Homeland Security – Law Street https://legacy.lawstreetmedia.com Law and Policy for Our Generation Wed, 13 Nov 2019 21:46:22 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.8 100397344 YouTuber Charged With Child Pornography Production https://legacy.lawstreetmedia.com/blogs/technology-blog/youtuber-child-pornography/ https://legacy.lawstreetmedia.com/blogs/technology-blog/youtuber-child-pornography/#respond Sun, 18 Jun 2017 14:48:24 +0000 https://lawstreetmedia.com/?p=61449

Are the allegations against Austin Jones indicative of celebrities abusing the fan-celebrity connection?

The post YouTuber Charged With Child Pornography Production appeared first on Law Street.

]]>
Image courtesy of Esther Vargas; License: (CC BY-SA 2.0)

YouTuber Austin Jones was charged with two counts of child pornography production in a Chicago federal court on June 13.

Jones, 24, allegedly solicited pornographic videos from two underage fans, according to a criminal complaint. In an affidavit, Special Agent of Homeland Security Investigations Michael Ploessl said Jones had communicated separately with two girls who had each identified themselves as 14 years old.

Ploessl said that during a videotaped interview with HSI, Jones waived his Miranda rights and admitted to having sexually explicit chats with the girls over Facebook in which he instructed them to make and send videos of themselves “dancing in a sexually explicit way” and performing sexual acts, despite knowing that the girls were underage.

Ploessl said Jones directed both girls, identified as Victim A and Victim B in the affidavit, to send him videos of themselves dancing in a sexual manner. According to Ploessl, Jones coached the girls on what to do, wear, and say in the videos, including telling each girl to explicitly identify her name and age at the beginning of the videos.

Ploessl said Victim A repeatedly told Jones that she was “tired and wanted to stop,” but that Jones pushed her to continue. Ploessl said Victim B also expressed her discomfort with what Jones was asking her to do, but Jones continued to pressure her, repeatedly calling her his “biggest fan.” Victim A sent Jones approximately 15 videos; Victim B sent approximately 25. According to the affidavit, several of the videos depicted Victim A and Victim B dancing nude from the waist down.

If convicted, Jones could face up to 30 years in prison.

People on social media reacted to the news about Jones. Some condemned him for “[abusing] his position as a public figure.”

One ex-fan burned some of their Austin Jones memorabilia, including an Austin Jones poster and shirt.

Another said they were not surprised by the news after similar allegations surfaced a few years ago.

These are not the first allegations of Jones pressuring underage girls to send him videos. In May 2015, screenshots of alleged messages, as well as more detailed explanations of those message interactions, between Jones and a girl named “Ashley” were posted on the website PupFresh. In that article, “Ashley” said she and Jones started talking during a Facebook Q&A at which point they began messaging one another privately and Jones asked her to send him videos of her twerking. Other women have made online posts and videos accusing Jones of similar actions, but thus far only two unnamed individuals are referred to in the complaint.

In June 2015, Jones uploaded a video on YouTube in which he responded to the accusations against him. Jones apologized for his conduct but denied that anything went beyond twerking.

“Nothing ever went further than twerking videos,” Jones said in the video. “There were never any nudes, never any physical contact.”

Jones’ case is one among a growing number of allegations against YouTubers–most of whom are white men–who have allegedly used their status as internet personalities to coerce fans and other individuals into uncomfortable situations, abusive relationships, and incidents of sexual assault and/or rape.

In 2014, at least four women came forward to accuse British YouTuber Sam Pepper of inappropriately touching them and/or sending them inappropriate messages. Three of those four women were under the age of 18 at the time of their alleged interactions with Pepper, according to BuzzFeed News.

Also in 2014, several individuals accused another British YouTuber, Alex Day, of pressuring them into sexual situations and having inappropriate relationships with fans. Day initially denied the allegations, but eventually admitted to having “occasionally manipulative relationships with women” in a Tumblr post from his account that his since been deactivated. However, Day maintained in another Tumblr post that “at no point in my life have I ever had a sexual relationship with someone under the age of consent.”

Organizations like Thorn, an international anti-human trafficking organization, are working to address the sexual exploitation of children and to eliminate the production and spread of child sexual abuse material (CSAM). In addition to providing resources for trafficking victims, Thorn is advocating for increased intelligence sharing among organizations that are fighting child trafficking to decrease redundancy and inefficiency. Thorn also communicates with people searching for CSAM to encourage them to seek help and deter them from exhibiting harmful behavior.

Ploessl’s affidavit did not say that Jones had circulated the videos he had received from the girls. While Thorn is working to end sexual exploitation of children by tracking the circulation of CSAM, it can be difficult to track CSAM that perpetrators are keeping solely for themselves.

