My Car is Full of Absentee Ballots

Primer: President Trump called on the U.S. attorney in Minnesota to investigate a report of alleged illegal ballot harvesting by supporters of Rep. Ilhan Omar in Minnesota.

Project Veritas, an investigative reporting project that uses undercover journalists, released a report on Sunday night that claimed Omar’s supporters in Minneapolis were illegally collecting blank ballots and bragging about it on social media. Trump condemned the actions depicted in the video in a tweet posted on Sunday night.

“This is totally illegal. Hope that the U.S. Attorney in Minnesota has this, and other of her many misdeeds, under serious review??? If not, why not??? We will win Minnesota because of her, and law enforcement. Saved Minneapolis & Iron O Range!” Trump wrote.

The report focuses on ballot harvesting, a practice Trump and other Republicans have condemned for years. Ballot harvesting is when a third party, often volunteers or campaign staff, collects ballots directly from the homes of voters to deliver them to polling stations. The third-party harvesters can be paid hourly for their work.

Most states that allow voters to have a third party deliver their ballots have a limit on the number of ballots that can be collected by an individual. California is the exception, which allows unlimited ballot collection so long as the harvesters are paid hourly and not per ballot. Full article here.

ProjectVeritas:

  • Ballot Harvester Liban Mohamed: “Money is Everything. Money is the King in this World. If You Got No Money, You Should Not Be Here, Period. You Know What I am Saying? Money is Everything and a Campaign is Managed By Money.”
  • Mohamed: “Numbers Do Not Lie. Numbers Do Not Lie. You Can See My Car is Full. All These Here Are Absentee Ballots. Can’t You See? Look at All These, My Car is Full.”
  • Paid Voter: “When We Sign The Voting Document and They Fill It Out Is When They Give Us The Money,”… “The Minute We Signed The Thing [Ballot] For The Election. That’s When We Get paid.”
  • Ballot Harvesting Triangle: River Plaza Apartments, Horn Towers seniors Community and 980 Hennepin Polling Site All Subject to Fraud
  • Minneapolis Somali Community Insider: “It’s an Open Secret” … “She [Ilhan Omar] Will Do Anything That She Can Do To Get Elected and She [Omar] Has Hundreds of People on The Streets Doing That.”
  • Seniors at Horn Towers Ballots Compromised; Harvester: We “Request” Ballots For The Seniors and Then Take Them Away.

[Minneapolis–Sept. 27, 2020] Project Veritas investigators revealed a ballot harvesting scheme here involving clan and political allies and associates of Rep. Ilhan Omar (D.-Minn.) in the first of a series of reports.

***

“Numbers don’t lie. Numbers don’t lie. You can see my car is full. All these here are absentees’ ballots. Can’t you see? Look at all these, my car is full. All these are for Jamal Osman… We got 300 today for Jamal Osman only,” said Liban Mohamed in a series of Snapchat videos posted July 1 and July 2 on his own Snapchat profile.

Mohamed said he was collecting the ballots to help his brother win the city’s Aug. 11 special election for a vacant Ward 6 city council race—which was held the same day as the primary for Omar’s MN-05 congressional seat. Ward 6 is the heart of the city’s Somali community and the Omar’s political base.

James O’Keefe, the founder and CEO of Project Veritas, said: “Ballot harvesting is real and it has become a big business. Our investigation into this ballot harvesting ring demonstrates clearly how these unscrupulous operators exploit the elderly and immigrant communities—and have turned the sacred ballot box into a commodities trading desk.”

O’Keefe said, “We are showing Americans what is really going on in one of our great cities—but, it’s not me saying—we have the operators on tape saying it all themselves.”

Our investigation found that among three locations inside Ward 6, a ballot harvesting triangle, where the scheme operates: the Riverside Plaza apartments, the senior citizen community at Horn Towers and the Minneapolis Elections and Voter Services office at 980 E. Hennepin Ave., which also functions as a voting location and ballot drop-off site.

