China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.

Stop Using Zoom, Second Warning

The first warning came last March.

March: As remote work surges amid the coronavirus pandemic, the FBI issued a public bulletin Monday warning Zoom and other video teleconferencing services may not be as private, or as secure, as users may assume.

Use of Zoom and similar services has exploded in recent weeks as companies, schools, governments, and individuals increasingly turn to its teleconferencing as ways to keep businesses and classrooms afloat while sheltering in pace or working from home. However the shift also represents an opportunity for attackers, as white supremacists, hackers and other trolls barge into digital meetings, a phenomenon known as “Zoombombing.”

In Massachusetts, there have been several incidents, including an unintended participant joining a high school’s virtual classroom only to yell profanities and reveal personal information about the teacher, according to the FBI. Another unwelcome participant with swastika tattoos joined a separate Massachusetts school’s Zoom meeting, the FBI reports.

“The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language,” the FBI cautioned. “As individuals continue the transition to online lessons and meetings, the FBI recommends exercising due diligence and caution in your cybersecurity efforts.”

It’s not just private businesses and children whose meetings could be Zoombombed. Privacy and security issues in conferencing software may also pose risks to national security, as world leaders convene Zoom meetings. In some cases, world leaders such as U.K. Prime Minister Boris Johnson have shared screenshots of their teleconferencing publicly only to reveal Zoom meeting IDs, raising concerns that sensitive information could be compromised. More here.

Stupidly, government officials at all levels are using Zoom including the Biden presidential team. How dangerous is that? Those officials are not reading the warnings or the news? Yeesh

 

Zoom Biden Rally

For more proof, again this month…

Justice Department/December 2020: China-Based Executive at U.S. Telecommunications Company Charged with Disrupting Video Meetings

It is not only the U.S. that is sounding the warnings. The Telegraph reports warnings that “opportunistic criminals” (a formulation that’s practically redundant), can be expected to use bogus invitations to sessions in their social engineering efforts.

Connecticut Teen Arrested for Allegedly 'Zoom Bombing ... source

A security executive with the video-tech giant Zoom worked with the Chinese government to terminate Americans’ accounts and disrupt video calls about the 1989 massacre of pro-democracy activists in Tiananmen Square, Justice Department prosecutors said Friday.

The case is a stunning blow for Zoom, one of the most popular new titans of American tech, which during the pandemic became one of the main ways people work, socialize and share ideas around the world. The California-based company is now worth more than $100 billion.

But the executive’s work with the Chinese government, as alleged by FBI agents in a criminal complaint unsealed Friday in a Brooklyn federal court, highlights the often-hidden threats of censorship on a forum promoted as a platform for free speech. It also raises questions about how Zoom is protecting users’ data from governments that seek to surveil and suppress people inside their borders and abroad.

Prosecutors said the China-based executive, Xinjiang Jin, worked as Zoom’s primary liaison with Chinese law enforcement and intelligence services, sharing user information and terminating video calls at the Chinese government’s request.

Jin monitored Zoom’s video system for discussions of political and religious topics deemed unacceptable by China’s ruling Communist Party, the complaint states, and he gave government officials the names, email addresses and other sensitive information of users, even those outside China.

Jin worked also to end at least four video meetings in May and June, including video memorial calls with U.S.-based dissidents who’d survived the crackdown by Chinese military forces that killed thousands of students and protesters. The Chinese government works to censor any acknowledgment of the massacre, including on social media outside China.

A Zoom spokesperson said in a statement Friday that the company has cooperated with the case and launched its own internal investigation. Jin, the company said, shared “a limited amount of individual user data with Chinese authorities,” as well as data on no more than 10 users based outside China. Jin was fired for violating company policies, the statement said, and other employees have been placed on administrative leave until the investigation is complete.

In an updated statement on Zoom’s website, the company said it “fell short” by terminating the meetings instead of only blocking access to participants in China, to abide by Chinese law. The company said it has reinstated the victims’ accounts and will no longer allow requests from the Chinese government to affect users outside mainland China.

