no password
JoinedPosts by no password
-
Ziamani’s parents had thrown him out of their home after he chose Islam over their faith, the Jehovah’s Witnesses
by no password inhttp://indianexpress.com/article/explained/londonstani-jihad-bloodsoaked-crisis-of-british-multiculturalism-4582751/.
‘londonstani’ jihad: bloodsoaked crisis of british multiculturalism.
the long-running story of the english jihad, however, also suggests another narrative that needs careful examination.
-
no password
46SHARESWritten by Praveen Swami | Published:March 24, 2017 1:07 amA victim of Wednesday’s terror attack in London receives assistance from a woman on Westminster Bridge. Reuters“I will wage war against the british government on this soil,” Brusthom Ziamani, who grew up in south London, wrote to his parents in the summer of 2014. “the british government will have a taste ov there own medicine they will be humiliated this is ISIB Islamic States of Ireland and Britain.”Ziamani’s parents, migrants of Caribbean origin, had thrown him out of their home after he chose Islam over their faith, a neo-fundamentalist Christian denomination called the Jehovah’s Witnesses, who believe Armageddon to be imminent.Later that year, having failed a government-sponsored programme meant to rid him of his fascination with jihadism, Ziamani appeared at an ex-girlfriend’s home, armed with a hammer and knife, declaring his intent to stage a terrorist attack.“I was going to behead a soldier and hold his head in the air so my friend could take a photograph,” he told police as he was arrested.Wednesday’s terrorist attack in London will without doubt reinforce the urban myths surrounding so-called “lone wolf” terrorism. In this pop narrative, fanatic jihadists embedded unseen in our societies, await orders from Raqqa, the ‘capital’ of the Islamic State, or an Afghan cave to launch terror.The long-running story of the English jihad, however, also suggests another narrative that needs careful examination: of often-shambolic enterprises carried out by disturbed individuals living on the margins of society, finding in jihadism a language for psychopathic impulses.“Londonstan”, French intelligence officers derisively called the city that was the true cradle of the global jihad that sprang up in the 1990s. From his pulpit at the Four Feathers Club in central London, the Jordanian Umar Mahmoud, better known as Abu Qatada, preached to “shoebomber” Richard Reid, who attempted to blow up a transatlantic flight from Paris to Miami in 2001, and to the Frenchman Zacarias Moussaoui, one of the 9/11 conspirators.Mustafa Kamel Mustafa, also known as Abu Hamza al-Masri — the Egyptian-born Bosnian jihad veteran, Brighton-trained civil engineer, one-time nightclub bouncer, and Imam of London’s Finsbury Park mosque — sent volunteers to Yemen.London Attack: 5 Killed, Dozens Injured In Shootout Outside British ParliamentSyrian-origin Omar Bakri Mohammad set up al-Muhajiroun, or The Exiles — the Salafi jihadist organisation that was implicated, expert Jytte Klausen has shown, in 19 of 56 jihadist plots linked to the UK between 1998 and 2010. The bombing of the Indian Army’s XV Corps headquarters in Srinagar in December 2000, the attack on a Tel Aviv bar in April 2003, the 9/11 anniversary plot of 2010 — all involved elements of al-Muhajiroun based in the UK.It was in London that Dhiren Barot, son of an affluent Gujarati Hindu family, underwent the extraordinary transformation into a Kashmir jihadist and then an al-Qaeda bomb-plot operative, and London School of Economics student Syed Omar Sheikh turned into a Jaish-e-Muhammad killer.From soon after 9/11, these jihadi networks began turning their gaze homewards. Muhammad Sidique Khan and Shehzad Tanweer, two of the four British men who carried out the July 2005 London bombings, had travelled to a Pakistani jihad camp in 2003. But it’s hard to discern any real pattern to the radicalisation. Barot enjoyed every privilege British citizenship and parental wealth could procure.Khan and Tanweer were impeccably middle class. However, Richard Reid, like the Nigerian-origin Michael Adebolajo, who hacked to death off-duty soldier Lee Rigby in a London street in May 2013, appears to have been a social misfit.Indeed, even the idea that the English terrorist is a product of the well-documented economic and educational backwardness of its Bangladeshi and Pakistani communities isn’t true in all cases. Roshonara Choudhry, who stabbed Member of Parliament Stephen Timms in 2010 to protest the UK’s wars in Afghanistan and Iraq, was born in London to Shohid, a tailor, and British-born Nometha.She was the eldest of five children, and lived out her Bangladeshi-origin parents’ immigrant dreams: having secured A-levels at Newham Sixth Form College, she was in the final year of a degree in