Does China have a Covert System to Kill Americans with 4-FIBF?

In 1893, Methamphetamine or crystal meth was first developed from ephedrine. A chemist by the name of Nagayoshi Nagai was responsible for this creation. It wasn’t until 1919, that methamphetamine was turned into its crystallized form by Akira Ogata. Ogata was able to do this by reduction of ephedrine using iodine and red phosphorous. Amphetamine, which is a related drug, first came into existence in 1887 by a Lazar Edeleanu in Germany. Methamphetamine manufacturing initially began in the United States in Hawaii in the 1960s.

***

Adolf Hitler used cocaine and creative concoctions made by his personal doctor. He also relied on a stunning array of drugs while ruling Nazi Germany, including one made popular by the show Breaking Bad: crystal meth.

According to a 47-page U.S. military dossier, a physician filled the Fuhrer with barbiturate tranquilizers, morphine, bulls’ semen, a pill that contained crystal meth, and other drugs, depending on Hitler’s momentary needs, the Daily Mail reports. By this account, Hitler downed crystal meth before a 1943 meeting with Mussolini in which the Fuhrer ranted for two hours, and took nine shots of methamphetamine while living out his last days in his bunker.

***

The next drug of choice used by militants is Captagon which is manufactured and trafficked from Lebanon. Captagon, a meth-like variant of the banned pharmaceutical Fenethylline, and is manufactured in large quantities primarily in Lebanon and neighboring Syria, where it is sold to ISIS via middle men.

Cali Estes, founder of The Addictions Coach, said the drug is referred to as the “Super Soldier Pill”because it can last up to 48 hours and causes users to be full of energy, impervious to pain, and “in a sense removes any barriers they would have to fighting and getting killed.”

Most of the blame for war in Iraq, Syria, Yemen can be blamed on Iran. The proxy terror group Hezbollah operated worldwide and is funded by outright selling Captagon.

***

Image result for fluoro iso butyrfentanyl

The newest deadly narcotic on the market is being studied by the DEA and it is an epidemic, the basis of which appears to be China.

***  DailyHerald

WASHINGTON (AP) — No one knew what was in the baggie. It was just a few tablespoons of crystalline powder seized back in April, clumped like snow that had partially melted and frozen again.

Emily Dye, a 27-year-old forensic chemist at the Drug Enforcement Administration’s Special Testing and Research Laboratory, did not know if anyone had died from taking this powder, or how much it would take to kill you.

What she did know was this: New drugs were appearing in the lab every other week, things never before seen in this unmarked gray building in Sterling, Virginia. Increasingly, these new compounds were synthetic opioids designed to mimic fentanyl, a prescription painkiller up to 50 times stronger than heroin.

This, Dye realized, could be one of them.

The proliferation of rapidly evolving synthetic opioids has become so fierce that the DEA says they now constitute an entire new class of drugs, which are fueling the deadliest addiction crisis the United States has ever seen.

The fentanyl-like drugs are pouring in primarily from China, U.S. officials say — an assertion Beijing maintains has not been substantiated. Laws cannot keep pace with the speed of scientific innovation. As soon as one substance is banned, chemists synthesize slightly different, and technically legal, molecules and sell that substance online, delivery to U.S. doorsteps guaranteed.

More Americans now die of drug overdoses than in car crashes. Almost two-thirds of them, more than 33,000 in 2015 alone, took some form of opioid — either heroin, prescription painkillers or, increasingly, synthetic compounds like U-47700 and furanyl fentanyl, manufactured by nimble chemists to stay one step ahead of the law.

It is now forensic chemists like Dye who are on the front line of the nation’s war on drugs, teasing out molecular structures of mystery drugs so they can be named, tracked and regulated.

Dye held the baggie of powder in her gloved hand.

“Man,” she said. “I’ve got to figure out what this is.”

___

A NEW CLASS OF DEADLY DRUGS

Dye had an idea where to start. The sample came in tagged as suspected fentanyl. Dye picked up a vial with 2 milligrams of fentanyl from her long, clean lab bench. The container looked empty. Up close, squinting, she could see a spray of white dust clinging to its sides. The contents of that vial will kill 99 percent of the people who take it.

Dye first handled fentanyl three years ago. If she breathed it or touched it, she could die. It was nerve-wracking then — and still is.

The vial was made of glass. Dye had drop-tested it and knew that if it rolled off and hit the hard floor, it would not shatter. She rapped the vial against the benchtop, trying to make the powder inside more visible. Bang, bang, bang. It was still invisible.

“There’s nothing more terrifying than dealing with a lethal dose of material,” she said. Her hands were steady. Dye won modeling competitions for poise while she was at Graham High School in Bluefield, Virginia, a town of some 5,000 people on the eastern edge of Appalachian coal country.

