How About the Chinese Interfering with Voting in America?

The super PAC Women Vote got a $5.4 million contribution in the form of stock in Chinese tech company Baidu. (notice the date too, seems like foreign interference to me)

In 2016, Women Vote raised almost $38 million and spent just over that. In 2018, they are in the $5 million range, so they need some help right? The political action committee, Women Vote was launched by Emily’s List. Ellen Malcolm is the Founder and Chairman of the Board of Emily’s List and her operation(s) are comprised of top leaders, entrepreneurs and activists committed to pro-choice democratic women according to the website. Another Board member is Lisa Jackson. You remember her right? She was head of the EPA during the Obama administration that too used an alias and non-government emails to conduct official government business. Another Board member is Laura Ricketts. She is the owner of the Chicago Cubs and is a member of the Democratic National Committee’s Executive Committee and was the co-chair of the DNC Finance Committee’s LGBT Leadership Council. Add in Maria Teresa Kumar. She is the founding President and CEO of VOTO Latino. She also serves on the Board of Planned Parenthood, the Latino Leaders Network.

Heck there are many progressive liberals on the Board of Emily’s List. Travel over to the site and check it out.

If you have had some weird messages as a Skype user from Baidu…here is the deal. It is a Chinese multinational technology company. Baidu is a top developer of Artificial Intelligence and highly aligned with China president Xi Jinping. What is interesting is Baidu is under a holding company based in the Cayman Islands. The company is also traded on NASDAQ.

According to Wikipedia, there is some shady history with Baidu.

Domain name redirection attack

On January 12, 2010, Baidu.com’s DNS records in the United States were altered such that browsers to baidu.com were redirected to a website purporting to be the Iranian Cyber Army, thought to be behind the attack on Twitter during the 2009 Iranian election protests, making the proper site unusable for four hours.[23] Internet users were met with a page saying “This site has been attacked by Iranian Cyber Army“.[24] Chinese hackers later responded by attacking Iranian websites and leaving messages.[25] Baidu later launched legal action against Register.com for gross negligence after it was revealed that Register.com’s technical support staff changed the email address for Baidu.com on the request of an unnamed individual, despite failing security verification procedures. Once the address had been changed, the individual was able to use the forgotten password feature to have Baidu’s domain passwords sent directly to them, allowing them to accomplish the domain hijacking.[26][27]

Baidu workers arrested

On August 6, 2012, the BBC reported that three employees of Baidu were arrested on suspicion that they accepted bribes. The bribes were allegedly paid for deleting posts from the forum service. Four people were fired in connection with these arrests.[28]

91 Wireless acquisition

On July 16, 2013, Baidu announced its intention to purchase 91 Wireless from NetDragon. 91 Wireless is best known for its app store, but it has been reported that the app store faces piracy and other legal issues.[29] On August 14, 2013, Baidu announced that its wholly owned subsidiary Baidu (Hong Kong) Limited has signed a definitive merger agreement to acquire 91 Wireless Web-soft Limited from NetDragon Web-soft Inc.[30] for 1.85 billion dollars in what was reported to be the biggest deal ever in China’s IT sector.[31]

There is more like the death of a student from cancer while working at headquarters.

Pretty weird that a Chinese tech company is getting involved with women voting and a political action committee right?

 

Chinese Front Company Used to Recruit Double Agents

THE TRUMP ADMINISTRATION JUST CAUGHT A NEW LEAKER! - US ... photo

Mallory, who had top secret security clearance, worked as a CIA officer, and was stationed in Iraq, China and Taiwan.

Mallory is a self-employed consultant with GlobalEx, LLC. and resides in Leesburg, Virginia. According to the criminal complaint, he graduated from Brigham Young University in 1981 with a bachelor’s degree in political science.

Shortly thereafter, Mallory worked full-time in a military position for five years. Once he left that job, he continued his military service as an Army reservist and worked as a special agent for the State Department Diplomatic Security Service for three years (1987-1990).

 

Kevin Mallory Criminal Complaint by Chris on Scribd

Revealed: Chinese Front Company Used to Recruit U.S. Double Agents

A single reference buried deep within hundreds of pages of court filings in the case of convicted CIA turncoat Kevin Mallory reveals the name of a Shanghai-based “executive search firm” that bears the hallmarks of a classic espionage front, former intelligence operatives from the U.S. and Russia tell The Daily Beast.

The U.S. government’s evidence against Mallory, who was found guilty Friday of espionage-related charges, included a photograph of a business card belonging to alleged Chinese Ministry of State Security (MSS) agent Richard Yang, who presented himself as a corporate headhunter. Prosecutors said he was one of Mallory’s handlers. According to court documents, the picture was taken at Darren & Associates, a supposed corporate recruiter with no listed phone number or executives and an address that traces back to a rent-by-the-hour space on Shanghai’s Hubin Road.

Darren & Associates’ connection to the Mallory case has not been previously reported. The firm has been in business for either “around 40 years,” as its website claims, or since 2014, as stated on its LinkedIn page. The job networking site lists no actual former or current employees, and the company has a near-zero web presence, which is highly unusual for an organization that describes itself as a successful global enterprise.

