Is the U.S. Prepared for Foreign Interference of 2020 Elections

The Democrats continue to declare the Russians helped Donald Trump win the presidency and that now President Trump has done nothing to prevent Russian interference of the 2020 elections.

DHS is worried about our elections, and it's asking ...

But we need to look at some real facts.

  1. DHS launched several programs to aid the U.S. security of the nation’s elections systems. Beginning in 2017, a National Infrastructure Protection Plan was launched which began the real partnership with Federal, State and local governments including private sector entities. The sharing of timely and actionable threats, cybersecurity assistance including sensors all at no charge to election officials. Scanning, risk assessment and analysis along with training are all part of the Protection Plan, including conference calls scheduled as needed. What is most interesting is this program was initiated by a Presidential Policy Directive #21 signed by then President Obama in 2013.
  2. As ODNI Dan Coats has tendered his resignation effective in mid-August, many have said he has no accomplishment. This agency is merely an intelligence coordinator of many agencies and is bureaucratic but Coats did create a position that is dedicated to election security efforts and is headed by Shelby Pierson who has a deep resume in intelligence and was a crisis manager for election security in the 2018 elections. He has briefed the House Oversight and Government Reform Committee several times so for any Democrat to declare that the Trump administration has done nothing is false.
  3. DHS has a resource library including a checklist that is available for free for any election officials that can be accessed as new threats or conditions arise. This library includes HTTPS encryption techniques, incident response, ransomware best practices and securing voter registration data. Additionally, email authentication techniques are available, layering credentialed access logins, security baselines, monitoring intrusions and brute force attack attempts are shared with all participating partners.

All of these efforts are positive steps against foreign interference, however fake news and rogue actors are crafty, resourceful and well financed. The United States is not the only country that is a victim of foreign intrusions.

Foreign spy services that are utilizing information operations in order to influence US elections reportedly include —aside from Russia— Israel, Saudi Arabia, the United Arab Emirates, Venezuela and China.

The majority of foreign information operations take place on social-media platforms such as YouTube, Twitter, Instagram and Facebook. But there are also campaigns to influence more traditional American media, for instance by tricking newspapers into publishing letters to the editor that are in fact authored by foreign intelligence operatives. Analysts from FireEye, Graphika and other cybersecurity and network-analysis firms told The Postthat some information operations are difficult to detect, because the presence of a state security service is not always apparent. However, the messages that are communicated in tweets, Facebook postings, online videos, etc., tend to echo —often word for word— the rhetoric of foreign governments, and promote their geopolitical objectives. As can be expected, these objectives vary. Thus, Russian, Israeli and Saudi information operations tend to express strong political support for US President Donald Trump, arguably because these governments see his potential re-election as a development that would further their national interest. In contrast, Iranian information operations tend to lambast Trump for his negative stance on the Iranian nuclear deal and for his support for Saudi Arabia’s intervention in the Yemeni Civil War.

Stanley McChrystal has called for a nonpartisan, non-governmental Fair Digital Election Commission to protect the integrity of our elections by detecting, exposing, evaluating and remediating the impact of disinformation. Well we already have one where non-government cyber experts are collaborating with government officials and issuing attributions to the cyber actors as well as recommendations.

Fake news and false news influence voter’s attitudes. So one must ask where in Silicon Valley and the tech giants? We already know that Instagram, Facebook, Google, YouTube and Twitter are censoring so voters must be diligent in research and cautious themselves regarding the spread of fake news and validating stories beyond just reading the headlines.

Last year, 2018:

A new study by three MIT scholars has found that false news spreads more rapidly on the social network Twitter than real news does — and by a substantial margin.

“We found that falsehood diffuses significantly farther, faster, deeper, and more broadly than the truth, in all categories of information, and in many cases by an order of magnitude,” says Sinan Aral, a professor at the MIT Sloan School of Management and co-author of a new paper detailing the findings.