Mohamed continued: “Money is everything. Money is the king in this world. If you got no money, you should not be here period. You know what I am saying.”

***

Mohamed said that his political methods are interwoven with money. “Money is everything and a campaign is managed by money. You cannot campaign with $200 or $100 you got from your grandmother or grandfather. You cannot campaign with that. You gotta have an investment to campaign. You gotta have fundraisers.”

Hennepin County Attorney Jeff Wojciechowski told a Project Veritas journalist on a recorded line the ballot harvesting conduct described to him was: “Illegal, and we will be investigating.”

Somali insider stepped forward to expose election corruption in Minneapolis

Central to the Project Veritas investigation was Omar Jamal, political insider active in the city’s Somali community. Jamal works with the Ramsey County Sheriff Department and is the chairman of the Somali Watchdog Group. “I have been involved in the community for the last 20 years.”

***

“Omar Jamal is the latest brave Project Veritas Insider to come forward and expose a voter fraud scheme in Minnesota that will shock you,” said O’Keefe. “When we spoke with Omar Jamal, he actually repeated part of our PV Insider motto: ‘Do Something.’”

Jamal said he was motivated to reach out to Project Veritas, because he wants to eliminate the corruption that weakens his community, such as the ballot harvesting practiced by Minnesota’s Democratic-Farmer-Labor Party, in which Ilhan Omar has emerged as a rising power broker.

“It’s an open secret,” he said. “she [Omar] will do anything that she can do to get elected and she has hundreds of people on the streets doing that.”

The political insider said he hopes there is still time to clean up elections in the country.

“If American people don’t pay attention to what’s happening, the country will collapse,” he said.

“The regulations, if you ignore that and you let corruption and fraud become a daily business and then tough luck, the country will not exist as they [Americans] know it,” Jamal said.

“I’m afraid it’s already too big to stop, you know, maybe it’s too late. Maybe it’s already too big to stop,” he said. “There’s a lot of people invested in this, you know, and they don’t care how they did it: ‘We win,’ and that’s it.”

Ballot Harvester described how his own ballot was harvested by Omar operatives

Jamal, as part of his participation in the investigation, interviewed a Somali-American who functions as a ballot harvester his community. In the interview, the harvester described how he was paid to vote in the Aug. 11 special election and primary, along with a Project Veritas undercover journalist.

The harvester said Somali-American vote-buying operatives from the Omar machine came to his apartment building to oversee the voter filling out the paperwork.

Omar operatives request the ballots and fill them out for the voters, he said.

“They come to us. They came to our homes. They said: ‘This year, you will vote for Ilhan,’” he said. “They said: ‘We will make the absentee ballots. We will fill out the forms for you and when you get them back, we will again fill it out and send it.”

There was no need to go to the voting site, because the Omar operatives told him: “You stay home and you will not go to the place.”

After the ballots are signed and documented the harvester said he got paid.

“When we sign the voting document and they fill it out is when they give us the money,” he said. “The minute we signed the thing [ballot] for the election. That’s when we get paid.”

Ballot harvester describes how he targets elderly voters

Omar Jamal: So they [ballot harvesters] will request it [the ballot] for the elderly?
Ballot harvester: Yes. They [ballot harvesters] request [the ballot] for them [the elderly].
Omar Jamal: And it [the ballot] is taken away from them [elderly]?
Ballot Harvester: Yes. It [the ballot] is taken away from them [elderly].

DFL operative describes why he did not speak up about the election corruption

A political operative, known as Jamal, for Minnesota’s Democratic-Farmer-Labor Party, which functions as the state’s official chapter of the national Democratic Party, told a Project Veritas undercover journalist he was afraid to speak up when he saw abuses of the voting system.

“They fight you if you speak up,” Jamal said. “Like what? Like what can I do? Like get jumped? Hell no. They ain’t got—no, no, I’m good.”

The DFL operative said he also saw Mohamed’s Snapchat videos. “I was looking at them and they were not filled. They were blank.”

