Now they Want a Trump Crimes Commission

Yup, both Congressman Eric Swalwell and Joy Reid of MSNBC are calling for a post Trump presidency Crimes Commission. Be careful what you ask for considering the work being done by AG Barr, John Durham and John Bash, not to mention the work of Senators Graham and Johnson. Timing is everything is Washington DC….lots to still be revealed. This comes on the heels of the Senate Intelligence (bi-partisan) report on Russia and the Trump campaign. Betcha, as Joy Reid refers to it, she hardly read it at all.

You gotta wonder if Reid or Swalwell have even considered ALL the crimes of the Obama administration or just a few of the Biden family clan….those from say Iraq or Ukraine or China.

How about this –>

The “U.S.-China Strong” group was founded to continue two Obama-era initiatives known as “100,000 Strong” and “1,000,000 Strong,” both of which sought to increase the number of Americans studying in China and introduce China-focused curricula into American schools.

The programs were promoted by the Obama-Biden administration despite valid concerns over Chinese Communist Party (CCP) sanctioned espionage, intellectual property theft, and propaganda.

Repeatedly praised by then-Vice President Biden, the initiative is no longer able to tap into U.S. tax dollars and now collaborates with a host of CCP-linked – and in some cases wholly-owned – entities including the Bank of China and Confucius Institutes. More here.

Joe Biden to Authoritarian Chinese President: U.S. Only ... source

But read on…

The Blaze reports: MSNBC host Joy Reid floated the idea of a potential future Biden administration establishing a “Trump Crimes Commission” to investigate President Donald Trump’s actions while in office — and perhaps even during his campaign, Mediaite reported.

Such a move would be unprecedented in American politics, as it is a longstanding norm that successors do not use their authority to investigate former political opponents.

Reid, an outspoken Trump critic, made the suggestion Tuesday night while discussing the final release of the bipartisan Senate report on Russian interference in the 2016 election with former Obama deputy national security adviser Ben Rhodes.

“It strikes me in just reading through this that Paul Manafort did to the United States what he had previously done to Ukraine,” Reid said. “He had messed with their elections in the past in order to put a [Russian President Vladimir] Putin puppet in charge. And now you have a president who is ruminating apparently on meeting with Vladimir Putin in New York, has talked about putting him back in the G7, and seems to be doing everything — you know, if there was a Christmas list that Vladimir Putin would have put together, it couldn’t have gotten any better than what Donald Trump is doing.

Reid is not the first to float such an idea. Journalist Andrew Feinberg and MSNBC legal analyst Glenn Kirschner have also called for a crimes commission to be empaneled, along with Democratic Rep. Eric Swalwell of California.

**

Rhodes, in response to Reid’s prompting, essentially agreed with the proposition but with a few caveats about how it would look and how it should be executed.

“There is no question in my mind, Joy, that there has to be an accountability process if Joe Biden wins, to protect the integrity of our democracy,” he said. “It’s not about getting revenge. It’s not about going after political opponents. That’s what Donald Trump does. It’s about sending a message that if you collude with, facilitate, coordinate with a foreign adversary and hacking private materials and releasing them that there are going to be consequences.”

He added: “We cannot just say we’re going to turn the page. We have to deal with this as a country. And so I really think it’s essential that we have some accountability process if Joe Biden wins the election.”

Chinese Regime Rushes to Destroy Files Overseas

In part: The Chinese Communist Party (CCP) has directed certain overseas Party cells to destroy sensitive documents and safeguard Party secrets, in response to heightened scrutiny in the West of the regime’s covert activities abroad, an internal document obtained by The Epoch Times reveals.

A notice issued in August by China’s state-owned oil giant China National Petroleum Corporation (CNPC) instructed that the company’s overseas offices in more than ten countries, including Australia and Canada, must “urgently destroy or transfer sensitive documents” relating to “overseas Party-building activities.”

China National Petroleum Corporation - Barco source

Party-building activities overseas, according to New York-based China commentator Qin Peng, refers to the CCP’s efforts to expand its global influence. Under this program, Chinese consulates can instruct Chinese multinational companies to carry out tasks beyond their business operations, such as collecting intelligence, stealing sensitive information, and influencing local officials, he said.

