RE: Department Homeland Security DHS (employees and individuals being managed by agency) &

Similar documents
Policing and Crime Bill

Human Trafficking. Lt. Rich Buoye Jacksonville Sheriff s Office Integrity / Special Investigations Unit

Criminal Code CRIMINAL CODE (AMENDMENT) (NO. 2) BILL, 2013 ARRANGEMENT OF CLAUSES

Human Trafficking. What is Human Trafficking?

FORM 1.1 INDIVIDUAL COMPLAINT Use This Form to File Your Own Complaint

3/1/2012. Federal Law on Human Trafficking. Massachusetts Law for Human Trafficking. Human Trafficking Sergeant Detective Donna Gavin Boston Police

Small Group Discussion:

A GUIDE TO POLICE SERVICES IN TORONTO

Unit 7 - Personal Involvement

FORM 1.3 COMPLAINT FOR GROUP OR CLASS Use This Form to File a Complaint for a Group or Class of Persons. BC Human Rights Tribunal GENERAL INSTRUCTIONS

Occasional Paper No 34 - August 1998

5. If I m in jail and my case is reduced from a felony to a misdemeanor, will I get out of jail?

Social Justice & Sex Trafficking Lesson Plan

Which Comes First, The Smuggling or The Trafficking?

Last Name First Name Middle Name Social Security Number. Street Address City State and Zip Code. Yes No If not, state Date of Birth

Journalism & Sex Trafficking Lesson Plan

Anne Arundel County Police Department Community Policing Program Annual Report for 2018

HUMAN TRAFFICKING ASSESSMENT FOR DOMESTIC WORKERS

Student Code of Conduct Procedure

A LEADER IN BEHAVIORAL INTELLIGENCE

Human Trafficking: Information for ESOL Teachers and Other Educators - Part 1

DISCIPLINE CODE DEFINITIONS

Indiana Education for Homeless Children & Youth (INEHCY) McKinney-Vento Homeless Education Program

Office of the Dean of Students. Dean of Students

-Labor and sex. -Men, women, boys, and girls. -International and domestic WHAT IS HUMAN TRAFFICKING? HUMAN TRAFFICKING.

L9. Electronic Voting

LAW REFORM (DECRIMINALIZATION OF SODOMY) ACT

UC POLICE DEPARTMENT REPORTS DASHBOARD

Operations. Prison Rape Elimination Act Lockup Standards

The 2016 Minnesota Crime Victimization Survey

ARKANSAS STATE POLICE PRIVATE BUSINESS RECOGNITION APPLICATION

UC POLICE DEPARTMENT REPORTS DASHBOARD

Introduction. CJEC Estimated Prison Admissions Versus Actual Admissions* Number of Inmate Admissions 3,000 2,702 2,574 2,394 2,639 2,526 2,374

Social Security. Don t be a Scam Victim- You re in Control. This presentation produced at U.S. taxpayer expense.

Complaint Form and Guide

Merchandizing in Human Flesh Marlene Weisenbeck, FSPA

Version 03/2009. You also need the separate guidance documents listed below, which you should read before making your application:

STUDENTS Regulation 2610

History & Sex Trafficking Lesson Plan

HUMAN TRAFFICKING BRIEF GRAND PRAIRIE POLICE DEPARTMENT

Portola Middle School and Highly Gifted Magnet. Discipline Talks

Your View Counts. In Lanarkshire. August March 2018

APRIL 2017 RECOGNITION AND PREVENTION OF DISCRIMINATION, HARASSMENT & VIOLENCE POLICY

Media Log Report Rev.01/26/12 From: 04/04/2016 3:16

Identities, Opportunities and Challenges

PRELIMINARY ANALYSIS OF South Carolina s Senate Bill 20

FLCS. Expectations & Guidelines

Charlotte-Mecklenburg 2015 Criminal Justice System Public Perceptions Study Quantitative Report

Unit 7 Political Process

Sergeants OSPRE Part 1 Statistics - Evidence

Inspectors OSPRE Part 1 Statistics - Crime

Decree umber 9. umber 14 for the year 2008 Internal Security Forces Penal Code. Chapter One Application of the Law

TABLE OF CONTENTS PART I: FUNDAMENTALS INTRODUCTION 1. CHAPTER ONE: CRIME AND PUNISHMENT 5 Overview of Crimes 5 Types of Crimes and Punishment 8

Barbados. POLICE 2. Crimes recorded in criminal (police) statistics, by type of crime including attempts to commit crimes

CommunityDispatch.com Community News and Information

General Survey 2015 Winnipeg Police Service A Culture of Safety for All

Human Trafficking Training for Transit Employees. Ruth Silver Taube South Bay Coalition to End Human Trafficking

ARKANSAS STATE POLICE SECURITY OR INVESTIGATION BRANCH LOCATION APPLICATION

RULE 33. Hamilton County Courthouse

Summer Science Camp Volunteer Counselor 2018 Application CHECKLIST

NTL APPLICATION FOR A NO TIME LIMIT (NTL) STAMP BY SOMEONE WHO ALREADY HAS INDEFINITE LEAVE T O ENTER OR REMAIN IN THE UK.

