Great Reset
Government Admission: Biden Parole Flights Create Security ‘Vulnerabilities’ at U.S. Airports Government Admission: Biden Parole Flights Create Security ‘Vulnerabilities’ at U.S. Airports
From the Center for Immigration Studies
DHS still refusing to say which airports are receiving inadmissible aliens from abroad
But while large immigrant-receiving cities and media lay blame for the influx on Texas Republican Gov. Greg Abbott’s busing program, CBP has withheld from the Center – and apparently will not disclose – the names of the 43 U.S. airports that have received 320,000 inadmissible aliens from January through December 2023, nor the foreign airports from which they departed. The agency’s lawyers have cited a general “law enforcement exception” without elaborating – until recently – on how releasing airport locations would harm public safety beyond citing “the sensitivity of the information.”
Now, though, CIS’s litigation has yielded a novel and newsworthy answer from the government: The public can’t know the receiving airports because those hundreds of thousands of CBP-authorized arrivals have created such “operational vulnerabilities” at airports that “bad actors” could undermine law enforcement efforts to “secure the United States border” if they knew the volume of CBP One traffic processed at each port of entry.
In short, the Biden administration’s legally dubious program to fly inadmissible aliens over the border and directly to U.S. airports has allegedly created law enforcement vulnerabilities too grave to release publicly, lest “bad actors” take advantage of them to inflict harm on public safety. Or, more specifically, here’s how CBP’s lawyers, in email communications with CIS and summarized in a CIS Joint Status Filing, characterized FOIA’s law enforcement exception (b)(7)(E) in explaining their refusal to release just the domestic U.S. airport locations:
Exception (b)(7)(E) has been applied to the identifying information for air ports of entry, which, if disclosed would reveal information about the relative number of individuals arriving, and thus resources expended at particular airports which would, either standing alone or combined with other information, reveal operational vulnerabilities that could be exploited by bad actors altering their patterns of conduct, adopting new methods of operation, and taking other countermeasures, thereby undermining CBP’s law enforcement efforts to secure the United States borders.
The agency’s attorneys floated a similar argument for withholding the locations of foreign departure airports, adding only that “bad actors” abroad who found out about the “resources expended toward travelers arriving from particular airports” could “extrapolate” from the numbers leaving foreign airports to identify the receiving U.S. airports and then undermine law enforcement’s ability to secure the border (which includes international airports).
The program at the center of the FOIA litigation is perhaps the most enigmatic and least-known of the Biden administration’s uses of the CBP One cell phone scheduling app, even though it is responsible for almost invisibly importing by air 320,000 aliens with no legal right to enter the United States since it got underway in late 2022. It remains part of the administration’s “lawful pathways” strategy, with its stated purpose being to reduce the number of illegal border entries between ports of entry. The countries whose citizens are eligible are Cuba, Haiti, Venezuela, Nicaragua, El Salvador, Guatemala, Honduras, Colombia, and Ecuador.
Under these legally dubious parole programs, aliens who cannot legally enter the country use the CBP One app to apply for travel authorization and temporary humanitarian release from those airports. The parole program allows for two-year periods of legal status during which adults are eligible for work authorization.
The government characterizes these programs as “family reunification programs”.
While seven of the nationalities, excluding Venezuelans and Nicaraguans, can claim eligibility under older family reunification parole programs, all can also just fly in if they can show they have a non-family financial sponsor (which can even be “an organization, business, or other entity”) and meet other requirements, such as owning a valid passport and passing security checks based on biometric information provided through CBP One.
Upon receiving authorization from Washington, they buy air passage to U.S. international airports where CBP personnel process them for release in short order. All are said to be responsible for paying for their own airfare.
They and inadmissible aliens from many dozens of other countries also get this parole benefit at eight U.S.-Mexico land ports of entry. That separate parole program has brought in another 420,000 immigrants from nearly 100 nations from May 2021 through December 2023, according to CIS lawsuit data updated through December 2023. (See links to the 2023 report below, which reflects data through August)
For most of the past year, big-city mayors and state governors have loudly complained about the hundreds of thousands of foreigners showing up in need of housing, food, medical treatment, clothing, and education, placing extraordinary unfunded financial burdens on local populations. Routinely, politicians and major media outlets have laid blame for the influx on Texas Gov. Greg Abbott’s busing program.