“Clearly this is phony,” said former KGB sleeper agent Jack Barsky. “The first thing you do to figure out how real [a company is] is look at their website, and this is just not the footprint of a solid company.”

“Clearly this is phony… The first thing you do to figure out how real [a company is] by looking at their website, and this is just not the footprint of a solid company.”
— former KGB sleeper agent Jack Barsky

It’s a “flimsy mechanism for them to use,” agreed former CIA officer Christopher Burgess. “To me, this is what someone would put up so that their business contact isn’t naked. But what it doesn’t do is talk about who they are, where they are, doesn’t give you names, and their mission is so general that it can cover anything.”

Richard Yang subsequently introduced Mallory to an associate, Michael Yang, who claimed to be affiliated with the Shanghai Academy of Social Sciences (SASS). It has a close relationship with the Shanghai State Security Bureau (SSSB), a sub-component of the Ministry of State Security, according to the FBI. The Shanghai security bureau “uses SASS employees as spotters and assessors,” says one court filing, and “FBI has further assessed that SSSB intelligence officers have also used SASS affiliation as cover identities.”

Chinese think tanks like the Shanghai academy “can be used to invite someone over who is either a person of interest or a source,” Peter Mattis of the Jamestown Foundation’s China Program told Bethany Allen-Ebrahimian and Elias Groll of Foreign Policy last year. “That person comes over and gives a talk, and they’ll be met and have meetings with the local state security element or the People’s Liberation Army.”

via Facebook

Others are based in the U.S., they pointed out. The China Institute of Contemporary International Relations describes itself as a “comprehensive research institution” but is also “an official numbered bureau of the Ministry of State Security, functioning rather like the CIA’s Open Source Center.”

Darren & Associates, the erstwhile headhunting firm, seems rather less sophisticated. Either the MSS was “too lazy” to create a more realistic front company, or they thought “no one would give a shit about this Mallory guy and no one would be checking it,” said a former Russian FSB officer now living in the U.S. under the pseudonym “Jan Neumann.”

But U.S. authorities did care, and Mallory’s scheme unraveled in 2017 when he was selected for secondary screening at Chicago’s O’Hare Airport after a trip to China. Although he said he had nothing to declare, customs officers found $16,500 in cash on him.

““An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the Chinese gave him.”
— former CIA officer Christopher Burgess

“An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the MSS gave him,” said Burgess. “He should have picked up the phone and called the FBI and said, ‘Hey, these people say they’re legitimate businesspeople, and I don’t think they are.’ And he should have done that years ago.”

The details of exactly what Mallory gave up have yet to be publicly revealed, and probably won’t ever be, said Burgess. But according to prosecutors, Mallory gave away the most precious secrets of all—the names of U.S. agents in China.

A CIA information review officer said in court last year that the documents Mallory gave to the Chinese contained sensitive intelligence, analysis, and the names of assets that “could reasonably be expected to cause the loss of critical intelligence and possibly result in the lengthy incarceration or death of clandestine human sources.”

”It’s a betrayal in the truest sense of the term,” former CIA Inspector General Frederick Hitz told The Daily Beast.

FBI analysts further determined that Mallory “had completed all of the steps necessary to securely transmit at least four documents…one of which contained unique identifiers for human sources who had helped the U.S. government.”

Some of these files were stored on a Toshiba SD card, which Mallory concealed in aluminum foil and hid in his bedroom closet.

“We overlooked it twice,” FBI Special Agent Melinda Capitano testified Thursday.

“What made you think to open it?” the prosecutor asked.

“Usually in my training, small bits of foil like this contain drugs,” Capitano replied.

via PACER

The foil-wrapped SD card found in Mallory’s home.

Mallory’s defense team claims that the documents were worthless and that he was actually operating as an independent, self-directed counterintelligence officer of sorts to reel in the Chinese agents so he could eventually turn them into U.S. authorities. Burgess calls that “hogwash.” Mallory wasn’t freelancing in counterintelligence, he “was all-in” as an asset, in Burgess’ opinion.

“He was responsive to tasking, he used covert communications to reduce face-to-face interactions with his PRC contact,” said Burgess. “If I was validating a source, those are all indications that I have a good one.”

“He’s throwing something at the wall to see if it sticks,” laughed former Defense Intelligence Agency officer Ray Semko. “Just as long as they get one fool [on the jury] to believe it.”

Mallory’s attorney, Geremy Kamens, declined a request for comment.

Mallory, his wife, and one of his three kids lived in a four-bedroom, four-bathroom, 7,100-square foot house in Leesburg, Virginia, complete with a home theater and two fireplaces. He paid $1.15 million in 2005, a lot of money for a guy prosecutors said earned only $25,000 in the three years—all of it from his Chinese handlers.

He also has three adult children from a previous marriage. A court filing said Mallory had $50,000 in credit card debt, and about $2,500 in cash and investments. His wife, Mariah Nan-Hua Mallory, drives a school bus and earns roughly $9,000 a year.

