Chinese Communist Party is “inside the gates”

In part from Breitbart:

Secretary of State Michael Pompeo warned lawmakers that the threat from the Chinese Communist Party is “inside the gates” during a meeting with House Republican lawmakers on Friday.

Pompeo told members of the conservative Republican Study Committee that as a former lawmaker, he is aware of the threat posed by China but that he did not appreciate “the scope and the scale and the nature” of how close the threat is until he became Central Intelligence Agency director.

This CCP infection inside the United States goes beyond Senator Feinstein, Congressman Eric Swalwell, former California Senator, Barbara Boxer or even closing the Chinese embassy in Houston. There is the Thousand Talents Program that has wormed it's way through academia and the Confucius Institutes.

How about a little known Florida congresswoman, Stephanie Murphy (D-FL)? She is quite dedicated to China due in part to her husband Sean and his manufacturing company, 3N2. His company produces sports equipment/apparel in China. Further, she advocates for all the democrat policy points including open-border policies and more studies into “gun-violence”. Crazy enough, Murphy actually joined a small group of Democrats in calling to remove tariffs on the Chinese government.

None of this is actually new when it comes to Stephanie Murphy, in fact it goes back as far as 2017. Did anyone notice?

When you are on social media, do you actually work hard to determine if you are being trolled by some foreign entity? We are quite aware of Russian disinformation but going back years, at least to 2016 (interesting year), China's own troll farm has been just as successful in the social media sphere and you are likely a victim. DC politicians are just as likely to be willing accomplices.

There is or was a Chinese operation called the 50-centers and you probably clicked on a lot of their social media posts.

The Left-leaning policy organization Foreign Policy published the following in 2016.

A May 17 paper written by professors at Harvard, Stanford, and the University of California, San Diego provides the most detailed and ambitious description of China’s 50-centers available to date. It confirms the existence of a “massive secret operation” in China pumping out an estimated 488 million fabricated social media posts per year, part of an effort to “regularly distract the public and change the subject” from any policy-related issues that threaten to anger citizens enough to turn them out onto the streets. But the research finds no evidence these 50-centers are, in fact, paid 50 cents, nor does it find they engage in direct and angry argument with their opponents. Instead, they are mostly bureaucrats already on the public payroll, responding to government directives at a time of heightened tension to flood social media with pro-government cheerleading.

Opinion: How Chinese paid cyber-troll farms are upending ... photo

Understanding the behavior of pro-government netizens is important, given the stakes. In the past two and a half years, the Chinese government has used a combination of muscle and guile to cow online opinion leaders into submission, muzzling social media as a political force, and leaching public dialogue of much of its independence. But beneath the peppy, pablum-filled surface that has resulted, Chinese social media remains a contested space. In countless online chat rooms, bulletin boards, and Weibo threads, Chinese social media roils with the same ideological debates that also increasingly consume Chinese academics and elites.

Broadly speaking, the clash pits so-called leftists — that is, conservatives and neo-Confucianists who marry stout Chinese nationalism, a yearning for reconstructed socialism, and the quest for a reversion to hierarchy and filial piety — against rightists, or reformists, who continue to espouse what a Westerner would recognize as universal values, such as civil and human rights, government transparency, and democracy and constitutionalism. It’s more common for the two camps to exchange barbs than ideas. The leftists label the rightists sellouts, turncoats, and “public intellectuals,” the latter delivered with an implicit sneer. The rightists often call the leftists “50-centers,” regardless of who really pays their bills.

What is worse is a separate issue known as the Chinese cyber-attacks. A for instance however:

More than two dozen universities in the United States and around the world were targeted as part of an effort by the People’s Liberation Army, the Chinese military, to build up its naval and submarine forces.

iDefense, one security firm, tracked the Chinese cyberattacks to a hacking group known variously as Temp.Periscope, Leviathan or Mudcarp. A second firm, FireEye, calls the hacking group APT40 or Temp.Periscope.