Dye’s mother is a nurse who also deals with hazardous material. Mother and daughter both know that risk is not something to worry about, it’s something to manage. Dye has recommitted to every safety protocol she was ever taught. One, safety glasses. Two, lab coat, buttoned. Three, powder-free disposable nitrile gloves. Four, face mask. She placed an emergency naloxone injection kit — an antidote for opioid overdose — near her workspace. Just in case. And, on samples like this, she never works alone.

The Special Testing Laboratory is one of eight forensic chemistry labs the DEA runs. Focused on research, it has a worn functionality that gives it an academic feel. Down echoing hallways are labs packed with fume hoods and high-tech machines sprouting tubes and wires. Beakers dry by the sinks. “Safety First” signs have been taped to the doors. Mostly, it is silent.

Forty chemists work here. Their job is to identify substances seized by law enforcement in the field before they kill or kill again. One of the compounds they identified is carfentanil, which is so potent it was used as a chemical weapon before it hit the North American drug supply over the summer.

“Right now we’re seeing the emergence of a new class — that’s fentanyl-type opioids,” Dye’s boss, Jill Head, explained. “Based on the structure, there can be many, many more substitutions on that molecule that we have not yet seen.”

Entrepreneurial chemists have been creating designer alternatives to cannabis, amphetamine, cocaine and Ecstasy for years. But this new class of synthetics is far more lethal.

Back in 2012 and 2013, when reports of fentanyl derivatives started coming in to the U.N. Office on Drugs and Crime in Vienna, chemists chucked them in the “other” category. Today those “other” substances are one of the fastest-growing groups of illicit chemicals tracked by the agency.

“New opioids keep emerging,” said Martin Raithelhuber, an expert in illicit synthetic drugs at the U.N. They deserve their own category, he added, but that will take time.

Once, forensic chemists like Dye confronted a familiar universe of methamphetamine, cocaine and heroin. Drug dealers, users and DEA agents generally knew what substance they were handling.

Today, things are different. This is a golden age of chemical discovery — and subterfuge. Dealers may not know that the high-purity heroin from Mexico they’re selling has been laced with fentanyl. Users may not realize the robin’s-egg-blue oxycodone tablets they’re taking are spiked with acetylfentanyl.

If field agents bust a clandestine drug lab and see a cloud of white powder in the air, they no longer assume it’s cocaine. They run.

“Had I come on board at a time when everything was cocaine and heroin and meth and marijuana, it’s not an exciting day,” Dye said. “Now I come to work and see something that’s never been seen.”

“And it can kill somebody,” she added.

___

SEEDS OF A NEW INDUSTRY

The sprint to market unregulated chemicals is driven by demand in the U.S., where users gobble up 80 percent of the world’s opioids, according to the DEA.

Dye was just 6 years old when Purdue unveiled OxyContin as a breakthrough drug, a powerful yet supposedly nonaddictive opioid that would revolutionize pain management.

Instead, aggressive marketing and unscrupulous doctors helped push a generation of people into addiction.

Dye saw them all around her in Bluefield. Her dad’s pharmacy was her window on the crisis.

“People used to break into his store and steal Oxys,” Dye said. “He became friends with a lot of cops.” She did, too.

In high school, Dye fell in love with chemistry. Drawn to linearity and logic, she found beauty in the way equations yielded answers.

The year Dye graduated, 2007, Purdue Pharma and its executives paid more than $630 million in legal penalties for willfully misrepresenting the drug’s addiction risks.

By then it was too late.

The seeds of a new industry had already taken root. Today, it is almost as easy to order synthetic opioids on the open internet as it is to buy a pair of shoes, The Associated Press found in an investigation published in October . Payments can be made by Western Union, MoneyGram or Bitcoin, and products are shipped by DHL, UPS or EMS — the express mail service of China’s state-run postal service. As the lines between licit and illicit commerce blurred, it became possible for just about anyone with internet access to score an ever-changing array of lethal chemicals.

By the time Dye was in college studying forensic chemistry, U.S. regulators were cracking down on prescription drug abuse. Users turned from pills to heroin, which was cheap and relatively easy to get. Between 2010 and 2014 heroin overdoses in the U.S. tripled, according to the Centers for Disease Control and Prevention. Three-quarters of today’s heroin users first used prescription opioids, a JAMA Psychiatry study showed.

Drug dealers soon learned that if they cut potent synthetic opioids, like fentanyls, into drugs like heroin, they could make vastly more money. Overdose deaths from synthetic opioids — a category dominated by illicit fentanyl — more than tripled from 2013 to 2015, hitting 9,580 last year, CDC data show.