In a motion previously filed with the court arguing against Mallory’s release pending trial, prosecutors said he had “demonstrated a pattern of dishonesty.”

“The defendant says and does anything he wishes to suit his particular needs, which seem largely to be finding an easy path out of his financial hardship, by betraying his government,” the motion stated.

A disguise kit found by FBI agents during a search of Mallory’s home.

However, Patsy Harrington, a real estate broker and close friend of Mallory’s who sold him his home, insists that Mallory is being totally mischaracterized.

“He is a loyal serviceman that was hurt in the line of duty in the Middle East, he’s a wonderful family man and a devoted Mormon with a wonderful wife and three highly accomplished grown children,” Harrington told The Daily Beast. “He’s a good man. I was a single mom and he was wonderful to me. He’s much better than 97 percent of the human beings I know.”

A LinkedIn recommendation from Min Xu, an associate professor at Central China Normal University describes Mallory as “a very faithful, honest, loyal, serious but kind, helpful, contagious person, very nice to everyone around, I will always remember his timely help and the warmth he gave to us when we were in trouble. He is really an amazing man.”

In fact, the Chinese agents who targeted Mallory initially reached out to him on LinkedIn. It’s a virtual goldmine for those looking to identify members of the “cleared community,” said Christopher Burgess, who has been contacted by people he assumed were foreign intelligence operatives more times than he can count.

via PACER

Yet Chinese intelligence isn’t only interested in people with active security clearances. Anyone with access or influence can potentially be of value, and everyone from professors to scientists to journalists have received overtures from foreign spy services.

National security reporter Garrett Graff was targeted on LinkedIn by Evgeny Buryakov, a Russian SVR operative posing as a New York City investment banker. And a Chinese agent used LinkedIn to reach out to journalist Nate Thayer last year.

“On the day I received my first message from Chinese intelligence agents from the Ministry of State Security, they, of course, didn’t say they were Chinese spies,” Thayer wrote on his blog. “The note was from ‘Frank Hu,’ a ‘project assistant’ from Shanghai Pacific & International Strategy Consulting Co, saying he had found me on the Internet and was writing to ‘seek potential cooperation opportunities.’”

Predictably, there is no “Shanghai Pacific & International Strategy Consulting Co,” which doesn’t even maintain a rudimentary Darren & Associates-style website. “Hu” told Thayer the company was “a consulting firm, specializing in independent policy analysis and advisory services. We strive to help our clients properly assess political dynamics, risks and opportunities in countries and regions they operate in.”

“In terms of human source operations, the PRC ‘services’ are not all that sophisticated,” an intelligence community source told Thayer, “until they get you on their turf. So don’t go there–to Shanghai, that is–for any reason.”

Of course, there is no such thing as a foolproof system in espionage, and breaches like Mallory’s will surely happen again.

As Joseph Wippl, a 30-year veteran of the CIA’s National Clandestine Service, told The Daily Beast, “It’s part of the business.”

The Facts of North Korea Nuclear and WMD Program

Professionals at Los Alamos and Oak Ridge Laboratories estimate it would take up to ten years to dismantle all programs and operations in North Korea. Further, Tehran, Moscow and Beijing will work hard to delay what they can due to eliminating evidence of their respective involvement for decades in North Korea.

NYT’s: The vast scope of North Korea’s atomic program means ending it would be the most challenging case of nuclear disarmament in history. Here’s what has to be done to achieve — and verify — the removal of the nuclear arms, the dismantlement of the atomic complex and the elimination of the North’s other weapons of mass destruction.

Nuclear Capabilities

  • Dismantle and remove
    nuclear weapons

    Take apart every nuclear weapon in the North’s arsenal and ship the parts out of the country.

  • Halt uranium enrichment

    Dismantle the plants where centrifuges make fuel for nuclear reactors and atom bombs.

  • Disable reactors

    Shutter the nuclear reactors that turn uranium into plutonium, a second bomb fuel.

  • Close nuclear test sites

    Confirm that the North’s recent, staged explosions actually destroyed the complex.

  • End H-bomb fuel production

    Close exotic fuel plants that can make atom bombs hundreds of times more destructive.

  • Inspect anywhere, forever

    Give international inspectors the freedom to roam and inspect anywhere.

Non-Nuclear Capabilities

  • Destroy germ weapons

    Eliminate anthrax and other deadly biological arms, under constant inspection.

  • Destroy chemical weapons

    Eliminate sarin, VX and other lethal agents the North has used on enemies.

  • Curb missile program

    Eliminate missile threats to the U.S., Japan and South Korea.

President Trump says he is meeting Kim Jong-un in Singapore because the North Korean leader has signaled a willingness to “denuclearize.’’

But that word means very different things in Pyongyang and Washington, and in recent weeks Mr. Trump has appeared to back away from his earlier insistence on a rapid dismantlement of all things nuclear — weapons and production facilities — before the North receives any sanctions relief.

Whether it happens quickly or slowly, the task of “complete, verifiable, irreversible denuclearization’’ — the phrase that Secretary of State Mike Pompeo keeps repeating — will be enormous. Since 1992, the country has repeatedly vowed never to test, manufacture, produce, store or deploy nuclear arms. It has broken all those promises and built a sprawling nuclear complex.

