Where are the FBI Reports for the 2020 Election Monitoring?

As a collection of Republican members of the House and the Senate are formally challenging the electors from the 2020 results, investigations continue by a wide and deep group of legal professionals for many states. The challenges are not just about the presidential results but certainly deal with all down ballot candidates and measures.
Some audits are complete while others are underway.
Consider all the varieties of voter, ballot and reporting fraud. In fact, while the State of Georgia is the most contested so far, should there even be a run-off senate race in the first place?
Meanwhile, no one is challenging the FBI on their assignments and work during the 2020 election cycle. Question is…where are those reports?
***

Election Crimes

Election crimes threaten the legitimacy of elections and undermine public confidence in our democracy. Election crimes fall into four broad categories:

  • Ballot fraud
  • Campaign finance violations
  • Patronage offenses
  • Civil rights violations, such as voter suppression or voter intimidation

While individual states and localities have the constitutional authority and responsibility to manage elections and have their own election laws, an election crime becomes a federal crime when one or more of the following occurs:

  • A ballot includes one or more federal candidates
  • Election or polling place officials abuse their office
  • The conduct involves false voter registration
  • The crime is motivated by hostility toward minority protected classes
  • The activity violates federal campaign finance law

Examples of federal election crimes include, but are not limited to:

  • Giving false information when registering to vote
  • Voting more than once
  • Changing ballot markings or otherwise tampering with ballots
  • Compensating voters
  • Threatening voters with physical or financial harm
  • Intentionally lying about the time, manner, or place of an election to prevent qualified voters from voting
  • Political fundraising by federal employees
  • Campaign contributions above legal limits
  • Conduit contributions
  • Contributions from foreign or other prohibited sources
  • Use of campaign funds for personal or unauthorized purposes

Distinguishing between legal and criminal conduct is critical for ensuring the integrity of U.S. elections. The following activities are not federalelection crimes; however, states have their own election laws. If you are concerned about a possible violation of a state or local election law, contact your local law enforcement.

  • Giving voters rides to the polls or time off to vote
  • Offering voters a stamp to mail a ballot
  • Making false claims about oneself or another candidate
  • Forging or faking nominating petitions
  • Campaigning too close to polling places

The FBI plays an important role in preventing violations of your constitutional rights, including your right to vote. Report any instances of potential election crimes to your local FBI field office as soon as possible.

According to the FBI website:

Election Crimes and Security

Fair elections are the foundation of our democracy, and the FBI is committed to protecting the rights of all Americans to vote.

The U.S. government only works when legal votes are counted and when campaigns follow the law. When the legitimacy of elections is corrupted, our democracy is threatened.

While individual states run elections, the FBI plays an important role in protecting federal interests and preventing violations of your constitutional rights.

An election crime is generally a federal crime if:

  • The ballot includes one or more federal candidates
  • An election or polling place official abuses their office
  • The conduct involves false voter registration
  • The crime intentionally targets minority protected classes
  • The activity violates federal campaign finance law

    Protect Your Vote

    • Know when, where, and how you will vote.
    • Seek out election information from trustworthy sources, verify who produced the content, and consider their intent.
    • Report potential election crimes—such as disinformation about the manner, time, or place of voting—to the FBI.
    • If appropriate, make use of in-platform tools offered by social media companies for reporting suspicious posts that appear to be spreading false or inconsistent information about voting and elections.
    • Research individuals and entities to whom you are making political donations.

    Voter Suppression

    Intentionally deceiving qualified voters to prevent them from voting is voter suppression—and it is a federal crime.

    There are many reputable places you can find your polling location and registration information, including eac.gov and usa.gov/how-to-vote. However, not all publicly available voting information is accurate, and some is deliberately designed to deceive you to keep you from voting.

    Bad actors use various methods to spread disinformation about voting, such as social media platforms, texting, or peer-to-peer messaging applications on smartphones. They may provide misleading information about the time, manner, or place of voting. This can include inaccurate election dates or false claims about voting qualifications or methods, such as false information suggesting that one may vote by text, which is not allowed in any jurisdiction.

    • For general elections, Election Day is always the first Tuesday after November 1.
    • While there are some exceptions for military overseas using absentee ballots by email or fax, you cannot vote online or by text on Election Day.

