Next Mission is Citizenship Cheaters, Finally

The USCIS is authorized to cancel any Certificate of Citizenship or Naturalization in cases where evidence provided to government documents is proven false.

Just 5 days ago: U.S. Citizenship and Immigration Services (USCIS) assisted in an investigation that led to U.S. District Judge Virginia M. Hernandez Covington sentencing Enite Alindor, also known as Odette Dureland, to five months in federal prison. The 55-year-old woman was sentenced for making false statements in a matter relating to naturalization and citizenship and for procuring naturalization as a U.S. citizen. As part of her sentence, the court also entered an order de-naturalizing her, thus revoking her July 2012 naturalization as a U.S. citizen. A federal jury had found her guilty on March 1, 2018.

According to court documents, Alindor, a citizen of Haiti, applied for asylum with the Immigration and Naturalization Service (INS) in Miami in 1997. After the INS denied that application, the United States Immigration Court ordered her to be removed from the United States. Shortly thereafter, Alindor presented herself to the INS as Odettte Dureland and filed for asylum protection under that new identity. She concealed the fact that she had previously applied for status in the United States as Enite Alindor, and she concealed the fact that she was under a final order for removal from the United States. USCIS personnel, unaware of the Alindor identity and order of removal, approved Dureland for citizenship in July 2012, and she was naturalized as a U.S. citizen under that name in July 2012.

When Prosecutors Cheat Justice to Protect Aliens ... photo

How about this one from January?

Iyman Faris is set to be released from prison in 2020 after serving 17 years behind bars for terrorism-related charges stemming from a plot to destroy the Brooklyn Bridge. By the time he gets out, American authorities hope, he will no longer be able to call the U.S. his home.

The Justice Department has filed a lawsuit to try to strip the Pakistan-born Faris of his citizenship, which he obtained in 1999, saying it’s an affront to allow him to continue to be an American citizen.

It’s just the type of case authorities say they expect to pursue more frequently under President Trump and Attorney General Jeff Sessions.

“The attorney general and the administration are focused on enforcing all immigration laws, especially when it comes to this pinnacle level of citizenship,” said one Justice Department official, who spoke on the condition of anonymity.

AG Sessions is holding true to his mission on immigration.

(AP) — The U.S. government agency that oversees immigration applications is launching an office that will focus on identifying Americans who are suspected of cheating to get their citizenship and seek to strip them of it.

U.S. Citizenship and Immigration Services Director L. Francis Cissna told The Associated Press in an interview that his agency is hiring several dozen lawyers and immigration officers to review cases of immigrants who were ordered deported and are suspected of using fake identities to later get green cards and citizenship through naturalization.

Cissna said the cases would be referred to the Department of Justice, whose attorneys could then seek to remove the immigrants’ citizenship in civil court proceedings. In some cases, government attorneys could bring criminal charges related to fraud.

Until now, the agency has pursued cases as they arose but not through a coordinated effort, Cissna said. He said he hopes the agency’s new office in Los Angeles will be running by next year but added that investigating and referring cases for prosecution will likely take longer.

“We finally have a process in place to get to the bottom of all these bad cases and start denaturalizing people who should not have been naturalized in the first place,” Cissna said. “What we’re looking at, when you boil it all down, is potentially a few thousand cases.”

He declined to say how much the effort would cost but said it would be covered by the agency’s existing budget, which is funded by immigration application fees.

The push comes as the Trump administration has been cracking down on illegal immigration and taking steps to reduce legal immigration to the U.S.

Immigrants who become U.S. citizens can vote, serve on juries and obtain security clearance. Denaturalization — the process of removing that citizenship — is very rare.

The U.S. government began looking at potentially fraudulent naturalization cases a decade ago when a border officer detected about 200 people had used different identities to get green cards and citizenship after they were previously issued deportation orders.

In September 2016, an internal watchdog reported that 315,000 old fingerprint records for immigrants who had been deported or had criminal convictions had not been uploaded to a Department of Homeland Security database that is used to check immigrants’ identities. The same report found more than 800 immigrants had been ordered deported under one identity but became U.S. citizens under another.

Since then, the government has been uploading these older fingerprint records dating back to the 1990s and investigators have been evaluating cases for denaturalization.

Earlier this year, a judge revoked the citizenship of an Indian-born New Jersey man named Baljinder Singh after federal authorities accused him of using an alias to avoid deportation.

Authorities said Singh used a different name when he arrived in the United States in 1991. He was ordered deported the next year and a month later applied for asylum using the name Baljinder Singh before marrying an American, getting a green card and naturalizing.

