3 Chinese Nationals Charged with Hacking, Stealing Intellectual Property

Indictment found here.

Wonder if President Trump has called President Xi….The U.S. Treasury should at least sanction Guangzhou Bo Yu Information Technology Company Limited….

Pittsburgh:

The Justice Department on Monday unsealed an indictment against three Chinese nationals in connection with cyberhacks and the alleged theft of intellectual property of three companies, according to US officials briefed on the investigation.

But the Trump administration is stopping short of publicly confronting the Chinese government about its role in the breach. The hacks occurred during both the Obama and Trump administrations.
The charges being brought in Pittsburgh allege that the hackers stole intellectual property from several companies, including Trimble, a maker of navigation systems; Siemens, a German technology company with major operations in the US; and Moody’s Analytics.
US investigators have concluded that the three charged by the US attorney in Pittsburgh were working for a Chinese intelligence contractor, the sources briefed on the investigation say. But missing from court documents filed in the case is any explicit mention that the thefts were state-sponsored.
A 2015 deal between then-President Barack Obama and Chinese President Xi Jinping prohibits the US and China from stealing intellectual property for the purpose of giving advantage to domestic companies.
In recent months some US intelligence agencies have concluded that China is breaking the agreement, sources briefed on the matter say. But there’s debate among intelligence officials about whether there’s sufficient evidence to publicly reveal the Chinese government’s role in the infractions, these people say.
Obama administration officials had touted the Obama-Xi agreement, as well as 2014 Justice Department charges against members of the Chinese People’s Liberation Army for commercial espionage, for reducing some of the Chinese cyberactivity against companies in the US.
But the 2015 Obama-Xi deal was met with skepticism inside the US agencies whose job it is to guard against Chinese cyberactivity targeting US companies. Some now say there was only a brief drop in the number of cyberspying incidents, if at all.
In the waning months of the Obama administration, intelligence officials briefed senior White House officials on information showing that the Chinese cyberattacks were back to levels previously seen, sources familiar with the matter told CNN. Early in the Trump administration, US intelligence officials briefed senior officials, including the President and vice president, as well as advisers Jared Kushner and Steve Bannon. More here.
***

Acting U.S. Attorney for Western Pennsylvania Soo C. Song charged Wu Yingzhuo, Dong Hao and Xia Lei with conspiracy to commit computer fraud and abuse, conspiracy to steal trade secrets, wire fraud and identity theft.

The most serious charge, wire fraud, carries a sentence of up 20 years in federal prison. Each conspiracy charge has a possible sentence of up to 10 years and the identity theft carries a sentence of up to two years.

The indictment alleged that Wu, Dong and Xia worked with Guangzhou Bo Yu Information Technology Company Limited, a Chinese cybersecurity firm in Guangzhou, but used their skills to launch attacks on corporations in the U.S.

Between 2011 and May 2017, the trio stole files containing documents and data pertaining to a new technology under development by Trimble, along with employee usernames and passwords and 407 gigabytes of proprietary data concerning Siemens’ energy, technology and transportation efforts, according to the indictment. The trio gained access to the internal email server at Moody’s Analytics and forwarded all emails sent to an “influential economist” working for the firm, the indictment stated. Those emails contained proprietary and confidential economic analyses, findings and opinions. The economist was not named in the indictment.

A Siemens spokesperson said that the company “rigorously” monitors and protects its infrastructure and continually detects and hunts for breaches. The company did not comment on the alleged breach by the Chinese hackers and declined to comment on internal security measures.

Michael Adler, a spokesman for Moody’s Analytics, said that to the company’s knowledge no confidential consumer data or other personal employee information was exposed in the alleged hack.

“We take information security very seriously and continuously review and enhance our cybersecurity defenses to safeguard the integrity of our data and systems,” Adler wrote in an email to the Tribune-Review.

Trimble, in a statement sent to the Trib, wrote that no client data was breached. The company concluded that the attack had no meaningful impact on its business.

Song, however, said the loss to the companies targeted was considerable.