ARKANSAS STATE POLICE ALARM SYSTEMS BRANCH LOCATION APPLICATION

CALIFORNIA THEFT CRIMES UNDERSTANDING THE OFFENSES AND PENALTIES

Code of Conduct March 2015 CODE OF CONDUCT CODE OF CONDUCT FOR PERSONS ON METRO VEHICLES FACILITIES OR PROPERTIES

Anti-human trafficking manual for criminal justice practitioners. Module 2

Reconviction patterns of offenders managed in the community: A 60-months follow-up analysis

Click to edit Master title style

U.S. Laws and Refugee Status

SECTION Interfering with a University Function. SECTION Dishonesty. SECTION Damage, Theft, or Unauthorized Use of Property

Code of Conduct & Transit Suspension Policy Rules of Conduct and Inappropriate Conduct Transit Exclusion Procedure

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

For Informational Purposes (916) July 15, 2011

STRATEGIES FOR IDENTIFYING VICTIMS OF HUMAN TRAFFICKING. Tim Jefferson ALERT Tucson Outreach Coordinator International Rescue Committee

Violation Level at First Offense. (Level 1 offenses are generally nonseparable, Level 2 offenses are generally separable)

ARKANSAS STATE POLICE ALARM SYSTEMS COMPANY APPLICATION

"We would like to acknowledge that we are meeting on the traditional territories of the Lhtako Dene Nation"

TEXAS SEX-OFFENDER REGISTRATION AND NOTIFICATION

Referral. Have student call parent

PBA Local 382 Essex County DOC

Form AN Application for naturalisation as a British citizen

COURT OF APPEALS OF OHIO, EIGHTH DISTRICT

Oak Park Mall Enforcement Project--Summary

When Shoplifting Prevention Escalates to a Shoplifter Detention

Relevant Facts Penal Code Section (aka expungements ) Penal Code Section 17(b), reduction of felonies to misdemeanors Proposition 47 Prop 64

Incidents Current ordinance Enforcement Future ordinance Conclusions

RESIDENT SELECTION PLAN

COUNTY OF STANISLAUS

Huron-Perth Catholic District School Board

NIBRS Crime Types. Crimes Against Persons. Murder. Aggravated Assault. Forcible Sex Offenses. Non Forcible Sex Offenses. Kidnapping/Abduction

DISCLAIMER. Policy on bullying or harassment. Adopted by PGTC January 2017

Identity Theft Victim s Packet

Domestic Violence NSW

School site administrators may use discretion when warranted to provide other means of correction to suspension and/or expulsion.

ARKANSAS STATE POLICE ALARM SYSTEMS COMPANY RENEWAL APPLICATION

General Policies. Section of the Campus Regulations prohibits:

Triunfo YMCA. Youth & Government La Baya Dr., #106 Westlake Village, CA Tel Fax

Educational Resource Officer Report through School Years

REQUIREMENTS FOR EMPLOYMENT: To Be Provided By Applicant ***THESE DOCUMENTS ARE MANDATORY AND WILL BE VERIFIED AT THE TIME OF INITIAL INTERVIEW.

DAVIESS COUNTY DETENTION CENTER An Equal Opportunity Employer APPLICATION FOR EMPLOYMENT

For a conviction to occur in a criminal case, the prosecutor must

Transcription:

RE: Department Homeland Security DHS (employees and individuals being managed by agency) & fbi (payroll and outsourced workers). The following information was gathered from individuals connected to DHS (Broward County) as either an employee or individual being managed by DHS, through one of its criminal release into the community programs. Information and content for this summary was provided by fbi workers or individuals (immigrants and felons) with ties to that agency, locally. Information was also collected through personal observation. A. Types of individuals being employed by DHS and fbi (possibly receiving preference in hiring) 1. Criminals 2. Immigrants (many illegal),sex offenders, pedophiles, transsexuals/homosexuals, drug addicts B. DHS/fbi police officers versus regular police officers C. Criminals having access to government databases through both agencies D. Types of assignments (jobs) E. Thinking patterns and behaviors of individuals on network. F. How their network works 1. Example G. Financial cost to communities A. Types of individuals being employed by DHS and fbi (possibly receiving preference in hiring). Registration with DHS may be mandatory for some. 1. Career criminals are recruited from local jails, prisons, mental institutions and word of mouth (the associates of criminals already employed at these two agencies). 2. Immigrants, sex offenders, pedophiles, transsexuals/homosexuals, drug addicts. A large percentage of these individuals are categorized as mentally ill and are receiving monthly disability checks for mental illness, in addition to receiving money from these agencies for 1 P a g e