Authorities said Singh did not mention his earlier deportation order when he applied for citizenship.

For many years, most U.S. efforts to strip immigrants of their citizenship focused largely on suspected war criminals who lied on their immigration paperwork, most notably former Nazis.

Toward the end of the Obama administration, officials began reviewing cases stemming from the fingerprints probe but prioritized those of naturalized citizens who had obtained security clearances, for example, to work at the Transportation Security Administration, said Muzaffar Chishti, director of the Migration Policy Institute’s office at New York University law school.

The Trump administration has made these investigations a bigger priority, he said. He said he expects cases will focus on deliberate fraud but some naturalized Americans may feel uneasy with the change.

“It is clearly true that we have entered a new chapter when a much larger number of people could feel vulnerable that their naturalization could be reopened,” Chishti said.

Since 1990, the Department of Justice has filed 305 civil denaturalization cases, according to statistics obtained by an immigration attorney in Kansas who has defended immigrants in these cases.

The attorney, Matthew Hoppock, agrees that deportees who lied to get citizenship should face consequences but worries other immigrants who might have made mistakes on their paperwork could get targeted and might not have the money to fight back in court.

Cissna said there are valid reasons why immigrants might be listed under multiple names, noting many Latin American immigrants have more than one surname. He said the U.S. government is not interested in that kind of minor discrepancy but wants to target people who deliberately changed their identities to dupe officials into granting immigration benefits.

“The people who are going to be targeted by this — they know full well who they are because they were ordered removed under a different identity and they intentionally lied about it when they applied for citizenship later on,” Cissna said. “It may be some time before we get to their case, but we’ll get to them.”

When a Fishing Ship is a Chinese Spy Ship

The Chinese are relentless in all parts of the world.

It may not have looked like much of a match — or a showdown for that matter — but when Australia’s largest warship HMAS Adelaide arrived at the Fijian port of Suva on Saturday, it had an interesting neighbour.

Key points:

  • Chinese fishing boat believed to be carrying wide range of surveillance equipment
  • Fiji tipped off Australian Navy about Chinese spy ship expected to dock next to HMAS Adelaide
  • China has a strong commercial and military presence in the South Pacific

A Chinese ship fitted with communications equipment docked alongside the new Canberra-class landing helicopter dock.

The Royal Australian Navy suspects the Chinese vessel is a spy ship, which deliberately arrived at the same time to carry out surveillance on the Australians.

HMAS Adelaide and other Australian warships visiting Fiji will “take the appropriate security precautions”, but the surveillance craft is “just another ship”, Captain Jim Hutton, Commander of the Navy’s Joint Task Group 661, said.

Deputy Chief of Navy Rear Admiral Mark Hammond also played down concerns about the presence of the Chinese vessel.

“That’s a space surveillance ship, it’s a scientific ship,” he told reporters on board HMAS Adelaide.

ABC News understands the primary purpose of the Chinese ship is to track satellite launches from out on the ocean, but it does have the capability to also collect intelligence on other naval vessels.

Australia’s High Commissioner to Fiji John Feakes also revealed the skipper of the Chinese vessel had even been invited to an on-board reception, although it is not clear whether the offer was accepted.

Australia’s Navy, like every navy around the world, is well-versed in these sorts of nautical games.

“If you’re in the Navy you presume that anytime that a fishing vessel or even merchant fleets of nations like China are around that they may have a dual purpose,” ANU academic and retired Australian Naval Commodore Richard Menhinick said.

“You just presume that they may well be tasked by government for other activities.”

China’s looking for South Pacific foothold

Chinese presence — both commercial and military — is common in the South Pacific.

Beijing sees economic opportunity in the region and economic imperatives commonly herald other strategic interests.

Agriculture and aquaculture projects in Vanuatu, Fiji, Tonga and other Pacific nations have been given significant help by the Chinese over the years, as have roads, ports and other infrastructure.

Media player: “Space” to play, “M” to mute, “left” and “right” to seek.

When you have more than 1.3 billion people back home to feed, finding secure food supplies are critical.

As China grows, Mr Menhinick said it was not surprising that the nation’s presence in the Pacific was also increasing.

“China’s a rising power… economic power’s always led and the military’s followed, and the Chinese economic interest in the south-west Pacific has increased substantially over the last fifteen year,” he said.

But Australia and its strategic partners are anxious China does not use its presence to jeopardise regional structures — political, economic and diplomatic.

Now a visiting US General has given the strongest public indication yet that his nation would like Australia to join in naval and air patrols to challenge Beijing’s claims in the South China Sea.