The notice said that important documents that can’t be easily destroyed may be given to the Chinese embassy in Cambodia for safekeeping.

It also directs the company’s Party members not to divulge sensitive information to local law enforcement.

“When subject to foreign investigations, Party members and cadres must abide by [the principle of] ‘strictly guarding Party secrets,’” the document said. “This is an iron rule and discipline.”

The directive was a response to recent actions by the United States and other Western governments, the document said, citing an incident in Australia where authorities searched and seized mobile phones and computers of Chinese diplomatic personnel because they contained material relating to the CCP. It did not provide further detail about this incident.

The United States has in recent months escalated efforts in combating Chinese espionage and malign influence activities. The Trump administration in July ordered the closure of the Chinese consulate in Houston, saying the diplomatic outpost was a “hub of spying and intellectual property theft.” Federal agents also made a string of arrests of suspected undercover Chinese military officers studying in the country, who prosecutors say are part of a broader network spanning 50 U.S. cities.

The regime’s covert foreign influence operations have also come under the spotlight in many democracies, particularly in Australia, where the government has stepped up actions targeting Chinese influence in politics and university campuses.

Nicholas Eftimiades, a former senior U.S. intelligence official and author of the book “Chinese Intelligence Operations,” told The Epoch Times that the incident in Australia may have referred to an unreported seizure by border officials at the country’s ports of entry, or the recent raid of a Chinese-Australian’s home as part of an investigation into Chinese foreign interference.

Going Underground

The notice said the United States, the U.K., Australia, Canada, and New Zealand were “highly sensitive countries,” and directed staff in those countries to delete all Party-building materials from electronic devices and destroy physical files. Where documents can’t be destroyed, they should be “sealed and stored” in a secure location or handed over to the Chinese embassy in Cambodia, the document instructed.

In Australia and Canada, CNPC staff are to report to their local Chinese consulate the status of how they have dealt with “sensitive urgent information,” the notice said.

The document also demands that all the company’s overseas party organizations, particularly those located in Malaysia, Singapore, and Saudi Arabia, should “proactively accept the leadership role of the Party committee at Cambodia’s Chinese embassy.”

The instructions also emphasized limiting public exposure of overseas Party activities. It prohibited events from being promoted on Chinese social media such as Weibo and WeChat, and issuing public reports of such activities. Communications about Party members or organizations, and reports on Party-building activities should be sent via encrypted channels. Party members were also banned from raising the Chinese national flag, wearing the Party badge, and displaying the content of Party activities on notice boards.

Chinese diplomats return from Houston consulate shut by US ...

In addition, when holding Party-building activities, staff are not to disclose the identities of Party members and their Party positions, the notice said.

‘Damage Control’

Eftimiades said that it’s very likely this directive was issued to other state-owned enterprises. The notice, he said, revealed an “extraordinary global operation to protect information, to restrict activities so that they don’t come up on the radar of foreign governments.”

James Carafano, vice president of the Heritage Foundation’s institute for national security and foreign policy, said this move would not be surprising given that the regime is likely anticipating much more scrutiny from Western countries.

“If there’s one thing they’re really good at, it’s covering up their tracks,” Carafano told The Epoch Times.

The notice also reveals the close cooperation between the regime and state-owned companies, Eftimiades said.

“A huge dimension of this is the role of the consulates in directing and coordinating the activities of state-owned enterprises abroad,” he said.

The Chinese regime also publicly reveals how Chinese consulates preside over overseas Chinese companies.

A document on “risk prevention guidelines” for overseas Chinese companies, found on the website of China’s Ministry of Foreign Affairs, points out that companies must register with their local consulates and accept their “guidance and management.”

In the event of sudden “safety-related incidents,” Chinese companies must do their public relations under the guidance of corresponding consulates and related Chinese agencies, to “positively guide the public opinion.”

In March 2019, Qi Yu, secretary of the Party committee at China’s Ministry of Foreign Affairs, held a meeting, during which the committee said Chinese consulates should “enhance their political understanding…in order to better serve” the Party.

While the document suggests the CCP has become more cautious, countries shouldn’t let up their guard, Qin warns, adding that as these activities go underground, the Chinese regime is likely to engage in more covert actions, and it’s a long-term threat that countries shouldn’t dismiss.