“The fruit of these cyber intrusions and exfiltration of data represent a staggering amount of dollars and hours lost to the companies,” Song said.

Wu, Dong and Xia used “spearphish” emails to gain access to computers, spread malware to infect networks and covered their tracks by exploiting other computers known as “hop points.”

Hop points allow users to hide their identities and locations by routing themselves through third-party computer networks.

“But there were missteps that led our investigators right to them,” said FBI Special Agent in Charge Bob Johnson of the Pittsburgh office.

Johnson would not elaborate on the missteps the accused hackers took, claiming doing so could jeopardize future investigations.

The U.S. Attorney’s Office led the investigation and was assisted by the FBI’s Pittsburgh Division, the Navy Criminal Investigative Service Cyber Operations Field Office and the Air Force Office of Special Investigations.

Secret Planes, Russia, China and the United States oh My

 

Surveillance: China’s Big Brother, America’s Also?

photo

Video footage sent back to China, for what? Comprehensive espionage… Are U.S. manufacturers no longer making camera equipment or offering surveillance technology? What that any part of the trade deals President Trump signed with President Xi? Anyone?

Surveillance Cameras Made by China Are Hanging All Over the U.S.

Company 42%-owned by the Chinese government sold devices that monitor U.S. Army base, Memphis streets, sparking concerns about cybersecurity

The Memphis police use the surveillance cameras to scan the streets for crime. The U.S. Army uses them to monitor a base in Missouri. Consumer models hang in homes and businesses across the country. At one point, the cameras kept watch on the U.S. embassy in Kabul.

All the devices were manufactured by a single company, Hangzhou Hikvision Digital Technology. It is 42%-owned by the Chinese government. More here.

***

Its state-of-the-art surveillance cameras monitor the movements of millions of Britons going about their daily lives in airports, government buildings, sports stadiums, high streets and stations.

Hikvision, a company controlled by the Chinese government, was recently revealed to be Britain’s biggest supplier of CCTV equipment, raising fears its internet-linked cameras could be hacked from Beijing at the touch of a button.

Last week, undercover Mail on Sunday reporters posed as businessmen to infiltrate its headquarters in the ‘surveillance city’ of Hangzhou in eastern China, to investigate its activities.

What they found will raise fresh cause for concern about a company whose growing influence in the UK has already been questioned by former MI6 officers and Security Ministers. Far from being the independently run business it claims to be in its customer-friendly marketing, Hikvision is controlled by China’s ruling Communist Party. These capacities enable the Chinese authorities to track dissidents, activists and human-rights campaigners, who are routinely rounded up and detained.

As it rapidly expands its global presence, Hikvision has been generously bankrolled by Chinese state banks, which critics say give it an unfair commercial edge.

It received £2.4 billion from China Development Bank in December and a further £2.3 billion loan from the Export-Import Bank of China in August, both of which are controlled by the Chinese government. More here.

***

According to yearly independent research data from IHS Market, Hikvision accounted for 19.5% of market share in global video surveillance industry in 2015, up from 4.6% in 2010, and has been ranked the No.1 market share leader globally for video surveillance equipment for five consecutive years. In 2015, Hikvision was ranked first in EMEA market with 12.2% market share, and was ranked second in Americas market with 7.3% market share.

Hikvision provides video surveillance products and vertical market solutions in the global market, through more than 2,400 partners in 155 countries and regions. In mainland China, Hikvision now partners with more than 40,000 distributors, system integrators and installers. The Company’s products and solutions have been widely deployed in a number of vertical markets and in notable facilities around the world including the Beijing Olympic Stadium, Shanghai Expo, Philadelphia Safe Communities in the U.S., South Korea Seoul Safe City, Brazil World Cup Stadium, the Italy Linate Airport, and many others.

Hikvision is dedicated to providing global resources and locally-based technical, engineering, sales and service supports to its valued customers around the world. In Hikvision’s oversea sales team, about 90% of the employees are local residents; for example, Hikvision European has about 210 employees, among which, over 190 are locals.

