ACLU Calls for Dissolving DHS

Any of these organizations calling for a restoration of law and order yet? Biden or Harris? Nah, but read on….

Primer:

A judge in Portland, Ore., is proposing that the uniforms of federal agents responding to long-running protests and unrest in that city be emblazoned with easily visible numbers so officers can be easily identified if they commit abuses.

U.S. District Court Judge Michael Simon aired the suggestion Friday in connection with a lawsuit he’s overseeing that accuses city police and federal law enforcement officers of unjustified use of force against journalists and legal observers monitoring the protests, which have centered in recent weeks on the main federal courthouse in Portland.

“I do think it might be appropriate to require any federal law enforcement officer who steps out of the federal courthouse building to wear a unique identifying code,” Simon said during a 90-minute teleconference with lawyers involved in the case. “I’m taking this very, very seriously.”

The judge said he was considering ordering that federal agents — including scores of officers the Trump administration dispatched to the city from across the country — wear numbers about 8 inches high that would make it easier to assess whether some officers are violating a temporary restraining order the court issued last week.

Simon said he was thinking of something like the jerseys professional sports players wear, minus the names, which he said would expose law enforcement officers to the threat of doxing by the public.

The judge’s restraining order bars law enforcement from targeting journalists or legal observers and also gives those categories of individuals the right to remain in areas even if authorities require the general public to disperse because of riotlike conditions. More here.

*** https://s.abcnews.com/images/US/portland-protest-officer-rt-jt-200718_1595087284472_hpMain_16x9_992.jpg Note police on the uniforms

So, we now have judges that condemn the actions of law enforcement while the judges never seem to ask questions of Soros DA’s not prosecuting the militants in these cities. And the ACLU is for the most part taking the same position without consideration to all the work and departments within DHS.

*** https://pyxis.nymag.com/v1/imgs/103/7d8/36268f7317b3d89f028b34d88ac4725d66-portland-troops.1x.rsocial.w1200.jpg Note here he has identifiers.

The American Civil Liberties Union on Monday called for the dissolution of the Department of Homeland Security, calling it a “fail[ed] experiment” that has become a “badge of shame” under President Trump.

“Nearly 20 years of abuse, waste, and corruption demonstrate the failure of the DHS experiment. Many knew DHS to be an ineffective superagency, but President Trump has converted DHS into our government’s most notable badge of shame,” the organization said in a series of tweets Monday.

“Dismantling DHS, breaking it apart into various federal agencies, and shrinking its federal budget will allow for more effective oversight, accountability and public transparency,” it added.

The organization linked to a USA Today op-ed by executive director Anthony Romero that specifically cites the “unlawful and shocking” deployment of DHS personnel to Portland, Ore.

In the op-ed, Romero noted several former DHS and national security officials who have expressed dismay at the recent trajectory of the department.

Former Secretaries Tom Ridge and Michael Chertoff have both criticized the Portland deployment, while former White House counterterrorism adviser Richard Clarke has called for DHS to be dismantled.

In addition, Romero wrote that DHS is an “ineffective superagency” made up of 22 different agencies with contradictory mandates.

“Dismantling DHS, breaking it apart into various federal agencies, and shrinking its allocation of federal dollars will allow for more effective oversight, accountability and public transparency,” he wrote.

DHS was set up by Congress after the Sept. 11, 2001, attacks. The idea at the time was to increase the importance of homeland security by unifying various parts of the government under one umbrella.

But criticism of DHS has increased over the years, and particularly over the last few months amid reports of federal police in unmarked vans detaining people in Portland.

“The spun-off agencies will have clearer missions and more limited functions,” Romero wrote. “A behemoth of a federal agency too easily hides its problems and failings. Congressional oversight can be more readily divided among various congressional committees. Smaller agencies with clearer mandates will make the Cabinet-level jobs more attractive to top-notch professionals.”

The ACLU in July sued DHS and the U.S. Marshals Service over the Portland deployment. Plaintiffs in the case include the Portland Mercury as well as several journalists and legal observers who claim agents assaulted them.