___

A DISCOVERY

On June 28, two months after the singer Prince died of a fentanyl overdose, Dye walked down a long, white hallway, past a heavy metal grate and into a dim room known as “the vault.” She was surrounded by packages of evidence, seized from the field and waiting for analysis. She checked out an envelope wrapped in plastic wrap and yellow tape that had come in on April 13, and placed it in a steel lockbox with her name on it.

Back in the lab, Dye unwrapped the package and found a silver pouch the size of a small handbag. Inside that was a palm-size baggie.

She scooped up a dot of powder from the baggie with a thin metal spatula and gingerly placed it in a small glass crimp vial. As she worked, she treated the material as if it were radioactive, twisting the spatula around with her fingers to avoid contamination. Using a glass pipette, she transferred a few drops of methanol into the vial and clamped it shut.

Dye dropped the sample into a mass spectrometer. The machine sucked the evidence through a copper-colored wire and bombarded it with electrons. That broke it up into many different small pieces. “Kind of like when you drop a puzzle,” she said.

The resulting pattern of peaks is akin to a chemical fingerprint. Dye compared the result with the lab’s library of approximately 1,500 known drugs.

None matched. This was new.

Dye had made a discovery.

China has banned many synthetic drugs, but new chemicals continue to sprout like weeds. In October and November, the AP identified 12 Chinese vendors hawking furanyl fentanyl and U-47700 — drugs that are not banned in China — as substitutes for blacklisted drugs. All offered their products via the Korean business-to-business platform EC21.com.

“Most customers choose the U-47700 now,” a man from XiWang Chemical Co. who called himself Adam Schexnayder emailed. “Although U-47700 is weaker than fentanyl. But it is a good opioid product. You can try it. How about it?”

Contacted by the AP, Schexnayder responded with a graphic Chinese obscenity, but said nothing more. The site has since vanished.

EC21 blocked searches for furanyl fentanyl and U-47700 after the AP called to ask about the chemicals, though “heroinn” still yielded results on Wednesday. The site has banned more than 768 search terms and is working with a developer to block changing patterns of forbidden terms more effectively, said Kim Min-Jeong, a service team manager. “We spend a significant amount of operating costs and labor on auditing.”

___

‘ASK TO DIE’

The closest match to Dye’s evidence in the lab’s database was a compound called butyryl fentanyl. But it wasn’t the same. In her sample, distinctive small peaks kept popping up after taller ones.

She and her colleagues ran the evidence through a nuclear magnetic resonance spectrometer, which pulses samples with a magnetic field to help map the position of different atoms. Then they guessed. They bought a sample of the compound they thought they had from a legitimate research chemical company and used it to test their theory.

On July 26, Dye ran the reference standard they’d purchased through the mass spectrometer. The result matched their evidence exactly. Now they knew what they had on their hands.

“It’s 4-fluoroisobutyrylfentanyl,” Dye said.

Case closed.

What had Dye discovered?

4-fluoroisobutyrylfentanyl — 4-FIBF for short —has exactly the same weight and chemical composition as one of the compounds China banned in October 2015. The only difference is the arrangement of three carbon atoms.

Long before Dye made her discovery, Chinese vendors were offering 4-FIBF for sale.

Shanghai Xianchong Chemical Co., a trading company that operates from a small, spare office on a leafy street in central Shanghai, was one of them. Shanghai Xianchong started fielding requests for 4-FIBF around April, according to the manager, a clean-cut man in a white polo shirt named Jammi Gao.

Gao said in an email that he could sell 4-FIBF for $6,000 a kilogram, though he later denied ever brokering a deal.

He refused to ship opioids, like the ultrapotent carfentanil, that are banned from general use in the U.S. But 4-FIBF is so new to the street it is not a controlled substance in either the U.S. or China.

Drug users yearn for better chemistry, for highs with incredible analgesic power that go on and on. 4-FIBF showed promise. It was strong and cheap and though it produced little euphoria, it lasted a long time, users reported in online forums. Several said it could be used like methadone, to control opioid withdrawal symptoms. One user-turned-dealer called 4-FIBF “a miracle molecule.”

But 4-FIBF was so strong that getting the dose right was a problem. “Eyeball this, ask to die. ’nuff said,” one user noted in March.

None of the users replied to AP’s requests for comment.

Back in the lab, Dye peeled off her gloves and tossed them into a hazardous waste container. She didn’t know users were already warning each other not to go overboard chasing a heroin high that never kicked in with 4-FIBF. She didn’t know about the rough dosing schedules addicts had worked out. And she didn’t know that 4-FIBF gave some people satisfying, sleep-through-the-night results when they stuck it up their rectum.

Dye would go home, safe, to her dog. Maybe tomorrow she would find the next new thing in an evidence bag on her bench. User forums were already buzzing with talk of things like cyclopentyl fentanyl and acryl fentanyl.

But elsewhere, all across America, people would not make it through the night. By the time Dye finished work the next day, another 90 Americans would be dead of opioid overdoses.