“As the DOJ makes clear, every American company, including Zoom and our industry peers, faces challenges when doing business in China,” the company said in its statement. “We will continue to act aggressively to anticipate and combat ever-evolving data security challenges.”

Jin could not be reached for comment. Though Jin lives in China and is not in U.S. custody, officials said he could be transferred to the United States to face prosecution if he travels to a country that has an extradition treaty with the U.S.

A spokesperson for the Chinese embassy in Washington did not respond to requests for comment.

Human-rights activists this summer said their Zoom accounts had been abruptly terminated shortly before or after they’d hosted video calls commemorating the 31st anniversary of the Tiananmen Square protests, a bloody crackdown captured in the iconic photo of a man standing in front of a Chinese tank.

Zoom said in a statement then that the company “must comply with laws in the countries where we operate.” While the company said it regretted “that a few recent meetings with participants both inside and outside of China were negatively impacted,” the statement said it was not in the company’s power “to change the laws of governments opposed to free speech.”

Zhou Fengsuo, a student leader during the Tiananmen Square protests who had his paid Zoom account terminated this summer, told The Washington Post on Friday that he had worked with the FBI on the case and saw the charges as “tremendous news.”

“It’s so eye-opening to me how this U.S. company, having this connection, would report directly to” the Chinese Communist Party and “disrupt our meetings regularly on behalf of the CCP,” he said. “This executive was working for the government and police as an agent of persecution, and Zoom was paying this guy for doing that job.”

Prosecutors charged Jin, also known as Julien Jin, with conspiracy to commit interstate harassment and to transfer a means of identification. Jin, 39, had worked at the company since 2016, most recently as a “Security Technical Leader,” the complaint said.

Quoting from electronic messages between Jin and other Zoom employees, FBI agents outlined a months-long, high-pressure campaign by China’s “Internet Police” to view users’ video calls and suppress unwanted speech. In one April message, Jin said he had been summoned to a meeting with Chinese government officials who demanded that Zoom develop the capability to terminate any “illegal meeting” within one minute. In others, Jin sent meeting passwords and other sensitive internal data directly to Chinese law enforcement.

In the complaint, FBI agents said that Zoom employees in the U.S. had agreed to a Chinese government “rectification” plan that entailed migrating data on roughly 1 million users from the U.S. to China, thereby subjecting it to Chinese law. Zoom also agreed, the complaint states, to provide “special access” to Chinese law enforcement and national-security authorities. In one message cited in the complaint, Jin wrote that the authorities had wanted him to share detailed lists of the company’s “daily monitoring” of “Hong Kong demonstrations, illegal religions” and other subjects.

To terminate the Tiananmen Square calls, the complaint alleges, Jin’s co-conspirators fabricated evidence that they were intended to discuss child abuse, racism, terrorism and violence. Jin’s co-conspirators also entered some calls with fake accounts that used pornographic or terrorist-related profile images, and Jin pointed to those images as evidence to terminate the meetings and suspend the hosts’ accounts.

John Demers, the assistant attorney general for national security, said the firm had, like many others that do business in China, put itself in a difficult position by operating in an authoritarian country whose laws and practices often “run antithetical to our values.”

“The company was focused on complying with Chinese law and the expectations of Chinese law enforcement,” Demers said. “But what happened over time is those expectations increased. So it goes from, ‘Well, respond to our lawful requests,’ to ‘You must take action within a minute to shut down any action on your platforms’ – not just in China, but outside – that hits upon topics of sensitivity to the Chinese government.”

That pressure, he noted, spans many industries: He cited the controversy last year involving the National Basketball Association, in which the general manager of the Houston Rockets tweeted in support of Hong Kong protesters, leading to a backlash in China.

