The adventures of Anna and Her Three NutCrackers 🎵🇺🇸💙🛟

ChesterRBenderAward #WestCoastCoastGuard #WashingstonStateCoastGuard #AmericanLegionCoastGuard #OilsSpills #Hurricanes #GunsDrugsHookers #Mexico #Texas #Oregon #Washington #Alaska #CapeMay #JerseyShore #Destin #District8 #District13 #district17 rigsreefclassicspearfishing.com

David Michael Ramsey @highlight – Anna Paulina Luna Tulsi Gabbard Secretary Kristi Noem Alexandria Ocasio-Cortez Mayra Flores U.S. Coast Guard Kristi Noem Association for Rescue at Sea, Inc. – AFRAS Go Coast Guard #DMR (DoMoreRight) DavidMRamsey Initially Initiated

BMC David M Ramsey USCG DHS
(503)298-0592
blacknbluepb@yahoo
Portland Texas (Single Solo safer) 🎵💙🛟🇺🇸

The powers are love (red), health (green), justice (green), prosperity (gold/yellow), wisdom (blue), protection/spiritual power (purple/black), and spiritual cleansing (white).
Red: Love, passion, and romance.
Green: Justice and legal matters.
Gold/Yellow: Prosperity, success, and abundance.
Blue: Health and healing, also wisdom and mental clarity.
Purple: Spiritual power, growth, and transformation.
White: Purity, spiritual cleansing, and peace.
Black: Protection against enemies, negativity, and violence.

David Michael Ramsey @highlight

For you Anna Paulina Luna and your Coasties 🎵🇺🇸💙🛟 rigsreefclassicspearfishing @surfman374

Money thieves since 2009

rigsreefclassicspearfishing.com

gator-gripp.com

blacknbluepaintball.com

David Michael Ramsey @highlight @surfman374

dmr #satlysoulpanga #saltysoulsurfacedrive #pullsetgrip

I have never made a dime i lost my 3M HearIngLoss VAPay SSDPay USCG CRSC 100% Disabled Combat Related RFO RECOM ChiefOfOperations Surfman SAI BoardingOfficer Tactical Pursuit International Instructor Port Secrets globally 🎵🇺🇸💙🛟👌😇

Nor does anyone work with me or for me I have no family or friends David Michael Ramsey @surfman374 rigsreefclassicspearfishing.com founder BMCRamsey never have never will! 2018 – Date

https://www.dni.gov/index.php/who-we-are/leadership/director-of-national-intelligence

https://luna.house.gov/

https://www.justice.gov/ag

https://www.dhs.gov/kristi-noem

https://www.ocasiocortez.com/splash

http://ocasio-cortez.house.gov/

http://ocasio-cortez.house.gov/

A “global cartel war” refers to the ongoing conflict between governments and transnational organized crime groups, or cartels, to control the illegal drug trade

. The “war on drugs” is a broad term, but in recent years, the term has increasingly been used in a “counter-cartel” context, often involving military intervention. Notable examples include the Mexican Drug War and US military actions against cartels in the Caribbean. 

Key aspects of the “global cartel war”

  • Organized crime vs. governments: The conflict involves powerful cartels like the Sinaloa CartelCJNG, and Gulf Cartel versus government forces, including Mexican federal forces and US military assets.
  • Global scope: The term reflects the transnational nature of the drug trade and the coordinated efforts to combat it. This includes international cooperation, as seen with foreign support for Mexico’s government from countries like the United States, Colombia, and Australia.
  • Military and counter-terrorism: In some contexts, the conflict is framed as a counter-terrorism effort, especially when military force is used. For example, the US has used military personnel and warships to combat cartels blamed for trafficking fentanyl and other drugs.
  • Human cost: The conflict has a high human cost, with tens of thousands of casualties reported in the Mexican Drug War alone, including civilians, government forces, and cartel members.
  • International cooperation: The “war” is not just a regional one. It involves international treaties, such as those from the United Nations, and the participation of multiple countries in anti-narcotics campaigns.
  • Other belligerents: In addition to cartels and government forces, other groups are involved, including the Popular Revolutionary Army (EPR), the Zapatistas, and various self-defense groups. 