*** 

“Liban didn’t get it in a unique way,” he said. “He just gets them the way that everybody before him, or even, maybe even after him will do, which is go to the elders, maybe bait them and collect and help to them and he’s helping them–so, I think that’s the process of collecting from the seniors, from their buildings.”

The Insider said another corrupting effect is the miseducation of the city’s new immigrants.

“We have to understand that the immigrants mostly, here now, are first generation immigrants,” he said.

“Through no fault of their own the new immigrants are learning about democracy from the ballot harvesters,” he said. “When they get here, because of that ignorance, not knowing how this, all things work. Sometimes they even think it’s legal.” – he said.

Documented ballot harvesting, vote buying violates federal and state law

Jered Ede, the chief legal officer for Project Veritas, said Mohamed and his confederates may have violated both state and federal election laws, some carrying a maximum penalty of five years imprisonment.

“The federal laws, 18 USC §597 and 52 U.S.C. §10307(c), are quite clear,” he said. “In the case of 18 USC §597, it is punishable by up to two years in prison and in the case of 52 USC §10307 it’s punishable by up to $10,000 in fines and up to five years in prison.”

The Minnesota statute, 211B.13(1) prohibits paying a person or receiving money to register to vote or to vote, he said. “This is a state felony punishable by more than one-year imprisonment.”

Beyond paying voters, there are also state and federal laws regarding intimidation of voters, he said.

“The federal laws 52 USC §20511, 18 USC §594 and 52 USC §10307(b) and the Minnesota statue 211B.07 law prohibit anyone from using undue influence threats intimidation or fraud to influence a person’s vote or to influence them to vote at all,” he said.

It’s also a violation of federal law for anyone who votes for others illegally:

“The punishment under 52 USC §10307(e) also goes up to five years’ incarceration and a $10,000 fine,” he said.

“In addition to those statutes, Minnesota has another statute, 211B.11(3), which makes it a misdemeanor to induce or persuade a voter to vote for or against a candidate, while transporting the voter to the polls,” he said.

Former campaign worker comes forward

One Minneapolis-based source, who is a former political worker, told Project Veritas journalists on the night of the Aug. 11 special election and primary that Omar’s campaign manager Ali Isse Gainey is a key player in the ballot harvesting scheme.

***

The source said, “[Gainey], who’s working in Ilhan’s campaign is the one who is managing the voting place. They bring them. They line them. They put the open ballots in there and then they take them in and say, ‘Here,’ and the people mark [the ballots].”

The practice is pervasive she said.

“They’re accepting temporary addresses; they’re accepting all kind of shenanigans,” she said.

“People that are showing their ID: ‘I moved 30 days ago, my ID’s not come back.’ ‘OK, just give us the last four of your social and tell us the address,’ and then somebody else will say ‘Yeah.’ They will send people who are helping them vote and saying: ‘Yeah, I can vouch for this madness,’” she said.

The former campaign worker said Isse and the Omar-connected political machine have turned voter fraud into an organized process for application, registering and tracking the harvested ballots from collection to delivering to polls.

“They have perfected this system,” she said. “This is what they do. They will tell you we are applying for your ballot. They take a picture of your social security and your driver’s license. They have a database. When the ballot comes, they track it, sometimes, they make fake emails. They track the ballot. Then, they come and pick up the ballot—unopened,” she said.

“So, there is vested interest, but we are victims of the system,” she said. “They [the Omar political machine] don’t give a shit about any Somali.”

***

Our source was disgusted by the exploitation of her vulnerable community.

“No, and the ones that didn’t vote on ballots, the young people, and the women and stuff, they were paying cash, cash, cash,” she said. “They were carrying bags of money. And when you vote and they mark you off, then you get in the van, they give you the cash.”

Chinese Embassy in NY is a Spy Hub, so is the UN

Primer:

January of 2020, a reported United Nations hacked revealed the infiltration of spies.
A New York City police officer

charged with acting as an agent for China  

has been denied bail by a US federal judge in New York. And in January of 2020

  NYPD Officer Allegedly Acted as Agent for Chinese ...