Asked whether joint American-Australian patrols would be welcomed by America, the commander of US Marines in the Pacific, Lieutenant General David Berger gave an enthusiastic response.

“Obviously that’s Australia’s decision, would we welcome that? Absolutely yes,” Lt Gen Berger said.

Meanwhile, all eyes are on Singapore….but in advance of the talks between the United States and North Korea in Singapore, there was a LOT of nefarious activity.

Related reading: Emissary Panda – A potential new malicious tool

photo

Independent: Hackers from China and Russia are targeting South Korea with cyber espionage attacks ahead of the summit between the US and North Korea, a leading security firm has claimed.

The foreign ministry and financial institutions were identified as potential targets by, US cyber security firm FireEye.

The company’s analysts noted the timing of the attacks and said they expected the intensity of the operations to increase in the build up to the historic meeting between US President Donald Trump and North Korean Chairman Kim Jong-un.

“South Korea has frequently been the target of cyber espionage. Though the biggest threat is North Korea actors. [FireEye] believes that China- and Russia- [based hackers] also target South Korea,” Ben Read, a cyber espionage analyst at the firm, told The Independent.

“With the heightened attention to inter-Korean relations in the lead up to a potential Trump–Kim meeting, we expect this targeting to continue at an increased pace.”

Scheduled to take place on 12 June in Singapore the leader are expected to discuss the denuclearisation of North Korea.

It will be the first meeting between a sitting US president and leader of North Korea.

Some experts have suggested that a formal end to the  Korean War – more than six decades after the 1950-1953 conflict – could be declared.

Although an armistice was signed, no peace treaty has ever been signed to formally end the war.

The two hacking groups identified by the FireEye researchers were TempTick and Turla, both of which are suspected of being state-sponsored operations.

TempTick has previously been involved in attacks on Chinese dissident organisations, as well as Japanese public and private sector institutions. It has been active since 2009.

The earliest known attacks linked to the group known as Turla are from 2006.

FireEye researchers noted: “They consistently target governments worldwide in search of information that can inform Russian government decision making.”

 

Hat Tip to the FBI for Operation Wire Wire

Beyond phishing, there is vishing and smishing.
Vishing is using the phone, either a land line or cell.
Smishing is scamming your text messages.
Tactics are constantly being developed. Are you paying attention?
Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Monday, June 11, 2018

74 Arrested in Coordinated International Enforcement Operation Targeting Hundreds of Individuals in Business Email Compromise Schemes

42 Alleged Fraudsters Arrested in the United States

Federal authorities announced today a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens.  Operation Wire Wire, a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of the Treasury and the U.S. Postal Inspection Service, was conducted over a six month period, culminating in over two weeks of intensified law enforcement activity resulting in 74 arrests in the United States and overseas, including 29 in Nigeria, and three in Canada, Mauritius and Poland.  The operation also resulted in the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

BEC, also known as “cyber-enabled financial fraud,” is a sophisticated scam often targeting employees with access to company finances and businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments.  The same criminal organizations that perpetrate BEC also exploit individual victims, often real estate purchasers, the elderly, and others, by convincing them to make wire transfers to bank accounts controlled by the criminals. This is often accomplished by impersonating a key employee or business partner after obtaining access to that person’s email account or sometimes done through romance and lottery scams.  BEC scams may involve fraudulent requests for checks rather than wire transfers; they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money; and they may not involve an actual “compromise” of an email account or computer network.  Foreign citizens perpetrate many BEC scams.  Those individuals are often members of transnational criminal organizations, which originated in Nigeria but have spread throughout the world.

“Fraudsters can rob people of their life’s savings in a matter of minutes,” said Attorney General Sessions. “These are malicious and morally repugnant crimes. The Department of Justice has taken aggressive action against fraudsters in recent months, conducting the largest sweep of fraud against American seniors in history back in February. Now, in this operation alone, we have arrested 42 people in the United States and 29 others have been arrested in Nigeria for alleged financial fraud. And so I want to thank the FBI, nearly a dozen U.S. Attorneys’ Offices, the Secret Service, Postal Inspection Services, Homeland Security Investigations, the Treasury Department, our partners in Nigeria, Poland, Canada, Mauritius, Indonesia, and Malaysia, and our state and local law enforcement partners for all of their hard work. We will continue to go on offense against fraudsters so that the American people can have safety and peace of mind.”

“This operation demonstrates the FBI’s commitment to disrupt and dismantle criminal enterprises that target American citizens and their businesses,” said FBI Director Christopher A. Wray. “We will continue to work together with our law enforcement partners around the world to end these fraud schemes and protect the hard-earned assets of our citizens. The public we serve deserves nothing less.”