English at King’s College, London.The UK’s efforts to stamp out violent Islamism through expensively-funded counter-radicalisation programmes notwithstanding, some 800 of its nationals are now thought to be fighting with the Islamic State, while another 600 are reported to have been prevented from travelling to the theatres of war. There have been a steady string of plots at home, too, inspired by distant causes: Erol Incedal and Mounir Rarmoul-Bouhadjar, who sought to make bombs in 2013; King’s College, London student Suhaid Majeed, Tarik Hassane and Nathan Cuffy, who secured handguns hoping to shoot police officers; and Nadir Syed and his friends, who hoped to behead soldiers with kitchen knives.In many of these cases, though, there has been no evidence of serious ideological or military training — or even of the kinds of rigour that would show a seriousness of purpose. The idiom is often gangland: in one 2016 case, a 14-year-old in Blackburn threatened to behead his schoolteachers.For a fuller answer, we must examine the UK’s troubled politics of identity. In the late 1970s, as conflicts over race exploded in rioting and vigilante clashes, the British state manufactured its policy of official multiculturalism. The strategy was simple: the political system outsourced its engagement with ethnic minorities to a new contractor-class. In cities, the state ceded authority to so-called community leaders — often individuals linked to extremist Muslim groups like the Jama’at-e-Islami. The new generation of Islamists who rose in the 1990s in turn rebelled against these brokers by rejecting the secular-democratic order — often, ironically, with support from the Left.Theoretical physicist Lawrence Krauss, a former adviser to President Barack Obama, was appalled to find himself facing a gender-segregated audience at London’s University College. He attacked the UK’s deference to “vocal and aggressive” Islamic reactionaries who were seeking to impose their values on society.The English jihadists’ notion of “we” and “them” stems from the intellectual secession that was engendered by state multiculturalism. Instead of a rich cultural landscape, official multiculturalism created a homogenised Muslim identity. Thus, Choudhry defended her attempt to kill Timms by pointing to his support of the Iraq war — a land she had never visited. “We must stand up for each other,” she said. “We must fight them,” said Adebolajo — “I apologise that women have had to witness this today, but in our land our women have to see the same.”His parents’ homeland, Nigeria, is ironically beset by hideous violence by jihadists. British scholar Kenan Malik wrote in a thoughtful essay in 2011 that young British Muslims found themselves “detached from both the religious traditions of their parents, which they often reject, and the wider secular society that insists on viewing them simply as Muslims. A few are drawn inevitably to extremist Islamist groups where they discover a sense of identity and of belonging”. The collapse of the Left, Malik has noted, generated a vacuum, leaving no secular platform to address the crisis. “This”, wrote Salman Rushdie, “is the question of our time: how does a fractured community of multiple cultures decide what values it must share in order to cohere”? For Indians, these are familiar questions with no easy answers. -
9
A CHUCK BERRY MEMORY (Chuck Berry – Dead at 90)
by TerryWalstrom ina chuck berry memory.
it was the first day of june in 1987 and the hard rock cafe in dallas had set aside the afternoon to celebrate and honor the pioneer of rock n’ roll, chuck berry.how did they propose commemorating the legendary inventor of the ‘duck walk’?.
a stained glass window was to be unveiled by the man himself.. .
-
no password
He was Lucky - only 3 years, now days one could get life.
(a) Transportation With Intent To Engage in Criminal Sexual Activity. - A person who knowingly transports an individual who has not attained the age of 18 years in interstate or foreign commerce, or in any commonwealth, territory or possession of the United States, with intent that the individual engage in prostitution, or in any sexual activity for which any person can be charged with a criminal offense, shall be fined under this title and imprisoned not less than 10 years or for life. -
9
A CHUCK BERRY MEMORY (Chuck Berry – Dead at 90)
by TerryWalstrom ina chuck berry memory.
it was the first day of june in 1987 and the hard rock cafe in dallas had set aside the afternoon to celebrate and honor the pioneer of rock n’ roll, chuck berry.how did they propose commemorating the legendary inventor of the ‘duck walk’?.
a stained glass window was to be unveiled by the man himself.. .
-
no password
'though he’s considered a legend of rock n roll, he was certainly no saint in his private life.'