But the airport location information would undoubtedly provide a more accurate and complete picture of what is happening, though the administration would not be able to blame the Texas governor for these arrivals.
The redacted records received by CIS show a clear preference for some airports over others, with a dozen unnamed facilities receiving most of the 320,000.
Release by the government of the airport data would serve an important public interest in that it would provide voters and public officials with information to pressure the Biden government to reduce monthly arrival rates into their cities and states.
Colin M. Farnsworth, CIS’s Chief FOIA Counsel, said the Center rejects the government’s explanation about bad actors exploiting “operational vulnerabilities” at airports on grounds that CBP pre-screens and pre-schedules the arrival of CBP One applicants at each port of entry. He said CIS will litigate for a total release of the airport information.
Bad actors already have access to airport travel volumes, through CBP’s own “Traveler and Conveyance Statistics website.” Its statistics for cities whose travails with migrant arrivals are well-publicized show striking airport arrival increases from FY 2022, before the airlift program, through 2023.
Boston airports, for instance, spiked from 2.3 million during FY 2022 to 3.3 million in 2023, the public CBP website shows. Chicago, another migrant hotspot, rose from 6.3 million airport travelers in FY2022 to 7.9 million in 2023. New York City airports spiked from 17.7 million airport arrivals in 2022 to 22.9 million in 2023.
Related reports from Center for Immigration Studies FOIA litigation are based on data provided through August 2023 and the early part of September 2023. CBP has since provided data for all of September, October, November, and December 2023, which are reflected above in this report.
The following are the prior reports reflecting the earlier data:
- New Records: Biden DHS Has Approved Hundreds of Thousands of Migrants for Secretive Foreign Flights Directly into U.S. Airports
- New Records Unveil Surprising Scope of Secretive ‘CBP One’ Entry Scheme
- Thousands of ‘Special Interest Aliens’ Posing Potential National Security Risks Entering via CBP One App
- Powerful Senator Demands DHS Answer Questions About ‘Special Interest Alien” Approved Entries in CBP One app.
- Why is Biden Quietly Granting ‘Humanitarian Protection’ to Thousands of Mexicans?
Censorship Industrial Complex
How the UK and Canada Are Leading the West’s Descent into Digital Authoritarianism
“Big Brother is watching you.” These chilling words from George Orwell’s dystopian masterpiece, 1984, no longer read as fiction but are becoming a bleak reality in the UK and Canada—where digital dystopian measures are unravelling the fabric of freedom in two of the West’s oldest democracies.
Under the guise of safety and innovation, the UK and Canada are deploying invasive tools that undermine privacy, stifle free expression, and foster a culture of self-censorship. Both nations are exporting their digital control frameworks through the Five Eyes alliance, a covert intelligence-sharing network uniting the UK, Canada, US, Australia, and New Zealand, established during the Cold War. Simultaneously, their alignment with the United Nations’ Agenda 2030, particularly Sustainable Development Goal (SDG) 16.9—which mandates universal legal identity by 2030—supports a global policy for digital IDs, such as the UK’s proposed Brit Card and Canada’s Digital Identity Program, which funnel personal data into centralized systems under the pretext of “efficiency and inclusion.” By championing expansive digital regulations, such as the UK’s Online Safety Act and Canada’s pending Bill C-8, which prioritize state-defined “safety” over individual liberties, both nations are not just embracing digital authoritarianism—they’re accelerating the West’s descent into it.
The UK’s digital dragnet
The United Kingdom has long positioned itself as a global leader in surveillance. The British spy agency, Government Communications Headquarters (GCHQ), runs the formerly-secret mass surveillance programme, code-named Tempora, operational since 2011, which intercepts and stores vast amounts of global internet and phone traffic by tapping into transatlantic fibre-optic cables. Knowledge of its existence only came about in 2013, thanks to the bombshell documents leaked by the former National Security Agency (NSA) intelligence contractor and whistleblower, Edward Snowden. “It’s not just a US problem. The UK has a huge dog in this fight,” Snowden told the Guardian in a June 2013 report. “They [GCHQ] are worse than the US.”
