Prison~Gang Enforcer

Total Page:16

File Type:pdf, Size:1020Kb

Prison~Gang Enforcer FREEDOM OF INFORMATION AND PRIVACY ACTS smmzcw ILA /92/u£5&#39;I&#39;3g J;-EL/~/92z1-I/1 FILE NUMBER [33-HQ" /Q30_ T SECTION NUMBER__ 1 FEDERAL BUREAU OF INVESTIGATION !*s&#39; 1.;-,~~;_-a.-.¢_.92 . _ "" I-"&#39;*&#39;i-1?"--3Z&#39;,., > - - +=»< --1 .- <>~.¢~ M I-&#39;>-_:¢g:*: T _~ V, - _ ___d_..;.-.._1_:F:-_4_ _._- ._. Ber __.5&#39;4&#39;. -r lE@ 1 . - At *-&#39;592p~_.~.--.-. _~ - ,---- P5.,éJ.&#39;;i+-.4--.=-.-. 3.~>:>¢t:-1~.u.&#39;*;-- . .--.- - &#39; I . _ _ _,._-.92._92-ea*-u 4 _. - 7." " - . 1b_ 11-. OBTAINABLE IS INCLUDED .u- X- .7;_1,_.I ~:&#39;-_§_3" -~ .¢92. IN THE REPRODUCTION OF THESE DOCUMENTS. PAGES an INCLUDED THAT ARE I *5; BLURRED, LIGHT, OR OTHERWISE DIFFICULT TO I READ ARE THE RESULT OE mm THE CONDITION OP THE ORIGINAL DOCUMENT. NO BETTER COPY CAN BE * REPRODUCED. r_- . 4®@E§IE§1@@E§1@ If-.--.. - T:,f&#39;,&#39;§;;&#39;.~&#39;.-.. -___..1&#39;.» &#39; &#39;l_1*"*-§,~;§;=. * &#39; - __ &#39; - "&#39;&#39;e%:?-f.:_?A_ ;-"&#39;2-.A . - _+1...-=--,-$1:1 I: ~ 4:-, . .- _ -&#39;_, _ ~ _ - _ _- _ _ _ -_.._ ~_ ___ _--___amP&#39;--"H "-+"~_-=~;<.. -.2:. -A - *4 ., . < I 4;, - A , iii =-_~.;-; &#39;1. _ - &#39;-- &#39; .-6-. &#39; FD-36 Rev. 2-14-74! . .;:=~:-~>~=::.:.;.-_¢- >*""3"-92wz1n»s92xn&#39;:.;---»-- -- ;;:>s~_--~»=+~_ -; -1-»:~ -:~~~-r-~_~_-:-:.; -;+,¢.;...i_.,,=,_, 92g// Dam FBI 3/17/11. Tt8n5 I,lhl: followingin _ VV .,_ _ _ _ __ _ .__ _ ___,___ Type in plaintexl or code! AIRTEL Via ,_ e 7, e _ _:. &#39;, To W, _ _ 7 _ _ -..._.,_..~,_._...L H Precedence! T0: -92____.---_._--_-_---.._-~__._,.._._..~.___-~......-_.__.._._._.-~.__.--_..__-_..-. FROM: nxnncwon, FBI _& k;@ SUBJECT: SAC, SACRAMENTO < . ¥ , LP NUESTRA "PMILIA, aka "Our Famlly n &#39;- -.-~ 1 AR; ITAR - EKTORTION, PROSTITUTION O0 Sacramento SC 92-1212 ll II MXICAN MAFIA, aka : Y EME AR; ITAR " EXTORTION, PROSTITUTION ~ b7C O0: Sacramento X ? b7D 3 sc 92-1213 .E;>9292 "ARARYAN BROTHERHOOD&#39;65? V gg:92&#39;S;c0 @-62 e _ 92 . §§§7§E§3hiE:§/yge/030 21* APRs 1977 " $3- O0: Sacramento/ I %///// 8- SC 183-73 I// I 3 _ 92 Y 92 8 Bureau Enc. 2! _ Los Angeles Enc. 2! ATTN:Supv.[:::::::::] YE; 3 v San Francisco Enc. 2! , - San Diego Enc. 2! m1-- Sacramento ON 559$ 92 ¢_ ~92121z!~92-1213! gbB5 » - ~92-1214!-1e3~73! --1 CBS:ema 11 Q ! " "" o &#39; "* 4,-4 1 1 +5.;-. Approved: Q Special. _ , Agent _ ,_Charge in Seat W e _ M Per» _ 55 <>~°i> In -_&#39;= - iii " ~_~_~ ,._ 7 V _,-_-.~___ &#39;_ 4 _ _ _ _ E. &#39;;_ ~ .