____________________________________________________________________________
'But he didn’t seem to think he’d exploited her.“She was anything but innocent,” he later remarked.'-----------------------------------------------------------------------------'No sooner had Chuck become a star than he ran into more trouble. In 1959 he met a 14-year-old Apache prostitute in Texas called Janice Escalanti. He brought her back to St Louis to work in a nightclub he’d recently invested in.When he fired her, she went to the police and, in 1962, Chuck was sentenced to three years in prison for the breaking a law which banned “transporting a minor across state lines for immoral purposes.”'Inside the murky world of Chuck Berry, from rock 'n' roll hits to prison stints
-
4
Did 'BIG BRO' knock off Michael Hastings ?
by Sol Reform innaw, that only happens in russia.. michael hastings sent email about fbi probe hours before deaththe huffington post | by melissa jeltsenposted: 06/22/2013 6:02 pm edt | updated: 06/22/2013 11:36 pm edt2,7686211281502get media alerts:sign upfollow:michael hastings, michael hastings buzzfeed, michael hastings death, michael hastings email,michael hastings fbi, media newshours before dying in a fiery car crash, award-winning journalist michael hastings sent an email to his colleagues, warning that federal authorities were interviewing his friends and that he needed to go "off the rada[r]" for a bit.. .
the email was sent around 1 p.m. on monday, june 17. at 4:20 a.m. the following morning, hastings died when his mercedes, traveling at high speeds, smashed into a tree and caught on fire.
he was 33.hastings sent the email to staff at buzzfeed, where he was employed, but also blind-copied a friend, staff sgt.
-
no password
WikiLeaks says it has the CIA’s hacking secrets. Here's what you need to know.
Embed SharePlay Video2:15WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)A vast portion of the CIA’s computer hacking arsenal appeared to have been exposed Tuesday by the anti-secrecy organization WikiLeaks, which posted thousands of files revealing secret cyber-tools used by the agency to convert cellphones, televisions and other ordinary devices into implements of espionage.
The trove appeared to lay bare the design and capabilities of some of the U.S. intelligence community’s most closely guarded cyberweapons, a breach that is likely to cause immediate damage to the CIA’s efforts to gather intelligence overseas and place new strain on the U.S. government’s relationship with Silicon Valley giants including Apple and Google.
WikiLeaks, which claimed to have gotten the files from a current or former CIA contractor, touted the trove as comparable in scale and significance to the collection of National Security Agency documents exposed by former U.S. intelligence contractor Edward Snowden.
Checkpoint newsletter
Military, defense and security at home and abroad.
But while the Snowden files revealed massive surveillance programs that gathered data on millions of Americans, the CIA documents posted so far by WikiLeaks appear mainly to unmask hacking methods that many experts already assumed the agency had developed.
U.S. intelligence officials and experts said details contained in the newly released documents suggest that they are legitimate, although that could not be independently verified, raising new worries about the U.S. government’s ability to safeguard its secrets in an era of cascading leaks of classified data.
Wikileaks posts alleged trove of CIA hacking tools
Embed SharePlay Video1:29Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)The files mention pieces of malware with names like “Assassin” and “Medusa” that seem drawn from a spy film, describing tools that the CIA uses to steal data from iPhones, seize control of Microsoft-powered computers or even make Internet-connected Samsung television sets secretly function as microphones.
ADVERTISINGThe release of so many sensitive files appeared to catch the CIA, the White House and other government entities off-guard. A CIA spokesman would say only that “we do not comment on the authenticity of purported intelligence documents.”
In a statement, WikiLeaks indicated that the initial stockpile it put online was part of a broader collection of nearly 9,000 files that would be posted over time describing code developed in secret by the CIA to steal data from a range of targets. WikiLeaks said it redacted lists of CIA surveillance targets, though it said they included targets and machines in Latin America, Europe and the United States.
The release was described as a huge loss to the CIA by security experts and former U.S. intelligence officials. “It looks like really the backbone of their network exploitation kit,” said a former hacker who worked for the National Security Agency and, like others, spoke on the condition of anonymity, citing the sensitivity of the subject.
The breach could undermine the CIA’s ability to carry out key parts of its mission, from targeting the Islamic State and other terrorist networks to penetrating the computer defenses of sophisticated cyber-adversaries including Russia, China and Iran, former officials and tech specialists said.