Following that, is the Investigatory Powers Act (IPA) 2016, also dubbed the “Snooper’s Charter,” which mandates that internet service providers store users’ browsing histories, emails, texts, and phone calls for up to a year. Government agencies, including police and intelligence services (like MI5, MI6, and GCHQ) can access this data without a warrant in many cases, enabling bulk collection of communications metadata. This has been criticized for enabling mass surveillance on a scale that invades everyday privacy.
Recent expansions under the Online Safety Act (OSA) further empower authorities to demand backdoors in encrypted apps like WhatsApp, potentially scanning private messages for vaguely defined “harmful” content—a move critics like Big Brother Watch, a privacy advocacy group, decry as a gateway to mass surveillance. The OSA, which received Royal Assent on October 26, 2023, represents a sprawling piece of legislation by the UK government to regulate online content and “protect” users, particularly children, from “illegal and harmful material.” Implemented in phases by Ofcom, the UK’s communications watchdog, it imposes duties on a vast array of internet services, including social media, search engines, messaging apps, gaming platforms, and sites with user-generated content forcing compliance through risk assessments and hefty fines. By July 2025, the OSA was considered “fully in force” for most major provisions. This sweeping regime, aligned with global surveillance trends via Agenda 2030’s push for digital control, threatens to entrench a state-sanctioned digital dragnet, prioritizing “safety” over fundamental freedoms.
Elon Musk’s platform X has warned that the act risks “seriously infringing” on free speech, with the threat of fines up to £18 million or 10% of global annual turnover for non-compliance, encouraging platforms to censor legitimate content to avoid punishment. Musk took to X to express his personal view on the act’s true purpose: “suppression of the people.”

In late September, Imgur (an image-hosting platform popular for memes and shared media) made the decision to block UK users rather than comply with the OSA’s stringent regulations. This underscores the chilling effect such laws can have on digital freedom.
The act’s stated purpose is to make the UK “the safest place in the world to be online.” However, critics argue it’s a brazen power grab by the UK government to increase censorship and surveillance, all the while masquerading as a noble crusade to “protect” users.
Another pivotal development is the Data (Use and Access) Act 2025 (DUAA), which received Royal Assent in June. This wide-ranging legislation streamlines data protection rules to boost economic growth and public services but at the cost of privacy safeguards. It allows broader data sharing among government agencies and private entities, including for AI-driven analytics. For instance, it enables “smart data schemes” where personal information from banking, energy, and telecom sectors can be accessed more easily, seemingly for consumer benefits like personalized services—but raising fears of unchecked profiling.
Cybersecurity enhancements further expand the UK’s pervasive surveillance measures. The forthcoming Cyber Security and Resilience Bill, announced in the July 2024 King’s Speech and slated for introduction by year’s end, expands the Network and Information Systems (NIS) Regulations to critical infrastructure, mandating real-time threat reporting and government access to systems. This builds on existing tools like facial recognition technology, deployed extensively in public spaces. In 2025, trials in cities like London have integrated AI cameras that scan crowds in real-time, linking to national databases for instant identification—evoking a biometric police state.

Source: BBC News
The New York Times reported: “British authorities have also recently expanded oversight of online speech, tried weakening encryption and experimented with artificial intelligence to review asylum claims. The actions, which have accelerated under Prime Minister Keir Starmer with the goal of addressing societal problems, add up to one of the most sweeping embraces of digital surveillance and internet regulation by a Western democracy.”
Compounding this, UK police arrest over 30 people a day for “offensive” tweets and online messages, per The Times, often under vague laws, fuelling justifiable fears of Orwell’s thought police.
Yet, of all the UK’s digital dystopian measures, none has ignited greater fury than Prime Minister Starmer’s mandatory “Brit Card” digital ID—a smartphone-based system effectively turning every citizen into a tracked entity.