various jobs. These individuals refer to this money paid to them by these agencies (DHS/fbi) as under the table money. B. DHS/fbi police officers versus regular police officers. Another common thread that is noted; the individuals on this network seem to be antisocial, generally hostile towards ordinary people, especially women. The individuals on this network are violent and they habitually speak of their deep disliking for police officers in general. These individuals seem not to have this same aversion towards police officers connected to DHS or fbi. There appears to be a distinct difference between police officers connected to DHS/fbi and regular police officers at a given police department. To the public, police officers dressed in the same uniform, employed at the same police department are viewed as police officers representing that particular department. To the public there is no difference. However, there may be a significant difference. Here in Broward County, it is also noted that the police officers connected to DHS are usually immigrants. Possibly they are employed by DHS or fbi and sent to the local police departments. Although these police officers from DHS/fbi may be from the same police department and dressed in the same uniforms as the regular police officers from a particular department, the individuals (criminals) from these two agencies (DHS/fbi) seem to recognize a difference. These individuals (DHS/fbi connected) still express hostility towards police officers in general however, these individual appear not to consider the police officers connected to DHS or fbi as true police officers nor do they seem to feel threatening by them. And so there must be a difference. C. Criminals having access to government databases through both agencies. 1. The kind of individuals employed at these agencies are reflective of the kind of individuals who have access to the public s personal information through government databases. D. Types of assignments or jobs given to individuals Stealing Break-ins (homes, businesses, automobiles etc.) Vandalizing Driving around in traffic all day Walking around at malls Returning items to stores for refunds Riding city buses all day Hanging around various places Making crank calls to businesses Sending large groups of bogus emails or making harassing phone calls to community leaders, newspapers, radio stations or politicians 2 P a g e

Fake public demonstrations Approaching people and asking strange or petty questions Identity theft (will find and use look a-likes) Fake businesses or dummy corporations, fronts for illegal activities such as receiving government contracts. Fake call centers Credit card fraud, numbers stolen from private citizens and businesses Generally harassing people (violence; may physically attack someone, often women and children.) Exposing themselves in public (Usually homosexual males engage in this activity.) E. Thinking patterns and behaviors of individuals on network. These individuals believe, it is through their criminal activity or network that they gain power and influence. The peer and parent criminals within these agencies (DHS/fbi) provide a surrogate family for them. These individuals, most of whom have been told that they are stupid, dumb, crazy, deviant and unlikable have found acceptance at these two agencies. It also appears that the majority of these individuals have also been bullied as they put it, abused by someone, or rejected. According to DHS/fbi individuals, the upper level individuals promise them protection from local law enforcement. For payment or as a form of welfare, these individuals (criminals) are given access to government programs for housing and medicine (often fraudulently). Because of their unhealthy lifestyle and deviant sexual habits, many are infected and ailing. As a result of their dependence on drugs, free health care, reduced/free housing (a general lack of self-sufficiency), these individuals are willing to do nearly anything in order to remain a part of this network. Most of these individuals enjoy committing crimes, they have a long history of criminal activity and being a part of this network and committing crimes, makes them feel powerful, important, included, and connected. Their network functions primarily through cell phone texting. Images and information (often false) about a target/subject is sent to all of the individuals connected to this network, frequently and sometimes multiple times during a single day. This activity and method is childish and crude. It seems that most of their activity consists of name calling (public slander) and stealing. In addition to the upper level individuals involvement, immigrants, sex offenders, pedophiles, the mentally ill and children are among the participants. This method is basic, however over time this activity can do harm to a community, economically. F. How their network works 3 P a g e

Individuals For this example, individuals connected to DHS/fbi (Broward County) will be referred to as individuals. Target/Subjects A person (or entity) labeled a target is presented. A target or subject could be anyone, any private citizen (could also be famous). A target could be a teacher, a business owner, a county or state employee, a particularly successful or attractive person, a young person, an older person, a woman, a heterosexual man with children, a wealthy person/family, a middle class person/family, a police officer, a company etc. Who may be targeted? Any person or entity could be targeted. Typically, the target or subject is a person (or entity) these individuals would like to steal from or coerce into doing something on these individuals behalf. Often the person or entity targeted is seen as influential and powerful by these individuals or these individual imagine that the person or entity will become that way. These individuals (DHS/fbi criminals) view themselves as powerless, small, insignificant and unlikable. Obviously, some threats are real but since these individuals harbor these views of themselves and others, most of their perceived threats are imagined. These individuals general do not contribute to society in useful ways and so they feel powerless, insignificant and unlikable. Influential and Powerful people Examples of people seen as powerful or influential by these individuals include; people in the public eye (famous), politicians, people considered wealthy, business owners, people with much higher incomes, people from better families etc. Anyone could be considered influential and powerful by these individuals. It could simply be a well-adjusted, content person. Police officers are especially seen as powerful by these individuals. 1. Example of a person or entity being targeted. Individuals (DHS/fbi) criminals will attempt to gain a total involvement in a subject s life; socially (community and church involvement), financially, and through the subject s family. Their main goal is to disrupt a subject s life (or entity) by creating chaos and disorder. 4 P a g e