“The Secret Service remains committed to aggressively investigating and pursuing those responsible for cyber-enabled financial crimes,” said U.S. Secret Service Director Randolph “Tex” Alles.  “Although the explosive expansion of the cyber domain has forced us to develop innovative ways of conducting these types of investigations, our proven model remains the same.”

“FinCEN has been a leader in the fight against BEC and other cyber-enabled crime,” said FinCEN Director Kenneth A. Blanco. “Since 2014, working with our domestic and international partners, our Rapid Response Program has helped recover over $350 million stolen from innocent Americans.  We must continue to be smarter, quicker, and better than the criminals that we face every day.  Today’s action is a victory, but it will take vigilance, time, and resources to take this fight into the future.  In defense of the victims of these crimes, we are ready for the challenge.”

“The U.S. Postal Inspection Service has a long history of successfully investigating complex fraud and corruption cases,” said Chief Postal Inspector Guy Cottrell. “We are proud to work alongside our fellow law enforcement partners in major efforts, such as Operation Wire Wire, to target those individuals who take advantage of the American public for illegal profits. Anyone who engages in deceptive practices like this should know they will not go undetected and will be held accountable, regardless of where they are. Postal Inspectors will continue to work tirelessly to protect our customers from fraud.”

A number of cases involved international criminal organizations that defrauded small to large sized businesses, while others involved individual victims who transferred high dollar funds or sensitive records in the course of business.  The devastating effects these cases have on victims and victim companies, affect not only the individual business but also the global economy.  Since the Internet Crime Complaint Center (IC3) began keeping track of BEC and its variant, Email Account Compromise (EAC), as a complaint category, there has been a loss of over $3.7 billion reported to the IC3.  BEC and EAC is a prevalent scam and the Justice Department along with our partners will continue to aggressively pursue and prosecute the perpetrators, including money mules, regardless of where they are located.

Money mules may be witting or unwitting accomplices who receive ill-gotten funds from the victims and then transfer the funds as directed by the fraudsters.  The money is wired or sent by check to the money mule who then deposits it in his or her own bank account.  Usually the mules keep a fraction for “their trouble” and then wire the money as directed by the fraudster.  The fraudsters enlist and manipulate the money mules through romance scams or “work-at-home” scams.

Starting in January 2018, this coordinated enforcement action targeted hundreds of BEC scammers.  In addition, law enforcement agents executed over 51 domestic actions including search warrants, money mule warning letters, and asset seizure warrants totaling nearly $1 million.  Local and state law enforcement partners on FBI task forces across the country, with the assistance of multiple District Attorney’s Offices, charged 15 alleged money mules for their role in defrauding victims.  These money mules were employed by the fraudsters to launder their ill-gotten gains by draining the funds into other accounts that are difficult to trace.

Among those arrested on federal charges in BEC schemes include:

  • Following an investigation by the FBI and the U.S. Secret Service, 23 individuals were charged in the Southern District of Florida with laundering at least $10 million from proceeds of BEC scams, including eight people charged in an indictment unsealed last week in Miami. These eight defendants are alleged to have conspired to launder proceeds from numerous BEC scams, totaling at least approximately $5 million, including approximately $1.4 million from a victim corporation in Seattle, as well as various title companies and a law firm.
  • Following an investigation led by the FBI with the assistance of the IRS Criminal Investigation, Gloria Okolie and Paul Aisosa, both Nigerian nationals residing in Dallas, Texas, were charged in an indictment filed on June 6 in the Southern District of Georgia.  According to the indictment, they are alleged to have victimized a real estate closing attorney by sending the lawyer a spoofing email posing as the seller and requesting that proceeds of a real estate sale in the amount of $246,000 be wired to Okolie’s account.  They are charged with laundering approximately $665,000 in illicit funds.  The attorney experienced $130,000 in losses after the bank was notified of the fraud and froze $116,000.
  • Adeyemi Odufuye aka “Micky,” “Micky Bricks,” “Yemi,” “GMB,” “Bawz” and “Jefe,” 32, and Stanley Hugochukwu Nwoke, aka Stanley Banks,” “Banks,” “Hugo Banks,” “Banky,” and “Jose Calderon,” 27, were charged in a seven-count indictment in the District of Connecticut in a BEC scheme involving an attempted loss to victims of approximately $2.6 million, including at least $440,000 in actual losses to one victim in Connecticut.  A third co-conspirator Olumuyiwa Yahtrip Adejumo, aka “Ade,” “Slimwaco,” “Waco,” “Waco Jamon,” “Hade,” and “Hadey,” 32, of Toledo, Ohio, pleaded guilty on April 20 to one count of conspiracy to commit wire fraud.  Odufuye was extradited from the United Kingdom to the United States and on Jan. 3, pleaded guilty to one count of conspiracy to commit wire fraud and one count of aggravated identity theft. Nwoke was extradited to the United States from Mauritius on May 25, marking the first extradition in over 15 years from Mauritius.  His case is pending.
  • Richard Emem Jackson, aka Auwire, 23, of Lagos, Nigeria, was charged in an indictment filed on May 17 in the District of Massachusetts with two counts of unlawful possession of a means of identification as part of a larger fraud scheme. According to the indictment, on two occasions in 2017, Jackson is alleged to have possessed the identifications of two victims with the intent to commit wire fraud conspiracy.  In another case being prosecuted in the District of Massachusetts, a 25-year-old Fort Lauderdale, Florida man was indicted in federal court in Boston on June 6 on one count of money laundering conspiracy. According to the indictment, the individual was part of a conspiracy that engaged in wire fraud. It is alleged that in early 2018, the defendant’s co-conspirators gained access to email accounts belonging to a Massachusetts real estate attorney and sent emails to recipients in Massachusetts that “spoofed” the real estate attorney’s account in an attempt to cause the email recipient to transfer nearly $500,000, which was intended to be used for payment in connection with a real estate transaction, to a shell account belonging to a money mule recruited and controlled by the defendant.