N. Korea has 60 Nuclear Bombs, 5000 tons of Chemical Weapons

An Army report has the following information in part regarding North Korea:

A new assessment made by the United States Department of the Army estimates that the North Korean regime is in possession of massive amounts of conventional and non-conventional weapons that they are “highly likely” to use in specific circumstances, according to the Yonhap News Agency.

The assessment was published in a report entitled “North Korean Tactics,” and attributes North Korea’s huge armaments program to a desire to “prevent other countries from contemplating regime change.” Apparently, Kim Jong-un, the North Korean dictator, took note of what happened to his Libyan counterpart Muammar Gaddafi and “does not want something similar to happen” to him. (Gaddafi was killed by rebel Libyan forces, after a multi-national force including NATO countries attacked Libya with the stated goal of imposing an arms embargo, sanctions, and an assets freeze against regime leaders.)

According to the report, North Korea already has between 20 and 60 nuclear bombs and “the capacity to produce six new devices each year.” It also boasts the world’s third-largest stockpile of chemical weapons – between 2,500 and 5,000 tons of various substances – and is engaged in research into biological warfare as well. “Only one kilogram of anthrax could kill up to 50,000 people in Seoul,” the capital of South Korea, the report’s authors note.

Another ongoing source of concern is North Korea’s Cyber Warfare Guidance Unit, which employs over 6,000 computer hackers who “can successfully conduct invasive computer warfare activities from the safety of its own territory.” North Korean operatives are known to already be operating in several foreign countries including Belarus, China, India, Malaysia, and Russia.

Negotiations between the United States and North Korea broke down entirely following an unproductive summit between Kim Jong-un and US President Donald Trump in February, 2019.

Further details in the report to Congress includes:

North Korea’s military “uses tactics based on former Soviet or current Russian doctrine, Chinese developments, lessons learned, and observation of recent military actions,” according to a new US Army manual on the subject.

“While North Korea maintains large amounts of military equipment, much of it is outdated making it quantitatively superior to most armies but qualitatively inferior,” the new manual said. See North Korean Tactics, Army Techniques Publication (ATP) 7-100.2, 24 July 2020.

But North Korea has proved resourceful in other areas, including offensive cyber warfare.

“The primary organization responsible for computer warfare in North Korea is Bureau 121, which fielded at least 1,000 elite hackers in 2010 who focused on other countries’ computer systems. This number is likely much higher now” and includes “cyberspace teams [deployed] in foreign countries.”

And not least of all, “The country’s possession of a nuclear arsenal and its pursuit of missile technology are attempts to ensure that external powers do not interfere with its internal affairs for fear of a nuclear reprisal,” the Army manual said.

 

“North Korea is constantly adapting and evolving its capabilities,” the Army said.

***

Formed in the late 1990s, Bureau 121 is unit 121 of the General Bureau of Reconnaissance in North Korea’s military. (now made up of 6000 hackers)

Part of the unit is sometimes known as the DarkSeoul Gang, according to a report by Reuters.

Despite being one of the poorest countries in the world, North Korea puts a lot of its cash into Bureau 121.

North Korea is still technically at war with South Korea and cyber-warfare is arguably its best weapon. Coming from a defector in 2015, more details were provided to the BBC.

There is an official training school for the younger hacking applicants.

North Korea's Bureau 21 cyber-warriors trained up for ... source

Students sent to the Military school after graduating from Geumseong Middle School in the capital. A report into the cyber threat written by US Major Steve Sin in 2009 revealed Unit 121 had a base in Chilbosan Hotel, in Shenyang, China, from where could launch its attacks.The 164-room three star hotel – which is jointly owned by the North Koreans and Chinese. More details here. 

Looming Military Conflict in S China Sea?

Chinese military journalists are publicly urging the People’s Liberation Army (PLA) to prepare immediately for an attack by U.S. forces in the South China Sea. One expert at Zhejiang University’s National Institute for South China Sea Studies, Shi Xiaoqin, claims that the U.S. is deliberately trying to provoke China. They also suggest the regime reinforce Chinese installations on reefs claimed by China.

If this analysis gains traction by Chinese political and military leaders, U.S. military commanders in the South China Sea should plan for the possibility that China might initiate hostilities in keeping with its doctrine of preemptive retaliation, a seeming attempt falsely to claim “self-defense.”