“Any exposure of these tools is going to cause grave if not irreparable damage to the ability of our intelligence agencies to conduct our mission,” a former senior U.S. intelligence official said.
If legitimate, the release represents the latest major breach of sensitive U.S. government data to be put on global display in humiliating fashion by WikiLeaks, which came to prominence in 2010 with the exposure of thousands of classified U.S. diplomatic cables and military files. WikiLeaks founder Julian Assange has engaged in an escalating feud with the United States while taking refuge at the Ecuadoran Embassy in London from Swedish sexual assault allegations.
WikiLeaks’ latest assault on U.S. secrets may pose an early, potentially awkward security issue for President Trump, who has repeatedly praised WikiLeaks and disparaged the CIA.
Trump declared “I love WikiLeaks” last October during a campaign rally when he read from a trove of stolen emails about his Democratic opponent, Hillary Clinton, that had been posted to the organization's website.
White House press secretary Sean Spicer declined to comment when asked about the CIA breach during a news briefing Tuesday.
[Why the CIA is using your TVs, smartphones and cars for spying]
WikiLeaks indicated that it obtained the files from a current or former CIA contractor, saying that “the archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
But the counterintelligence investigation underway at the CIA is also likely to search for clues to whether Russia had any role in the theft of the agency’s digital arsenal. U.S. intelligence officials allege that WikiLeaks has ties to Russian intelligence services. The website posted thousands of emails stolen from Democratic Party computer networks during the 2016 presidential campaign, files that U.S. intelligence agencies concluded were obtained and turned over to WikiLeaks as part of a cyber-campaign orchestrated by the Kremlin.
Experts and former intelligence officials said the latest files appear to be authentic in part because they refer to code names and capabilities known to have been developed by the CIA’s cyber-branch.
“At first glance,” the data release “is probably legitimate or contains a lot of legitimate stuff, which means somebody managed to extract a lot of data from a classified CIA system and is willing to let the world know that,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.
Faking a large quantity of data is difficult but not impossible, he noted. Weaver said he knows of one case of WikiLeaks deliberately neglecting to include a document in a data release and one case of WikiLeaks deliberately mislabeling stolen data, “but no cases yet of deliberately fraudulent information.”
[WikiLeaks releases thousands of documents about Clinton and internal deliberations]
WikiLeaks said the trove comprised tools — including malware, viruses, trojans and weaponized “zero day” exploits — developed by a CIA entity known as the Engineering Development Group, part of a sprawling cyber-directorate created in recent years as the agency shifted resources and attention to online espionage.
WikiLeaks labeled the trove “Vault 7” and said that it contains several hundred million lines of code, many of which are designed to exploit vulnerabilities in everyday consumer devices.
In a statement, WikiLeaks said the files enable the agency to bypass popular encryption-enabled applications — including WhatsApp, Signal and Telegram — used by millions of people to safeguard their communications.
But experts said that rather than defeating the encryption of those applications, the CIA’s methods rely on exploiting vulnerabilities in the devices on which they are installed, a method referred to as “hacking the endpoint.”
[Why understanding cyberspace is key to defending against digital attacks]
WikiLeaks said that the files were created between 2013 and 2016 and that it would publish only a portion of the archive — redacting some sensitive samples of code — “until a consensus emerges on the technical and political nature of the CIA’s program.”
The organization did not clarify what achieving such a consensus would entail, but for now it appeared to be withholding fully formed pieces of ready-made code that could be used by other intelligence services or even novice hackers.
Still, the data release alarmed cybersecurity experts, who said the files contain snippets of code that could enable adversaries to replicate CIA capabilities or identify and root out CIA “implants” currently in place.
“This is explosive,” said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. The material highlights specific anti-virus products that can be defeated, going further than a release of NSA hacking tools last year, he said. The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s . . . hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”
Hackers who worked at the NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The implants — software that enables hackers to remotely control a compromised device — are “very, very complex” and “at least on par with the NSA,” said one former TAO hacker.
Beyond hacking weapons, the files also purportedly reveal information about the organization of the CIA’s cyber-directorate and indicate that the agency uses the U.S. Consulate in Frankfurt, Germany, as a hacking hub for operations in Europe, the Middle East and Africa.
Though primarily thought of as an agency that recruits spies, the CIA has taken on a larger role in electronic espionage over the past decade. In 2015 the agency created the Directorate of Digital Innovation, a division that puts cyber-work on equal footing with long-standing directorates devoted to conventional spying and analysis.