The BEC scam is related to other forms of fraud such as:

  • “Romance scams,” which lull victims to believe that their online paramour needs funds for an international business transaction, a U.S. visit or some other purpose;
  • “Employment opportunities scams,” which recruits prospective employees for work-from-home employment opportunities where employees are required to provide their PII as new “hires” and then are significantly overpaid by check whereby the employees wire the overpayment to the employers’ bank;
  • “Fraudulent online vehicle sales scams,” which convinces intended buyers to purchase prepaid gift cards in the amount of the agreed upon sale price and are instructed to share the prepaid card codes with the “sellers” who ignore future communications and do not deliver the goods;
  • “Rental scams” occur when renters forward a check in excess of the agreed upon deposit for the rental property to the victims and request the remainder be returned via wire or check and back out of the rental agreements and ask for a refund; and
  • “Lottery scams,” which involves persons randomly contacting email addresses advising them they have been selected as the winner of an international lottery.

The cases were investigated by the FBI, U.S. Secret Service, U.S. Postal Inspection Service, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, the U.S. Department of the Treasury Financial Crimes Enforcement Network (FinCEN) and IRS Criminal Investigation.  U.S. Attorney’s Offices in the Districts of Central California, Connecticut, Eastern Virginia, Massachusetts, Nebraska, New Jersey, Southern Florida, Southern Georgia, Southern Texas, Eastern Pennsylvania, Eastern Washington, Western Pennsylvania, Western Tennessee, Western Washington, Utah, and elsewhere have ongoing investigations some of which have resulted in arrests in Nigeria.  The Justice Department’s Computer Crime and Intellectual Property Section, Money Laundering and Asset Recovery Section and Office of International Affairs of the Criminal Division provided assistance. District Attorney’s Offices of Caddo Parrish in Shreveport, Louisiana; Harris County, Texas and Los Angeles are handling state prosecutions. Additionally, private sector partners and the Nigerian Economic and Financial Crimes Commission, Canadian law enforcement including the Toronto Police Service, the Mauritian Attorney-General and the Commissioner of Police, Polish Police Central Bureau of Investigation, Indonesian National Police Cyber Crimes Unit, and the Royal Malaysia Police provided significant assistance.

This operation, which was funded and coordinated by the FBI, serves as a model for international cooperation against specific threats that endanger the financial well-being of each member country’s residents.  Attorney General Sessions expressed gratitude for the outstanding efforts of the participating countries, including law enforcement actions that were coordinated and executed by the Economic and Financial Crimes Commission (EFCC) in Nigeria to curb business email compromise schemes that defraud businesses and individuals alike.

Victims are encouraged to file a complaint online with the IC3 at bec.ic3.gov. The IC3 staff reviews complaints, looking for patterns or other indicators of significant criminal activity, and refers investigative packages of complaints to the appropriate law enforcement authorities in a particular city or region. The FBI provides a variety of resources relating to BEC through the IC3, which can be reached at www.ic3.gov.