  • “Global cartel war” generally refers to the ongoing, decentralized conflict involving international drug trafficking organizations, particularly the intense and prolonged violence in Mexico (known as the 
    Mexican drug war), and the recent designation of some cartels as “unlawful combatants” by the United States, escalating the “war on drugs” with military force. 
    This situation is complex, involving conflicts on several fronts:

    Cartel vs. Cartel
    Drug trafficking organizations constantly engage in brutal turf wars to control smuggling routes, production territories, and local markets. Key examples include: 
    Sinaloa Cartel vs. CJNG (Jalisco New Generation Cartel): These two are currently the most dominant and violent groups, fighting fiercely for supremacy across Mexico.
    Internal Factionalism: The capture or killing of a major leader (a “kingpin strategy”) often leads to power vacuums and internal conflict as lieutenants and factions fight for control. The recent capture of Ismael “El Mayo” Zambada, for instance, has sparked an internal war within the Sinaloa Cartel, leading to a massive spike in homicides in Sinaloa state. 

    Cartel vs. Government (Mexico)
    The Mexican government has engaged in a militarized campaign against cartels since 2006, deploying federal troops and police. This strategy has: 
    Involved high-profile arrests and operations but has also been criticized for contributing to soaring violence and human rights abuses.
    Seen cartels adopt military-grade tactics and weaponry, including homemade mortars, IEDs, and bomber drones.
    Resulted in significant civilian impact and a crisis of disappearances and killings. 

    Cartel vs. Government (United States)
    The U.S. has historically supported anti-narcotics efforts in Latin America through intelligence, funding, and training (e.g., the Mérida Initiative). The situation escalated significantly in late 2025: 
    The U.S. President formally declared the U.S. in a “non-international armed conflict” with several cartels it designated as foreign terrorist organizations.
    The U.S. military has conducted a series of lethal airstrikes on alleged drug-carrying vessels in the Caribbean and Eastern Pacific, killing dozens.
    There are plans and discussions within the U.S. administration for potential ground operations and military strikes inside Mexico to target drug labs and leaders.
    These actions are highly controversial, raising legal and sovereignty concerns, with the Mexican government firmly rejecting any U.S. military presence on its soil. 
    The situation is a complex, multi-layered conflict driven by the massive illicit drug trade, primarily the flow of fentanyl into the U.S.. 
  • Make It Bold | Be About It | Talk About It 💙 #HUSTLR 🛡I spent 20 Years serving the United States of America. BMCRamsey, Surfman374. It was an amazing career as a Ready for Operations Inspector, Chief of Operations for the Largest Enlisted Unit in the Coast Guard, Small Arms Instructor, Federal Law Enforcement Officer (Boarding Officer) Surfman. I Graduated Airforce NCOA, USCG Chiefs Academy Altus Tendo. Instructor Development School, Advanced Outdoor Film and Production School, and from 2005-2021 held a 100Ton MMD Captian License. I received the Associations for Rescue’s at Sea Gold Medal in Washington D.C. along with numerous other Medals and Awards for Rescues 100’s of 1000’s in 20 years serving. Yes I’m 100% Percent Disabled 100% Service Connected 100% Combat Related don’t let it stop me. Life is yours enjoy it create it Daily. Proud Retired Chief Loving Man, Veteran, and Father. #DepartmentofHomelandSecurity MLEA U.S. Coast Guard Boarding Officers & Boarding Team Members. It’s #SetStandard #TacticsTechniques #TheUseofForce God Bless my prayers for #FLEO’s Every Believer U.S. Department of Homeland Security #surfman374 #tripledigithunter #chief #LEO #LifeMatters #protectandserve ❤️🤍💙”God Bless Founder #DMR @surfman374

Oldest terrorism

The identification of the “oldest terrorist group” depends heavily on the definition of terrorism, as the term itself is modern (emerging during the French Revolution’s “Reign of Terror” in the late 18th century)

Scholars generally categorize groups into ancient/pre-modern and modern terrorism. 

