Apple Bans 39,000 Apps After Demands by the CCP

And counting…including the newly launched conservative open free speech social media site Parler.

HONG KONG (Reuters) – Apple removed 39,000 game apps on its China store Thursday, the biggest removal ever in a single day, as it set year-end as deadline for all game publishers to obtain a license.

The takedowns come amid a crackdown on unlicensed games by Chinese authorities.

Including the 39,000 games, Apple removed more than 46,000 apps in total from its store on Thursday. Games affected by the sweep included Ubisoft title Assassin’s Creed Identity and NBA 2K20, according to research firm Qimai.

Qimai also said only 74 of the top 1,500 paid games on Apple store survived the purge.

Apple did not immediately respond to a request for comment.

Apple initially gave game publishers an end-of-June deadline to submit a government-issued licence number enabling users to make in-app purchases in the world’s biggest games market.

Apple later extended the deadline to Dec. 31. Cases still pending.

China’s Android app stores have long complied with regulations on licenses. It is not clear why Apple is enforcing them more strictly this year.

Analysts said the move was no surprise as Apple continues to close loopholes to fall in line with China’s content regulators, and would not directly affect Apple’s bottom line as much as previous removals.

“However, this major pivot to only accepting paid games that have a game license, coupled with China’s extremely low number of foreign game licenses approved this year, will probably lead more game developers to switch to an ad-supported model for their Chinese versions,” said Todd Kuhns, marketing manager for AppInChina, a firm that helps overseas companies distribute their apps.

In December, shares of Apple (NASDAQ:AAPL) were down a bit after the company removed thousands of paid game apps from its China App Store. Meanwhile, Disney (NYSE:DIS) stock rose after the company reportedly plans a price increase for its ESPN+ streaming service.

The Wall Street Journal reported last week that tech giant Apple planned to remove thousands of game apps from its App Store in China due to government pressure. Apple reportedly warned Chinese developers earlier this month that paid gaming apps were at risk of removal.

China requires paid video games to be licensed before being released, a policy that has been in effect for the past four years. However, app developers have been able to get around that rule on Apple’s platform. Apple began closing the loophole this year, the Journal reports.

On Thursday, Apple followed through by removing 39,000 game apps from its China App Store, according to Reuters. These include popular titles like Assassin’s Creed Identity and NBA 2K20. Just 74 of the top 1,500 paid game apps on the China App Store are still available, according to research firm Qimai.

The license requirement applies to paid games and games with in-app purchases, so the move by Apple could push more developers to opt for an ad-supported model. Apple takes a cut from sales of apps and in-app content, so such a shift would hurt Apples sales in China. source

*** Expect more stock price decline given the recent anti-trust cases in the legal pipeline against Apple and other big tech corporations. Apple and Google both take a cut of the revenue of the apps on their respective stores.

***

The factory in China where Apple products, specifically iPhones, undergo final assembly has approximately 230,000 workers. In the US, there are only 83 cities that have the same population as this factory’s number of employees. Meaning the number of possible workers in the US is not enough to cover Apple’s needs.

In China, an estimated quarter of their workforce lives in company-owned dormitories. These barracks are located on factory property. Many people are living and working at the factory. Such jobs are in high demand in China, and they can hire many people overnight. These examples prove that the measure, speed, and efficiency of Chinese manufacturing surpass anything the US is presently capable of. (read slave labor)

'Made in China 2025': is Beijing's plan for hi-tech ...

Apple is a willing partner in the China 2025 plan. You will then understand the China policy of President Trump and Secretary of State, Mike Pompeo.

Continue reading…you need to understand the past implications and those when Biden takes office.

When the US and ultimately the rest of the Western world began to engage China, resulting in China finally being allowed into the World Trade Organization in the early 2000s, no one really expected the outcomes we see today.

There is no simple disengagement path, given the scope of economic and legal entanglements. This isn’t a “trade” we can simply walk away from.