Unlike television and film celebrities who are largely unreachable to fans, YouTubers and other internet stars often establish more personal relationships with their fans and are able to connect with their viewers in real-time thanks to social media. For many, YouTube is a community where fans and creators can have meaningful, appropriate interactions with one another. But the combination of YouTubers’ perceived relatability and celebrity status can result in some creators abusing that fan-creator relationship.

In his conversation with Victim B, Jones allegedly asked her, “do you realize how lucky you are?!?!” and told her that she needed to “prove” that she was his biggest fan. Jones allegedly told Victim B things like “I guess you really aren’t my biggest fan…..ok then” and “I’m just trying to help you! I know you’re trying your hardest to prove you’re my biggest fan. And I don’t want to have to find someone else,” according to the affidavit.

By reinforcing the idea that they should be placed on a pedestal and worshiped, some celebrities have forced fans into situations in which they do not or cannot consent to. If the allegations of YouTubers manipulating and abusing their fans are any indicator, increased accountability within the YouTube space is a necessary step in ending certain internet personalities’ predatory behavior toward vulnerable, underage fans.

Marcus Dieterle
Marcus is an editorial intern at Law Street. He is a rising senior at Towson University where he is double majoring in mass communication (with a concentration in journalism and new media) and political science. When he isn’t in the newsroom, you can probably find him reading on the train, practicing his Portuguese, or eating too much pasta. Contact Marcus at Staff@LawStreetMedia.com.

The post YouTuber Charged With Child Pornography Production appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/blogs/technology-blog/youtuber-child-pornography/feed/ 0 61449
How Did the DHS Mistakenly Grant Citizenship to 858 Immigrants? https://legacy.lawstreetmedia.com/issues/politics/dhs-mistakenly-grant-citizenship-858-immigrants/ https://legacy.lawstreetmedia.com/issues/politics/dhs-mistakenly-grant-citizenship-858-immigrants/#respond Wed, 12 Oct 2016 20:32:40 +0000 http://lawstreetmedia.com/?p=55744

How could this happen?

The post How Did the DHS Mistakenly Grant Citizenship to 858 Immigrants? appeared first on Law Street.

]]>
"U.S. Passport" Courtesy of [Damian Bariexca via Flikr]

An Associated Press report released in September revealed that the Department of Homeland Security had “erroneously” granted at least 858 immigrants American citizenship. Typically, in any presidential election season, political parties would seize on a report like this, and would try to spin it to win the election. An issue concerning immigration is a political match to be lit, and the reactions could be explosive. Considering immigration reform has been one of the top priorities for legislators, the report may be especially relevant.

Pundits are asking questions about whether this report showed the Obama administration attempting to streamline citizenship applications to get more Democratic voters. Republican officials are seizing on an email asking Homeland Security employees to work overtime in order to process more applications. Then again, this may be a case of an honest mistake, one where overworked bureaucrats may have overlooked a key step in admitting immigrants into our country.

In large bureaucracies like the U.S. federal government, administrative errors do occur, but the scope of this issue has raised concerns about who was granted citizenship, where we went wrong, and asking what can we do to make sure this doesn’t happen again.


The Inspector General Report

The Associated Press highlights an Inspector General’s report, titled “Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records,” regarding a review on whether the United States Citizenship and Immigration Services successfully uses its fingerprint record database to access any applicant’s information. The 24-page report showed that Immigration and Customs Enforcement, or ICE, is still grappling with digitizing its old records, and this lag in information can spread to other agencies in the attempt to legitimately do background checks on immigrant applicants.

When considering an immigrant from a “special interest country,” places that pose a risk to U.S. national security or have high rates of immigration fraud, applies for citizenship, it becomes very important to conduct a background check. The check makes sure that the immigration applicant does not misrepresent who they are for the sake of admission into the country. Additionally, a background check is a reliable tool for apprehending criminals who are trying to enter the contract for intentionally unlawful purposes. The fingerprint database can be accessed either before or after an interview with an ICE officer. The check into the database allows a verification into the identity of the applicant, and any lapse in consistent ‘digital bookkeeping’ can undermine that responsibility.

This lapse is what allowed the more than 800 immigrant applicants to be granted citizenship (and avoid deportation) because the Department of Homeland Security did not have reliable digital archiving, rendering the appearance that these applicants had clean backgrounds.

While the 858 immigrants that were granted citizenship do not appear to be an imminent threat to the United States, most come from “special interest countries.” Although the report does not define which countries fall under the “special interest” category, countries that are currently in conflicts or have high rates of immigration fraud such as Syria, Iran, or Yemen can be considered to be some of those in question. Applicants may use different names and birthdays, and without cross-checking fingerprint information, it becomes hard to weed out those who are illegally attempting to enter the country.

