China’s Military Takes Charge of War Powers

Primer:HONG KONG — Jailed Hong Kong pro-democracy activist Joshua Wong was arrested on a new charge under the national security law on Thursday while an American rights lawyer who was detained in a sweeping crackdown was granted bail. Friends and family of Wong, who is serving a 13 1/2-month prison sentence for organizing and participating in an unauthorized protest in 2019, were informed that he had been arrested on suspicion of violating the national security law and was taken away to give a statement on the new charge, according to a post on his Facebook page.

The post also stated that Wong’s lawyer was unable to meet with him, and that Wong had been transferred back to prison after giving the statement, which was not disclosed.

Separately, John Clancey, an American human rights lawyer who works at law firm Ho Tse Wai & Partners, was granted bail, his associate said. He was one of 53 activists arrested Wednesday under the national security law. He couldn’t be reached for comment.

At least some of the others were released on bail late Thursday from various police stations where they had been held. One, veteran activist and former lawmaker Leung Kwok-hung, unfurled a banner that blasted the national security law as he left.

China has expanded the power of its Central Military Commission
Has China gone into stealth mode with its military-civil fusion plans? |  South China Morning Post
(There is hardly an expectation that the Biden administration will take any aggressive action against China or would maintain existing current China policy under the Trump/Pompeo architecture. At risk especially is Taiwan and Hong Kong.)
Read on as President Xi is asserting more power during the power transition underway in the United States.
(CMC) – headed by President Xi Jinping – to mobilise military and civilian resources in defence of the national interest, both at home and abroad.

Revisions to the National Defence Law, effective from January 1, weaken the role of the State Council – China’s cabinet – in formulating military policy, handing decision-making powers to the CMC.

For the first time, “disruption” and protection of “development interests” have been added to the legislation as grounds for the mobilisation and deployment of troops and reserve forces.The legislation also specifically stresses the need to build a nationwide coordination mechanism for the mobilisation of state-owned and private enterprises to take part in research into new defence technologies covering conventional weapons, as well as the non-traditional domains of cybersecurity, space and electromagnetics.

Military and political analysts said the amendments aimed to strengthen the country’s military leadership under Xi, providing it with the legal grounds to respond to the challenges of accelerating confrontations between China and the US.

Deng Yuwen, a former deputy editor of the Communist Party publication Study Times,said the amendments aimed to legalise and formally apply the “special” nature of China’s political and defence system when dealing with situations that could harm the regime at home and abroad.“China’s political nature is very different from many countries … it’s not surprising for Beijing to enhance the leadership of the CMC when the PLA is going out to defend China’s national interests across the world,” said Deng, who is now an independent political commentator in the US.

China’s success at controlling the Covid-19 pandemic has been seen by Beijing as an endorsement of the Communist Party’s authoritarian rule, particularly as many Western countries are still struggling with rising numbers of infections.

Chen Daoyin, an independent political commentator and former professor at the Shanghai University of Political Science and Law, said the changes showed the regime had gained the confidence to legitimise its long-standing principle that “the party commands the gun” and stamp its “absolute leadership over armed and reserved forces”.

“The move to include ‘development interests’ as a reason for armed mobilisation and war in the law would provide legal grounds for the country to launch war in the legitimate name of defending national development interests,” Chen said.

Zeng Zhiping, a military law expert at Soochow University, said one of the big changes of the law was the downgrading of the State Council’s role in formulating the principles of China’s national defence, and the right to direct and administer the mobilisation of its armed forces.

“The CMC is now formally in charge of making national defence policy and principles, while the State Council becomes a mere implementing agency to provide support to the military,” said Zeng, who is also a retired PLA lieutenant colonel.

“It’s a big contrast when compared with developed countries like Israel, Germany and France, which prefer to put their armed forces under civilian leadership. Even in the US, the civilian-led defence ministry plays a more important role than their military top brass, the Joint Chiefs of Staff.”

