Hate Group Profile: Black Separatists

Content courtesy Southern Poverty Law Center https://www.splcenter.org


Black separatists typically oppose integration and racial intermarriage, and they want separate institutions -- or even a separate nation -- for blacks. Most forms of black separatism are strongly anti-white and anti-Semitic, and a number of religious versions assert that blacks are the Biblical "chosen people" of God.ety of another attack. I'm not looking for mini-Rambos. However, I do ask that you give some thought to future empowerment and not just post-Pulse high fives.  
Black separatists typically oppose integration and racial intermarriage, and they want separate institutions — or even a separate nation — for black people in America. Most contemporary forms of black separatism are strongly anti-white and anti-Semitic, and a number of religious versions assert that blacks — not Jews — are the Biblical "chosen people" of God.


 Although the Southern Poverty Law Center recognizes that much black racism in America is, at least in part, a response to centuries of white racism, it believes racism must be exposed in all its forms. White groups espousing beliefs similar to black separatists would be considered clearly racist. The same criterion should be applied to all groups regardless of their color.


 As Martin Luther King Jr. once said: "Violence begets violence; hate begets hate; and toughness begets a greater toughness. It is all a descending spiral, and the end is destruction — for everybody. Along the way of life, someone must have enough sense and morality to cut off the chain of hate."
A leading example of a black separatist group is the Nation of Islam led by Louis Farrakhan. In 1997, and in less explicit ways since then, Farrakhan made clear that he had renounced none of the anti-white, anti-Semitic, anti-Catholic and anti-gay views of the previous Nation leader, Elijah Mohammed. Those beliefs include the view that Yacub, a renegade black "scientist," created whites 6,600 years ago as an inherently evil and ungodly people — "blue-eyed devils." Farrakhan has described Catholics and Jews, who he said practice a "gutter religion," as preying on blacks. He regrets the "tone" of a former principal subordinate who called for slaughtering white South Africans, but agreed with the message. He called for racial separatism and inveighed against interracial relationships.


 If a white group espoused similar beliefs with the colors reversed, few would have trouble describing it as racist and anti-Semitic. Although the racism of a group like the Nation may be relatively easy to understand, if we seek to expose white hate groups, we cannot be in the business of explaining away the black ones.

Active Black Separatist Hate Groups 2016:


All Eyes on Egipt Bookstore
Brooklyn, NY
Orlando, FL
Decatur, GA
Macon, GA
Monticello, GA
Chicago, IL
Dorchester, MA
Detroit, MI
Cleveland, OH


Black Riders Liberation Party
Los Angeles, CA
Oakland, CA
San Diego, CA
Miami, FL
Chicago, IL
Detroit, MI
New York, NY
Portland, OR
Virginia


The Israelite Church of God in Jesus Christ
New York, NY
Washington, DC
Fort Myers, FL
Miami, FL
Orlando, FL
West Palm Beach, FL
Baltimore, MD
Minneapolis, MN
Greensboro, NC
Omaha, NE
Jersey City, NJ
Philadelphia, PA
Oklahoma City, OK
Portland, OR
Allentown, PA
Pittsburgh, PA


Israelite School of Universal Practical Knowledge
Baltimore, MD
Los Angeles, CA
Rialto, CA
Washington, DC
black separtist cont’d
Miami, FL
Atlanta, GA
Chicago, IL
Indianapolis, IN
Detroit, MI
Minneapolis, MN
St. Louis, MO
North Carolina
New York, NY
Syracuse, NY
Oklahoma
Portland, OR
Philadelphia, PA
Texas
Seattle, WA


