China is about to Own Uganda

It is called debt-trapping by China. China has been trapping small desperate nations for several years and few are paying attention. Imperialism? Yes on a global scale.

Image result for uganda china
Uganda is about to default to China. 39% of the debt in Uganda is owed to China. It could be that beyond Uganda, Tanzania, Ethopia and Kenya could be the next victims to debt-trapping. China financed a $4 billion oil pipeline as part of the Belt and Road initiative. When this default suraces, China will own the strategic sites that connects Beijing to the Persian Gulf. Railways are an essential part of the required transportation channels.

Related image

African Stand reported in December last year that the Kenyan government risks losing the lucrative Mombasa port to China if the country fails to repay huge loans advanced by Chinese lenders, but both Chinese and Kenyan officials have dismissed that the port’s ownership is at risk.

Others think the Chinese government is in some ways gangsters, taking over mines all over Africa, sending thousands of Chinese workers, destroy the environment, bring the minerals such as copper, sink, gold, silver, diamonds etc home, and make deals with corrupt politicians to plunder the countries.

“The case is one of the examples of China’s ambitious use of loans and aid to gain influence around the world and of its willingness to play hardball to collect,” says the New York Times on December 12, 2017.

At a time in Somalia when local fishermen are struggling to compete with foreign vessels that are depleting fishing stocks, the government has granted 31 fishing licenses to China.

But Uganda’s auditor-general warned in a report released this month that public debt from June 2017 to 2018 had increased from $9.1 billion to $11.1 billion.

Image result for uganda

The report — without naming China — warned that conditions placed on major loans were a threat to Uganda’s sovereign assets.

It said that in some loans, Uganda had agreed to waive sovereignty over properties if it defaults on the debt — a possibility that Kasaija rejected.

“China taking over assets? … in Uganda, I have told you, as long as some of us are still in charge, unless there is really a catastrophe, and which I don’t see at all, that will make this economy going behind. So, … I’m not worried about China taking assets. They can do it elsewhere, I don’t know. But here, I don’t think it will come,” he said.

n December 2017, the Sri Lankan government handed its Hambantota port to China for a lease period of 99 years after failing to show commitment in the payment of billions of dollars in loans.

Also in September 2018, African Stand reported that China was taking over Zambia’s state power company and Kenneth Kaunda International Airport over unpaid debt rippled across Africa, despite government denials.

China’s Exim Bank has funded about 85 percent of two major Ugandan power projects — Karuma and Isimba dams. It also financed and built Kampala’s $476 million Entebbe Express Highway to the airport, which cut driving time by more than half. China’s National Offshore Oil Corporation, France’s Total, and Britain’s Tullow Oil co-own Uganda’s western oil fields, set to be tapped by 2021.

Big Warnings of China Military Expansion

McRaven, the former head of Joint Special Operations Command overseeing the U.S. Navy SEAL team that took down Al Qaeda leader Osama bin Laden at his Pakistan compound in 2011, noted that Chinese technologies such as 5G commercialization is already beating the United States.

The Chinese military displayed several weapons during its National Day parade, including a new supersonic jet that can reportedly reach speeds faster than Mach 3.3, at more than 2500 miles per hour.

The PLA’s Latest Strategic Thinking on the Three Warfares

The supersonic jet, called the DR-8, could play a key role in a potential conflict with the U.S. military in the South China Sea.

“China has invested a lot of resources into military science and technology development in a bid to enhance its nuclear deterrence capability over the past years, which Beijing believes represents a strategic measure in countering the global military hegemony [of the United States],” Hong Kong-based military analyst Song Zhongping said.

Additionally, China doubled its nuclear arsenal in the past decade and is set to double it again in the next, top U.S. Strategic Command (Stratcom) officials stated in August.

“China has long had a no-first-use policy, and yet they’ve doubled their nuclear arsenal in about the last decade, and they’re on track to double it again in the next decade,” said Rear Admiral Michael Brookes, director of intelligence for Stratcom.

As noted by Newt Gingrich:

Now, imagine that China launches a campaign against Taiwan with the help of Russian air forces.