But it is also one that, if allowed to continue in its current form, could lead to a loss of personal freedom for Western civilization. It really is that much of an existential question.

Doing nothing isn’t an especially good option because, like it or not, the world is becoming something quite different than we expected just a few years ago—not just technologically, but geopolitically and socially.

China and the West

Let’s begin with how we got here.

My generation came of age during the Cold War. China was a huge, impoverished odd duck in those years. In the late 1970s, China began slowly opening to the West. Change unfolded gradually but by the 1990s, serious people wanted to bring China into the modern world, and China wanted to join it.

Understand that China’s total GDP in 1980 was under $90 billion in current dollars. Today, it is over $12 trillion. The world has never seen such enormous economic growth in such a short time.

Meanwhile, the Soviet Union collapsed and the internet was born. The US, as sole superpower, saw opportunities everywhere. American businesses shifted production to lower-cost countries. Thus came the incredible extension of globalization.

We in the Western world thought (somewhat arrogantly, in hindsight) everyone else wanted to be like us. It made sense. Our ideas, freedom, and technology had won both World War II and the Cold War that followed it. Obviously, our ways were best.

But that wasn’t obvious to people elsewhere, most notably China. Leaders in Beijing may have admired our accomplishments, but not enough to abandon Communism.

They merely adapted and rebranded it. We perceived a bigger change than there actually was. Today’s Chinese communists are nowhere near Mao’s kind of communism. Xi calls it “Socialism with a Chinese character.” It appears to be a dynamic capitalistic market, but is also a totalitarian, top-down structure with rigid rules and social restrictions.

So here we are, our economy now hardwired with an autocratic regime that has no interest in becoming like us.

China’s Hundred-Year Marathon

In The Hundred-Year Marathon, Michael Pillsbury marshals a lot of evidence showing the Chinese government has a detailed strategy to overtake the US as the world’s dominant power.

They want to do this by 2049, the centennial of China’s Communist revolution.

The strategy has been well documented in Chinese literature, published and sanctioned by organizations of the People’s Liberation Army, for well over 50 years.

And just as we have hawks and moderates on China within the US, there are hawks and moderates within China about how to engage the West. Unfortunately, the hawks are ascendant, embodied most clearly in Xi Jinping.

Xi’s vision of the Chinese Communist Party controlling the state and eventually influencing and even controlling the rest of the world is clear. These are not merely words for the consumption of the masses. They are instructions to party members.

Grand dreams of world domination are part and parcel of communist ideologies, going all the way back to Karl Marx. For the Chinese, this blends with the country’s own long history.

It isn’t always clear to Western minds whether they actually believe the rhetoric or simply use it to keep the peasantry in line. Pillsbury says Xi Jinping really sees this as China’s destiny, and himself as the leader who will deliver it.

To that end, according to Pillsbury, the Chinese manipulated Western politicians and business leaders into thinking China was evolving toward democracy and capitalism. In fact, the intent was to acquire our capital, technology, and other resources for use in China’s own modernization.

It worked, too.

Over the last 20–30 years, we have equipped the Chinese with almost everything they need to match us, technologically and otherwise. Hundreds of billions of Western dollars have been spent developing China and its state-owned businesses.

Sometimes this happened voluntarily, as companies gave away trade secrets in the (often futile) hope it would let them access China’s huge market. Other times it was outright theft. In either case, this was no accident but part of a long-term plan.

Pillsbury (who, by the way, advises the White House including the president himself) thinks the clash is intensifying because President Trump’s China skepticism is disrupting the Chinese plan. They see his talk of restoring America’s greatness as an affront to their own dreams.

In any case, we have reached a crossroads. What do we do about China now?

Targeted Response

In crafting a response, the first step is to define the problem correctly and specifically. We hear a lot about China cheating on trade deals and taking jobs from Americans. That’s not entirely wrong, but it’s also not the main challenge.

I believe in free trade. I think David Ricardo was right about comparative advantage: Every nation is better off if all specialize in whatever they do best.

