Meet Robert L. Peters or Robin Ware or JRB Ware or Actually Joe Biden

It is obvious that foreign policy decisions on Ukraine and financial support were and still are due to quid pro quo. (Now what did Barack Obama know and when did he know it….)

Begin here with a big hat tip to Congressman Comer:

Image Image

The crazy part of all this is the National Archives has know this and never reported it to the Oversight Committee, to the Department of Justice or to the FBI….

***

JTN:

In a dramatic shift in the Biden family corruption probe, House investigators on Thursday demanded full access at the National Archives to Joe Biden’s communications as vice president with his son Hunter and his business partners.

The demand came after the House Oversight Committee unearthed an email showing a White House staffer communicated plans for a phone call with Ukraine’s president to Joe Biden on a private email account in 2016 and copied Hunter Biden, an unusual backdoor for a sensitive conversation with a foreign leader.

“The Committee’s need for these Vice-Presidential records is specific and well- documented,” Chairman James Comer wrote Colleen Shogam the head of the the National Archives and Record Administration. “The Committee seeks to craft legislative solutions aimed at deficiencies it has identified in the current legal framework regarding ethics laws and disclosure of financial interests related to the immediate family members of Vice Presidents and Presidents— deficiencies that may place American national security and interests at risk.”

You can read the full letter here.

The email in question was quietly released in January as part of the Obama presidential archives. In it, a White House staffer writes Joe Biden on a personal pseudonym email account named Robert L. Peters. about a planned call with then Ukrainian President Petro Poroshenko. The staffer copied Hunter Biden’s email address at Rosemont Senaca Partners.

At the time, Hunter Biden served on the board of a Ukrainian gas company called Burisma Holdings that was deemed to be corrupt by the Obama-Biden State Department.

“Boss–8:45am prep for 9am phone call with Pres Poroshenko. Then we’re off to Rhode Island for infrastructure event and then Wilmington for UDel commencement,” the staffer wrote the then-Vice President. “Nate will have your draft remarks delivered later tonight or with your press clips in the morning.”

You can read that email here:

The Archives released a handful of other emails, some redacted, with other private communications. Comer said he needed the fully unredacted emails, making what is known as a “special access” request to the National Archives.

“The Committee seeks unrestricted special access/ … These records have been redacted for public release pursuant to the PRA and FOIA. For example, an email bearing the subject “Friday Schedule Card,” is withheld in part under a “P6” and “b(6)” restrictions, denoting personal information regarding the subject under the PRA and FOIA respectively.” Comer wrote.

“Attached to this email, and made available on the NARA website, is a document that indicates at 9:00 a.m. on May 27, 2016, Vice President Biden took a call with the president of Ukraine, Petro Poroshenko,” he added/ “It is concerning to the Committee, however, that this document was sent to “Robert L. Peters”—a pseudonym the Committee has identified as then Vice- President Biden. Additionally, the Committee questions why the then-Vice President’s son, Hunter Biden—and only Hunter Biden—was copied on this email to then-Vice President Biden.”

The letter requested special access to specific documents, including any:

  • “Document or communication in which a pseudonym for Vice President Joe Biden was included either as a sender, recipient, copied or was included in the contents of the document or communication, including but not limited to Robert Peters, Robin Ware, and JRB Ware;
  • “Document or communication in which Hunter Biden, Eric Schwerin, or Devon Archer was included either as a sender, recipient, copied, or was included in the contents of the document or communication; and
  • “Rrafts from November 1, 2015 to December 9, 2015 of then-Vice President Biden’s speech delivered to the Ukrainian Rada on December 9, 2015.”

***

Related reading:

NR: The committee recently released bank records that revealed Biden family and its business associates received millions of dollars from oligarchs in Russia, Kazakhstan, and Ukraine while Joe Biden was vice president.

The committee says it has identified more than $20 million in payments from foreign sources to the Biden family and their business associates. Those foreign sources include not only the three aforementioned countries, but also China and Romania as well.