    Always consider the source of voting information. Ask yourself, “Can I trust this information?” Look for official notices from election offices and verify the information you found is accurate.

    Help defend the right to vote by reporting any suspected instances of voter suppression—especially those received through a private communication channel like texting—to your local FBI field office or at tips.fbi.gov.

    Stock image depicting a person placing a ballot into a ballot box with an American flag background

    Report Election Crime

    If you suspect a federal election offense, contact the election crimes coordinator at your local FBI office, or submit a tip online at tips.fbi.gov.

     

 

Chinese Slaves Manufacture Covid Masks Your Wearing

So, while we are continuing to learn only some of the actions inside the United States by the Chinese Communist Party that include:

Senator Dianne Feinstein and her husband

The entire Biden Family

Congressman Eric Swalwell

… we are now finding that Georgia Senate candidate, Jon Ossoff in a contentious run-off race lied about his Chinese Communist Party business deal and finally came clean after he was about to be sued over his false financial disclosures.

Ossoff attracting surprising levels of GOP support in Georgia special -  POLITICO

There is much more to bubble to the surface as noted by the shuttering of the Chinese Consulate in Houston a few months ago and the soon to be revealing of more details. Meanwhile, U.S. corporations are also very tied to the Chinese Communist Party least of which is Apple, Google and Facebook. But what about slaves?

Few people understand that China has re-education camps and slaves known as Uighurs and the treatment of this Turkic ethnic group which is native to China.

A very large and detailed investigation completed has noted below:

Medical masks and protective equipment made by Uighur laborers in China are being sold across Europe by at least two major distributors, and have been bought by governments and health bodies in at least five countries, an investigation by OCCRP and partners has found.

The workers are ethnic Uighurs from the western Chinese region of Xinjiang who have been sent to factories in other parts of the country under a controversial “labor transfer” program that experts say is coercive and prone to abuses.

China’s government has embarked on a campaign to stamp out unrest among Uighurs in Xinjiang via a campaign of mass surveillance and detention.

The labor transfer program ostensibly provides Uighurs in Xinjiang with new opportunities to leave home for factory jobs in other provinces. But rights workers say they are often coerced into complying, amid a crackdown that has seen over a million Uighurs and other Muslim minorities sent to re-education camps. Campaigners have been pushing for Western companies and governments to stop buying products made with Uighur labor.

Earlier this year, the New York Times revealed that medical masks made by Uighurs at a factory in Hubei province were being sold in the U.S. Now, OCCRP and its partners have found that some of Europe’s biggest medical distributors are also selling masks and protective equipment from this manufacturer, Hubei Haixin Protective Products. Publicly available documents show that Hubei Haixin until recently employed at least 130 Uighur workers transferred from Xinjiang.

The distributors include local branches of McKesson, a multinational giant that owns some of Europe’s largest pharmacy chains and medical wholesalers, and Swedish medical supply firm OneMed, which sold masks to health authorities and national stockpiles across the Nordic and Baltic regions.

Both McKesson and OneMed continued selling Hubei Haixin products throughout 2020, even after the Chinese company was named earlier this year by the New York Times and a think tank, the Australian Strategic Policy Institute (ASPI), as using potentially forced labor by Uighurs.

Reporters also found McKesson and OneMed sold products made by Zhende Medical, a publicly traded Chinese company that has been flagged as risky by rights experts because it has supply chains and subsidiaries in Xinjiang.

In a brief response sent to reporters, McKesson Europe’s public affairs director, Ronan Brett, said: “McKesson Europe is committed to good corporate citizenship and ethical sourcing. Suppliers must agree to McKesson Sustainable Supply Chain Principles (MSSP) which covers compliance with appropriate laws along with adherence to our strict policies on protecting workers, preparing for emergencies, identifying and managing environmental risk, and protecting the environment.” He did not respond to a request for further comment.

coronavirus/Norway-Erna-Solberg.jpg  Credit: Henrik Myhr Nielsen / NRK Norwegian Prime Minister Erna Solberg welcomes a shipment of protective equipment by OneMed on March 23, 2020. The shipment included goods from Hubei Haixin. 