Warnings of Ransomware Affecting Elections

According to an intelligence report issued by the Department of Homeland Security, one of the top 2020 election security concerns is ransomware. A report entitled “Cybercriminals and Criminal Hackers Capable of Disrupting Election Infrastructure”, echos concerns CISA head Chris Krebs articulate at the Black Hat security conference in early August.

Department of Homeland Security fears 'ransomware' attacks ... source

The FBI and Department of Homeland Security have issued advisories to local governments, including recommendations for preventing attacks.
“From the standpoint of confidence in the system, I think it is much easier to disrupt a network and prevent it from operating than it is to change votes,” Adam Hickey, a Justice Department deputy assistant attorney general, said in an interview.

US officials state that election interference will not be tolerated. They are proactively working with social media companies, among other groups, to help safeguard the elections.

In addition, the US Department of State’s “Rewards for Justice” program is offering a 10M to anyone who can provide information about foreign interference. The Department of State has reached out to targeted individuals in Iran soliciting information.

US officials are interested in identifying individuals who aim to disrupt campaigns, meddle with election infrastructure, and who pose threats to election officials. This is the third major “Rewards for Justice” initiative this year. More here.

***

“We’re seeing state and local entities targeted with ransomware on a near daily basis,” said Geoff Hale, a top election security official with Homeland Security’s Cybersecurity and Infrastructure Security Agency.

Steps taken to improve security of voter registration systems after the 2016 election could help governments fend off election-related ransomware attacks. They’ve also acted to ensure they can recover quickly in the event of an attack.

Colorado, for example, stores redundant versions of its voter registration data at two separate secure locations so officials can easily shift operations. Backups are regular so the system can be quickly rebuilt if needed.

Even so, ransomware is an added concern for local election officials already confronting staffing and budget constraints while preparing for a shift from in-person voting to absentee balloting because of the pandemic.

In West Virginia, state officials are more concerned about the cyberthreat confronting its 55 county election offices than a direct attack on the statewide voter registration system. One click from a county employee falling victim to a spearphishing attack could grant a hacker access to the county network and eventually to election systems.

“I’m more worried that those people who are working extra hours and working more days, the temporary staff that may be brought in to help process the paperwork, that all this may create a certain malaise or fatigue when they are using tools like email,” said David Tackett, chief information officer for the secretary of state.

In states that rely heavily on in-person voting and use electronic systems to check in voters, a well-timed attack particularly during early voting could prevent officials from immediately verifying a voter’s eligibility, making paper backups critical.

For states conducting elections entirely by mail, including Colorado, an attack near Election Day may have little effect on voting because ballots are sent early to all voters, with few votes cast in-person. But it could disrupt vote-tallying, forcing officials to process ballots by hand.

In many states, local officials will face an influx of new ballot requests. That means they’ll need constant access to voter data as they handle these requests. An attack could cause major disruptions.

Hickey said he was unaware of ransomware attacks directly targeting election infrastructure. But local election offices are often connected to larger county networks and not properly insulated or protected.

A criminal targeting a county or state “may not even know what parts of the network they got into,” Hickey said. But as the malware creeps along and spreads, “what gets bricked is the entire network — and that includes but is not limited to election infrastructure.”

Even if election infrastructure isn’t directly targeted, there would likely be immediate assumptions it was, said Ron Bushar of the FireEye cybersecurity company.

A February advisory issued by the FBI and obtained by The Associated Press recommends local governments separate election-related systems from county and state systems to ensure they aren’t affected in an unrelated attack.

NASA Prepares to Launch Contact Tracing Program

As the COVID-19 pandemic continues its spread in the U.S., NASA is tapping commercial software to start an internal contact tracing program.

Why NASA Needs a New Logo | Space

According to an information collection notice posted Tuesday in the Federal Register, the voluntary program “will be used to determine whether NASA personnel have been exposed to the COVID-19 virus and to track and trace their interactions across the NASA community for identifying possible points of exposure.”