“These findings shed new light on fundamental aspects of our online communication ecosystem,” says Deb Roy, an associate professor of media arts and sciences at the MIT Media Lab and director of the Media Lab’s Laboratory for Social Machines (LSM), who is also a co-author of the study. Roy adds that the researchers were “somewhere between surprised and stunned” at the different trajectories of true and false news on Twitter.

Moreover, the scholars found, the spread of false information is essentially not due to bots that are programmed to disseminate inaccurate stories. Instead, false news speeds faster around Twitter due to people retweeting inaccurate news items.

“When we removed all of the bots in our dataset, [the] differences between the spread of false and true news stood,”says Soroush Vosoughi, a co-author of the new paper and a postdoc at LSM whose PhD research helped give rise to the current study.

The study provides a variety of ways of quantifying this phenomenon: For instance,  false news stories are 70 percent more likely to be retweeted than true stories are. It also takes true stories about six times as long to reach 1,500 people as it does for false stories to reach the same number of people. When it comes to Twitter’s “cascades,” or unbroken retweet chains, falsehoods reach a cascade depth of 10 about 20 times faster than facts. And falsehoods are retweeted by unique users more broadly than true statements at every depth of cascade.

The paper, “The Spread of True and False News Online,” is published today in Science.

 

 

Meet the United Front Work Department

The U.S. should perhaps scrapping any trade deal with China. Why?

Just this week, the United States Navy and Taiwanese authorities sailed through the Taiwan Strait. China threatened use of force to thwart any U.S. move over the partnership with Taiwan. So, the U.S. just tested that.

As an aside, the United States just approved a major sale of weapons requested by Taiwan totaling $2.2 billion. This is actually in compliance with U.S. law where we are to provide Taiwan with sufficient equipment and services for self-defense.

As part of the U.S. 7th Fleet, a guided missile cruiser transited the route continuing efforts to keep free and open the Indo-Pacific. President Trump is defying China and should actually as we dont respond to threats of war all while the White House National Security advisor John Bolton is in S. Korea. China continues to push the One China principle so as not to harm relations. Meanwhile, China has a robust active measures operation going on in Washington DC. So read on.

China’s Communist Party is intensifying covert influence operations in the United States that include funding Washington think tanks and coercing Chinese Americans, according to a congressional commission report.

The influence operations are conducted by the United Front Work Department, a Central Committee organ that employs tens of thousands of operatives who seek to use both overt and covert operations to promote Communist Party policies.

Johns Hopkins School of Advance International Studies, a major foreign policy education and analysis institute, has received funding from Tung Chee-hwa, a vice chairman of the Chinese People’s Political Consultative Conference, the party group that directs the United Front Work Department and includes a member of the Politburo Standing Committee, the collective dictatorship that rules China.

The funding for Johns Hopkins came from Tung’s non-profit group in Hong Kong, the China-U.S. Exchange Foundation, which is a registered Chinese agent.

In addition to Johns Hopkins, other think tanks linked to China and influential in American policy circles include the Brookings Institution, Atlantic Council, Center for American Progress, EastWest Institute, Carter Center, and the Carnegie Endowment for International Peace.

The Exchange Foundation is tied to Chinese government influence operations and uses the same public relations firm as the Chinese embassy. More here.

***

President Xi views United Front work as an important tool to strengthen support for the CCP both inside and outside China by exploiting individuals’ emotional and ideological sympathies for China and providing financial support to key groups and individuals.24 Although the importance of United Front work declined after the founding of the People’s Republic of China,* a number of Western analysts agree it has regained its prominence since then, and especially since the rise of Xi Jinping, as Beijing has embraced a much more assertive approach to foreign policy.25In his address to the 19th National Congress of the CCP† in October 2017, President Xi called United Front work“an important way to ensure the success of the [Chinese Communist] Party’s cause” and urged the CCP to form the “broadest possible patriotic United Front.”26 President Xi has also called United Front work a “magic weapon” that is important for bringing about “the great rejuvenation of the Chinese nation.”