OneMed’s head of operations, Robert Schmidt, said the company found out in late 2019 that the Hubei Haixin factory employed workers from Xinjiang, but continued its relationship with the producer after finding no evidence they were being coerced or mistreated.

“OneMed’s overall assessment is that there is no forced labor or discrimination against the Uighur minority population in our supply chain,” he said. “But we will of course continue to follow the issue and act if we should receive any new information.”

According to documents obtained by reporters, OneMed contacted Hubei Haixin with concerns about Uighur workers in January, and the Chinese factory promised to return them to their homes in Xinjiang at the end of their contract in March. But in reality, the factory continued to employ them until this September, claiming that pandemic movement restrictions prevented the workers from going home. OneMed continued buying the products.

Neither Hubei Haixin nor Zhende Medical responded to requests for comment, but in a statement sent to one of its European distributors, and obtained by reporters, Zhende said, “It is not acceptable in Zhende to engage in or support the use of forced or compulsory labor.”

“The so-called ‘human rights abuses’ in Xinjiang or ‘persecution of ethnic minorities’ are lies of the century made up by extremist anti-China forces,” a representative of the Chinese Embassy in Oslo, Yang Yiding, wrote in a statement to reporters.

China’s Foreign Ministry did not respond to requests for comment.

  Credit: Matteo Civillini Hubei Haixin masks ordered from LloydsPharmacy Italy bear the name of McKesson Global Sourcing Ltd, a U.K. subsidiary of McKesson. 

“Violation of Virtually Any Kind of Ethical Policy”

Over a million Uighurs and other Muslim minorities are believed to have been detained in newly built detention camps in recent years. China describes the camps as re-education facilities intended to combat Islamic radicalism, following a series of deadly inter-ethnic riots in Xinjiang and attacks by Uighur militants on ethnic-majority Han throughout China.

Uighurs have been documented working both in factories within Xinjiang’s detention camps, as well as being sent to regular factories throughout China via labor transfer programs, which are billed as a way of alleviating poverty and countering religious extremism.

It is important to keep reading the full summary found here.

 

China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.

Stop Using Zoom, Second Warning

The first warning came last March.

March: As remote work surges amid the coronavirus pandemic, the FBI issued a public bulletin Monday warning Zoom and other video teleconferencing services may not be as private, or as secure, as users may assume.

Use of Zoom and similar services has exploded in recent weeks as companies, schools, governments, and individuals increasingly turn to its teleconferencing as ways to keep businesses and classrooms afloat while sheltering in pace or working from home. However the shift also represents an opportunity for attackers, as white supremacists, hackers and other trolls barge into digital meetings, a phenomenon known as “Zoombombing.”

In Massachusetts, there have been several incidents, including an unintended participant joining a high school’s virtual classroom only to yell profanities and reveal personal information about the teacher, according to the FBI. Another unwelcome participant with swastika tattoos joined a separate Massachusetts school’s Zoom meeting, the FBI reports.

“The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language,” the FBI cautioned. “As individuals continue the transition to online lessons and meetings, the FBI recommends exercising due diligence and caution in your cybersecurity efforts.”

It’s not just private businesses and children whose meetings could be Zoombombed. Privacy and security issues in conferencing software may also pose risks to national security, as world leaders convene Zoom meetings. In some cases, world leaders such as U.K. Prime Minister Boris Johnson have shared screenshots of their teleconferencing publicly only to reveal Zoom meeting IDs, raising concerns that sensitive information could be compromised. More here.

Stupidly, government officials at all levels are using Zoom including the Biden presidential team. How dangerous is that? Those officials are not reading the warnings or the news? Yeesh

 

Zoom Biden Rally

For more proof, again this month…

Justice Department/December 2020: China-Based Executive at U.S. Telecommunications Company Charged with Disrupting Video Meetings

It is not only the U.S. that is sounding the warnings. The Telegraph reports warnings that “opportunistic criminals” (a formulation that’s practically redundant), can be expected to use bogus invitations to sessions in their social engineering efforts.

Connecticut Teen Arrested for Allegedly 'Zoom Bombing ... source

A security executive with the video-tech giant Zoom worked with the Chinese government to terminate Americans’ accounts and disrupt video calls about the 1989 massacre of pro-democracy activists in Tiananmen Square, Justice Department prosecutors said Friday.