However, free trade doesn’t mean nations need to arm their potential adversaries. Nowadays, military superiority is less about factories and shipyards than high-tech weapons and cyberwarfare. Much of our “peaceful” technology is easily weaponized.

This means our response has to be narrowly targeted at specific companies and products. Broad-based tariffs are the opposite of what we should be doing. Ditto for capital controls.

They are blunt instruments that may feel good to swing, but they hurt the wrong people and may not accomplish what we want.

We should not be using the blunt tool of tariffs to fight a trade deficit that is actually necessary. The Chinese are not paying our tariffs; US consumers are.

Importing t-shirts and sneakers from China doesn’t threaten our national security. Let that kind of trade continue unmolested and work instead on protecting our advantages in quantum computing, artificial intelligence, autonomous drones, and so on.

The Trump administration appears to (finally) be getting this. They are clearly seeking ways to pull back the various tariffs and ramping up other efforts.

China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.

Stop Using Zoom, Second Warning

The first warning came last March.

March: As remote work surges amid the coronavirus pandemic, the FBI issued a public bulletin Monday warning Zoom and other video teleconferencing services may not be as private, or as secure, as users may assume.

Use of Zoom and similar services has exploded in recent weeks as companies, schools, governments, and individuals increasingly turn to its teleconferencing as ways to keep businesses and classrooms afloat while sheltering in pace or working from home. However the shift also represents an opportunity for attackers, as white supremacists, hackers and other trolls barge into digital meetings, a phenomenon known as “Zoombombing.”

In Massachusetts, there have been several incidents, including an unintended participant joining a high school’s virtual classroom only to yell profanities and reveal personal information about the teacher, according to the FBI. Another unwelcome participant with swastika tattoos joined a separate Massachusetts school’s Zoom meeting, the FBI reports.

“The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language,” the FBI cautioned. “As individuals continue the transition to online lessons and meetings, the FBI recommends exercising due diligence and caution in your cybersecurity efforts.”

It’s not just private businesses and children whose meetings could be Zoombombed. Privacy and security issues in conferencing software may also pose risks to national security, as world leaders convene Zoom meetings. In some cases, world leaders such as U.K. Prime Minister Boris Johnson have shared screenshots of their teleconferencing publicly only to reveal Zoom meeting IDs, raising concerns that sensitive information could be compromised. More here.

Stupidly, government officials at all levels are using Zoom including the Biden presidential team. How dangerous is that? Those officials are not reading the warnings or the news? Yeesh

 

Zoom Biden Rally

For more proof, again this month…

Justice Department/December 2020: China-Based Executive at U.S. Telecommunications Company Charged with Disrupting Video Meetings

It is not only the U.S. that is sounding the warnings. The Telegraph reports warnings that “opportunistic criminals” (a formulation that’s practically redundant), can be expected to use bogus invitations to sessions in their social engineering efforts.

Connecticut Teen Arrested for Allegedly 'Zoom Bombing ... source

A security executive with the video-tech giant Zoom worked with the Chinese government to terminate Americans’ accounts and disrupt video calls about the 1989 massacre of pro-democracy activists in Tiananmen Square, Justice Department prosecutors said Friday.

The case is a stunning blow for Zoom, one of the most popular new titans of American tech, which during the pandemic became one of the main ways people work, socialize and share ideas around the world. The California-based company is now worth more than $100 billion.

But the executive’s work with the Chinese government, as alleged by FBI agents in a criminal complaint unsealed Friday in a Brooklyn federal court, highlights the often-hidden threats of censorship on a forum promoted as a platform for free speech. It also raises questions about how Zoom is protecting users’ data from governments that seek to surveil and suppress people inside their borders and abroad.

Prosecutors said the China-based executive, Xinjiang Jin, worked as Zoom’s primary liaison with Chinese law enforcement and intelligence services, sharing user information and terminating video calls at the Chinese government’s request.