Several pieces of U.S. legislation in 2018 have included important provisions for countering CCP and other malign foreign influence.‡ Representative Joe Wilson (R-SC) and Senators Rubio and Tom Cotton (R-AK) introduced legislation in March 2018, titled the Foreign Influence Transparency Act, which would require organizations that promote the political agendas of foreign governments to register as foreign agents§ and would require universities to disclose certain donations and gifts from foreign sources.127 Senator Ted Cruz (R-TX) introduced the Stop Higher U.S.-China Economic and Security Review Commission 15Education Espionage and Theft Act in May 2018, which is intended to strengthen the U.S. government’s ability to counter foreign intelligence organizations working inside the U.S. educational system.128 Senator Rubio and his Congressional-Executive Commission on China co-chair Representative Chris Smith (R-NJ), along with co-sponsors, introduced companion bills in the Senate and House in June 2018 calling for the establishment of an interagency task force to compile an unclassified report on CCP influence operations targeting the United States and certain U.S. allies.129 Most significantly, the National Defense Authorization Act for 2019 contains important provisions to coordinate the U.S. government response to malign foreign influence operations and campaigns—including specifically by China.* Read in full here.

How About Consulting FBI and SOCOM on Immigration

Homeland Security and Homeland Defense cannot be divided, one relies on the other.

For starters, the FBI has had a long term operation in Central America. The FBI declares the gang operations for instance in El Salvador does affect public safety in America.

“Many of the gang members committing these homicides are 13-, 14-, and 15-year-olds,” he explained, “and every day there are new members coming in.”

“We aren’t facing a group of youths who are rebelling, but a very structured organization conducting criminal activities,” said Luis Martinez, El Salvador’s attorney general and the country’s highest ranking law enforcement officer. “They are using military-grade weapons, and they are using them against the police, military, and prosecutors.”

MS-13 and 18th Street gang members have gained a foothold in numerous U.S. cities, including Los Angeles, Boston, Houston, Charlotte, Newark, and the Northern Virginia suburbs of Washington, D.C. They commit a variety of crimes—mainly trafficking drugs and extorting individuals and business owners—and they maintain strong ties to Central America.

The program is called Central American Law Enforcement Exchange (CALEE).

The success of the Central American Law Enforcement Exchange (CALEE) program hinges on bringing together U.S. and Central American law enforcement officers who share a common cause in the fight against violent transnational gangs. During the most recent CALEE, an important new partner was added to the group—prosecutors.

“We have seen that when prosecutors and investigators work together from the outset, cases tend to have more successful outcomes,” said Special Agent Grant Mann, who helped plan and administer CALEE 2015, the sixth session since the program began in 2009.

In the U.S, it is typical for FBI agents and prosecutors to sit down at the beginning of an investigation to discuss possible charges and investigative strategies. Historically, that collaborative process is less common in Central America—but thanks to programs such as CALEE, it is gaining acceptance.

***

At Joint Task Force-Bravo which is located at Soto Cano Air Base, Hondura, the task force supports training engagements, counterdrug missions and humanitarian and disaster relief efforts in Central America.

Southern Command continues support for Guatemala’s counter trafficking efforts, human rights efforts and future U.S. military engagement activities. Guatemalan police unit and an interagency task force – both focused on countering illicit traffickers in the nation in cooperation with the U.S. military.

Additionally, in El Salvador we have partnerships that provides key support to regional counter illicit trafficking efforts. The U.S. military has a Cooperative Security Location hosted at Comalapa International Airport where U.S. aircraft fly missions to detect, monitor and track aircraft or vessels engaged in illicit drug trafficking in the region.

File photo of the Curacao/Aruba Cooperative Security Location. (U.S. Air Force photo)

The CSLs are not bases.  They are tenant activities on existing airfields whose purpose is to support CTOC missions (see more on SOUTHCOM’s role in Countering Transnational Criminal Organizations).

U.S. Southern Command oversees the operations from the CSLs.  The Key West, Fla.-based Joint Interagency Task Force South coordinates U.S. aircraft usage and operations.