For more information on BEC scams, visit: www.ic3.gov/media/2018/180611.aspx

Is a Chinese Hack on our Naval Weapons an Act of War?

It is long been a question of the point that a foreign hack for espionage and theft is an act of war with emphasis on our naval weapons programs or those of the Army or Air Force.

Cyber warfare is an issue few care about or have control over because data resides outside of our individual control but that is NOT the case when it comes to government. They are accountable for safeguarding networks and data.

After a hiatus of several years, Chinese state hackers are once again penetrating networks at a range of U.S. corporations in a campaign to steal secrets and leapfrog ahead in a race for global technology supremacy, cyber researchers say.

Companies in fields such as biomedicine, robotics, cloud computing and artificial intelligence have all been hit by cyber intrusions originating in China, the researchers say.

“It’s definitely accelerating. The trend is up,” said Dmitri Alperovitch, cofounder and chief technology officer at CrowdStrike, a threat intelligence firm based in Sunnyvale, Calif.,

Chinese state hacking teams linked to the People’s Liberation Army and the Ministry of State Security are becoming visible on U.S. networks again, although they are using new methods to remain undetected, researchers said.

“In the last few months, we’ve definitely seen … a reemergence of groups that had appeared to have gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at FireEye, a cybersecurity firm that has tracked China hacking extensively.

The activity comes after a sharp drop in Chinese hacking that began in September 2015, when former President Barack Obama and Chinese leader Xi Jinping reached an agreement to end the hacking theft of commercial secrets. The agreement quelled U.S. anger over its charge that China is the “world’s most active and persistent perpetrator of economic espionage.”

U.S. prosecutors in 2014 indicted five PLA officers for economic espionage for hacking into firms like Westinghouse, U.S. Steel and Alcoa. The 56-page indictment said the five men worked for Unit 61398 of the PLA’s Third Department in Shanghai. The highly detailed complaint entered into details that U.S. officials later said were meant to “name and shame” China for commercial hacking.

Why China’s hackers may be getting back into the game is not readily clear. Renewed trade tensions may be a reason. President Donald Trump has threatened to impose $50 billion of tariffs on China-made products to cut the U.S. trade deficit of $375 billion with China.

Another factor may be the conclusion of a massive reorganization of China’s military, which began in late 2015 and under which various signals intelligence and cyber hacking units “were dissolved and absorbed into this one mega organization, called the Strategic Support Force,” said Priscilla Moriuchi, an expert on East Asia at Recorded Future, a cyber-threat intelligence firm based in Somerville, Mass.

China’s Xi has laid out ambitious goal of catching up with the United States and Europe in 10 key sectors, including aerospace, semiconductors and robotics, under its “Made in China 2025” program.

Moriuchi, who spent 12 years in the U.S. intelligence community, eventually leading the National Security Agency’s East Asia and Pacific cyber threats office, said China’s hackers are broadening tactics, burrowing into telecommunications networks even as they steal secrets to help party leaders achieve “Made in China 2025” goals.

“The sectors that they are going after are things like cloud computing, (Internet of Things), artificial intelligence, biomedicines, civilian space, alternative energy, robotics, rail, agricultural machinery, high-end medical devices,” Moriuchi said.

“There are companies in all of these sectors that have experienced intrusions over the past year from actors who are believed to be China state-sponsored,” she said.

Since early in the past decade, U.S. officials have alleged that Chinese state hackers were tasked with obtaining commercial secrets from Western corporations to help Chinese firms, many of them state-owned, overtake competitors to the global forefront in technology.

In a renewed warning alert for China, a March 22 report from the Office of the U.S. Trade Representative on China’s trade actions said, “Beijing’s cyber espionage against U.S. companies persists and continues to evolve.

So as you read about the stolen data from the Navy by China consider this: Should the NSA get inside the Chinese networks now and infect and or re-steal our intelligence?

Unmanned underwater vehicles take advantage of advanced ... photo

(Note: according to the Washington Post item below, the contractor is not named, however ‘Inside Defense’ in September of 2016 published an item that GD Electric Boat was awarded the $105.5 million contract modification moving it into the second phase.)

electric boat « Breaking Defense - Defense industry news ... photo

WaPo: Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.

The officials did not identify the contractor.

Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.

The Washington Post agreed to withhold certain details about the compromised missile project at the request of the Navy, which argued that their release could harm national security.

The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network. The officials said the material, when aggregated, could be considered classified, a fact that raises concerns about the Navy’s ability to oversee contractors tasked with developing cutting-edge weapons.

The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in east Asia. The news comes as the Trump administration is seeking to secure Beijing’s support in persuading North Korea to give up nuclear weapons, even as tensions persist between the United States and China over trade and defense matters.

