Facebook Still Deleting Accounts Tied to Iran and Russia

Social media giant Facebook on Wednesday removed two unconnected networks of accounts, pages, and groups “engaging in foreign or government interference,” one originating in Russia and the other one in Iran, both of which have alleged ties to intelligence services.

Calling the behavior “coordinated” and “inauthentic,” Facebook’s head of security policy, Nathaniel Gleicher, said both operations were acting on “behalf of a government or foreign actor.”

The Russian network primarily targeted Ukraine and its neighboring countries, while the Iranian operation focused mainly on the United States.

The people behind the groups and accounts “coordinated with one another and used fake accounts to misrepresent themselves, and that was the basis for our action,” the social-media company said.

In total, 78 accounts, 11 pages, 29 groups, and four Instagram accounts originating in Russia were removed.

Facebook’s investigation “found links to Russian and military intelligence services” within the Russian network.

The people behind the network would pose as citizen journalists and tried to contact policymakers, journalists, and other public figures in the region.

They would post content in Russian, English, and Ukrainian “about local and political news including public figures in Ukraine, Russian military engagement in Syria, alleged SBU (Ukrainian Security Service) leaks related to ethnic tensions in Crimea and the downing of the Malaysian airliner in Ukraine in 2014.”

Similarly, six Facebook and five Instagram accounts were removed originating in Iran that engaged in “coordinated inauthentic behavior.”

Some tried contacting public figures and they shared posts on such topics as the U.S. elections, Christianity, U.S.-Iran relations, U.S. immigration policy, and criticism of U.S. policies in the Middle East.

About 60 people had followed one or more of the Iran-based Instagram accounts, the media company said.

*** What there is more….

Add in Vietnam and Myanmar.

Per Facebook in part:

Each of them created networks of accounts to mislead others about who they were and what they were doing. We have shared information about our findings with industry partners.

We’re constantly working to detect and stop this type of activity because we don’t want our services to be used to manipulate people. We’re taking down these Pages, Groups and accounts based on their behavior, not the content they posted. In each of these cases, the people behind this activity coordinated with one another and used fake accounts to misrepresent themselves, and that was the basis for our action.

We are making progress rooting out this abuse, but as we’ve said before, it’s an ongoing challenge. We’re committed to continually improving to stay ahead. That means building better technology, hiring more people and working closer with law enforcement, security experts and other companies.The individuals behind this activity posed as locals and used fake accounts — some of which had already been detected and disabled by our automated systems — to manage Groups and Pages, post and comment on various content. Some of these accounts represented themselves as citizen journalists and tried to contact policymakers, journalists and other public figures in the region.

Screenshot of content posted by some of these Pages Screenshot of content posted by some of these Pages  Read more here for more fake news sampling noted by Facebook.

Chinese Spy Leading California Public Pension Fund?

This may add some very new and different questions when it comes to the Biden foreign operations….read on….

Rep. Jim Banks, R-Ind., joined “Mornings with Maria” to explain why he wrote a letter to California Gov. Gavin Newsom highlighting his concerns about the state public pension fund’s chief investment officer having ties to China.

The fund has invested $3.1 billion in Chinese companies, some of which have been blacklisted by the U.S. government, Banks told FOX Business’ Maria Bartiromo.

“If this were up to me, I would fire [Chief Investment Officer Yu Ben Meng] immediately because of these suspicious ties,” he said. “We learned that Mr. Meng, who is the chief investment officer of CalPERS, was actually recruited to this position by the [Chinese Communist Party] through something called the Thousand Talents Program. Now he’s denied it.”

CalPERS stands for the California Public Employees’ Retirement System, the largest public pension fund in the nation.

“What is unusual is that many of these companies are companies that we’ve blacklisted, that make Chinese military equipment or are responsible for technologies like Hikvision, which is the equipment that’s used by the Chinese for surveillance on the Uighur Muslim population that they’ve been abusing in their own country,” Banks said.

The Commerce Department blacklisted Hikvision in October “for engaging in or enabling activities contrary to the foreign policy interests of the United States.”

CalPERS defended Meng.

“This is a reprehensible attack on a U.S. citizen. We fully stand behind our Chief Investment Officer who came to CalPERS with a stellar international reputation,” a CalPERS spokeswoman told Reuters.