DC Judge on the Trump Case Must Recuse

Tanya Chutkan recused herself previously and must again, perhaps she should also be put under investigations. Why you ask?

  1. You can click this link and see her involvement in previous RussiaGate cases.
  2. Partisan – According to the Washington Examiner, Chutkan was appointed to the US District Court by President Obama in 2014 after donating around $4,300 to his campaign and victory fund between the 2008 and 2012 elections.
  3. She previously worked at Boies, Schiller, & Flexner LLP, a law firm that once employed Hunter Biden. Chutkan is married to fellow Obama appointee Associate Judge Peter Krauthamer of the Superior Court of the District of Columbia. The former Democratic president picked him for the 15-year term in 2011. and worked closely with Ukrainian energy firm Burisma.
  4. Boies Schiller (the firm that hired Fusion GPS to attack Theranos whistleblowers) and then presided as judge in the U.S. House lawsuit against Fusion GPS. Hunter Biden worked for BSF in the same year he was appointed to Burisma’s board in April 2014. Hunter quickly brought BSF partners into the fold to assist Burisma with its efforts to influence U.S. officials, according to emails on Hunter Biden’s laptop.

The Daily Caller also reports:

In April 2014, Hunter Biden and business associate Devon Archer spoke about how BSF could give them “protection” and work with government officials on Burisma’s behalf.

“BSF can actually have direct discussions at state, energy and NSC. They can devise a media plan and arrange for legal protections and mitigate US domestic negative press regarding the current leadership if need be,” Biden told Archer.

“The contract should begin now- not after the upcoming visit of my guy. That should include a retainer in the range of 25k p/m w/ additional fees where appropriate for more in depth work to go to BSF for our protection. Complete separate from our respective deals re board participation,” Biden added.

Shortly after his correspondence with Archer, Biden set up a call with BSF partners including Christopher Boies and Heather King, the emails show.

King communicated with the State Department on behalf of Burisma founder Mykola Zlochevsky and strategized with Burisma on how to handle the press and influence government officials, emails from May 2014 indicate. She suggested Burisma hire professional lobbyists, a PR firm and an investigative research firm to bolster its influence operation, per the emails.

5. Then this Judge seems to have a habit of selectively defining what and where violence really is.

Chutkan was indignant about comparisons between the riots that broke out in cities across the country after the May 2020 police-involved killing of George Floyd in Minneapolis and the Jan. 6, 2021, Capitol riot.

She even invoked the “mostly peaceful” narrative for describing the riots by Black Lives Matter and Antifa militants.

“People gathered all over the country last year to protest the violent murder by the police of an unarmed man. Some of those protesters became violent,” Chutkan said during an October 2021 court hearing. “But to compare the actions of people protesting, mostly peacefully, for civil rights, to those of a violent mob seeking to overthrow the lawfully elected government is a false equivalency and ignores a very real danger that the Jan. 6 riot posed to the foundation of our democracy.” source

6. This is rather twisted too:

Obama-appointed judge hearing Trump's bid to block Jan 6 docs called  Capitol rioters a 'violent mob' | Daily Mail Online

In 2017, the first year of the Trump administration, Chutkan ruled that the Office of Refugee Resettlement must allow a juvenile illegal immigrant in the custody of Immigration and Customs Enforcement to have an abortion. That was in the case of Garza v. Hargan.

In 2019, Chutkan ruled that Trump’s education secretary, Betsy DeVos, illegally delayed the implementation of the “Equity in IDEA” (Individuals With Disabilities Education Act) regulations that update how states calculate racial disparities in special education. source

Lots of reasons to both recuse and actually to move to the case/trial outside of Washington DC completely.

Unlicensed Nefarious Chinese Biolab in Reedley, CA

The FBI was way behind on this one…sigh

In operation since 2022…

Code enforcement check uncovers illegal lab making COVID-19 and pregnancy test kits, bacterial and viral agents and 900 white miceUniversal MediTech and Prestige Biotech were using and storing reagents on site that were imported from outside the U.S.—using these foreign chemicals requires a federal permit that the business owners didn’t have, according to the document.