Using information from government databases, these individuals will find out all information about the subject regarding; finances, family members, employment history, business connections, memberships in organizations or clubs. This would include organizations like Red Cross, Habitat for Humanity etc. A group of (DHS/fbi criminals) will watch and attempt to interfere with subject s daily business and social activities. Groups of (DHS/fbi criminals) will attempt to gain access to the subject s family members. Individuals from these two agencies (DHS/fbi) may question former employers, former classmates, current employers, business associates or competitors. These agencies will usually have adults passing as children, enrolled at the subject s child s school in order to gather information about the subject from the subject s child. Individuals may join organizations and clubs the subject or subject s family members, business associates belong. Individuals will break into subject s home or business and steal. These individuals may also install hidden cameras in the subject s home and watch the subject in his home. This is what occurred in Anthony Marten s case. These individuals were watching Mr. Marten and his family in their home. Individuals (DHS/fbi criminals) may question or provide false information to subject s doctor behind the subject s back. Depending on the level of importance placed upon the subject (or entity), hidden cameras may be placed in places, routinely visited by the subject. This would include doctor s offices. Individuals may also be employed at restaurants and local establishments where the subject or the subject s close family members and associates visits. Individuals may attempt to stress the subject, using the legal system. Frivolous lawsuits or false charges may be levied against the subject. Other Gov. agencies may be used -as personal favors to these individuals- to harass the subject or entity. Individuals may use black males (transsexuals who appear to be females) for racial discrimination cases against businesses. White males (transsexuals who appear to be females) may be used for sexual harassment or various types of discrimination/victim cases. Individuals may attempt to block access for loans to businesses or other federal programs such as contract biddings. 5 P a g e

Individuals (DHS/fbi criminals) may attempt to illegally confiscate (steal) subject s property using a government agency. Individuals (immigrants and criminals) may be stationed in a nearby home or apartment in order to routinely break into the subject s home. Females or transsexual males (appearing to be female) are frequently used for these afternoon break-ins. These break-ins may not be detected by the subject because the premises maybe not be ransacked and the security alarm may still be intact and still activated when the subject returns home. If the individuals (thieves) are caught, they are promised protection from local law enforcement by the upper level individuals. Some of these individuals (criminals) are employed at security companies such as ADT and Vector. Local Locksmiths often employ some of these individuals, often unknowingly. Also, individuals from these two agencies may attempt to force or coerce a security company to comply with breaking to someone s home or business. These individuals may claim that they are doing a lawful investigation or these individuals may attempt to make light of the illegal request, to have access to a subject s security code. The individual approaching the security company may say something like; this person is an old friend or someone we know, we just want to have a little fun with them, it s no big deal. The individual attempting to unlawfully gain entry into a subject s home or business, may offer money -taken from one of the government agency s budget- or a favor to the business or person being solicited. If the subject is well known through his/her community, public embarrassment may be used as a threat for coercion. The main reason for this information gathering and slander by these individuals, is that they are seeking dirt on the subject or they are seeking to denigrate, discredit or sully the subject s reputation over time and to gain illegal access to a private citizen s property and money for the purpose of stealing it. These tactics are also used against businesses for the purpose of ruining the business or company, if the company does not comply with whatever these individuals are requesting. And it would be assumed that the request would always be something illegal and not in the best interest of the business and its people. Also a verbal request may not actually be made. A person or entity could be attacked by these individuals without the awareness of the person or the entity s leaders. These individuals (DHS/fbi connected) are criminals and so all of their activities against society and its members are criminal. G. Financial cost to communities 6 P a g e

Readers wishing for further information regarding the general financial cost of crime to communities can click and read this report: http://www.ncbi.nlm.nih.gov/pmc/articles/pmc2835847/ Submitted by Ms. Lilah Shahid, Florida resident. For any questions about this summary, I can be reached at 954.496.1907 or you may log on www.lilahshahid.wordpress for more information about our community cause; missing persons, prevention. And we are educating parents and students regarding sex offenders; the warning signs of an offender and the appropriate actions to take, with links to other community resources. 7 P a g e