FireEye said the operations appear linked to Chinese activities in the South China Sea, where Beijing has built disputed islands and deployed advanced missiles on them beginning a year ago. The Chinese military hacker unit in charge of that region is the Chengdu-based Unit 78020.

The 27 universities included the University of Hawaii, the University of Washington and the Massachusetts Institute of Technology.

Take caution, judge slowly. Secretary of State Mike Pompeo is right.

 

 

 

FBI is Investigating a Mysterious Postcard

SolarWinds hackers also breached the US NNSA nuclear ... source

(Reuters) – The FBI is investigating a mysterious postcard sent to the home of cybersecurity firm FireEye’s chief executive days after it found initial evidence of a suspected Russian hacking operation on dozens of U.S. government agencies and private American companies.

U.S. officials familiar with the postcard are investigating whether it was sent by people associated with a Russian intelligence service due its timing and content, which suggests internal knowledge of last year’s hack well before it was publicly disclosed in December.

Moscow has denied involvement in the hack, which U.S. intelligence agencies publicly attributed here to Russian state actors.

The postcard carries FireEye’s logo, is addressed to CEO Kevin Mandia, and calls into question the ability of the Milpitas, California-based firm to accurately attribute cyber operations to the Russian government.

People familiar with Mandia’s postcard summarized its content to Reuters. It shows a cartoon with the text: “Hey look Russians” and “Putin did it!”

The opaque message itself did not help FireEye find the breach, but rather arrived in the early stages of its investigation. This has led people familiar with the matter to believe the sender was attempting to “troll” or push the company off the trail by intimidating a senior executive.

Reuters could not determine who sent the postcard. U.S. law enforcement and intelligence agencies are spearheading the probe into its origin, the sources familiar said.

The FBI did not provide comment. A FireEye representative declined to discuss the postcard.

A disinformation researcher from the Rand Corporation, Todd Helmus, received a similar postcard in 2019, based on an image of it Helmus posted to Twitter. Helmus, who studies digital propaganda, said he received the postcard after testifying to Congress about Russian disinformation tactics.

FireEye discovered the Russian hacking campaign – now known as “Solorigate” for how it leveraged supply chain vulnerabilities in network management firm Solarwinds – because of an anomalous device login from within FireEye’s network. The odd login triggered a security alert and subsequent investigation, which led to the discovery of the operation.

FireEye worked closely with Microsoft to determine that the infiltration at FireEye in fact represented a hacking campaign that struck at least eight federal agencies including the Treasury, State and Commerce Departments.

When the postcard was sent, FireEye had not yet determined who was behind the cyberattack. A person familiar with the postcard investigation said “this is not typically the Russian SVR’s playbook” but “times are rapidly changing.” SVR is an acronym for the Foreign Intelligence Service of Russia.

A former U.S. intelligence official said the postcard reminded him of a now public mission by U.S. Cyber Command where they sent private messages to Russian hackers ahead of the 2018 congressional elections in the United States.

“The message then from the U.S. was ‘watch your back, we see you’ similar to here,” the former official said.

The extent of the damages tied to the U.S. government hack remains unclear. Emails belonging to senior officials were stolen from an unclassified network at the Treasury and Commerce Departments.FBI says 'ongoing' SolarWinds hack was probably the work ...

Related reading: Third malware strain discovered in SolarWinds supply chain attack

Now known in the cyber world, the heck of Solarwinds continues to rock the nation.

Kaspersky reports finding code similarities between the Sunburst backdoor in SolarWinds’ Orion platform and a known backdoor, Kazuar, which Palo Alto Networks in 2017 associated with the Turla threat group. Kaspersky is cautious about attribution, and notes that there are several possibilities:

  • Sunburst and Kazuar are the work of the same threat group.
  • Sunburst’s developers borrowed from Kazuar.
  • Both backdoors derived from a common source.
  • Kazuar’s developers jumped ship to another threat group that produced Kazuar.
  • Whoever developed Sunburst deliberately introduced subtle false flag clues into their code.

Reuters points out that Estonian intelligence services have long attributed Turla activity to Russia’s FSB (which was unavailable to Reuters for comment).