The case is a stunning blow for Zoom, one of the most popular new titans of American tech, which during the pandemic became one of the main ways people work, socialize and share ideas around the world. The California-based company is now worth more than $100 billion.

But the executive’s work with the Chinese government, as alleged by FBI agents in a criminal complaint unsealed Friday in a Brooklyn federal court, highlights the often-hidden threats of censorship on a forum promoted as a platform for free speech. It also raises questions about how Zoom is protecting users’ data from governments that seek to surveil and suppress people inside their borders and abroad.

Prosecutors said the China-based executive, Xinjiang Jin, worked as Zoom’s primary liaison with Chinese law enforcement and intelligence services, sharing user information and terminating video calls at the Chinese government’s request.

Jin monitored Zoom’s video system for discussions of political and religious topics deemed unacceptable by China’s ruling Communist Party, the complaint states, and he gave government officials the names, email addresses and other sensitive information of users, even those outside China.

Jin worked also to end at least four video meetings in May and June, including video memorial calls with U.S.-based dissidents who’d survived the crackdown by Chinese military forces that killed thousands of students and protesters. The Chinese government works to censor any acknowledgment of the massacre, including on social media outside China.

A Zoom spokesperson said in a statement Friday that the company has cooperated with the case and launched its own internal investigation. Jin, the company said, shared “a limited amount of individual user data with Chinese authorities,” as well as data on no more than 10 users based outside China. Jin was fired for violating company policies, the statement said, and other employees have been placed on administrative leave until the investigation is complete.

In an updated statement on Zoom’s website, the company said it “fell short” by terminating the meetings instead of only blocking access to participants in China, to abide by Chinese law. The company said it has reinstated the victims’ accounts and will no longer allow requests from the Chinese government to affect users outside mainland China.

“As the DOJ makes clear, every American company, including Zoom and our industry peers, faces challenges when doing business in China,” the company said in its statement. “We will continue to act aggressively to anticipate and combat ever-evolving data security challenges.”

Jin could not be reached for comment. Though Jin lives in China and is not in U.S. custody, officials said he could be transferred to the United States to face prosecution if he travels to a country that has an extradition treaty with the U.S.

A spokesperson for the Chinese embassy in Washington did not respond to requests for comment.

Human-rights activists this summer said their Zoom accounts had been abruptly terminated shortly before or after they’d hosted video calls commemorating the 31st anniversary of the Tiananmen Square protests, a bloody crackdown captured in the iconic photo of a man standing in front of a Chinese tank.

Zoom said in a statement then that the company “must comply with laws in the countries where we operate.” While the company said it regretted “that a few recent meetings with participants both inside and outside of China were negatively impacted,” the statement said it was not in the company’s power “to change the laws of governments opposed to free speech.”

Zhou Fengsuo, a student leader during the Tiananmen Square protests who had his paid Zoom account terminated this summer, told The Washington Post on Friday that he had worked with the FBI on the case and saw the charges as “tremendous news.”

“It’s so eye-opening to me how this U.S. company, having this connection, would report directly to” the Chinese Communist Party and “disrupt our meetings regularly on behalf of the CCP,” he said. “This executive was working for the government and police as an agent of persecution, and Zoom was paying this guy for doing that job.”

Prosecutors charged Jin, also known as Julien Jin, with conspiracy to commit interstate harassment and to transfer a means of identification. Jin, 39, had worked at the company since 2016, most recently as a “Security Technical Leader,” the complaint said.

Quoting from electronic messages between Jin and other Zoom employees, FBI agents outlined a months-long, high-pressure campaign by China’s “Internet Police” to view users’ video calls and suppress unwanted speech. In one April message, Jin said he had been summoned to a meeting with Chinese government officials who demanded that Zoom develop the capability to terminate any “illegal meeting” within one minute. In others, Jin sent meeting passwords and other sensitive internal data directly to Chinese law enforcement.

In the complaint, FBI agents said that Zoom employees in the U.S. had agreed to a Chinese government “rectification” plan that entailed migrating data on roughly 1 million users from the U.S. to China, thereby subjecting it to Chinese law. Zoom also agreed, the complaint states, to provide “special access” to Chinese law enforcement and national-security authorities. In one message cited in the complaint, Jin wrote that the authorities had wanted him to share detailed lists of the company’s “daily monitoring” of “Hong Kong demonstrations, illegal religions” and other subjects.