***

Imagine a world where almost everyone can be tracked, and everything can be seen by cameras linked directly to the Chinese government.

The rapid growth of a little known Chinese manufacturer of high-powered surveillance technology has some people concerned that it’s no longer a theory.

American flag waves beside CCTV cameras on top of the U.S. embassy in Berlin, Germany, Oct. 25, 2013.

American flag waves beside CCTV cameras on top of the U.S. embassy in Berlin, Germany, Oct. 25, 2013.

Hangzhou Hikvision Digital Technology, a company controlled by the Chinese government, is now the world’s largest supplier of video surveillance equipment, with internet-enabled cameras installed in more than 100 countries.

Capable of capturing sharp images even in fog, rain or darkness, Hikvision claims its most advanced technologies can recognize license plates and tell if a driver is texting while behind the wheel. They can also track individuals with unrivaled “face-tracking” technology and by identifiers such as body metrics, hair color and clothing.

In the United States alone, the company’s surveillance systems can be found everywhere from prisons to airports to private homes and public schools, and even in places with sensitive national security concerns, such as Fort Leonard Wood military base in Missouri. Abroad, its cameras were installed in the U.S. embassy in Kabul, Afghanistan.

According to a U.S. government procurement document published on IPVM.com, the world’s largest online video surveillance trade magazine, U.S. embassy officials decided in August 2016 to allow only Hikvision suppliers to bid on the installation contract.

Stephen Bryen, a widely published expert on international affairs and cyber security, wrote an article outlining his concerns about the purchase, saying the Hikvision cameras were never proven to be any more secure than comparable models.

“If the procurement officer actually thought these cameras were more secure than others, that would have been claimed as part of the sole-source justification,” he said of the embassy purchase agreement, adding that no claims of any kind were made regarding the Hikvision products.

“The issue is that the U.S. embassy is installing commercial cameras in one if its most sensitive locations,” Bryen wrote. “This is a big mistake, and mistakes like this can cost lives.”

On Monday, a State Department official confirmed the installation via email.

“A Hikvision camera system was initially installed to monitor non-sensitive electrical closets for theft prevention,” the official said of U.S. Embassy Kabul. “The procurement in question was to either expand this or to install a new system. The procurement was cancelled September 2016 and the previously installed cameras were removed.”

It is not known whether other Hikvision products have ever been installed in other U.S. embassies.

Spreading the word

Edward Long, a former employee of a video surveillance equipment company in Florida, recently petitioned the U.S. government with a letter warning that Hikvision cameras are sending information back to China.

“Over the past year, [Hikvision has] … flooded the United States with their equipment,” he wrote. “Every time one of their machines is plugged into the internet, it sends all your data to three servers in China. With that information, the Chinese government can log in to any camera system, anytime they want.”

Frank Fisherman, a general manager for Long’s former employer, IC Realtime Security Solutions, tells VOA that Hikvision devices are engineered for effortless hacking.

“They have their encrypted information set up so they can access even if you change the admin [passwords] and the firewall,” he said, adding that Hikvision may have set aside a “back door” in the production process, such that the manufacturer can monitor devices remotely without the users being aware.

IPVM President John Honovich, however, strikes a less alarmist tone.

“So far, we haven’t found any evidence showing these cameras are sending information back to China, and there is no evidence of such back doors,” he told VOA, cautioning, however, that these facts alone do not rule out a possible security threat.

“The issue that still remains is that maybe [back doors] haven’t been found yet,” he said. “All devices have firmware, [which is] updated all the time, just like you update your computer [or] your PC. At any point during the firmware upgrade, back doors can be added by the manufacturers.”

Among well-known video surveillance equipment manufacturers, Honovich added, Hikvision products may not be worth the risk.

“There are hundreds of security camera manufacturers in the world,” he said. “One can [find a reliable system] without the risk of buying products made by a company largely owned and controlled by the Chinese government.”