CG: Why would a COVID lab run by a shady Chinese company be operating in Reedley, CA in the central San Joaquin Valley? The lab, which was supposed to be an empty building, was discovered by Reedley city code enforcement officers when they saw a garden hose attached to the building and investigated.

Darren Fraser at the MidValley Times reported earlier this week that the building has been illegally operated since October 2022 by Wang Zhaolin of Prestige Biotech, and the lab was used to produce COVID-19 tests and pregnancy tests.Furniture, chemicals, and devices improperly stored.

City of Reedley officials called in the Centers for Disease Control and Prevention (CDC), the FBI, the State Department of Toxic Substances Control (DTSC), the State Department of Health, the California Department of Public Health (CDPH) and the Fresno County Department of Public Health (FCDPH).Warehouse location in Reedley, Calif.

“Reedley officials and personnel from CDPH and FCDPH executed a warrant on March 16 to inspect the warehouse at 850 I Street,” MidValley Times reported. “According to a declaration from Humero Prado, Assistant Director of Fresno County Public Health, which was filed in superior court, investigators discovered that one room of the warehouse was used to produce COVID-19 and pregnancy tests. In other rooms, investigators found blood, tissue and other bodily fluid samples. They also found thousands of vials that contained unlabeled fluids.”

And they found 900 genetically engineered mice, engineered to catch and carry COVID-19, living in “inhumane” conditions. 773 of the mice had to be euthanized, and officials found another 178 mice already dead.

Mid Valley Times further reports:

“From May 2 through May 4, the CDC’s Division of Select Agents and Toxins inspected 850 I Street. Court documents confirm the CDC found potentially infectious agents at the location. These included both bacterial and viral agents, including: chlamydia, E. Coli, streptococcus pneumonia, hepatitis B and C, herpes 1 and 5 and rubella. The CDC also found samples of malaria.”

“Court documents identify Xiuquin Yao as the alleged president of Prestige. Neither Reedley nor FCDPH was able to obtain from Yao any substantive information regarding Prestige or why infectious agents and mice were being stored at 850 I Street other than to say that the company was developing diagnostic testing kits.”

“Court documents include copies of an email exchange Prado conducted with David He, who identified himself as a representative of Prestige, beginning May 31 and continuing through June 13. Over the course of numerous emails, Prado repeatedly asks He to provide documentation regarding licensed medical waste disposal, Prestige’s reasons for storing infectious agents and how the company will respond to the biological abatement orders handed down by FCDPH.”

“They (Prestige) completely avoided the questions,” Prado said. “This individual (He) was either unaware or was intentionally trying to mislead us.”

***

Officials were unable to get any California-based address for either company except for the previous Fresno location from which UMI had been evicted.

“The other addresses provided for identified authorized agents were either empty offices or addresses in China that could not be verified,” court documents said.

Prestige BioTech is accused of failing to comply with orders, including providing a plan for biological abatement and disposal of the materials. Emails sent to Yao and Prestige BioTech requesting comment were not immediately answered Thursday.

Prado told NBC affiliate KSEE of Fresno that those associated with Prestige BioTech were not forthcoming with information. Court documents say they failed to provide any licensing or permit that allows experimentation or other laboratory activity.

Two Tech Companies Report Chinese Malware in the Power Grids

No worries America, President Biden is on vacation again, this time for a week. Meanwhile, it was back in May that Microsoft and Mandiant (0wned by Google) reported Volt Typhoon was in a few power systems either for espionage or worse for later capability to disrupt. Presently, there is no immediate threat however, experts outside of the Federal government are studying the cyber language and issuing warnings.

Volt Typhoon's Cyberattack: Key Concerns and Implications for the Industry  | TXOne Networks source

Experts say it’s one of the largest known cyber espionage campaigns against the US.