In an updated Solorigate advisory, CISA released detection and mitigation advice for post-compromise activity in the Microsoft 365 (M365) and Azure environment.

The US District Court for the Southern District of Ohio has responded to Solorigate by requiring that court documents be filed on paper, the Columbus Dispatch reports.

***

Related reading: The SolarWinds Hackers Shared Tricks With a Notorious Russian Spy Group

Reuters: Investigators at Moscow-based cybersecurity firm Kaspersky said the “backdoor” used to compromise up to 18,000 customers of U.S. software maker SolarWinds closely resembled malware tied to a hacking group known as “Turla,” which Estonian authorities have said operates on behalf of Russia’s FSB security service.

The findings are the first publicly-available evidence to support assertions by the United States that Russia orchestrated the hack, which compromised a raft of sensitive federal agencies and is among the most ambitious cyber operations ever disclosed.

Moscow has repeatedly denied the allegations. The FSB did not respond to a request for comment.

Costin Raiu, head of global research and analysis at Kaspersky, said there were three distinct similarities between the SolarWinds backdoor and a hacking tool called “Kazuar” which is used by Turla.

The similarities included the way both pieces of malware attempted to obscure their functions from security analysts, how the hackers identified their victims, and the formula used to calculate periods when the viruses lay dormant in an effort to avoid detection.

“One such finding could be dismissed,” Raiu said. “Two things definitely make me raise an eyebrow. Three is more than a coincidence.”

Confidently attributing cyberattacks is extremely difficult and strewn with possible pitfalls. When Russian hackers disrupted the Winter Olympics opening ceremony in 2018, for example, they deliberately imitated a North Korean group to try and deflect the blame.

Raiu said the digital clues uncovered by his team did not directly implicate Turla in the SolarWinds compromise, but did show there was a yet-to-be determined connection between the two hacking tools.

It’s possible they were deployed by the same group, he said, but also that Kazuar inspired the SolarWinds hackers, both tools were purchased from the same spyware developer, or even that the attackers planted “false flags” to mislead investigators.

Security teams in the United States and other countries are still working to determine the full scope of the SolarWinds hack. Investigators have said it could take months to understand the extent of the compromise and even longer to evict the hackers from victim networks.

U.S. intelligence agencies have said the hackers were “likely Russian in origin” and targeted a small number of high-profile victims as part of an intelligence-gathering operation.

 

Apple Bans 39,000 Apps After Demands by the CCP

And counting…including the newly launched conservative open free speech social media site Parler.

HONG KONG (Reuters) – Apple removed 39,000 game apps on its China store Thursday, the biggest removal ever in a single day, as it set year-end as deadline for all game publishers to obtain a license.

The takedowns come amid a crackdown on unlicensed games by Chinese authorities.

Including the 39,000 games, Apple removed more than 46,000 apps in total from its store on Thursday. Games affected by the sweep included Ubisoft title Assassin’s Creed Identity and NBA 2K20, according to research firm Qimai.

Qimai also said only 74 of the top 1,500 paid games on Apple store survived the purge.

Apple did not immediately respond to a request for comment.

Apple initially gave game publishers an end-of-June deadline to submit a government-issued licence number enabling users to make in-app purchases in the world’s biggest games market.

Apple later extended the deadline to Dec. 31. Cases still pending.

China’s Android app stores have long complied with regulations on licenses. It is not clear why Apple is enforcing them more strictly this year.

Analysts said the move was no surprise as Apple continues to close loopholes to fall in line with China’s content regulators, and would not directly affect Apple’s bottom line as much as previous removals.

“However, this major pivot to only accepting paid games that have a game license, coupled with China’s extremely low number of foreign game licenses approved this year, will probably lead more game developers to switch to an ad-supported model for their Chinese versions,” said Todd Kuhns, marketing manager for AppInChina, a firm that helps overseas companies distribute their apps.

In December, shares of Apple (NASDAQ:AAPL) were down a bit after the company removed thousands of paid game apps from its China App Store. Meanwhile, Disney (NYSE:DIS) stock rose after the company reportedly plans a price increase for its ESPN+ streaming service.