Prosecutors pointed to Baimadajie Angwang’s financial records showing “unusually large” wire transfers to and from China and the possibility that the 33-year-old defendant – a naturalised US citizen who is accused of spying on fellow ethnic Tibetans – might flee to China’s consulate in New York.

Magistrate Judge Roanne Mann of the US Justice Department’s Eastern District of New York granted the request for continued detention on Monday because “no credible sureties” were offered to assure that Angwang would appear for court proceedings. Angwang is a community affairs police officer in the borough of Queens as well as a US Army reservist stationed at Fort Dix in New Jersey. The indictment against Angwang highlighted his familial and financial ties to China, noting that his brother was a reservist in the People’s Liberation Army. Wire transfers from China to accounts with Angwang’s name in the US in 2014 and 2016 amounted to nearly US$120,000, including one US$49,985 transfer from his brother, prosecutors said. He faces up to 55 years in prison if convicted.

NR: Secretary of State Mike Pompeo said that the Chinese consulate in New York City is a center for espionage, in comments to the New York Post on Thursday.

Pompeo’s remarks came after the Justice Department charged an NYPD officer on Monday with spying for China. The officer, Baimadajie Angwang, is accused of arranging invitations for Chinese officials to NYPD events, in order to gain access to senior ranks of the NYPD.  Angwang is an ethnic Tibetan who also gathered information for China on Tibetans in the city.

The Justice Department alleged that Angwang was in contact with at least two consulate officials. Pompeo said there would likely be additional arrests of agents connected with the consulate.

Officials in the consulate are “engaged in activities where they’re crossing the line from normal diplomacy to the kinds of things that would be more akin to what spies are doing,” Pompeo told the Post.

In addition to the New York consulate, Pompeo warned that China’s spying efforts may extend to its United Nations personnel.

“Remember, not only do we have Chinese consulates here, but there’s a UN facility, too,” Pompeo said. “So if we’re talking about New York, we not only have the Chinese Consulate in New York — that is the bilateral consulate — they also have a large contingent of Chinese diplomats here for United Nations work.”

China has attempted to influence state and local politics in the U.S. through its consular missions, across various locations. National Review has reported that the wife of the Chinese Consulate-General in Chicago sent emails to Wisconsin’s State Senate President Roger Roth in February, asking Roth to “consider adopting a resolution expressing solidarity with the Chinese people in fighting the coronavirus.”

The U.S. ordered the closure of China’s consulate in Houston on July 22, citing unspecified “massive illegal spying and influence operations” emanating in part from the consulate. Nearby residents called the fire department after consulate workers began burning piles of documents in the courtyard of the complex.

CIA Labs Launches for Advanced Research Projects

This new initiative is to allow the agency to attract and retain scientists and engineers, who are highly sought after by some of America’s top technology firms, like Google and Oracle. MIT’s Technology Review, which wrote about this initiative, referred to it as a “skunkworks”.

The Central Intelligence Agency announced Monday the launch of its first-ever federal lab, a new internal organization that will allow its officers to obtain patents and licenses for intellectual property they create while working at the agency.

The new office, called CIA Labs, will be an in-house research and development office through which the spy agency will develop the future technology it needs for intelligence collection for national security, while also helping U.S. economic security, according to Dawn Meyerriecks, head of CIA’s Directorate of Science and Technology, in an agency press release.

CIA Labs photo

In a speech last week at the Intelligence and National Security Summit, Meyerriecks listed several broad areas where the agency has intellectual property that could “change the conversation” around key emerging technologies. She listed 5G, battery technology, augmented and virtual reality, artificial intelligence and machine learning, computation, geospatial information representation, navigation, and analytics as areas of focus.

“It’s an endless list that we collectively own, but the world desperately needs,” Meyerriecks said. “And if your attitude is ‘I will get this to production and then I will wait for the next procurement opportunity,’ then we are collectively part of the problem, not part of the solution.”

She added that the agency already has two provisional patents, but didn’t go into detail.