North Korea has 141 sites devoted to the production and use of weapons of mass destruction, according to a 2014 Rand Corporation report. Just one of them — Yongbyon, the nation’s main atomic complex — covers more than three square miles. Recently, the Institute for Science and International Security, a private group in Washington, inspected satellite images of Yongbyon and counted 663 buildings.

North Korea is the size of Pennsylvania. The disarmament challenge is made worse by uncertainty about how many nuclear weapons the North possesses — estimates range from 20 to 60 — and whether tunnels deep inside the North’s mountains hide plants and mobile missiles.

The process of unwinding more than 50 years of North Korean open and covert developments, therefore, would need to start with the North’s declaration of all its facilities and weapons, which intelligence agencies would then compare with their own lists and information.

***

Nuclear experts like David A. Kay, who led the largely futile American hunt for weapons of mass destruction in Iraq, argue that the North Korean arms complex is too large for outsiders to dismantle. The best approach, he contends, is for Western inspectors to monitor North Korean disarmament. The time estimates range from a few years to a decade and a half — long after Mr. Trump leaves office.

The magnitude of the North Korean challenge becomes clearer when compared with past efforts to disarm other nations. For instance, Libya’s nuclear program was so undeveloped that the centrifuges it turned over had never been unpacked from their original shipping crates. Infrastructure in Syria, Iraq, Iran and South Africa was much smaller. Even so, Israel saw the stakes as so high that it bombed an Iraqi reactor in 1981, and a Syrian reactor in 2007.

Undoing weapons of mass destruction

Full elimination Partial elimination
Steps North Korea Libya Syria Iraq Iran South Africa
Dismantle nuclear arms X X
Halt uranium enrichment X X X / X
Disable reactors X X X X
Close nuclear test sites X X
End H-bomb fuel production X
Destroy germ arms X X
Destroy chemical arms X X / X
Curb missile program X X

Here’s what is involved in each of the major disarmament steps:

Dismantle and remove
nuclear weapons

Under the eye of a declared nuclear state — like
the United States, China or Russia — take apart
every nuclear weapon in the North Korean arsenal
and safely ship the components out of the country.

missile_nkorea.jpg

North Korea released a photograph of the country’s leader, Kim Jong-un, center, inspecting what it said was a hydrogen bomb that could be fitted atop a long-range missile. Korean Central News Agency

John R. Bolton, Mr. Trump’s hawkish national security adviser, has argued that before any sanctions are lifted, the North should deliver all its nuclear arms to the United States, shipping them to the Oak Ridge National Laboratory in Tennessee, where inspectors sent Libya’s uranium gear.

It’s almost unimaginable that the North would simply ship out its weapons — or that the rest of the world would be convinced that it had turned over all of them.

Siegfried S. Hecker, a Stanford professor who formerly headed the Los Alamos weapons laboratory in New Mexico, argues that the only safe way to dismantle the North’s nuclear arsenal is to put the job, under inspection, in the hands of the same North Korean engineers who built the weapons. Otherwise, he said, outsiders unfamiliar with the intricacies might accidently detonate the nuclear arms.

Halt uranium enrichment

Dismantle the plants where centrifuges
spin at supersonic speeds to make fuel
for nuclear reactors and atom bombs.

Factories holding hundreds of centrifuges spin gaseous uranium until it is enriched in a rare form of the element that can fuel reactors — or, with more enrichment, nuclear arms.

It’s easy to shut down such plants and dismantle them. The problem is that they’re relatively simple to hide underground. North Korea has shown off one such plant, at Yongbyon, but intelligence agencies say there must be others. The 2014 Rand report put the number of enrichment plants at five.

Because uranium can be used to fuel reactors that make electricity, North Korea is almost certain to argue it needs to keep some enrichment plants open for peaceful purposes. That poses a dilemma for the Trump administration.

In the case of Iran, it has insisted that all such plants be shut down permanently. After arguing that the Obama administration made a “terrible deal” by allowing modest enrichment to continue in Iran, it is hard to imagine how Mr. Trump could insist on less than a total shutdown in North Korea.

Disable reactors

Shutter nuclear reactors that turn uranium
into plutonium, a second bomb fuel.

Inside a reactor, some of the uranium in the fuel rods is turned into plutonium, which makes a very attractive bomb fuel. Pound for pound, plutonium produces far more powerful nuclear blasts than does uranium. In 1986, at Yongbyon, North Korea began operating a five-megawatt reactor, which analysts say produced the plutonium fuel for the nation’s first atom bombs. Today, the North is commissioning a second reactor that is much larger.

Jan. 17, 2018 image from DigitalGlobe via Institute for Science and International Security

Reactors are hard to hide: They generate vast amounts of heat, making them extremely easy to identify by satellite.

But reactors that produce large amounts of electricity — such as the new one being readied in North Korea — pose a dilemma, because the North can legitimately argue it needs electric power. It seems likely that the Trump administration will come down hard on the North’s new reactor, but might ultimately permit its operation if the North agrees for the bomb-usable waste products to be shipped out of the country.