China's Social Credit System – It's Coming To The United ...

Hold on, it is actually worse… going back 4 months ago….

(Reuters) – Some of the biggest public pensions funds in the United States have invested in one of the world’s largest purveyors of video surveillance systems that the U.S. government claims are used in wide-scale repression of the Muslim population of western China.

The Trump administration’s decision to put the company, Hangzhou Hikvision Digital Technology Co (002415.SZ), on a blacklist last week has prompted at least two of the pension plans to say they are reviewing or monitoring that development.

The blacklist applies to Hikvision and seven other companies because they allegedly enabled the crackdown that has led to mass arbitrary detentions in the Xinjiang region.

“We are tracking the situation given this new development with the Department of Commerce’s announcement,” a spokeswoman for the California State Teachers’ Retirement System (CalSTRS) said in an email.

CalSTRS owned 4.35 million Hikvision shares at the end of June 30, 2018, the last data available. The holding, owned directly and through emerging market exchange-traded funds, would be worth $24 million at that share count.

The New York State Teachers Retirement System also owned Hikvision, reporting 81,802 shares at the end of June, up from 26,402 shares at the end of 2018, fund disclosures show.

“Our holdings are primarily held according to their weights in passive portfolios matching the MSCI ACWI ex-U.S. index, our policy benchmark. We are monitoring the situation,” said a spokesman for the teachers’ fund. The ex-U.S. All Country World Index includes stocks from 22 developed and emerging markets.

The blacklisting means Hikvision and the other companies will not be able to buy U.S. technology, such as software and microchips, without specific U.S. government approval. It does not prevent U.S. investors from buying the companies’ shares. In August, Hikvision had been banned from selling to U.S. federal agencies because the government said its products could allow access to sensitive systems.

Hikvision’s General Manager Hu Yangzhong told Reuters on Wednesday it has been talking to the U.S. government about Xinjiang and has hired human rights lawyers to defend itself against the blacklisting.

A spokeswoman for law firm Sidley Austin LLP, which has lobbied for Hikvision this year, declined to comment.

Another major fund investing in Hikvision shares is the Florida Retirement System (FRS), with 1.8 million shares at the end of June.

A spokesman for the fund said it was working closely with external money managers “related to the issue in order to meet all regulatory and fiduciary requirements.”

POSTER CHILD

Risk consultants say the ease with which money used for the retirements of tens of millions of Americans is being invested in such companies should concern U.S. authorities at every level, as well as Americans generally.

“Hikvision has emerged as the corporate poster child for enabling Chinese human rights abuses, with its surveillance cameras visible atop the walls of detention camps incarcerating some one million or more Uighurs in Xinjiang,” said Roger Robinson, president and CEO of Washington DC-based risk consultancy RWR Advisory Group.

Beijing denies any mistreatment of people at the camps, which it says provide vocational training to help stamp out religious extremism and teach new work skills.

Robinson said that many Americans are unwittingly owning shares in such companies because they are in index funds. “They are picked up by the index providers in sizable numbers and sluiced into U.S. investor portfolios with seemingly very little, if any, due diligence or disclosure in the categories of national security and human rights.”

MSCI Inc (MSCI.N), whose products are designed for global investors, added Hikvision to its benchmark emerging markets index last year. MSCI declined to comment.

One other company among the blacklisted eight that is owned by some of the big pension funds is iFlytek Co Ltd (002230.SZ), a speech-recognition firm. Its shares were owned by funds in Florida, New York State as well as CalSTRS and the California Public Employees Retirement System (CalPERS) indirectly through the iShares MSCI Emerging Markets ETF at their last disclosure dates. IShares, a top ETF provider owned by BlackRock Inc (BLK.N), declined to comment.

CUTTING TIES

Not all the funds have stuck with Hikvision.

The New York State Common Fund, one of the country’s biggest pension funds, liquidated its position months ago. It had owned 2.7 million shares worth $14.2 million at the end of March through an external fund manager, but sold them in May, a spokesman said, declining to say why.

U.S. mutual funds have also cut or eliminated positions in Hikvision amid the negative publicity, which included it being named in a Human Rights Watch report on mass surveillance in Xinjiang in May.