A Beijing incubator company

Established in 2001, Hikvision, which originated as a Chinese government research institute, maintains strong ties with that government. More than 42 percent of the company is owned by China’s state-owned enterprises, with the remaining stock owned by a combination of general public stockholders and venture capital investors, including 18 percent from private equity in Hong Kong.

In 2015, when Chinese President Xi Jinping went on an inspection tour of the southern city of Hangzhou, capital of Zhejiang Province, he visited Hikvision’s main office instead of the famous Alibaba headquarters. Xi also met with Pu Shiliang, 38, Hikvision’s head of research and development.

According to the official website of Zhejiang Police Academy, Pu is also the director of a technology laboratory within China’s Ministry of Public Security, the main domestic security agency that has long been criticized for tracking and detaining dissidents and perceived Communist Party opponents of any stripe.

Beginning in 2015, China’s state Development Bank and Export-Import Bank provided Hikvision with 20 billion yuan (nearly $3 billion) in low-interest loans and a 20 billion yuan line of credit. Loans of this size are typically unavailable to Chinese or foreign companies.

Invisible to consumers

Despite the enormous security implications, the United States appears to have made no national security assessment of Hikvision products. As indicated by Long’s online petition, which ultimately closed with only 15 supporters, Hikvision’s links to Beijing are virtually invisible to American consumers.

In April, a New York Times report addressed similar concerns about Chinese drone maker DJI — the world’s largest manufacturer of small drones. The report says the company issued a user agreement that warns customers: “if you conduct your flight in certain countries, your flight data might be monitored and provided to the government authorities according to local regulatory laws.”

In Britain, where many Hikvision cameras have been installed, some government officials have begun voicing concerns.

“If you’ve got cameras that are IP enabled, or potentially could covertly be so enabled … they could potentially be used for malign purposes,” Nigel Inkster, a former British intelligence official, told The Times.

Canadian-based Genetec, one of the world’s leading video surveillance software companies, recently announced that it would no longer offer free technical support for products from either Hikvision or Huawei — a Shenzen-based multinational networking and telecommunications equipment and services company — citing ongoing “security considerations.”

Issuing the announcement, Genetec cited government and corporate clients who called Hikvision and Huawei products “too risky.”

Voice of America received no response to multiple attempts to contact Hikvision’s headquarters in Hangzhou and its branch in California.

Jeffrey He, president of Hikvision’s U.S. and Canadian branch, defended the company during an undated interview with U.S. security monitoring website SourceSecurity.com.

“There have been some misguided accusations targeting Hikvision’s public and industry image, sometimes seeking to create controversy where none exists,” he said. “These questions are geared in general not just to Hikvision, but also to many Chinese manufacturers, and none of these accusations have been proven to be true. These accusations are baseless.

“The Cold War was officially over when the Berlin Wall came down, but I am seeing that, in the minds of some, it never ended,” he added. “We all would be better served if, instead of living in the past, we would look toward the future and the realities of world changes and technology changing along with it.”

 

 

UN/Harvard Comprehensive WMD Programs in N Korea/ISIS

Primer:

A North Korean mining firm, reputed to be a front for Pyongyang’s weapons development programs, attempted to ship materiel to Syrian officials tied to the country’s chemical weapons program, according to a confidential United Nations assessment of international sanctions against the North.

Details of the U.N. findings, first reported by Reuters, found officials from Korea Mining Development Trading Corporation {KOMID) had sent a pair of shipments of unknown contents to members of Syria’s Scientific Studies and Research Centre or SSRC. The Syrian government organization has been responsible for developing chemical and biological weapons for regime in Damascus since the 1970’s.

The shipments never arrived in Syria after being intercepted by international authorities from U.N. partner nations, Reuters reports. “Two member states interdicted shipments destined for Syria. Another member state informed the panel that it had reasons to believe that the goods were part of a KOMID contract with Syria,” the U.N. review states.

KOMID has repeatedly trafficked in materials associated with ballistic missile development and other conventional arms programs, and was blacklisted by the U.N. security council as a result of those activities, Reuters reports.