Once anyone receives their citizenship, they receive the corresponding American rights and privileges. The report shows that three applicants had gone on to receive jobs handling classified information. One received a Transportation Worker Identification Credential, allowing access onto secure naval bases or ships. The other two received Aviation Worker credentials, granting access to secure areas in airports. Another immigrant went into law enforcement. Ever since the Inspector General’s report, all credentials have been revoked.

Apart from the staggering number of immigrants that were admitted wrongfully, the report sheds light on America’s information gap between its federal agencies. Fingerprint records were not consistently acquired in the same way. One agency may have fingerprint files that are not digitized at all, while another may have an entire online archive. This makes it difficult for agencies that need to coordinate with each other in order to successfully perform their operations.


The Agency Info-Gap

In order to talk about what information is needed to successfully complete an immigration application into the United States, it is necessary to point out the steps people need to take to get past the review process in general.

The video below outlines initial actions an applicant needs to take before an interview with an ICE official:

The sample video from ICE below shows how an interview usually happens, including what questions are asked and how to answer them:

Throughout the citizenship process, ICE has to conduct background checks, which includes searching fingerprint information. If you are from a “special interest country,” there are some additional steps necessary to complete the process, such as cross-referencing your information with the FBI fingerprint database.

The problem is that agencies have inconsistent information acquisition, which means that everyone has a different way of receiving and storing their information. The Department of Homeland Security only started to consistently digitally archive its fingerprint bank in 2010. The act of digitally uploading and archiving fingerprints is a tedious process, which may not catch up with the stream of citizenship applications. According to an email that urges DHS employees to speed up their application review process, the end of the year is a time when applications are at an especially high volume. When the priority is to successfully process applications, certain security protocols can slow the down the process, especially if agency cross-referencing is necessary.

The Inspector General’s report points out that 148,000 immigrants who have final deportation orders or who are criminals or fugitives do not have their fingerprints digitized. If these immigrants have any criminal record, it becomes difficult to proceed with a case against them if there is no way to confirm their identity. The FBI can only do so much if there is no digitized record of an individual in its system.

In a statement regarding his report, DHS Inspector General John Roth said:

This situation created opportunities for individuals to gain the rights and privileges of U.S. citizenship through fraud. To prevent fraud and ensure thorough review of naturalization applications, USCIS needs access to these fingerprint records. DHS agreed with our recommendations. ICE has plans to digitize and upload all available fingerprint records, and the Department has told us it plans to review the eligibility of each naturalized citizen whose fingerprint records reveal a deportation order under a different identity. We will continue to monitor DHS’ progress.


Why This Is So Important

Immigration is consistently ranked as one of the top concerns for American voters every election year. After the failed Gang of Eight immigration reform bill, the attempt at reaching consensus on immigration has fizzled. Both sides of the debate have become more partisan in nature, making it very difficult to strike a deal and get a bill passed through Congress. Donald Trump started off his presidential race with a pitch accusing Mexican immigrants of bringing drugs into the country, whereas Democrats are pointing out that illegal immigration amounts to millions of individuals just overstaying their visas.

No matter the root cause of a broken immigration system, one thing that can always streamline the process of admitting new immigrants is by having a uniform background check system that is archived online for easy access. Currently, ICE checks fingerprints through two systems: the FBI’s Integrated Automatic Fingerprint Identification System (IAFIS) and the DHS Automated Biometric Identification System (IDENT). Although an agency may have different reasons for checking a fingerprint file, the archive has to be universal so as to make a search as efficient as possible.

Immigrants make up 13 percent of the total U.S. population as of 2014, according to the Migration Policy Institute, and that percentage only continues to grow. Critics point out that if the issue with immigration is that there are too many people who are here illegally, and that is due to overstayed visas, it may be an administrative issue on the federal government’s end that needs to be resolved. One example is a gap in digitized information that the government needs to archive so that it is easier to catch immigrants that may be of higher concern for the country.

Additionally, calls for border security may be issued in spite of not knowing that our federal government has an administrative issue to resolve. For example, one common misconception is the idea that Mexican immigrants are overflowing our southern border. The Pew Research Center found that since 2014, Mexican immigrants are returning back to Mexico more than actually immigrating to the U.S.

Proponents of immigration point out that immigrants are a huge economic boon for the U. S. as well, and fixing our information gap can be a good way to streamline capturing immigrants with criminal records as opposed to rounding up hard-working families looking to achieve their American Dream. Of the more than 11 million unauthorized immigrants currently in the U.S., ICE has deported almost 178,000. ICE has also issued one million ‘detainer requests’ that ask local officials to detain and then transfer suspects to DHS custody. It is evident that our immigration officials are hard at work identifying individuals who are unauthorized to be in the U.S. and that our border is not as porous as some might believe.