Taipei-based military expert Chi Le-yi said the amendments highlighting the use of armed forces to suppress national disruption would be used to target independence-leaning forces in Taiwan, which Beijing regards as part of its territory.

Chi said the ultimate goal of the amended defence law could be seen as Beijing’s latest response to the US policy of comprehensive strategic containment of a rising China.

“The Chinese Communist Party now has strong crisis awareness as it faces various new security challenges, pushing the PLA to come up with a new defence policy soon after completing the establishment of top-down commanding and coordinating systems under Xi’s leadership,” Chi said.

“The law revision is also a symbolic battle call by the party to warn all Chinese people to be combat-ready for a nationwide defence mobilisation, which the party has never done since [it came to power] in 1949.”

The amendments were passed by the National People’s Congress on December 26, after two years of deliberation. Three articles were removed, more than 50 were amended, while there were six additions. In a media conference earlier in December, a spokesperson for the CMC’s legislative affairs bureau said the changes gave the PLA a clear direction in its modernisation and development goals.

 

China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.

Increased Alarm over Intrusion into U.S. and Sandia/Los Alamos

WASHINGTON (AP) — Federal authorities expressed increased alarm Thursday about an intrusion into U.S. and other computer systems around the globe that officials suspect was carried out by Russian hackers. The nation’s cybersecurity agency warned of a “grave” risk to government and private networks.

The Cybersecurity and Infrastructure Security Agency said in its most detailed comments yet that the intrusion had compromised federal agencies as well as “critical infrastructure” in a sophisticated attack that was hard to detect and will be difficult to undo.

CISA did not say which agencies or infrastructure had been breached or what information taken in an attack that it previously said appeared to have begun in March.

“This threat actor has demonstrated sophistication and complex tradecraft in these intrusions,” the agency said in its unusual alert. “CISA expects that removing the threat actor from compromised environments will be highly complex and challenging.”

President Donald Trump, whose administration has been criticized for eliminating a White House cybersecurity adviser and downplaying Russian interference in the 2016 presidential election, has made no public statements about the breach.

President-elect Joe Biden said he would make cybersecurity a top priority of his administration, but that stronger defenses are not enough.

“We need to disrupt and deter our adversaries from undertaking significant cyberattacks in the first place,” he said. “We will do that by, among other things, imposing substantial costs on those responsible for such malicious attacks, including in coordination with our allies and partners.”

The cybersecurity agency previously said the perpetrators had used network management software from Texas-based SolarWinds t o infiltrate computer networks. Its new alert said the attackers may have used other methods, as well.

Over the weekend, amid reports that the Treasury and Commerce departments were breached, CISA directed all civilian agencies of the federal government to remove SolarWinds from their servers. The cybersecurity agencies of Britain and Ireland issued similar alerts.

A U.S. official previously told The Associated Press that Russia-based hackers were suspected, but neither CISA nor the FBI has publicly said who is believed be responsible. Asked whether Russia was behind the attack, the official said: “We believe so. We haven’t said that publicly yet because it isn’t 100% confirmed.”

Another U.S. official, speaking Thursday on condition of anonymity to discuss a matter that is under investigation, said the hack was severe and extremely damaging although the administration was not yet ready to publicly blame anyone for it.

“This is looking like it’s the worst hacking case in the history of America,” the official said. “They got into everything.”

The official said the administration is working on the assumption that most, if not all, government agencies were compromised but the extent of the damage was not yet known.

This hack had nothing to do with President Trump firing Director Krebs at CISA even though Associated Press keeps suggesting. But things just took a turn for the bad bad side –>

Sandia National Laboratories - From the Manhattan Project to a National Lab Sandia

Texas A&M System part of team awarded lucrative Los Alamos National Lab  contract | The Texas Tribune Los Alamos

The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation and the Richland Field Office of the DOE. The hackers have been able to do more damage at FERC than the other agencies, the officials said, but did not elaborate.

Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”

Spokespeople for DOE did not immediately respond to requests for comment.