Israel United In Christ
Mount Vernon, NY
Birmingham, AL
Phoenix, AZ
Los Angeles, CA
Denver, CO
Washington, DC
Miami, FL
Orlando, FL
Tallahassee, FL
Atlanta, GA
Chicago, IL
Kansas City, KS
Louisville, KY
New Orleans, LA
Boston, MA
Detroit, MI
St. Louis, MO
Charlotte, NC
Newark, NJ
Las Vegas, NV
Bronx, NY
Heath, OH
Oregon
Warr Acres, OK
Pittsburgh, PA
Memphis, TN
Austin, TX
Corpus Christi, TX
Dallas, TX
Houston, TX
San Antonio, TX
Hampton, VA
Nation of Islam
Chicago, IL*
Birmingham, AL
Huntsville, AL
Mobile, AL
Montgomery, AL
Pine Bluff, AR
Phoenix, AZ
Compton, CA
Los Angeles, CA
Oakland, CA
Rialto, CA
San Diego, CA
Stockton, CA
Denver, CO
Washington, DC
Wilmington, DE
Fort Lauderdale, FL
Gainesville, FL
Miami, FL
Pensacola, FL
Pine Hills, FL
Saint Petersburg, FL
Tampa, FL
Atlanta, GA
Augusta, GA
Brunswick, GA
Columbus, GA
East Saint Louis, IL
Rockford, IL
Indianapolis, IN
Lexington, KY
Louisville, KY
Baton Rouge, LA
Monroe, LA
New Orleans, LA
Shreveport, LA
Boston, MA
Springfield, MA
Baltimore, MD
Benton Harbor, MI
Detroit, MI
Grand Rapids, MI
Kansas City, MO
St. Louis, MO
Holly Springs, MS
Southaven, MS
Charlotte, NC
Durham, NC
Greensboro, NC
Raleigh, NC
Winston-Salem, NC
Camden, NJ
Newark, NJ
New Brunswick, NJ
Plainfield, NJ
Willingboro, NJ
Brooklyn, NY
Buffalo, NY
Harlem, NY
Rochester, NY
Akron, OH
Cleveland, OH
Columbus, OH
Dayton, OH
Tulsa, OK
Harrisburg, PA
Philadelphia, PA
Pittsburgh, PA
Charleston, SC
Columbia, SC
Greenville, SC
Chattanooga, TN
Memphis, TN
Austin, TX
Dallas, TX
Fort Worth, TX
Houston, TX
Texarkana, TX
Norfolk, VA
Richmond, VA
Milwaukee, WI


New Black Panther Party
Houston, TX*
Los Angeles, CA
Washington, DC
Jacksonville, FL
Miami, FL
Tampa, FL
Tallahassee, FL
Atlanta, GA
Augusta, GA
Waycross, GA
Springfield, IL
Louisville, KY
St. Louis, MO
Hattiesburg, MS
Newark, NJ
Dayton, OH
Nashville, TN
Dallas, TX
Tomball, TX
Virginia Beach, VA


New Black Panther Party for Self Defense
Stone Mountain, GA
New Haven, CT
Tampa Bay, FL
Sicarii 1715
San Diego, CA
Inland Empire, CA
Seattle, WA
War On The Horizon
Washington, DC

​​​G R A F F I T I 

M.O.S.T. does not care about persons who paint graffiti on a sanctioned wall with the owner's permission. However, we detest cowards who paint property without consent. That changes the classification from art to vandalism. However, the vandals will still try to justify what they do by claiming it's free expression. They often try to vilify those who oppose them by labeling them oppressors of that free expression. Meanwhile, those same vandals cause hundreds of dollars in damage, drive a businesses customers away and lower property values.
 
We often ask if a graffiti goon would still call it "art" if it was their property being defaced without permission.

Graffiti can also have a more serious meaning due to being gang related. Gangs can use graffiti to mark territory, advertise drug sales, mourn deceased members, announce alliances and issue threats. All the more reason to report and remove it immediately.

If you see tagging in progress dial 9 1 1

For recent graffiti in Orlando report it to (407) 254-GRAF (4723) or click HERE

nEWS AND views

Business E-mail Compromise; The 5 Billion Dollar Scam
This Public Service Announcement (PSA) is an update to Business E-mail Compromise (BEC) PSAs 1-012215-PSA, 1-082715a-PSA and I-061416-PSA, all of which are posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data as of December 31, 2016.