This would entirely change the dynamic, making it much more difficult and costly (in blood and treasure) – and much less likely for any sort of U.S. victory. Now, instead of a focused conflict with China over a specific piece of territory, the U.S. would have to decide whether it wanted to risk engaging with a cooperative China and Russia at the same time.

For many years, China and Russia were like two estranged communist relatives, but that is changing. In recent years, China and Russia have cooperated in a number of military exercises – and their first long-range joint air patrol in the Asia-Pacific region this past summer.

Chinese Communist Party General Secretary Xi Jinping has met with Russian President Vladimir Putin 24 times since 2013, while he has only met with his U.S. counterpart 16 times during that period.

This activity creates a real potential for a China-Russia strategic alliance which would turn much of our national security planning and strategy on its head.

Republic of China, Taiwan | Operation World

China considers Taiwan one of it’s own provinces yet Taiwan is independent which China is fighting. Known as the ‘one China policy’, Western nations including the United States are not to have any kind of relationship with Taiwan but the United States does and this is one of the causes in the trade negotiations.

After decades of China’s veiled threats to invade and a long-running campaign to get Taiwan’s allies to shift their diplomatic allegiance to Beijing, researchers, government officials, and lawmakers in Taipei all say that China is pursuing a new tactic in the runup to Taiwan’s Jan. 11 presidential vote: election meddling. “China is following the steps from Russia,” says Tzeng Yi-suo, head of cyberwarfare at the Institute for National Defense and Security Research, which is advising Taiwan’s government on ways to counteract the interference. “In our election campaign periods, there is a most striking influence campaign coming from the Chinese Communist Party.”

China’s disinformation apparatus goes well beyond what it considers its borders, according to an analysis published by Harvard researchers in April. Using proxies around the world and some of the same social media platforms it bans at home, the government in Beijing posts 448 million comments a year aimed at promoting a pro-China agenda or sowing discord, the researchers found. In August, Twitter Inc. suspended 936 mainland Chinese accounts, part of a larger network of 200,000 spam accounts it disabled because of what it called a “significant state-backed operation” working to undermine Hong Kong’s pro-democracy demonstrations. On Sept. 20 it suspended an additional 10,000. Facebook Inc. and YouTube have disabled accounts for similar reasons. In December, new foreign-influence laws went into effect in Australia aimed at blocking China’s efforts to sway politics and key decision-makers in that country.

Chinese agencies have been launching an estimated 30 million cyberattacks against Taiwan a month, according to the government’s director general of cybersecurity, Jyan Hong-wei. The patterns indicate Chinese state involvement, he says. Read the full detailed summary here.

SF: Spy, Leave the Room Key at the Front Desk

This is a movie thing for sure not only that happened in San Francisco but went to Columbus, Georgia. China is operating with hired spies in the United States and Beijing is overtly stealing and buying from the United States.

Northern California Resident Charged with Acting as an Illegal Agent

American Citizen Arrested for Acting as an Illegal Foreign Agent of the People’s Republic of China

The Department of Justice unsealed charges today in a criminal complaint charging Xuehua Peng, also known as Edward Peng, 56, for acting as an illegal foreign agent in delivering classified United States national security information to officials of the People’s Republic of China’s Ministry of State Security (MSS).

“According to the allegations, Peng conducted numerous dead drops here in the United States on behalf of Chinese intelligence officers and delivered classified information to them in China.  His arrest exposes and disrupts an operation by those Chinese intelligence officers to collect such information without having to step foot in this country,” said Assistant Attorney General of National Security John C. Demers.  “Coming on top of our many recent Chinese espionage cases—involving both national defense and intellectual property information—this case illustrates the seriousness of Chinese espionage efforts and the determination of the United States to thwart them.”

“The conduct charged in this case alleges a combination of age-old spycraft and modern technology,” said U.S. Attorney David L. Anderson for the Northern District of California.  “Defendant Xuehua (Edward) Peng is charged with executing dead drops, delivering payments, and personally carrying to Beijing, China, secure digital cards containing classified information related to the national security of the United States.”  U.S. Attorney Anderson further stated, “The charges announced today provide a rare glimpse into the secret efforts of the People’s Republic of China to obtain classified national security information from the United States and the battle being waged by our intelligence and law-enforcement communities to protect our people, our ideas, and our national defense.”