Just 9% of global emerging markets funds now own Hikvision, down from 20% in 2018, according to Copley Fund Research. One fund to pull out is the $2.7 billion Artisan Developing World Fund (APDYX.O), which had a $66 million position in Hikvision at the end of March but reported holding no shares three months later, fund disclosures show. Artisan did not respond to a request for comment.

At least one U.S. pension fund had worried this summer about whether to invest in the Chinese surveillance company.

The $33 billion Alaska Permanent Fund had considered an investment in a China fund featuring Hikvision as a top holding, according to minutes of a June meeting of its trustees and staff. The minutes were published last month.

Schroders Global Asset Management, a finalist for the fund’s mainland China investment mandate, touted Hikvision as a top performer.

Some Alaska trustees, however, worried about “headline risks” of investing in companies that aid the Chinese government’s surveillance activities, according to the minutes.

Jack Lee, portfolio manager of the China fund, assured Alaska pension officials he had spoken with Hikvision executives. Hikvision will “try to avoid that kind of business,” the trustees were told, but “they don’t necessarily know how their equipment is used,” Lee told the trustees, according to the minutes.

Reuters could not determine whether Alaska made an investment in the Schroders fund that included Hikvision stock.

A spokeswoman for the Alaska Retirement Management Board, which oversees the pension, said it does not have any additional information to share regarding Schroders’ efforts. A Schroders spokesman declined to comment.

 

 

Huawei Snooping via Backdoor on US Telecom Network

For ten years…..

U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through “back doors” designed for use by law enforcement, as Washington tries to persuade allies to exclude the Chinese company from their networks.

Chinese tech giant Huawei can reportedly access the networks it helped build that are being used by mobile phones around the world. It’s been using backdoors intended for law enforcement for over a decade, The Wall Street Journal reported Tuesday, citing US officials. The details were disclosed to the UK and Germany at the end of 2019 after the US had noticed access since 2009 across 4G equipment, according to the report.

The backdoors were inserted for law enforcement use into carrier equipment like base stations, antennas and switching gear, the Journal said, with US officials reportedly alleging they were designed to be accessible by Huawei.

“We have evidence that Huawei has the capability secretly to access sensitive and personal information in systems it maintains and sells around the world,” Robert O’Brien, national security adviser, reportedly said.

The White House and Huawei didn’t immediately respond to a request for comment, but the tech giant rejected the claims according to the Journal.

UK Prime Minister Boris Johnson approved Huawei for 5G last month with some conditions: The British restrictions are to exclude Huawei from building core parts of the UK’s 5G networks, have Huawei’s market share capped at 35% and exclude Huawei from sensitive geographic locations. The European Union allowed higher-risk vendors for 5G with similar restrictions at the end of January.

Huawei’s 5G approval there came despite the US urging the UK to ban the Chinese telecommunications giant.

Huawei was blacklisted in May when it was added to the United States’ “entity list” (PDF). In addition, US President Donald Trump at the same time signed an executive order essentially banning the company in light of national security concerns that Huawei had close ties with the Chinese government. Huawei has repeatedly denied that charge.

*** Huawei faces further investigation into Chinese 'spying ... source

Huawei disputed the latest allegations, as it has done in the past, saying it “has never and will never do anything that would compromise or endanger the security of networks and data of its clients.” Huawei also said that the United States made its latest accusations “without providing any kind of concrete evidence.”

“No Huawei employee is allowed to access the network without an explicit approval from the network operator,” a Huawei official said, according to the Journal.

The US government has been moving to reduce the amount of Huawei and ZTE equipment in telecom networks. The Federal Communications Commission voted unanimously in November to ban Huawei and ZTE gear in projects paid for by the FCC’s Universal Service Fund (USF). FCC Chairman Ajit Pai said at the time that Huawei and ZTE “have close ties to China’s Communist government and military apparatus” and “are subject to Chinese laws broadly obligating them to cooperate with any request from the country’s intelligence services and to keep those requests secret.”

The ban is expected to hit small carriers the hardest, as Huawei has appealed to small network operators by selling low-cost gear. By contrast, big telcos like AT&T “have long steered clear of Huawei,” a March 2018 Wall Street Journal report said.