Conclusion

The DHS was audited by its Inspector General, a routine check and balance on a federal agency tasked with enforcing the laws passed by Congress. John Roth, the Inspector General, has done a very good job identifying where DHS is lacking in terms of its ability to enforce our country’s immigration laws. If our executive agencies finish archiving fingerprint and other identification files, and streamline ways to access this information, we might have a shot at fixing our immigration system.


Resources

Primary

USCIS: Immigration and Nationality Act

Dennis Futoryan
Dennis Futoryan is a 23-year old New York Law School student who has his sights set on constitutional and public interest law. Whenever he gets a chance to breathe from his law school work, Dennis can be found scouring social media and examining current events to educate others about what’s going on in our world. Contact Dennis at staff@LawStreetMedia.com.

The post How Did the DHS Mistakenly Grant Citizenship to 858 Immigrants? appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/issues/politics/dhs-mistakenly-grant-citizenship-858-immigrants/feed/ 0 55744
The U.S. Needs to Take a Firm Stand Against China on Cyber Attacks https://legacy.lawstreetmedia.com/blogs/technology-blog/u-s-needs-take-firm-stand-china-cyber-attacks/ https://legacy.lawstreetmedia.com/blogs/technology-blog/u-s-needs-take-firm-stand-china-cyber-attacks/#respond Thu, 11 Jun 2015 15:50:24 +0000 http://lawstreetmedia.wpengine.com/?p=42886

The back-and-forth battle is far from over.

The post The U.S. Needs to Take a Firm Stand Against China on Cyber Attacks appeared first on Law Street.

]]>
Image courtesy of [Global Panorama via Flickr]

Last Thursday, United States officials revealed that they believe Chinese hackers were responsible for the May cyber attacks on U.S. federal agencies. The attacks compromised the personal information of more than four million current and former government workers. China responded by dismissing such accusations as “groundless” and “irresponsible,” stopping just short of ensuring that China does not condone cyber attacks. “We are very firm on this,” said China’s Foreign Ministry Spokesman Hong Lei. This is just the latest incident in a back-and-forth saga between the U.S. and China when it comes to cyber crimes.

Lei’s statement may not have been completely truthful. In May 2014, Lei released a similar response to the Justice Department’s indictment of five Chinese hackers for cyber crimes against five U.S. companies and a labor union in the steel, solar, and nuclear-power industries. According to the Guardian, “China’s foreign ministry called the allegations preposterous and accused the U.S. of double standards.” But the accused in the 2014 case were members of China’s People’s Liberation Army. In other words, their attacks do represent China engaging the United States. It is evident that the U.S. must take a firm stand against China’s aggression. Nevertheless, there are numerous challenges and implications to consider on that front.

For one, China’s assertion that the U.S. resentment of Chinese attacks represents a double standard is justified. Edward Snowden’s release of NSA files unveiled a surveillance program that spanned numerous countries, including China. In March of last year, Snowden leaked another document exposing the NSA’s penetration into the networks of Chinese telecommunications giant Huawei Technologies in search of evidence that the company was involved in espionage operations for Beijing. This complicates how far the U.S. can go to condemn China’s actions in the cyber sphere.

The potential costs of engaging China in cyber warfare are massive. Cyber attacks can threaten the control systems of dams, water-treatment plants, and power grids, compromise sensitive information stored on government networks, and access video surveillance cameras. Electronic door locks, elevators, and even life-sustaining medical devices are vulnerable to cyber attacks. While the U.S. rarely has to worry about war in its territory, in the cyber realm, physical boundaries are irrelevant. The statistics regarding the cost of cyber crimes are staggering. The Center for Strategic and International Studies estimates the annual cost of cybercrime and economic espionage to the world economy at $375-575 billion. Telecommunications giant IBM claims that there were 1.5 million monitored cyber attacks in the United States in 2013 alone. In a “60 Minutes” interview, FBI Director James Comey said, “There are two kinds of big companies in the United States. There are those who’ve been hacked by the Chinese, and those who don’t know they’ve been hacked by the Chinese.”

Political action is fraught with challenges, too. China, with its massive population and rapidly developing economy, lends itself to lucrative opportunities for American corporations. Consequently, the Chinese and U.S. economies are closely intertwined. According to the CIA World Factbook, China ships 17 percent of its exports to the U.S. and is the largest foreign holder of U.S. Treasury bills, bonds, and notes. So, the government response to Chinese cyber attacks cannot deter China from doing business with American corporations. Germany’s cancellation of its longstanding contract with Verizon following Snowden’s NSA leaks serves as a cautionary tale, and the fact that most major Chinese corporations are government owned only further complicates the issue.