“The FBI, along with our partners, will aggressively pursue foreign agents operating illegally in the United States attempting to steal our country’s most sensitive information.” said Assistant Director John Brown of the Counterintelligence Division. “This case should serve as a warning to the government of China as well as any other foreign adversary looking to replicate this activity. The FBI, and our intelligence and law enforcement partners, will not waiver.  We will bring all of our resources to bear to defeat hostile foreign intelligence services and protect our nation’s security. I would like to thank FBI counterintelligence personnel throughout the country who tirelessly worked this investigation over the course of many years, particularly those personnel in our Counterintelligence and San Francisco Divisions.”

“Putting an end to Mr. Peng’s alleged actions are an important and significant step in dismantling the PRC’s overall efforts against our country,” said Special Agent in Charge Bennett of the FBI San Francisco Division.  “Our message is clear: the FBI, along with our intelligence community partners, will pursue foreign adversaries -at any level of an operation- and disrupt their malicious activity when it is detected.”

According to the complaint filed Sept. 24, 2019, and unsealed this morning, Peng, 56, a U.S. citizen living in Hayward, California, acted at the direction and under the control of MSS officials in China in retrieving classified information passed to him by a confidential human source (the source), leaving money behind for the source, or both.  His activities included one dry run and at least five successful “dead drops” between October 2015 and July 2018.  The dead drops occurred in the Bay Area and in Columbus, Georgia.

The table below summarizes the allegations in the complaint about each successful dead drop, including the date of the dead drop, the location of the dead drop, what Peng left in the hotel room, and what Peng retrieved from the hotel:

Date

Location

Peng Left in the Hotel

Peng Retrieved from the Hotel

6/23/2015 Newark, CA n/a Empty package (dry run)
10/24/2015 Newark, CA n/a SD card
4/23/2016 Oakland, CA $20,000 SD card
7/1/2017 Columbus, GA $20,000 n/a
9/9/2017 Columbus, GA $10,000 SD card
6/30/2018 Columbus, GA $20,000 SD card

In the June 23, 2015, “dry run,” no information or money was exchanged.  Instead, an empty package was left by the source for Peng at the front desk of a hotel, and Peng later retrieved it.  In the first successful dead drop, Peng retrieved a package containing an SD card from the front desk of a hotel.  In each of the other four successful dead drops, Peng booked hotel rooms and left a room key to be picked up by the source.  Peng then left envelopes of cash in the room, retrieved a secure digital card left there by the source, or both.

In each instance in which he retrieved an SD card from the hotel room, Peng then traveled to Beijing, China, shortly thereafter.  The complaint further alleges that Peng was told by an MSS handler, in coded language, where and when to conduct the dead drops, how much money to leave in exchange for the SD cards, and when to return to China to deliver them.  As alleged in the Complaint, the FBI secretly filmed Peng conducting some of the dead drops, and intercepted Peng’s telephone conversations with his MSS handlers in China.

On Friday, Sept. 27, 2019, Peng was arrested at his residence in Hayward and made his initial appearance in federal court in San Francisco before U.S. Magistrate Judge Joseph C. Spero. Magistrate Judge Spero ordered Peng held without bond pending further proceedings. Peng’s next hearing has been scheduled for Oct. 2, 2019, at 10:30 am before the Honorable Jacqueline Corley, 450 Golden Gate Ave., 15th Floor, for a detention hearing and identification of counsel.

A complaint merely alleges that crimes have been committed, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt. If convicted, Peng faces a maximum sentence of 10 years, and a fine of $250,000 for acting as an agent of a foreign government without notifying the United States Attorney General in violation of 18 U.S.C. §  951.  However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

This case is being prosecuted by the Special Prosecutions Section of the United States Attorney’s Office for the Northern District of California and the Counterintelligence and Export Control Section of the Department of Justice, National Security Division.  The prosecution is the result of an investigation by the FBI.