The Wall Street Journal reported last week that tech giant Apple planned to remove thousands of game apps from its App Store in China due to government pressure. Apple reportedly warned Chinese developers earlier this month that paid gaming apps were at risk of removal.

China requires paid video games to be licensed before being released, a policy that has been in effect for the past four years. However, app developers have been able to get around that rule on Apple’s platform. Apple began closing the loophole this year, the Journal reports.

On Thursday, Apple followed through by removing 39,000 game apps from its China App Store, according to Reuters. These include popular titles like Assassin’s Creed Identity and NBA 2K20. Just 74 of the top 1,500 paid game apps on the China App Store are still available, according to research firm Qimai.

The license requirement applies to paid games and games with in-app purchases, so the move by Apple could push more developers to opt for an ad-supported model. Apple takes a cut from sales of apps and in-app content, so such a shift would hurt Apples sales in China. source

*** Expect more stock price decline given the recent anti-trust cases in the legal pipeline against Apple and other big tech corporations. Apple and Google both take a cut of the revenue of the apps on their respective stores.

***

The factory in China where Apple products, specifically iPhones, undergo final assembly has approximately 230,000 workers. In the US, there are only 83 cities that have the same population as this factory’s number of employees. Meaning the number of possible workers in the US is not enough to cover Apple’s needs.

In China, an estimated quarter of their workforce lives in company-owned dormitories. These barracks are located on factory property. Many people are living and working at the factory. Such jobs are in high demand in China, and they can hire many people overnight. These examples prove that the measure, speed, and efficiency of Chinese manufacturing surpass anything the US is presently capable of. (read slave labor)

'Made in China 2025': is Beijing's plan for hi-tech ...

Apple is a willing partner in the China 2025 plan. You will then understand the China policy of President Trump and Secretary of State, Mike Pompeo.

Continue reading…you need to understand the past implications and those when Biden takes office.

When the US and ultimately the rest of the Western world began to engage China, resulting in China finally being allowed into the World Trade Organization in the early 2000s, no one really expected the outcomes we see today.

There is no simple disengagement path, given the scope of economic and legal entanglements. This isn’t a “trade” we can simply walk away from.

But it is also one that, if allowed to continue in its current form, could lead to a loss of personal freedom for Western civilization. It really is that much of an existential question.

Doing nothing isn’t an especially good option because, like it or not, the world is becoming something quite different than we expected just a few years ago—not just technologically, but geopolitically and socially.

China and the West

Let’s begin with how we got here.

My generation came of age during the Cold War. China was a huge, impoverished odd duck in those years. In the late 1970s, China began slowly opening to the West. Change unfolded gradually but by the 1990s, serious people wanted to bring China into the modern world, and China wanted to join it.

Understand that China’s total GDP in 1980 was under $90 billion in current dollars. Today, it is over $12 trillion. The world has never seen such enormous economic growth in such a short time.

Meanwhile, the Soviet Union collapsed and the internet was born. The US, as sole superpower, saw opportunities everywhere. American businesses shifted production to lower-cost countries. Thus came the incredible extension of globalization.

We in the Western world thought (somewhat arrogantly, in hindsight) everyone else wanted to be like us. It made sense. Our ideas, freedom, and technology had won both World War II and the Cold War that followed it. Obviously, our ways were best.

But that wasn’t obvious to people elsewhere, most notably China. Leaders in Beijing may have admired our accomplishments, but not enough to abandon Communism.

They merely adapted and rebranded it. We perceived a bigger change than there actually was. Today’s Chinese communists are nowhere near Mao’s kind of communism. Xi calls it “Socialism with a Chinese character.” It appears to be a dynamic capitalistic market, but is also a totalitarian, top-down structure with rigid rules and social restrictions.

So here we are, our economy now hardwired with an autocratic regime that has no interest in becoming like us.

China’s Hundred-Year Marathon

In The Hundred-Year Marathon, Michael Pillsbury marshals a lot of evidence showing the Chinese government has a detailed strategy to overtake the US as the world’s dominant power.