“The case is an illustration of the choices that companies are forced to make when they do business in China . . . [and] how the Chinese government will take advantage of the leverage they have over you to push their agenda,” he said. “You’ve got a consistent pattern of the Chinese government using economic leverage – the opportunity to access markets, foreign investments – in order to further political goals.”

John Scott-Railton, a researcher at the Citizen Lab in Toronto, said the filing showed how authoritarian governments have increasingly looked at major tech companies as top-priority intelligence targets ripe for infiltration and recruitment.

He pointed to another case last year against two former Twitter employees charged with spying on behalf of Saudi Arabia, including by sending the personal information of thousands of people, including Saudi critics and prominent dissidents.

The charges were announced on the same day that the Trump administration added four Chinese companies to the Commerce Department entity list for enabling human rights abuses within China by providing DNA-testing materials or high-technology surveillance equipment to the Chinese government. They were among 59 Chinese companies Commerce add to its export control entity list, including companies that have been accused of stealing trade secrets and using U.S. exports to support the Chinese military.

Zoom has faced questions before about how it guards against the potential misuse of video data by the Chinese government, which censors major news and social media websites beneath what’s known as a “Great Firewall.”

This spring, Scott-Railton and another researcher found the company had routed American users’ data through Chinese servers, potentially opening it to Chinese-government data requests. The company later said it had “mistakenly” sent American video calls to Chinese data centers amid a flood of calls.

Zoom employs more than 2,500 people around the world, including, as of last year, more than 500 in China who develop the software installed in computers around the world.

The company’s billionaire chief executive, Eric Yuan, was born in China but moved to Silicon Valley in the late ’90s, where he worked for the video start-up WebEx before founding Zoom in 2011.

The Federal Trade Commission last month reached a settlement with Zoom, in which the company resolved allegations that it had misled users about their data privacy and encryption measures by agreeing to new security rules.

Questions over business dealings in China have become more commonplace as a new wave of Chinese tech start-ups has gained international popularity and acclaim. TikTok, the wildly popular short-video app owned by the Beijing-based tech company ByteDance, drew suspicions of censorship from users last year because searches on the site related to topics suppressed by the Chinese government, such as the Tiananmen Square massacre or the Hong Kong pro-democracy protests, showed few or no videos.

Internal guidelines for the site also mimicked Chinese-government censorship policies, and former employees for the company told The Post last year that key content-moderation decisions for international users were made in China. TikTok has said it has worked in recent months to distance its U.S. operations from the company’s Chinese headquarters.

Wang Dan, a Chinese dissident whose Zoom call on Tiananmen Square was also disrupted this spring, said the case showed how China could threaten free expression for people in the West.

“Interfering with the freedom of speech of those who have settled and lived in the United States in exile is . . . a serious attack to American sovereignty,” he told The Post on Friday. “The American people should also pay more attention to the [Chinese Communist Party’s] threat of American democracy.”

 

Pelosi Refusing to Advance China Task Force Legislation Items

Primer: China's Xi Jinping warned Trump could sow 'chaos' after 2016 election -  Business Insider

On September 25, 2015, during CCP General Secretary Xi’s state visit to the United States, President Obama and Xi gave remarks to the press in the White House Rose Garden. The two leaders announced that they had agreed “neither the U.S. or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage.” Xi also pledged that “China does not intend to pursue militarization” of the South China Sea. Neither of these promises to the American people were made in good faith. Today, “China is using cyber-enabled theft as part of a global campaign to ‘rob, replicate, and replace’ non-Chinese companies in the global marketplace,” according to Assistant Attorney General John Demers. Meanwhile, the PRC’s military outposts in the South China Sea have been proven “capable of supporting military operations and include advanced weapon systems,” according to the Pentagon.

October 01, 2020 Congressional Record

COUNTERING THREAT OF CHINESE COMMUNIST PARTY The SPEAKER pro tempore. The Chair recognizes the gentleman from Pennsylvania (Mr. Joyce) for 5 minutes. Mr. JOYCE of Pennsylvania. Mr. Speaker, after months of hard work and collaboration, the China Task Force has released our final report, which includes more than 400 solutions to counter the growing threat of the Chinese Communist Party.