So, the U.S. government is left with few options. One thing it can do is encourage the development of cyber technology. The government should support programs such as the DARPA Cyber Grand Challenge, a competition aimed towards creating an automated cyber defense system, and incentivize the best cyber experts to work with the government by providing resources and appropriate compensation.

More importantly, the government needs to send the message that attacks on American networks will not be tolerated. This could mean under-the-table threats of retaliation to avoid negative media attention. Fear of retaliation should deter Chinese attacks, and if attacks persist, the government can deny visas to Chinese citizens, limit military ties, or implement economic sanctions. It is important to keep the campaign low-key and ensure that economic sanctions do not incite an aggressive Chinese response.

Examples of the United States asserting itself following a breach of security are littered throughout history; the U.S. defeat of Japan following Pearl Harbor and the assassination of Osama bin Laden following 9/11 demonstrated that we are not afraid to track down and engage our enemies. It is time to assert our status as the world’s leading superpower once again.

Hyunjae Ham
Hyunjae Ham is a member of the University of Maryland Class of 2015 and a Law Street Media Fellow for the Summer of 2015. Contact Hyunjae at staff@LawStreetMedia.com.

The post The U.S. Needs to Take a Firm Stand Against China on Cyber Attacks appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/blogs/technology-blog/u-s-needs-take-firm-stand-china-cyber-attacks/feed/ 0 42886
Does the TSA Really Keep You Safe? https://legacy.lawstreetmedia.com/blogs/crime/tsa-really-keep-safe/ https://legacy.lawstreetmedia.com/blogs/crime/tsa-really-keep-safe/#respond Thu, 04 Jun 2015 14:52:40 +0000 http://lawstreetmedia.wpengine.com/?p=42221

Recent tests embarrass the TSA once again. Is current airport security effective?

The post Does the TSA Really Keep You Safe? appeared first on Law Street.

]]>
Image courtesy of [redjar via Flickr]

The Transportation Security Administration agents recently failed 67 out of 70 total tests, missing 95 percent of the of mock explosives and weapons that were smuggled into airports by undercover Homeland Security Red Teams, ABC News Reported.

Since the administration’s last review in 2009, the Department of Homeland Security spent $540 million on checked baggage screening and $11 million to train Transportation Security Administration (TSA) agents. Despite these expenditures, ABC news notes that the TSA has “failed to make any noticeable improvements in that time.” Professors John Mueller and Mark Stewart further reviewed homeland security expenditures using a cost-benefit analysis. They conclude, based on the costs of security and the financial damages of potential attacks, American spending has not produced the necessary results.

The failed airport security tests come at the worst possible time for the TSA. In the past couple months, we have witnessed multiple breaches in airport security. In April, a teenager snuck into a wheel well on an airplane leaving from the West Coast and flew all the way to Hawaii. In late May, a man was able to bypass airport security at LAX, only to be subdued by a TSA officer with a taser as he reached gate 66.

Last August, a woman was able to board a plane in San Jose without a ticket. The woman made it all the way to her destination before being arrested by police, who later determined that the she suffered from a mental illness.

After news of the recent Red Team tests emerged, Secretary of Homeland Security Jeh Johnson said,

Changes will be made in response to the identification of the vulnerable aspects by these tests.

According to the ABC News report, one undercover agent was actually stopped after setting off the alarm at the magnetometer, but after a pat down, TSA agents failed to find fake explosives taped to the undercover agent’s back.

The question now becomes, what new security measures will be enacted by the TSA, and will these new measures be any more effective?  The TSA recently started testing electronic devices traveling to and from overseas cities at many U.S. airports with direct international flights. The new rule will require passengers to power on their devices when arriving at security checkpoints for overseas flights. If the device will not power on, it will not be allowed past airport security checkpoints.

Many passengers feel this does not adequately address all the security concerns as it is only being implemented in select airports and does not address the problem of passengers smuggling bombs and weapons on their bodies, which TSA agents failed to detect in the mock testing. In 2014, the TSA  confiscated 2,212 firearms at 24 airports after screening nearly 653 million passengers, a 22 percent increase from 2013 where only 1,813 firearms were confiscated.

With external security threats remaining high according to terrorism experts, it is imperative to keep internal security at its best. Homeland Security has used Red Teams for the last 13 years to detect security flaws; however, the changes never seem to address the problems accurately. NBC News notes that since 2002, TSA agents failed similar Red Team tests on several occasions, indicating that there are many existing security flaws yet to be addressed.