DEFINITION
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The E-mail Account Compromise (EAC) component of BEC targets individuals that perform wire transfer payments.
The techniques used in the BEC/EAC scam have become increasingly similar, prompting the IC3 to begin tracking these scams as a single crime type1 in 2017.
The scam is carried out when a subject compromises legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds.


BACKGROUND
The victims of the BEC/EAC scam range from small businesses to large corporations. The victims continue to deal in a wide variety of goods and services, indicating that no specific sector is targeted more than another.
It is largely unknown how victims are selected; however, the subjects monitor and study their selected victims using social engineering techniques prior to initiating the BEC scam. The subjects are able to accurately identify the individuals and protocols necessary to perform wire transfers within a specific business environment. Victims may also first receive “phishing” e-mails requesting additional details regarding the business or individual being targeted (name, travel dates, etc.).
Some individuals reported being a victim of various Scareware or Ransomware cyber intrusions immediately preceding a BEC incident. These intrusions can initially be facilitated through a phishing scam in which a victim receives an e-mail from a seemingly legitimate source that contains a malicious link. The victim clicks on the link, and it downloads malware, allowing the subject(s) unfettered access to the victim’s data, including passwords or financial account information.
The BEC/EAC scam is linked to other forms of fraud, including but not limited to: romance, lottery, employment, and rental scams. The victims of these scams are usually U.S. based and may be recruited as unwitting money mules2. The mules receive the fraudulent funds in their personal accounts and are then directed by the subject to quickly transfer the funds to another bank account, usually outside the U.S., upon direction, mules may open bank accounts and/or shell corporations to further the fraud scheme.


STATISTICAL DATA
The BEC/EAC scam continues to grow, evolve, and target small, medium, and large businesses. Between January 2015 and December 2016, there was a 2,370% increase in identified exposed losses3. The scam has been reported in all 50 states and in 131 countries. Victim complaints filed with the IC3 and financial sources indicate fraudulent transfers have been sent to 103 countries.
Based on the financial data, Asian banks located in China and Hong Kong remain the primary destinations of fraudulent funds; however, financial institutions in the United Kingdom have also been identified as prominent destinations.
The following BEC/EAC statistics were reported to the IC3 and are derived from multiple sources, including IC3 and international law enforcement complaint data and filings from financial institutions between October 2013 and December 2016:
Domestic and international incidents:40,203
Domestic and international exposed dollar loss:$5,302,890,448
The following BEC/EAC statistics were reported in victim complaints to the IC3 from October 2013 to December 2016:
Total U.S. victims:22,292
Total U.S. exposed dollar loss:$1,594,503,669
Total non-U.S. victims:2,053
Total non-U.S. exposed dollar loss:$626,915,475


The following BEC/EAC statistics were reported by victims via the financial transaction component of the new IC3 complaint form, which BECame available in June 20164. The following statistics were reported in victim complaints to the IC3 from June 2016 to December 2016:
Total U.S. financial recipients:3,044
Total U.S. financial recipient exposed dollar loss:$346,160,957
Total non-U.S. financial recipients:774
Total non-U.S. financial recipient exposed dollar loss:$448,464,415