Close nuclear test sites

Confirm that the North’s recent, staged
explosions actually destroyed the deep
tunnels and infrastructure, or take additional
steps to make the complex unusable.

Atom and hydrogen bombs need repeated testing to check their performance. Since 2006, the North has detonated nuclear devices at least six times in tunnels dug deep inside Mount Mantap, a mile-high peak in the North’s mountainous wilds.

Last month, the North blew up test-tunnel portals at Mount Mantap as a conciliatory gesture before the planned denuclearization talks. Experts say the thick clouds of rising smoke and debris, while impressive for television cameras, leave open the question of whether the damage is irreversible. Presumably, the North could also dig new test sites beneath other mountains. The Trump administration has called for an end to all explosive testing.

End H-bomb fuel production

Close exotic fuel plants that can make atom
bombs hundreds of times more destructive.

At the heart of a missile warhead, an exploding atom bomb can act as a superhot match that ignites thermonuclear fuel, also known as hydrogen fuel. The resulting blast can be 1,000 times more powerful than the Hiroshima bomb. North Korea is suspected of having at least two sites for different aspects of H-bomb fuel production — one at Yongbyon, and one near Hamhung, on the country’s east coast.

The exotic fuels also have civilian uses for the manufacture of glow-in-the-dark lighting, exit signs and runway lights. The Trump administration stance is unclear. Atomic experts say the military threat can be reduced by shuttering large plants, building smaller factories and carefully regulating their products.

Inspect anywhere, forever

In a mountainous country, give
international inspectors the freedom
to roam and inspect anywhere — with
automated monitoring of key sites.

Under past nuclear agreements, inspectors from the International Atomic Energy Agency have lived in North Korea, but their movements were limited to small parts of the giant Yongbyon facility, where the nation’s nuclear reactors are located. For inspections to be effective, they must cover the whole country — including military facilities. (One of Mr. Trump’s complaints about the Iran agreement was that inspectors were inhibited from going anywhere.)

But inspecting all of North Korea — land of underground tunnels — would be an enormous job. American intelligence agencies have spent billions of dollars watching missiles move, mapping likely facilities, and using spy satellites and cyber reconnaissance to track the arms. But they have surely made mistakes, and missed some facilities. The problem gets larger if the inspectors are seeking out underground bunkers that hide missiles for quick strikes.

Destroy germ weapons

Eliminate anthrax and other deadly biological
weapons, under constant inspection.

Biological weapons can be more destructive than nuclear arms. A single gallon of concentrated anthrax is said to have enough spores to kill every person on Earth. The challenge is how to deliver the living weapons. The anthrax attacks of 2001 relied on letters, killing five people, sickening 17 others and frightening the nation.

North Korea is suspected of having a large complex for making germ weapons. The problem is learning its true dimensions, and verifying its dismantlement. While nuclear and missile tests advertise their developmental strides openly, the production and testing of deadly pathogens can be done behind closed doors.

Moreover, experts argue that the gear for producing germ weapons is often identical or similar to that of medicine and agriculture, making it extremely hard if not impossible for outsiders to verify that germ-weapon work has ended. The Trump administration’s stance is unknown other than it wants the North to end all work on biological weapons.

Destroy chemical weapons

Eliminate sarin, VX and other lethal
agents the North has used on enemies.

Last year, the deadly nerve agent VX was used to assassinate Kim Jong-nam, the estranged half brother of the North’s leader. The killing cast light on the North’s long pursuit of chemical weapons. Although the North denies having any, experts rank the nation as among the world’s top possessors, saying it harbors thousands of tons of the banned armaments.

The Trump administration’s negotiating list with the North includes chemical disarmament. Syria is a reminder of the difficulty. President Barack Obama cut a deal with Damascus to destroy its chemical arsenal. This year, the United States accused the Syrian government of using the banned weapons at least 50 times since the civil war began, topping previous official estimates. The attacks have maimed and killed hundreds of Syrians, including many children.

Curb missile program

Eliminate the long-range threat to the U.S. and
mid-range missile threat to Japan and South Korea.

In November, the North tested a greatly improved intercontinental ballistic missile that flew farther than any other — far enough to threaten all of the United States. It was a remarkable achievement that brought the current, long-escalating crisis to a head. While experts say the North still needs to do more testing to ensure that the missile’s warheads can survive fiery re-entry, the test flight showed that Mr. Kim had come remarkably close to perfecting a weapon that could threaten American cities.

Curbing the North’s missile program is high on the Trump administration’s negotiation list. A simple precaution is to limit the range of test flights — a fairly easily thing to monitor. A key question is whether arms negotiators will also try to redirect the North’s large corps of rocket designers and engineers into peaceful activities, such as making and lofting civilian satellites.

When a Fishing Ship is a Chinese Spy Ship

The Chinese are relentless in all parts of the world.

It may not have looked like much of a match — or a showdown for that matter — but when Australia’s largest warship HMAS Adelaide arrived at the Fijian port of Suva on Saturday, it had an interesting neighbour.