 

 

DOJ to Sanction/Sue Sanctuary Counties/States

State of New Jersey lawsuit

Kings County, Washington lawsuit

FNC: Charging that so-called “sanctuary” cities that protect illegal immigrants are jeopardizing domestic security, Attorney General Bill Barr announced a slew of additional sanctions that he called a “significant escalation” against left-wing local and state governments that obstruct the “lawful functioning of our nation’s immigration system.”

Barr announces sweeping new sanctions, 'significant ... source

Speaking at the National Sheriff’s Association 2020 Winter Legislative and Technology Conference in Washington, D.C., Barr said the Justice Department would immediately file multiple lawsuits against sanctuary jurisdictions for unconstitutionally interfering with federal immigration enforcement, and implement unprecedented national reviews of left-wing sanctuary governments and prosecutors.

“The department is filing a complaint against the State of New Jersey seeking declaratory and injunctive relief against its laws that forbid state and local law enforcement from sharing vital information about criminal aliens with DHS,” Barr said.

That was a reference to New Jersey Attorney General Law Enforcement Directive 2018-6, which the DOJ says illegally bars officials from sharing the immigration status and release dates of individuals in custody. It also requires New Jersey law enforcement to “promptly notify a detained individual, in writing and in a language the individual can understand” if Immigration and Customs Enforcement (ICE) files an immigration detainer request for the individual.

“We are filing a complaint seeking declaratory and injunctive relief against King County, Washington, for the policy … that forbids DHS from deporting aliens from the United States using King County International Airport,” Barr continued.

That lawsuit targets King County Executive Order PFC-7-1-EO, which the DOJ said has dramatically increased operating costs for ICE as detainees have had to be transported to Yakima, Washington. The executive order unconstitutionally conflicts with the federal Airline Deregulation Act, which “prohibits localities such as King County from enacting or enforcing laws or regulations that relate to prices, routes, or services of air carriers,” the DOJ said.

“Further, we are reviewing the practices, policies, and laws of other jurisdictions across the country.  This includes assessing whether jurisdictions are complying with our criminal laws, in particular the criminal statute that prohibits the harboring or shielding of aliens in the United States,” Barr added, noting that the DOJ would support DHS with “federal subpoenas to access information about criminal aliens in the custody of uncooperative jurisdictions.”

And, Barr said, “we are meticulously reviewing the actions of certain district attorneys who have adopted policies of charging foreign nationals with lesser offenses for the express purpose of avoiding the federal immigration consequences of those nationals’ criminal conduct.  In pursuing their personal ambitions and misguided notions of equal justice, these district attorneys are systematically violating the rule of law and may even be unlawfully discriminating against American citizens.”

Prosecutors in New York and California have changed their policies so that prosecutors explicitly consider so-called “collateral consequences,” including deportation, before pursuing certain charges.

Sanctuary cities, Barr said, are defined as those with policies that allow “criminal aliens to escape” federal law enforcement — and some jurisdictions are becoming “more aggressive” in undermining immigration authorities, with some local politicians develop “schemes” to circumvent immigration officials.

In 2018, Oakland Mayor Libby Schaaf blew the whistle on an imminent raid by federal immigration authorities, tweeting out a warning to illegal immigrants in advance and helping them hide.

“The express purpose of these policies is to shelter aliens whom local law enforcement has already arrested for crimes,” Barr said, noting that the Constitution empowers the federal government to enforce immigration laws, even as it entrusted the police power to the states. “This is neither lawful nor sensible.”

“In November, ICE filed a detainer for an alien who was arrested for assaulting his own father,” Barr said. “The local police in New York City that had the alien in custody ignored the detainer.  So the alien was released onto the streets, and last month, he allegedly raped and killed 92-year-old Maria Fuertes, affectionately known as ‘abuelita,’ a fixture of her Queens neighborhood.”

Additionally, In October 2017, DHS “identified a convicted criminal alien with four prior removals at a city jail in Washington State,” Barr continued. “DHS filed a detainer.  Subsequently, the alien fought with jail staff and was taken to a local medical center for treatment.  But after receiving treatment, local officials released the alien in violation of the detainer.  In January 2018, the alien was arrested and booked for murdering and dismembering his cousin.”