Jin monitored Zoom’s video system for discussions of political and religious topics deemed unacceptable by China’s ruling Communist Party, the complaint states, and he gave government officials the names, email addresses and other sensitive information of users, even those outside China.

Jin worked also to end at least four video meetings in May and June, including video memorial calls with U.S.-based dissidents who’d survived the crackdown by Chinese military forces that killed thousands of students and protesters. The Chinese government works to censor any acknowledgment of the massacre, including on social media outside China.

A Zoom spokesperson said in a statement Friday that the company has cooperated with the case and launched its own internal investigation. Jin, the company said, shared “a limited amount of individual user data with Chinese authorities,” as well as data on no more than 10 users based outside China. Jin was fired for violating company policies, the statement said, and other employees have been placed on administrative leave until the investigation is complete.

In an updated statement on Zoom’s website, the company said it “fell short” by terminating the meetings instead of only blocking access to participants in China, to abide by Chinese law. The company said it has reinstated the victims’ accounts and will no longer allow requests from the Chinese government to affect users outside mainland China.

“As the DOJ makes clear, every American company, including Zoom and our industry peers, faces challenges when doing business in China,” the company said in its statement. “We will continue to act aggressively to anticipate and combat ever-evolving data security challenges.”

Jin could not be reached for comment. Though Jin lives in China and is not in U.S. custody, officials said he could be transferred to the United States to face prosecution if he travels to a country that has an extradition treaty with the U.S.

A spokesperson for the Chinese embassy in Washington did not respond to requests for comment.

Human-rights activists this summer said their Zoom accounts had been abruptly terminated shortly before or after they’d hosted video calls commemorating the 31st anniversary of the Tiananmen Square protests, a bloody crackdown captured in the iconic photo of a man standing in front of a Chinese tank.

Zoom said in a statement then that the company “must comply with laws in the countries where we operate.” While the company said it regretted “that a few recent meetings with participants both inside and outside of China were negatively impacted,” the statement said it was not in the company’s power “to change the laws of governments opposed to free speech.”

Zhou Fengsuo, a student leader during the Tiananmen Square protests who had his paid Zoom account terminated this summer, told The Washington Post on Friday that he had worked with the FBI on the case and saw the charges as “tremendous news.”

“It’s so eye-opening to me how this U.S. company, having this connection, would report directly to” the Chinese Communist Party and “disrupt our meetings regularly on behalf of the CCP,” he said. “This executive was working for the government and police as an agent of persecution, and Zoom was paying this guy for doing that job.”

Prosecutors charged Jin, also known as Julien Jin, with conspiracy to commit interstate harassment and to transfer a means of identification. Jin, 39, had worked at the company since 2016, most recently as a “Security Technical Leader,” the complaint said.

Quoting from electronic messages between Jin and other Zoom employees, FBI agents outlined a months-long, high-pressure campaign by China’s “Internet Police” to view users’ video calls and suppress unwanted speech. In one April message, Jin said he had been summoned to a meeting with Chinese government officials who demanded that Zoom develop the capability to terminate any “illegal meeting” within one minute. In others, Jin sent meeting passwords and other sensitive internal data directly to Chinese law enforcement.

In the complaint, FBI agents said that Zoom employees in the U.S. had agreed to a Chinese government “rectification” plan that entailed migrating data on roughly 1 million users from the U.S. to China, thereby subjecting it to Chinese law. Zoom also agreed, the complaint states, to provide “special access” to Chinese law enforcement and national-security authorities. In one message cited in the complaint, Jin wrote that the authorities had wanted him to share detailed lists of the company’s “daily monitoring” of “Hong Kong demonstrations, illegal religions” and other subjects.

To terminate the Tiananmen Square calls, the complaint alleges, Jin’s co-conspirators fabricated evidence that they were intended to discuss child abuse, racism, terrorism and violence. Jin’s co-conspirators also entered some calls with fake accounts that used pornographic or terrorist-related profile images, and Jin pointed to those images as evidence to terminate the meetings and suspend the hosts’ accounts.

