does seem that the ADC’s final decision was a face-saving cover-up (and a possible generous payout) aimed at shielding the reputation of their greatest social justice warrior.
Image 15: Imad Hamad, the civil rights activist and champion of ‘Arab women empowerment’
In the end, despite the exposure to sunlight, 15 silver bullets, gallons of holy water infused with garlic, and a wooden stake through the heart, Hamad, just brushed of his blouse and walked away from this affair smelling like a rose-scented bathroom freshener. After his full-time gig with the ADC ended, (he still serves as their advisor), he became the Executive Director of the American Human Right Council (AHRC), where he continues to perform his fifth column duties, selling the same snake oil anti-American venomous propaganda disguised as human rights activism.
Image 16: Imad Hamad in his full 5’-4” 330 lb. glory, his fight for a world free of harassment, and two of his sexual abuse accusers: Rashida Tlaib and Rana Abbas and their abbreviated stories
An OSINT dive into Hamad’s past shows a real upstanding human being, just a sweetheart of a guy. He was born in 1966 in the terrorist hotbed of Ein El-Hilweh refugee camp in Lebanon and came to the United States in 1980-1981 on a foreign student visa. Just like in Ilhan Omar’s case, he too has been using multiple names that include:
Imad M Hamad
Imad S Hamad
Arwa Izzadin Hamad
Imad Salih Hamad
Hamad Imad Salih
Imad Salih Hamad
Image 17: Imad Hamad’s home sweet home at the Ain el-Hilweh Palestinian Camp in Lebanon and the World HQ for civil rights, human rights, and women’s empowerment
While in the US, Imad ended up violating his student visa by overstaying its duration. Also, despite the strict visa requirements, he only attended Louisiana Tech University briefly during winter quarter of 1981 (under the name Imad Salih Hamad) and spent the rest of his time on radical terror tied political activities. He apparently also engaged in a sham marriage to a woman with U.S. citizenship with whom he did not live. It was during one of these terror activism marathons in 1982 that he was picked up on FBI surveillance working for the PFLP—an organization on the state department’s terrorist list. The INS fought for almost two decades to deport him, but under pressure from US Senator Carl Levin and the Clinton Administration (believing that this will secure them the Arab community’s vote) they finally gave up.
Image 18: Imad Hamad, the toast of Palestinian high society in Michigan, and his journey from a common refugee camp terrorist to a consummate sexual abuser
In 1997, an immigration judge ruled in his favor (mainly because of his American wife) and canceled his deportation order, clearing his path to permanent residence. In 1998, he became the executive director the Michigan branch of the ADC. In 2003 he got his U.S. citizenship. In terms of political and ideological bent, Hamad is a crafty terrorist apologist and has been defending and promoting terrorist organizations like Hamas and Hezbollah (both on the US state department terror list). He has even gone on Detroit local television stations to praise the Palestinian Authority’s teaching three-year-olds to become suicide bombers—calling it “patriotic.” He was also quoted in the Detroit media referring to Hezbollah—the terrorist group which in 1983 alone murdered 241 US marines and 63 US embassy employees–“the heroes” and a “resistance organization”.
Image 19: Imad Hamad’s activist fairytale story and the details of his visit to the White House meeting with Eric Holder and pressing flesh with another women’s rights champion, Bill Clinton
Some of the testimony regarding the specifics of Hamad’s harassment came from Rana Abbas, Hamad’s deputy director at the ADC. Abbas testified that he hired mostly women in his office so that he could take advantage of them. She also said that he constantly pressured her to have sex with him. When she refused, he punished her. Over 7 victims described his assaults as consisting of:
“Aggressive groping of breast and stroking of hair, rubbing his body against women, trying to kiss them, commenting in suggestive ways on women’s body parts, paddling women, pushing women against the wall and pinning them down, and pressuring women to sleep with him”
Image 20: Top left Imad the woman rights champion. Middle, at an award ceremony with FBI Special Agent Bell, the US Attorneys Collins, and McQuade (one of the recipients of Rashida’s Open letter). Top right, the secret life of Barbara McQuade. Bottom left at a 2009 event with Leon Panetta who thanked Imad for “doing a great job”. Bottom middle, at a 2012 “Siham Jaafar’s Images and Perceptions workshop” event with Rana Abbas (one of his accusers). In that event, Imad let Rana wear his activist fedora and orchestrated a “Why don’t you smile a little more, it will get you places” picture. The identity of the individuals in the images were triple matched using an AI based OCR, object classifier, and face recognition.
Image 21: The rape prince Tarek Ramadan, Muslim Brotherhood philosopher and a former Oxford professor of Contemporary Islam and Ethics and the sources of his Qatari legal defense fund and personal finance
We Can’t Handle the Truth Clearly, both Imad and Rashida are lying about some of the facts in this case, which makes it difficult to determine who exactly abused whom. It seems that both of them participated in some form of a perverted marriage of convenience and that at some point, the relationship got poisoned.