SCENARIOS OF BEC/EAC
Based on IC3 complaints and other complaint data, there are five main scenarios by which this scam is perpetrated.
Scenario 1: Business Working with a Foreign Supplier
A business that typically has a longstanding relationship with a supplier is requested to wire funds for an invoice payment to an alternate, fraudulent account. The request may be made via telephone, facsimile, or e-mail. If an e-mail is received, the subject will spoof the e-mail request so it appears similar to a legitimate request. Likewise, requests made via facsimile or telephone call will closely mimic a legitimate request. This particular scenario has also been referred to as the “Bogus Invoice Scheme,” “Supplier Swindle,” and “Invoice Modification Scheme.”
Scenario 2: Business Executive Receiving or Initiating a Request for a Wire Transfer
The e-mail accounts of high-level business executives (Chief Financial Officer, Chief Technology Officer, etc.) are compromised. The account may be spoofed or hacked. A request for a wire transfer from the compromised account is made to a second employee within the company who is typically responsible for processing these requests. In some instances, a request for a wire transfer from the compromised account is sent directly to the financial institution with instructions to urgently send funds to bank “X” for reason “Y.” This particular scenario has been referred to as “CEO Fraud,” “Business Executive Scam,” “Masquerading,” and “Financial Industry Wire Frauds.”
Scenario 3: Business Contacts Receiving Fraudulent Correspondence through Compromised E-mail
An employee of a business has his or her personal e-mail hacked. This personal e-mail may be used for both personal and business communications. Requests for invoice payments to fraudster-controlled bank accounts are sent from this employee’s personal e-mail to multiple vendors identified from this employee’s contact list. The business may not BECome aware of the fraudulent requests until that business is contacted by a vendor to follow up on the status of an invoice payment.
Scenario 4: Business Executive and Attorney Impersonation
Victims report being contacted by fraudsters who typically identify themselves as lawyers or representatives of law firms and claim to be handling confidential or time-sensitive matters. This contact may be made via either phone or e-mail. Victims may be pressured by the fraudster to act quickly or secretly in handling the transfer of funds. This type of BEC scam may occur at the end of the business day or work week and be timed to coincide with the close of business of international financial institutions.
Scenario 5: Data Theft
Fraudulent requests are sent utilizing a business executive’s compromised e-mail. The entities in the business organization responsible for W-2s or maintaining PII, such as the human resources department, bookkeeping, or auditing section, have frequently been identified as the targeted recipients of the fraudulent request for W-2 and/or PII. Some of these incidents are isolated and some occur prior to a fraudulent wire transfer request. Victims report they have fallen for this new BEC scenario even if they were able to successfully identify and avoid the traditional BEC scam. This data theft scenario of the BEC scam first appeared just prior to the 2016 tax season.


TRENDS
W-2/PII Data Theft
This scenario of BEC/EAC was identified in 2016 in which a human resource department or counterpart was targeted with a spoofed e-mail seemingly on behalf of a business executive requesting all employee PII or W-2 forms for tax or audit purposes. The request appeared to coincide with the 2016 U.S. tax season, which runs from January through April. The number of complaints and reported losses peaked in April 2016, although complaints were still submitted by victims throughout 2016. Victims appeared to be both the businesses responsible for maintaining PII data and the employees whose PII was compromised. In several instances, thousands of employees were compromised. Employees filed identity theft–related complaints with IC3 that included reported incidents of fraudulent tax return filings, credit card applications, and loan applications.


Resurgence of Original Scheme
The IC3 saw a 50% increase in the number of complaints in 2016 filed by businesses working with dedicated international suppliers. This scenario was described in the earliest BEC/EAC complaints and quickly evolved into more sophisticated scenarios . In some instances, instead of requesting a change in a single remittance or invoice payment, BEC/EAC perpetrators changed the remittance location to redirect all incoming invoice payments. The fraudulent request appeared to be facilitated through a spoofed e-mail or domain.
Real Estate Transactions
The BEC/EAC scam targets all participants in real estate transactions, including buyers, sellers, agents, and lawyers. The IC3 saw a 480% increase in the number of complaints in 2016 filed by title companies that were the primary target of the BEC/EAC scam. The BEC/EAC perpetrators were able to monitor the real estate proceeding and time the fraudulent request for a change in payment type (frequently from check to wire transfer) or a change from one account to a different account under their control.