One writer suggests that the PLA should immediately move fighter aircraft to Chinese air bases in the Spratly Islands at Fiery Cross, Subi Reef, and Mischief Reef. He also boldly claims that the augmented presence of U.S. naval and air assets in the South China Sea is no longer just a show of force by America.

Chen Hu, a Chinese military journalist, also asserts that the U.S. is now intent on provoking a conflict and is preparing for battle. Chen claims that the return of B1 bombers to Guam and continued deployment of two U.S. aircraft carrier groups in the South China Sea, despite the conclusion of military exercises, is supposedly a sign of Washington’s aggressive intent. Chen suggests that recent U.S. “Freedom of Navigation” maneuvers and the high number of U.S. surveillance collection missions along the Chinese coast is additional proof of American attack planning. Former PLA officer Wang Yunfei and naval equipment expert suggests that flights by American RC-135, E-8c, and RC-12X surveillance aircraft equate to “pre-battle strategic technical surveillance.” As the joke goes from the children’s playground: “It all started when he hit me back.”

Wang further warns that U.S. President Donald J. Trump is likely to initiate a military conflict in the South China Sea region before the November 3 U.S. presidential election, speculating that “stirring up external frictions, especially military conflicts with China, will help the incumbent president for his re-election campaign.”

The leaders of China’s Communist Party (CCP) also see that nothing was done by anyone, including the U.S., to stop China’s grab of Hong Kong this year — 27 years early. This paralysis of the West must have looked to the CCP like a green light to keep on grabbing.

Wang even lays out his analysis on particular avenues of approach by which U.S. bombers might attack their Chinese targets. Wang, now a Chinese naval specialist, writes that the U.S. will probably ship-launch Tomahawk Cruise against Chinese bases in the South China Sea. He further specifies that the PLA should deploy China’s own aircraft carriers in the south central region of the sea, as the best strategy to counter any U.S. assault. He adds that China must also deploy fighter jets and air defense missiles on various Chinese reefs.

Scarborough Shoal could become a flashpoint for a South ...

Wang singled out the Scarborough Shoal in the South China Sea’s Paracel Island Chain as the most likely initial piece of real estate that the U.S. might seek to seize. The Scarborough (Huangyan) Shoal/Reef is claimed by both China and the Republic of the Philippines. Perhaps one reason why China might expect that Scarborough Shoal is a likely target is that the U.S. wants to re-cement military agreements with the Philippines that would allow American military assets access to Clark Air Force Base, Subic Bay Naval Base and other newer facilities. U.S. support for Manila’s claim to the Scarborough Shoal against China’s might be sufficient to convince the mercurial president of the Philippines, Rodrigo Duterte, to patch up relations with the U.S.

Chinese writer Zheng Hao, who assesses that it is possible that U.S.-Chinese tensions in the South China Sea could escalate into a “hot war,” cites U.S. Secretary of State Mike Pompeo’s July 13 statement that the South China Sea is “not China’s maritime empire” as indicative of the Trump Administration’s hostile intent. Zheng appears to be especially concerned about the July 7 U.S.-Japan naval exercise, which included an operation by the U.S. aircraft carrier Ronald Reagan and two warships of the Japanese Maritime Defense Forces. Zheng laments that the 2018 draft of the Code of Conduct in the South China Sea has not yet been signed by the Association of South East Asian Nations (ASEAN) and China.

One hope to avoid or at least postpone an imminent clash in the South China Sea is for China and the U.S. to activate the crisis prevention apparatus established in November 2014. This diplomatic device includes a Memorandum of Understanding on notification of military activities and rules of behavior designed to keep air and naval encounters peaceful. So far, there is no public acknowledgement that either China or the U.S. is employing the crisis prevention mechanism. One recent sign of efforts by both sides to avoid a military incident was the Pentagon’s August 7 announcement that U.S. Secretary of Defense Mark Esper and his Chinese counterpart, Minister of Defense Wei Fenghe, held a 90-minute teleconference last week.