READ BARR’S FULL REMARKS HERE

“The Founding Fathers carefully divided responsibility and power between the federal government and the state governments,” Barr said. The ‘Supremacy Clause’ in Article VI of the Constitution provides that the ‘Constitution, and the laws of the United States which shall be made in pursuance thereof… shall be the supreme law of the land.'”

He added: “This Clause is a vital part of our constitutional order.  Enforcing a country’s immigration laws is an essential function of the national government.  And no national government can enforce those laws properly if state and local governments are getting in the way.  While federal law does not require that ‘sanctuary jurisdictions’ actively assist with federal immigration enforcement, it does prohibit them from interfering with our enforcement efforts.”

Barr emphasized that there is no way to determine how many “criminal aliens” are in the U.S., in part because of “local policies,” although recent estimates under the Obama administration put the number as high as 2 million.

“Assuming that estimate was accurate, the numbers are likely even higher today despite the Trump Administration’s consistent and concerted efforts to find and deport this criminal population,” Barr said.

It is the “rule of law that is fundamental to ensuring both freedom and security,” Barr asserted, saying law enforcement officers are increasingly under fire in “heinous” attacks that “come against the backdrop of cynicism and disrespect for law enforcement.”

Barr touted the DOJ’s lawsuit against California and other states over their sanctuary policies. The suit over California involves the law prohibiting the federal government from conducting operations in its own affiliated private immigration facilities and detention centers.

The law, Barr said, was a “blatant attempt by the State to prohibit DHS from detaining aliens, and to interfere with the ability of the Bureau of Prisons and the U.S. Marshals Service to manage federal detainees and prisoners.”

“The department sued the State of California to enjoin numerous state laws that attempted to frustrate federal immigration enforcement,” Barr said. “We prevailed on several of our claims in the lower courts, and we are hopeful that the Supreme Court will grant our request to review the remaining issues and side with us against California’s obstructionist policies.”

He concluded, “Today is a significant escalation in the federal government’s efforts to confront the resistance of ‘sanctuary cities.’  But by no means do the efforts outlined above signify the culmination of our fight to ensure the rule of law, to defend the Constitution, and to keep Americans safe.  We will consider taking action against any jurisdiction that, or any politician who, unlawfully obstructs the federal enforcement of immigration law.”

Barr’s new sanctions come as the Trump administration has already announced other initiatives targeting illegal immigration in the wake of the president’s State of the Union address last week.

Last week, Acting Homeland Security Secretary Chad Wolf exclusively told Fox News’ “Tucker Carlson Tonight” that DHS was immediately suspending enrollment in Global Entry and several other Trusted Traveler Programs (TTP) for all New York state residents — a dramatic move in response to the liberal state’s recently enacted sanctuary “Green Light Law.”

Barr slammed the law in his speech Monday, calling it “unlawful.”

Customs and Border Protection (CBP) Assistant Commissioner, Office of Field Operations Todd Owen later told Fox News that up to 800,000 New Yorkers could be affected by the rule change within the next five years. Owen said people with pending Global Entry applications would be refunded, and that those with active applications would not be affected until their renewal date.

Illegal immigrants rushed to New York Department of Motor Vehicles (DMVs) in large numbers after the “Green Light Law,” which allowed them to obtain driver’s licenses or learner’s permits regardless of their immigration status, took effect last December. The law also permitted applicants to use foreign documents, including passports, to be submitted in order to obtain licenses.

In a letter to top New York state officials obtained exclusively by Fox News, Wolf noted that the New York law prohibited DMV agencies across the state from sharing criminal records with Customs and Border Protection (CBP) and ICE.

“In New York alone, last year ICE arrested 149 child predators, identified or rescued 105 victims of exploitation and human trafficking, arrested 230 gang members, and seized 6,487 pounds of illegal narcotics, including fentanyl and opioids,” Wolf wrote to New York officials. “In the vast majority of these cases, ICE relied on New York DMV records to fulfill its mission.”

The “Green Light Law,” Wolf went on, “compromises CBP’s ability to confirm whether an individual applying for TTP membership meets program eligibility requirements.”