Once the program is stood up, NASA plans to designate a health care-focused employee to act as the NASA Contact Tracer to lead the effort.

When a NASA employee or contractor agrees to sign up for the program, the Contact Tracer will start by going through the privacy considerations so the employee understands their rights and how their personal information will be used, after which the employee “will be asked, orally, to confirm if they have symptoms or not,” by replying “yes” or “no.”

That information—along with the employee’s contact information and the names, phone numbers and email addresses of those they have been in close contact with—will be entered into the new tracking app.

“While participation is voluntary, it is strongly encouraged as failure to provide the requested information may result in potential increased exposure of personnel to the virus,” the notice states.

The “newly developed tracking and tracing digital application” was built on NASA’s Salesforce platform. Salesforce’s workforce management platform has been used by a variety of organizations to start internal contact tracing programs, including some 35 state governments, according to company CEO Marc Benioff.

Interested parties have until October 4 to submit comments.

Specifically, under the Federal Register notice, the agency wants feedback on “whether the proposed collection of information is necessary for the proper performance of the functions of NASA, including whether the information collected has practical utility;” “ways to enhance the quality, utility and clarity of the information to be collected;” and “ways to minimize the burden of the collection of information on respondents, including automated collection techniques or the use of other forms of information technology.”

*** The Flawed World of Contact Tracing: Where’s Carol The Tester? source

“While participation is voluntary, it is strongly encouraged as failure to provide the requested information may result in potential increased exposure of personnel to the virus,” NASA wrote in the notice.

The information collected through NASA’s contact tracing program may also be shared with private or government healthcare providers and other entities with access to all NASA systems of records. By keeping the contact tracing records in a digital format, NASA wrote that it hopes to “ensure higher rate of inclusion and assist in the efficiency of the stages of report processing by human subject matter analysts.”

NASA is estimating that the contact tracing program will cost about $1.9 million per year. The agency is accepting comments on its contact tracing program – such as ways to enhance the quality of its data and ways to minimize the burden of information collection on personnel – through October 4.

An Interesting Arrest in Portland of a Militant Arsonist

The FBI and special agents of the U.S. Marshall service are not heard from at all when it comes to the daily assaults in Portland. Perhaps this one particular arrest will offer some hope for the work being done in Portland and many other cities around the country.

Portland Man Charged in May 29, 2020 Arson at Justice Center

PORTLAND, Ore.—U.S. Attorney Billy J. Williams announced today that Edward Thomas Schinzing, 32, has been charged by criminal complaint with using fire to maliciously damage or destroy the Justice Center in downtown Portland on May 29, 2020.

Multnomah County and the City of Portland own the Justice Center building located at 1120 SW 3rd Avenue in Portland. The facility houses the Multnomah County Detention Center jail and the Portland Police Bureau headquarters.

According to court documents, Schinzing was marching with a group of protestors when he arrived at the front of the Justice Center shortly before 11:00 p.m. on May 29, 2020. A few minutes later, several people broke windows near the northwest corner of the Justice Center where the Corrections Records Office is located. They subsequently entered the secured office through the broken windows.

Three civilian Multnomah County employees were working inside the Corrections Records Office at the time and fled for safety as the windows were broken. Based on a preliminary review of publicly-available videos from YouTube, Twitter, surveillance cameras, and still photos posted online, about 30 individuals entered the Justice Center through the broken windows. The individuals spray-painted portions of the office; damaged computer and other office equipment, furniture, and interior windows; and started fires.

Among those who entered the Justice Center, Schinzing was identified by a comparison with a jail booking photo and a distinctive tattoo of his last name across his upper back. Schinzing spread a fire that started near the front of the office by lighting additional papers on fire and moving them into a drawer of a separate cubicle.

At about 11:08 p.m., the building’s fire sprinkler system activated and extinguished the fires. At about the same time, law enforcement officers secured that portion of the Justice Center. The Multnomah County Detention Center housed approximately 289 inmates at the time.

Schinzing made his first appearance in federal court today before a U.S. Magistrate Judge and was ordered detained pending further court proceedings. Arson is punishable by up to 20 years in prison with a mandatory minimum sentence of 5 years.