Key points:

  • Chinese fishing boat believed to be carrying wide range of surveillance equipment
  • Fiji tipped off Australian Navy about Chinese spy ship expected to dock next to HMAS Adelaide
  • China has a strong commercial and military presence in the South Pacific

A Chinese ship fitted with communications equipment docked alongside the new Canberra-class landing helicopter dock.

The Royal Australian Navy suspects the Chinese vessel is a spy ship, which deliberately arrived at the same time to carry out surveillance on the Australians.

HMAS Adelaide and other Australian warships visiting Fiji will “take the appropriate security precautions”, but the surveillance craft is “just another ship”, Captain Jim Hutton, Commander of the Navy’s Joint Task Group 661, said.

Deputy Chief of Navy Rear Admiral Mark Hammond also played down concerns about the presence of the Chinese vessel.

“That’s a space surveillance ship, it’s a scientific ship,” he told reporters on board HMAS Adelaide.

ABC News understands the primary purpose of the Chinese ship is to track satellite launches from out on the ocean, but it does have the capability to also collect intelligence on other naval vessels.

Australia’s High Commissioner to Fiji John Feakes also revealed the skipper of the Chinese vessel had even been invited to an on-board reception, although it is not clear whether the offer was accepted.

Australia’s Navy, like every navy around the world, is well-versed in these sorts of nautical games.

“If you’re in the Navy you presume that anytime that a fishing vessel or even merchant fleets of nations like China are around that they may have a dual purpose,” ANU academic and retired Australian Naval Commodore Richard Menhinick said.

“You just presume that they may well be tasked by government for other activities.”

China’s looking for South Pacific foothold

Chinese presence — both commercial and military — is common in the South Pacific.

Beijing sees economic opportunity in the region and economic imperatives commonly herald other strategic interests.

Agriculture and aquaculture projects in Vanuatu, Fiji, Tonga and other Pacific nations have been given significant help by the Chinese over the years, as have roads, ports and other infrastructure.

Media player: “Space” to play, “M” to mute, “left” and “right” to seek.

When you have more than 1.3 billion people back home to feed, finding secure food supplies are critical.

As China grows, Mr Menhinick said it was not surprising that the nation’s presence in the Pacific was also increasing.

“China’s a rising power… economic power’s always led and the military’s followed, and the Chinese economic interest in the south-west Pacific has increased substantially over the last fifteen year,” he said.

But Australia and its strategic partners are anxious China does not use its presence to jeopardise regional structures — political, economic and diplomatic.

Now a visiting US General has given the strongest public indication yet that his nation would like Australia to join in naval and air patrols to challenge Beijing’s claims in the South China Sea.

Asked whether joint American-Australian patrols would be welcomed by America, the commander of US Marines in the Pacific, Lieutenant General David Berger gave an enthusiastic response.

“Obviously that’s Australia’s decision, would we welcome that? Absolutely yes,” Lt Gen Berger said.

Meanwhile, all eyes are on Singapore….but in advance of the talks between the United States and North Korea in Singapore, there was a LOT of nefarious activity.

Related reading: Emissary Panda – A potential new malicious tool

photo

Independent: Hackers from China and Russia are targeting South Korea with cyber espionage attacks ahead of the summit between the US and North Korea, a leading security firm has claimed.

The foreign ministry and financial institutions were identified as potential targets by, US cyber security firm FireEye.

The company’s analysts noted the timing of the attacks and said they expected the intensity of the operations to increase in the build up to the historic meeting between US President Donald Trump and North Korean Chairman Kim Jong-un.

“South Korea has frequently been the target of cyber espionage. Though the biggest threat is North Korea actors. [FireEye] believes that China- and Russia- [based hackers] also target South Korea,” Ben Read, a cyber espionage analyst at the firm, told The Independent.

“With the heightened attention to inter-Korean relations in the lead up to a potential Trump–Kim meeting, we expect this targeting to continue at an increased pace.”

Scheduled to take place on 12 June in Singapore the leader are expected to discuss the denuclearisation of North Korea.

It will be the first meeting between a sitting US president and leader of North Korea.

Some experts have suggested that a formal end to the  Korean War – more than six decades after the 1950-1953 conflict – could be declared.

Although an armistice was signed, no peace treaty has ever been signed to formally end the war.

The two hacking groups identified by the FireEye researchers were TempTick and Turla, both of which are suspected of being state-sponsored operations.

TempTick has previously been involved in attacks on Chinese dissident organisations, as well as Japanese public and private sector institutions. It has been active since 2009.

The earliest known attacks linked to the group known as Turla are from 2006.

FireEye researchers noted: “They consistently target governments worldwide in search of information that can inform Russian government decision making.”

 

Is a Chinese Hack on our Naval Weapons an Act of War?

It is long been a question of the point that a foreign hack for espionage and theft is an act of war with emphasis on our naval weapons programs or those of the Army or Air Force.

Cyber warfare is an issue few care about or have control over because data resides outside of our individual control but that is NOT the case when it comes to government. They are accountable for safeguarding networks and data.