John Demers, the assistant attorney general for national security, said the firm had, like many others that do business in China, put itself in a difficult position by operating in an authoritarian country whose laws and practices often “run antithetical to our values.”

“The company was focused on complying with Chinese law and the expectations of Chinese law enforcement,” Demers said. “But what happened over time is those expectations increased. So it goes from, ‘Well, respond to our lawful requests,’ to ‘You must take action within a minute to shut down any action on your platforms’ – not just in China, but outside – that hits upon topics of sensitivity to the Chinese government.”

That pressure, he noted, spans many industries: He cited the controversy last year involving the National Basketball Association, in which the general manager of the Houston Rockets tweeted in support of Hong Kong protesters, leading to a backlash in China.

“The case is an illustration of the choices that companies are forced to make when they do business in China . . . [and] how the Chinese government will take advantage of the leverage they have over you to push their agenda,” he said. “You’ve got a consistent pattern of the Chinese government using economic leverage – the opportunity to access markets, foreign investments – in order to further political goals.”

John Scott-Railton, a researcher at the Citizen Lab in Toronto, said the filing showed how authoritarian governments have increasingly looked at major tech companies as top-priority intelligence targets ripe for infiltration and recruitment.

He pointed to another case last year against two former Twitter employees charged with spying on behalf of Saudi Arabia, including by sending the personal information of thousands of people, including Saudi critics and prominent dissidents.

The charges were announced on the same day that the Trump administration added four Chinese companies to the Commerce Department entity list for enabling human rights abuses within China by providing DNA-testing materials or high-technology surveillance equipment to the Chinese government. They were among 59 Chinese companies Commerce add to its export control entity list, including companies that have been accused of stealing trade secrets and using U.S. exports to support the Chinese military.

Zoom has faced questions before about how it guards against the potential misuse of video data by the Chinese government, which censors major news and social media websites beneath what’s known as a “Great Firewall.”

This spring, Scott-Railton and another researcher found the company had routed American users’ data through Chinese servers, potentially opening it to Chinese-government data requests. The company later said it had “mistakenly” sent American video calls to Chinese data centers amid a flood of calls.

Zoom employs more than 2,500 people around the world, including, as of last year, more than 500 in China who develop the software installed in computers around the world.

The company’s billionaire chief executive, Eric Yuan, was born in China but moved to Silicon Valley in the late ’90s, where he worked for the video start-up WebEx before founding Zoom in 2011.

The Federal Trade Commission last month reached a settlement with Zoom, in which the company resolved allegations that it had misled users about their data privacy and encryption measures by agreeing to new security rules.

Questions over business dealings in China have become more commonplace as a new wave of Chinese tech start-ups has gained international popularity and acclaim. TikTok, the wildly popular short-video app owned by the Beijing-based tech company ByteDance, drew suspicions of censorship from users last year because searches on the site related to topics suppressed by the Chinese government, such as the Tiananmen Square massacre or the Hong Kong pro-democracy protests, showed few or no videos.

Internal guidelines for the site also mimicked Chinese-government censorship policies, and former employees for the company told The Post last year that key content-moderation decisions for international users were made in China. TikTok has said it has worked in recent months to distance its U.S. operations from the company’s Chinese headquarters.

Wang Dan, a Chinese dissident whose Zoom call on Tiananmen Square was also disrupted this spring, said the case showed how China could threaten free expression for people in the West.

“Interfering with the freedom of speech of those who have settled and lived in the United States in exile is . . . a serious attack to American sovereignty,” he told The Post on Friday. “The American people should also pay more attention to the [Chinese Communist Party’s] threat of American democracy.”

 

Increased Alarm over Intrusion into U.S. and Sandia/Los Alamos

WASHINGTON (AP) — Federal authorities expressed increased alarm Thursday about an intrusion into U.S. and other computer systems around the globe that officials suspect was carried out by Russian hackers. The nation’s cybersecurity agency warned of a “grave” risk to government and private networks.