The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.

DOE officials were planning on Thursday to notify the House and Senate Energy committees, House and Senate Energy and Water Development subcommittees, House and Senate Armed Services committees, and the New Mexico and Washington State delegations of the breach, the officials said.

The FBI, Cybersecurity and Infrastructure Security Agency, and Office of the Director of National Intelligence acknowledged the “ongoing” cybersecurity campaign in a joint statement released on Wednesday, saying that they had only become aware of the incident in recent days.

“This is a developing situation, and while we continue to work to understand the full extent of this campaign, we know this compromise has affected networks within the federal government,” the statement read.

NNSA is responsible for managing the nation’s nuclear weapons, and while it gets the least attention, it takes up the vast majority of DOE’s budget. Similarly, the Sandia and Los Alamos National Labs conduct atomic research related to both civil nuclear power and nuclear weapons. The Office of Secure Transportation is tasked with moving enriched uranium and other materials critical for maintaining the nuclear stockpile.

Hackers may have been casting too wide a net when they targeted DOE’s Richland Field Office, whose primary responsibility is overseeing the cleanup of the Hanford nuclear waste site in Washington state. During World War II and the Cold War, the U.S. produced two- thirds of its plutonium there, but the site hasn’t been active since 1971.

The attack on the Federal Energy Regulatory Commission may have been an effort to disrupt the nation’s bulk electric grid. FERC doesn’t directly manage any power flows, but it does store sensitive data on the grid that could be used to identify the most disruptive locations for future attacks.

Space Command Alarmed at Russia’s Anti-Satellite Weapons Test

WASHINGTON — Russia conducted its second test this year of a direct ascent anti-satellite missile test, according to a U.S. Space Command, yet again drawing sharp criticism from the U.S.

“Russia has made space a war-fighting domain by testing space-based and ground-based weapons intended to target and destroy satellites. This fact is inconsistent with Moscow’s public claims that Russia seeks to prevent conflict in space,” said Space Command head Gen. James Dickinson in a statement. “Space is critical to all nations. It is a shared interest to create the conditions for a safe, stable and operationally sustainable space environment.”

U.S. SPACECOM nominee Dickinson says countries must be ...

Space Command said the direct-ascent anti-satellite missile tested is a kinetic weapon capable of destroying satellites in low Earth orbit. A similar anti-satellite missile test by India in March 2019 that destroyed the nation’s own satellite on orbit drew criticism from observers, who noted that the debris created from the threat could cause indirect damage to other satellites.

Russia has completed tests of its Nudol ballistic-missile system several times in recent years, including in April of this year. Nudol can be used as an anti-satellite weapon and is capable of destroying satellites in low Earth orbit. According to the CSIS Aerospace Security Project’s “Space Threat Assessment 2020,” Russia conducted its seventh Nudol test in 2018.

Under the Trump administration, the U.S. has used the development and testing of anti-satellite weapons by Russia and China as a justification for creating both Space Command and the U.S. Space Force in 2019.

“The establishment of U.S. Space Command as the nation’s unified combatant command for space and U.S. Space Force as the primary branch of the U.S. Armed Forces that presents space combat and combat support capabilities to U.S. Space Command could not have been timelier. We stand ready and committed to deter aggression and defend our nation and our allies from hostile acts in space,” Dickenson said.

Acting Secretary of Defense Christopher C. Miller made similar comments last week as the White House released a new National Space Policy, which calls for the U.S. to defeat aggression and promote norms of behavior in space

“Our adversaries have made space a war-fighting domain, and we have to adapt our national security organizations, policies, strategies, doctrine, security classification frameworks and capabilities for this new strategic environment. Over the last year we have established the necessary organizations to ensure we can deter hostilities, demonstrate responsible behaviors, defeat aggression and protect the interests of the United States and our allies.”