Denying Russian Encroachment is Dereliction of Security

Hillary Clinton is no novice to security measures when it comes to global adversarial incursions. Her team of political operatives are not neophytes either.

By virtue of Hillary’s emails, inspector general’s reports and non-approved (unknown servers) and violations of data protection, Hillary’s team are guilty of malfeasance of duty and management. For proof, read the FBI search warrant of the Abedin/Weiner computers and hard-drive.

FBI Search warrant Huma

Have you considered why certain buildings in government have harden structures including sound proof windows, SCIFs, entry and exit procedures, security clearances and action protocol when transmitting information in hardcopy and electronically? This is due to thousands of foreign tasking of espionage of history that include Russia, China and North Korea to mention a few. Not all hacking is equal, there are viruses, malware, electronic theft and propaganda.

Schiller

A distinction should also be made between hacking and SIGINT, signals intelligence. SIGINT is the interception of data used by foreign powers which can and does include scooping and snooping. There are electronic signals, radars and weapons systems that are all part of the target base applied by foreign adversaries and allies. No part of the United States government or civilian enterprise is exempt or omitted by outside powers including outright spying and theft of industrial espionage, patent information and intelligence.

Beyond this, there is the whole model of propaganda, real and fake news. Under Barack Obama, the United States has been in a reactionary mode rather than installing and actively pursuing defensive and countermeasures when it comes to biased, misleading, filtered or altered influence causing ill legitimate attitudes, movements, synthesis and policy decisions. The master of this game is Russia.

The U.S. government spent more than a decade preparing responses to malicious hacking by a foreign power but had no clear strategy when Russia launched a disinformation campaign over the internet during the U.S. election campaign, current and former White House cyber security advisers said.

Far more effort has gone into plotting offensive hacking and preparing defenses against the less probable but more dramatic damage from electronic assaults on the power grid, financial system or direct manipulation of voting machines.

Over the last several years, U.S. intelligence agencies tracked Russia’s use of coordinated hacking and disinformation in Ukraine and elsewhere, the advisers and intelligence experts said, but there was little sustained, high-level government conversation about the risk of the propaganda coming to the United States.

A former White House official cautioned that any U.S. government attempt to counter the flow of foreign state-backed disinformation through deterrence would face major political, legal and moral obstacles.  

“You would have to have massive surveillance and curtailed freedom and that is a cost we have not been willing to accept,” said the former official, who spoke on condition of anonymity. “They (Russia) can control distribution of information in ways we don’t.”

Clinton Watts, a security consultant, former FBI agent and a fellow at the nonprofit Foreign Policy Research Institute, said the U.S. government no longer has an organization, such as the U.S. Information Agency, that provided counter-narratives during the Cold War.

He said that most major Russian disinformation campaigns in the United States and Europe have started at Russian-government funded media outlets, such as RT television or Sputnik News, before being amplified on Twitter by others.

A defense spending pill passed this month calls for the State Department to establish a “Global Engagement Center” to take on some of that work, but similar efforts to counter less sophisticated Islamic State narratives have fallen short.

The U.S. government formally accused Russia of a campaign of cyber attacks against U.S. political organizations in October, a month before the Nov. 8 election.

U.S. ‘STUCK’

James Lewis, a cyber security expert at the Center for Strategic & International Studies who has worked for the departments of State and Commerce and the U.S. military, said Washington needed to move beyond antiquated notions of projecting influence if it hoped to catch up with Russia.

“They have RT and all we know how to do is send a carrier battle group,” Lewis said. “We’re going to be stuck until we find a way deal with that.” More here including Alex Jones from Reuters.

Then there is Iran who has and continues to use propaganda to build internal reputation and power, the same as Putin of Russia himself.

When Iran detained our Navy personnel, consider the traction that was gained both positive and negative.

NR: The sight of members of the American military, disarmed and under Iranian control, is of enormous propaganda value in Iran’s ongoing war against the United States. To its allies in the Middle East, the photo demonstrates Iran’s strength – how many jihadist countries have had this many American servicemembers under their power? – and it demonstrates American weakness. Then there’s this: “This time, the Americans were cooperative in proving their innocence, and they quickly accepted their faults without resistance,” the analyst, Hamidreza Taraghi, said in a phone interview. “The Marines apologized for having strayed into Iranian waters.” Never fear, John Kerry made friends with the Iranians, and that made all the difference: Also playing a role was the strong relationship that has developed between Mr. Kerry and the Iranian foreign minister, Mohammad Javad Zarif, during negotiations on the nuclear deal, Mr. Taraghi said. “John Kerry and Zarif were on the phone during the past hours, and this helped the problem to be resolved quickly due to their direct contact,” he said. Nations that take illegal propaganda photos, crow about their seizure of American boats, confiscate part of their equipment, and then point to our allegedly admitted faults aren’t “easing tensions,” they’re flexing their muscles. I’m glad our sailors and boats are back in American hands — minus, apparently, their GPS equipment — but once again Iran has thumbed its nose at the U.S., demonstrating that it does what it wants — whether it’s testing missiles, launching rockets near U.S. warships, or taking, questioning, and photographing American sailors who (allegedly) stray into Iranian waters.