This report is the framework for combating the aggressive Chinese Communist regime. After meeting with more than 130 experts, we developed realistic and achievable solutions that take a comprehensive approach to strengthening America’s national security and holding the Chinese Government accountable. We realized that out of our 400 recommendations, 180 are legislative solutions, of which 64 percent are bipartisan and one-third have already passed either the House or the Senate.

Mr. Speaker, these are commonsense solutions that we can vote on today to strengthen our strategic position for tomorrow. As the only physician serving on the China Task Force, it was my privilege to delve into opportunities to strengthen our supply chains and ensure that Americans are never again beholden to the Chinese Government for key medicines or healthcare supplies.

On the Health and Technology Subcommittee, I led efforts to strengthen [[Page H5110]] the supply chains for medicines, semiconductors, and other vital materials. Congress has passed several provisions aimed at advancing research and the manufacturing of critical medical supplies here in the United States. We also created new reporting requirements to help us better understand international supply chains and counter vulnerabilities in the system.

To bolster our technology supply chain, I cosponsored H.R. 7178, the CHIPS Act, to increase domestic production of advanced semiconductors, which will help Americans to develop next-generation telecom technology, fully automated systems, and, importantly, new weapons systems. I also introduced the ORE Act, H.R. 7812, to incentivize the domestic production of rare earth materials, which is key to breaking the Chinese monopoly on critical supply chains. America cannot allow China to win the race to next-generation technology. We want innovative breakthroughs to happen here in this country, and the China Task Force is making progress through the legislative process. As a leader on the competitiveness committee, I focused on issues ranging from combating Chinese Communist-sponsored theft of intellectual property to exposing the influence of the Chinese in U.S. research institutions and countering the importation of illicit fentanyl.

Too often, American companies are being coerced to surrender intellectual property to the Chinese Government in order to gain entry into the Chinese marketplace. In extreme cases, we hear of outright theft by Chinese hackers and agents. The China Task Force has produced recommendations that direct the Federal Government to ramp up investigations of individuals acting as pawns of the Chinese Communist Party and enforce antitheft laws.

Our Nation has also seen wholesale efforts of the Chinese Government to steal research and gain influence at United States universities. In my own backyard, the FBI arrested a former Penn State researcher suspected of espionage. The task force has compiled provisions to increase transparency and accountability in the higher education system, and I introduced legislation to close loopholes and force the disclosure of all foreign money in our research systems. Finally, we must stop illicit fentanyl from reaching our communities and killing our neighbors.

The China Task Force has produced recommendations to stop the importation of these devastating analogues from China. In the House, I cosponsored legislation to hold foreign nations, including China, accountable if they fail to cooperate with U.S. narcotics control efforts and prosecute the production of fentanyl in their countries. I thank Senator Toomey for championing this provision in the Senate.

By implementing these solutions, we can make America safer, stronger, and better equipped to lead in the 21st century. The China Task Force final report is a framework. It is our playbook to make a difference. While our work on this report has finished, our commitment to this cause must and will continue. Phase two starts today.

The 141 page report is found here.

China Forces International Criminal court to be Useless

With Beijing not a signatory to the ICC, those bringing the claim of genocide have pointed to the alleged forcing of Uighur people from Tajikistan and Cambodia into China as evidence. Both countries are signatories to the Rome statute setting up the ICC.

“The US government has reason to doubt the honesty of the ICC. The Department of Justice has received substantial credible information that raises serious concerns about a long history of financial corruption and malfeasance at the highest levels of the office of the prosecutor,” Barr said.

He referred to the ICC as “little more than a political tool employed by unaccountable international elites”.