A key US military outpost, Guam’s ports and air bases would be crucial to any Western response to a conflict in Asia. Together with the Five Eyes alliance – comprising the intelligence agencies of the US, Australia, Britain, New Zealand and Canada – Microsoft published details of the malware.

A cyberattack on Guam is equivalent to an attack on Silicon Valley. Guam, with a population of nearly 154,000, is indistinguishable from the 50 states for the purposes of defense under international and domestic law. It would also be vital to US military operations in any conflict over Taiwan. The Guam Defense System, the defense architecture surrounding Guam and the Mariana Island Chain, is the top homeland defense priority of the current commander of the US Indo-Pacific Command, Admiral John Aquilino. Guam contains the United States’ largest refueling and armament stations in the first and second island chains that provide lines of defense against China. The 2023 National Defense Authorization Act also announced $1.4 billion for defense projects in Guam, and the U.S. Marine Corps is building its first new base in 72 years there. Guam has among the highest military recruitment levels in the United States. In recognition of Guam’s military importance, China calls its DF-26 intermediate ballistic missile, which has a 2500-mile firing range, “the Guam Killer.” Source

The U.S. has 3 military bases (installations in Guam)

Q&A: What does the US military do on the island of Guam? source

***

China’s “peacetime” targeting of critical infrastructure that is used by both civilians and the US military erodes the principles of the law of war. The principle of distinction ordinarily forbids targeting civilian objects, such as civilian property and infrastructure. However, many computer networks are used for both civilian and military purposes. Such “dual use” objects may be targetable based on their nature, purpose, and use. However, combatants must still comply with the other principles of the law of war: military necessity, proportionality, and avoiding unnecessary suffering.

Microsoft has tracked a group of what it believes to be Chinese state-sponsored hackers who have since 2021 carried out a broad hacking campaign that has targeted critical infrastructure systems in US states and Guam, including communications, manufacturing, utilities, construction, and transportation.

Microsoft’s blog post offered technical details of the hackers’ intrusions that may help network defenders spot and evict them: The group, for instance, uses hacked routers, firewalls, and other network “edge” devices as proxies to launch its hacking—targeting devices that include those sold by hardware makers ASUS, Cisco, D-Link, Netgear, and Zyxel. The group also often exploits the access provided from compromised accounts of legitimate users rather than its own malware to make its activity harder to detect by appearing to be benign.

Blending in with a target’s regular network traffic in an attempt to evade detection is a hallmark of Volt Typhoon and other Chinese actors’ approach in recent years, says Marc Burnard, a senior consultant of information security research at Secureworks. Like Microsoft and Mandiant, Secureworks has been tracking the group and observing its campaigns. He added that the group has demonstrated a “relentless focus on adaption” to pursue its espionage.

US government agencies, including the National Security Agency, the Cybersecurity and Infrastructure Security Agency (CISA), and the Justice Department published a joint advisory about Volt Typhoon’s activity today alongside Canadian, UK, and Australian intelligence. “Private sector partners have identified that this activity affects networks across US critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide,” the agencies wrote. As early as 2009, US intelligence officials warned that Chinese cyberspies had penetrated the US power grid to “map” the country’s infrastructure in preparation for a potential conflict. Two years ago, CISA and the FBI also issued an advisory that China had penetrated US oil and gas pipelines between 2011 and 2013. China’s Ministry of State Security hackers have gone much further in cyberattacks against the country’s Asian neighbors, actually crossing the line of carrying out data-destroying attacks disguised as ransomware, including against Taiwan’s state-owned oil firm CPC. Source

It was not until the New York Times reported this condition that anyone took it seriously. What is worse are the facts reported by CyberScoop in part:

The largely unknown amount of Chinese-made equipment within the North American grid is a threat to national security, experts warned during a Thursday congressional hearing that explored cybersecurity vulnerabilities within the electric sector.

Witnesses from the Department of Energy and private sector testifying during the Senate Energy and Natural Resources Committee echoed a sentiment increasingly heard in Washington that a longstanding dependence on Chinese technologies and cheap components is now an alarming national security issues for U.S. critical infrastructure.