The Cybersecurity and Infrastructure Security Agency said in its most detailed comments yet that the intrusion had compromised federal agencies as well as “critical infrastructure” in a sophisticated attack that was hard to detect and will be difficult to undo.

CISA did not say which agencies or infrastructure had been breached or what information taken in an attack that it previously said appeared to have begun in March.

“This threat actor has demonstrated sophistication and complex tradecraft in these intrusions,” the agency said in its unusual alert. “CISA expects that removing the threat actor from compromised environments will be highly complex and challenging.”

President Donald Trump, whose administration has been criticized for eliminating a White House cybersecurity adviser and downplaying Russian interference in the 2016 presidential election, has made no public statements about the breach.

President-elect Joe Biden said he would make cybersecurity a top priority of his administration, but that stronger defenses are not enough.

“We need to disrupt and deter our adversaries from undertaking significant cyberattacks in the first place,” he said. “We will do that by, among other things, imposing substantial costs on those responsible for such malicious attacks, including in coordination with our allies and partners.”

The cybersecurity agency previously said the perpetrators had used network management software from Texas-based SolarWinds t o infiltrate computer networks. Its new alert said the attackers may have used other methods, as well.

Over the weekend, amid reports that the Treasury and Commerce departments were breached, CISA directed all civilian agencies of the federal government to remove SolarWinds from their servers. The cybersecurity agencies of Britain and Ireland issued similar alerts.

A U.S. official previously told The Associated Press that Russia-based hackers were suspected, but neither CISA nor the FBI has publicly said who is believed be responsible. Asked whether Russia was behind the attack, the official said: “We believe so. We haven’t said that publicly yet because it isn’t 100% confirmed.”

Another U.S. official, speaking Thursday on condition of anonymity to discuss a matter that is under investigation, said the hack was severe and extremely damaging although the administration was not yet ready to publicly blame anyone for it.

“This is looking like it’s the worst hacking case in the history of America,” the official said. “They got into everything.”

The official said the administration is working on the assumption that most, if not all, government agencies were compromised but the extent of the damage was not yet known.

This hack had nothing to do with President Trump firing Director Krebs at CISA even though Associated Press keeps suggesting. But things just took a turn for the bad bad side –>

Sandia National Laboratories - From the Manhattan Project to a National Lab Sandia

Texas A&M System part of team awarded lucrative Los Alamos National Lab  contract | The Texas Tribune Los Alamos

The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation and the Richland Field Office of the DOE. The hackers have been able to do more damage at FERC than the other agencies, the officials said, but did not elaborate.

Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”

Spokespeople for DOE did not immediately respond to requests for comment.

The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.

DOE officials were planning on Thursday to notify the House and Senate Energy committees, House and Senate Energy and Water Development subcommittees, House and Senate Armed Services committees, and the New Mexico and Washington State delegations of the breach, the officials said.

The FBI, Cybersecurity and Infrastructure Security Agency, and Office of the Director of National Intelligence acknowledged the “ongoing” cybersecurity campaign in a joint statement released on Wednesday, saying that they had only become aware of the incident in recent days.

“This is a developing situation, and while we continue to work to understand the full extent of this campaign, we know this compromise has affected networks within the federal government,” the statement read.

NNSA is responsible for managing the nation’s nuclear weapons, and while it gets the least attention, it takes up the vast majority of DOE’s budget. Similarly, the Sandia and Los Alamos National Labs conduct atomic research related to both civil nuclear power and nuclear weapons. The Office of Secure Transportation is tasked with moving enriched uranium and other materials critical for maintaining the nuclear stockpile.

Hackers may have been casting too wide a net when they targeted DOE’s Richland Field Office, whose primary responsibility is overseeing the cleanup of the Hanford nuclear waste site in Washington state. During World War II and the Cold War, the U.S. produced two- thirds of its plutonium there, but the site hasn’t been active since 1971.