Not only does government need to harden security, but civilians must as well. That includes people, information, news, systems, software and brick and mortar structures. Separating fact from fiction, providing exact and true definitions and not conflating conditions is the charter and mission in the future.

 

A Message to Trump? China Seizes U.S. Underwater Drone

A Navy file photo shows T-AGS 60 Class Oceanographic Survey Ship, USNS Bowditch. The Navy says the ship’s mission includes oceanographic sampling and data collection and the handling, monitoring and servicing of remotely operated vehicles (ROVs), among other things. U.S. Navy 

China Seizes U.S. Underwater Drone From International Waters, Pentagon Says

NPR: A unmanned underwater vehicle deployed by a U.S. Navy ship in international waters has been seized by China, according to Pentagon officials.

The seizure of the underwater vehicle took place Thursday, about 50 nautical miles northwest of Subic Bay in the Philippines, Pentagon Press Secretary Peter Cook said in a statement Friday

The situation is unusual: U.S. Navy Capt. Jeff Davis told journalists there was no precedent for it in recent memory, NPR’s Tom Bowman reports.

The Pentagon says that the USNS Bowditch, an oceanographic survey ship, had two unclassified “ocean gliders” — unmanned underwater vehicles (UUVs) — in the water, conducting “routine operations in accordance with international law.” The undersea drones measure things like salinity and temperature, the Pentagon says.

The Bowditch was retrieving one vehicle when a Chinese warship pulled up, put a small boat in the water and retrieved the second UUV, officials told reporters.

The U.S. sent radio messages requesting that the drone be returned, the Pentagon statement says, but the Chinese ship merely acknowledged the messages and ignored the request.

No shots were fired by either vehicle, officials said, and the Chinese ship left with a final message that it was returning to normal operations — and with the drone.

The U.S. has issued a demarche — a formal diplomatic protest — and demanded the drone’s return, Reuters reports.

“We call upon China to return our UUV immediately, and to comply with all of its obligations under international law,” Pentagon Press Secretary Peter Cook said in his statement.

The incident occurred in the long-disputed waters of the South China Sea, where several countries make various overlapping territorial claims. China has been the most aggressive in claiming the strategically and economically significant waters as its own.

Competing Claims In The South China And East China Seas

South China Sea and East China Sea
These are the approximate claims by China and other countries. In many cases, countries are intentionally vague about the extent of their claims.
In South China Sea Islands, Anti-Aircraft And Radar Systems Emerge In Full Color

Highlighting new areas of Chinese construction on Mischief Reef, a monitoring group says that in addition to an airstrip, the artificial island will likely be outfitted with large anti-aircraft guns and a cruise missile defense system.

NPR: China “appears to have built significant point-defense capabilities” on artificial islands in the South China Sea, says a think tank that cites new satellite imagery showing hexagonal gun platforms and other recent construction.

In vivid color, the photos show what the Asia Maritime Transparency Initiative says is an array of anti-aircraft guns, cruise missile defenses, in nearly identical emplacements on islands created on large reefs to serve as outposts in the Spratly Islands.

In recent years, tensions around the islands have been an undercurrent in America’s relationship with China, featuring in talks between President Obama and President Xi Jinping and raising the specter of escalating shows of military might in the area.

China’s military emplacement on Fiery Cross Reef includes “four structures, consisting of tiered hexagonal towers oriented toward the sea,” according to the Asia Maritime Transparency Initiative. CSIS/AMTI/DigitalGlobe 
 

Discussing the satellite photos that were taken in recent weeks, Asia Maritime Transparency Initiative Director Gregory Poling told Voice of America, “This is further evidence that the commitment that President Xi Jinping made to President [Barack] Obama last year not to militarize these islands was, at best, premature.”

The new military emplacements are being highlighted months after an international tribunal in The Hague invalidated China’s claims in the South China Sea. That unprecedented ruling also found that China’s build-up of artificial islands in the region was also harming natural ecosystems.

China’s leaders rejected that decision, which came in a case that was brought by the Philippines. In addition to those two countries, parts of the South China Sea are also claimed by Taiwan, Malaysia, the Vietnam and others.

The disputed areas include busy shipping lanes in the sea, along with a wealth of natural resources, from fishing grounds to underground oil and gas reserves.