The CIA’s focus is more narrow and targeted than that of the NSA, which is responsible for sweeping up electronic communications on a large scale around the globe. By contrast, CIA efforts mainly focus on “close in” operations in which the agency at times relies on individuals carrying thumb drives or other devices to implant code on computer systems not connected to the Internet.
One of the most intriguing tools described in the files, called “Weeping Angel,” can apparently be used to put certain television sets into a fake “off” mode while activating a microphone that enables the CIA to capture any conversations in the surrounding space.
Ashkan Soltani and Julie Tate contributed to this report.
-
4
Did 'BIG BRO' knock off Michael Hastings ?
by Sol Reform innaw, that only happens in russia.. michael hastings sent email about fbi probe hours before deaththe huffington post | by melissa jeltsenposted: 06/22/2013 6:02 pm edt | updated: 06/22/2013 11:36 pm edt2,7686211281502get media alerts:sign upfollow:michael hastings, michael hastings buzzfeed, michael hastings death, michael hastings email,michael hastings fbi, media newshours before dying in a fiery car crash, award-winning journalist michael hastings sent an email to his colleagues, warning that federal authorities were interviewing his friends and that he needed to go "off the rada[r]" for a bit.. .
the email was sent around 1 p.m. on monday, june 17. at 4:20 a.m. the following morning, hastings died when his mercedes, traveling at high speeds, smashed into a tree and caught on fire.
he was 33.hastings sent the email to staff at buzzfeed, where he was employed, but also blind-copied a friend, staff sgt.
-
no password
http://redstatewatcher.com/article.asp?id=66523
Look what happened to the last reporter who wrote about Obama/CIA spying on people
Michael Hastings, a reporter for Buzzfeed died in a single car accident in the middle of the night shortly after publishing "Why Democrats Love to Spy on Americans." His next piece was going to be an expose on the Obama administration. This is now spreading as Americans are learning from Wikileaks Vault7 about newly discovered evidence of CIA car method of car jacking.Posted Tuesday, March 07, 2017
-
26
Vigil held for Burney man who died after being set on fire
by no password invigil help for burney man who died after being set on fire.
community members shared their memories of wicks, a member of the jehovah's witness hall in burney.
many of them remember him from his post at the shell station, where he worked along with his wife.
-
no password
Forensic tests conducted by the California Department of Justice revealed on Dec. 30 that Veneagas' DNA was found on the inside wrist cuffs of the rain suit, as well as on the bicycle and a ski mask that deputies recovered, according to the sheriff's report.According to the report, a detective interviewed Venegas on Dec. 23. He said he heard about the homicide through Facebook but refused to provide a DNA sample and eventually left the interview.Venegas, 39, of Burney, was arrested by the Shasta County Sheriff's Office and charged with first-degree, premeditated murder with torture of Wicks.his preliminary hearing was set for March 28.Venegas, who was arrested Jan. 19 at his Telecaster Lane home in west Redding, remains in Shasta County Jail in lieu of $5 million bail. -
7
ACTION ALERT: PA Survivors of child sex abuse, we need you to call PA Attorney General’s Office 1-888-538-8541
by awareness inlast april, the pa attorney general’s office established a toll-free phone number for survivors of child sex abuse (who were pa residents, or were abused by someone in pa) to call if they wanted to file a report of being sexually abused or molested as a child under 18 no matter how long ago the abuse happened or no matter who committed the abuse.. .
the ag’s office is asking victims from all the places/institutions and all the alleged criminals that have literally gotten away with soul murder.
hopefully, the ag’s office will be able to take further steps to expose the criminals and the criminal institutions that aided and abetted the perps.. .
-
no password
A Report of the ??? Statewide Investigating Grand Jury coming soon ?______________________________________________________________In other news:Statement by Mary Ellen Kruger, Chair of the SNAP Board
UNITED STATESBarbara Blaine, the founder and president of SNAP, the Survivors Network of those Abused by Priests, has stepped down from the organization effective February 3, 2017. We are grateful for her 29 years of leadership. Her contribution to the survivors movement is unsurpassed. Her tenacity and fortitude helped expose abuse globally during the past three decades. We will carry on her vision of SNAP as we grow in new ways to better meet the needs of survivors coming forward today and in the future. We wish Barbara the best.Barbara Dorris, SNAP’s Outreach Director, has become the Managing Director. In this new position, Barbara will work closely with the SNAP board of directors to continue to engage our volunteer leadership nationwide to help more survivors of sexual abuse and assault, and to stop the cycle of abuse and the cover up, no matter where the abuse occurred.Barbara Dorris can be contacted at (314) 503-0003 or [email protected].