NBC recently learned that 270 TSA security badges went missing at the San Diego International Airport over the last two years. These missing badges would allow non-Homeland Security personnel to gain access to restricted locations within the airport. As of March 2015, the Hartsfield-Jackson Airport in Atlanta saw more than 1,400 badges go missing over a similar time period.

How are we supposed to trust TSA agents with our lives when they can not be trusted with their own badges? Unless the TSA is able to completely restructure the airport security system, it is unlikely that new changes will make a large enough difference to deal with existing security threats.

Jennie Burger
Jennie Burger is a member of the University of Oklahoma Class of 2016 and a Law Street Media Fellow for the Summer of 2015. Contact Jennie at staff@LawStreetMedia.com.

The post Does the TSA Really Keep You Safe? appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/blogs/crime/tsa-really-keep-safe/feed/ 0 42221
Mall of America Threatened in Al-Shabaab Terrorist Video https://legacy.lawstreetmedia.com/news/mall-america-threatened-al-shabaab-terrorist-video/ https://legacy.lawstreetmedia.com/news/mall-america-threatened-al-shabaab-terrorist-video/#comments Mon, 23 Feb 2015 21:29:00 +0000 http://lawstreetmedia.wpengine.com/?p=34867

A new video released by militant Islamist group al-Shabaab has mall-goers on alert.

The post Mall of America Threatened in Al-Shabaab Terrorist Video appeared first on Law Street.

]]>
Image courtesy of [jpellgen via Flickr]

A new video supposedly released by the militant Islamist group al-Shabaab has mall-goers in the United States, Canada, and U.K. on alert.

In the six-minute video, a disguised member of the Somali terror group affiliated with al-Qaeda called for attacks on the Mall of America in Bloomington, Minnesota, West Edmonton Mall in Canada, and the Oxford Street shopping area in London. Most sources have taken down the video, but you can see a still from it in the tweet below.

This is the same organization that claimed responsibility for the horrific four-day-long attack on Westgate Mall in Nairobi, Kenya, that killed at least 67 civilians in 2013. The speaker in the video allegedly celebrates this attack, showing graphic images while accusing Kenyan troops in Somalia of committing abuses against Somali Muslims. He also claims al-Shabaab was responsible for the Friday attack on a hotel in Somalia’s capital.

Using Westgate as a warning for other malls, an image of the Mall of America is shown in the video alongside its GPS coordinates, sparking a swift response from mall officials. They have already begun to beef up security and are asking shoppers to stay vigilant telling CNN:

We take any potential threat seriously and respond appropriately. We have implemented extra security precautions; some may be noticeable to guests, and others won’t be.

In light of the Westgate attack, the Department of Homeland Security and the FBI should be taking this video seriously. However, they initially downplayed the threat, releasing a joint statement Sunday saying that they were not “aware of any specific, credible plot against the Mall of America or any other domestic commercial shopping center.” They went on to say in the statement:

In recent months, the FBI and DHS have worked closely with our state and local public safety counterparts and members of the private sector, to include mall owners and operators, to prevent and mitigate these types of threats.

DHS Chief Jeh Johnson appeared on several Sunday news shows to address questions on the potential terror threat and reassure the American public that it’s “still ok to shop.” With each of his messages on vigilance, he ended with explaining why now, more than ever, DHS needs its $40 billion funding approved before the February 27 deadline. If gridlocked lawmakers fail to agree in the next three days, the department will be left with no funding while hundreds of thousands of employees are forced to report to work without pay. Congress’ unwillingness to agree is the same kind of embarrassing display that led to the 16-day-long federal government shutdown in October 2013.

So far, no mall attacks have been reported since the release of the video, but shoppers are still being urged to be careful and keep an eye out for suspicious behavior. Unfortunately, judging the legitimacy of terror threats sent through videos has become even harder when some, like those from ISIS, prove to be far too real.

Alexis Evans
Alexis Evans is an Assistant Editor at Law Street and a Buckeye State native. She has a Bachelor’s Degree in Journalism and a minor in Business from Ohio University. Contact Alexis at aevans@LawStreetMedia.com.

The post Mall of America Threatened in Al-Shabaab Terrorist Video appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/news/mall-america-threatened-al-shabaab-terrorist-video/feed/ 1 34867
NYPD Busts $22 Million Counterfeit Goods Operation https://legacy.lawstreetmedia.com/blogs/nypd-busts-22-million-counterfeit-goods-operation/ https://legacy.lawstreetmedia.com/blogs/nypd-busts-22-million-counterfeit-goods-operation/#comments Fri, 12 Dec 2014 11:30:50 +0000 http://lawstreetmedia.wpengine.com/?p=29990

Why can't the NYPD stop the clearly fake designer purses being sold on sidewalks?