The Navy is leading the investigation into the breach with the assistance of the FBI, officials said. The FBI declined to comment.

On Friday, the Pentagon inspector general’s office said that Defense Secretary Jim Mattis had asked it to review contractor cybersecurity issues arising from The Post’s story.
Navy spokesman Cmdr. Bill Speaks said, “There are measures in place that require companies to notify the government when a ‘cyber incident’ has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.”

Speaks said “it would be inappropriate to discuss further details at this time.”

Altogether, details on hundreds of mechanical and software systems were compromised — a significant breach in a critical area of warfare that China has identified as a priority, both for building its own capabilities and challenging those of the United States.

“It’s very disturbing,” said former Sen. Jim Talent (R-Mo.,) who is a member of the U.S. China Economic and Security Review Commission. “But it’s a of a piece with what the Chinese have been doing. They are completely focused on getting advanced weapons technology through all kinds of means. That includes stealing secrets from our defense contractors.” Talent had no independent knowledge of the breach.
Undersea priority

The Sea Dragon project is an initiative of a special Pentagon office stood up in 2012 to adapt existing U.S. military technologies to new applications. The Defense Department, citing classification levels, has released little information about Sea Dragon other than to say that it will introduce a “disruptive offensive capability” by “integrating an existing weapon system with an existing Navy platform.” The Pentagon has requested or used more than $300 million for the project since late 2015 and has said it plans to start underwater testing by September.

Military experts fear that China has developed capabilities that could complicate the Navy’s ability to defend U.S. allies in Asia in the event of a conflict with China.

The Chinese are investing in a range of platforms, including quieter submarines armed with increasingly sophisticated weapons and new sensors, Adm. Philip S. Davidson said during his April nomination hearing to lead U.S. Indo-Pacific Command. And what they cannot develop on their own, they steal — often through cyberspace, he said.

“One of the main concerns that we have,” he told the Senate Armed Services Committee, “is cyber and penetration of the dot-com networks, exploiting technology from our defense contractors, in some instances.”

In February, Director of National Intelligence Daniel Coats testified that most of the detected Chinese cyber-operations against U.S. industry focus on defense contractors or tech firms supporting government networks.

In recent years, the United States has been scrambling to develop new weapons or systems that can counter a Chinese naval buildup that has targeted perceived weaknesses in the U.S. fleet. Key to the American advantage in any faceoff with China on the high seas in Asia will be its submarine fleet.

“U.S. naval forces are going to have a really hard time operating in that area, except for submarines, because the Chinese don’t have a lot of anti-submarine warfare capability,” said Bryan Clark, a naval analyst at the Center for Strategic and Budgetary Assessments. “The idea is that we are going to rely heavily on submarines in the early effort of any conflict with the Chinese.”

China has made closing the gap in undersea warfare one of its three top military priorities, and although the United States still leads the field, China is making a concerted effort to diminish U.S. superiority.

“So anything that degrades our comparative advantage in undersea warfare is of extreme significance if we ever had to execute our war plans for dealing with China,” said James Stavridis, dean of the Fletcher School of Law and Diplomacy at Tufts University and a retired admiral who served as supreme allied commander at NATO.

The U.S. military let its anti-ship weaponry languish after the Cold War ended because with the Soviet Union’s collapse, the Navy no longer faced a peer competitor on the seas. But the rapid modernization and buildup of the Chinese navy in recent years, as well as Russia’s resurgent forces at sea, have prompted the Pentagon to renew heavy investment in technologies to sink enemy warships.

The introduction of a supersonic anti-ship missile on U.S. Navy submarines would make it more difficult for Chinese warships to maneuver. It would also augment a suite of other anti-ship weapons that the U.S. military has been developing in recent years.
Ongoing breaches

For years, Chinese government hackers have siphoned information on the U.S. military, underscoring the challenge the Pentagon faces in safeguarding details of its technological advances. Over the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter; the advanced Patriot PAC-3 missile system; the Army system for shooting down ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s new Littoral Combat Ship, a small surface vessel designed for near-shore operations, according to previous reports prepared for the Pentagon.

In some cases, suspected Chinese breaches appear to have resulted in copycat technologies, such as the drones China has produced that mimic U.S. unmanned aircraft.

[Chinese cyberspies stole a long list of U.S. weapons designs]

Speaks, the Navy spokesman, said: “We treat the broader issue of cyber intrusion against our contractors very seriously. If such an intrusion were to occur, the appropriate parties would be looking at the specific incident, taking measures to protect current information, and mitigating the impacts that might result from any information that might have been compromised.”