Ancient and Pre-Modern Groups

Using a broader definition of politically motivated violence and intimidation, the roots of terrorism are often traced to ancient groups: 

  • Sicarii Zealots (1st Century AD): This Jewish splinter group, or “dagger men,” operated in the Roman province of Judea. They used short daggers hidden under cloaks to assassinate Jewish collaborators with Roman rule, often in crowded places like large festivals, before disappearing into the public.
  • The Assassins (Hashshashin) (Late 11th Century): An offshoot of Isma’ili Shia Muslims, this small militia seized fortresses in Persia and specialized in the targeted assassinations of Seljuk and Fatimid rulers, governors, and military commanders to achieve political goals.
  • The Kharijites (7th Century AD): In the Islamic world, this early sect practiced takfir, which allowed them to justify killing those they deemed apostates or heretics for political ends, making them the first group in Islamic history whose members were described with similar concepts to ‘terrorists’. 

Modern Terrorist Groups

The first organizations to use modern terrorist techniques, such as the use of powerful explosives to sow widespread fear among a general population for political gains (rather than just political assassination), emerged in the mid-to-late 19th century: 

  • Irish Republican Brotherhood (IRB) / Fenian Brotherhood (Founded 1858): Arguably one of the earliest modern groups, the IRB and its offshoot were revolutionary Irish nationalist groups that carried out attacks in England, including the “Fenian dynamite campaign” in the 1880s, with the express aim of creating panic and achieving an independent Irish republic.
  • Narodnaya Volya (“People’s Will”) (Founded 1878): This revolutionary anarchist group in Russia was the first to make widespread use of dynamite. They targeted high-ranking officials, including the assassination of Tsar Alexander II in 1881, hoping to inspire a mass rebellion against the Tsarist autocracy.
  • Ku Klux Klan (KKK) (Founded 1865): Formed in the post-U.S. Civil War South by Confederate veterans, the first iteration of the KKK used violence, lynching, and intimidation to oppress African Americans and supporters of Reconstruction. A federal grand jury determined the KKK to be a “terrorist organization” in 1870. 

Ultimately, while the tactic of terror has ancient roots, the concept of an organized “terrorist group” using modern methods is a phenomenon of the last two centuries. 

The identity of the “oldest terrorist” is subjective, as the definition of terrorism is widely disputed and has evolved significantly over time

. The term itself was first used during the French Revolution’s “Reign of Terror” in the late 18th century to describe state-sponsored violence. 

Depending on how “terrorism” is defined (e.g., targeting civilians, political motivation, non-state actor status), different groups and individuals have been cited as the earliest examples:

  • Ancient Groups: Some scholars trace the roots of terrorism to the Sicarii Zealots, a 1st-century Jewish group that used daggers to assassinate fellow Jews suspected of collaboration with Roman rule in ancient Judea.
  • Early Modern Era: Others point to groups like the Hashshashin (Assassins), a Shiite Muslim sect active from the 11th to 13th centuries that targeted political leaders, or the participants in the Gunpowder Plot of 1605 in England.
  • Modern Terrorism: In the modern sense (systematic violence by non-state actors against the state), the Russian revolutionary group Narodnaya Volya (People’s Will), founded in 1878, is often considered the first to use modern terrorist techniques like targeted killings and dynamite to sow fear. The first person in this context is often recognized as social revolutionary Vera Zasulich, who shot a Russian governor in 1878 to protest state repression. 

Ultimately, there is no single individual or group universally recognized as the oldest terrorist, as the label depends heavily on the specific criteria used for the term.

The identification of the “oldest terrorist group” depends heavily on the definition of terrorism, as the term itself is modern (emerging during the French Revolution’s “Reign of Terror” in the late 18th century)

Scholars generally categorize groups into ancient/pre-modern and modern terrorism. 