***

Apart from genocide, China has reservations over the definitions of all the other core crimes, namely, crimes against humanity, war crimes and crime of aggression. Throughout the negotiation process, one of the major guiding principles in defining the crimes under consideration was that these definitions should be reflective of customary international law. China opposed the ICC’s jurisdiction over crimes against humanity committed during peacetime, because, it argued that customary international law required a nexus to armed conflict, and without such nexus, the major attributes of the crimes would be changed. China’s objection towards the ICC’s jurisdiction over war crimes committed in non-international armed conflict was similarly raised in the context of customary international law. Moreover, China resisted the inclusion of the crime of aggression under the ICC’s jurisdiction due to the lack of a precise definition on state act of aggression underlying the crime.

So, while world leaders have confirmed Covid-19 came from Wuhan, China, it is unlikely the ICC will ever bring a case against China for the nefarious actions of the pandemic. Meanwhile, there is the matter of the human rights violations by China against the Uighurs.

Uighur model sends rare video from Chinese detention | Fox News

NYT’s: The International Criminal Court has decided not to pursue an investigation into China’s mass detention of Muslims, a setback for activists eager to hold Beijing accountable for persecution of ethnic and religious minorities.

Prosecutors in The Hague said on Monday that they would not, for the moment, investigate allegations that China had committed genocide and crimes against humanity regarding the Uighurs, a predominantly Muslim ethnic group, because the alleged crimes took place in China, which is not a party to the court.

The abuses described “have been committed solely by nationals of China within the territory of China,” said a report by the court’s chief prosecutor, Fatou Bensouda of Gambia.

For months, Uighurs in exile had urged the court to investigate China’s repressive policies against Muslim minorities, the first attempt by activists to use the force of international law to hold Chinese officials accountable for the crackdown. They accused the Chinese government of carrying out a campaign of torture, forced sterilization and mass surveillance against Muslims, among other abuses.

China has faced growing international condemnation for its harsh treatment of Muslims, including the construction of vast indoctrination camps in the western region of Xinjiang. President-elect Joseph R. Biden Jr.’s campaign described China’s actions in Xinjiang as genocide, a position also taken by other Western leaders.

China has denied that the camps are abusive, describing them instead as job training centers aimed at countering religious extremism and terrorism, despite a preponderance of contradictory evidence.

Many Uighurs said on Tuesday that they were disappointed in the court’s decision not to investigate. They vowed to continue to lobby global leaders to punish China for the abuses.

“The I.C.C. was formed for one and only one reason: to confront the most horrific international crimes,” said Fatimah Abdulghafur, a Uighur poet and activist who lives in Australia. “The atrocities of the Chinese regime toward Uighurs are countless.”

Products you buy may have been made in China by forced Uighur labor - Los  Angeles Times article

The complaint against China was filed by two Uighur exile groups, the East Turkistan Government in Exile and the East Turkistan National Awakening Movement.

In addition to abuses against Muslims inside China’s borders, the Uighur groups had also lobbied the court to investigate Beijing for pursuing the repatriation of thousands of Uighurs through unlawful arrests in or deportation from other countries, including Cambodia and Tajikistan.

In its report on Monday, the prosecutor’s office said there was “no basis to proceed at this time” because there did not appear to be enough evidence to show that Chinese officials had committed crimes over which the court had jurisdiction.

“Not all conduct which involves the forcible removal of persons from a location necessarily constitutes the crime of forcible transfer or deportation,” the report said.

Lawyers representing the Uighur groups said they were still hopeful that the court would open an investigation after considering new evidence.

“We have explained we’ve been hampered by Covid restrictions,’’ said Rodney Dixon, who is the lead lawyer in the case. “The prosecutor needs further and concrete evidence from Cambodia and Tajikistan to establish jurisdiction, and we will be providing that early in the year.”

Lawyers following the court said that the prosecutor, whose mandate is coming to an end, had been under time pressure to present her final report to the annual assembly of court members now meeting in The Hague. A new prosecutor will be elected in the coming weeks.