The attack on the Federal Energy Regulatory Commission may have been an effort to disrupt the nation’s bulk electric grid. FERC doesn’t directly manage any power flows, but it does store sensitive data on the grid that could be used to identify the most disruptive locations for future attacks.

US Companies Riddled with Members of Chinese Communist Party

Latest CHINESE COMMUNIST PARTY | The Straits Times

Primer:

In his speech just a few days ago at Georgia Tech University: Pompeo called China’s Communist Party “the central threat of our time” and highlighted efforts by Chinese security services to pressure and recruit Chinese academics and students as spies.

“Americans must know how the Chinese Communist Party is poisoning the well of our higher education institutions for its own ends and how those actions degrade our freedoms and American national security,” Pompeo said.

“If we don’t educate ourselves, if we’re not honest about what’s taking place, we’ll get schooled by Beijing.”

NYP: As we try to come to terms with the extent of Chinese influence over the Biden family, a leaked database of registered members of the Chinese Communist Party has exposed a mass infiltration of American companies — with serious national security implications.

Boeing, Qualcomm and Pfizer are just three US companies that have employed dozens of CCP members in their Chinese facilities, the database reveals.

As well, three female employees of the US consulate in Shanghai have been identified in the list of 1.95 million party members that was leaked to an international group of legislators, the Inter-Parliamentary Alliance on China, which includes Sens. Marco Rubio (R-Fla.) and Bob Menendez (D-NJ).

All CCP members swear an oath to “fight for communism throughout my life, be ready at all times to sacrifice my all for the party and the people, and never betray the party [and] guard party secrets, be loyal to the party.”

Sen. Josh Hawley (R-Mo.), a member of the Homeland Security Committee, said yesterday: “CCP agents have no place in US government facilities, and this report should serve as a much-needed wake-up call to Washington, DC, and corporate executives, who continue to welcome the Chinese government with open arms.

“[It] is just more evidence of the extent to which the CCP has successfully infiltrated American companies and government.”

While none of the people listed in the database have been identified as spies, mounting concerns in the State Department about the CCP have resulted in tightened visa rules for its members earlier this month. CCP members and their immediate families now are limited to one-month, single-entry US permits.

The database was verified by international cybersecurity firm Internet 2.0, which found it was originally leaked on encrypted messaging app Telegram in 2016. It was passed on to IPAC six weeks ago by a third party.

“We have high confidence this list is authentic,” Internet 2.0 co-founder David Robinson, a former Australian army intelligence officer, told me Sunday.

“Someone — an insider, a dissident — managed to get physical access to the server [in Shanghai] from outside the building. They didn’t have to hack it over the internet.”

Each data entry contains the CCP member’s name, ethnicity, place of birth, education level, identification number and, in some cases, a phone number and address.

Robinson has verified the identity of three women who work at the US consulate in Shanghai.

The three, all listed as ethnic Han college graduates, are registered in a 31-strong Communist Party branch listed as Shanghai Foreign Institutional Service Co., which is a state-owned employment agency, which provides local staff for foreign consulates, schools and news media.

A department spokesperson yesterday had no comment about “an allegedly leaked database of Communist Party members” and said “the department does not discuss security protocols or personnel matters.”

However, she said: “Influence and interference operations are fundamental to how the Chinese Communist Party engages with the world.

“China’s role in the world today cannot be understood without reference to the wide array of malign activities that the [CCP] undertakes to influence our societies in ways that are covert, coercive and corrupting.”

The CCP database is split into 79,000 branches.

For example, Boeing has 17 branches, totaling 252 CCP members. Sixteen members are part of Boeing’s Hongqiao Maintenance Base Boeing Line Maintenance Division . . . First Workshop Party Branch; 22 are in the Second Workshop Party Branch; 13 are in the Third Workshop Party Branch, 14 in the Fourth Workshop Party Branch.

There are four subdivisions of the Pudong Maintenance Base Boeing Line Maintenance Branch, totaling 49 members.