As a result, the U.N. “is investigating reported prohibited chemical, ballistic missile and conventional arms cooperation between Syria and [North Korea],” the report states. More here.

***    photo

Quoting the South Korean Defense Ministry, it said: ‘North Korea has 13 types of biological weapons agents which it can weaponize within ten days, and anthrax and smallpox are the likely agents it would deploy.’

***

Harvard produced a report with the summary in part that reads:

Amidst the growing threat of North Korea’s nuclear program, the assas-
sination of Kim Jong-Un’s half-brother via VX nerve agent in February
2017 brought renewed interest in North Korea’s other weapons of
mass destruction (WMD) programs—chemical and biological weap-
ons. If used on a large scale, these weapons can cause not only tens of
thousands of deaths, but also create panic and paralyze societies. Nev-
ertheless, the vividness of the nuclear threat has overshadowed other
weapons programs, limiting the attention and policy input that they
deserve. This paper focuses on North Korea’s biological weapons (BW).
Accurately assessing the threat from North Korea’s biological weapons
is challenging. Whereas North Korea has publicly declared its will to
become a nuclear power many times, it has been less overt about its
intention or capability for biological weapons. BW capabilities are
inherently hard to detect and measure. While nuclear programs can
be monitored by the number of nuclear tests and the success of missile
tests, weaponizing and cultivating pathogens can stay invisible behind
closed doors. Moreover, equipment used for BW production are often
dual-use for agriculture, making external monitoring and verification
virtually impossible. Limited information on North Korea’s BW pro-
gram leads to a low threat perception that may undermine preparation
and response efforts. The full 46 page report is here.

A German newspaper reported last week that at least one European intelligence agency has already warned that the Islamic State is exploring the use of chemicals for attacks in Europe. Such an eventuality would be a radical departure from prior attacks by the Islamic State in the West. In the past, the militant group has shown a strong preference for low-tech means of dispensing violence, such as firearms, vehicles and knives. But it has utilized chemical substances in Iraq and Syria, and its technical experts have amassed significant knowledge about weaponized chemicals.

Last week, several European and American counter-terrorism experts participated in a bioterrorism preparedness exercise in Berlin. Codenamed WUNDERBAUM, the exercise was one of several anti-terrorism drills that have taken place in the German capital this year alone. But last week’s drill was the first with an exclusive focus on preparing for a bioterrorist attack. German authorities insisted that the drill was not sparked by concrete intelligence of a pending biological or chemical attack. But the Berlin-based national newspaper Die Welt claimed on Friday that it had information about at least one such warning by a European intelligence agency. The paper did not name the agency, but said that “a foreign intelligence agency” had warned European security authorities of a possible terrorist attack by the Islamic State using chemical weapons. According to Die Welt, the warning was “explicit” and cautioned that the Sunni militant group may be preparing to use improvised bombs utilizing chemicals, including toxic gasses. The warning was communicated to European intelligence agencies, including Germany’s said Die Welt.

How likely is such a scenario? Terrorist groups tend to be conservative in their use of lethal technologies. They typically opt for time-tested methods using explosives or firearms, because these have a higher of success in comparison to more sophisticated, hi-tech weapons. The latter are also more expensive to build and require scientific and technical capabilities that are not typically available to terrorist organizations. Militants are usually strapped for cash, and are not science-savvy, so exceptions to this general trend are rare. But the Islamic State is different. Ever since it made its eventful appearance in 2013, the group has experimented with a variety of chemicals, including nerve agents. It is known that it initiated a modest chemical weapons program, headed by Iraqi engineers who were trained under Iraq’s late ruler, Saddam Hussein. One of them, Abu Malik, was killed in an American airstrike in early 2015. Another, Sleiman Daoud al-Afari, who headed the Islamic State’s chemical weapons program, was captured by US Special Forces in northern Iraq in March of last year.