SUGGESTIONS FOR PROTECTION
Businesses with an increased awareness and understanding of the BEC/EAC scam are more likely to recognize when they have been targeted by BEC/EAC fraudsters, and are therefore more likely to avoid falling victim and sending fraudulent payments.
Businesses that deploy robust internal prevention techniques at all levels (especially for front line employees who may be the recipients of initial phishing attempts) have proven highly successful in recognizing and deflecting BEC/EAC attempts.
Some financial institutions reported holding their customer requests for international wire transfers for an additional period of time to verify the legitimacy of the request.
The following list includes self-protection strategies:
Avoid free web-based e-mail accounts: Establish a company domain name and use it to establish company e-mail accounts in lieu of free, web-based accounts.
Be careful what you post to social media and company websites, especially job duties and descriptions, hierarchal information, and out-of-office details.
Be suspicious of requests for secrecy or pressure to take action quickly.
Consider additional IT and financial security procedures, including the implementation of a two-step verification process. For example:
Out-of-Band Communication: Establish other communication channels, such as telephone calls, to verify significant transactions. Arrange this two-factor authentication early in the relationship and outside the e-mail environment to avoid interception by a hacker.
Digital Signatures: Both entities on EACh side of a transaction should utilize digital signatures. This will not work with web-based e-mail accounts. Additionally, some countries ban or limit the use of encryption.
Immediately report and delete unsolicited e-mail (spam) from unknown parties. DO NOT open spam e-mail, click on links in the e-mail, or open attachments. These often contain malware that will give subjects access to your computer system.
Do not use the “Reply” option to respond to any business e-mails. Instead, use the “Forward” option and either type in the correct e-mail address or select it from the e-mail address book to ensure the intended recipient’s correct e-mail address is used.
Consider implementing two-factor authentication for corporate e-mail accounts. Two-factor authentication mitigates the threat of a subject gaining access to an employee’s e-mail account through a compromised password by requiring two pieces of information to log in: (1) something you know (a password) and (2) something you have (such as a dynamic PIN or code).
Beware of sudden changes in business practices. For example, if a current business contact suddenly asks to be contacted via their personal e-mail address when all previous official correspondence has been through company e-mail, the request could be fraudulent. Always verify via other channels that you are still communicating with your legitimate business partner.
Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, a detection system for legitimate e-mail of abc_company.com would flag fraudulent e-mail from abc-company.com.
Register all company domains that are slightly different than the actual company domain.
Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign-off by company personnel.
Confirm requests for transfers of funds. When using phone verification as part of two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.
Know the habits of your customers, including the details of, reasons behind, and amount of payments.
Carefully scrutinize all e-mail requests for transfers of funds to determine if the requests are out of the ordinary.
A complete list of self-protection strategies is available on the United States Department of Justice website www.justice.gov in the publication titled “Best Practices for Victim Response and Reporting of Cyber Incidents.”


WHAT TO DO IF YOU ARE A VICTIM
If funds are transferred to a fraudulent account, it is important to act quickly:
Contact your financial institution immediately upon discovering the fraudulent transfer.
Request that your financial institution contact the corresponding financial institution where the fraudulent transfer was sent.
Contact your local Federal Bureau of Investigation (FBI) office if the wire is recent. The FBI, working with the United States Department of Treasury Financial Crimes Enforcement Network, might be able to help return or freeze the funds.
File a complaint, regardless of dollar loss, with www.ic3.gov or, for BEC/EAC victims, bec.ic3.gov
When contacting law enforcement or filing a complaint with IC3, it is important to identify your incident as “BEC/EAC”; also consider providing the following information:
Originating business name
Originating financial institution name and address
Originating account number
Beneficiary name
Beneficiary financial institution name and address
Beneficiary account number
Correspondent bank if known or applicable
Dates and amounts transferred
IP and/or e-mail address of fraudulent e-mail
Detailed descriptions of BEC/EAC incidents should include but not be limited to the following when contacting law enforcement:
Date and time of incidents
Incorrectly formatted invoices or letterheads
Requests for secrecy or immediate action
Unusual timing, requests, or wording of the fraudulent phone calls or e-mails
Phone numbers of the fraudulent phone calls
Description of any phone contact, including frequency and timing of calls
Foreign accents of the callers
Poorly worded or grammatically incorrect e-mails
Reports of any previous e-mail phishing activity