This case is being jointly investigated by the FBI; Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); U.S. Marshals Service; Portland Police Bureau; Multnomah County Sheriff’s Office; and Multnomah County District Attorney’s Office. It is being prosecuted by the U.S. Attorney’s Office for the District of Oregon.

Criminal complaints are only accusations of a crime, and a defendant is presumed innocent unless and until proven guilty.

Schinzing marching with a crowd of demonstrators across the Burnside Bridge in Portland on May 29, 2020

Schinzing marching with a crowd of demonstrators across the Burnside Bridge in Portland on May 29, 2020
Schinzing marching with a crowd of demonstrators in downtown Portland on May 29, 2020

Schinzing marching with a crowd of demonstrators in downtown Portland on May 29, 2020
Schinzing inside the Corrections Records Office on May 29, 2020 before the fire is ignited

Schinzing inside the Corrections Records Office on May 29, 2020 before the fire is ignited
Close up of Schinzing inside the Corrections Records Office on May 29, 2020 before the fire is ignited

Close up of Schinzing inside the Corrections Records Office on May 29, 2020 before the fire is ignited
Schinzing spreading the fire in the Corrections Records Office by moving flaming papers into separate cubicles on May 29, 2020

Schinzing spreading the fire in the Corrections Records Office by moving flaming papers into separate cubicles on May 29, 2020
A demonstrator photographs the fire in the Corrections Records Office on May 29, 2020

A demonstrator photographs the fire in the Corrections Records Office on May 29, 2020
Damage to the Corrections Records Office from fire on May 29, 2020

Damage to the Corrections Records Office from fire on May 29, 2020
Damage to the Corrections Records Office from fire on May 29, 2020

Damage to the Corrections Records Office from fire on May 29, 2020
Damage to the Corrections Records Office from fire on May 29, 2020

Damage to the Corrections Records Office from fire on May 29, 2020
Damage to the Corrections Records Office from fire on May 29, 2020

Damage to the Corrections Records Office from fire on May 29, 2020

 

Chinese Embassy in San Francisco Still Open, Why?

Primer: The Chinese consulate in San Francisco is harboring a biology researcher who falsely denied connections to the Chinese military to obtain a visa and gain access to the country, according to court documents filed by the FBI.

The filing came as part of a document that cited a slew of other episodes in which Chinese nationals allegedly lied on their visa applications by hiding their military connections. More details.

FBI Arrests Chinese Researcher for Visa Fraud After She ... source

Axios: 

Every country spies. And many countries — including the U.S. — use their diplomatic outposts to do it. But for years, China has used its embassies and consulates to do far more than that.

Why it matters: The Trump administration’s recent hardline stance against China’s illicit consular activities is a public acknowledgment of real problems, but it comes at a time when U.S.-China relations are already dangerously tense.

Driving the news: Last week, the U.S. demanded that China close its Houston consulate in order to “protect American intellectual property and Americans’ private information,” White House National Security Council spokesperson John Ullyot said in a statement.

  • In response, the Chinese government ordered the closure of the U.S. consulate in Chengdu, a facility nestled in China’s more remote inland region that served primarily as a visa-issuing office for Chinese hoping to visit the U.S., and was not a major hub for U.S. intelligence activity.

Yes, but: The Houston consulate wasn’t China’s most important espionage hub.

  • “San Francisco is the real gem but the U.S. won’t close it,” a former U.S. intelligence official told Axios.
  • It indicates the Trump administration is likely making an example of the Houston consulate in a bid to achieve its goal of a reduction in Chinese espionage activities without taking an even harsher measure, such as closing the San Francisco or New York consulates.

The Chinese government has long used its embassy and consulates in the U.S. to exert control over student groups, collect information on Uighurs and Chinese dissident groups, and coordinate local and state level political influence activities.

Surveilling Uighurs: Leaked classified Chinese government documents have revealed that Chinese embassies and consulates are complicit in the ongoing cultural and demographic genocide against Uighurs.

