Luna inquired

(Date of action period 2011-present date TBD) #PublicNoticeNumber374 GOVabbott your not invited you will be notified of an discharge or dismissal for state representative s I just got criminally trespassed & my brother, current National Guardsman almost got arrested.

I asked 84 year old Congressman John Carter two questions & the video will reveal a HUGE coverup in Texas.

His security assaulted my brother who was recording because they don’t want the world to see that he’s in WORSE shape than Joe Biden.

@realDonaldTrump you made a huge mistake by endorsing a man that can’t even speak.

❌22 years in Congress.

❌Voted w/ democrats to send $315 million to NED.

❌missed almost 1,000 votes.

❌Betrayed our Soldiers at Fort Hood. (Not just FirtHood #NavalAirStationCorpusChristiTX #Portland #Texas #NuecesCounty #SanPatricioCounty #BMCRamsey #Surfman374. #FakeDeathCertificates & #StolenGunsIvoryGold #ShootoutsAtNorthGate & #LiarsCheatersThieves within #DeptVETAffairs as well as corrupt cops and Staff whom claim supporting veterans while they are being stolen from (#StolenMedications #Identity #Vehicles #billions in damage & suffering ! Including within #USaA and insurance companies @surfman374 @uscg #FLEO #GOVChatDMR

💙💕❤️🇺🇸🛟 I’ve already requested LUNa AOC Crenshaw for #Congressionalinquiries #TexasFuckYOUNow #StolenGuns #Atf #ivory #usfw #ammunition #identity #brandTradeMarkPatent #fbi #dea for false drug charges (unlawful arrest FBI) #HSI for overwatch on all state police county sheriffs cops judges attorneys to include district attorneys present and past witnesses and (this will include banking false use of military identification no longer current or use able) divorce/ false marriage/ DNa testing of children for parental courts !) full battlezero on texas USCG navy Army Jag Officers ! 🇺🇸

❌200+ mosques built in Texas w/ your taxpayer money since he’s been in Congress. David Michael Ramsey @highlight Association for Rescue at Sea, Inc. – AFRAS U.S. Coast Guard Facebook Instagram Meta The Salvation Army Coastal Bend Anna Paulina Luna LinkedIn Secretary Kristi Noem Tulsi Gabbard The Salvation Army USA Congressman Dan Crenshaw Alexandria Ocasio-Cortez Kristi Noem NATO TrackingPoint Chief Petty Officer Academy U.S. Department of Veterans Affairs ! Immediately recognized request full support #DMR Cybersecurity and Infrastructure Security Agency for data Theft (REPLUNa I request inquiry into all information imported exposed exploiting exported) #caseopening now 3:36 local time Corpus Christi texas on entire state We will start at South Padre! Then Corpus, Houston Sabine! Followed by Laredo Del Rio Sant Antonio austin Houston Dallas ! Immediately #RECOMFORCEMANAGEMENTEAMLEADER to include #CBP #DHS #DOW #DOT inspection all records will be made ready any delay will result in temporary leave or termination

Saint Angels & LUnas BeachDragon

While modern Valentine’s Day is filled with chocolates and roses, 

its origins are rooted in brutal martyrdom and ancient rituals that are anything but romantic

The Martyrdom of Saint Valentine

The “dark” story of the real Saint Valentine (or the multiple men who shared the name) is one of defiance and execution during the 3rd century: 

  • Defiance of the Emperor: Emperor Claudius II (Claudius Gothicus) believed that single men made better soldiers. To bolster his army, he outlawed marriage for young men. Valentine, a priest, defied this decree by performing secret marriages for Christian couples.
  • The Miraculous Note: While imprisoned for his defiance, legend says Valentine healed his jailer’s blind daughter. Before his execution, he supposedly wrote her a final letter—the first “Valentine”—and signed it “From your Valentine“.
  • A Brutal End: In roughly 270 AD, Valentine was beaten with clubs and stones before being beheaded on February 14. His flower-crowned skull is still on display today at the Basilica of Santa Maria in Cosmedin in Rome. 