Two branches of the Pudong Maintenance Base Boeing Line Maintenance Branch Cargo Aircraft Line Maintenance total 33 members.

Also listed are 27 members of the Party Branch of Boeing Fourth Branch of the Flight Department of Eastern Airlines Yunnan Co. and 23 members of the China Eastern Airlines Beijing Maintenance Department Party Committee Boeing Maintenance Workshop Party Branch.

Boeing spokesman Bradley Akubuiro said last night the company was satisfied with its security.

“As a global company, we enforce strict security protocols and maintain secure firewalls to protect both our customer and company proprietary data in all countries we operate in.”

According to the database, 96 members in the Qualcomm Wireless Communication Technology (China) Co. Ltd. Party Branch, and 133 additional members spread over six party branches of Qualcomm Enterprise Management (Shanghai) work for semiconductor manufacturer and 5G wireless technology company Qualcomm, a US-based multinational.

Qualcomm was awarded a contract by the Defense Department in 2018 to develop multifactor authentication security systems for US military computers.

Another US company crucial to national security is pharmaceutical giant Pfizer, which began rolling out COVID-19 vaccines Sunday.

The database lists 69 CCP members in four Pfizer branches in Shanghai.

Neither Qualcomm nor Pfizer responded to inquiries yesterday.

New York University also appears with 71 members attached to a branch named East China Normal University Shanghai New York University Faculty and Labor Party Branch.

The database leak comes just days after a number of disturbing revelations involving CCP infiltration of American institutions:

Director of National Intelligence John Ratcliffe warned that China has targeted members of Congress and poses “the greatest threat to democracy and freedom” since World War II.
Secretary of State Mike Pompeo warned of China’s infiltration of US universities, which are “hooked on Communist cash” and stifle criticism of Beijing.
Media reports identified Rep. Eric Swalwell (D-Calif.), a member of House Intelligence Committee, as one of several San Francisco politicians courted by Chinese spy Christine Fang.

It was confirmed last week that Joe Biden’s son Hunter is under federal investigation over tax fraud and potential money-laundering over his foreign business dealings, including in China.

“Communist China has been allowed to infiltrate our universities and corporations with people loyal to only the Communist Party,” former Acting Director of National Intelligence Ric Grenell said Sunday.

“Our beloved Chinese American community has been warning us about these tactics for many years, and the political class has ignored those warnings.”

*** Communist party is 'leader of all religions' in China - world news - Hindustan Times

Sensitive data of around two million members of the Communist Party of China (CPC) have been leaked, highlighting their positions in major organizations, including government agencies, throughout the world.

According to reports from The Australian newspaper, featured in the Economic Times, the information includes official records such as party position, birthdate, national ID number and ethnicity. It revealed that members of China’s ruling party hold prominent positions in some of the world’s biggest companies, including in pharmaceutical giants involved in the development of COVID-19 vaccines like Pfizer and financial institutions such as HSBC.

The investigation by The Australian centred around the data leak, which was extracted from a Shanghai server in 2016 by Chinese dissidents.

It noted that CPC members are employed as senior political and government affairs specialists in at least 10 consulates, including the US, UK and Australia, in the eastern Chinese metropolis Shanghai. The paper added that many other members hold positions inside universities and government agencies.

The report emphasized there is no evidence that spying for the Chinese government or other forms of cyber-espionage have taken place.

In her report, The Australian journalist and Sky News host Sharri Markson commented: “What’s amazing about this database is not just that it exposes people who are members of the Communist Party, and who are now living and working all over the world, from Australia to the US to the UK, but it’s amazing because it lifts the lid on how the party operates under President and Chairman Xi Jinping.

“It is also going to embarrass some global companies who appear to have no plan in place to protect their intellectual property from theft, from economic espionage.”

In September, the Cybersecurity and Infrastructure Security Agency (CISA) and the US Department of Justice issued a joint advisory warning US government agencies and private sector companies to be on high alert for cyber-attacks by threat actors affiliated with the Chinese Ministry of State Security (MSS).