Ancient and Pre-Modern Groups

Using a broader definition of politically motivated violence and intimidation, the roots of terrorism are often traced to ancient groups: 

  • Sicarii Zealots (1st Century AD): This Jewish splinter group, or “dagger men,” operated in the Roman province of Judea. They used short daggers hidden under cloaks to assassinate Jewish collaborators with Roman rule, often in crowded places like large festivals, before disappearing into the public.
  • The Assassins (Hashshashin) (Late 11th Century): An offshoot of Isma’ili Shia Muslims, this small militia seized fortresses in Persia and specialized in the targeted assassinations of Seljuk and Fatimid rulers, governors, and military commanders to achieve political goals.
  • The Kharijites (7th Century AD): In the Islamic world, this early sect practiced takfir, which allowed them to justify killing those they deemed apostates or heretics for political ends, making them the first group in Islamic history whose members were described with similar concepts to ‘terrorists’. 

Modern Terrorist Groups

The first organizations to use modern terrorist techniques, such as the use of powerful explosives to sow widespread fear among a general population for political gains (rather than just political assassination), emerged in the mid-to-late 19th century: 

  • Irish Republican Brotherhood (IRB) / Fenian Brotherhood (Founded 1858): Arguably one of the earliest modern groups, the IRB and its offshoot were revolutionary Irish nationalist groups that carried out attacks in England, including the “Fenian dynamite campaign” in the 1880s, with the express aim of creating panic and achieving an independent Irish republic.
  • Narodnaya Volya (“People’s Will”) (Founded 1878): This revolutionary anarchist group in Russia was the first to make widespread use of dynamite. They targeted high-ranking officials, including the assassination of Tsar Alexander II in 1881, hoping to inspire a mass rebellion against the Tsarist autocracy.
  • Ku Klux Klan (KKK) (Founded 1865): Formed in the post-U.S. Civil War South by Confederate veterans, the first iteration of the KKK used violence, lynching, and intimidation to oppress African Americans and supporters of Reconstruction. A federal grand jury determined the KKK to be a “terrorist organization” in 1870. 

Ultimately, while the tactic of terror has ancient roots, the concept of an organized “terrorist group” using modern methods is a phenomenon of the last two centuries. 

The Oldest Cartel

The oldest cartel is likely the Gulf Cartel, founded in the 1930s. Alternatively, the Limitation of the Vend, a 18th-century coal mining cartel, may have been the longest-lasting cartel. However, if the question refers to a modern “drug cartel,” the Gulf Cartel is a very early and significant example. 

Oldest Cartel 

  • Gulf Cartel: Founded in the 1930s in Matamoros, Mexico, it is considered one of the oldest organized crime groups in Mexico and continues to be active today. 
  • Limitation of the Vend: This was a price-fixing combination of English coal mine owners dating back to the 18th century, and may have been the longest-lasting cartel in history. 

Other notable early cartels 

  • Medellín Cartel: Founded by Pablo Escobar, it is often cited as the first major Colombian “drug cartel” and was a dominant force in the cocaine trade during the 1980s and 1990s. 
  • La Corporación: This was the first cocaine cartel in Bolivia, founded by Roberto Suárez Gómez in the late 1960s. 

  • The title of “oldest cartel” can refer to different organizations depending on the context (e.g., Mexican, Colombian, historical global trade)


    Mexican Cartel
    The Gulf Cartel is widely considered one of the oldest organized crime groups in Mexico, with its roots tracing back to the 1930s. It was founded by Juan Nepomuceno Guerra and originally focused on smuggling alcohol into the United States during the Prohibition era. After Prohibition ended, the group controlled various other illegal activities and shifted to large-scale drug trafficking in the 1980s. 
    Other Mexican cartels, such as the Sinaloa Cartel and the Juárez Cartel, are also very old, with origins in the late 1980s or earlier. Many modern cartels, including the Sinaloa and Tijuana cartels, evolved from the disintegration of the Guadalajara Cartel in the late 1980s. 

    Historical Definition of “Cartel”
    If the term “cartel” is used in a broader historical sense of a syndicate for trade, some sources describe the British East India Company as the world’s first cartel. This company was involved in the mass trafficking of opium to China in the 19th century, with its founders recognizing the profitable banking opportunities that eventually led to the establishment of institutions like HSBC. 

    Italian Organized Crime
    In terms of traditional organized crime syndicates that function similarly to cartels (though often referred to as mafias), the Camorra in the Campania region of Italy has a history extending back to the 18th century, with the first official mention as an organization in 1820 police records. 