In 2011, Rashida was literally thrown out of a fundraiser by ADC staff in Washington, DC. Other evidence suggest that Tlaib may have been romantically involved with Hamad and that the grudge was at least partially trigged by ‘Hell has no fury like a woman scorned.’ So these two factors could have been the impetus for the Sicilian knife fight that ensued in 2013. One thing is certain, as soon as Rashida got elected and felt powerful enough, she kneecapped Imad. Debbie Schlussel, who is the resident expert on Rashida and Imad, summarized the relationship between these two poisons snakes as:
“Frankly, I couldn’t care less if Tlaib was sexually harassed by Hamad, as this is one of those “Alien v. Predator” cases where I hope the war lasts forever and both sides lose.”
The real Greek tragedy with this and other ‘ethnic’ sexual abuse cases is that under the pretext of women rights, Rashida and the rest of the squad are the active enablers of this practice and promoters of the most heinous of crimes against women. On one hand, virtue signaling and oozing with modesty like Ilhan’s and Sarsour’s hijab charade (which probably makes every devout Muslim woman cringe), and on the other hand whitewashing degenerate and depraved sexual assault and child marriage practices in their community.
Or as Israa Ghrayeb wrote in her last tweet before she was murdered:
“…May God be the judge of those who oppressed me and hurt me” .
Image 22: Top 20 countries with the highest prevalence of child marriage and an estimated rate of about 15%-30% of this practice for Palestinians living in Jordan
Checking the Checkers The squad response to accusations of dishonesty, fraud, and deception against them is to argue that these are all white privileged Islamophobic, fascist, racist, bigoted lies, and that fact-checker services like Snopes.com have debunked all of those claims and found them to be false.
To those who are not familiar with organizations like Snopes, it is a leading progressive fact-checker site that claims to impartially verify information. But in reality, it’s a propaganda mill and one major source of fake news and for-pay information laundry service.
So following the age-old question of ‘who will guard the guards’ I decided to run some OSINT on Snopes which has been providing the squad with close air support and a thin veil of respectability. The results of the analytics strongly suggest that just like in the case of Rashida and Ilhan, key individuals in Snopes like David Mikkelson, the CEO, and his staff are not the most ethical or honest arbitrators of truth after all, and neither is their work product. In at least several instances the evidence, that includes drafts of fact checks and internal communications regarding strategy and disposition objectives, suggest that Snopes is a crypto PR firm dressed-up as a research organization.
Image 23: July 22, 2019, David Mikkelson’s from Snopes determination that Rashida Tlaib was not involved in election fraud and the AI based analytics to confirm the identify of the person in the image
Wash ‘N Clean and the Meme Laundromat The whitewashing services that Snopes provides can be illustrated through the case of Omar Mateen. After Omar’s Jihadi inspired terror attack in the Pulse Nightclub during which he murdered 49 people, Snopes’s leading fact-checker Kim Lacapria (in an attempt to distance him from democratic-progressive circles) claimed that just because Mateen was a registered Democrat with an active voter registration status didn’t mean he was actually a Democrat. She also argued that he might “have chosen a random political affiliation when he initially registered.” As can be seen in the image below, Seddique Mateen actively campaigned for Hillary Clinton and can be seen sitting behind her in a political town hall meeting. Seddique Mateen also logged over a dozen visits to the Obama administration white house, Congress, and state department. In fact, both he and his son were long term FBI assets with powerful democratic patronage. So clearly, Omar had a strong democratic party affiliation which could have been easily verified with even a superficial research.
Image 24: The CAIR affiliated Muslim Brotherhood Fort Pierce Islamic Center and its derivative terror network
Another noteworthy observation about the fact-checks is that paradoxically, in several cases, the source of some politically opposing content was traced to the same IP addresses/computing devices. So either these creators have an advanced form of bi-polar disorder, or they work for a sophisticated false information mill. This also suggests the existence of a 3C (Communication, Coordination, and Cooperation) type of a relationship between the content creators and the Snopes reviewers. In this symbiotic ecosystem, fake content is published with the sole purpose of later discrediting it and then using this affiliation to discredit other genuine materials.
As for the personalities of the Snopes CEO and his team, it doesn’t look like decency, ethics, character, and scruples are employment perquisites. This is also supported by Mikkelson’s former wife Barbara’s court fillings.
Image 25: Barabra Mikkelson’s court filling alleging that her former husband the CEO of snopes has embezzled $98K from the company and spent it on himself and the services of prostitutes
Image 26: David Mikkelson and his Snopes truth seeker partner Elyssa Young AKA Eryn O’Bryn (a former Libertarian Party Congressional candidate from Hawaii) in a variety of dramatic roles such as the pro-women title: “big t#*s girl loves getting raped”
Dostoyevsky Need not Apply If you are still looking for a crime and punishment style closure to the Israa murder, you won’t find it. The Palestinian police and security forces were fully aware of the multiple attacks against Israa (a patrolman came over to the house and there was a policeman at the hospital), but they deliberately avoided taking any action. The brothers, the honorable Rami, Ihab and Mohammed Ghrayeb, have since managed to disappear. After beating their sister 3 times and recording the act for posterity on a cell phone, Ihab packed his suitcase and hopped onto a plane to Canada. Last good IP address was a commercial block on Gooderham Dr. in Toronto.