&#39; -4 4 i A SC 92~1212 I - Enclosed to the Bureau and receiving offices are two copies each of an article appearing in the Fresno Bee newspaper of 3/ll/77 which synopsizes the current problem of the Mexican Mafia and the Nuestra Familia in the State of California. For the information of the Bureau and receiving offices, Sacramento is instituting investigation of the captioned organizations and individuals, based on the enclosed newspaper article and the following information. In recent years, there has been an increase in violence and criminal activity on the part of the captioned organizations, which had their origins within the California Prison System. These groups have now spread to the civilian population outside the prison system and have evidenced a high degree of organization. Recent informant information obtained by state and local authorities indicates well organized criminal activity is planned and perpetrated by these groups. Documents seized during local arrests of Nuestra Familia NF! members discuss in succinct form the intended criminal activity to be undertaken to finance the gangfs operations in the areas of prostitution, narcotics, robbery and extortion. Some examples of criminal activity undertaken by these gangs in the recent past, in the areas of E81 jurisdiction, are as follows: ~ 0 - 7 b7C b7D 10/30/75,b7F,92 an .h _2uIo &#39;92 I k .esH -. .. ei-¢T§92_;4F.&#39;.:_,~..___;;.§;5;_»?-1; E f -~*_=-&#39;5.&#39;._"::3- ans! .. H I _ ,. W . i .. - *- ~%n,_ni~ 3&#39;. I! $ Q O ¢ SC 92- &#39; r I I |Cali£ornia Department of Corrections, ree , acramento, California, has advised that he has been following the progress of ]&#39; . the NF and the MM for the past four years. He advised b7C these two organizations have increased their membership b7D dramatically and may have as many as 300 to 400 members .r ~~»-in~the~$tate~ f caliorniaT-He-stated-all of-the~prison___bF92 narcoticsgang organizationsrobberies. areand i in murder, as in beenextortion, recentcontact with the state authorities in exas, New Mexico and Arizona whoin their respective acknowledgedhave states. As ofseveral captioned of existencetheorganizations members of captioned organizations have been convicted of federal violations and are now serving sentences in federal institutions, recruiting for these organizations will undoubtedly be conducted within the Federal Prison System and in all probability will further the organizations I geographical| I I influence.I I I I I I I I I I I I I I I I I l 1 1 A.: &#39; 4t . L-.1__;;-;92-~:=: &#39;_;--_ -_;;- »-*#I&#39;r»..".i. 1" -53*"--.-I-*.&#39;.~.&#39;._.._......,. -strata _ . .. * -"-,=/lee.*- ,--.&#39;.1,. -I-=; v -=2.-.-.~=-~+-..-,-".&#39;Z..>4&#39;.-s$£n!-. &#39;-- &#39;1.92-~_Yn~1&#39;~;-&#39; A1. .- 511:. 7-1;-jl - --.~;&#39;_~..;4;.;,,¢_-,_ _. -4,.¢y*_-&#39;;&#39;.,~.~,_:; &#39;.at 1~ - -,y_&#39;_&#39; -qv _ ~ , &#39;r&#39; . ¢;;g._1!.&#39;_-;_ 2 .-_x-Lt?-r&#39;r..&#39; ~_,-_|.-&#39; "*~=§-W-5* &#39; &#39; g,-.-g---.I - &#39;af." U.-,.-< &#39; &#39; - . 4 - _~."!~.~..~.;=,,&#39;. &#39;-&#39;-"- &#39; .- A _ n. :r~ . - - -.: &#39; &#39; .-&#39;.*--1 .»"" v &#39;1 J " "&#39; :5-Ir u , ¢ . ; .1, ;§&#39; * 5 &#39; .