They want to do this by 2049, the centennial of China’s Communist revolution.

The strategy has been well documented in Chinese literature, published and sanctioned by organizations of the People’s Liberation Army, for well over 50 years.

And just as we have hawks and moderates on China within the US, there are hawks and moderates within China about how to engage the West. Unfortunately, the hawks are ascendant, embodied most clearly in Xi Jinping.

Xi’s vision of the Chinese Communist Party controlling the state and eventually influencing and even controlling the rest of the world is clear. These are not merely words for the consumption of the masses. They are instructions to party members.

Grand dreams of world domination are part and parcel of communist ideologies, going all the way back to Karl Marx. For the Chinese, this blends with the country’s own long history.

It isn’t always clear to Western minds whether they actually believe the rhetoric or simply use it to keep the peasantry in line. Pillsbury says Xi Jinping really sees this as China’s destiny, and himself as the leader who will deliver it.

To that end, according to Pillsbury, the Chinese manipulated Western politicians and business leaders into thinking China was evolving toward democracy and capitalism. In fact, the intent was to acquire our capital, technology, and other resources for use in China’s own modernization.

It worked, too.

Over the last 20–30 years, we have equipped the Chinese with almost everything they need to match us, technologically and otherwise. Hundreds of billions of Western dollars have been spent developing China and its state-owned businesses.

Sometimes this happened voluntarily, as companies gave away trade secrets in the (often futile) hope it would let them access China’s huge market. Other times it was outright theft. In either case, this was no accident but part of a long-term plan.

Pillsbury (who, by the way, advises the White House including the president himself) thinks the clash is intensifying because President Trump’s China skepticism is disrupting the Chinese plan. They see his talk of restoring America’s greatness as an affront to their own dreams.

In any case, we have reached a crossroads. What do we do about China now?

Targeted Response

In crafting a response, the first step is to define the problem correctly and specifically. We hear a lot about China cheating on trade deals and taking jobs from Americans. That’s not entirely wrong, but it’s also not the main challenge.

I believe in free trade. I think David Ricardo was right about comparative advantage: Every nation is better off if all specialize in whatever they do best.

However, free trade doesn’t mean nations need to arm their potential adversaries. Nowadays, military superiority is less about factories and shipyards than high-tech weapons and cyberwarfare. Much of our “peaceful” technology is easily weaponized.

This means our response has to be narrowly targeted at specific companies and products. Broad-based tariffs are the opposite of what we should be doing. Ditto for capital controls.

They are blunt instruments that may feel good to swing, but they hurt the wrong people and may not accomplish what we want.

We should not be using the blunt tool of tariffs to fight a trade deficit that is actually necessary. The Chinese are not paying our tariffs; US consumers are.

Importing t-shirts and sneakers from China doesn’t threaten our national security. Let that kind of trade continue unmolested and work instead on protecting our advantages in quantum computing, artificial intelligence, autonomous drones, and so on.

The Trump administration appears to (finally) be getting this. They are clearly seeking ways to pull back the various tariffs and ramping up other efforts.

China’s Military Takes Charge of War Powers

Primer:HONG KONG — Jailed Hong Kong pro-democracy activist Joshua Wong was arrested on a new charge under the national security law on Thursday while an American rights lawyer who was detained in a sweeping crackdown was granted bail. Friends and family of Wong, who is serving a 13 1/2-month prison sentence for organizing and participating in an unauthorized protest in 2019, were informed that he had been arrested on suspicion of violating the national security law and was taken away to give a statement on the new charge, according to a post on his Facebook page.

The post also stated that Wong’s lawyer was unable to meet with him, and that Wong had been transferred back to prison after giving the statement, which was not disclosed.

Separately, John Clancey, an American human rights lawyer who works at law firm Ho Tse Wai & Partners, was granted bail, his associate said. He was one of 53 activists arrested Wednesday under the national security law. He couldn’t be reached for comment.