To terminate the Tiananmen Square calls, the complaint alleges, Jin’s co-conspirators fabricated evidence that they were intended to discuss child abuse, racism, terrorism and violence. Jin’s co-conspirators also entered some calls with fake accounts that used pornographic or terrorist-related profile images, and Jin pointed to those images as evidence to terminate the meetings and suspend the hosts’ accounts.

John Demers, the assistant attorney general for national security, said the firm had, like many others that do business in China, put itself in a difficult position by operating in an authoritarian country whose laws and practices often “run antithetical to our values.”

“The company was focused on complying with Chinese law and the expectations of Chinese law enforcement,” Demers said. “But what happened over time is those expectations increased. So it goes from, ‘Well, respond to our lawful requests,’ to ‘You must take action within a minute to shut down any action on your platforms’ – not just in China, but outside – that hits upon topics of sensitivity to the Chinese government.”

That pressure, he noted, spans many industries: He cited the controversy last year involving the National Basketball Association, in which the general manager of the Houston Rockets tweeted in support of Hong Kong protesters, leading to a backlash in China.

“The case is an illustration of the choices that companies are forced to make when they do business in China . . . [and] how the Chinese government will take advantage of the leverage they have over you to push their agenda,” he said. “You’ve got a consistent pattern of the Chinese government using economic leverage – the opportunity to access markets, foreign investments – in order to further political goals.”

John Scott-Railton, a researcher at the Citizen Lab in Toronto, said the filing showed how authoritarian governments have increasingly looked at major tech companies as top-priority intelligence targets ripe for infiltration and recruitment.

He pointed to another case last year against two former Twitter employees charged with spying on behalf of Saudi Arabia, including by sending the personal information of thousands of people, including Saudi critics and prominent dissidents.

The charges were announced on the same day that the Trump administration added four Chinese companies to the Commerce Department entity list for enabling human rights abuses within China by providing DNA-testing materials or high-technology surveillance equipment to the Chinese government. They were among 59 Chinese companies Commerce add to its export control entity list, including companies that have been accused of stealing trade secrets and using U.S. exports to support the Chinese military.

Zoom has faced questions before about how it guards against the potential misuse of video data by the Chinese government, which censors major news and social media websites beneath what’s known as a “Great Firewall.”

This spring, Scott-Railton and another researcher found the company had routed American users’ data through Chinese servers, potentially opening it to Chinese-government data requests. The company later said it had “mistakenly” sent American video calls to Chinese data centers amid a flood of calls.

Zoom employs more than 2,500 people around the world, including, as of last year, more than 500 in China who develop the software installed in computers around the world.

The company’s billionaire chief executive, Eric Yuan, was born in China but moved to Silicon Valley in the late ’90s, where he worked for the video start-up WebEx before founding Zoom in 2011.

The Federal Trade Commission last month reached a settlement with Zoom, in which the company resolved allegations that it had misled users about their data privacy and encryption measures by agreeing to new security rules.

Questions over business dealings in China have become more commonplace as a new wave of Chinese tech start-ups has gained international popularity and acclaim. TikTok, the wildly popular short-video app owned by the Beijing-based tech company ByteDance, drew suspicions of censorship from users last year because searches on the site related to topics suppressed by the Chinese government, such as the Tiananmen Square massacre or the Hong Kong pro-democracy protests, showed few or no videos.

Internal guidelines for the site also mimicked Chinese-government censorship policies, and former employees for the company told The Post last year that key content-moderation decisions for international users were made in China. TikTok has said it has worked in recent months to distance its U.S. operations from the company’s Chinese headquarters.

Wang Dan, a Chinese dissident whose Zoom call on Tiananmen Square was also disrupted this spring, said the case showed how China could threaten free expression for people in the West.

“Interfering with the freedom of speech of those who have settled and lived in the United States in exile is . . . a serious attack to American sovereignty,” he told The Post on Friday. “The American people should also pay more attention to the [Chinese Communist Party’s] threat of American democracy.”