Survivors Network of Those Abused by Priests -
2
New owner of 'JW ' 124 Columbia Heights in Brooklyn, New York, Vincent Viola, has withdrawn his name from consideration for Army secretary.
by no password inhttp://bigstory.ap.org/article/dff5863268a846bb9c8efea1523f249b/trumps-nominee-army-secretary-withdraws-his-name.
' cited his inability to successfully navigate the confirmation process and defense department rules concerning family businesses.'.
trump's nominee for army secretary withdraws his name.
-
no password
' cited his inability to successfully navigate the confirmation process and Defense Department rules concerning family businesses.'Trump's nominee for Army secretary withdraws his name
By JULIE PACEFeb. 4, 2017 1:19 AM ESTWASHINGTON (AP) — President Donald Trump's nominee for Army secretary, businessman Vincent Viola, has withdrawn his name from consideration for the post.Defense Secretary Jim Mattis was disappointed but understood and respected Viola's decision, a Pentagon statement said. Mattis will recommend to Trump another candidate soon, the statement said.A Trump administration official confirmed Friday night that Viola had withdrawn. The official spoke on condition of anonymity because the official wasn't authorized to speak publicly.The Military Times reported that Viola said in a statement he was "deeply honored" to be nominated but cited his inability to successfully navigate the confirmation process and Defense Department rules concerning family businesses.Viola was the founder of several businesses, including the electronic trading firm Virtu Financial. He also owns the National Hockey League's Florida Panthers and is a past chairman of the New York Mercantile Exchange.A 1977 West Point graduate, Viola trained as an Airborne Ranger infantry officer and served in the 101st Airborne Division. In 2003, he founded and helped fund the Combating Terrorism Center at West Point.'https://www.jw.org/en/news/releases/by-region/united-states/witnesses-sell-property-124-columbia-heights/ -
26
Jalessa Castillo, a Jehovah Witness Pioneer, who joined The Orlando Times Team, maintains a 3.75 Grade Point Average at Valencia College.
by no password inhttp://www.orlando-times.com/the_journey_of_jalessa_526.html.
the orlando times.
home.
-
no password
The Orlando TimesThe Journey Of Jalessa
The Journey Of Jalessa Castillo
Young Journalist Latest To Join The Orlando Times Team
BY DEVIN HEFLIN
ORLANDO - A childhood passion has transitioned to a beginning career profession for one young writer. Jalessa Castillo, 18, who started in the field of journalism as a student at West Orange High School, has continued her journey through this field as a reporter, graphic designer and social media manager for The Orlando Times newspaper.
She started work with the publication on June 25, 2016 and has since covered topics which range from the Flint Water Crisis, Better Wages for Women workers and the local East Orange County Water Crisis which was identified by commissioners in that area of Orlando.
Castillo tells of what inspired her to want to become a journalist, “I always liked to write, since I was younger, so as I got older, I started trying different avenues for writing. I felt like journalistic writing was my thing and I was good at it.”
In her writing process, Castillo works first on the intro and conclusion of the story, then fields her references to complete the feature.
“I like writing fun articles like the one on amusement parks which are opening but I also like research. One of my favorite stories was coverage of the pay gap between men and women and about the Orange County Water Crisis.” she said.
She was a solid student while enrolled at West Orange High School, who was adored by teachers and her peers alike. While a student at West Orange, Castillo participated and produced pages on behalf of West Orange High School to fit into The Orlando Times newspaper, as part of the publication’s High School Page Placement Program. She was the Blade’s editor, the name of West Orange’s student produced publication.
Castillo is currently a student at Valencia College West Campus. Her major is journalism and she takes a mixture of online and on campus classes.
“I felt it would be good to go towards that field while also getting experience here.” She said.
Castillo graduated West Orange High School with a Merit Diploma and remained on the honor roll for the entirety of her high school career.
She received the Academic Florida Bright Futures Scholarship and has made the President’s Honor roll for her first full freshman year semester at Valencia College. Her current Grade Point Average is a 3.75.