From these locations, U.S. detection and monitoring aircraft fly missions to detect, monitor and track aircraft or vessels engaged in illicit drug trafficking. The unarmed aircraft offer unique surveillance capabilities that support and compliment the counter-drug efforts of partner nation law enforcement agencies. (Note: Host nation officials are responsible for decisions to interdict suspected traffickers within their borders/airspace, and U.S. law enforcement agencies lead interdiction efforts in international waters.)

U.S. military, Drug Enforcement Agency, U.S. Coast Guard and U.S Customs personnel operate from the CSLs to support the U.S. aircraft and to coordinate communications and information.   More here.

The House Armed Services Committee is chaired by Democrat Adam Smith. Back in May of 2019, Chairman Smith admitted several crisis conditions in Central America, the Southern border and Latin America. This included the flow of migrants and the flaws of the asylum laws. However, Congressman Adam Smith still blames the Trump White House for the cause of the crisis.

There continues to be particular focus and resource attention on Venezuela which does affect other neighboring countries. Southern Command leader Adm. Faller declares that Iran, China and Russia exacerbate the problems not only in Venezuela but also in Central America. This rogue foreign actor declaration was also validated by other national security experts in the hearing, noting Kathryn Wheelbarger, acting assistant defense secretary for international security affairs and Kenneth Rapuano, assistant secretary for homeland defense and global security.

Wray’s Senate Testimony on China

Two significant items that prove Chinese espionage activities in the United States: a) Chinese Talent Plan b) Corporate Party Cells

This website has published several articles regarding the Chinese propaganda operation in the U.S. public school system and up to and including the university level.

As part of the Chinese mission to steal intellectual property beyond the insertion of censorship, culture and propaganda, China has at least two other successful objectives, the talent plan and the party cells.

China’s New Talent Policy: Objectives and Opportunities ...

A 5 page summary document on the talent plan is found here.

(U) Chinese Talent Programs are a vital part of Chinese industry. Talent programs recruit experts to fill technical jobs that drive innovation and growth in China’s economy. National, provincial, and municipal talent recruitment programs provide opportunities for experts to work in industry and academic organizations supporting key areas deemed critical to China’s development. The talent programs recruit experts globally from businesses, industry, and universities with multiple incentives to work in China. Associating with these talent programs is legal and breaks no laws; however, individuals who agree to the Chinese terms must understand what is and is not legal under US law when sharing information. A simple download of intellectual property (IP) or proprietary information has the potential to become criminal activity.

(U//FOUO) The large number of foreign students, researchers, scientists, and professionals in the United States, combined with current technological capabilities, allows foreign governments to contact and recruit individuals with the hopes to acquire advanced technology without research costs. While the majority of the population are law abiding individuals, anyone has the capability to acquire information. The theft of information can come from current or former employees, business partners, consultants, contractors, temporary hires, foreign agents, suppliers, or even vendors who have access to proprietary information. Read on here.

Per the applied website:

China initiated “the Recruitment Program of Global Experts” (known as “the Thousand Talents Plan”) since the end of 2008, under which it would bring in overseas top talents to China over the next five to ten years. Relying upon National Key Innovation Projects, National Key Disciplines and National Key Laboratories, central SOEs and state-owned commercial and financial institutions, and various industrial parks( mainly the high-tech development zones), this plan called for strategic scientists or leading talents who can make breakthroughs in key technologies or can enhance China’s high-tech industries and emerging disciplines.

By the end of May 2014,more than 4180 overseas high-level talents have been introduced in “1000 Talent Plan” by 10 times. When they go (back) to China, they are playing a positive role in the scientific innovation, technological breakthrough, discipline construction, talent training and hi-tech industry development, as an important force in the construction of the innovative country.

***

May Day Story: Chinese Government’s Communist ‘Party Cells ...

As for the Party cells, China, Inc. meaning all Chinese corporations/businesses are to have a department or cell within the company that is a mobilized team ensuring all business activities and employees adhere to the Communist Party mandates.

In November, at the most important Communist Party meeting, which takes place every five years, Mr. Xi called on officials to strengthen the party in “government, the military, society and schools, north, south, east and west.” The message was quick to reach party members lower down in the ranks.