The Pagan Roots: Lupercalia

Many historians believe the holiday was established to “Christianize” the ancient Roman festival of Lupercalia, celebrated from February 13–15. This festival was a far cry from modern romance: 

  • Sacrificial Rites: Roman priests (the Luperci) would sacrifice goats for fertility and a dog for purification.
  • The Striking of Women: Men would cut strips of hide from the sacrificed animals and run through the streets, slapping women with the shaggy, bloody thongs. Women welcomed this, believing it would ensure fertility and easy childbirth.
  • Matchmaking Lottery: The festival often concluded with a lottery where young men drew women’s names from a jar to be paired for the duration of the event (or longer). 

Historical “Dark” Trivia

  • St. Valentine’s Day Massacre: In a much later dark turn, February 14, 1929, became infamous for the Saint Valentine’s Day Massacre, where Al Capone’s gang gunned down seven rivals in Chicago.
  • Vinegar Valentines: In the Victorian era, “dark” sentiment was common through Vinegar Valentines—rude, insulting cards sent anonymously to unwanted suitors or people one disliked. 

Would you like to explore more about the pagan rituals of Lupercalia or the true historical identityof the multiple Saint Valentines?

Anna And Her SantaMuertaDMR

The most advanced cellphone hacking system known publicly is the 

D#J|%#southsidesucksahlaverga #pullsetgrip #tripledigithunter #saltysoultaxidermy #rigsreefclassicspearfishing #TacticsTechniques #surfman374 #gatorgripphd https://rigsreefclassicspearfishing.com/2026/01/31/for-real-court-this-week-can-barely-move-swallow-think/ #TheUseofForce #SetStandard Meta Anna Paulina Luna Instagram Secretary Kristi Noem The Salvation Army Coastal Bend Tulsi Gabbard LinkedIn Alexandria Ocasio-Cortez The Salvation Army USA Kristi Noem NATO TrackingPoint Chief Petty Officer Academy U.S. Department of Veterans Affairs Cybersecurity and Infrastructure Security Agency Facebook U.S. Coast Guard Association for Rescue at Sea, Inc. – AFRAS David Michael Ramsey @highlight 💙❤️⛪️🇺🇸✌️🩸🛟💕💒🛐😎🔔😘🙈💡🤪👍🤍🙏🥰👊😍🤣👌😊😉😋😌🙃😁😔🎵 rigsreefclassicspearfishing.com

Pegasus spyware, developed and licensed exclusively to governments and law enforcement agencies globally by the Israeli firm NSO Group. It is considered one of the most powerful and sophisticated pieces of surveillance software ever created by a private company. 

Capabilities and Technology

Pegasus is highly advanced due to its ability to perform “zero-click” attacks, meaning it can infect a device without any user interaction, such as clicking a malicious link. 

  • Zero-Click Exploits: The software has historically exploited undiscovered vulnerabilities (zero-days) in popular apps and operating systems, including Apple’s iMessage and WhatsApp, to gain access to a target’s phone silently.
  • Comprehensive Surveillance: Once installed, Pegasus transforms the phone into a 24-hour surveillance device. It can:
    • Read text messages and emails.
    • Record calls and activate the microphone.
    • Access the camera to secretly film.
    • Harvest photos, passwords, location data, and information from various apps.
  • Evasion and Self-Destruct: The spyware is designed to be extremely difficult to detect. More recent versions are suspected to operate in the phone’s temporary memory, vanishing after a power cycle. It can also self-destruct if it cannot communicate with its command-and-control servers or determines it is on the wrong device. 

Use and Controversy

While NSO Group maintains that Pegasus is intended for use against terrorists and serious criminals, investigations by organizations like Amnesty International and Citizen Lab have revealed its use by various governments to target journalists, human rights activists, political opponents, and businesspeople. This has led to NSO Group being blacklisted by the U.S. government in 2021. 