 

Feds Prepare States for Foreign Voting Interference

The Democrats have really lost their argument against voter ID if they are being fully candid about foreign interference. It is without question that several cities and states are victims of ransomware and Florida is especially concerned. Remember that a foreign actor, where clues point to Russia were able to gain access to voter registration databases and it stands to reason China will attempt the same.

Continually, the Democrats say that the Trump administration is virtually doing nothing to protect the election system. Read on as the Democrats know the mission and actions of the Cyber division of the Department of Homeland Security.

Image result for foreign hackers us voting systems photo
As Reuters reports:

The U.S. government plans to launch a program in roughly one month that narrowly focuses on protecting voter registration databases and systems ahead of the 2020 presidential election.

These systems, which are widely used to validate the eligibility of voters before they cast ballots, were compromised in 2016 by Russian hackers seeking to collect information. Intelligence officials are concerned that foreign hackers in 2020 not only will target the databases but attempt to manipulate, disrupt or destroy the data, according to current and former U.S. officials.

“We assess these systems as high risk,” said a senior U.S. official, because they are one of the few pieces of election technology regularly connected to the Internet.

The Cybersecurity Infrastructure Security Agency, or CISA, a division of the Homeland Security Department, fears the databases could be targeted by ransomware, a type of virus that has crippled city computer networks across the United States, including recently in Texas, Baltimore and Atlanta.

“Recent history has shown that state and county governments and those who support them are targets for ransomware attacks,” said Christopher Krebs, CISA’s director. “That is why we are working alongside election officials and their private sector partners to help protect their databases and respond to possible ransomware attacks.”

A ransomware attack typically locks an infected computer system until payment, usually in the form of cryptocurrency, is sent to the hacker.

The effort to counter ransomware-style cyberattacks aimed at the election runs parallel to a larger intelligence community directive to determine the most likely vectors of digital attack in the November 2020 election, according to current and former U.S. officials.

“It is imperative that states and municipalities limit the availability of information about electoral systems or administrative processes and secure their websites and databases that could be exploited,” the FBI said in a statement, supporting the Homeland Security initiative.

CISA’s program will reach out to state election officials to prepare for such a ransomware scenario. It will provide educational material, remote computer penetration testing, and vulnerability scans as well as a list of recommendations on how to prevent and recover from ransomware.

These guidelines, however, will not offer advice on whether a state should ultimately pay or refuse to pay ransom to a hacker if one of its systems is already infected.

“Our thought is we don’t want the states to have to be in that situation,” said a Homeland Security official. “We’re focused on preventing it from happening.”

Over the last two years, cyber criminals and nation state hacking groups have used ransomware to extort victims and create chaos. In one incident in 2017, which has since been attributed to Russian hackers, a ransomware virus was used to mask a data deletion technique, rendering victim computers totally unusable.

That attack, dubbed “NotPetya,” went on to damage global corporations, including FedEx and Maersk, which had offices in Ukraine where the malware first spread.

The threat is concerning because of its potential impact on voting results, experts say.

“A pre-election undetected attack could tamper with voter lists, creating huge confusion and delays, disenfranchisement, and at large enough scale could compromise the validity of the election,” said John Sebes, chief technology officer of the ESET Institute, an election technology policy think tank.

The databases are also “particularly susceptible to this kind of attack because local jurisdictions and states actively add, remove, and change the data year-round,” said Maurice Turner, a senior technologist with the Center for Democracy and Technology. “If the malicious actor doesn’t provide the key, the data is lost forever unless the victim has a recent backup.”

Nationwide, the local governments that store and update voter registration data are typically ill-equipped to defend themselves against elite hackers.

State election officials told Reuters they have improved their cyber defenses since 2016, including in some cases preparing backups for voter registration databases in case of an attack. But there is no common standard for how often local governments should create backups, said a senior Homeland Security official.

“We have to remember that this threat to our democracy will not go away, and concern about ransomware attacks on voter registration databases is one clear example,” said Vermont Secretary of State Jim Condos. “We’re sure the threat is far from over.”