After a hiatus of several years, Chinese state hackers are once again penetrating networks at a range of U.S. corporations in a campaign to steal secrets and leapfrog ahead in a race for global technology supremacy, cyber researchers say.

Companies in fields such as biomedicine, robotics, cloud computing and artificial intelligence have all been hit by cyber intrusions originating in China, the researchers say.

“It’s definitely accelerating. The trend is up,” said Dmitri Alperovitch, cofounder and chief technology officer at CrowdStrike, a threat intelligence firm based in Sunnyvale, Calif.,

Chinese state hacking teams linked to the People’s Liberation Army and the Ministry of State Security are becoming visible on U.S. networks again, although they are using new methods to remain undetected, researchers said.

“In the last few months, we’ve definitely seen … a reemergence of groups that had appeared to have gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at FireEye, a cybersecurity firm that has tracked China hacking extensively.

The activity comes after a sharp drop in Chinese hacking that began in September 2015, when former President Barack Obama and Chinese leader Xi Jinping reached an agreement to end the hacking theft of commercial secrets. The agreement quelled U.S. anger over its charge that China is the “world’s most active and persistent perpetrator of economic espionage.”

U.S. prosecutors in 2014 indicted five PLA officers for economic espionage for hacking into firms like Westinghouse, U.S. Steel and Alcoa. The 56-page indictment said the five men worked for Unit 61398 of the PLA’s Third Department in Shanghai. The highly detailed complaint entered into details that U.S. officials later said were meant to “name and shame” China for commercial hacking.

Why China’s hackers may be getting back into the game is not readily clear. Renewed trade tensions may be a reason. President Donald Trump has threatened to impose $50 billion of tariffs on China-made products to cut the U.S. trade deficit of $375 billion with China.

Another factor may be the conclusion of a massive reorganization of China’s military, which began in late 2015 and under which various signals intelligence and cyber hacking units “were dissolved and absorbed into this one mega organization, called the Strategic Support Force,” said Priscilla Moriuchi, an expert on East Asia at Recorded Future, a cyber-threat intelligence firm based in Somerville, Mass.

China’s Xi has laid out ambitious goal of catching up with the United States and Europe in 10 key sectors, including aerospace, semiconductors and robotics, under its “Made in China 2025” program.

Moriuchi, who spent 12 years in the U.S. intelligence community, eventually leading the National Security Agency’s East Asia and Pacific cyber threats office, said China’s hackers are broadening tactics, burrowing into telecommunications networks even as they steal secrets to help party leaders achieve “Made in China 2025” goals.

“The sectors that they are going after are things like cloud computing, (Internet of Things), artificial intelligence, biomedicines, civilian space, alternative energy, robotics, rail, agricultural machinery, high-end medical devices,” Moriuchi said.

“There are companies in all of these sectors that have experienced intrusions over the past year from actors who are believed to be China state-sponsored,” she said.

Since early in the past decade, U.S. officials have alleged that Chinese state hackers were tasked with obtaining commercial secrets from Western corporations to help Chinese firms, many of them state-owned, overtake competitors to the global forefront in technology.

In a renewed warning alert for China, a March 22 report from the Office of the U.S. Trade Representative on China’s trade actions said, “Beijing’s cyber espionage against U.S. companies persists and continues to evolve.

So as you read about the stolen data from the Navy by China consider this: Should the NSA get inside the Chinese networks now and infect and or re-steal our intelligence?

Unmanned underwater vehicles take advantage of advanced ... photo

(Note: according to the Washington Post item below, the contractor is not named, however ‘Inside Defense’ in September of 2016 published an item that GD Electric Boat was awarded the $105.5 million contract modification moving it into the second phase.)

electric boat « Breaking Defense - Defense industry news ... photo

WaPo: Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.

The officials did not identify the contractor.

Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.

The Washington Post agreed to withhold certain details about the compromised missile project at the request of the Navy, which argued that their release could harm national security.

The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network. The officials said the material, when aggregated, could be considered classified, a fact that raises concerns about the Navy’s ability to oversee contractors tasked with developing cutting-edge weapons.

The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in east Asia. The news comes as the Trump administration is seeking to secure Beijing’s support in persuading North Korea to give up nuclear weapons, even as tensions persist between the United States and China over trade and defense matters.

The Navy is leading the investigation into the breach with the assistance of the FBI, officials said. The FBI declined to comment.

On Friday, the Pentagon inspector general’s office said that Defense Secretary Jim Mattis had asked it to review contractor cybersecurity issues arising from The Post’s story.
Navy spokesman Cmdr. Bill Speaks said, “There are measures in place that require companies to notify the government when a ‘cyber incident’ has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.”

Speaks said “it would be inappropriate to discuss further details at this time.”

Altogether, details on hundreds of mechanical and software systems were compromised — a significant breach in a critical area of warfare that China has identified as a priority, both for building its own capabilities and challenging those of the United States.