***

Kilopower  An illustration of a Kilopower nuclear reactor on the moon. Development of surface nuclear power technologies is a key element of the roadmap included in Space Policy Directive 6. Credit: NASA

The White House released a new space policy directive Dec. 16 intended to serve as a strategic roadmap for the development of space nuclear power and propulsion technologies.

Space Policy Directive (SPD) 6, titled “National Strategy for Space Nuclear Power and Propulsion,” discusses responsibilities and areas of cooperation among federal government agencies in the development of capabilities ranging from surface nuclear power systems to nuclear thermal propulsion, collectively known as space nuclear power and propulsion (SNPP).

“This memorandum establishes a national strategy to ensure the development and use of SNPP systems when appropriate to enable and achieve the scientific, exploration, national security, and commercial objectives of the United States,” the 12-page document states.

SPD-6 sets out three principles for the development of space nuclear systems: safety, security and sustainability. It also describes roles and responsibilities for various agencies involved with development, use or oversight of such systems.

Much of the document, though, is a roadmap for the development of nuclear power and propulsion systems. It sets a goal of, by the mid-2020s, developing uranium fuel processing capabilities needed for surface power and in-space propulsion systems. By the mid to late 2020s, NASA would complete the development and testing of a surface nuclear power system for lunar missions that can be scalable for later missions to Mars.

SPD-6 calls for, by the late 2020s, establishing the “technical foundations and capabilities” needed for nuclear thermal propulsion systems. It also sets a goal of developing advanced radioisotope power systems, versions of radioisotope thermoelectric generators (RTGs) long used on NASA missions, by 2030.

Many of the initiatives outlined in SPD-6 are already in progress. NASA has been working with the Department of Energy (DOE) on a project called Kilopower to develop surface nuclear reactors, including efforts to seek proposals to develop a reactor for use on the moon. NASA has also been studying nuclear thermal propulsion, an initiative backed by some in Congress who have set aside funding in NASA’s space technology program for that effort.

“We have these individual initiatives going on — nuclear thermal power, the Kilopower activities — and what we’re trying to do is pull together a common operating picture for Defense, NASA and DOE,” said a senior administration official, speaking on background about SPD-6.

That roadmap and schedule is also intended to prioritize those activities. Surface nuclear power is needed in the nearer term to support lunar missions later in the decade, particularly to handle the two-week lunar night. Nuclear thermal propulsion, as well as alternative nuclear electric propulsion technologies, are less critical since they are primarily intended to support later missions to Mars.

“Those things are important for going to Mars,” the official said of nuclear propulsion, “but first we’re doing the moon and leveraging terrestrial capabilities and technologies to put that foothold on the moon.”

Another issue addressed in SPD-6 is the use of different types of uranium. Tests in 2018 as part of the Kilopower program used highly enriched uranium, or HEU. That project, and discussions by NASA and DOE to use HEU for flight reactors, raised concerns in the nuclear nonproliferation community. They were worried that it could set a precedent for renewed production of HEU, which is also used in nuclear weapons.

SPD-6 restricts, but does not prohibit, the use of HEU in space nuclear systems. “Before selecting HEU or, for fission reactor systems, any nuclear fuel other than low-enriched uranium (LEU), for any given SNPP design or mission, the sponsoring agency shall conduct a thorough technical review to assess the viability of alternative nuclear fuels,” it states.

“We want to keep those proliferation concerns foremost in our minds,” a senior administration official said. “We don’t want to necessarily rule out HEU if that’s the only way to get a mission about, but we want to be very deliberate about it.”

The policy, an official said, “sets an extremely high bar” for non-defense use of HEU on space systems, citing progress on high-assay low enriched uranium, which can provide power levels similar to HEU systems with only a modest mass penalty.

The White House released SPD-6 a week after it issued a new national space policy during a meeting of the National Space Council. That broader policy briefly addressed space nuclear power and propulsion, discussing roles for various agencies, but did not mention the roadmap or other details found in SPD-6.