China, however, has been the party with the hostile intent, not only with Hong Kong, but also with an attack on northern India, an extensive military base build-up in the South China Sea, an attempted appropriation of the Japan-administered Senkaku Islands and a “fishing fleet” of 250 vessels showing up near the Galapagos Islands, off Ecuador. Another recent move from Beijing was to conduct live-fire targeting drills in the South China Sea from July 25 through August 2. The announcement of this exercise was promulgated by the PLA and not, as is usual, by the Chinese government’s maritime administration. If China continues its aggressive posture toward the U.S.-allied free states of Asia, especially Taiwan, a direct confrontation between the Chinese and U.S. militaries in the South China may indeed be necessary.

Author: Dr. Lawrence A. Franklin was the Iran Desk Officer for Secretary of Defense Rumsfeld. He also served on active duty with the U.S. Army and as a Colonel in the Air Force Reserve.

Warnings of Ransomware Affecting Elections

According to an intelligence report issued by the Department of Homeland Security, one of the top 2020 election security concerns is ransomware. A report entitled “Cybercriminals and Criminal Hackers Capable of Disrupting Election Infrastructure”, echos concerns CISA head Chris Krebs articulate at the Black Hat security conference in early August.

Department of Homeland Security fears 'ransomware' attacks ... source

The FBI and Department of Homeland Security have issued advisories to local governments, including recommendations for preventing attacks.
“From the standpoint of confidence in the system, I think it is much easier to disrupt a network and prevent it from operating than it is to change votes,” Adam Hickey, a Justice Department deputy assistant attorney general, said in an interview.

US officials state that election interference will not be tolerated. They are proactively working with social media companies, among other groups, to help safeguard the elections.

In addition, the US Department of State’s “Rewards for Justice” program is offering a 10M to anyone who can provide information about foreign interference. The Department of State has reached out to targeted individuals in Iran soliciting information.

US officials are interested in identifying individuals who aim to disrupt campaigns, meddle with election infrastructure, and who pose threats to election officials. This is the third major “Rewards for Justice” initiative this year. More here.

***

“We’re seeing state and local entities targeted with ransomware on a near daily basis,” said Geoff Hale, a top election security official with Homeland Security’s Cybersecurity and Infrastructure Security Agency.

Steps taken to improve security of voter registration systems after the 2016 election could help governments fend off election-related ransomware attacks. They’ve also acted to ensure they can recover quickly in the event of an attack.

Colorado, for example, stores redundant versions of its voter registration data at two separate secure locations so officials can easily shift operations. Backups are regular so the system can be quickly rebuilt if needed.

Even so, ransomware is an added concern for local election officials already confronting staffing and budget constraints while preparing for a shift from in-person voting to absentee balloting because of the pandemic.

In West Virginia, state officials are more concerned about the cyberthreat confronting its 55 county election offices than a direct attack on the statewide voter registration system. One click from a county employee falling victim to a spearphishing attack could grant a hacker access to the county network and eventually to election systems.

“I’m more worried that those people who are working extra hours and working more days, the temporary staff that may be brought in to help process the paperwork, that all this may create a certain malaise or fatigue when they are using tools like email,” said David Tackett, chief information officer for the secretary of state.

In states that rely heavily on in-person voting and use electronic systems to check in voters, a well-timed attack particularly during early voting could prevent officials from immediately verifying a voter’s eligibility, making paper backups critical.

For states conducting elections entirely by mail, including Colorado, an attack near Election Day may have little effect on voting because ballots are sent early to all voters, with few votes cast in-person. But it could disrupt vote-tallying, forcing officials to process ballots by hand.

In many states, local officials will face an influx of new ballot requests. That means they’ll need constant access to voter data as they handle these requests. An attack could cause major disruptions.

Hickey said he was unaware of ransomware attacks directly targeting election infrastructure. But local election offices are often connected to larger county networks and not properly insulated or protected.

A criminal targeting a county or state “may not even know what parts of the network they got into,” Hickey said. But as the malware creeps along and spreads, “what gets bricked is the entire network — and that includes but is not limited to election infrastructure.”

Even if election infrastructure isn’t directly targeted, there would likely be immediate assumptions it was, said Ron Bushar of the FireEye cybersecurity company.

A February advisory issued by the FBI and obtained by The Associated Press recommends local governments separate election-related systems from county and state systems to ensure they aren’t affected in an unrelated attack.