 

 

 

Your Vehicle is Spying on you and You’re not Getting Paid

Every app on your phone is collecting data, often protected and confidential data and selling it. Selling it to whom? No idea. But then you have invited the same thing when it comes to your home with the streaming apps…never mind Alexa and Siri. But now while it has been highly suggested to never use or click on Tik Tok videos that people seem to ignore at their own peril…let’s consider your own cars or trucks you drive every day. Oh you have nothing to hide…yeah yeah yeah…but manufacturers and tech companies are making trillions a year selling everything about YOU and you don’t care or have nothing to hide? Are you fine with your passwords, social security numbers, ATM card numbers or even children’s names being transported to entities unknown to you?

Privacy is gone and you should care…. it is a cyber war actually and you are in the middle of it.

Autonomous Car Technology Market Outlook From 2020-2026 - Science Techniz source

It all started with OnStar and now there is facial recognition requirements to even start your car….

America’s national security experts have made a compelling case that TikTok, the popular social media application owned in part by the Chinese government, constitutes a national security threat.

The Federal Bureau of Investigation has warned that TikTok allows the Chinese government to access location, biometric identifiers and browsing history, which could be shared with the Chinese Communist Party. This information led a bipartisan group of senators, led by Sen. Mark Warner (D-Va.), to recently introduce legislation providing the Department of Commerce the power to regulate the popular social media app. The Biden White House quickly endorsed the bill and called for its immediate passage.

It’s encouraging that the federal government is taking the TikTok threat so seriously. Many policy analysts even believe it should double its efforts to combat harmful social media companies’ data collection. After all, TikTok is not the first company that poses such a problem, nor will it be the last. Many other apps, such as WeChat, have equally dangerous connections to the Chinese Communist Party that lawmakers should watch closely.The data regulations that they impose on TikTok should apply across the board including American companies that may pose similar threats.

That said, Chinese-owned social media apps are not the only data collection threat that the American people currently face. Chinese-owned automakers present just as significant of a national security problem, if not an even greater one.

Modern cars are becoming data collection vacuums. Their cameras and computers not only diagnose engines, but they also collect information about where you travel, what stores you shop at, what music you listen to, and how fast you drive. Electric cars, particularly autonomous vehicles, collect millions of terabytes of information that automakers rightfully see as digital gold.

This data collection would be beneficial if consumers owned and controlled it, but currently, they don’t. The car companies do. Best Android Car Apps 2016 | Caromotor 2017

Chinese automakers like Volvo and Lotus must comply with the same Military-Civil Fusion laws that TikTok and other problem Chinese apps must follow. That means the same data security concerns apply but with even more in-depth personal in play, from when they leave the house to their driving patterns and histories.

American vehicle manufacturers have yet to modernize their security infrastructures with the modern-digital age. Over the last year, API attacks in the automotive industry have surged by over 380 percent, and 34 percent of auto employees admitting their company receives more security threats now than two years ago. China is one of the global leaders in API attacks, and U.S. attorneys have already warned automakers to watch out for the country’s theft of their personal information.

For all these reasons and more, this information shouldn’t remain the property of the carmakers. The drivers should own and control it.

Reps. Gus Bilirakis (R-Fla.) and Jan Schakowsky’s (D-Ill.) Innovation, Data, and Commerce Subcommittee should consider a comprehensive legislative framework that ensures transparency and accountability from car manufacturers and protects drivers against misuse of their personal information. This will turn a staunch national security problem — TikTok on wheels — into a valuable addition to the U.S. economy.

Again, the problem is not that this auto data exists; the problem is that carmakers are the ones in control of it. From diagnosing and fixing vehicle malfunctions to providing insurance discounts, vehicles keeping track of this information is benefiting drivers in untold ways. If consumers own this data instead of the auto industry, they will receive the utility of this information without the baggage of it potentially falling in the wrong hands.  Source