§_ »~ F so 92-1212 groups have become, and are rapidly becoming more so, a major crime problem in specific geographic areas within the State of California and to the state as a whole. It appears an excellent opportunity for the FBI to make a ~ concerted effort to make a significant contribution in a » the areas of major crime problems involving these. organizations. 4 Q The primary-initial thrust will concern the alleged extortion of businesses and development of . informants. If, at the end of a 90-day period, or earlier as determined by investigation, it is established there are no prosecutable violations, a closing report will be submitted. b&#39;7C --- ._ . ....-..._____________v________ __ _ ________ _ _ __ _>_ _ _~_ w 6 U t =1 *3 . -6- -» %1,.._ &#39;T-"ff*1 rL~.--. ~ -_.¢_é,,;.,<.- -_-.;_=;»-.~._. egzgr_ 533"." - 1=&#39; a 1 1 Q V " mm-~ §;=&#39;-r -*1"~=¢1=&#39;- &#39;<111-1::--i~""~-&#39;-&#39;=&#39;»~&#39;-- 4.3 -1mr- . _ i A; &#39;_ I&#39;;~.-.&#39;..~1 " , . , . .. _ ~~ - <- .. , . - ._,. -;_,,,,,._..-.......4-4.........~-.__..--....~.--~ miainan-.,.a-»s.~-.-=-..»-~a»u-Li-»d,¢-.-~-e.._.~,¢ -V v v ,. - AfL¢».,§~%92h1--- -A4--~ . _ - Ilhwc. b*ir.__i~. _ 1] DGP»AD Ah. _ _~- i D§P. AD lav... R ~ &#39; - - *1-v F B I I , mm.idm Dir. ,1-.7&#39; D-=1==1/17 7/2 " 92 I Idem. &#39;~ Transmit.following thein ,7 wea a I a a ;:::,,,,,,, 7/ x Typein plaintexlor code! | LegG1 mu: &#39; Plun& Ins 1 vm AIRTEL H &#39; &#39; : 7 7 Precedence! AIR MAILi K T 7 _ 77 K i N 92 |p""&#39;Ru MgnL&#39;___ Z L Spec. Inv,_____,__ 1" Ieeh.-Sene- - -.__._...._,__._>__...,._-.-.-.-.__.--_-~-...___.- -__-__..._._.~._._.-..-..._--...__¢-.---_.? TO.. 1 DIRECTOR, FBI Pnb;:"j;?& O. .. mom SAC, sm FRANCISCO83-161! P! i"§?:§§T.°;Z°s§?, RE: .@LA NUESTRA ramxmn,aka uestra Familia, L1! L N |F u &#39; - Farmers , A / @ Our Family ;j_;;,; 92 ~ , RICO _ r O0: SF &#39; E =»f&#39; 1 -J MexicanAmerican inmatesat San Quentin Prison, Ca1i{i{ ;. began forming La Nuestra Familia NF! as a prison gang during i at 1966-1967, for protection against another prison gan, 5 2» the Mexican Mafia. During 1971, a constitution was X y drawn up setting out the structure and laws of NF. There are 1 "-&#39; approximately 400-500 members of NF in prisons and on the : ___ __&#39;1st;:_ee_ts_&#39;_&#39;....of&#39; California at the presenttime. .--..__. .. by: ; The structure ofthe NFas setout in their "b"/D M J constitution is headed by a General, under which are ten * 0! Captains, under which are unlimited Lieutenants, and b&#39;7F under which are soldiers. Rank is obtained by being _ a good soldier and making a certain number of "hits" murders! [ on "hermits" enemiesof e N 26 33.9 /3,. » -.__ __ i I L9, Bureau &#39;3?i? 19??*- AUG - Sacramento 8373! Info.! ,:_____..,, _ &_ 92 2" Los Angeles 92s4s5! Info.! _ 92 210 San Diego Infq.! 2 - San Francisco 92 PAD:rvs - , 0! Appfp; 1 L Z1,7 7/ 1 _o _, Sente M P°Y--- 4 S genz in Chwse - __ A 92 K r Q is O 4 iqnge 1;lee» &#39;133-13 sc Several of the entries have been covered over by markings in an attempt to obliterate the original notation.