The post NYPD Busts $22 Million Counterfeit Goods Operation appeared first on Law Street.

]]>
Image courtesy of [Fairfax County via Flickr]

Ah Canal Street; one of the few places in New York where you can score “designer” bags, gold chains, and a bong all for under $1,000. Even this future Intellectual Property lawyer has owned her fair share of counterfeit handbags from the Chinatown locale. But as a tween who just wanted a fake Louis or Chanel like everyone in my middle school, it never really made sense to me how my relatives would get their hands on them. I heard stories about being taken “behind the scenes” to the warehouses where the better stash of goods is kept. I heard about the cops coming to bust these vendors for selling without a permit. But none of these stories ever answered the real question I always had: how do these vendors throughout the city persist when everyone knows (including cops standing nearby) that they either do not have a proper permit, are selling counterfeit goods, or both?

On Tuesday, the NYPD and U.S. Homeland Security officials raided a storage unit in Queens full of about $22 million worth of counterfeit goods. The raid followed a seven-month investigation and resulted in seven arrests. This kind of takeover is what police call an “Operation Treasure Hunt” and took about 30 minutes to execute. I highly suggest clicking over to WWD to view pictures of the facility and all the goods it contained, because it’s truly astounding. From fake Gucci and Chanel handbags to Beats headphones and fake Uggs, these guys had it all. Rarely do you ever get to see a successful takedown of Canal Street vendors like this. But why is that? Why can’t the police just approach these guys who are selling on the street?

As a kid, my mom tried to relieve my conscience claiming that my LV-monogramed bag was probably real but was just stolen. But does that make it any more ethical? In hindsight, it kind of made it a lot worse; however, regardless of whether these goods are stolen or just really good knockoffs, any Canal Street vendor or distributor is guilty of at least one of these things.

One reason these vendors may get off the hook is that they are merely a third party selling the goods, not making them. Also, I doubt most NYPD even know about the designers these bags are trying to imitate, nevermind the standards for what counts as a knockoff and what does not. The only way the police can shut down these vendors is by asking if they have proper permits, and if they do there’s nothing they can do about it.

The case with the storage unit in Queens required a lengthy investigation so that the police could acquire enough evidence to warrant a search. Also it’s a much more effective tactic to take down the counterfeit industry by heading straight to the source, as opposed to approaching every single business on Canal Street.

Maybe it’s time to start training the NYPD to have a more keen eye for spotting counterfeit goods. Every year counterfeit products can cost the global economy up to $250 billion. Manhattan is not the crime-ridden place that it once was, so a lot of police officers are often seen just standing around offering surveillance. And while counterterrorism should definitely  be a primary concern in this day and age, that doesn’t mean police can’t multitask and try to stop this form of economic terrorism too.

Katherine Fabian
Katherine Fabian is a recent graduate of Fordham University’s College at Lincoln Center. She is a freelance writer and yoga teacher who hopes to one day practice fashion law and defend the intellectual property rights of designers. Contact Katherine at staff@LawStreetMedia.com.

The post NYPD Busts $22 Million Counterfeit Goods Operation appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/blogs/nypd-busts-22-million-counterfeit-goods-operation/feed/ 1 29990
Obama, Perry, and the Crisis at the Texas Border https://legacy.lawstreetmedia.com/blogs/culture-blog/obama-perry-crisis-texan-border/ https://legacy.lawstreetmedia.com/blogs/culture-blog/obama-perry-crisis-texan-border/#comments Wed, 09 Jul 2014 10:30:44 +0000 http://lawstreetmedia.wpengine.com/?p=19938

Hey y’all! President Obama will be coming to Texas today. Yippee! Thankfully he doesn’t plan to come to Houston so I don’t have to worry about the traffic jam disasters he tends to create. We Houstonians have to deal with horrible traffic day in and day out so having that additional stress just makes us […]

The post Obama, Perry, and the Crisis at the Texas Border appeared first on Law Street.

]]>

Hey y’all!

President Obama will be coming to Texas today. Yippee! Thankfully he doesn’t plan to come to Houston so I don’t have to worry about the traffic jam disasters he tends to create. We Houstonians have to deal with horrible traffic day in and day out so having that additional stress just makes us less friendly.

Let’s get to the more important stuff: President Obama, Governor Rick Perry, and immigration. So much has come out about these three in the last couple of days that it is making me mad.