At least some of the others were released on bail late Thursday from various police stations where they had been held. One, veteran activist and former lawmaker Leung Kwok-hung, unfurled a banner that blasted the national security law as he left.

China has expanded the power of its Central Military Commission
Has China gone into stealth mode with its military-civil fusion plans? |  South China Morning Post
(There is hardly an expectation that the Biden administration will take any aggressive action against China or would maintain existing current China policy under the Trump/Pompeo architecture. At risk especially is Taiwan and Hong Kong.)
Read on as President Xi is asserting more power during the power transition underway in the United States.
(CMC) – headed by President Xi Jinping – to mobilise military and civilian resources in defence of the national interest, both at home and abroad.

Revisions to the National Defence Law, effective from January 1, weaken the role of the State Council – China’s cabinet – in formulating military policy, handing decision-making powers to the CMC.

For the first time, “disruption” and protection of “development interests” have been added to the legislation as grounds for the mobilisation and deployment of troops and reserve forces.The legislation also specifically stresses the need to build a nationwide coordination mechanism for the mobilisation of state-owned and private enterprises to take part in research into new defence technologies covering conventional weapons, as well as the non-traditional domains of cybersecurity, space and electromagnetics.

Military and political analysts said the amendments aimed to strengthen the country’s military leadership under Xi, providing it with the legal grounds to respond to the challenges of accelerating confrontations between China and the US.

Deng Yuwen, a former deputy editor of the Communist Party publication Study Times,said the amendments aimed to legalise and formally apply the “special” nature of China’s political and defence system when dealing with situations that could harm the regime at home and abroad.“China’s political nature is very different from many countries … it’s not surprising for Beijing to enhance the leadership of the CMC when the PLA is going out to defend China’s national interests across the world,” said Deng, who is now an independent political commentator in the US.

China’s success at controlling the Covid-19 pandemic has been seen by Beijing as an endorsement of the Communist Party’s authoritarian rule, particularly as many Western countries are still struggling with rising numbers of infections.

Chen Daoyin, an independent political commentator and former professor at the Shanghai University of Political Science and Law, said the changes showed the regime had gained the confidence to legitimise its long-standing principle that “the party commands the gun” and stamp its “absolute leadership over armed and reserved forces”.

“The move to include ‘development interests’ as a reason for armed mobilisation and war in the law would provide legal grounds for the country to launch war in the legitimate name of defending national development interests,” Chen said.

Zeng Zhiping, a military law expert at Soochow University, said one of the big changes of the law was the downgrading of the State Council’s role in formulating the principles of China’s national defence, and the right to direct and administer the mobilisation of its armed forces.

“The CMC is now formally in charge of making national defence policy and principles, while the State Council becomes a mere implementing agency to provide support to the military,” said Zeng, who is also a retired PLA lieutenant colonel.

“It’s a big contrast when compared with developed countries like Israel, Germany and France, which prefer to put their armed forces under civilian leadership. Even in the US, the civilian-led defence ministry plays a more important role than their military top brass, the Joint Chiefs of Staff.”

Taipei-based military expert Chi Le-yi said the amendments highlighting the use of armed forces to suppress national disruption would be used to target independence-leaning forces in Taiwan, which Beijing regards as part of its territory.

Chi said the ultimate goal of the amended defence law could be seen as Beijing’s latest response to the US policy of comprehensive strategic containment of a rising China.

“The Chinese Communist Party now has strong crisis awareness as it faces various new security challenges, pushing the PLA to come up with a new defence policy soon after completing the establishment of top-down commanding and coordinating systems under Xi’s leadership,” Chi said.

“The law revision is also a symbolic battle call by the party to warn all Chinese people to be combat-ready for a nationwide defence mobilisation, which the party has never done since [it came to power] in 1949.”

The amendments were passed by the National People’s Congress on December 26, after two years of deliberation. Three articles were removed, more than 50 were amended, while there were six additions. In a media conference earlier in December, a spokesperson for the CMC’s legislative affairs bureau said the changes gave the PLA a clear direction in its modernisation and development goals.

 

China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.