 

CBP Long Beach Chinese Weapons Seizure

Three separate shipments, parts were intercepted in recent weeks, according to law enforcement sources familiar with the matter, and were packed in their own cargo containers on three separate ships that were also carrying household items, apparel, toys, industrial machinery and other imports.

With a Domestic Value of over $378,000 the seized items were found in violation of the Chinese Arms Embargo

LOS ANGELES — U.S. Customs and Border Protection (CBP) at Los Angeles/Long Beach Seaport in coordination with the Machinery Center of Excellence and Expertise (CEE), and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), intercepted and seized 52,601 firearms parts in violation of the Chinese Arms Embargo. The seized items described as sights, stocks, muzzles, brakes, buffer kits, and grips which arrived in three shipments from China, had a combined domestic value of $378,225.00.

CBP officers referred the items to ATF investigators, who confirmed that the firearm parts were in violation of the Arms Export Control Act and International Traffic in Arms Regulations (ITAR), 27 CFR 447.52.

“This seizure is an exceptional example of CBP officers and import specialists vigilance, commitment and keen focus in enforcing complex arms embargo regulations,” said Carlos C. Martel, CBP Director of Field Operations in Los Angeles. “The Chinese Arms Embargo is just one of the hundreds of regulations CBP enforces, ensuring the safety and security of our country.”

Federal regulations impose importation restrictions to certain countries to which the United States maintains an arms embargo, and one of such countries is China.

“We work closely with our strategic partners to ensure import compliance while maintaining the highest standards of security at our nation’s largest seaport,” remarked LaFonda Sutton-Burke, CBP Port Director of the LA/Long Beach Seaport. “This interception underscores the successful collaboration between CBP officers, import specialists and ATF investigators.” In fiscal year (FY) 2018, Office of Field Operations (OFO) seized 266,279 firearms, firearm parts, ammunition, fireworks and explosives at 328 ports of entry throughout the United States. These interceptions represent an increase of 18.4 percent from the previous year.

***

Gotta wonder what led to this. Consider if this is related.  Just 2 months ago…

When federal agents raided the Southern California home of US Customs and Border Protection supervisor Wei “George” Xu in February, they seized an arsenal of more than 250 weapons, including nearly three dozen illegal machine guns, according to court records.