Many thought the release of the national space policy would conclude the administration’s work on space policy, making SPD-6 something of a surprise. A senior administration official said work on various space policy directives and the national space policy had been slowed down by the coronavirus pandemic, but wouldn’t rule out additional announcements in the remaining five weeks of the Trump administration.

US Companies Riddled with Members of Chinese Communist Party

Latest CHINESE COMMUNIST PARTY | The Straits Times

Primer:

In his speech just a few days ago at Georgia Tech University: Pompeo called China’s Communist Party “the central threat of our time” and highlighted efforts by Chinese security services to pressure and recruit Chinese academics and students as spies.

“Americans must know how the Chinese Communist Party is poisoning the well of our higher education institutions for its own ends and how those actions degrade our freedoms and American national security,” Pompeo said.

“If we don’t educate ourselves, if we’re not honest about what’s taking place, we’ll get schooled by Beijing.”

NYP: As we try to come to terms with the extent of Chinese influence over the Biden family, a leaked database of registered members of the Chinese Communist Party has exposed a mass infiltration of American companies — with serious national security implications.

Boeing, Qualcomm and Pfizer are just three US companies that have employed dozens of CCP members in their Chinese facilities, the database reveals.

As well, three female employees of the US consulate in Shanghai have been identified in the list of 1.95 million party members that was leaked to an international group of legislators, the Inter-Parliamentary Alliance on China, which includes Sens. Marco Rubio (R-Fla.) and Bob Menendez (D-NJ).

All CCP members swear an oath to “fight for communism throughout my life, be ready at all times to sacrifice my all for the party and the people, and never betray the party [and] guard party secrets, be loyal to the party.”

Sen. Josh Hawley (R-Mo.), a member of the Homeland Security Committee, said yesterday: “CCP agents have no place in US government facilities, and this report should serve as a much-needed wake-up call to Washington, DC, and corporate executives, who continue to welcome the Chinese government with open arms.

“[It] is just more evidence of the extent to which the CCP has successfully infiltrated American companies and government.”

While none of the people listed in the database have been identified as spies, mounting concerns in the State Department about the CCP have resulted in tightened visa rules for its members earlier this month. CCP members and their immediate families now are limited to one-month, single-entry US permits.

The database was verified by international cybersecurity firm Internet 2.0, which found it was originally leaked on encrypted messaging app Telegram in 2016. It was passed on to IPAC six weeks ago by a third party.

“We have high confidence this list is authentic,” Internet 2.0 co-founder David Robinson, a former Australian army intelligence officer, told me Sunday.

“Someone — an insider, a dissident — managed to get physical access to the server [in Shanghai] from outside the building. They didn’t have to hack it over the internet.”

Each data entry contains the CCP member’s name, ethnicity, place of birth, education level, identification number and, in some cases, a phone number and address.

Robinson has verified the identity of three women who work at the US consulate in Shanghai.

The three, all listed as ethnic Han college graduates, are registered in a 31-strong Communist Party branch listed as Shanghai Foreign Institutional Service Co., which is a state-owned employment agency, which provides local staff for foreign consulates, schools and news media.

A department spokesperson yesterday had no comment about “an allegedly leaked database of Communist Party members” and said “the department does not discuss security protocols or personnel matters.”

However, she said: “Influence and interference operations are fundamental to how the Chinese Communist Party engages with the world.

“China’s role in the world today cannot be understood without reference to the wide array of malign activities that the [CCP] undertakes to influence our societies in ways that are covert, coercive and corrupting.”

The CCP database is split into 79,000 branches.

For example, Boeing has 17 branches, totaling 252 CCP members. Sixteen members are part of Boeing’s Hongqiao Maintenance Base Boeing Line Maintenance Division . . . First Workshop Party Branch; 22 are in the Second Workshop Party Branch; 13 are in the Third Workshop Party Branch, 14 in the Fourth Workshop Party Branch.

There are four subdivisions of the Pudong Maintenance Base Boeing Line Maintenance Branch, totaling 49 members.