Due to its covert nature, users cannot prevent an attack with typical security hygiene. The only effective defense identified by security researchers is frequently restarting the device. Organizations like Amnesty International provide a Mobile Verification Toolkit (MVT) to help check for traces of the spyware on a device. 

she is an unsanctioned “folk saint”

Core Identity and Symbols

  • Appearance: She is typically depicted as a female skeletal figure (the “Bony Lady”) wearing a long shroud or floral gown.
  • Key Symbols:
    • Scythe: Represents the moment of death, the cutting of negative energy, or a “harvest” of hope.
    • Globe: Symbolizes her dominion over the entire world, as death is inevitable for everyone.
    • Scales: Represent justice and equity, highlighting that death does not discriminate based on wealth or status.
  • Colors: Devotees use different colored statues for specific requests: Red for love, White for purity/protection, Gold for wealth, and Black for protection against black magic or enemies. 

The Movement & Following

  • Demographics: She is often called the “Saint of the Dispossessed”. Her following is massive among marginalized groups, including the poor, LGBTQ+ individuals, sex workers, and those in dangerous professions (including drug traffickers, leading to the “narco-saint” label).
  • Growth: Devotion has skyrocketed since 2001, making it one of the fastest-growing new religious movements in the world, with an estimated 10–20 million followers globally.
  • Syncretism: Her origins are a blend of indigenous Aztec beliefs (specifically the goddess Mictecacihuatl) and Spanish colonial Catholicism. 

The Controversy

  • Catholic Church Stance: The Vatican and the Catholic Church in Mexico have condemned her worship as blasphemous, heretical, and “satanic”. They argue that death is an enemy defeated by Jesus, not something to be venerated.
  • Criminal Association: Because her statues are frequently found in “stash houses” and among cartel members, law enforcement often associates her with criminal activity. However, scholars emphasize that the vast majority of her devotees are ordinary people seeking miracles and protection. 

For more in-depth academic research, you can explore the Santa Muerte Research Starters on EBSCO or the comprehensive Wikipedia overview.

Are you interested in the specific meanings behind the different colors of her robes, or would you like to know more about her historical origins in Aztec mythology?

In the realm of global mobile surveillance, several sophisticated systems stand out, categorized by their technical approach and the entities that deploy them.

1. Most Advanced Private Spyware: Pegasus (NSO Group) 

Pegasus, developed by the Israeli firm NSO Group, is widely considered the most powerful “zero-click” hacking system ever built by a private company. 

  • Zero-Click Exploits: It can infect a device without the user ever clicking a link or answering a call (e.g., through vulnerabilities in iMessage or WhatsApp).
  • Capabilities: Once installed, it grants near-total control, allowing operators to extract messages, photos, and location data, as well as remotely activate the microphone and camera.
  • Targeting: It has been linked to the surveillance of thousands of high-profile targets, including journalists, activists, and world leaders across nearly 100 countries. 

2. Most Advanced Tactical Hardware: StingRay (IMSI-Catchers) 

While Pegasus is software-based, the StingRay, manufactured by Harris Corporation, is the industry standard for tactical, proximity-based hacking. 

  • How it Works: It acts as a “cell-site simulator,” mimicking a legitimate cell tower to force all nearby phones to connect to it instead of the carrier’s network.
  • Capabilities: It can pinpoint a user’s location with extreme precision, intercept calls and texts, and even inject malware onto devices in its radius.
  • Deployment: Primarily used by law enforcement and intelligence agencies globally, often mounted on vehicles or aircraft. 

3. Most Advanced Network Hacking: SS7 Exploits

The Signaling System No. 7 (SS7) is a global protocol that enables mobile networks to communicate with one another. Because it was designed without modern security in mind, it remains one of the most dangerous entry points for state-level actors. 