“But the dispute is not just about economic assets,” as our Parallels blog reported earlier this year. “The sea’s strategic location near half a dozen East and Southeast Asian countries means those countries want to control the military and civilian activities in the area.”

Providing analysis of China’s military goals in the islands, the AMTI says:

“These gun and probable CIWS emplacements show that Beijing is serious about defense of its artificial islands in case of an armed contingency in the South China Sea. Among other things, they would be the last line of defense against cruise missiles launched by the United States or others against these soon-to-be-operational air bases. They would back up the defensive umbrella provided by a future deployment to the Spratlys of mobile surface-to-air missile (SAM) platforms, such as the HQ-9 deployed to Woody Island in the Paracel Islands.”

As the Parallels blog noted, “The potential for deteriorating cross-strait relations puts the United States in a tough spot — it must uphold its security commitments to Taiwan while avoiding confrontation with Chinese vessels patrolling Taiwanese islands.”

Law Firm, Bob Dole Behind the Taiwan Phone Call to Trump

There is always more to the story right? Yes….and this phone call that set the White House and State Department on their heads when Trump received a phone call from the President of Taiwan, President Tsai Ing-wen. What has not been answered is did anyone in the Trump operation have advanced knowledge of the call or did they understand the policy ramifications for the long term when it comes to conditions in the region?

****

Alston & Bird Central to Trump’s Taiwanese Phone Call

TAL: Former senator and Alston & Bird special counsel Bob Dole told The Wall Street Journal Monday that he and his firm helped arrange the president-elect’s taboo-breaking Friday telephone call with Taiwanese President Tsai Ing-wen. “It’s fair to say that we may have had some influence,” Dole told the paper.

Dole and Ted Schroeder, a former Senate Democratic aide who joined Alston & Bird in January as counsel in its Legislative and Public Policy Group, are on a $20,000-a-month retainer to the Taipei Economic and Cultural Representative Office, according to a lobbyist filing dated April 30. The office is Taiwan’s alternative to an embassy or consulate, handling foreign affairs and services for the Republic of China, commonly known as Taiwan.

In the lobbyist filing, Alston & Bird reported making routine diplomatic contacts on behalf of Taiwan’s U.S. representative. Awkwardly, the firm opened a three-lawyer Beijing office in January, specializing in IP, trade, tort and cyber disputes for Chinese clients in American forums.  Alston & Bird did not respond to a request for comment. Daniel Huang, a spokesman for the Taipei Economic and Cultural Representative Office, said the office had no comment.

Breaking a diplomatic taboo that dates to 1979, the U.S. call with Taiwan’s head of state roiled the chattering classes in both nations, perhaps because China has more than 1,600 ballistic and cruise missiles facing the Taiwan Strait, and dozens aimed at the U.S. A far more measured but nontrivial way for China to retaliate would be for it to return once again to cyberespionage, whose decline was an unsung Obama success. Nick Rossmann of FireEye iSIGHT Intelligence says that while he detects no new change in hacking patterns, “an economic downturn in China coupled with a deterioration in the U.S.-Chinese bilateral relationship would be key factors in a shift to ramp up operations to steal IP.”

The Taiwan call made a parlor game of guessing Trump’s motives for lightly playing with the world’s highest concentration of missiles, and tweaking a rising superpower that fights to keep its own military’s jingoists in check.

“Defensiveness, ignorance, impulsivity, considered aggressive behavior, on-going real estate negotiations?” muses Josh Marshall of Talking Points Memo. “Not having a clear idea about which of these factors is driving decisions is and will be one of the joys of the Trump years.”

Initial speculation centered on ignorance or impulsivity. “This has all the earmarks of randomness on the U.S. side,” a senior Bush diplomat told Politico. Others noted a Taiwanese newspaper report, denied by the Trump Organization, that Trump was considering a luxury development near Taipei’s airport. The New York Times reported that a sales manager overseeing Asia for Trump Hotels had visited Taiwan in October, a trip that she recorded on her Facebook page.

As the consensus shifted toward “considered aggressive behavior” (or at least considered by Trump’s aides), the first reports pointed the finger at former Dick Cheney aide and Heritage Foundation scholar Stephen Yates. But Yates denied the reports, while voicing warm support for the reckless break in protocol.

Thanks to Dole’s candor, we now know who really deserves blame for Trump’s first foreign policy blunder. And to ignorance, impulsivity, aggression and conflicts, we must add another animating factor. Even in the drained swamp of Trump’s Washington, don’t discount the power of lobbying.

Russian State, Non-State Cyber Intrusions Sway Voting/Political Decisions

In October, before the U.S. presidential election, a Russian man suspected of carrying out cyberattacks against U.S. targets was arrested in Prague and was also wanted by Interpol. What information could have been gained in this case that has provided additional evidence to government officials for further investigations? Anyone remember in 2012 when the Russian hacked LinkedIn?