Soon after Mr. Xi’s speech, party officials in the central province of Hunan issued a notice to members instructing them to write the party into legal documents for private and state-owned companies alike. The document was accidentally made public when a local state-owned newspaper published it, but it was quickly taken down.

***

In July, executives from more than a dozen top European companies in China met in Beijing to discuss their concerns about the growing role of the party in their local operations, Reuters reported.

One senior executive whose company was represented at the meeting told Reuters some firms were under “political pressure” to revise terms of their joint ventures with state-owned partners to allow the party the final say over business operations and investment decisions.

The business component with the party cells is quite important to consider when there is Chinese investment in the United States. When it comes to foreign applications, the U.S. Treasury may need to alter the approval process for all things China inside the United States given the history of theft. As for schools and business, it may be a consideration for the Chinese government to put up an export bond. Consider this is all going on as China defense industry is now the top arms maker ahead of all Western military contractors and manufacturers.

Possible Details on Iran for Trump Briefings

Image result for un arms embargo iran photo/details

For context, here is the background on the UN Arms Embargo on Iran.

1. The rapidly expiring “sunset provisions” – which will lift existing restrictions on Iran’s military, missiles and nuclear programs – were a key factor in President Trump’s decision to withdraw from the flawed Joint Comprehensive Plan of Action (JCPOA) in May last year. The first of the sunset provisions, the arms embargo under U.N. Security Council Resolution (UNSCR) 2231, will expire by October 18, 2020.

In its report, JCPOA Sunset Alert, United Against Nuclear Iran (UANI) details the hazards once UNSCR 2231’s arms transfers provisions expire. Guns, howitzers, mortars, battle tanks, armored combat vehicles, combat aircraft, attack helicopters, warships and missiles or missile systems will proliferate throughout the region.

2. The European Union is skirting the Iran sanction architecture by launching INSTEX. Based in Paris, it is managed by Per Fischer a German banker and the UK is heading the supervisory board.

The channel, set up by Germany, France and the UK, is called INSTEX — short for “Instrument in Support of Trade Exchanges.”

“We’re making clear that we didn’t just talk about keeping the nuclear deal with Iran alive, but now we’re creating a possibility to conduct business transactions,” German Foreign Minister Heiko Maas told reporters Thursday after a meeting with European counterparts in Bucharest, Romania.

“This is a precondition for us to meet the obligations we entered into in order to demand from Iran that it doesn’t begin military uranium enrichment,” Maas said.

3. Zarif, Iran’s Foreign Minister has confirmed violations of stockpile limitations as well as uranium enrichment of 300kg. for low-enriched uranium. These two items are violations of the JCPOA and Europe considers this just a distraction.

4. The U.S. has sent an estimated 12 F-22 Raptor stealth fighters to Qatar, based at al Udeid Air Base to bolster defenses Iran threats. There is a B-52 bomber task force in the region. The U.S. has dispatched several army batteries that operate the Patriot Missile launchers. Much of this is due to and in preparation for the asymmetric warfare tactics in use by Iran.

5. Iran is aware they cannot match the United States militarily, so there are two other possibilities and they include attacking Israel and major cyber interruptions.

Speaking at a political conference of ultra-conservatives in Iran’s north, Mashaei said, “If the Zionist regime attacks Iran, the Zionists will have no longer than a week to live.” The semi-official Fars news agency quoted him as saying that the Islamic Republic would destroy Israel “in less than 10 days”. On the cyber front, Iran has the abilities to disrupt networks associated with power systems in the region as well as those connected to oil production and shipping. U.S. Cybercom has the authorization, by way of the NDAA to conduct what is known as TMA, traditional military activities where cyber operations are included. Last month, the NYT’s reported the U.S. did carry out cyberattacks on Iran.

6. Iran has established terror cells in Western allied countries including the United States as noted by this case reported by the FBI just last month. Additionally, Qassem Suleimani has set up terror sites in Africa prepared to strike oil fields, military installations and embassies. These operations are managed by a specialized department of the Quds Force known as Unit 400.