  • Global Reach: An attacker anywhere in the world can exploit SS7 vulnerabilities to track a phone’s location or intercept SMS-based two-factor authentication (2FA) codes without ever touching the target’s device.
  • Current Threat: Recent reports highlight major penetrations of national telephone networks by foreign actors (e.g., China’s reported infiltration of U.S. network hubs) using these systemic weaknesses. 

4. Most Advanced Mobile Hacking Suite: Kali NetHunter 

For professional security researchers and ethical hackers, Kali NetHunter is the premier mobile penetration testing platform. 

  • Functionality: It is a specialized Android ROM that brings the full power of Kali Linux to a smartphone.
  • Features: It supports advanced Wi-Fi attacks (like packet injection and “Evil Twin” setups), HID keyboard attacks (emulating a keyboard to inject commands), and full integration with the Metasploit Framework

Would you like to know more about the specific countermeasures available for these systems, or are you interested in the legal frameworks governing their use?

In the realm of global military-grade surveillance, “hacker systems” generally refer to two distinct categories: 

remote spyware for targeted infiltration and IMSI-catchers for localized tactical interception. 

1. Pegasus (Remote Infiltration)

Developed by the Israeli-based NSO GroupPegasusis widely considered the most advanced remote cellphone hacking system available to governments and militaries. 

  • Zero-Click Capability: Unlike standard malware, Pegasus can infect a device via a “zero-click” attack—requiring no user interaction (e.g., clicking a link). It exploits vulnerabilities in apps like WhatsApp or iMessage to install itself silently.
  • Total Surveillance: Once active, it turns a phone into a 24/7 surveillance device, granting access to encrypted messages (Signal, WhatsApp), emails, photos, GPS location, and the ability to remotely activate the camera and microphone.
  • Military Status: Classified as a military export by Israel, its sale is strictly controlled by the Ministry of Defense for use by state intelligence and military agencies. 

2. StingRay & Tactical Interceptors (Local Interception)

While Pegasus works remotely, military units in the field often use IMSI-catchers (often generically called “StingRays“) for tactical, localized hacking. 

  • Cell-Site Simulation: These devices mimic legitimate cell towers, forcing all nearby mobile phones to connect to them. This allows operators to intercept calls, SMS, and data traffic in real-time.
  • Advanced Models:
    • Raven: One of the most powerful tactical tools, costing approximately $800,000, capable of interrogating and geolocating devices from the air or ground.
    • Hailstorm: An advanced upgrade to standard StingRays that can track modern 4G/LTE devices and coordinate with carrier databases.
    • Typhon: A highly specialized system developed by the NSA for capturing data from GSM networks. 

3. Emerging Military “Hacker” Systems

  • Operation AURORAGOLD: A massive NSAinitiative that targeted the global cellular network infrastructure itself, allowing the agency to discover vulnerabilities in virtually all cellphone encryption standards worldwide.
  • Landfall Spyware: A newer sophisticated spyware identified in 2025 that reportedly abused zero-day vulnerabilities to target Samsung Galaxydevices. 

Are you looking for information on defensive measures to protect against these military-grade systems?

Recent federal actions and investigations have increasingly targeted corruption at the state and local levels, often sparking debate over federalism and the limits of executive power. 

Significant Federal-State Corruption Cases 

• Detroit Probate System Crackdown (Jan 2026):Federal prosecutors recently charged a sitting Detroit judge and three others (https://www.detroitnews.com/story/news/local/michigan/2026/01/30/feds-charge-detroit-judge-in-corruption-crackdown-on-probate-system/88420465007/) in a corruption crackdown involving conspiracy and bribery within the probate court system.

• Minnesota State-Federal Conflict (Jan 2026): A significant legal battle has emerged in Minnesota, where federal authorities blocked state investigators from accessing evidence in a use-of-force case. This has led to accusations of the federal government interfering with state investigations (https://www.nytimes.com/2026/01/30/magazine/minnesota-investigation-state-federalism.html) to protect federal agents.