 

Pelosi Refusing to Advance China Task Force Legislation Items

Primer: China's Xi Jinping warned Trump could sow 'chaos' after 2016 election -  Business Insider

On September 25, 2015, during CCP General Secretary Xi’s state visit to the United States, President Obama and Xi gave remarks to the press in the White House Rose Garden. The two leaders announced that they had agreed “neither the U.S. or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage.” Xi also pledged that “China does not intend to pursue militarization” of the South China Sea. Neither of these promises to the American people were made in good faith. Today, “China is using cyber-enabled theft as part of a global campaign to ‘rob, replicate, and replace’ non-Chinese companies in the global marketplace,” according to Assistant Attorney General John Demers. Meanwhile, the PRC’s military outposts in the South China Sea have been proven “capable of supporting military operations and include advanced weapon systems,” according to the Pentagon.

October 01, 2020 Congressional Record

COUNTERING THREAT OF CHINESE COMMUNIST PARTY The SPEAKER pro tempore. The Chair recognizes the gentleman from Pennsylvania (Mr. Joyce) for 5 minutes. Mr. JOYCE of Pennsylvania. Mr. Speaker, after months of hard work and collaboration, the China Task Force has released our final report, which includes more than 400 solutions to counter the growing threat of the Chinese Communist Party.

This report is the framework for combating the aggressive Chinese Communist regime. After meeting with more than 130 experts, we developed realistic and achievable solutions that take a comprehensive approach to strengthening America’s national security and holding the Chinese Government accountable. We realized that out of our 400 recommendations, 180 are legislative solutions, of which 64 percent are bipartisan and one-third have already passed either the House or the Senate.

Mr. Speaker, these are commonsense solutions that we can vote on today to strengthen our strategic position for tomorrow. As the only physician serving on the China Task Force, it was my privilege to delve into opportunities to strengthen our supply chains and ensure that Americans are never again beholden to the Chinese Government for key medicines or healthcare supplies.

On the Health and Technology Subcommittee, I led efforts to strengthen [[Page H5110]] the supply chains for medicines, semiconductors, and other vital materials. Congress has passed several provisions aimed at advancing research and the manufacturing of critical medical supplies here in the United States. We also created new reporting requirements to help us better understand international supply chains and counter vulnerabilities in the system.

To bolster our technology supply chain, I cosponsored H.R. 7178, the CHIPS Act, to increase domestic production of advanced semiconductors, which will help Americans to develop next-generation telecom technology, fully automated systems, and, importantly, new weapons systems. I also introduced the ORE Act, H.R. 7812, to incentivize the domestic production of rare earth materials, which is key to breaking the Chinese monopoly on critical supply chains. America cannot allow China to win the race to next-generation technology. We want innovative breakthroughs to happen here in this country, and the China Task Force is making progress through the legislative process. As a leader on the competitiveness committee, I focused on issues ranging from combating Chinese Communist-sponsored theft of intellectual property to exposing the influence of the Chinese in U.S. research institutions and countering the importation of illicit fentanyl.

Too often, American companies are being coerced to surrender intellectual property to the Chinese Government in order to gain entry into the Chinese marketplace. In extreme cases, we hear of outright theft by Chinese hackers and agents. The China Task Force has produced recommendations that direct the Federal Government to ramp up investigations of individuals acting as pawns of the Chinese Communist Party and enforce antitheft laws.

Our Nation has also seen wholesale efforts of the Chinese Government to steal research and gain influence at United States universities. In my own backyard, the FBI arrested a former Penn State researcher suspected of espionage. The task force has compiled provisions to increase transparency and accountability in the higher education system, and I introduced legislation to close loopholes and force the disclosure of all foreign money in our research systems. Finally, we must stop illicit fentanyl from reaching our communities and killing our neighbors.

The China Task Force has produced recommendations to stop the importation of these devastating analogues from China. In the House, I cosponsored legislation to hold foreign nations, including China, accountable if they fail to cooperate with U.S. narcotics control efforts and prosecute the production of fentanyl in their countries. I thank Senator Toomey for championing this provision in the Senate.

By implementing these solutions, we can make America safer, stronger, and better equipped to lead in the 21st century. The China Task Force final report is a framework. It is our playbook to make a difference. While our work on this report has finished, our commitment to this cause must and will continue. Phase two starts today.

The 141 page report is found here.