“It’s very disturbing,” said former Sen. Jim Talent (R-Mo.,) who is a member of the U.S. China Economic and Security Review Commission. “But it’s a of a piece with what the Chinese have been doing. They are completely focused on getting advanced weapons technology through all kinds of means. That includes stealing secrets from our defense contractors.” Talent had no independent knowledge of the breach.
Undersea priority

The Sea Dragon project is an initiative of a special Pentagon office stood up in 2012 to adapt existing U.S. military technologies to new applications. The Defense Department, citing classification levels, has released little information about Sea Dragon other than to say that it will introduce a “disruptive offensive capability” by “integrating an existing weapon system with an existing Navy platform.” The Pentagon has requested or used more than $300 million for the project since late 2015 and has said it plans to start underwater testing by September.

Military experts fear that China has developed capabilities that could complicate the Navy’s ability to defend U.S. allies in Asia in the event of a conflict with China.

The Chinese are investing in a range of platforms, including quieter submarines armed with increasingly sophisticated weapons and new sensors, Adm. Philip S. Davidson said during his April nomination hearing to lead U.S. Indo-Pacific Command. And what they cannot develop on their own, they steal — often through cyberspace, he said.

“One of the main concerns that we have,” he told the Senate Armed Services Committee, “is cyber and penetration of the dot-com networks, exploiting technology from our defense contractors, in some instances.”

In February, Director of National Intelligence Daniel Coats testified that most of the detected Chinese cyber-operations against U.S. industry focus on defense contractors or tech firms supporting government networks.

In recent years, the United States has been scrambling to develop new weapons or systems that can counter a Chinese naval buildup that has targeted perceived weaknesses in the U.S. fleet. Key to the American advantage in any faceoff with China on the high seas in Asia will be its submarine fleet.

“U.S. naval forces are going to have a really hard time operating in that area, except for submarines, because the Chinese don’t have a lot of anti-submarine warfare capability,” said Bryan Clark, a naval analyst at the Center for Strategic and Budgetary Assessments. “The idea is that we are going to rely heavily on submarines in the early effort of any conflict with the Chinese.”

China has made closing the gap in undersea warfare one of its three top military priorities, and although the United States still leads the field, China is making a concerted effort to diminish U.S. superiority.

“So anything that degrades our comparative advantage in undersea warfare is of extreme significance if we ever had to execute our war plans for dealing with China,” said James Stavridis, dean of the Fletcher School of Law and Diplomacy at Tufts University and a retired admiral who served as supreme allied commander at NATO.

The U.S. military let its anti-ship weaponry languish after the Cold War ended because with the Soviet Union’s collapse, the Navy no longer faced a peer competitor on the seas. But the rapid modernization and buildup of the Chinese navy in recent years, as well as Russia’s resurgent forces at sea, have prompted the Pentagon to renew heavy investment in technologies to sink enemy warships.

The introduction of a supersonic anti-ship missile on U.S. Navy submarines would make it more difficult for Chinese warships to maneuver. It would also augment a suite of other anti-ship weapons that the U.S. military has been developing in recent years.
Ongoing breaches

For years, Chinese government hackers have siphoned information on the U.S. military, underscoring the challenge the Pentagon faces in safeguarding details of its technological advances. Over the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter; the advanced Patriot PAC-3 missile system; the Army system for shooting down ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s new Littoral Combat Ship, a small surface vessel designed for near-shore operations, according to previous reports prepared for the Pentagon.

In some cases, suspected Chinese breaches appear to have resulted in copycat technologies, such as the drones China has produced that mimic U.S. unmanned aircraft.

[Chinese cyberspies stole a long list of U.S. weapons designs]

Speaks, the Navy spokesman, said: “We treat the broader issue of cyber intrusion against our contractors very seriously. If such an intrusion were to occur, the appropriate parties would be looking at the specific incident, taking measures to protect current information, and mitigating the impacts that might result from any information that might have been compromised.”

The Pentagon’s Damage Assessment Management Office has conducted an assessment of the damage, according to the U.S. officials. The Office of the Secretary of Defense declined to comment.

Theft of an electronic warfare library, Stavridis said, could give the Chinese “a reasonable idea of what level of knowledge we have about their specific [radar] platforms, electronically and potentially acoustically, and that deeply reduces our level of comfort if we were in a close undersea combat situation with China.”

Signals and sensor data is also valuable in that it presents China with the opportunity to “know when we would know at what distance we would be able to detect their submarines” — again a key factor in undersea battles.

Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department.

Although the Chinese People’s Liberation Army is far better-known than the MSS when it comes to hacking, the latter’s personnel are more skilled and much better at hiding their tracks, said Peter Mattis, a former analyst in the CIA counterintelligence center. The MSS, he said, hack for all forms of intelligence: foreign, military and commercial.

In September 2015, in a bid to avert economic sanctions, Chinese President Xi Jinping pledged to President Barack Obama that China would refrain from conducting commercial cyberespionage against the United States. Following the pact, China appeared to have curtailed much, although not all, of its hacking activity against U.S. firms, including by the People’s Liberation Army.

Both China and the United States consider spying on military technology to fall outside the pact. “The distinction we’ve always made is there’s a difference between conducting espionage in order to protect national security and conduct military operations, and the theft of intellectual property for the benefit of companies inside your country,” said Michael Daniel, the White House cybersecurity coordinator under Obama.