US Companies Riddled with Members of Chinese Communist Party

Latest CHINESE COMMUNIST PARTY | The Straits Times

Primer:

In his speech just a few days ago at Georgia Tech University: Pompeo called China’s Communist Party “the central threat of our time” and highlighted efforts by Chinese security services to pressure and recruit Chinese academics and students as spies.

“Americans must know how the Chinese Communist Party is poisoning the well of our higher education institutions for its own ends and how those actions degrade our freedoms and American national security,” Pompeo said.

“If we don’t educate ourselves, if we’re not honest about what’s taking place, we’ll get schooled by Beijing.”

NYP: As we try to come to terms with the extent of Chinese influence over the Biden family, a leaked database of registered members of the Chinese Communist Party has exposed a mass infiltration of American companies — with serious national security implications.

Boeing, Qualcomm and Pfizer are just three US companies that have employed dozens of CCP members in their Chinese facilities, the database reveals.

As well, three female employees of the US consulate in Shanghai have been identified in the list of 1.95 million party members that was leaked to an international group of legislators, the Inter-Parliamentary Alliance on China, which includes Sens. Marco Rubio (R-Fla.) and Bob Menendez (D-NJ).

All CCP members swear an oath to “fight for communism throughout my life, be ready at all times to sacrifice my all for the party and the people, and never betray the party [and] guard party secrets, be loyal to the party.”

Sen. Josh Hawley (R-Mo.), a member of the Homeland Security Committee, said yesterday: “CCP agents have no place in US government facilities, and this report should serve as a much-needed wake-up call to Washington, DC, and corporate executives, who continue to welcome the Chinese government with open arms.

“[It] is just more evidence of the extent to which the CCP has successfully infiltrated American companies and government.”

While none of the people listed in the database have been identified as spies, mounting concerns in the State Department about the CCP have resulted in tightened visa rules for its members earlier this month. CCP members and their immediate families now are limited to one-month, single-entry US permits.

The database was verified by international cybersecurity firm Internet 2.0, which found it was originally leaked on encrypted messaging app Telegram in 2016. It was passed on to IPAC six weeks ago by a third party.

“We have high confidence this list is authentic,” Internet 2.0 co-founder David Robinson, a former Australian army intelligence officer, told me Sunday.

“Someone — an insider, a dissident — managed to get physical access to the server [in Shanghai] from outside the building. They didn’t have to hack it over the internet.”

Each data entry contains the CCP member’s name, ethnicity, place of birth, education level, identification number and, in some cases, a phone number and address.

Robinson has verified the identity of three women who work at the US consulate in Shanghai.

The three, all listed as ethnic Han college graduates, are registered in a 31-strong Communist Party branch listed as Shanghai Foreign Institutional Service Co., which is a state-owned employment agency, which provides local staff for foreign consulates, schools and news media.

A department spokesperson yesterday had no comment about “an allegedly leaked database of Communist Party members” and said “the department does not discuss security protocols or personnel matters.”

However, she said: “Influence and interference operations are fundamental to how the Chinese Communist Party engages with the world.

“China’s role in the world today cannot be understood without reference to the wide array of malign activities that the [CCP] undertakes to influence our societies in ways that are covert, coercive and corrupting.”

The CCP database is split into 79,000 branches.

For example, Boeing has 17 branches, totaling 252 CCP members. Sixteen members are part of Boeing’s Hongqiao Maintenance Base Boeing Line Maintenance Division . . . First Workshop Party Branch; 22 are in the Second Workshop Party Branch; 13 are in the Third Workshop Party Branch, 14 in the Fourth Workshop Party Branch.

There are four subdivisions of the Pudong Maintenance Base Boeing Line Maintenance Branch, totaling 49 members.

Two branches of the Pudong Maintenance Base Boeing Line Maintenance Branch Cargo Aircraft Line Maintenance total 33 members.