I’ll spare you the savage video of the act, but if you want you can listen to the gruesome audio recording below:
Shorlty after Israa’s death, a user by the name Rose Alghafri posted this message in her memory:
“How can someone listen to her screams and remains without moving to help her?How can they murder their own child just because she posted a pic of herself? Arab women are still in great danger and we’ll forever be, humanity is just a word”
Rashida, Ilhan, and Linda, you should pay attention. The reason why Arab women are still in great danger is because of enablers like you. Maybe the time has come for you to re-focus your considerable political power and shift it from trying to destroy America and Israel (which do not have a real honor killing problem) and use it to help eliminate the terror in the lives of hundreds of millions of women around the world.
For the rest of us, let Israa’s final screams be a reminder of what to expect when we bulk import people like Imad Hamad, Rashida Tlaib, Ilhan Omar, and Linda Sarsour, or other types ‘ethnically diverse’ and ‘multi-culturals’ into western democracies.
Image 27: The Ghrayeb hit squad, brothers, Rami, Ihab and Mohammed and the father Baha’a (Besho)
The Failed Pursuit of the Greater Good A word of caution to the IC community as well about the ‘pursuit of the greater good’. It is tempting to use community based HUMINT using informants like Hamad to fight domestic terrorism. But short term tactical battle wins can’t win long term ideological war. Once someone like Imad Hamad gets entrenched, he will operate for 40 years and survive generations of agency handlers that come and go as they peruse their short term career goals, all while he, continues to implement his Muslim Brotherhood long term ideological roadmap.
To keep the intelligence CI and junkies coming for more, pushers like Imad create a dependency cycle that consists of squealing on some targets in their community, which in turn, results in a high visibility arrest, a media circus, and a lot of political capital for the agencies involved. In return, these agencies turn the blind eye to Imad’s vices (like being a serial sex predator) and allow him to continue to run his ‘civil rights’ business—which in reality is a terrorism incubator and its life support system. This cycle of squealing, high visibly media events, more autonomy for the informants repeats in perpetuum. For agenesis who lack the skills to infiltrate and disrupt Jihadi cells, this recruitment of local informants and ‘native’ talent becomes an addiction. Unfortunately, in addition this habit being as bad as using crack cocaine, it also allows the likes of Imad to create and operate large number of cancerous organizations such as AHRC, ADC, and CAIR with complete impunity.
Image 28: Now and then–The 40 years transformation of an all American suburban Dearborn Michigan community to an extremist fundamentalist enclave with the one of the largest number of residents on the US Terrorism Watchlist
For the politically minded agencies like the DOJ and FBI, the creed of pursuing the greater good results in them stepping over dollars to pickup pennies. It may be a shocking revelation, but the fact is that the impact of all of the Jihadi attacks on US soil including the 9/11 tragedy dwarf compared to the massive damage that organization like CAIR inflict on our society. In the long run, coddling the likes of Imad Hamad, Seddique Mateen, and his son Omar frays the fabric of our culture because it creates a multi-tiered justice system, rewards corruption, and destroys any government accountably through people like James Comey, who in order to cover up his agency’s’ mistakes ends up whitewashing the truth about someone like the Mateens.
Image 29: Seddique Mateen campaigning for HRC shortly after his Jihadi son Omar massacred 49 innocent people at the Pulse Nightclub in Orland. Seddique’s main message “I support everything that Hillary says especially her gun control measures because I want the US to be a safer place”
Image 30: The Omar Mateen story, the life of a rouge informant
A much better approach to dealing with domestic radicalization is to demand that civic and religious leaders, schools, and other institutions in communities like Dearborn stop implicitly and explicitly supporting terrorism (as is defined by the US State Department). This should include hate speech, financial, moral support, and advocacy. If that doesn’t work, then their financial resources should be seized and all guilty individuals should be deport by the busload. There should be no exception to any immigration fraud or ICE violations. I am sure that everyone, including Rashida Tlaib, would agree that the world and the lives of dozens of innocent Muslim women who were subjected to Imad’s sexual abuse over the past 30 years would have been better off if he was deported back in 1981.
Cultural subversion, religious intolerance, and destructive foreign political influence (e.g. the Muslim Brotherhood network in the US) are difficult problems to solve, and may even appear to be overwhelming. But in this regards, we can draw comfort from the knowledge that in the past, successive American generation faced similar challenges and found ways to addressed them through legal safeguard such as the Alien and Sedition Act, the Espionage Act of 1917, and the McCarran Internal Security Act. Perhaps the time has come to start work on the next safeguard litigation, the ‘Religious Subversion act of 2020’.
Image 31: The Jumaa Hezbollah US-Lebanon-South America drug and money laundering connection
Sources and content are based on the work of C. Jacob  Al-Ayyam (Palestinian Authority), December 20, 2008.  Al-Ayyam (Palestinian Authority), December 20, 2008.  Sawt Al-Nisaa (Palestinian Authority), December 3, 2008.  Al-Quds (Jerusalem), May 15, 2009.  Sawt Al-Nisaa (Palestinian Authority), December 3, 2009.  Al-Ayyam (Palestinian Authority), December 20, 2009.