Trans National Crime Bust 2025

Russia China Theft UsA

Cyber Attacks Credit Card Scams Gun Theft Sperm Theft HUMaN trafficking indigenous men women children Drug Trafficking Chemicals Biological Tests g and trafficking

Fisheries
Ivory
Whales
Gold
Oil & Gas money alaska canada USA Mexico central South America

David Michael Ramsey @highlight @surfman374

Word on the street from the indigenous family 🎵🇺🇸💙🛟 rigsreefclassicspearfishing.com

Informed

Standard security clearance levels

  • Confidential: For information that could cause damage to national security.
  • Secret: For information that could cause “serious” damage to national security.
  • Top Secret: For information where unauthorized disclosure could cause “exceptionally grave” damage to national security. 

Special handling and access 

  • Sensitive Compartmented Information (SCI): A category for intelligence sources, methods, and processes. Access is restricted to specific “compartments” and requires an additional special adjudication process beyond a standard Top Secret clearance.
  • Special Access Programs (SAPs): For highly sensitive projects and programs. These have their own access restrictions in addition to the standard clearance level.
  • Yankee White: An administrative nickname for the DoD program for personnel who will have direct or indirect access to the President or Vice President. This requires a specific background investigation, like the Tier 5 (SSBI), for certain critical and non-critical sensitive positions. 

Access for former presidents

  • A former president’s access to classified information after leaving office is not automatic and is determined by the sitting president on a case-by-case basis, often as a matter of courtesy.
  • This access is not part of a formal security clearance system and is decided by the current president. 

  • President of the United States does not have a formal, standard security clearance in the same way federal employees or military personnel do. Instead, the President’s access to classified information is a right derived directly from the 
    office of the Presidency itself. 
    The President is the ultimate declassification and classification authority, meaning they inherently have access to all levels of national security information based on their constitutional position, not an adjudicated security clearance process. 

    Standard Security Clearance Levels
    While the president operates outside of the standard process, other government officials and staff require specific clearances. The three primary classification levels, corresponding to increasing sensitivity of information, are: 
    Confidential: Unauthorized disclosure could cause damage to national security.
    Secret: Unauthorized disclosure could cause serious damage to national security.
    Top Secret: Unauthorized disclosure could cause exceptionally grave damage to national security. 

    Additional Access Categories
    Beyond the primary levels, access to certain highly sensitive information requires additional screening and authorization categories: 
    Sensitive Compartmented Information (SCI): This covers intelligence sources, methods, and specific intelligence activities.
    Special Access Programs (SAPs): These are established for information considered exceptionally vulnerable, such as specific stealth technology or highly sensitive projects.
    Restricted Data (RD): This is a category specifically for nuclear weapons design and stockpile information, established by the Atomic Energy Act.
    Yankee White: This is not a classification level itself, but rather a stringent background investigation required for any personnel working directly with the President and Vice President. 

    Post-Presidency Access
    Upon leaving office, a former president’s automatic access to classified information ends. Any access after that point is granted as a courtesy by the sitting president and can be revoked at their discretion. 

  • Obtaining a U.S. government security clearance is a multi-step process that you cannot initiate on your own; you must be sponsored by an eligible federal government agency or a cleared contractor

    The general process involves the following stages:

    1. Sponsorship and Conditional Offer
    The process begins after you receive and accept a conditional offer of employment for a position that requires access to classified information. The hiring organization’s Facility Security Officer (FSO) or Clearance Coordinator will initiate the formal process. 

    2. Application Submission
    You will be required to complete a comprehensive electronic questionnaire, typically the Standard Form 86 (SF-86), for National Security Positions, via the e-QIP system. This form requires extensive personal information, including: 
    Employment and residence history (often for the past 10 years).
    Foreign travel and contacts.
    Criminal record, drug use, and alcohol-related incidents.
    Financial information, including debts and credit history.
    Personal references, co-workers, and neighbors who can verify your character and conduct. 
    You must also submit fingerprints and sign releases authorizing the government to conduct record checks. Honesty throughout this process is paramount, as misrepresenting or falsifying information can result in denial or prosecution. 