Also listed are 27 members of the Party Branch of Boeing Fourth Branch of the Flight Department of Eastern Airlines Yunnan Co. and 23 members of the China Eastern Airlines Beijing Maintenance Department Party Committee Boeing Maintenance Workshop Party Branch.

Boeing spokesman Bradley Akubuiro said last night the company was satisfied with its security.

“As a global company, we enforce strict security protocols and maintain secure firewalls to protect both our customer and company proprietary data in all countries we operate in.”

According to the database, 96 members in the Qualcomm Wireless Communication Technology (China) Co. Ltd. Party Branch, and 133 additional members spread over six party branches of Qualcomm Enterprise Management (Shanghai) work for semiconductor manufacturer and 5G wireless technology company Qualcomm, a US-based multinational.

Qualcomm was awarded a contract by the Defense Department in 2018 to develop multifactor authentication security systems for US military computers.

Another US company crucial to national security is pharmaceutical giant Pfizer, which began rolling out COVID-19 vaccines Sunday.

The database lists 69 CCP members in four Pfizer branches in Shanghai.

Neither Qualcomm nor Pfizer responded to inquiries yesterday.

New York University also appears with 71 members attached to a branch named East China Normal University Shanghai New York University Faculty and Labor Party Branch.

The database leak comes just days after a number of disturbing revelations involving CCP infiltration of American institutions:

Director of National Intelligence John Ratcliffe warned that China has targeted members of Congress and poses “the greatest threat to democracy and freedom” since World War II.
Secretary of State Mike Pompeo warned of China’s infiltration of US universities, which are “hooked on Communist cash” and stifle criticism of Beijing.
Media reports identified Rep. Eric Swalwell (D-Calif.), a member of House Intelligence Committee, as one of several San Francisco politicians courted by Chinese spy Christine Fang.

It was confirmed last week that Joe Biden’s son Hunter is under federal investigation over tax fraud and potential money-laundering over his foreign business dealings, including in China.

“Communist China has been allowed to infiltrate our universities and corporations with people loyal to only the Communist Party,” former Acting Director of National Intelligence Ric Grenell said Sunday.

“Our beloved Chinese American community has been warning us about these tactics for many years, and the political class has ignored those warnings.”

*** Communist party is 'leader of all religions' in China - world news - Hindustan Times

Sensitive data of around two million members of the Communist Party of China (CPC) have been leaked, highlighting their positions in major organizations, including government agencies, throughout the world.

According to reports from The Australian newspaper, featured in the Economic Times, the information includes official records such as party position, birthdate, national ID number and ethnicity. It revealed that members of China’s ruling party hold prominent positions in some of the world’s biggest companies, including in pharmaceutical giants involved in the development of COVID-19 vaccines like Pfizer and financial institutions such as HSBC.

The investigation by The Australian centred around the data leak, which was extracted from a Shanghai server in 2016 by Chinese dissidents.

It noted that CPC members are employed as senior political and government affairs specialists in at least 10 consulates, including the US, UK and Australia, in the eastern Chinese metropolis Shanghai. The paper added that many other members hold positions inside universities and government agencies.

The report emphasized there is no evidence that spying for the Chinese government or other forms of cyber-espionage have taken place.

In her report, The Australian journalist and Sky News host Sharri Markson commented: “What’s amazing about this database is not just that it exposes people who are members of the Communist Party, and who are now living and working all over the world, from Australia to the US to the UK, but it’s amazing because it lifts the lid on how the party operates under President and Chairman Xi Jinping.

“It is also going to embarrass some global companies who appear to have no plan in place to protect their intellectual property from theft, from economic espionage.”

In September, the Cybersecurity and Infrastructure Security Agency (CISA) and the US Department of Justice issued a joint advisory warning US government agencies and private sector companies to be on high alert for cyber-attacks by threat actors affiliated with the Chinese Ministry of State Security (MSS).