The lab is an investment the CIA is making to recognize the entrepreneurs inside the agency, an area not covered by the intelligence community’s other innovation and advanced research hubs, In-Q-Tel and the Intelligence Advanced Research Projects Activity.

The federal lab designation will allow the agency to strengthen its connection to academia, industry and the 300 federal labs across the United States. The CIA press release added that the labs will allow for internship and externships for officers. CIA labs will also provide career incentives at the agency because the investors can receive license revenue from users outside the agency.

“Some phenomenal innovations have come from CIA over the years, and with CIA Labs, we’re now better positioned to optimize developments and further invest in our scientists and technologists. In an evolving threat landscape, CIA Labs will help us maintain our competitive edge and protect our nation,” Meyerriecks said in a statement Monday.

*** CIA Labs to focus on blockchain research among other areas ... photo

Officers who develop new technologies at CIA Labs will be allowed to patent, license, and profit from their work, making 15% of the total income from the new invention with a cap of $150,000 per year. That could double most agency salaries and make the work more competitive with Silicon Valley.

CIA Labs is looking at areas including artificial intelligence, data analytics, biotechnology, advanced materials, and high-performance quantum computing.

One example of an immediate problem Meyerriecks says the agency faces is being overwhelmed by the amount of data it collects. Militaries and intelligence agencies around the world deal in a multitude of sensors like, for instance, the kind of tech found on drones. The CIA’s own sensors suck up incalculable mountains of data per second, she says. Officers badly want to develop massive computational power in a relatively small, low-power sensor so the sorting can be done quickly on the device instead of being sent back to a central system.

Of course, efforts to develop new technology inevitably run into questions about how it will actually be used, especially at an agency that has long been a fundamental instrument of American power. Some inventions have been uncontroversial: during the Cold War, Meyerriecks says, the agency helped develop lithium-ion batteries, an innovative power source now widely used by the public. More recently, however, during the war on terrorism, the agency poured resources into advancing nascent drone technology that has made tech-enabled covert assassination a weapon of choice for every American president since 9/11 despite despite ongoing controversy over its potential illegality.

SecDef Says China, Russia Have ‘Weaponized Space’

Primer: Now we are beginning to understand the creation of the new military branch known as the Space Force and further it is important to embrace the work of NASA and SpaceX.

Is the Space Force Necessary? If Done Correctly, Yes | CyberDB

A year ago, two intelligence agencies have recently released documents that describe in general terms the nature of the threat. Russia and China are developing kinetic and non-kinetic means designed to disrupt, degrade and destroy U.S. space systems. Mechanisms being tested include directed energy weapons such as lasers, spacecraft that can physically manipulate satellites, terrestrial anti-satellite munitions, jammers that can disrupt uplinks and downlinks, and cyber tools that can impair satellites, ground stations and the equipment of warfighters reliant on space-based systems.

For instance, China is believed to possess 120 intelligence and reconnaissance satellites, many of which are operated by the People’s Liberation Army to track the movements of U.S. forces. Russia only possesses about 20 such satellites. And while Russia pioneered development of systems for hacking and attacking U.S. space systems, it is China that is continually increasing it outlays for counterspace technologies. For example, Beijing tested an anti-satellite weapon in 2007 and has continued refining that technology.

With a typical Army combat brigade containing 2,000 pieces of equipment dependent on space systems to function, this is a serious matter. In wartime, counterspace attacks could prevent the joint force from accessing GPS signals vital to the operation of smart bombs, block the transmission of critical intelligence, and even impede the ability of the president to receive timely warning of a nuclear attack. The nation’s entire global military posture could be degraded by disruption of links traveling through orbital assets. More here from Forbes

The U.S. plan for a Space Force risks escalating a 'space arms race'

China and Russia have introduced weapons to space, including killer satellites, Secretary of Defense Mark Esper said Wednesday.

“In space, Moscow and Beijing have turned a once peaceful arena into a warfighting domain,” Esper said.