The Pentagon’s Damage Assessment Management Office has conducted an assessment of the damage, according to the U.S. officials. The Office of the Secretary of Defense declined to comment.

Theft of an electronic warfare library, Stavridis said, could give the Chinese “a reasonable idea of what level of knowledge we have about their specific [radar] platforms, electronically and potentially acoustically, and that deeply reduces our level of comfort if we were in a close undersea combat situation with China.”

Signals and sensor data is also valuable in that it presents China with the opportunity to “know when we would know at what distance we would be able to detect their submarines” — again a key factor in undersea battles.

Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department.

Although the Chinese People’s Liberation Army is far better-known than the MSS when it comes to hacking, the latter’s personnel are more skilled and much better at hiding their tracks, said Peter Mattis, a former analyst in the CIA counterintelligence center. The MSS, he said, hack for all forms of intelligence: foreign, military and commercial.

In September 2015, in a bid to avert economic sanctions, Chinese President Xi Jinping pledged to President Barack Obama that China would refrain from conducting commercial cyberespionage against the United States. Following the pact, China appeared to have curtailed much, although not all, of its hacking activity against U.S. firms, including by the People’s Liberation Army.

Both China and the United States consider spying on military technology to fall outside the pact. “The distinction we’ve always made is there’s a difference between conducting espionage in order to protect national security and conduct military operations, and the theft of intellectual property for the benefit of companies inside your country,” said Michael Daniel, the White House cybersecurity coordinator under Obama.

 

Indictment of Leaker to Media, Wolfe and Watkins Romance

So, many in media were quite upset with the breaking news that the cell phones and messages were seized by the Department of Justice of a journalist. Well, hold on Hannity. There were good reasons, this time.

The New York Times has/had this reporter, Ali Watkins that decided to have a long romantic relationship with James A. Wolfe, a former Senate Intelligence Committee Director of Security. Seems Mr. Wolfe provided Ali Watkins with classified material and information that she exploited and published articles on the same.

Mr. Wolfe was formally indicted on May 2, 2018 and more counts may be added. What is also remarkable is Ali Watkins phones and communications were seized in February of 2018, so much for the New York Times being honest, candid and transparent, right?

The indictment refers to at least 4 reporters. After much cultivating of related stories, those reporters are possibly known as: Reporter #1 Manu Raju at CNN Reporter #1 Ali Watkins at NYT Reporter #3 Marianna Sotomayor NBC Reporter #4 Brian Ross ABC.

Now, this all goes back to Carter Page by the way. And while so many are turning on Trey Gowdy for his position on the FBI inserting moles, informants or spies, let’s go to context shall we?

In 2013, a group of Russian operatives, read spies, were inserted into New York, downtown Manhattan, operating under cover. All of them were part of SVR, known as Russian foreign intelligence. All the while, the FBI was listening to their calls and had bugged the New York office of the SVR. How about those names? Viktor Pododnyy, he worked to recruit Carter Page with some success. Igor Sporyshev, worked covertly as a trade representative and then we have Evgeny Buryakov. He worked under cover at the VEB bank on 3rd Avenue in Manhattan.

The operation included passing off documents at a particular location near a 1960 abstract sculpture at the street level in the foyer. Sporyshev had the job of recruiting Americans willing to become intelligence sources for Russia. One such person was Carter Page. Carter Page is listed in court documents as Male #1. Page has admitted meeting with Russian operatives in 2013. To date, it is unclear if Page did provide any classified material or assistance to any number of Russian operatives as he has not been charged with any counts.

Of note, Evgeny Buryakov was charged and plead guilty in 2016, in Manhattan court with conspiracy and was deported in 2017. In 2015, was charged along with Sporyshev with aiding and abetting Buryakov and also later deported. The United States by the way traded these men and a few others for 4 Russian prisoners.

Russia had dispatched 10 agents to the United States in 2010. That TV show, The Americans was inspired by this whole case.

Meanwhile, the Senate Intelligence Committee Chair, Senator stated the committee has fully cooperated with the FBI/DoJ investigation and it is undetermined yet just how much if any classified material was compromised. Wolfe, the Director of Security for the committee, retired apparently this past March after 29 years in that role.

Back to Ali Watkins, she was so elated with her information at the time she reported for BuzzFeed, she appeared on Rachel Maddow’s show on her story in April 2017.

While all this was going on last December with James Wolfe, lil miss Watkins knew something was up.

Maybe we should ask Senator Feinstein what she was talking about here with Ali:

And the beat goes on eh?