Two branches of the Pudong Maintenance Base Boeing Line Maintenance Branch Cargo Aircraft Line Maintenance total 33 members.

Also listed are 27 members of the Party Branch of Boeing Fourth Branch of the Flight Department of Eastern Airlines Yunnan Co. and 23 members of the China Eastern Airlines Beijing Maintenance Department Party Committee Boeing Maintenance Workshop Party Branch.

Boeing spokesman Bradley Akubuiro said last night the company was satisfied with its security.

“As a global company, we enforce strict security protocols and maintain secure firewalls to protect both our customer and company proprietary data in all countries we operate in.”

According to the database, 96 members in the Qualcomm Wireless Communication Technology (China) Co. Ltd. Party Branch, and 133 additional members spread over six party branches of Qualcomm Enterprise Management (Shanghai) work for semiconductor manufacturer and 5G wireless technology company Qualcomm, a US-based multinational.

Qualcomm was awarded a contract by the Defense Department in 2018 to develop multifactor authentication security systems for US military computers.

Another US company crucial to national security is pharmaceutical giant Pfizer, which began rolling out COVID-19 vaccines Sunday.

The database lists 69 CCP members in four Pfizer branches in Shanghai.

Neither Qualcomm nor Pfizer responded to inquiries yesterday.

New York University also appears with 71 members attached to a branch named East China Normal University Shanghai New York University Faculty and Labor Party Branch.

The database leak comes just days after a number of disturbing revelations involving CCP infiltration of American institutions:

Director of National Intelligence John Ratcliffe warned that China has targeted members of Congress and poses “the greatest threat to democracy and freedom” since World War II.
Secretary of State Mike Pompeo warned of China’s infiltration of US universities, which are “hooked on Communist cash” and stifle criticism of Beijing.
Media reports identified Rep. Eric Swalwell (D-Calif.), a member of House Intelligence Committee, as one of several San Francisco politicians courted by Chinese spy Christine Fang.

It was confirmed last week that Joe Biden’s son Hunter is under federal investigation over tax fraud and potential money-laundering over his foreign business dealings, including in China.

“Communist China has been allowed to infiltrate our universities and corporations with people loyal to only the Communist Party,” former Acting Director of National Intelligence Ric Grenell said Sunday.

“Our beloved Chinese American community has been warning us about these tactics for many years, and the political class has ignored those warnings.”

*** Communist party is 'leader of all religions' in China - world news - Hindustan Times

Sensitive data of around two million members of the Communist Party of China (CPC) have been leaked, highlighting their positions in major organizations, including government agencies, throughout the world.

According to reports from The Australian newspaper, featured in the Economic Times, the information includes official records such as party position, birthdate, national ID number and ethnicity. It revealed that members of China’s ruling party hold prominent positions in some of the world’s biggest companies, including in pharmaceutical giants involved in the development of COVID-19 vaccines like Pfizer and financial institutions such as HSBC.

The investigation by The Australian centred around the data leak, which was extracted from a Shanghai server in 2016 by Chinese dissidents.

It noted that CPC members are employed as senior political and government affairs specialists in at least 10 consulates, including the US, UK and Australia, in the eastern Chinese metropolis Shanghai. The paper added that many other members hold positions inside universities and government agencies.

The report emphasized there is no evidence that spying for the Chinese government or other forms of cyber-espionage have taken place.

In her report, The Australian journalist and Sky News host Sharri Markson commented: “What’s amazing about this database is not just that it exposes people who are members of the Communist Party, and who are now living and working all over the world, from Australia to the US to the UK, but it’s amazing because it lifts the lid on how the party operates under President and Chairman Xi Jinping.

“It is also going to embarrass some global companies who appear to have no plan in place to protect their intellectual property from theft, from economic espionage.”

In September, the Cybersecurity and Infrastructure Security Agency (CISA) and the US Department of Justice issued a joint advisory warning US government agencies and private sector companies to be on high alert for cyber-attacks by threat actors affiliated with the Chinese Ministry of State Security (MSS).