The Islamic State’s rapid loss of territory in the past year has delivered serious blows to the group’s military infrastructure. Its chemical weapons program, which was targeted early on by the US, Iran and other belligerents, is now almost certainly defunct. But many of its engineers and technical experts are still at large, as are those who were trained by them during the group’s heyday in Iraq and Syria. Despite its continuing retreat, the Islamic State is still capable of employing chemicals that are relatively easy to procure, such as chlorine, hydrogen sulfide, or even various fertilizers, to construct explosives or nerve agents. Last summer, members of a terrorist cell with connections to the Islamic State were arrested in Sydney, Australia. By the time they were arrested, they had already procured significant quantities of hydrogen sulfide and had even tested the chemical, in an apparent preparation for a large-scale attack.

The Australian case shows that the Islamic State is not averse to the tactical use of chemical weapons in terrorist attacks. As the militant group’s self-proclaimed caliphate is disintegrating, and its leaders feel like they have nothing left to lose, the deployment of unconventional terrorist technologies should not be excluded as a tactical option for the organization. Western counter-terrorism officials should actively and immediately prepare for such an eventuality.

***

Anyone From the U.S. Mentioning this to China’s President Xi?

Remarkable site and well on top of this issue, for the summary go here.

Primer:

Out of a list of 57 companies accused by U.N. investigators of aiding North Korea, 43 of them haven’t been sanctioned by Treasury.

One of them is Glocom, a firm also known as Pan Systems Pyongyang Branch, a North Korean company based in Malaysia that investigators say uses a series of front companies and agents to procure components and sell communications systems in violation of U.N. sanctions. Pan Systems and another associated firm, Wonbang Trading Co., are operated by North Korea’s intelligence service, the Reconnaissance General Bureau, the U.N. says. Wonbang has also been one of the largest shippers of North Korea coal and Glocom has been investigated for arms shipments. Glocom, which maintains a website, didn’t respond to repeated requests for comment on the allegations.

Another network cited by the U.N. is a transport firm named Vast Win Trading, whose ship, the Jie Shun, was seized in Egypt last year with 30,000 rocket-propelled grenades. The owner of that ship, Chinese national Sun Sidong, has business ties to a network owned by Chinese national Chi Yupeng through a shared email address in China’s business registry, according to the nonprofit group, C4ADS, that monitors global threats. U.S. Attorneys and Treasury have already targeted the Chi Yupeng network with sanctions and seized funds. Mr. Sun’s network of companies has remained so far untouched. In August, Mr. Sun sold his $1.3 million home in Great Neck, N.Y., for cash, according to his real-estate agent. Mr. Sun couldn’t be reached through his U.S.- and U.K.-based companies or through an individual identified as his lawyer in New York property records.

One of his companies, Dandong Dongyuan Industrial Co. Ltd., is the largest exporter of what’s called “dual use” equipment that can include navigation systems and guidance devices that can be used for ballistic missiles, according to C4ADS. Mr. Sun is also the CEO of Dongyuan Enterprise, a Flushing, N.Y., firm.

U.N. investigators named several banks in North Korea that were established, managed or owned by Chinese firms. First Eastern Bank in Rason, North Korea, owned by Unaforte Hong Kong, was set up to provide loans to Chinese individuals and companies, for example. More here.

DoJ: On Aug. 3, 2016, a U.S. Magistrate Judge Joseph A. Dickson of the District of New Jersey signed a criminal complaint charging Ma Xiaohong (Ma) and her company, Dandong Hongxiang Industrial Development Co. Ltd. (DHID), and three of DHID’s top executives, general manager Zhou Jianshu (Zhou), deputy general manager Hong Jinhua (Hong) and financial manager Luo Chuanxu (Luo), with conspiracy to violate the International Emergency Economic Powers Act (IEEPA) and to defraud the United States; violating IEEPA; and conspiracy to launder monetary instruments.

Today, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) also imposed sanctions on DHID, Ma, Zhou, Hong and Luo for their ties to the government of North Korea’s weapons of mass destruction proliferation efforts.