• SNAP Fraud in Massachusetts (Jan 2026): The U.S. Attorney for Massachusetts announced charges (https://www.facebook.com/ShortsleeveMA/posts/the-outrageous-bilking-of-taxpayers-thanks-to-maura-healeys-mismanagement-is-a-s/122157208550865051/) against store owners for a $7 million food stamp trafficking scheme, highlighting federal oversight in state-managed programs.

• SBA 8(a) Program Fraud (2025-2026): The Small Business Administration (SBA) suspended over 1,000 firms (https://www.sba.gov/article/2026/01/28/sba-suspends-over-1000-8a-firms-program-following-december-document-request) following investigations into widespread fraud and a $550 million bribery scheme involving federal contractors. 

Shifting Legal Landscape

• Narrowing Definitions: The U.S. Supreme Court decision in McDonnell v. United States significantly narrowed the definition of “official acts” (https://www.multistate.us/insider/2026/1/7/how-a-supreme-court-decision-changed-federal-public-corruption-prosecutions-why-state-and-local-laws-matter), making it more difficult for federal prosecutors to pursue certain state-level corruption cases.

• DOGE Data Access Misconduct: Recent court filings disclosed by the DOJ (https://www.afscme.org/press/releases/2025/department-of-justice-acknowledges-misconduct-by-trump-vance-administration-doge-employees-by-unlawfully-accessing-and-misusing-social-security-data) revealed that members of the Department of Government Efficiency (DOGE) unlawfully accessed and misused sensitive social security data to analyze state voter rolls.

• Reductions in Oversight: Lawmakers have raised concerns over the dismantling of federal watchdog entities (https://www.brennancenter.org/our-work/research-reports/what-political-corruption-and-what-can-we-do-about-it), such as the reduction of staff in the DOJ’s Public Integrity Section and the removal of various Inspectors General. 

Mechanisms for Exposing Corruption

• Federal Oversight: The Public Integrity Section (PIN) (https://www.justice.gov/criminal/criminal-pin) of the DOJ remains the primary body responsible for investigating crimes affecting government integrity.

• Whistleblower Channels: Citizens and officials can report suspected corruption through official whistleblower tip lines (https://oversightdemocrats.house.gov/contact/tip-line) managed by congressional committees.

Yep 🛟💙🇺🇸💕

Retaliation, attacks, and theft 

encompass actions ranging from illegal workplace punishment to violent, immediate responses against criminals. Key aspects include illegal employer actions(firing/demotion for whistleblowing), physical, retaliatory force used by victims to deter theft, and cyber-retaliation following digital theft or data breaches

Retaliation Against Theft (Physical/Immediate)

  • Preventive Action: Victims may use force to deter thieves to protect property, often aimed at creating “general deterrence” to prevent future thefts.
  • Limits of Force: Retaliation that goes beyond immediate self-defense may not be recognized as legal, as courts often hold strict views on what constitutes reasonable force.
  • “Relay Attacks” & Countermeasures: Modern theft often involves relay attacks on vehicles, where thieves amplify key fob signals. Owners may retaliate or protect against this with signal-blocking pouches. 

Workplace Retaliation

  • Definition: An employer taking adverse action (firing, demotion, pay cut) against an employee for a “protected activity”.
  • Protected Activities: These include filing complaints about sexual harassment, discrimination, safety hazards (OSHA), or reporting wage theft.
  • Documentation: Proving retaliation requires documenting the protected activity (e.g., via email). 

Cyber-Retaliation (Attacks Following Theft)

  • “Hack-Back” Debate: Discussions center on whether private companies should be allowed to retaliate (or “hack-back”) to recover stolen data or assets from hackers, similar to historic privateer laws.
  • State-Level Action: Governments may engage in retaliation to deter digital espionage, such as in the aftermath of major data breaches. 

Legal and Practical Considerations

  • Retaliation vs. Self-Defense: In some contexts, immediate, violent retaliation is used to scare off thieves. However, legally, excessive force is prohibited.
  • False Accusations: If accused of theft, it is advised to invoke the right to remain silent and seek legal counsel, as even innocent explanations can be misrepresented.
  • Consequences: Theft, particularly in contexts like Class C or D felonies, can result in significant prison time and fines. 