Recommended publications
  • Gangs Beyond Borders
    Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Gangs Beyond Borders California and the Fight Against Transnational Organized Crime March 2014 Kamala D. Harris California Attorney General Message from the Attorney General California is a leader for international commerce. In close proximity to Latin America and Canada, we are a state laced with large ports and a vast interstate system. California is also leading the way in economic development and job creation. And the Golden State is home to the digital and innovation economies reshaping how the world does business. But these same features that benefit California also make the state a coveted place of operation for transnational criminal organizations. As an international hub, more narcotics, weapons and humans are trafficked in and out of California than any other state. The size and strength of California’s economy make our businesses, financial institutions and communities lucrative targets for transnational criminal activity. Finally, transnational criminal organizations are relying increasingly on cybercrime as a source of funds – which means they are frequently targeting, and illicitly using, the digital tools and content developed in our state. The term “transnational organized crime” refers to a range of criminal activity perpetrated by groups whose origins often lie outside of the United States but whose operations cross international borders. Whether it is a drug cartel originating from Mexico or a cybercrime group out of Eastern Europe, the operations of transnational criminal organizations threaten the safety, health and economic wellbeing of all Americans, and particularly Californians.
    [Show full text]
  • 1921 Tulsa Race Riot Reconnaissance Survey
    1921 Tulsa Race Riot Reconnaissance Survey Final November 2005 National Park Service U.S. Department of the Interior CONTENTS INTRODUCTION 1 Summary Statement 1 Bac.ground and Purpose 1 HISTORIC CONTEXT 5 National Persp4l<live 5 1'k"Y v. f~u,on' World War I: 1896-1917 5 World W~r I and Postw~r ( r.: 1!1t7' EarIV 1920,; 8 Tulsa RaCR Riot 14 IIa<kground 14 TI\oe R~~ Riot 18 AIt. rmath 29 Socilot Political, lind Economic Impa<tsJRamlt;catlon, 32 INVENTORY 39 Survey Arf!a 39 Historic Greenwood Area 39 Anla Oubi" of HiOlorK G_nwood 40 The Tulsa Race Riot Maps 43 Slirvey Area Historic Resources 43 HI STORIC GREENWOOD AREA RESOURCeS 7J EVALUATION Of NATIONAL SIGNIFICANCE 91 Criteria for National Significance 91 Nalional Signifiunce EV;1lu;1tio.n 92 NMiol\ill Sionlflcao<e An.aIYS;s 92 Inl~ri ly E~alualion AnalY'is 95 {"",Iu,ion 98 Potenl l~1 M~na~menl Strategies for Resource Prote<tion 99 PREPARERS AND CONSULTANTS 103 BIBUOGRAPHY 105 APPENDIX A, Inventory of Elltant Cultural Resoun:es Associated with 1921 Tulsa Race Riot That Are Located Outside of Historic Greenwood Area 109 Maps 49 The African American S«tion. 1921 51 TI\oe Seed. of c..taotrophe 53 T.... Riot Erupt! SS ~I,.,t Blood 57 NiOhl Fiohlino 59 rM Inva.ion 01 iliad. TIll ... 61 TM fighl for Standp''''' Hill 63 W.II of fire 65 Arri~.. , of the Statl! Troop< 6 7 Fil'lal FiOlrtino ~nd M~,,;~I I.IIw 69 jii INTRODUCTION Summary Statement n~sed in its history.