“They have weaponized space through killer satellites, directed energy weapons, and more in an effort to exploit our systems and chip away at our military advantage.”

Directed energy weapons use converted chemical or electrical energy and focus it on a target, resulting in physical damage. Weapons used by the U.S. military include systems that use high energy lasers.

Directed energy weapons can be very effective against swarm attacks, a Pentagon official said in 2018.

“We often think about directed energy as large lasers, and I’ve certainly been involved with some of that for decades, but we also have high power microwaves which can be very effective as what we call an electronics kill,” Dr. Michael D. Griffin, under secretary of Defense for Research and Engineering, said at the time.

NTD Photo

Chief of Naval Operations Adm. John Richardson inspects new technologies being developed and tested at the High Energy Laser Systems Test Facility and USS Desert Ship, a land-based launch facility designed to simulate a ship at sea, at White Sands Missile Range, N.M., on Jan. 25, 2017. (Navy photo by Chief Petty Officer Elliott Fabrizio)

“That sort of thing—it’s really hard to envision handling swarming attacks by purely kinetic means—so that’s one of the future threats that I think we face.”

Killer satellites are satellites with the capability to kill and destroy.

**

Esper said America’s competitors and adversaries “exploit cyberspace to undermine our security without confronting our conventional strengths.”

“They do this all in an increasingly gray zone of engagement that keeps us in a perpetual state of competition. The national defense strategy guides us as we adapt the force to this challenging complex security environment by status quo and continue outpacing the competition,” he added.

But strong investment is enabling the military to move forward with developing hypersonic weapons and other modern tools.

“Thanks to our largest research and development budget in the department’s history, we are advancing critical technologies to maintain our military edge in areas such as hypersonic weapons, directed energy and autonomous systems,” Esper said.

Esper was speaking during the Air Force Association’s Virtual Air, Space & Cyber Conference.

Following an increase of $3.6 billion, the Department of Defense’s budget for research and development was $95.3 billion in fiscal year 2019, according to its financial report (pdf).

President Donald Trump’s administration officially launched Space Force late last year, establishing it as a sixth branch of the military.

“Amid grave threats to our national security, American superiority in space is absolutely vital,” Trump said when signing legislation that included funding for the branch.

The Defense Space Strategy, released earlier this year, outlines what the United States needs to do to achieve a “comprehensive military advantage” in space within 10 years.

Three key objectives are identified for the Space Force: to maintain America’s space superiority; to provide space support to all joint military operations; and to “ensure space stability”—or to deter aggression and uphold international agreements in space with a persistent presence, similar to how the Navy polices international waters.

Esper said he’s proud of the progress made in implementing the strategy, which will “ensure our dominance across all domains.”

Esper spoke a day after Gen. John Raymond, who heads Space Force.

Raymond revealed that the force’s Space Based Infrared System satellites were used to detect Iranian missiles aimed at American war planes in January.

Raymond praised the 2nd Space Warning Squadron at Buckley Air Force Base, Colorado.

“They operated the world’s best missile warning capabilities and they did outstanding work, and I’m very very proud of them,” he said at the conference.

Trump had said “an early warning system that worked very well” helped avoid U.S. casualties, but didn’t disclose the nature of the system.

 

U.S. Charges 5 Chinese for Hacking 100 Companies

US says APT41 orchestrated intrusions at more than 100 companies across the world, ranging from software vendors, video gaming companies, telcos, and more.

The US government has filed charges today against five Chinese nationals for hacking into more than 100 companies across the world, part of a state-sponsored hacking group known as APT41.

According to court documents unsealed today, US officials said the group has hacked software development companies, computer hardware manufacturers, telecommunications providers, social media companies, video game companies, healthcare, non-profit organizations, universities, think tanks, from where they stole proprietary source code, code-signing certificates, customer data, and valuable business information.

Image

Victim companies resided in countries such as the US, Australia, Brazil, Chile, Hong Kong, India, Indonesia, Japan,
Malaysia, Pakistan, Singapore, South Korea, Taiwan, Thailand, and Vietnam.