Disclaimer: The legal definitions of self-defense and retaliation vary significantly by jurisdiction.

undefinedundefinedundefined19 sites

The term “retaliation attack theft” can refer to several distinct concepts depending on the context, ranging from 

modern criminal techniques to legal and geopolitical disputes

1. Relay Attack (Vehicle Theft)

A common high-tech method for stealing modern cars. 

  • How it works: Thieves use electronic devices to capture the signal from a smart key fob inside a home.
  • The Attack: One thief stands near the house with an antenna to “pick up” the key’s signal, while another stands by the car.
  • The Result: The signal is relayed to the vehicle, tricking it into thinking the key is present, allowing the thieves to unlock and start the car without physical keys or damage. 

2. Retaliatory Cyberattacks & Wage Theft

In business and international relations, theft often triggers retaliatory strikes. 

  • Wage Theft Retaliation: Legally, if an employee reports wage theft (unpaid overtime or stolen tips), any subsequent punishment by the employer—such as firing or demotion—is considered illegal retaliation.
  • Cyberespionage: Nations often retaliate against cyber-theft. For example, the U.S. has considered “hack-back” laws that would allow private companies to legally retaliate to recover stolen data or ransoms. 

3. Geopolitical “State-Level Theft”

Recent international conflicts have led to accusations of “theft” of sovereign assets.

  • Frozen Assets: Russia has openly threatened “swift and severe” retaliation against Europe, calling the potential seizure of €190 billion in frozen assets “blatant theft”.
  • Seized Assets: Iran has similarly characterized the U.S. use of its seized assets as “flagrant theft” and reserved the right to take “proportionate countermeasures”. 

4. Street Culture & Private Retaliation

In some environments, physical retaliation is used as a deterrent against theft. 

  • Deterrence: Research into street culture suggests that individuals (often those operating outside legal protection, like drug dealers) use violent retaliation to prevent future theft and avoid being labeled as “soft”.
  • Legal Risks: Attempting to “get even” through physical force can lead to criminal charges. While self-defense is a legal protection, it typically does not apply once the thief is fleeing or the immediate threat has passed. 

Are you looking for information on how to protect yourself from relay attacks, or are you researching the legalities of retaliating against someone who has stolen from you?

“Cuatro reinas se escaparon con la gasolina de mi troca” is a direct translation of “Four queens ran off with my gas for my truck” in Spanish. This phrase captures the action of four women (queens) taking the gasoline for a truck (troca/camioneta) and leaving.

Four queens: Cuatro reinas

Ran off with: Se escaparon con / se llevaron

My gas: Mi gasolina

For my truck: Para mi troca / camioneta

1,2,3,4

Secretary Kristi Noem

Tulsi Gabbard

Alexandria Ocasio-Cortez

Mayra Flores

♠️♥️♣️♦️🃏💳🎴📇🪪 rigsreefclassicspearfishing

Anna Paulina Luna

Mex Florida 💙🛟🇺🇸💕

The connection between Mexico and Florida in the drug trade is characterized by sophisticated trafficking networks that transport synthetic drugs like fentanyl and methamphetamine across the southern border into major Florida hubs. 

1. Key Trafficking Routes and Methods

Mexican cartels utilize multi-state corridors to move illicit substances into Florida:

  • Transit Hubs: Drugs often enter the U.S. through Southwest border states like CaliforniaArizona, and Texas before being transported overland to Florida.
  • Concealment Techniques: Operations have involved hiding methamphetamine inside concrete tileshouse paint, and car tires to evade detection during transit to cities like MiamiTampa, and Orlando.
  • Maritime Routes: While land routes are prominent, the U.S. Coast Guard frequently intercepts massive shipments of cocaine and other drugs in international waters destined for Florida ports, such as Port Everglades