But first I want to address the petty topic that Governor Perry has declined shaking President Obama’s hand when he hits the mean Texas tarmac. When I first read this headline I thought, “Oh great, something else for Democrats to grab on to and slander Texas and Republicans with,” but once I read the blurb that went along with that headline it actually makes sense. I love Governor Perry and although I don’t agree with him on everything, I do agree with him on not wanting to simply shake Obama’s hand and take a few pictures. Despite our differences you should always show respect to our Commander in Chief (until Texas secedes from the Union — though we all know that isn’t legal or likely). But if our good ol’ President is going to come to Texas he should probably squeeze in a little time to talk to the Governor and see what’s going on at the border instead of hitting up Democratic party circuit. Squeeze in reality for a few hours sir, you might look like you care about what’s happening down here.

Moving on to something a bit closer to home and a little more important: a Houston Independent School District (HISD) middle school is being considered as housing for immigrant children. I am the product of a HISD education — a craptastic one at that — and my intelligence and creativity come from hard work and influences outside of the HISD realm, but I still feel it is necessary to share that tiny bit of information. HISD is the largest school district in Texas, seventh largest in the United States, and it has 282 schools. Yes nearly three hundred schools, but how many of those are actually in use?

HISD was so kind as to give Homeland Security officials a nice little tour of an abandoned middle school in the Houston area. Why would Homeland Security want to come visit an abandoned school, you ask? Well it’s because this building is being considered for housing for undocumented children who have crossed the Texas-Mexico border in recent months. Most of these kids crossed the border illegally and alone, which has now turned into another issue that the U.S. is being forced to handle. Typically Border Patrol is required to transfer all unaccompanied children over to the federal Office of Refugee Resettlement within 72 hours, but because so many children — 52,000 since October 2013 — have crossed the border it is taking more time and resources to house all of these illegal children. Surprisingly by law, all illegal alien children who are not from Mexico cannot be immediately deported without an additional investigation to ensure that these children are not victims of sex trafficking.

It was news to me to find out that Terrell Middle School, the site of the tour, had been closed since 2001 and is now simply a storage unit for the district. So instead of taking the hard-earned tax dollars of Houston locals and putting them into keeping Terrell as a school, people like Congresswoman Sheila Jackson Lee and the higher ups within HISD feel it is okay to turn it into a housing facility for children. I have never been a fan of Congresswoman Lee and certainly have very little respect for anyone at HISD, but this is getting a little bit ridiculous. Allowing an abandoned school to go unused is infuriating, but then to turn it into federal housing is even worse. Yes, these children need a place to stay but it is not the responsibility of a school district to house children and the federal government should probably get its act together and do what needs to be done. Terrell could be reopened had HISD used a little bit of a $1.9 BILLION bond to update it instead of just letting it sit there while they tear down and rebuild schools that really don’t need to be renovated or rebuilt altogether.

What else could the abandoned middle school be used for instead of just housing for immigrant children and storage for HISD? Well, the school could be torn down and the property sold to a private investor to create more housing or a shopping center for the area. Or even use the land as a sports arena. At the end of my neighborhood is a parcel of HISD property that is all baseball fields rented out to a local little league association for $1 a year. HISD doesn’t even care to profit from what it already owns. The building could be turned into a public library, police station, or even a community center. Allowing the 14.5 acres to be used in a way that is beneficial to the city of Houston is much more ideal than allowing it to be turned into storage or federal housing for undocumented children.

Everyone knows that getting anything done by the government is like watching paint dry. Slow and painful. And can I ask why President Obama declared back in June that we have an “urgent humanitarian situation” at our border? This is not something new; this has been going on for decades. Sometimes I wonder where the President has been all of these years. I’ve seen the statistics: there have been a larger number of border crossings in the last year but there is a reason for that. I partially blame how bad it is getting south of the border, but I also blame how relaxed we have become about our borders without even realizing it.

I may come across a bit heartless, but I don’t believe in a handout and I don’t believe that just because you cross the border into the United States that you are automatically allowed to live here, even if you are a child. There are laws and regulations that need to be upheld. The first step to becoming an American is to respect the United States.

Allison Dawson (@AllyD528Born in Germany, raised in Mississippi and Texas. Graduate of Texas Tech University and Arizona State University. Currently dedicating her life to studying for the LSAT. Twitter junkie. Conservative.

Featured image courtesy of [Debi Fitzsimmons via Flickr]

Allison Dawson
Allison Dawson was born in Germany and raised in Mississippi and Texas. A graduate of Texas Tech University and Arizona State University, she’s currently dedicating her life to studying for the LSAT. Twitter junkie. Conservative. Get in touch with Allison at staff@LawStreetMedia.com.

The post Obama, Perry, and the Crisis at the Texas Border appeared first on Law Street.

]]>
https://legacy.lawstreetmedia.com/blogs/culture-blog/obama-perry-crisis-texan-border/feed/ 3 19938