US officials said APT41 members also compromised foreign government computer networks in India and Vietnam, as well as pro-democracy politicians and activists in Hong Kong. Attacks against he UK government were also executed, but were not successful.

The APT41 group is one of today’s most infamous and most active state-sponsored hacking groups. ATP41’s operations were first detailed in their full breadth in a FireEye report published in August 2019, with the report linking the group to some of the biggest supply-chain attacks in recent years, and to older hacks going to as early as 2012.

 

At the time, the report was also ground-breaking, as FireEye researchers revealed how the the group conducted both cyber-espionage for the Chinese regime but also intrusions for personal financial gain, usually executed outside normal working hours. Most of these side-hacks usually targeted gaming companies, from where the hackers stole source code or in-game digital currency.

In some cases, APT41 was also spotted deploying ransomware and installed malware that mined cryptocurrency for the group’s members. While it’s unknown how many of these incidents have occurred, the DOJ named one victim of a ransomware attack as “a non-profit organization dedicated to combating global poverty.”

Five Chinese nationals indicted

According to court documents obtained by ZDNet, the indictments came in two waves, but were unsealed today. The first two APT41 members were identified and charged in August 2019, following the FireEye report. According to a copy of the 2019 indictment, these charges stemmed from allegedly hacking high technology and video gaming companies, and a United Kingdom citizen. The two suspects were identified as:

  • Zhang Haoran (张浩然), 35
  • Tan Dailin (谭戴林), 35

Three more APT41 members were charged in a separate indictment filed last month, in August 2020. These three were charged with most of the APT41 intrusions.

  • Jiang Lizhi (蒋立志), 35
  • Qian Chuan (钱川), 39
  • Fu Qiang (付强), 37

US officials said the three were employees of Chengdu 404 Network Technology, a front company that operated under the close supervision of PRC officials. Court documents also revealed that US officials intercepted online chats between Jiang and another Chinese hackers, conversations where Jiang touted knowing and operating under Gong An, a high-ranking official in the Chinese Ministery of Public Security.

All five APT41 members remain at large, and their names have been added to the FBI’s Cyber Most Wanted List.

In addition, two Malaysian businessmen were also charged for conspiring with two of the APT41 members to profit from intrusions at video game companies. The two were arrested on Monday, September 14, by Malaysian authorities in the Malaysian city of Sitiawan.

According to court documents, the two have been identified as Wong Ong Hua, 46, and Ling Yang Ching, 32, owners of Sea Gamer Mall, a website that sold digital currency for various online games — currency that US officials believe was sometimes provided by APT41 members illegally, following intrusions at gaming companies.

In a live-streamed press conference today, FBI Deputy Director David L. Bowdich, said the Bureau is currently seeking the extradition of the two Malaysian businessmen to the US, to face their charges.

The FBI, which spearheaded the investigation, also obtained a court warrant earlier this month and seized “hundreds of accounts, servers, domain names, and command-and-control (C2) ‘dead drop’ web pages” used by APT41 in past operations.

Third Chinese state hacking group disrupted by US officials since 2017

The arrests today are part of a larger US crackdown against Chinese cyber-espionage and theft of intellectual property from US companies. US authorities previously charged three other Chinese hackers in November 2017 (believed to be part of Chinese hacker group APT3) and two other hackers in December 2018 (believed to be part of Chinese hacker group APT10).

Earlier this year, the FBI said it was investigating more than 1,000 cases of Chinese theft of US technology.

“Today’s charges, the related arrests, seizures of malware and other infrastructure used to conduct intrusions, and coordinated private sector protective actions reveal yet again the Department’s determination to use all of the tools at its disposal and to collaborate with the private sector and nations who support the rule of law in cyberspace,” said Assistant Attorney
General John C. Demers.

“Regrettably, the Chinese communist party has chosen a different path of making China safe for cybercriminals so long as they attack computers outside China and steal intellectual property helpful to China,” added Deputy Attorney General Jeffrey A. Rosen.