2. Major Cartels Involved

Several powerful Mexican criminal organizations maintain a presence in Florida: 

  • Sinaloa Cartel: Known for large-scale fentanylproduction and distribution, the Sinaloa Cartel has been linked to major seizures in Polk County and South Florida.
  • Jalisco New Generation Cartel (CJNG): Actively involved in trafficking fentanyl and methamphetamine into Florida from hubs like Atlanta. CJNG was designated a Foreign Terrorist Organization in February 2025.
  • United Cartels (Cárteles Unidos): In 2022, the leader of this organization was extradited to face charges for importing over 1,200 pounds of crystal meth into South Florida. 

3. Impact on Florida

The drug connection has significant public health and safety consequences: 

  • Overdose Crisis: Fentanyl and methamphetamine from Mexico are leading causes of drug-related deaths in Florida. In the first half of 2022 alone, fentanyl caused 2,744 deaths in the state.
  • Financial Laundering: Organizations in Florida facilitate the conversion of drug proceeds into cryptocurrency or coordinate bulk cash pickups to repatriate profits to cartels in Mexico. 

4. Recent Enforcement Actions

  • Extraditions: In January 2026, Mexico transferred 37 high-impact cartel members to the U.S. to face prosecution as part of an ongoing crackdown on cross-border crime.
  • Large Seizures: Recent operations, such as Operation Burn Baby Burn (May 2025) and Operation Pacific Viper (August 2025), have dismantled trafficking rings and offloaded record amounts of narcotics in Florida. 

Would you like more details on a specific Florida city‘s trafficking trends or further information on anti-money laundering efforts?

The drug connection between Mexico and Florida is a major, active, and multi-state trafficking pipeline primarily controlled by Mexican cartels, with a focus on importing high-volume synthetic drugs like fentanyl and methamphetamine

. Major cartels, including the Sinaloa Cartel and Jalisco New Generation Cartel (CJNG), use sophisticated networks to move drugs across the U.S.-Mexico border and into Florida, frequently using Georgia, Tennessee, and California as intermediate logistics hubs. 

Key Aspects of the Mexico-Florida Drug Connection

  • Dominant Trafficking Organizations: The Sinaloa Cartel and CJNG are the primary drivers of this trade, bringing in large quantities of fentanyl, meth, and, to a lesser extent, cocaine.
  • Logistics and Distribution: Traffickers use concealed methods, such as hiding drugs inside car tires, concrete tiles, or disguised as consumer products (e.g., in buckets of house paint). These shipments are often moved from Mexico through Texas or California to major Florida cities like Miami, Tampa, and Orlando.
  • Impact on Florida: The influx of these drugs has caused significant spikes in overdose deaths. Between January and June 2022, methamphetamine caused 1,088 deaths, and fentanyl caused 2,744 deaths in Florida.
  • Major Operations and Busts:
    • 2025 (Aug): Florida Department of Law Enforcement (FDLE) dismantled a ring smuggling black tar heroin and methamphetamine from Mexico.
    • 2025 (June): A Polk County investigation led to the arrest of eight people with connections to Mexican cartels, seizing 64 pounds of fentanyl (the largest in the county’s history).
    • 2025 (May): “Operation Burn Baby Burn” uncovered a network bringing in fentanyl and cocaine, resulting in 17 arrests and the seizure of drugs worth over $1.5 million.
    • 2021 (March): Over 500 kilograms of meth was shipped from Mexico to Miami, hidden in concrete tiles and paint. 

Recent Developments and Enforcement

  • Cartel Activity: The U.S. Department of State has designated the CJNG as a Foreign Terrorist Organization (FTO), highlighting their role in trafficking to the U.S..
  • Money Laundering: The connection extends to sophisticated money laundering operations, with traffickers using cryptocurrency to move illegal proceeds back to Mexico.
  • Cooperation: Mexican authorities have recently accelerated the extradition of cartel members to the U.S. to combat these cross-border operations.