Everyone appears to be in denial about the ability and reasons that Russia and or their non-state actors swayed the U.S. campaign and voting process. No one official has ever claimed actual votes were altered, but rather the argument is actual affectation of information, attitudes and decisions by candidates and voters. There is a distinct difference and words matter.

Russia is artful when it comes to practicing hybrid warfare, cyber is but one tactic, the other successful tactic is propaganda. It works.

APT 28, Russia (Advanced Persistent Threat) has been seen to have moved on from the United States political season and turned towards Germany’s political season in recent days. This is not likely to affect vote tally results but rather polling attitudes going into consideration of votes for candidates.

This site has been writing about hacking and cyber intrusions for more than two years. While government agency officials have pointed with evidence that Russia played a significant role, it is also important to remember there are thousands of outside government cyber experts that are hired by government to protect against cyber intrusions and to investigate and report that of which is otherwise unknown by government due to being in the private sector. These are generally known as ‘White Hats’. White Hats in their forensic work look for types of penetration, commonality in code or language, trace IP addresses, concepts, malware, login files, brute force, where stolen data later appeared, partitions and code based platforms.

Let’s examine some facts and history.

It was also proven last year that as part of the Russian aggression with the Ukraine, that power grid was hacked by Russian operations. Due to major sanctions applied to Russia for at least the annexation of Crimea and the invasion of Ukraine and the continued threat to East Europe and NATO, the Russian Defense Ministry launched a more aggressive cyber command. Beyond hacking the non-classified but still a protected system at the White House in 2015, there are others of note.

In the past year, researchers have also linked Russian hackers believed to be working for the government to other spying campaigns, including against NATO, the Ukrainian government, energy companies in Poland, and an academic at an American university who was targeted because he studies Ukraine.

On Tuesday, CNN reported that according to U.S. officials, Russian hackers had penetrated portions of the White House computer network by gaining access from another “perch,” at the State Department, where intruders had gotten inside the unclassified email system.

The intrusion reported by CNN is not “a new incident,” a spokesman for the National Security Council said. Rather, it was acknowledged by the White House last year after intruders accessed an unclassified network used by the Executive Office of the President. More here.

From 2014, long before the presidential election cycle was set into motion:

As reported by Heritage, according to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]

A recent survey by the Ponemon Institute showed the average cost of cyber crime for U.S. retail stores more than doubled from 2013 to an annual average of $8.6 million per company in 2014.[2] The annual average cost per company of successful cyber attacks increased to $20.8 million in financial services, $14.5 million in the technology sector, and $12.7 million in communications industries.

This paper lists known cyber attacks on private U.S. companies since the beginning of 2014. (A companion paper discussed cyber breaches in the federal government.)[3] By its very nature, a list of this sort is incomplete. The scope of many attacks is not fully known. For example, in July, the U.S. Computer Emergency Readiness Team issued an advisory that more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.

This list includes only cyber attacks that have been made known to the public. Most companies encounter multiple cyber attacks every day, many unknown to the public and many unknown to the companies themselves.

The data breaches below are listed chronologically by month of public notice.

January

  • Target (retail). In January, Target announced an additional 70 million individuals’ contact information was taken during the December 2013 breach, in which 40 million customer’s credit and debit card information was stolen.[5]
  • Neiman Marcus (retail). Between July and October 2013, the credit card information of 350,000 individuals was stolen, and more than 9,000 of the credit cards have been used fraudulently since the attack.[6] Sophisticated code written by the hackers allowed them to move through company computers, undetected by company employees for months.
  • Michaels (retail). Between May 2013 and January 2014, the payment cards of 2.6 million Michaels customers were affected.[7] Attackers targeted the Michaels POS system to gain access to their systems.
  • Yahoo! Mail (communications). The e-mail service for 273 million users was reportedly hacked in January, although the specific number of accounts affected was not released.[8]

April

  • Aaron Brothers (retail). The credit and debit card information for roughly 400,000 customers of Aaron Brothers, a subsidiary of Michaels, was compromised by the same POS system malware.[9]
  • AT&T (communications). For two weeks AT&T was hacked from the inside by personnel who accessed user information, including social security information.[10]

May

  • eBay (retail). Cyber attacks in late February and early March led to the compromise of eBay employee log-ins, allowing access to the contact and log-in information for 233 million eBay customers.[11] eBay issued a statement asking all users to change their passwords.
  • Five Chinese hackers indicted. Five Chinese nationals were indicted for computer hacking and economic espionage of U.S. companies between 2006 and 2014. The targeted companies included Westinghouse Electric (energy and utilities), U.S. subsidiaries of SolarWorld AG (industrial), United States Steel (industrial), Allegheny Technologies (technology), United Steel Workers Union (services), and Alcoa (industrial).[12]
  • Unnamed public works (energy and utilities). According to the Department of Homeland Security, an unnamed public utility’s control systems were accessed by hackers through a brute-force attack[13] on employee’s log-in passwords.[14]