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Operating in a New Environment
    EMBEDDED DESIGN OPERATING SYSTEMS lthough the concept of the IoT was Ioated around the turn of the Millennium, it is A only recently that the approach has gathered significant momentum. But, because it is a blanket term, IoT is not only being applied to large and small applications alike, it is also being applied in a wide range of end markets. With such a spread, it will come as no surprise to discover that one size does not fit all when it comes to operating systems. At the high end of the market, companies like Intel are vying to provide a complete solution. Alongside its processor technology, Intel can integrate Wind River’s VxWorks operating system and McAfee security software to create a system capable of handling high levels of complexity. But those developing wearable devices, for example, may not want to take advantage of such a system; they may well be looking for an OS that runs in a very small footprint but, nonetheless, offers a range of Operating in a new necessary features while consuming minimal amounts of power. ARM has had its eyes on the sector for some time and, last year, rolled out environment a significant extension to its mbed programme. Previously, mbed was an embedded development community The Internet of Things is posing challenges to OS developers. with ambitions similar to those of Arduino and Raspberry Pi. But mbed How are they responding? By Graham Pitcher. now has a much bigger vision – the IoT. As part of this approach, it is creating mbed OS (see fig 1).
    [Show full text]
  • RIOT: an Open Source Operating System for Low-End Embedded Devices in the Iot Emmanuel Baccelli, Cenk Gundo¨ Gan,˘ Oliver Hahm, Peter Kietzmann, Martine S
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2815038, IEEE Internet of Things Journal 1 RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT Emmanuel Baccelli, Cenk Gundo¨ gan,˘ Oliver Hahm, Peter Kietzmann, Martine S. Lenders, Hauke Petersen, Kaspar Schleiser, Thomas C. Schmidt, and Matthias Wahlisch¨ Abstract—As the Internet of Things (IoT) emerges, compact low-end IoT devices. RIOT runs on minimal memory in the operating systems are required on low-end devices to ease devel- order of ≈10kByte, and can run on devices with neither MMU opment and portability of IoT applications. RIOT is a prominent (memory management unit) nor MPU (memory protection free and open source operating system in this space. In this paper, we provide the first comprehensive overview of RIOT. We cover unit). The goal of this paper is to provide an overview of the key components of interest to potential developers and users: RIOT, both from the operating system point of view, and from the kernel, hardware abstraction, and software modularity, both an open source software and ecosystem point of view. conceptually and in practice for various example configurations. We explain operational aspects like system boot-up, timers, power Prior work [28], [29] has surveyed the space of operating management, and the use of networking. Finally, the relevant APIs as exposed by the operating system are discussed along systems for low-end IoT devices.
    [Show full text]
  • A Comparative Study Between Operating Systems (Os) for the Internet of Things (Iot)
    VOLUME 5 NO 4, 2017 A Comparative Study Between Operating Systems (Os) for the Internet of Things (IoT) Aberbach Hicham, Adil Jeghal, Abdelouahed Sabrim, Hamid Tairi LIIAN, Department of Mathematic & Computer Sciences, Sciences School, Sidi Mohammed Ben Abdellah University, [email protected], [email protected], [email protected], [email protected] ABSTRACT Abstract : We describe The Internet of Things (IoT) as a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data in real time with the outside world. It therefore assumes an operating system (OS) which is considered as an unavoidable point for good communication between all devices “objects”. For this purpose, this paper presents a comparative study between the popular known operating systems for internet of things . In a first step we will define in detail the advantages and disadvantages of each one , then another part of Interpretation is developed, in order to analyze the specific requirements that an OS should satisfy to be used and determine the most appropriate .This work will solve the problem of choice of operating system suitable for the Internet of things in order to incorporate it within our research team. Keywords: Internet of things , network, physical object ,sensors,operating system. 1 Introduction The Internet of Things (IoT) is the vision of interconnecting objects, users and entities “objects”. Much, if not most, of the billions of intelligent devices on the Internet will be embedded systems equipped with an Operating Systems (OS) which is a system programs that manage computer resources whether tangible resources (like memory, storage, network, input/output etc.) or intangible resources (like running other computer programs as processes, providing logical ports for different network connections etc.), So it is the most important program that runs on a computer[1].
    [Show full text]
  • Operating Systems & Virtualisation Security Knowledge Area
    Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels.