Her hobbies are reading, writing and drawing. She has two older Brothers, Jordan and Jason and a younger sister, Jazlene.
“My daughter is a gift from God and she has made us very proud.” Her father, John Castillo. “She is spiritually oriented and demonstrates qualities such as humility, kindness, honesty, generosity and responsibility”.
The Queens, New York native, is also active as a Jehovah Witness. She works as Pioneer for the Kingdom Hall, which volunteers for door to door services on a monthly basis to help spread the word and mission of Kingdom Hall.
Her mentor in the faith, Adrian Nesbeth, has worked with Castillo for many years. “Jalessa is a bright and personable individual with impeccable integrity, tenacity and overall love for humanity. A gifted writer, a lifelong learner and someone destined to succeed at whatever she does because she has commitment to quality.”
Of her most challenging story of her career to date, Castillo remembers her assignment to cover the East Orange County Water Crisis, which required a depth of research and knowledge of the chemicals and substances to report on in the story.
Castillo cites her mom as her greatest inspiration. “We’ve always been very close and I’ve seen her being down to being at the top of her game.” She said.
“I am so proud of my daughter. “ Her mother, Jody said. “She is the first in her immediate family to attend college and follow her dreams of becoming a journalist.”
“If your school has a newspaper staff or a yearbook staff, join those. That will give you a taste of what to expect. Experience is very important.” Castillo gave her advice to students interested in pursuing journalism.
“I’m blessed to be here and work with those that are more experienced than I am and I appreciate the experience to be able to learn and grow with them.” She said. -
4
Lucky Jehovah Witness Refugee makes it to Phoenix
by no password inhttps://www.wsj.com/articles/for-refugees-tears-and-relief-1486165137.
double celebration.
phoenix—six years ago, yosan tesfay sneaked across the border from her home country of eritrea to ethiopia to flee religious persecution.
-
no password
https://www.wsj.com/articles/for-refugees-tears-and-relief-1486165137
Double Celebration
PHOENIX—Six years ago, Yosan Tesfay sneaked across the border from her home country of Eritrea to Ethiopia to flee religious persecution. This Wednesday, the Jehovah’s Witness made it into the U.S. just before the doors shut to refugees for at least four months.Yosan Tesfay walks with Julie Black and other members of the International Rescue Committee to the baggage claim area after arriving from Ethiopia.After a three-day odyssey, which included a nerve-racking secondary inspection at Los Angeles International Airport, Ms. Tesfay emerged bleary-eyed at the airport in Phoenix ready to begin her new life in America alone.Ms. Tesfay’s eyes welled with tears as she spotted welcome posters hoisted by volunteers and staff from the International Rescue Committee, the agency settling her in Phoenix.“I’m very, very happy,” she said, her voice breaking, two days before her 29th birthday.Ms. Tesfay hangs her clothes at her hotel room after arriving in Phoenix on Feb. 1.Yosan Tesfay sees her hotel room after arriving in Phoenix from Ethiopia on Feb. 1.Ms. Tesfay said she nearly died from food deprivation and beatings during the year that she was imprisoned for her religious beliefs and for refusing to serve in the military, which goes against the practices of Jehovah’s Witnesses. She fled her home country in 2011 to neighboring Ethiopia, where she received refugee designation from the U.N.Her wait thus began for a new country to call home. Ms. Tesfay had no idea whether she would end up in Europe or North America.A year ago, she was summoned to begin a process that involved interviews, security checks, finger printing and physical exams. As it unfolded, she was informed the U.S. had selected her for resettlement.Three weeks ago, Ms. Tesfay learned she would be Phoenix-bound Jan. 31. As she prepared to leave, she heard about the resettlement suspension. “They told me I was one of the lucky ones. I thanked God,” she said.Ms. Tesfay resettled into her Phoenix apartment on Friday, her 29th birthday, in Glendale, Ariz. She heard about the resettlement suspension as she prepared to leave Ethiopia. ‘They told me I was one of the lucky ones. I thanked God,’ she said.The IRC in Phoenix, which helped about 1,200 refugees last year, had expected 10 cases—individuals or families—this week. Travel was canceled for all of them due to the ban, except Ms. Tesfay.“She is literally our last case,” said Nicky Walker, an IRC manager who was at the airport.—Reported by Miriam Jordan; photographs by Sandy Huffaker for The Wall Street Journal, Caitlin O’Hara for The Wall Street Journal