June

  • Feedly (communications). Feedly’s 15 million users were temporarily affected by three distributed denial-of-service attacks.[15]
  • Evernote (technology). In the same week as the Feedly cyber attack, Evernote and its 100 million users faced a similar denial-of-service attack.[16]
  • P.F. Chang’s China Bistro (restaurant). Between September 2013 and June 2014, credit and debit card information from 33 P.F. Chang’s restaurants was compromised and reportedly sold online.[17]

August

  • U.S. Investigations Services (services). U.S. Investigations Services, a subcontractor for federal employee background checks, suffered a data breach in August, which led to the theft of employee personnel information.[18] Although no specific origin of attack was reported, the company believes the attack was state-sponsored.
  • Community Health Services (health care). At Community Health Service (CHS), the personal data for 4.5 million patients were compromised between April and June.[19] CHS warns that any patient who visited any of its 206 hospital locations over the past five years may have had his or her data compromised. The sophisticated malware used in the attack reportedly originated in China. The FBI warns that other health care firms may also have been attacked.
  • UPS (services). Between January and August, customer information from more than 60 UPS stores was compromised, including financial data,[20] reportedly as a result of the Backoff malware attacks.
  • Defense Industries (defense). Su Bin, a 49-year-old Chinese national, was indicted for hacking defense companies such as Boeing.[21] Between 2009 and 2013, Bin reportedly worked with two other hackers in an attempt to steal manufacturing plans for defense programs, such as the F-35 and F-22 fighter jets.

September

  • Home Depot (retail). Cyber criminals reportedly used malware to compromise the credit card information for roughly 56 million shoppers in Home Depot’s 2,000 U.S. and Canadian outlets.[22]
  • Google (communications). Reportedly, 5 million Gmail usernames and passwords were compromised.[23] About 100,000 were released on a Russian forum site.
  • Apple iCloud (technology). Hackers reportedly used passwords hacked with brute-force tactics and third-party applications to access Apple user’s online data storage, leading to the subsequent posting of celebrities’ private photos online.[24] It is uncertain whether users or Apple were at fault for the attack.
  • Goodwill Industries International (retail). Between February 2013 and August 2014, information for roughly 868,000 credit and debit cards was reportedly stolen from 330 Goodwill stores.[25] Malware infected the chain store through infected third-party vendors.
  • SuperValu (retail). SuperValu was attacked between June and July, and suffered another malware attack between late August and September.[26] The first theft included customer and payment card information from some of its Cub Foods, Farm Fresh, Shop ‘n Save, and Shoppers stores. The second attack reportedly involved only payment card data.
  • Bartell Hotels (hotel). The information for up to 55,000 customers was reportedly stolen between February and May.[27]
  • U.S. Transportation Command contractors (transportation). A Senate report revealed that networks of the U.S. Transportation Command’s contractors were successfully breached 50 times between June 2012 and May 2013.[28] At least 20 of the breaches were attributed to attacks originating from China.

October

  • J.P. Morgan Chase (financial). An attack in June was not noticed until August.[29] The contact information for 76 million households and 7 million small businesses was compromised. The hackers may have originated in Russia and may have ties to the Russian government.
  • Dairy Queen International (restaurant). Credit and debit card information from 395 Dairy Queen and Orange Julius stores was compromised by the Backoff malware.[30]
  • Snapsave (communications). Reportedly, the photos of 200,000 users were hacked from Snapsave, a third-party app for saving photos from Snapchat, an instant photo-sharing app.[31]

Securing Information

As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should:

  • Create a safe legal environment for sharing information. As the leaders of technological growth, private companies are in most ways at the forefront of cyber security. Much like government agencies, companies must share information that concerns cyber threats and attack among themselves and with appropriate private-public organizations.[32] Congress needs to create a safe environment in which companies can voluntarily share information without fear of legal or regulatory backlash.
  • Work with international partners. As with the Backoff malware attacks, attacks can affect hundreds if not thousands of individual networks. These infected networks can then infect companies outside the U.S. and vice versa. U.S. and foreign companies and governments need to work together to increase overall cybersecurity and to enable action against individual cyber criminals and known state-sponsored cyber aggressors.[33]
  • Encourage cyber insurance. Successful cyber attacks are inevitable because no security is perfect. With the number of breaches growing daily, a cybersecurity insurance market is developing to mitigate the cost of breaches. Congress and the Administration should encourage the proper allocation of liability and the establishment of a cyber insurance system to mitigate faulty cyber practices and human error.[34]

***

Denial or refusing the argument and examination of evidence is malfeasance and exacerbating a cyber criminal act.