  • The CCP has sought to track down Uighurs who have left China and force them to return, with orders to place them in mass internment camps “the moment they cross the border.”
  • China’s embassies and consulates have also collected information on Uighurs abroad and submitted that information to Xinjiang police.
  • Consular officials have frequently refused to renew Uighur passports, telling them they must return to China in order to obtain new documents — only to be disappeared into camps as soon as they do.

Controlling Chinese students: The Chinese embassy and consulates keep close tabs on Chinese students in the U.S., occasionally sending them political directives and quietly organizing demonstrations.

  • The Chinese embassy and consulates have paid students to demonstrate in support of visiting Chinese leaders, instructing them to crowd out anti-CCP protesters. They have also asked Chinese Students and Scholars Associations (CSSA) presidents to hold study sessions on party thought and to send back photos of the sessions to ensure compliance.
  • “I feel like the tendency is that the consulate tries to control CSSAs more and more,” one CSSA president told me in 2018.

Supporting United Front organizations: Chinese diplomatic officials regularly meet with leaders of U.S.-based organizations tied to the United Front Work Department, the political influence arm of the CCP, and preside over the ceremonies and banquets held by these organizations.

  • One such organization, the National Association for China’s Peaceful Unification, has branches in more than 30 U.S. cities. Its members issue statements in support of China’s official foreign policy positions, and the Chinese embassy and consular officials encourage them to engage in local U.S. politics.

The bottom line: Dealing with bad behavior by diplomats is a highly sensitive geopolitical issue that can easily result in damaged relations.

Go deeper … Mapped: Where U.S. and Chinese embassies and consulates are located

***

In part, how big a problem does the U.S. have regarding Chinese spies around the nation?

Economic Espionage

To achieve its goals and surpass America, China recognizes it needs to make leaps in cutting-edge technologies. But the sad fact is that instead of engaging in the hard slog of innovation, China often steals American intellectual property and then uses it to compete against the very American companies it victimized—in effect, cheating twice over. They’re targeting research on everything from military equipment to wind turbines to rice and corn seeds.

Through its talent recruitment programs, like the so-called Thousand Talents Program, the Chinese government tries to entice scientists to secretly bring our knowledge and innovation back to China—even if that means stealing proprietary information or violating our export controls and conflict-of-interest rules.

Take the case of scientist Hongjin Tan, for example, a Chinese national and American lawful permanent resident. He applied to China’s Thousand Talents Program and stole more than $1 billion—that’s with a “b”—worth of trade secrets from his former employer, an Oklahoma-based petroleum company, and got caught. A few months ago, he was convicted and sent to prison.

Or there’s the case of Shan Shi, a Texas-based scientist, also sentenced to prison earlier this year. Shi stole trade secrets regarding syntactic foam, an important naval technology used in submarines. Shi, too, had applied to China’s Thousand Talents Program, and specifically pledged to “digest” and “absorb” the relevant technology in the United States. He did this on behalf of Chinese state-owned enterprises, which ultimately planned to put the American company out of business and take over the market.

In one of the more galling and egregious aspects of the scheme, the conspirators actually patented in China the very manufacturing process they’d stolen, and then offered their victim American company a joint venture using its own stolen technology. We’re talking about an American company that spent years and millions of dollars developing that technology, and China couldn’t replicate it—so, instead, it paid to have it stolen.

And just two weeks ago, Hao Zhang was convicted of economic espionage, theft of trade secrets, and conspiracy for stealing proprietary information about wireless devices from two U.S. companies. One of those companies had spent over 20 years developing the technology Zhang stole.

These cases were among more than a thousand investigations the FBI has into China’s actual and attempted theft of American technology—which is to say nothing of over a thousand more ongoing counterintelligence investigations of other kinds related to China. We’re conducting these kinds of investigations in all 56 of our field offices. And over the past decade, we’ve seen economic espionage cases with a link to China increase by approximately 1,300 percent.

The stakes could not be higher, and the potential economic harm to American businesses and the economy as a whole almost defies calculation. More details here.