Image result for Wei "George" Xu arrested photo

“Weapons of war,” a prosecutor would later call them.
Xu, 56, was arrested and charged with dealing firearms without a license. He has pleaded not guilty.
But guns are not the reason the veteran officer has been held without bond since his arrest four months ago.
Instead, the Chinese-born naturalized US citizen has remained behind bars amid concerns about his secret-level security clearance and what prosecutors described as “highly suspicious” contacts with Chinese consular officials in Los Angeles.
Prosecutors are also examining the apparent gulf between Xu’s estimated $120,000-to-$130,000 salary as a federal law enforcement officer and his “luxurious lifestyle,” in which he drove a Maserati, went on big game hunting trips to Africa and had approximately $1.4 million in the bank, according to court records. The cache of weapons recovered from Xu’s house was estimated to be worth more than $200,000, according to prosecutors. Additionally, prosecutors allege that Xu and his wife failed to report several years of income from a rental property they’ve owned since 2015.
Xu’s defense attorney, Mark Werksman, said in court papers that his client has lived in the United States for three decades, has no previous criminal record, and, because his passport was seized as part of the investigation, has no ability to travel outside the country.
The lawyer was unsuccessful, however, in his attempt to convince a federal judge at a hearing last month that Xu could be trusted to show up for trial if he was released. The hearing marked the third time Xu’s request for bond was denied.
Annamartine Salick, deputy chief of the Terrorism and Export Crime Section of the US Attorney’s office in Los Angeles and the lead prosecutor on the case against Xu, declined comment.
In a court filing, she cited Xu’s “litany of lies and contempt for the rule of law” as among the reasons he should be denied bond.
Jack Weiss, a former federal prosecutor in Los Angeles who now runs an investigative firm, said the allegations against Xu are especially troubling given his role in law enforcement.
“This is someone you would never want in a position of authority in the US government,” Weiss said. “I imagine there is going to be some kind of internal review as to how it is that he was wearing a badge.”
Born in China, Xu came to the United States on a student visa in the late 1980s. He became a naturalized citizen in 1999. In 2004, following stints in the private sector as an engineer and entrepreneur, he was hired by Customs and Border Protection — a job requiring a secret-level security clearance subject to periodic renewals.
Prior to his arrest in February, Xu worked as a watch commander for CBP at the ports of Los Angeles and Long Beach.
Jaime Ruiz, a spokesman for US Customs and Border Protection, said Xu is now on “indefinite suspension.”
According to prosecutors, Xu repeatedly made false statements and concealed information when he filled out questionnaires for his security clearance under penalty of perjury.
Among other things, prosecutors said, Xu failed to disclose his ownership of two companies that do business with China and his “extensive business contacts with Chinese nationals.”
Agents say they found evidence of a bank account in China in the trash outside Xu’s home and recovered two copies of Chinese passports, bearing the name Wei Xu but featuring photos of other people, from Xu’s desk.
Salick argued at one of Xu’s detention hearings that she’d been told by CBP officers that if Xu falsely claimed to have lost his own passport, he could pretend to be one of the Chinese citizens bearing his name, provide that man’s biographical information to the Chinese consulate, and would likely be issued travel documents to return to China.
Following Xu’s arrest, investigators learned of his “long-standing contact with members of the Consulate General of the People’s Republic of China in Los Angeles,” according to court records.
Agents seized emails, texts and phone records showing that Xu had been communicating with consular officials since at least 2013, according to court records. He was invited to events hosted by the consulate in 2017 and 2018, the records state, and agents reviewed images on his cell phone “appearing to show” that Xu and his wife attended the events.
Attempts to reach Chinese consular officials in Los Angeles were not immediately successful.
Werksman downplayed his client’s purported wealth in a brief interview with CNN, saying, for example, that the Maserati was leased. He said Xu’s companies exported forklift parts and generated limited income. He said the Chinese bank account authorities discovered was opened 20 years ago and contained the relatively meager sum of $1,700.
He also dismissed any intrigue surrounding Xu’s ties to China.
He said in a court filing that the photocopies of passports seized from his office were placed there by co-workers playing a prank on Xu, whose duties include overseeing entry and exit of Chinese vessels in San Pedro, and who was at one point investigating two men who had the same — very common — first and last name that he did.
He said Xu’s contact with consular officials was related to his work at the port, in which he sometimes contacted the consulate about crewmembers on Chinese ships who were seeking asylum in the United States.
“There’s nothing nefarious about it,” he told CNN.
It was while investigating Xu regarding his security clearance that agents discovered his alleged involvement in the illegal gun trade.
In the summer of 2017, FBI agents say they retrieved a spreadsheet listing online accounts and login information from the trash outside Xu’s home. Two of the accounts pertained to a website that acts as a marketplace for private gun sales.
An undercover agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives began corresponding with Xu and eventually purchased four guns.
In one transaction in July, Xu showed up in a 2016 Maserati with an assault rifle in the trunk, according to prosecutors.
The undercover agent commented on the black sedan before giving Xu $1,600 cash for the rifle.
“I’m like you, playboy,” Xu allegedly responded.
Following another deal, in which Xu allegedly sold the agent a rifle and five high-capacity magazines for $2,100, the CBP officer quipped, “We are like drug dealers,” according to a search warrant affidavit.
Werksman described his client as a “nerdy engineer” who collected firearms as a hobby and had no intention of becoming a gun dealer.
“He comes home from work, goes out to the garage and tinkers with guns,” the lawyer said. “He wasn’t going to hurt anyone.”
You can be sure that the drugs https://1canadianantibiotics.com/buy-doxycyclyne-online/ you are buying were stored in a right way because physical pharmacies are regulated by the governmental authorities, which means they offer only authentic over-the-counter and prescription medications;
You do not violate the laws of your nation, because the import of drugs from international drugstores is often prohibited by the legislation of many countries including the US.