In addition, the department filed a civil forfeiture action for all funds contained in 25 Chinese bank accounts that allegedly belong to DHID and its front companies. The department has also requested tha the federal court in the District of New Jersey issue a restraining order for all of the funds named in the civil forfeiture action, based upon the allegation that the funds represent property involved in money laundering, which makes them forfeitable to the United States. There are no allegations of wrongdoing by the U.S. correspondent banks or foreign banks that maintain these accounts.

“The charges and forfeiture action announced today allege that defendants in China established and used shell companies around the world, surreptitiously moved money through the United States and violated the sanctions imposed on North Korea in response to, among other things, its nuclear weapons program,” said Assistant Attorney General Caldwell. “The actions reflect our efforts to protect the integrity of the U.S. banking system and hold accountable those who seek to evade U.S. sanctions laws.”

***

For context:

Hong Kong (CNN)Easey Commercial Building is an unassuming mid-rise office tower on Hennessy Road, an artery that runs through Hong Kong’s busy Wan Chai district. The structure sits among scenery that’s classic Hong Kong: bright lights, tall buildings, people rushing about.

But camouflaged in the normalcy is a business that seemingly exists in name only.
Take the elevator to the Easey building’s 21st floor, and in room 2103 is the registered office of Unaforte Limited Hong Kong. It’s a company accused by the United Nations of violating sanctions on the Democratic People’s Republic of Korea (North Korea’s official name) for helping the country make money internationally, funding everything from its nuclear weapons program to the lavish lifestyles of North Korean Supreme Leader Kim Jong Un and Pyongyang’s most important players.
At least, Unaforte is supposed to be there. That is the address listed on its publicly available corporate filings provided to the Hong Kong government. When CNN visited the office, it found neither Unaforte nor its listed company secretary, Prolive Consultants Limited.
Instead, room 2103 was home to a seemingly unrelated company: Cheerful Best Company Services. Only one man was there when CNN stopped by, and he said a representative for Prolive Consultants only comes by every so often to pick up mail. He had not heard of Unaforte.
The United Nations Panel of Experts on North Korea — the body charged with monitoring sanctions enforcement on the hermit nation — said in two recent reports that Unaforte opened and owned a bank in the North Korean city of Rason. That is likely a violation of the latest UN Security Council resolution banning joint international ventures with North Korea, according to Christopher Wall, a lawyer who specializes in international trade law and a partner at Pillsbury Winthrop Shaw Pittman in Washington, DC.
North Korea is believed to use these types of practices to cover up much of its trade, from selling coal and fuel to exporting weapons.
“The (North Korean) regime accesses the international financial system through front companies and other deceptive financial practices in order to buy goods and services abroad,” Sigal Mandelker, the undersecretary for terrorism and financial intelligence at the US Department of the Treasury, said in Senate testimony on September 28.
Hong Kong is one of two business jurisdictions (along with the British Virgin Islands) where the UN Panel of Experts on North Korea has seen the largest share of North Korean-controlled front companies operating, said Hugh Griffiths, the panel’s coordinator.
When Unaforte’s company particulars show up in Hong Kong’s publicly available corporate records, the name of just one individual appears. He holds a passport from the small Caribbean island of Dominica. A passport number is there, but not a phone number.
Those details shed light on Hong Kong’s incorporation requirements. To start a company in Hong Kong, one needs at least one director (has to be an actual person) and a company secretary (which can either be a person or another company, but must be based in Hong Kong), according to the Companies Registry website.
Companies that are sanctioned in most cases cannot easily conduct transactions in the dollar, as US banks have to back those deals and would filter and flag sanctioned entities, Anthony Ruggiero, an expert in the use of targeted financial measures at the Foundation for the Defense of Democracies, told CNN.
The DHID charges revealed that to get around US prying eyes, North Korea uses a complex ledger and credit scheme to hide North Korea’s involvement in dollar transactions, Ruggiero explained to Congress in September.
Thirteen of DHID’s front companies were located in Hong Kong. Eleven shared the same registered address in Wan Chai, less than a kilometer away from the Easey Commercial Building, the indictment said. Read more here from CNN.