    [Show full text]
  • RIOT, the Friendly Operating System for The
    The friendly operating system for the IoT by Thomas Eichinger (on behalf of the RIOT community) OpenIoT Summit NA 2017 Why? How? What is RIOT? Why? How? What is RIOT? Why a software platform for the IoT? ● Linux, Arduino, … bare metal? ● But as IoT software evolves … ○ More complex pieces e.g. an IP network stack ○ Evolution of application logic ● … non-portable IoT software slows innovation ○ 90% of IoT software should be hardware-independent → this is achievable with a good software platform (but not if you develop bare metal) Why a software platform for the IoT? ✓ faster innovation by spreading IoT software dev. costs ✓ long-term IoT software robustness & security ✓ trust, transparency & protection of IoT users’ privacy ✓ less garbage with less IoT device lock-down Why? How? What is RIOT? How to achieve our goals? Experience (e.g. with Linux) points towards ● Open source Indirect business models ● Free core Geopolitical neutrality ● Driven by a grassroot community Main Challenges of an OS in IoT Low-end IoT device resource constraints ● Kernel performance ● System-level interoperability ● Network-level interoperability ● Trust SW platform on low-end IoT devices ● The good news: ○ No need for advanced GUI (a simple shell is sufficient) ○ No need for high throughput performance (kbit/s) ○ No need to support dozens of concurrent applications ● The bad news: ○ kBytes of memory! ○ Typically no MMU! ○ Extreme energy efficency must be built in! SW platform on low-end IoT devices ● Contiki ● mbedOS (ARM) ● ● Zephyr (Intel) ● TinyOS ● LiteOS (Huawei) ● myNewt ● … ● FreeRTOS ● and closed source alternatives Reference: O. Hahm et al. "Operating Systems for Low-End Devices in the Internet of Things: A survey," IEEE Internet of Things Journal, 2016.
    [Show full text]
  • Susany. Soong Clerk, U.S. District Court Northern
    FILED 1 STEPHANIE M. HINDS (CABN 154284) Acting United States Attorney 2 Apr 15 2021 3 SUSANY. SOONG 4 CLERK, U.S. DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA 5 SAN FRANCISCO 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 SAN FRANCISCO DIVISION 11 UNITED STATES OF AMERICA, ) CASE NO. 3:21-cr-00153 VC ) 12 Plaintiff, ) VIOLATIONS: ) 18 U.S.C. §§ 924(j)(1) and 2 – Use of a Firearm in 13 v. ) Furtherance of a Crime of Violence Resulting in ) Death; 14 JONATHAN ESCOBAR, ) 18 U.S.C. §§ 924(c)(1)(A) and 2 – Use/Carrying of a a/k/a “Wicked,” a/k/a “Rico,” and ) Firearm During and in Relation to a Crime of 15 JOSE AGUILAR, ) Violence; a/k/a “Slim” ) 18 U.S.C. § 924(d) and 28 U.S.C. § 2461(c) – 16 ) Forfeiture Allegation Defendants. ) 17 ) SAN FRANCISCO VENUE ) 18 ) UNDER SEAL ) 19 20 I N D I C T M E N T 21 The Grand Jury charges, with all dates being approximate and all date ranges being both 22 approximate and inclusive, and at all times relevant to this Indictment: 23 Introductory Allegations 24 1. The 19th Street Sureños gang was a predominantly Hispanic street gang that claimed the 25 area centered around 19th Street and Mission Street, in the Mission District of San Francisco, as its 26 territory or “turf.” The claimed territory included the area bounded by 19th Street to the South, 16th 27 Street to the North, Folsom Street to the East, and Dolores Street to the West.