“This Act and the corresponding lack of security cooperation from the New York DMV requires DHS to take immediate action to ensure DHS’ s efforts to protect the Homeland are not compromised,” he said.

4 Members of the Chinese Military Hacked Equifax

(AP) — Four members of the Chinese military have been charged with breaking into the networks of the Equifax credit reporting agency and stealing the personal information of tens of millions of Americans, the Justice Department said Monday, blaming Beijing for one of the largest hacks in history to target consumer data.

The 2017 breach affected more than 145 million people, with the hackers successfully stealing names, addresses, Social Security and driver’s license numbers and other personal information stored in the company’s databases.

4 Chinese military members charged in Equifax case

The four — members of the People’s Liberation Army, an arm of the Chinese military — are also accused of stealing the company’s trade secrets, including database designs, law enforcement officials said.

The accused hackers exploited a software vulnerability to gain access to Equifax’s computers, obtaining log-in credentials that they used to navigate databases and review records. The indictment also details efforts the hackers took to cover their tracks, including wiping log files on a daily basis and routing traffic through dozens of servers in nearly 20 countries.

  Source

“The scale of the theft was staggering,” Attorney General William Barr said Monday. “This theft not only caused significant financial damage to Equifax, but invaded the privacy of many millions of Americans, and imposed substantial costs and burdens on them as they have had to take measures to protect against identity theft.”

Equifax, headquartered in Atlanta, maintains a massive repository of consumer information that it sells to businesses looking to verify identities or assess creditworthiness. All told, the indictment says, the company holds information on hundreds of millions of Americans in the U.S. and abroad.

The case is the latest Justice Department accusation against Chinese hackers suspected of breaching networks of American corporations. It comes as the Trump administration has warned against what it sees as the growing political and economic influence of China, and efforts by Beijing to collect data on Americans and steal scientific research and innovation.

The administration has also been pressing allies not to allow Chinese tech giant Huawei to be part of their 5G wireless networks due to concerns that the equipment could be used to collect data and for surveillance.

The accused hackers are based in China and none is in custody. But U.S. officials nonetheless view criminal charges like the ones brought in this case as a powerful deterrent to foreign hackers and a warning to other countries that American law enforcement has the capability to pinpoint individual culprits behind hacks.

A spokesperson for the Chinese embassy did not immediately return an email seeking comment Monday.

The case resembles a 2014 indictment from the Obama administration Justice Department that accused five members of the PLA of hacking into major American corporations to steal their trade secrets. U.S. authorities also suspect China in the massive 2015 breach of the Office of Personnel Management and of intrusions into the Marriott hotel chain and Anthem health insurance company.

“This kind of attack on American industry is of a piece with other Chinese illegal acquisitions of sensitive personal data,” Barr said of Monday’s announcement, adding that “for years we have witnessed China’s voracious appetite for the personal data of Americans.”

The criminal charges — which include conspiracy to commit computer fraud and conspiracy to commit economic espionage — were filed in federal court in Atlanta.

Equifax last year reached a $700 million settlement over the data breach, with the bulk of the funds intended for consumers affected by it.

Equifax didn’t notice the intruders targeting its databases for more than six weeks. Hackers exploited a known security vulnerability that Equifax hadn’t fixed.

Once inside the network, officials said, the hackers spent weeks conducting reconnaissance. They stole login credentials and ultimately downloaded and extractedate data from Equifax to computers outside the United States.

The indictment says the hackers obtained names, birth dates, and Social Security numbers for about 145 million American victims, along with credit card numbers and other personal information for about 200,000.

According to the Government Accountability Office, the investigative arm of Congress, a server hosting Equifax’s online dispute portal was running software with a known weak spot. The hackers jumped through the opening to reach databases containing consumers’ personal information.

Equifax officials told GAO the company made many mistakes, including having an outdated list of computer systems administrators. When the company circulated a notice to install a patch for the software vulnerability, the employees responsible for installing the patch never got it.

Equifax’s $700 million settlement with the U.S. government gives affected consumers free credit-monitoring and identity-restoration services, plus money for their time or reimbursement for certain services. However, because so many people made claims, officials said some consumers would get far less than the eligible amounts because of caps in the settlement pool.