    3. Background Investigation
    The completed application and supporting documents are submitted to an investigative agency, such as the Defense Counterintelligence and Security Agency (DCSA). Investigators will verify and corroborate the information you provided through various methods: 
    Database and record checks: This includes checks against law enforcement, court, and credit databases.
    Interviews: Investigators may interview your references, current and former supervisors, and neighbors.
    Personal interview: An investigator will conduct an in-person interview with you to review your form, clarify inconsistencies, and resolve any potential security concerns.
    Polygraph/Medical exams: For certain sensitive positions (e.g., TS/SCI access for intelligence agencies), a polygraph test or psychological evaluation may be required. 

    4. Adjudication
    Once the investigation is complete, the gathered information is sent to an adjudicating authority (e.g., the Department of Defense Consolidated Adjudication Facility, or DoD CAF). An adjudicator evaluates all the material based on 13 established adjudicative guidelines to determine if you are eligible for access to classified information, weighing the “whole person” and any mitigating factors. 

    5. Clearance Determination
    The adjudicating authority makes a final determination to grant or deny the security clearance. The sponsoring agency is then notified of the decision and proceeds with a final job offer if the determination is favorable. 

    6. Ongoing Maintenance
    Once a clearance is granted, you are subject to continuous vetting (CV) or periodic reinvestigations (every 5-15 years, depending on the clearance level). You are required to self-report any significant life changes or potential security concerns to your security officer. 

  • Trusted Workforce 2.0 (TW 2.0) is a U.S. government-wide initiative to reform and modernize the entire personnel vetting process for federal employees and contractors. Led by the Office of the Director of National Intelligence (ODNI) and the Office of Personnel Management (OPM), the primary goal is to create a more efficient, secure, and mobile system for determining the trustworthiness of personnel

    Key Goals and Reforms
    Shift to Continuous Vetting (CV): The most significant change is the transition from periodic reinvestigations (which occurred every 5-10 years) to a system of automated, ongoing record checks. This allows security officials to be alerted to potential security concerns (e.g., criminal activity, suspicious financial transactions, foreign contacts) in near real-time, reducing risk and allowing for proactive intervention.
    Enhanced Workforce Mobility and Reciprocity: TW 2.0 aims to make security clearances and background investigation eligibility “portable” across different federal agencies, reducing redundant vetting processes and speeding up onboarding for new positions.
    Streamlined and Standardized Processes: The initiative includes a new, consolidated Personnel Vetting Questionnaire (PVQ) that replaces multiple legacy forms, making the application process simpler and more consistent across the government. It also condenses all investigations into three intuitive risk tiers (Low, Moderate, and High).
    IT Modernization: The National Background Investigation Services (NBIS) system is the intended technological backbone of TW 2.0, a new secure IT system designed to manage and connect all vetting data, automate processes, and replace outdated legacy systems.
    Improved Guidance on Sensitive Topics: New policies offer clearer guidance on issues like past marijuana use and mental health counseling to reduce stigma and ensure the government can recruit and retain diverse talent without unnecessary hurdles. 

    Implementation and Current Status
    The initiative, which began in 2018, is being implemented in phases, with full government-wide implementation expected by March 30, 2026. 
    Phase 1 focused on reducing the large backlog of background investigations and consolidating most investigative functions under the Defense Counterintelligence and Security Agency (DCSA).
    Phase 2 finalized the core policies and successfully transitioned the entire national security workforce into continuous vetting programs.
    Phase 3, which is currently underway, emphasizes agency-level execution, expanding continuous vetting to include non-sensitive public trust positions, and deploying shared services via NBIS. 
    While significant progress has been made, challenges remain, particularly with the full development and deployment of the NBIS IT system and ensuring consistent implementation across all agencies. 











    ‘Trusted Workforce 2.0’ ushers in new era of personnel vetting, but big challenges remain

    Federal News Network


    Observations on the Implementation of the Trusted Workforce 2.0 Personnel Vetting …

    Government Accountability Office (GAO) (.gov)


    Continuous Vetting – Defense Counterintelligence and Security Agency

    DCSA (.mil)


    Show all