First announced on September 4, as a tool to “tackle illegal immigration and strengthen border security,” but rapidly the Brit Card’s scope ballooned through function-creep to envelop everyday essentials like welfare, banking and public access. These IDs, stored on smartphones containing sensitive data like photos, names, dates of birth, nationalities, and residency status, are sold “as the front door to all kinds of everyday tasks,” a vision championed by the Tony Blair Institute for Global Change— and echoed by Work and Pensions Secretary Liz Kendall MP in her October 13 parliamentary speech.
Source: TheBritishIntel
This digital shackles system has sparked fierce resistance across the UK. A scathing letter, led by independent MP Rupert Lowe and endorsed by nearly 40 MPs from diverse parties, denounces the government’s proposed mandatory “Brit Card” digital ID as “dangerous, intrusive, and profoundly un-British.” Conservative MP David Davis issued a stark warning, declaring that such systems “are profoundly dangerous to the privacy and fundamental freedoms of the British people.” On X, Davis amplified his critique, citing a £14m fine imposed on Capita after hackers breached pension savers’ personal data, writing: “This is another perfect example of why the government’s digital ID cards are a terrible idea.” By early October, a petition opposing the proposal had garnered over 2.8 million signatures, reflecting widespread public outcry. The government, however, dismissed these objections, stating, “We will introduce a digital ID within this Parliament to address illegal migration, streamline access to government services, and improve efficiency. We will consult on details soon.”
Canada’s surveillance surge
Across the Atlantic, Canada’s surveillance surge under Prime Minister Mark Carney—former Bank of England head and World Economic Forum board member—mirrors the UK’s dystopian trajectory. Carney, with his globalist agenda, has overseen a slew of bills that prioritize “security” over sovereignty. Take Bill C-2, An Act to amend the Customs Act, introduced June 17, 2025, which enables warrantless data access at borders and sharing with U.S. authorities via CLOUD Act (Clarifying Lawful Overseas Use of Data Act) pacts—essentially handing Canadian citizens’ digital lives to foreign powers. Despite public backlash prompting proposed amendments in October, its core—enhanced monitoring of transactions and exports—remains ripe for abuse.
Complementing this, Bill C-8, first introduced June 18, 2025, amends the Telecommunications Act to impose cybersecurity mandates on critical sectors like telecoms and finance. It empowers the government to issue secret orders compelling companies to install backdoors or weaken encryption, potentially compromising user security. These orders can mandate the cutoff of internet and telephone services to specified individuals without the need for a warrant or judicial oversight, under the vague premise of securing the system against “any threat.”
Opposition to this bill has been fierce. In a parliamentary speech Canada’s Conservative MP Matt Strauss, decried the bill’s sections 15.1 and 15.2 as granting “unprecedented, incredible power” to the government. He warned of a future where individuals could be digitally exiled—cut off from email, banking, and work—without explanation or recourse, likening it to a “digital gulag.”
Source: Video shared by Andrew Bridgen
The Canadian Constitution Foundation (CCF) and privacy advocates have echoed these concerns, arguing that the bill’s ambiguous language and lack of due process violate fundamental Charter rights, including freedom of expression, liberty, and protection against unreasonable search and seizure.
Bill C-8 complements the Online Harms Act (Bill C-63), first introduced in February 2024, which demanded platforms purge content like child exploitation and hate speech within 24 hours, risking censorship with vague “harmful” definitions. Inspired by the UK’s OSA and EU’s Digital Services Act (DSA), C-63 collapsed amid fierce backlash for its potential to enable censorship, infringe on free speech, and lack of due process. The CCF and Pierre Poilievre, calling it “woke authoritarianism,” led a 2024 petition with 100,000 signatures. It died during Parliament’s January 2025 prorogation after Justin Trudeau’s resignation.
These bills build on an alarming precedent: during the COVID era, Canada’s Public Health Agency admitted to tracking 33 million devices during lockdown—nearly the entire population—under the pretext of public health, a blatant violation exposed only through persistent scrutiny. The Communications Security Establishment (CSE), empowered by the longstanding Bill C-59, continues bulk metadata collection, often without adequate oversight. These measures are not isolated; they stem from a deeper rot, where pandemic-era controls have been normalized into everyday policy.