    [Show full text]
  • HISTORY of STREET GANGS in the UNITED STATES By: James C
    Bureau of Justice Assistance U.S. Department of Justice NATIO N AL GA ng CE N TER BULLETI N No. 4 May 2010 HISTORY OF STREET GANGS IN THE UNITED STATES By: James C. Howell and John P. Moore Introduction The first active gangs in Western civilization were reported characteristics of gangs in their respective regions. by Pike (1873, pp. 276–277), a widely respected chronicler Therefore, an understanding of regional influences of British crime. He documented the existence of gangs of should help illuminate key features of gangs that operate highway robbers in England during the 17th century, and in these particular areas of the United States. he speculates that similar gangs might well have existed in our mother country much earlier, perhaps as early as Gang emergence in the Northeast and Midwest was the 14th or even the 12th century. But it does not appear fueled by immigration and poverty, first by two waves that these gangs had the features of modern-day, serious of poor, largely white families from Europe. Seeking a street gangs.1 More structured gangs did not appear better life, the early immigrant groups mainly settled in until the early 1600s, when London was “terrorized by a urban areas and formed communities to join each other series of organized gangs calling themselves the Mims, in the economic struggle. Unfortunately, they had few Hectors, Bugles, Dead Boys … who found amusement in marketable skills. Difficulties in finding work and a place breaking windows, [and] demolishing taverns, [and they] to live and adjusting to urban life were equally common also fought pitched battles among themselves dressed among the European immigrants.
    [Show full text]
  • Gang Recognition Guide
    Gang Recognition Guide As gangs become an increasing issue in our society, education is the key to recognizing their activity and understanding what they are about. However, when discussing gangs, a working defi nition must be developed. Gangs are three or more individuals, using the same name, sign or symbol who commit criminal acts individually or as a group to further their agenda. The following information is not exhaustive in describing gangs and their background, but is a basic framework to educate concerned community members. Crips: This street gang originally started in South Central Los Angeles in the 1960’s. Stanley “Tookie” Williams met with Raymond Lee Washington to unite local gang members to battle neighboring street gangs. Today, the Crips are one of the largest and most violent gangs, involved in murders, robberies, drug dealing and many other criminal pursuits. Crips identify with the color blue. Their biggest rivals are the Bloods and disrespect in many ways - calling them “slobs”. Crips call themselves “Blood Killas” and cross the letter “b” out or leave it off altogether. Crips do not use the letters “ck” as it denotes “Crip Killer” and substitute it for “cc” (as in “kicc” for “kick”). While traditionally African-American, today’s Crip membership are multi-ethnic. Bloods: The Bloods were formed to compete against the Crips. Their origins stem from a Piru street gang (initially a Crip set) who broke away during an internal gang war and allied with other smaller street gangs to form the present day Bloods. Since the Bloods were originally outnumbered 3 to 1 by the Crips, they had to be more violent.
    [Show full text]
  • Internet of Things (Iot) Operating Systems Management: Opportunities, Challenges, and Solution
    sensors Editorial Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution Yousaf Bin Zikria 1, Sung Won Kim 1,*, Oliver Hahm 2, Muhammad Khalil Afzal 3 and Mohammed Y. Aalsalem 4 1 Department of Information and Communication Engineering, Yeungnam University, 280 Daehak-Ro, Gyeongsan, Gyeongbuk 38541, Korea; [email protected] 2 Zühlke Group, Eschborn, 65760 Hessen, Germany; [email protected] 3 Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt 47010, Pakistan; [email protected] 4 Department of Computer Networks, Jazan University, Jazan 45142, Saudi Arabia; [email protected] * Correspondence: [email protected]; Tel.: +82-53-810-4742 Received: 9 April 2019; Accepted: 11 April 2019; Published: 15 April 2019 Abstract: Internet of Things (IoT) is rapidly growing and contributing drastically to improve the quality of life. Immense technological innovations and growth is a key factor in IoT advancements. Readily available low cost IoT hardware is essential for continuous adaptation of IoT. Advancements in IoT Operating System (OS) to support these newly developed IoT hardware along with the recent standards and techniques for all the communication layers are the way forward. The variety of IoT OS availability demands to support interoperability that requires to follow standard set of rules for development and protocol functionalities to support heterogeneous deployment scenarios. IoT requires to be intelligent to self-adapt according to the network conditions. In this paper, we present brief overview of different IoT OSs, supported hardware, and future research directions. Therein, we provide overview of the accepted papers in our Special Issue on IoT OS management: opportunities, challenges, and solution.
    [Show full text]