Canada’s Digital Identity Program, touted as a “convenient” tool for seamless access to government services, emulates the UK’s Brit Card and aligns with UN Agenda 2030’s SDG 16.9. It remains in active development and piloting phases, with full national rollout projected for 2027–2028.
“The price of freedom is eternal vigilance.” Orwell’s 1984 warns we must urgently resist this descent into digital authoritarianism—through petitions, protests, and demands for transparency—before a Western Great Firewall is erected, replicating China’s stranglehold that polices every keystroke and thought.
If you find value in the work I do, please consider a paid subscription or make a one-off donation.
Censorship Industrial Complex
Pro-freedom group warns Liberal bill could secretly cut off Canadians’ internet access
From LifeSiteNews
“The minister could order this dissident’s internet and phone services be cut off and require that decision remain secret”
Free speech advocates have warned that the Liberals’ cybersecurity bill would allow them to block any individual’s internet access by secret order.
During an October 30 Public Safety committee meeting in the House of Commons, Canadian Constitution Foundation (CCF) counsel Josh Dehaas called for Liberals to rewrite Bill C-8, which would allow the government to secretly cut off Canadians access to the internet to mediate “any threat” to the telecommunications system.
“It is dangerous to civil liberties to allow the minister the power to cut off individual Canadians without proper due process and keep that secret,” Dehaas testified.
“Consider for example a protestor who the minister believes ‘may’ engage in a distributed denial of service attack, which is a common form of civil disobedience employed by political activists,” he warned.
“The minister could order this dissident’s internet and phone services be cut off and require that decision remain secret,” Dehaas continued, adding that the legislation does not require the government to obtain a warrant.
In response, Liberal MP Marianne Dandurand claimed that the legislation is aimed to protect the government form cyberattacks, not to limit freedom of speech. However, Dehaas pointed out that the vague phrasing of the legislation allows Liberals to censor Canadians to counter “any threat” to the telecommunications system.
Bill C-8, which is now in its second reading in the House of Commons, was introduced in June by Minister of Public Safety Gary Anandasangaree and contains a provision in which the federal government could stop “any specified person” from accessing the internet.
The federal government under Prime Minister Mark Carney claims that the bill is a way to stop “unprecedented cyber-threats.”
The bill, as written, claims that the government would need the power to cut someone off from the internet, as it could be “necessary to do so to secure the Canadian telecommunications system against any threat, including that of interference, manipulation, disruption, or degradation.”
Many Canadians, including Conservative MPs and freedom groups, have condemned the legislation, along with several other new Liberal bills which aim to censor internet content as well as go after people’s ability to speak their minds.
“Experts and civil society have warned that the legislation would confer ministerial powers that could be used to deliberately or inadvertently compromise the security of encryption standards within telecommunications networks that people, governments, and businesses across Canada rely upon, every day,” the Canadian Civil Liberties Association wrote in a recent press release.
Similarly, Canada’s own intelligence commissioner has warned that the bill, if passed as is, could potentially be unconstitutional, as it would allow for warrantless seizure of a person’s sensitive information.
-
Censorship Industrial Complex2 days agoHow the UK and Canada Are Leading the West’s Descent into Digital Authoritarianism
-
Business2 days agoCapital Flight Signals No Confidence In Carney’s Agenda
-
International2 days agoThe capital of capitalism elects a socialist mayor
-
Justice1 day agoCarney government lets Supreme Court decision stand despite outrage over child porn ruling
-
Daily Caller1 day agoUS Eating Canada’s Lunch While Liberals Stall – Trump Admin Announces Record-Shattering Energy Report
-
Business1 day agoCarney’s budget spares tax status of Canadian churches, pro-life groups after backlash
-
COVID-191 day agoFreedom Convoy leader Tamara Lich to appeal her recent conviction
-
Energy1 day agoEby should put up, shut up, or pay up





